Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
5e1596d7a835621b11f5ff3092886c68_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5e1596d7a835621b11f5ff3092886c68_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e1596d7a835621b11f5ff3092886c68_JaffaCakes118.html
-
Size
15KB
-
MD5
5e1596d7a835621b11f5ff3092886c68
-
SHA1
6eee2375663456726114974dd9664e62c244539d
-
SHA256
06f0afff6054d6b7dcdf6c3a5fc8ccb9594687a6796f92e440f9c7f0c4da22da
-
SHA512
d6be74864d53ce33e970e512a072049ca0d0dbb6d3a799f0c5ac6db0eddb7d13344f1e50dbae12e3f917e9da4017c58253a2f06869062bbb1a7af304f6d77e91
-
SSDEEP
192:ifcBABL6wY5nXck/WNY6U6J4bDsmpN5vpjESlHo/SszOOwYKFrz:ifEABL6wY5ZWNpU6WDv5jI/SszOORKt
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000000c5007aa14dbc2c9898dc8c0ee6babfa01ff79af35e633bb0c4442e53408b640000000000e800000000200002000000008a1746f593239ec89be8b2fe811d29cc030cf83ac81e6396dead95a8f841f0d200000000de54d97912e136ee362b77808c964f1f5668f088459479b036307b7e1a946d6400000001f42e9c39fe0de34d9ecf5f98f3e6c4eb6643882db8c220746e9eae464a1039d8acaff9ebad36a486ff3d58c0289cecd8a2df36362dc00b052574d88d62deb24 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422355307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EABC431-1682-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606b23238faada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000851a71108d76eccc59728716884c486d1e8f68f46160f7d50ad00615551ecf0a000000000e80000000020000200000001dd0206d1c8fd40b84e59be276c6429a01de01524533b1a49067b2183f5a42f490000000574227f40ca1a13621009962c99a63aee74408e9707bfd0e2e7cb04852b5b9f66615efb94a8b67c63a2927d52254869999e0472519ba8eb61d115aed494e6fe0375dea1736179ef5577c3d4de6bd0cfc5bcf8e8cc4e48bee7b39e95f12f7a4e34d271eb3c786d1c6746ba2baa12a1767d6884b6fc92543a9766c00bf5784e916972f878eb5af69ed7c65f17498492f20400000008a556bb99bdc3a865ccdb41c0433fff5c0b355a84bc9f380d78b7cafff93a9bc0998e94ad6beedb667a98ecc31a150675e831b04c466be4c138be311343e54e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2476 2088 iexplore.exe 28 PID 2088 wrote to memory of 2476 2088 iexplore.exe 28 PID 2088 wrote to memory of 2476 2088 iexplore.exe 28 PID 2088 wrote to memory of 2476 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e1596d7a835621b11f5ff3092886c68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518bb9c4e3488bac376854c1c8464d6f4
SHA1a5ce0404bca3ae4e6f714d8868ceb32e42a0cba9
SHA25663389f63dfab83ccc3a40a90caa95e2860bf1c63318cce0463d7e44418918591
SHA512560e086e2d973897e03e549dacf5db4875c5357f087d4610a070759ec2bf1a19d416a330eac1bde55848f0a8b65273a9fe285681e488594f666f50041ac4ad6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e416d291ab197d8f76ef4200f49eb18
SHA1e7fc72ca03d1e5ec3e63dbd115188cc21ca570e8
SHA2569cbfb9bcc146ecbbc7c9fdd3f370963307b9b073505238fb013b180a0f897a2e
SHA512d078f10298baaa5a45b1e4ab869f04ed3d05f072f72d4bbb32721a4325286c04338d51dffb146e59781e2d0596a4f495c2f33752eed8469e1c4eff2e3ae0133d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5e7cf43871068a4644374e8db63475
SHA125d9f02338b4c760ce10fa7b6040f6e1353b7699
SHA256efed21ff91d2487986a05e221049f36f318211796ebf42ee5f10d3cfbcb226be
SHA512887a9dbc190225abf4f2e1db58aaffb3d40133dcc9ce9c0f3d6da545e2df8a23b7ea9f9063c49df0c23d58c4218bf73f3d4af50697af2a70005ec198c281c363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f512014df3845a51e262d386fe2807
SHA14f446b7e03ac4185736272eda72ff6d55c615a7a
SHA2563912ac88684dd3e977cf8c0945cb07a530d1aba6966db6c873b2c09b263f483c
SHA5123d72194849ac455b80f5c47fd0ed4056268d2d8174e65c717b7ef67a52ced039c778977b0f53906e1469703f170b2bcd6fa7432c4d0d71ceb4940030099430fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be664b40f0345755946ab9391cbd3e3
SHA1ee5727ae374c0d8b3e0133df97429407247137d0
SHA256f40ae9d2e66bbc1b2fb3c971d05b1aea2df4a396d1d3cb631a353c14983e46cf
SHA512dbab914d261b5bfc3162f2f13e81023ad9d9d596664aaa62c7e328c4da9bfc5a718b1d67b55fe5ccc5a4cac5e09eb070e238f3358f49fe224d3201fa5f6b56cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b60e69ab08d0116bdd4fc3339a4e5b26
SHA1c6cccac5fcdf2fd31afd3bf2d58a48bef3d564fb
SHA256e5f672ec8f68ee63261745e1362fd8388cd11efc7808b3c7f71c87248d2fd9e9
SHA51232644e525b16e4e9bec1f6993baf924b71425d2e5aff36f598152e8ed1f931b53252d2a68f5de74c1810cd255b0fdcd96bfcabc785c26e2bad64d9f965d90221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e45a9605090086882b13394e85cd72
SHA1bb510af994337a107ff0503cc74a0055f52de6cd
SHA25690218ac08418c90adfb5fb1bc0c30763e7a2b36961752f2014108b19a7910110
SHA512c1d0d092e6d1e2276428be584bb4ab8e21c25858e3d6e90e306b97e85100973a2f73d8cb473b01450d4f5f9aa5ddea391d223cf0a3851928c1dc4089c869d3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cedbfd4c6887e73b659c685a2552803
SHA1186bed84fd535c62634b304bf546388e5dc8430f
SHA2563a53c22737b01a1a54ef686c39bd4ce814d31e2a892adf0ee83759a9b610f0e0
SHA5122dfcc80907fd9e5b6ac4bf9a9e8502d564cc2ea53762bcfb823cb9e9e71aab428c98804b92fb99e71e5ef8a34401ba91a6743d6bdbca37b8fa57dc072d9f5dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526387ca31d7768751d02b44a7227afd7
SHA1ebd1760deda7d1abe47c51dfd40c11a238b32d65
SHA256f8a41a40172426236f640f3e88c02c96d230a7915e96dfee1bd358bbd50e6938
SHA5126ba582369f2160270b772ab7a4b94566edf895fb2e6b9e2466d8b19a28f6340ab626b1f086a5d38d660471458d93e5ba67d18796f4e06f28b856b1f422b4ad48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b7796627e72097ca4cb52038276ff2
SHA1c4892cf9d830858ff370e763fb3b88a39e4c4ecf
SHA25697dad33412821bfa68268ac23456e6b1a682cacfbffe2e14cba84274ccb5045c
SHA5127ae0e2915c76f5f819bda092ed52fd6498af1af1b043bccd8e6479fef17e67985e0c93b086c4248f14f3c0a0c59538cd5bc72fc605c6b47b1afa85a245e1bddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c10eb94a30aece454529c0faed8dd6
SHA157e5430a28b06f1d41d07aaebfb519688d49d773
SHA25635b71c6fdf2054bd83c5e7f3c7e8570474998ea9f2eca2d9c67847651c4dc6bb
SHA512325684083fdf8ddea1407da25de34d464fb45652d3275f36bf6a313b6753a93b66b802cfb86214c27266defecb560fc6508417c9302001b84c469a81391d925c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b84e77ee6bdf0eed57ba838ff06670
SHA1d232b5e2fd5d6a8951768b07aea2e2318115b2c0
SHA256cc8e469e0d094a40ac59a5078f59266bbfbde2daabbfd88737f101acd329130e
SHA512d4f16c8aa8b4b040e567eb8054cc98931d68a15ba040a680707e90fbc92d371d90fc8fef07a047ddf8af61ea540fe6f969d6f5ff85b5e32d7f529d6bfae5407f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf69a185b4de45caa51b01a27793e65
SHA100c2687a5fbe2b0cd6b1217dc7b1942959962cf9
SHA25654b7c048d8deb6228fe823f367c539677ec065fb0929e2b30bb0cbda10066d41
SHA5124c721aae9577a9bf581174aac85c730743dcaa6c79621596450663694ac3aa4117eea2ca8c17d8d903ed1666e412531907a725c9abf7fea542356dccec445c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9320e3450498227bf3fcdf793196572
SHA19a5e090a6ef8d9b9003da4dbe4cec941db57e3bc
SHA256773b785c8f4061ef2ed2863482ef7b96b5cc677f60cd843e86482a61992ef62d
SHA5121a2c8f78b9d6475aa28334a4a2aecdd9efcc01307e250ac69b8560637698426684b29c99a85a60c914094b71dd941faa46777ac670858127c602d650f5e9e9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d6b4f8eb95bde50cba96ea0ae07037
SHA1d1aac0a1c7f631547b69acad825add87190c4cdf
SHA256c002a4a3ed97d70eb5b7afd187bd4788c02913790bfafbe72a79de74bf0287e9
SHA512ef58114ff05e91ddd1ffd6c72456a69bc518ad7bbf90c1efa3af2d67b13010e4a70b456dee039fbd4548bdca5bcd4bcbb796780fa66e786a10a500b655cff3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f922092e677674bb4aa9dd735c9b6c6
SHA169cf3de9b98661401e8804ca4540cc7f110028c4
SHA256681af1875dd2ec41dc51f9ae67204b8cb570234764dddf89239feb9f2b5d1939
SHA512172f5add43c81f35c1b72ee84a4d4d0cfbbeae68090ecade0658fa00ddb3823573a03776b9c4a9635620e02e219dc5a8b1f74c7a75e20ccc4583211331ac9b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b5cfaa713bedeff7d4596e9878edf29
SHA10377ca46b40c7f5b8b740dd082456a88915145e4
SHA256aec2cb704984010b7d00cc5c2a895244b9a9e430fa7aeab5815178f7a54e4804
SHA5124cc16d5ac7f8202ec86f53d349fb62e4c041e538ac5bcc0491d7d626a89dbf1d26fb1cd386e729a6bb10c22a0b74424bf60bcc69acbf054652dd23397d55caa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc07fb815356ef0fa0f6d6be47b04490
SHA110615390a8231e2001e40ee1bba642a84c716958
SHA256ef39329a9eb6f8b1d83d4f77d11ed03e18b967d61868504d23982ebc0e1ed0ba
SHA5122dfa574255d784e85491fb702d349243d4cdd80a7c27d01dd5d5bd6aebea200c73bc61fcb069c202bda9a8a952ced72a924b3c23debe7ef6a069be67c9cc635d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837ba07ad4e6828a7ce1f6a7cfbef88e
SHA17761112e8727131d8dbdef433348e6972988b768
SHA2566dda302d25094928bef014c8647c5732f6a98aace4b16f4d0848101d78ab13aa
SHA512df4c1b5348297692940d7fbad8dd1ebc92166a407b2832a2f00cb8d17c46cbb7868a76def5465612667a02f70c7096317425bdfd51f391483d86df209c1d20d9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a