Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html
-
Size
68KB
-
MD5
747d4e41c2d54089d3a0a98035e19a21
-
SHA1
7f8cd603ebef41f8bf6ce2bd9f397b6077387dca
-
SHA256
5da48088119db7e623881f19c0f2a77a550db9bf14f6c405a509448d8427b1a4
-
SHA512
6dd33ae9c6da61fe5f614bd5d11ac3ca875577edcf22e9a1a31d27e933d72364de076e66e0789df42aeba50898efd38073def9d71207f1f575f1054fe7de08a7
-
SSDEEP
768:JiFgcMiR3sI2PDDnX0g6WkaACrrjoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3m5Crr8TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422863904" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b4a9463603696b42bf802bcfa703397d000000000200000000001066000000010000200000003411dc255f991b629efd2bf8667ccadd7ebcde430e9f4e932bb6531c34c4c355000000000e8000000002000020000000b42380346c8f1c56db745f8dbb68aab9d1989d9be01e009d06e586890534ab1e2000000040c9218d04d683fa74adc3067f4da066665dc6400f2d2527ed29fa5cba649f66400000000b3ab59ae4cd3985e79db832cbceab2c1e03cebb3b27897a099b02fd6727b7465e8786d7f393780f4186eb84a724d19d36c84eb5a7b8ec7c0e75d0418b3b0f4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b4a9463603696b42bf802bcfa703397d00000000020000000000106600000001000020000000045a6b4a5b4e85a77951381298f74ef4d1699c96229c78581c796ea6c64f10cc000000000e800000000200002000000082ddc8026fd139ea71f7773315b5a2df5cd06d201485c6557f0e0f3c0e7b94709000000027aeb6ab6006158abe4b7d1fe67179fe462aa0897d45fc67c2b1b926d454109c5f555107342b90c3bb80a1a070edf81bee3d9f677a9930a2d66c6db2ae2e7835c4fe5b056b8e0230d9f34680e417e361334c7515fbb910450e1dee80a88a916b0f653b23a0c46797d855ee5cc479c435f1f46702a5a21531be9761efc1d89c5c7f3f27660193195cfcaf3c1eb8cacfe440000000a8739b81131f354ca4fc107139c787abb3ed2e41d7a4a6e68b8d2a727592a6ed9e85a67f809a930446c48b47358468235211963d3602f28cb05cee1b242c9984 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A19F431-1B22-11EF-9D76-F65846C0010F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02bd94e2fafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2552 2352 iexplore.exe 29 PID 2352 wrote to memory of 2552 2352 iexplore.exe 29 PID 2352 wrote to memory of 2552 2352 iexplore.exe 29 PID 2352 wrote to memory of 2552 2352 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\747d4e41c2d54089d3a0a98035e19a21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522b1a614e59e521883f34f7c813c2f9e
SHA1a6796a7914f2c33ee6dc12e8c8fb9dbcb31c5415
SHA2560a4a81122eb7362f54b9dd5da34cb32517e98fbfaab29a238d6dd3b8e4bb060e
SHA5125c32278e059ba621998d6165baaa4078ffef0b5c661c7d97db4f6daf6a6c1cd424cead103cb8e8f5084975ce01650e153854892197d261f18a758e62d48ea378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5200568017befeab0550fee8100b882ba
SHA19743d1cb1a95a311ddb8970b26c2ddcb64fb0b3c
SHA25630817b33cd4d94b7024566675409fb007095ec6cc2a1dfdbea068e3d6c11e45c
SHA51262870eb4357fe19b85a43c894e1f9154ee4fe14fa0495403f3f8a47d351ae46520782a0aec7cc5af8943b3ca767e9fe0896ce3ad45294ebcf70fcb99dabe9425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a526e07337277967026759a56507232
SHA188a5527e685e73ffbd9b2274decc5b4f68edf84d
SHA256da64043a3bf424157168aef7ac59fb2a142ca923b2fcc34e9521425a33c4b50d
SHA5123e6c8db95df23e60956374c335a75997c38e1a8f13f0d7822b83126136dd2834e3e2a937990171794acbf8a35e93e9916d3ffc5a906a8537edcf0f22ee2427d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e7ae27b592003237f3def9c3b90fb9
SHA11a9240e83744068bac7969706fe650aaac484ae2
SHA2563fdb4caf4071fb11f5014f250dfc8bf466f9ab0b30e9f8d60b9f19efb79d8db8
SHA5127ad25655e27cbcb87ed4166994108305e32d9ed65cbdf5df826c25cbcdf5c9dfea1cf4c5139e8412363ae64df732a0f2edd8465c8f5272cd38c1915e4f09c9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d896314d93e5fc842745de7b461ba41c
SHA121710c0bfe866d3da14885d83f1bbcf5c012e9ad
SHA256dc4a68011c8b76000b8d288c4b9be0303d97e3b389c41dad1cb034ba3c435744
SHA5123995f68913f73b1f7ca84577d6c04412827272e19e4ebeb0b0fd7890d130bdc60f2a24fe77260ff1f80f4c70f5ee85054c2f7d27210457b26b6ecf716c3ce450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d0d74a8840571e2c2e2fa001307f092
SHA1df836ee8e94a57343021ceb040fce12538c60f35
SHA256c7810dff2edf292b8c1809ceb5cb1e3a58315d015ae5dad9e86c56e3f7a68169
SHA512255f92dbf2d415f8be0a8b60da80bb777529d968d5578b20560a6e06b4896fc02ba320adf1b864bfe9e112f6ec797074f24fde745f52329475af9dd1b8eec82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d4cef920fc9e2e53be8d6e12686448
SHA1e021b4bef4b8af5227d99d69e15903efb7d70e10
SHA25640cfd5d7f5881ebf062551e63b581f6afdfd7e75826476b87446a2cd60a83a55
SHA5126f9fea6553df6bfe9b6659ecdd5d399d4229433936173c0fd99242911d8294d5732dc764428bc7b8b36deb69d6d7bc1bd8521e103e73dfcec818453f3cbc9383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af190404b0b4648e73b0387cd154b25
SHA1170d40f12806881afda676cdd6b0c99dabe23e90
SHA2561c9a0cf2cb8d9a6fcbb632357a22ac380e8c7c2d57da289549c9f9c812ac1e66
SHA512b8a34a195b03cbf8e7d07273366447d92a70de0f0018e2c0283327d45b948c01067cc49de29d08327ceaf96d262beea5be81a327f0ae6de82987a75d5362f9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb8f60ca206c640e8868f58ae402ece
SHA1113af6c8facd8c169b235c3db0e0d2300f0322b7
SHA256c88cee1e604b8db8eaca7ddcf1e68c4dc40bc3d57d705afcc5c6cb1280ca4927
SHA51205cdfeaf1e5b3d8af62293d1b9596225eeec51db8c1883bdd88a4a87c73837894b6d77bc03cdc83f3a43cdb005aeece5aa77d48bdbdc12782069481d76671f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aedd5b209f900815f7764cce33447d6
SHA1a296756904deb991334d3e1ca5c407e5c34e19aa
SHA256d283cbed599fb8eff46e319ef9b57364f67e621b8e6714529afeaf3a523009a9
SHA512e69d06655d259896146c8312e7ed832dc713d19bf18a555b19d5a3388c19454e5caa5dc44bf0865132098b63994024dba5ad432622083b961b7bc3073124e9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e723dc620367b11ca4c67c5e134c987
SHA1f22b7536856db38edb717e09ce7d23a43f7d13ea
SHA2562640fae37eb070727e6012bb860acdc7c1c1dc9b98204dbfd8a0faeec1f55fa3
SHA512ad18b85013ec1796723e661aac53f94a344da592f69718cb6bda835d9b4599aaf330d5e1137e67a92d90501d025303b6908e2007653ec9567741c5353f12c20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08f2fd0f748de8cc7e75e11ba2d131e
SHA141c159646c7d6589127cf9c759c7f4d2959b047f
SHA256e9dab7899372ebe40f84abce2e24da92604ba238f3eec93f75428eddf18f41bc
SHA51239e12e80abfd61949a6b75f0de1c30c68a1649513c77c666f16c5a0b5964f0b0c30d022f3e7d8defd5743846e57f914797d6b88a7f17801450778c4f5731f7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622021a434e67481135487bde393b048
SHA17a2351770778486a6ffd221b3d256672053c3d00
SHA25681d15e99753f7aa1e302370aaf146174874f5c449b635e4e2ef8cf4fb47d5d4e
SHA5126669fb2aa3dd4e8faa5c39aeb29847e42191ea6af8b695f72b28d68fc04002ea2d2f95139706dbddfc5f70c1d4004804a144e837d282799a090e573cff37694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a3a80e22de5707122ea0ae74a5abf5
SHA1f562fd84ea6b70157ccaddc2d2e988ff4f96f164
SHA25641af9ac3f31fa2e0bbd592f464bdbb24423310e529fd1380f222abf5a6eae4e4
SHA512a981976b0be8c0da14fdca55b040fb64d1ba883101384b847d7bba2d7fa26af1497b7045cea7b17f6541b354dc6cf83c5a56bbd427eb483845ebd1bc28178a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0dc3e19e3e19236e8a7ac5651eb10b5
SHA13774763e58a85c02296aa4c8c79c6e7d3b639d85
SHA2569ad9d8ff16e7c7bd8360d8b28de3ed17b51661bf1094a71e2fb8f241f6c77b54
SHA5126c285856be053d6f420a81f5bee69e0e01dec2254c8ee4e3877c3a4ffe43b55e01d6b765171747df23691b0580f3c938a8b75b9471e6c47e140daba25bba5774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f64ef8bcd7fadeb609b1147520da334
SHA1c078f5d2825931c19ad6e41bd583b73318cca328
SHA25699bfc1cb2873e64019615b0e1d94fcb8d2c2213bc160f4fc9807950605ab554a
SHA512d91fff6ee21a56152aa86898c2706b900706338201e5d84133f3b9caf92d6af5e1aecfb2b5c706858a20bc51c547f296bdcf49c8e9b509f1e668ec9f676be042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bb23b8bfa7a29d94d4442e69449123c
SHA13189900b04912532005824dc9382fd74a35eb676
SHA2563d0a96efe286de32042933a94b74e3f5fe0e18e95925d48931db2b0cc74a9e21
SHA512443aa2e6d3eb234d6ca9fc5024d0eadfc53c834d01546c7fd531cb8385169a371bd81e34b545e6c1dab84491884c98beed5ea6c04c54ace531b309d3979a19de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fb26b20fe6892f5618eb465a3b75414
SHA1b4a77a6321bb8ad1ff86d30845be958cce7d471a
SHA256081c958ba0e39959e7920856236399bb76232fe8567172488ebd5207d5351771
SHA5121777714333f7e2e8d6439157aded16b241131cf5f184efa7009f4af1f2f913e7ef363381c4f7ddb8439b557724b5194a7b66f870d8b355e9a3aef39ce4c434e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560363c01cfe458e0b1285fa8e6b47700
SHA145d4bd282d17b09ec7c5cb8a53d6eff1d4d0541f
SHA25693829051d89625f25d46641ba26b24f00d1afaed7be98153b2e2ec80b679615a
SHA512ed72f06a32e9dc915458bc0f15325ed6a8fe2286784fed35730e2d25e3de7a60a91005815a887441bf04a3edebbe32e37e74f96a8aeb792200a24dcde2c9bbe8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a