Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
60d92aa9679b68bac6015645b3af451b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60d92aa9679b68bac6015645b3af451b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60d92aa9679b68bac6015645b3af451b_JaffaCakes118.html
-
Size
460KB
-
MD5
60d92aa9679b68bac6015645b3af451b
-
SHA1
bd0c1ea4483354df789cdb68e51eb5574075dd58
-
SHA256
d794937acfcfb92fad17ff8639ef525210378367e053c8edae5fa54c6ae5d330
-
SHA512
19795abf6e2a6d67d30b13dc494675c730502fdc1b01f2c1382ca6ab4840cca017af27ea2dd8454c150eac01d0d30636c7fde63cb8daa0a77d99b903ac86eea5
-
SSDEEP
6144:SCsMYod+X3oI+YqsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3m5d+X3S5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f2dfccfed87ffc0b3b6396c99c5435fd28870cc45e2e1a177801e1a95eb3a6f9000000000e800000000200002000000094a0ce6fdc6c3fc4d6dd198a107de6100be9a32453cc3cfceb717666f0c976f7200000006fad9ddf9b05965c671b96857ac77ffaf94aba83cd26b1397874ec666a4d192b40000000cc830265ef4f08d5aa55ca837d2e35c2749aa99447e1d38eb77e34715d03cb60e3a7faaf4518f9ebab68c3dac9b87f2d2c2e1e6f652dca8e7523b1f117364217 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422398567" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f5c4e0f3aada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000038e4ead5ccd61913133a591ea26aaed1f4b265fca7e39e73947d9f7f6ed4d44a000000000e8000000002000020000000504b018050c1ad165a74a26c3d6fb92b5c18f6c00c0ab6a753aa891100a2879790000000951ece5f6af1671af3ab2fffb1f537327dd4ecdf1e457e816ff45d5df707d440e806440004bcb60348ac9db1dbe019a0168d7f67710ad53babb1b11b0dab4c3d921eab0b3bd578709ebc499a19fe356744c2370fd1f0df7b86ac57a94f6848c4c979788dadfa28f9e0fc5f4b0bb0e53e9e5a354a35fe17df1c3c2d25ad9f58799e105217bd6189bddb5ed5942c5cd239400000007771e9466be6194878e38480dfe7d09cc0f9d6eb349429d9e3737ab3c0a05bda94df5d2e2cd42e811f11f7aa987855dfffa17ad04c113626638e0c919d206bc1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{083F6EB1-16E7-11EF-9E38-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2068 2164 iexplore.exe 28 PID 2164 wrote to memory of 2068 2164 iexplore.exe 28 PID 2164 wrote to memory of 2068 2164 iexplore.exe 28 PID 2164 wrote to memory of 2068 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60d92aa9679b68bac6015645b3af451b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5807562da69dbaf4583aec59cebda4ae5
SHA1bf0b8a9a1c0f0c732937f341f1489d2119b6d8f1
SHA2561c477f7d084651f6b3f6153e293df5be804ec62728c3c20aaa413d1d05615535
SHA5122b7562da83364508ab4db2de3369be619824da1fa2c1baf976495cb263d129a5a6888348beeb0928fb9e5f1bdd1e756da4bf10e02268c59f2ae858cf44e34475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df39a8ac8724a2be1200329f2e61c3c
SHA1a90d79a4b919628b0198d5013e3a8e0faa86d844
SHA256cee0a41223e103769565b69c986e2d8dd6ccde1da785efdd63e83bc84909ef71
SHA5126bbc667fa7f770af6a961fadde7acef49f1d802f21fd445b2a76e74c5539a4f7c734bf55aba9687a60d8ed6787da7096d3ad179d0b811600dd8a171fad2d690a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8f3f5d578fd39991e81acac8a71815e
SHA13c48a5569e2a6bca22d4fc4e40a80c14ffc4d59e
SHA256575069fbbc502f9759bb29e67c116f20c183a7bb359473cf4581cc47a23edda9
SHA5128fc62adfdfbd198a329897dea7f6aabea213533f0eb3a3f292a5f5d0eb1403b73e87b5a0df424f8a481c185007a061c3ae98108ed7ac977b0d72f712909769a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c118133e3e5e19312945f795c799132
SHA1053d98a2ce292a77087cb2e85d8a6efa4937e5ca
SHA2563f4393297b012488f1aa8d0daab0ba22660e6bd462575d9411b6013300859d17
SHA512d7aa515d5b293e43f6292ec5184baec94b859945c1510a852c1c1f1ccda7a29726403284a0a4fe019df237b979a3473f46d940cbed80623719cbf92a10b477a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594fad71a0e54ba46553df93375e6d50
SHA13fea030b0fc11cc9e5cbe773fe027ec493fc4c28
SHA25674fe428e72116873ce0d5daf8dbe0eefeabf974333bd6db2577ad698f0ffb6b6
SHA512f7ca42a5b69497a82ed4213a9fc35203bf2143f4c506839d00c66da1d1e103cd162a94a5ece29cd15208e5305e31991e8648c083f206d04b6100c81a4500de75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef7335e862cd60e35f75823632e472e
SHA1976e4101d886ad636e7cb6a1e87eb3c9a7ce50e5
SHA256e14fc07bf1b78898acb080cfba334b9aa5d33f19220a1f04de1d42ca51a39c8e
SHA5129caf91e35d5aa3954a4cc896340ce624ca72ae7b3499dda0d0877cd3c64743472ff7523de06fa30258baf320a5f354c07346afdee083b38336a302aad67a537b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f340486b565202402815cbac93638b1d
SHA10480872092fb20457a8261012dc0e88385b85f2e
SHA256ca8f2aad1119e6f5ce31a4679c79942c7564fa44b9b4691334874f76cd5e013f
SHA5120b1c6488978811951fc3730a2f7c2cdbc8c1161c24dc070ea3ab85b56cd817158b4ebb7637f8667ee54431a9a80fff3982bb142b440ed3cf99263c09397537aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55603bac2b1c1b7ea65ade4163a2b9c99
SHA12cafb0e03f679cfb24a5829c1fd6afa3a8cde470
SHA2561df55a41231cfb9fc62d5398469edd96714ee93823c11a3ad435b15c424e6728
SHA5120cfd0cec3c43fdb7da40b3b82b2436f0cf163324cd7dc9b79baa6e0848318a135c498d181a8fd606ba948f6221fb0faa60d7e360c4e698b320deb601d425da7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33f3963e7120b947aca946b519ef3c4
SHA1042c6b4ca7e3d7e52de50f30276dca711c01d810
SHA256faf9d3575c22d139509925e1c8275951d90058f3f03d22a03f8b826f24cda682
SHA51200dacf61b96a1ce77c0cafe637ff3aa648e211f433054825a95050afed96ae3a274be3c9d5d859c67c0a267728437e63ec4ee6e0f81c70466db0af4800f9e4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0b7d9eee91ebdc00580f3397d6b2d14
SHA1bb9655ca83d5a94187873e1ec5c24a48a4a550d2
SHA25691ef78e752702aef17a3691651efa9da3b84f015c61973440e113a9ed1a1fc16
SHA51213bbf7f51bba4115ccaedfe99d1372f751dd52e3245cadff463e9a1306590899fa91cf07f589461e9bb859d11a81a00b58c3e7ccf740caa27ec43bf68ef5089a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bc0b2382c05390676ea24e4453e154
SHA10aeef1da4b25186382a3bfe19ab07d8481b5e2d2
SHA2567fedccc4bc25bfb35a3b25d2bfe348c365d0ff22437d9989671793a79a6720c5
SHA5121dedbc7a7e5a9aa0ea5371d3a0f177b9a46b2ba91f65009cf1c85f8f3c24c0228ba201d32e6eeb7f108dc5a50b32d9256fc745a16638871fdca52793402bc7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde512cf23046cbcc768ede888a784f7
SHA103803d646c77d911df33cb6f5ce4d4d90c9271a0
SHA25601a273572bafecedd216bc439ec9a45c734372f2fe8cc14ae78b19f28fdbb8ca
SHA512d63e5bab29738b9911316a53f6b01b28f2c96697135d784142701f10722807e51cf43c93d6d5c22903cbe1046514284a17e25cb3a5c17daef5b9585dcfc0010f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ea9cb935beeb076eba533c6bfda659
SHA1fcb1ce1f0622fa989e421a9d9e7a2cc1a779cbf4
SHA256e05e935e73759650f580004fdcd35c4b9f43034f829a8c07b6830c207e1eb611
SHA512350c703542dd9564cff5b878b3d16af196665ba9fc69ac3332a489e5ef7ae6cbd283837ff742a69db8d8aa279685cb547ff11ff093508528f7c25c5296f1aff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b4bdb0caad904b6e02db6795c9d85f5
SHA1b44262b74b3f89cb7b489bb629760958a430e27c
SHA256e6fd9ee59fa116ea5c959708165aca1013daee929fb5a05042bb7b0a6968c3bf
SHA5121ae0081277327a0f09446585384c197295275dfbc77d048a1d38f837fbed240601a7dc742f2605b6b793dedf94de4079cd7bc791f92bf4776becda7654d4ac0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541967813b813632b76d928a5ef4f93d3
SHA1d0a4042229296e39e11b6c63bce9947de4edb2dc
SHA2565ce6df94d1f538f41dad83bb94c2babc0c4be973794416dd85dd11a753f21daa
SHA512e83ee89c9cab83f9c81a787204e46c164a3135ce2a9a8b9990ccbb45842e0b957639a681e1b0b0377316eacc70a1687100c4ca76df0c890a6e31a24727feb980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e9e975161d64e147fd8bd8bd95d00e
SHA1bf12b93a072dc0b7e18338c8cb4efe097d7d4844
SHA25632a0bb374959ee1e64116be77db19bc0a19c12bc4afcc043535b4fbecb3f311f
SHA512275c22cba5b121eefbb9ed8f7c6da92b1f8344fca02f34a167f5ed97904da0896e78f6825792e16c34787ada1da36bb6c9ef0aa74dd37236bf82a0bf0e01a0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533be7ab68a48d1dce2d45eaca02fc086
SHA1fc5caab091a814508fbdd4a306079b3ff2199d06
SHA2569bac8c3c26d4ce7b7c6890243e61606611a3b82a561dd60c51f866bd8a0e80e1
SHA512091cdd5ac83ebf48d53f591a1729f29208784c066f586fb4fec10e8f7a2c848426d455c3ede0a1faf87d92231b77907b91b0f7efd679c3b11cdd74eab4a2b7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ca145260d873927481fd922f66c6b9
SHA1b7e1699e05ccaba55084ece8c6ba70693bdb5ae6
SHA2564fb9675852ed1c7614615acd2051fbfdf94b57c8af463b729132f0baebbefbfa
SHA51228d9ca363a1bc5b5208895a6484070f80b58f5bf66c512d9f21b87d24e30b24353e30fe17b8aed37c1b06170a26dcf553cdd3a5a84ef152c0957108a5ee7ce8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54109415c86d9d612a808df89f12bc811
SHA16417b4135ca2da4ad24e76d8fb40b442e2a82772
SHA25608821fbb5002973f755836cf2612d3aea6b016f2715363d0826443a2e1ef0cbe
SHA512da117e0d181387a905863b4974d7e0bdc6c23808f32b93a0c7d1bb8c7aa500f3e37fe1544455d94a6cb4f6ec4e9730deaa790564ffcdba5cf22fe21dadee6643
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a