Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
71196e808a85d20d96337c495f62708a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
71196e808a85d20d96337c495f62708a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
71196e808a85d20d96337c495f62708a_JaffaCakes118.html
-
Size
12KB
-
MD5
71196e808a85d20d96337c495f62708a
-
SHA1
017a2e58d449701012abf7c3cdc9904461eeae9d
-
SHA256
ff4036bf25212745287c824aa7a011ac70e44bbec851803254e3d9d5e44758ae
-
SHA512
acc0210acfd7f3f9862b25b3bb011b220fd33d5415f37ffbf67a328da8dfe85a58bebe70b0a32047ebc50ee103a38bbf4de186d0a8da7db46ddad1db36f0147c
-
SSDEEP
192:C1HMgBEOks1QTxE6av//G/piVNpC0041YpT+x1sqdp:C1sOkjHav/O/sVfh
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704164586baeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422779738" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83DEA7F1-1A5E-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000089ad2c9eef103cd897c9bde35e3558fed5c490dd8543a14f6965e7511c576731000000000e8000000002000020000000d58b7517a3d5523587bb64553b8295875fcaa4f04cef7d644825ce11a0570e6d200000008930c69ac1fe5dc609ffc9f9ccfb453b52946b463daadba5efe8cbb9b939d67140000000e229bb675a9f27acffb2bb63c2495ce83c1699862323c2aa3f90b70177a00116cecfe68be3a857f379063b9c754df4744218d852e4686e6743bae853da0d7ec8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bd37a54bd058cabb8d34cd8705e2a8e00a2baf046988c08305fb6ff4b0599bb1000000000e800000000200002000000079b694e68cc34c334de9814d83305db58f782f8bc0650f7946cc1caa82bf578990000000e4d73b84678c8267634560f037c9462b38f3b58aa61c678cb318fc32d769f0f1dc08fb27432256fb28c42500c442e3a1e5c5b9323041dd544975848a0527fc8ffc84aae4d7655a77045a0320b39527308a00f3da0673de0491b7e616f50273c8f49b37b6cb91ecf8beb9a4a7fdc294b06a9a5bf4e6c9eca6e89e1c848fed8e9725544f7fb431284444bfdc43d16645a240000000ced7693ea7dff7d74970abac7e4e389ca0ff046db06b0ee9aa4e972478435ffd94086968381107dcf3df53edbd635c1820c238996d1031365284b4a0f185ed55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71196e808a85d20d96337c495f62708a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21022635a2a334ac5bf41bc2968f9a4
SHA107ffbb77c5ebc9f238bc6b46b940ff71afb7cc25
SHA256872aa16b8164aa5424e89adc8fe05ac1fa4ad3ad24a05e43accd5f3209495596
SHA5125cc19e1936c4d9c01c961d3d25a43b45d71622a37812ee99893b3aaffee1de331267795d55353b788131a7cb7c185b77e5c02cb30edc941ac6f2df50bfcf00fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5eb44a850a72e4fd5ff214ce9d0b6d6
SHA13a8fecfeac420d18cba5b0df3da44b6d4034a942
SHA2564882a4886a1a254d15db54c1f056bc7095d863b1e664535f4ce594c79266ace4
SHA5129f5171be850ca4c95342b5fe1cf1f24a63f048eb0992c1c78d999f9d037df0345ce177a7723f45341b42e1763e2a5e0db79b71854ea286dfcf36d92a2d685c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cf50c483fa46ae663e52ea1650e9f46
SHA1ce6bf15f697ad0a7c3bdd756b917e4d704ad2df8
SHA256f560af3674cc52b802f88e2ed78e63cac65926d617e7c288cea05ae8891638ef
SHA5120071e3e70fa89bcfee2dce04f1d766fecc2ebbf94465f742cd724879eebaa459571b4d2dedb4894749320e158f721a179b9cc7a4970a25c9cd05e5a3ab95c402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4db969540d6f31824ee25224555f2f
SHA1fc761aa5fa8c5265b485eacfde635006535ba890
SHA2565402171b0e2e5bccbd2a9146c8a99cb3fca64dd25558a8fe3f1ab259240c7bba
SHA51217222ca02156d453118b14c551f95ee72a5823d808618c46acce4679d87b7f782355d6cec0aac05ae4387924497393ba2423e9f0a751013e2b850a554677fe8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5803c30bab487c1ced44392b5eb144ea2
SHA14f727603b2a6b715c081289df0e5e5806d1b83a3
SHA2565c1e92f0cebd8b31bcfb25765703acaeab7cb17b9346c021135226af44499570
SHA512aa041317e1fece4edad6308637a8e88f7b654bdd02cbef6f7b08ed99aa9569b9a90ebe14eed02c45e70f3271e54b8165e9e89c70e40c70110d9d63f21473d164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfdd76ff6f9843a07be2ed672fca0367
SHA1e969ef2b62323c3217a12d27d87615cbf7872bea
SHA25641aefc212f4c7d9abd2bf02823cc3a1c290b6a9718199dcf237873a01f14c770
SHA51257e12591f59a80d7102dbfde146d45076b2aa4f5a4443c95b7532c7338a07d0bb775c4032debe7d3ad7898fc09f0d9a0ae265df8753c9019613ae28922292298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5dfd42a1289a5d48eeddaaddd01fbb
SHA14776e7c488af6f653a5838c80d495d1f26069a41
SHA2569b1e02d294b2245f6def06b4e598973546da1eac5a66d8d094a25a8639d245e4
SHA512a3b058dd3eda2501744965073d4c9b49b44441fef72e3e0058a7a1b86cae746e45f13306dbec121a2662c6b94b789a968c2642ca7590cd7b1cfb436939bac68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550be81a6e8180abdf86d3894ba6a020c
SHA15977edf8b82157fb418a04a5e9beae49458d66f9
SHA25629989442f4f5600e6547c8662fef092225f3cecc3a1761c1d1327ff8870acae5
SHA5126952a8270b7d5969fbb21d54e409feadbe9f0f091eaec8d4a1e39acae044152c5c0f34149898209179409d4184f44cc91ff6ecceaed368623744f3026d5465d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516bef858a80458e4d0d898453d861e4e
SHA1eb3e3f9824a788ed6da3ac7d5f77ae563be687a4
SHA25698f6a445b4a5aaa6a24ef88c148fd2430dbcfe338ec4d9d191778bd4b95695b0
SHA5124a244069ba0ac3accfbde2b651cc906ad296a640d49fd5cb8aa57f6dd4a2863e988e2f720eca146c75bb7db523b7e89a96ade7145d68dfa0710427d80064d1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548198692b168a8f2bd8eb05d39f166ee
SHA1742f4a44f6d377f662b58cb80f8cdd8e9eb50317
SHA256a4c97533553c5ffa568a590b8bf470cf796b7ed1dd8b314ef7da37c99e4b1ce4
SHA5122d9bbef82f74f203c3a517a528176bcb53cbd71edd4ed7e6230e540deb6067a45395e581a6557a66a3fdd30b068d6b9d46acf9fedcd2f08e378d71dcca5991ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53448d540e65b6e31cdc3c8cd6e1025f6
SHA158ce4bce58ef3560eb0b559cfa5758e69c5c6e42
SHA25617566cb0e79b076c638f3eeb17b2bc49477f7fdc73efb5e3f556186d32030223
SHA51260fa1c3880669489ea8b6f53f3f879e173f75153d4382ad410e34defdd8f728f0132f4cb3d5690ef349834b76eac45dbf0dac3772539638c185aabd33d65edd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d0b8ff47b2635416743766466561c4
SHA1118f07e3a59186b00676b370b6e925bd315a50d7
SHA256466caac61e36f1bf626499abae50c623799b1c82df2049f639038444da7024f0
SHA512abb3c79c3ebe5b4ddf26fb43bcbc4c85b409943e15b3ff50dc4a78421512d425d185a2041ae6fe0921d83743ae292bb713af3610ae8de1fdd24d7edb6d850b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb8e48da7edbdc55345f9c1e5e38bb9
SHA1e756856587771c4ac9cf15e9bb29d2fb488d8c54
SHA256c423178dd023dd251066ffb68a82ccee22655137add9391cac213d36799f628e
SHA512d4f82bdd1224979570baf440aba7365c08bc0fc9475f0f0b0abb949ede4ad4c590dd6cea8bb9204464b4228265f2fc5b5104bec224d604e4fb00fa31ee96d09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da4b5d4c67e90059a156b0485d2c1ae4
SHA1f7005e217379fcc58d58dc60d278a26107e33308
SHA256d3c31fa0fcb76b0c35564033dada50634c1b95b6598bf38cc2eb366183639969
SHA5121df1f3f411c55d59c4f21f59b6370252745704d484526784c15f118ba70996bbd179d25d543412e2afd1dcce13c10b8779f41c804473743c6171e077f132423d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fc466cb7a03a3d9144c108d9f433e4
SHA1d04bd71f75c78be8c5301f5e664623fbb6e113f6
SHA256c536c08ef92d20ffa31e7813eadf1e488ad8558b95f4864b97800461388bd0e3
SHA512662dcf7d3e5f1a6b4cbc5ca74b48d018ee6e302a3a7f1029f45b0609d6ac747baecdfbf8b9c7d6e7f86d7d748f3e8a79ec75004f8f18f384c58db8ea426e4fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385e0464b3629a88f7c8898f8acf65db
SHA1ac75a9788ad28caf2fb54aea218859e1f2ce111c
SHA256a7da6e5400b45967bea2673e790c5665826c3ac126e60a2fe30b32611e132c5d
SHA512f9a3e33b84c3c5f67409e61347f89fefc84af80ee19c2816fc5a5a902f3fbd7c5f53bbb303e53d727be24619864a411f7b2683b0616da775fd88519f6d82d4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526c0f4b9b05e008e89d37e8bbc8adc2f
SHA1e802a3420be14aafac761e509a37878cc3223f35
SHA256aee2c8f23f02ba806acc11dd690f12732acf2c0aab31e51852fd67e1686eef15
SHA51240972eee5ac64e9915259846bc5f8b4c475aed2091f7f8069a5a0d7dc4d939c88a9ed8c1f673d92394faf12179ef7b0cbbcb77c7ff976a35bb99862e1a331a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c95eccd1e0b72e3d1957b13e26b2da0b
SHA1feb5300488e21f86c74295742bfd868de93b6116
SHA2568491b65a7bb499de30afe0b48f98df4cab219ce2fa54ff49d39805d0074825e3
SHA5125787c71b3be839a1ee36a9f232ef49586034790865821a6d4ea2d7ba24f3dd38b390944cb91f51078d574bfb936306797aded9036d1eb8a7947bd88610ba73e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e31ef18a44612c053e3a48fdd562d9a5
SHA118726974d056bc663c2cd0e8c9e0bfe4aab1d6b2
SHA256fcea9242229cea8df25d79f71927c66094648021f61e2d7f4a38b77de67d93d8
SHA5123a71e9ec496f65469cb8f4eb54a9a21708146a7f86d9e3085ae51ac24e859f2ab2f42819c6e2d74336f1d0133caf7c9bcaddbaa570c90a95ee029aded0add23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7fbc59f9167ce2b2c70b66553274d66
SHA10cfc4fdb1f0b1a968859a22664d046ac7b33b987
SHA25642ba8fd26d9092229da1847d2be1030ad650ec074231fcc3421f659a7a9a7961
SHA51228ced5146d9110a46bc7fb77adeee4d75075bb1e12652de89d548fe8f1c435dab30c9e53ae759a40a7a15b282fc3f0fcb31dae80f9186fbd0f1cbf4014d06cca
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a