Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
6c6d2fed550c6b2f977af47bad076baa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6c6d2fed550c6b2f977af47bad076baa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c6d2fed550c6b2f977af47bad076baa_JaffaCakes118.html
-
Size
3KB
-
MD5
6c6d2fed550c6b2f977af47bad076baa
-
SHA1
0cc59e07402f1e00eb8ee715be7c9e0ede0eedf9
-
SHA256
b94990cc9bcd8d3548090e18f57bddc889ab488c1064a41134e13506c6d919eb
-
SHA512
675dba001f5ed1f8b78312e5182bd898b92432a1717e360313cfd0e2bb4a3ce1e7f83ab827c758d8d4a3734cd15438caea66784f62f5f0c83e4572b52d4b26e8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005187dc33f7fe23abb57afb6c5d21f70c06fa70dc514c36c62690b53b42edce45000000000e8000000002000020000000f8875d853e3a61c6d8d2a28c5092979b0c9075b97b2c74b9b27bc3175117d331200000005af72bada3d4a3ca8eccc3cfd745a3e965c4f54a077c0891773de1b9f6ffdcb9400000003935dd7bbdeb743e4b2beb9585faebdbf13ebcd48a6e6354a3c07555fed54cc9f243293fd87b50621904540f2efd064ac3a1ce935a2663705c34343af258832e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005388a67965e3d15cdf36459229ba234b0a0d5a2ba424d6741cf00e613b42b86d000000000e80000000020000200000009a56858311e11accf9ddd29348279933f0fd6a611365c01d3ffda8bf675b52bd90000000e486f48ee0bb0e6e7b7d4b76c3cb5493955a95682f720da320ff67868f9020664a8f69389ea5d8bef9becb226c779e825e7aaf90755bef3580feaf084daaf7e0811509b69f719a1fd568fcadf4189632323d7cc86516441256498f89760ffb3c5b4b8102adddcfd08ed9baa1eb2618467f3478688f08b6e954093727fa9068b60d87b7117cf4a2ee09079b392f0e675b400000008b6da1cf1adc9e6e17420a4c363b3d22410083ba255bcf7646184fa6e2995445c46194ab58b0fff3dd15a32f196f1de38fbb0ebdf21bb483655d53e92936fb89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422664315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C66DE941-1951-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cf0c9b5eadda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3052 3016 iexplore.exe 28 PID 3016 wrote to memory of 3052 3016 iexplore.exe 28 PID 3016 wrote to memory of 3052 3016 iexplore.exe 28 PID 3016 wrote to memory of 3052 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c6d2fed550c6b2f977af47bad076baa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e73a7b531be9d71a6c9a897f9b6eaf0e
SHA16ac3ba27b6712f60607fd0b0a0a68f0148c758a7
SHA256511b3a3bfa4bcf218b5884b8d23fc43482a6b1e405f4d3b035280da30461b9bd
SHA5125f6658de26d6c666de8af585fa25df4f9ced6b39e610e562426d746f9f4bbeec772b7431f2fb272a8e40948332d1412a2d2af474312150ae2c1cb492dd621761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecbd6a102f9a5362069ffeb42a19ebe8
SHA1e237a667f231d21a237e7f07205c35286629be7e
SHA25652102b39319c15de4fd2e2c4e125c964d99c41c3db5d1c0d3f54f6fdb948d158
SHA51244c5dbc38954bd0ab283f843f7421e96e727c9104438304820abbf239e396647758bc2d13304612d8b5a130b6621cb4cfd5c177c72eab2e7272c7fbee7b47f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b16cc1f53636567ec77b8c317bf91d9
SHA14726fbf5284ebc9debd5bb5e3afd6d13f7cd478f
SHA256461ce21c3cf491db995c96ab430fc20464d7f6c01c78b1515005af3956884b7b
SHA5128ecf65a5af15a1095dcddb79306517f2d8d815979103aa7a473d93f1f54918ce9ca1a4992c5b797dc62bd1df267fc3391c8c3f94ea1766f0496256fbee4e6e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb85737872007f3001212fed57999dbb
SHA1c1a2fc83d94bf8fdae0766312fb12cf9fc92bd8a
SHA25669dee80e250275833e4132cfddbfe750ccb41958579dae18ec0ecec2841ee128
SHA512b383a4da27888e29e6948daab71978e732057aefee07d80d8756f8bbd1b589ac1feeedaee075a0d59baeda7cdcaf0edb8fd7ea64d22a0e51246fedaa60022a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5147cc43fa5c1c7d89c5117e395bec37c
SHA1fe6a2c8400b5f917888cfbb4c6bdac1ca9cea178
SHA2560a37e849af2916e20383168b0cbb01fad8c7f8bfc9ea638e0cd297547523c20e
SHA512071a0b1cc8e33da86af2695afb279be3373a98c7c38c914b22503c39db87e666e80aaf8392991338b904bed35ac29f43845155401c9a273764e122983ee8ed56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3da06d751255f6d50a81ba483923b2d
SHA12a1ee532b50d20b450a18b151f2773ec8ae43e5b
SHA2565adfcfe1277554987d0d24b00794539d3e43ca603dfdbb5c23ed45d5f4aa7e51
SHA512154e5ae791030d70fcad701493ac9c94026e5611b8e198bed664fcb2338a5c36c5f858e8b1a2d7a348b8749809741c9562c04cad68fca7b7e6998aaff56d8827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa591c25f8bc2a32f7aa103d170cf70
SHA125700a14924c03ec50f6cc34ebd72a3d1f37d222
SHA25664f21ccb3aefa63b30445f66a6a795524e45c41214680fbf779dafb278099789
SHA512203d5c214841d260460eae1c17dab76b3eadad326dfa8065acf800650802155b1a5fd9c3c90720126c38ca2e515ec77823180e02a4953371107eb3782b4c94f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e515061d208eacdcf51dcccc0e9a6bd6
SHA12127e174e964573667503873700e3fe882fd7d39
SHA256395ab8f13deb9f4925af148510d25a556233773e83d3ed7ce484f6b22d99da6b
SHA5122827d3dd07c5b07bf34c394b5fc527b569d17daefd8a0a846fd1582b9c146a527f9488c1d9c12d9720f44b30c898b8be045b6a27c8edf0317f290edf0531fe5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9f05ca6d902e64824707bff37c577ee
SHA19a75b5d9a84234e1fcd8e3937c6b9f132515b9d8
SHA25601cf4d881956b8e01fd78727422c43e79f0f50122fb85a6148b7451dcba67bd7
SHA5121bacd9f67d965c1363d97eaa625bb2ed22f3d26fe07ac27ed6bef73b437952f7aa7c3c35178ae3a7e666f33a89c8af6d0ec76aede1f16a934ed03713897d2945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ccf8e712dad0b55cb2028420e4072c3
SHA1da695af1ade3a533ae2c36d056e763f78bba3b01
SHA256b661530b531cbfdefa10f711d6fc5c504f74b78f8cc3b1e1cb2779785578dff6
SHA5127bc90fc141121782aa4c09e9391a452a4bfba0e124096f1ca2859755cb9ff9a4fffe6bae5f4d454a8ed54899fb65556ba19e8b832451445e44beec88bc5e2e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b898603f82d71bd974a3f7d93c23df
SHA157ce168a5d9f722f458a916ede2cdee72ac9b8e6
SHA25654173ee383b96634327f0aa7bfb91fb5640eebea24f88d57f067b0dcc8ef27ab
SHA512103f0a7dcffc4b5d7b1b108fbe1093cb6da60c45d0543980e5aaa5df49a7354dd9769a76f933e3cbbe06ae84a1f574026fdd0fa9ab501919291e494c93206d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d0abed119f942b6187a36dafbefe7eb
SHA1de0bd44add805c18d21074c68890eae8dd68d9b0
SHA256a62ae0a3162114baf745b7ed4b9f8be7807f292d69ca86207b277681718ce4c9
SHA512610c1e01e31e60b965e46357b7af9e66c2b84804d8a14a765723143b1316d406437ef896588ef9fcd1e4598f800bb64048c61ad54d5bf46b0672d26894840294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1d299a5ac62732e38885095804132e
SHA1104705fa20ff3228346a161a2e96e847316ba11b
SHA256ac342b2a447a8f6da5d68172f5ca765b432b764963caf449a6beabec1553024a
SHA512650deab252ca09bc5e77ddaa0311af70497e3ed0b3786a75e3f61f95a92d37b98d3900c206a99a61b50e93c97636c9420743105e00b4fee0288f4f2de2511479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837b9b96f7133363e2cad2f31b56be74
SHA1c4f82599177c5ae45dd5ec5dd0792c4cbcaeb5c0
SHA256a447cd83a7ed01e4d601aae8b1dcaedf0f0ca061b26488854bf36ff1c4810c50
SHA512f2ec8f630556b3f8c805619aecec3c5881895891c880ec3f35002fc6ddab355725562577b9d673e5b2fded4c2e3814f06005c3e5d737ac87dc847b66f49e42f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548bc9858f903d405d4d9f1966d1b60e
SHA148e1d7b459c727af20d0084c314c2e490680d616
SHA256f9107bf082af37c256c789c376fb4bb68f6cf6c133ecbd02d4ac3579631a1739
SHA5124866c15aaac1e30cf325374d2fe43702b189180c3ff8206127d2119b9480be8865206b14d79209a1198bb4816da8b37b0e69722fdf7f752e3301d9561209d47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c664044676545e0fb756d6d22adba4
SHA15ed2b2fda2fec9e3fc846a380655e0355440bf74
SHA25633c1b414e9a852d1a97c88b896545cd0337e038c888846956c9d4db62fb33e34
SHA512619805fab5f940594d3a10d9a655dd9f6fb15bff4787cfd24f97adeb304b7639cbf10fd2f63543660a547d6495f7f2eb1cfcb8e8eaab4c8692175a509223c0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9b265be879fccedece18c0e4e307b7
SHA1c64593901208e849b451cee5a2b7ab6e496964d5
SHA2569db943063a7b38ec57bb4eecc128526cda9696d9cb2d95760eaa4902e2a8cc0f
SHA5120aa6d0500d2382e9816cb0601a27bcdf56660a043588d6b7bbba11562cabcd155ef3ac1564688ab5f5bb6239fac5fc6702891b1facd02ec0f8453cc5d521536b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eed2b8f23441e3906825cb3f62badfd
SHA1c5b3f856d1ad74917874bf5cf2281b2d72febd58
SHA25687c0e7857ea8d99c311b4efdcb01664d8ee746dfb7c0c9577db09e88ed824127
SHA512b2ce409eb134688c56a2ffb20abca5f1d5f4888bf06cfb976da990e5d765d592983718ffdc020bad6af2c274fbf076400ade30e67b8feda854d37e0edc14165b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f64f676720b833970e6e8f6f6a86abaf
SHA1fcf14e99b3c4e7d3cb24fb2df217580debb1d6fd
SHA2567f5c0dc25ac27236c63a1aa7a69a3104fc2d146ffaaa7225bfd5995628e5b7b0
SHA5124d1d74ab79595ef4c59775137f1efe6ff9fa2cbb40421fa7274ba3ffe0d7191a73a5bab34ccd95be29110a5265f22ab7adcfb16ce862092e330c93b04db158e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ec2c91e8d810b309e0710a8525bdd3e
SHA1266d414d384e6812ae9f9ef93954685acabcb08f
SHA25670b90464f7e6678d48fa77d26fc0d1eb4166c0303f7bd54a71b49be25c49c432
SHA5127f8c04e5ae6fbe8097e4e67a4962c9cae3258612dca2b19a7a09b8ce86e1c1a73dc3046635e4e74bf9b9edd2ba61a71050608b91f7298002132b363180dd384f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a