Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html
-
Size
17KB
-
MD5
6113eec0783b05d0a245ef90da0b819e
-
SHA1
e1d4b49c4707cf460403bff49897f691304f2018
-
SHA256
b02618e2fdbdc67dccb858d9bd72807fbefe915082e6aa7b7a40fc6446cac1b8
-
SHA512
1e0f68f09991a64b99438f570472be26d625ccab835dd2b2eed5025e53f81e3a97fd1aee1dec180ec2c3da397bb2586da494edb7539fc81fa6d9a5a71beee27c
-
SSDEEP
192:enbv3K9Nl/7lJ1o/IE2KIGLDLEuFFq5JEzUc8bdnK57J/APIUAckUJJ36MeeTS8A:CLEuF2f15cwDQReAo/AgKqkka
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000edda05c0e4c620cb381d66a72def7dc7ee0ad0972d096d4b0c994173f0ae7c6b000000000e80000000020000200000007002ac2dab593607c8aac35d023f785bfe1ba909480abe292b163c4d89016700200000004ca4ffa28ef59bee51cf3f19acf5b908efe1f4ad3ad53b545d0beb8c9fae388940000000899bbe13301ce12c2150664c982bcd93482ed1f17e2d87dfab7d8bb7f8e9489736b22ee0f47a5962557e5b53a6921b1cfc272db10377022479277e1274eaf2a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206b7e8403abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A41F0161-16F6-11EF-9F01-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422405274" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000064df83b4ddf51fd725dcfef9ad7e7ba5ceb23910b8f9283722687d021f0e7f9d000000000e8000000002000020000000e6be60243af2eb8c36cead8d57de542cef3a529d6999d38285e2581a394f7a529000000030b9e766649e80b68321588a022a7f14d645d6061c0ca8d3fe8b494aa9f956e815040f9e6e91be668eadb817da137c8ffcd2d2563fdf50128044cee94a220b39be74cb7538821410e6c0664c94768ea09211761dbfe64288f56cd2aab7dfe178ed37c9f723e4e6a219fec3a7d21104c3c92a7733eed61bc2798179a3cc114e3dbee9f89660b583ea77bd6c39ea38c906400000006c4ff919ff5b2f2e28da7256d75276e42320e739525aaf7aa61aaa200a2a66df2ad2ec49fa31ed9b5f9b6b33305257a400f2ce64ee5b649d777e9cc65ca3cff9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2896 2764 iexplore.exe 28 PID 2764 wrote to memory of 2896 2764 iexplore.exe 28 PID 2764 wrote to memory of 2896 2764 iexplore.exe 28 PID 2764 wrote to memory of 2896 2764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6113eec0783b05d0a245ef90da0b819e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538b2915fd5ac30f28654bc4758691f4f
SHA126fa3e21f33c181cc4d8321cd83c69d9151d9146
SHA25632f2158327f60bc9d34d8437c968c8234e5066bf2d6a821819a80ae5dbdd592c
SHA51278e1fc7079ed3800892d50e713dcd17edfff99c400e1c83d09feef91fc5c47ceed3c66f042fa8350c5df5bf007a7880d40b4745b92be90b896ba97f9ab8a29b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588202ec9bee4ac21a99b01e8402bbca0
SHA1b06e406690af727d24db0f85269b3e6945c4364d
SHA2560df057124504706629617dd9b9fe0e5eff7aaab7b3f902a26294c56a63168cd9
SHA5128a49048c16d626c97bffa82ad7911ed1c2f063d8e02d115c697214b67635d3475a1cbcbf768da8cfb5a99d6e97aa85bea69e120061c51cbed181810d0ff1267e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58980846352363d1c528164f38fd4bd8a
SHA1c18c1cb7aaf82ca8ead566a255dd5f4a781acc95
SHA25668a7b02c0ba4f52f98f27cee44564d85f92cdb9ceb76f036c5246fe240551e09
SHA512b84fab099c3db73de1ce4af5268ebe81352629ea450b4a94df0cebfc8b14f4b81ff3f00f1477ac864893b57944aa21dd1ec5d2bb3a2c3f6c587536bff1834972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57492da6706d6ac8f3f98f4ab27c70daa
SHA1d126d0414c5af3dde90cd5d1c5598cdb932c4ef5
SHA25600400369ee2ea1fb38c6e1dd52c825edd3038fc30ca20adc325f482cfab0d3a7
SHA512e05c83ec5ea5f448b24e42e15bd234e79eb50e82511bcc1e4d8da29f1dc055b2b641e3c7012323d843bbc2bbf4d7622b84004ea5ae8c72d27f21ac5cd5988ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5768bfc92cccfd98e8824e4f0cd09bb11
SHA1d0390b4abce2a95e1e32bd8af1b64e2a7f0cd032
SHA2566a79bbd53f46980b4c0a69d6137bb44c2aec1bef0d920e7c7510f17b2aa7d569
SHA5122820e21379b2f8e66ad748e9cba210e13614dff298bb19a90a4e49882de21237b132656296be7a98be0a2bbc4272c1199c0009404bf384cb7de8b2462df09e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62a851ffaa7331976416eaa25f81bb3
SHA19a1dd9a059dc79795d58874845d36f9db1c28f48
SHA256bbdcc4655e64fdc5909eedab952ec1337a5c9fed0f077e5b8047e07d91133a47
SHA512089fdb990149774fb9d9d5deb389638614f01c4f38daef0dcec93460df5fa4ba3d337fb97bfb63d01eeba40fbd4f2891d2e5d2bf30f3b8055da3e0ad782f4f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5126c3e4151dcc223cb2a4201d6e7e208
SHA1c7ffc7e72e887db5e5a29f510d978ce17d218b0c
SHA256921ddc83c55826a2581764289ab055421909917391643e57ac353bec662fe267
SHA51284e791795370d3051bde3f32b8156b5a29b1b24a7837b1d963a51c1cec366119fb04452d2e688fab6447b774daa1f85fe37fea10e073ba97c3f1c4118643a856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540ca85aa88e539476612d3192a242c0e
SHA1d113057448fb6989744e3dcc9c8f70da61661fd6
SHA256b2fc752277e3b545fcde8dffec14a73426d6242a9ada9954998ec7bdf86b80a0
SHA51214e48ab41d2bc5d15b27f6c0be0ce1e0fa9571d66723af0f119590e137ef85afe4097419437f8da3394994256535c8ee4541d316c2ca66fff488e146ce4fb6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a998ab8dd5f83f12aaee3b221fe271
SHA11da93ea74f06c4137633b1dd4b2279dcd202955c
SHA256a6c96c56e7af6be61f8b837830e59c4d68861c88cc447112838b5afe423055f0
SHA51291e8b1a0c1683a4f5debc761414ea4f67ad20f9e934850f01500016f8353fc71be026dd7652731e7ee49134ab933f602b801068b1575627b6f61bcebbc1000b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325a12377c3275a8eba8609c08ef7235
SHA14c1ab41204339ebdefefc59c0aa53bbb7b095d95
SHA2566ca13b083731433ce2e485b57fe921b8a23ad96deeddd4f688ddc3d2849f962f
SHA512e2e8f040c5cc1963bfbcca07b6a39f9b028871ee32b1bacc0610b6becd102993818f8333f3973ba1427523e871159183f072ab196df3a2096568e5068cc154f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524fefabc5bb6b68cf6e65389ec21d69c
SHA19f330743cbbbf614f83e1e7242570b691a253bd7
SHA2562ab884d2965c817db32ebc43df6fa6927cefb5c1cf1c255f9919fdef77a22a9d
SHA512226f7ce783a603df16346e2e5548d5bac1da9b1262540b0732ce047ded0f9bc85a84772788d81d337668ed6b20da7cae22095d2c8a0292a471f0901188e5566e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5301c78996b4fac241b220ee7d9a51996
SHA1410b28cec2c985dff89f202a98e6145aeb367b4f
SHA25696c9b5712abfd5f2822d6914c3f34338602d66eebd80b4aa4dd80278c79f8c49
SHA512cc3f9467c3dc38f0614be73694aed475d61f995b2910461606e719dc4372bdf1f6888b4aa59dc52a59e7cb5b7da264501e2adb2b12b3b5e2f39ef5cc76b71422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15757b7f4976b2211e91fe7f40889c6
SHA10228b030943ad25707dae4a9981171db30e64059
SHA256ca0d0dc46bb9202ec67e44dcf3c4bb16ed09c8d8c94c2c1cb3887ae29d244682
SHA51265472c9a100b616c9d5bd8ecb3737a66a00a24d24a4ba5b0f9e8a291cee509c476c48547367fa863ae81cc0df476de2e2c75e3b2dc4866ecb28be117edf2ea95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e822891301e89b91b4d8104e8cc9ed
SHA127305c2306ae7d4f6754ebf611c7bbbd7de53b17
SHA2563dd3146846f5646b99acc5c8bc58f7d9893e0f340b3242c14c18fa400716f266
SHA51231ef7ab2de9671740a06d2486727a955571141681cd4ba6ea8e8dbbf92a53ea12f88a764e1fdc9155896fd155da3a6614a98e3a4b7ec373301192fc618d8f31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ab9d35a8293419720ac4a74697c6a88
SHA1aa17808a344f1a893a013dbd21e69174dc7992f7
SHA2567cb10301b116491b031a615edcd3255b4294edff42955655e0fecbf029afc1e0
SHA512da8e8aa97afbb21ee1d77bebc572f627e91d33d1b108d204a47eb70390249af02ef291694db56b2737963831246d8915094a36316a95ba24b670ecaec81c2ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507cb48ae11fbf48d71f65c0b8b20270f
SHA12332215b06b42fba686db942e7c3149d678a9d06
SHA256ee3397a0554d2ac573902f927ec84031b918bf15ad8909ef0d8eef25ec152327
SHA51220b6edc285ab189e611e4bb69276f68836e96d7e3129e41fd7ddf6f6f6814eb3f4bb7cfde0b79f80f1048907109d2ff8d6300a70ebe6454894f74b79ce8f2429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6f68e138daa766fd3fdb6c90d95c159
SHA1f945eaa5e2e7889543299ef732e7405ee1900c1d
SHA2567e0cc484e8bc206921956d025000d9537269ef61c220399b5777dafa3d0a1e23
SHA5127c68a2b68e28540bbaac43aa382d49f1ea7fc7e7f160730e7bfd093981945a121bd82ce50554c4a357d5f8f38f0dbfd132e9ce89a8cf32d0878695beb99d1b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d706fc7fcf72a52a751c13e793be6cb
SHA1615d04794f724654392f5138b8e402b2c319c8cc
SHA25623b7b42f95333be38e01c6c91bf0547823ad08f9e2c9b5ce9e096355d86a85f9
SHA512d45122534a0e598a479f23eabe863bf7c608f1ca78bb68cdadc771e56a84240c9c1119c487b0840e58dd2fe3d03470485e80f0de7b8ae4c63ea65634ff0f7d67
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\ceramic-countertop-water-dispener-crock[1].htm
Filesize861B
MD5e73f610b94322abb23c06075b4a461dd
SHA1167fff11bd1d5b86c3d7ad8c67eaabb621d09e92
SHA256d378174a0b5c749f3d2df399838411cf8971af0e7e6aec82057d126f7068aea3
SHA51252d704fe66201886b633a7bcfd65b3aeadf3fd03ff662554fe8564fe47915e09ee3b03d5ff2d5aec698de8e4a7b671e488d4c3255b78335fd57a6c69af570e6a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a