Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
7afc71b894b9ff8269a770d578ac1d8b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7afc71b894b9ff8269a770d578ac1d8b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
7afc71b894b9ff8269a770d578ac1d8b_JaffaCakes118.html
-
Size
69KB
-
MD5
7afc71b894b9ff8269a770d578ac1d8b
-
SHA1
a61d087963af6ad660ded3ef6ef3126633f2718e
-
SHA256
c37a9251a7fbbffcb321d0aff615e52ee48f5d8ec840c59b356430ec0ae7baa8
-
SHA512
ed46af23952765f9819f888c65aaf253e51c2f86ba428fbc4756b23be1972609f8423ec3c9612208cdad6683a5fa4b20dbbc592ccca4ee2f51c882c185f8326e
-
SSDEEP
768:JiPgcMWR3sI2PDDnd0g6sf0fmqypoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:JVNg1y+TSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423015831" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000212711d1abcc034293422995457fbfa10000000002000000000010660000000100002000000003734f37003af9e8fe198ba4a6fabbba58ac59dd0067a300625afbe1c657f28c000000000e8000000002000020000000673a21aea4ce8251387374dd83c7dd22eab9d81e830f3ff2081a66d1c55ca0ba200000008f397259969bb1aa0079683b5d52f6c172a6dea73784d7ccab6c54d15f0adbf940000000c25160948a7b541abdd9d5d3b3900ccf05cdf4372d18e8e1ddbee5f056e20d922e9f3e924cd75fce58293c4c71bf5d10746c3fc0ed4e0568b6ce0b1609c40741 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803aea0a91b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{363FAC11-1C84-11EF-9EA5-C6F68EB94A83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000212711d1abcc034293422995457fbfa1000000000200000000001066000000010000200000001a2225465d9247b170916a8c5aa8680ba0c9f24ba69e2704d8caae3f807719db000000000e8000000002000020000000193c76b57a5acee223575c069c89418d4cab417662e82a536d0663a38b5a62a0900000005ef7a29b5f43ddc5ed658fa9d59afa16fc1221c0207cfe39d363efc00d82ca10daa92a0e7b35b68508c91168a6dcee745949719a12504995f9ad3988385a66af69c88721438f286abd41ea4f48f37bc8bd4429aa966930b0d2d63f10c4875ba41816dc79cc51b4420b87dcc13845a51b33d587f1b9ea95652c6483f93b9ddf4d3f6ee4575359d324b9789aff206ca36a40000000c403842ff69ec903fce8b359f7d295b82e8c1c96e79ae47c7b448240efb44d13a2c7fa8d10b1bd60f233061197abb44bbe6b5777d5928a496694e194422a61cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2540 2744 iexplore.exe 28 PID 2744 wrote to memory of 2540 2744 iexplore.exe 28 PID 2744 wrote to memory of 2540 2744 iexplore.exe 28 PID 2744 wrote to memory of 2540 2744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7afc71b894b9ff8269a770d578ac1d8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519386340e7ce80522040e0ae94989024
SHA1962e6b83ac3f136fe6dcf7e9dfcb6453cc11a85a
SHA2563657a88ced34b4434efc8e28a20fa2f6328ecfd62a1f37ee5633371a03f31a6b
SHA512043cf5304e4b3911f3c6e8ddbf13d824d869dd0d2a46ac98ee2b07b9b0a9273c78584da6f77ce60a356650b5ed9f6590c913cd72634878db2beb5f8dc26aa709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f0901d51b983ead065d0097120dd421
SHA1de09b37dcccf6ae59366d52596502327f35819e6
SHA256345d101300e49526c20af444701d4546b3df63f29af215bae99e05ab84c68c77
SHA5121cb0c2a1f499e4f5aec1b2c78fc0a7f2af7e2c95fd646b5a38284555b66b35fbaae5c1d6e977caf1820916f85b17fc4c0de3e93112911a3210281423a428189b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e7d5083b4a85ec98ee17f0af12d6c51
SHA170cb2c9414d149e6bef0afc6d8b498cfee0b0a2f
SHA25619fd8db2847a368d95820a4d53a3aceebc78aa50b50112be7119370672fc8ab4
SHA512de7be669193f1f8430711775d354b1f59bf0317c023cbb075cbaea3814d63788a365a8e3358d07076f1ca5b09c179ed1ae8dae2d3898b8b4534fca00a575a603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bdc564ce737fc0d5ec93479e40e3580
SHA14d060522d8cc6873a7c89f5e854ea48e5167deb2
SHA256560795b256817cde39cad29e05770ec49a88157a93afabd586f3a72ec20992f6
SHA512061bedfb4955245d419f3aca54e9f6d65e076d99462a04bc0bd178dc69dcbacfa0007b5a9d8ca51c249f829b98a6a874c28dc02d50f29bcfd5e4137f1445eaa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab227aa7857b31dfbbdbc738c63e8ac2
SHA1aa0b7e09dda092c723a8d3e15597de607e01fa14
SHA256aa9b8725296a533df25e3bbeaeaab5b1f1f6ece9f58edb02c21ac5cad7907dfe
SHA5122dd45adb247fe4ad3e897cf2e9fc99242ab58ffe45cc7ab302414ca5492dcdd15d1bcc523b2b7b6fe6089669c3f7d44495733fdffd5729fc930a8d5637a98cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c5c4836e9581b36a46e3001859f355
SHA17a3497c9a1ed601621930493a135ce342efd2342
SHA256a0de04ea4aaa875860e3e9e46df57d21eed34a055e118790db8835dc64296899
SHA512a3b56c920fb34c5d7e89c26d1d324669d584f317d67015d7d5ee4aaaa9a0fb0f577bccf2f3f09fdb1abecc4e6b901b11d696c6cb77a9fb6c641a5faf92c07a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d0825a4dfe04f5099d350009b15ddb
SHA1d99bf8c3e75bdb0946a73a509644fa1542cf635a
SHA256a2a2153cf77560dd75c8ca168540a9addb2b68bc3ed52717b301215a2b17c7b2
SHA5120269a3b405ba9534571f5b90b0485c38da539fe1b984c8e6b0d1c2b6859424649ac709f99751233cd7458cdb5579c8c35891afc8ceae77021efe4ab701cce63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d47e9879d3dc1961c6ed766b7d6a5d
SHA1ea0510543a2a59dd7ed44ae0294fc57b1a830987
SHA256d03f1a01de7ff48321229b3d000a46b8290154fc83181cb405e71e7381c1b079
SHA512ad58c2108f7bb9c994bf1516365245cd8537341d53830951ad5a7cd2e4ea4a11a0cabc9e78a7ef22c599ab41be4d5d8f56369c5c40583983917bac5d00e87888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b30c3a7ec7ccf500cf1d13b9f04ae44
SHA18b04a0d1d920b635f95b2b08744e9e3b34af86a7
SHA256339adc146deedc930b8515f2e474da20e12a4735cd0e59c1c966ddd96149dd5b
SHA51260c766c1ebcbf4f30406072e47f04bb5e19706884e8108c220af0ad7d91aec0341f9bf1b96db998def547ec5a6a7e17cca9c606f52ee132fabd6448e08ea75a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57740ebca6c812f693483071318be9b37
SHA1e780c587e008a8fcf2a07421d36194eef86b9f6a
SHA2565f494dbea83ee0f863fb5c2bf05661c81a66fb59f06c3e0534613579377694dd
SHA512d475bb1ed0e57812decbfc467c241d1c3cea3fb869741941635d5593bbd5da0c59129bc9b6e5467df70874123591387f767426baa70cfa2eaec5940c69059e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ceb0891ffc6cb5df558abcc99bfd408
SHA12628af40dc2a8de201564b9fdafd600d5f34311e
SHA25617fe2e9e7c9482776a0393f53cf03299e27311431955752d7eeac73a7c25cbaa
SHA5129f359aa8a0b30ffeeee478b343f9ab3c0405ae8d06be9106dce4e35a1c6ad82633bba372b5a38ecba6564646664089c8566316054b90367a0f59d8fccd918815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b290620e8ec1392caae963e0a51e31b8
SHA1fdedd5c080492b707c65119f1ead6dd8e6c69ded
SHA25677856455988bab1c10fb6305c5c45ed1b5ca206f32f11a06a8e6ebf5c939d188
SHA512a4ed3fbe98d0cfcfa307fc98fc2d2201dc8797203410568f2bacb21caab557dc749fc6177dcda27867facc3a144cf40ad1e19cc0cf1aae7f4c4cd2ee9e797c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06fd95e832b35c1564bf84c83e87980
SHA113c50f85aca221adb561ff54c9454f002905801e
SHA256cafd891d04980e8cdebdf3f7a9cf7de153b3a705dc99e437039d3c02763587c6
SHA5122de0989b4e09477b217d148426f5da4b7df60e117b150c3abff05a5e72541c68b5a2064af8e83e9a4d95e49c087292e022ca31e5b22f1f88aa67c3683ef67773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be89abfa93924b128cca24464be9cf16
SHA1cbf1bfd50d80250e42d97437feaf067718654531
SHA25646d667716b7016d18a153d8e8b1bcc762a310f980b19952a6942962ae5e03c15
SHA51269821ec15837faaaf41998dd518b315e6e94f8d91bfa278a76ac8470351d6f9aad2d39f3aef000e10fa92524eb1ed30fcd985e188e965510f73095c6ece22f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf617be8ec4c93fbd2ea9d32c381cf2f
SHA1446c0304ebfa17ebcde3542598111ef82f4b08ef
SHA2561e89c8030787e77e8c7f513d99ad410703cdf67279dedcbb61dbddf654f23bed
SHA512e8f8f76d304ef46dd6e7a5e8b81b0a5732a2c8d64c4f6b8a06e4c7aca06c87e720e6d9d47c28cf89e5f767d34cf70966be0f4200991b6b65e434a341b60ae3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea31ceae2b9e513dcbbef372875e813
SHA1a9d705988a5e297bd3a826d475af899e1dae46f1
SHA256924c1b73bde65ec8ae4eb5769f61012939f161cf5484addc3615af946bcfa351
SHA5129bb9de014a1591318e2d7110b6acc8bf62ce1c9785cd80d76d4e0efc904d9c2d3add625fd8ebd754fb1d1ba6ac57f33570d4228ef8cad356968d081766523733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d217524c11a3818abb9c7c50dfeb2d
SHA13f8def00cedbee2067d3b652b8d89413e86a0927
SHA256a4178d7e6c9c588074d403590cab5d91ee3aea322e1ad4ec2537a3f5a2cf5973
SHA51293a1fe752dcc0172bb7c7c011e92e8f1753d19f5471bd9fdf2fbd3b5c8658f7182d1230e295f3d2e0890943c03c9681c8545572d5d0d391fb8034b93f19eaec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cedcf0b8f7ccc48a22113b27240a1e1
SHA159e18a21868377e4f7172631cbc5d01a6c6fbbf8
SHA256c8e43445d869abb68c38f2d58e54d1a3fc00741216dd4ce35ce56b83e3767fe7
SHA512d887b64f49ab5cb06ed8f37c0824710b4ec8a5252718145c96dab9832b8727572ff6e05160197c7ba9cadffacf5f4e00836c1d1461aacc77e1bad88ad6148e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef554e8d1f7e78108cd39fedf910d24
SHA1fcab9120085a5e94e0f3ec3dbcf0696e755e24ca
SHA256193ad73c299fe574d1dd7b3d98c4b5f96f42e94bb7d95d4bf10ec9f36a7cd542
SHA512af689a9d4278107487d894404f4ecaf46122e49e969b9434838581778ceb5d8464b42c5b430db28728655152d0ccba2e9568e720683562617692f33128edcd0a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a