Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
032833dce1824079ccf13cc2fb6ef171_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
032833dce1824079ccf13cc2fb6ef171_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
032833dce1824079ccf13cc2fb6ef171_JaffaCakes118.html
-
Size
48KB
-
MD5
032833dce1824079ccf13cc2fb6ef171
-
SHA1
ce58b8dcb139b353a3329688c8cccaf676eb3b1d
-
SHA256
4a5e22e535309a62a62f08cbb6992cb4911d2ca8ed31287bea12f93877d1e9da
-
SHA512
296280cf8ed886f65887992994e30ea7d28d218f62935e7d04ff0ade6b2c235061065c3a3a35472e75abc772a8239acc7629fb18aa677d50a60cdb9c3f1b13f5
-
SSDEEP
1536:W+ppkEOEJRbEMtvunSADqg08KTqJUCjakyxRfodMzTR5Att5WuIVP0M:hkEOEJRbbtvuSAvuTqJ3akyxRfodMnR9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000035027a13a1af2416622bb7d320f8b72821df4c2a7815f60fad69c363e50be280000000000e8000000002000020000000f32319f5c97c9f431368bc58691f69393af223f036ef75d10e04cf43ae6a00ac200000002f928d5110f7a6d659bffc0c725a4dfac22397a10b11db666d5929bcc608056340000000141548085ef9a820c3ef76fc661df4d7893ef0066653fc7375b4da78f082e511cf3706c8c550a7f3d6137adc4384c2877bdee9701bc29d4f596bf89d1abd9a6d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80847ba69698da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000bd34f6fd606ddaedad08146d4f1dfe04aefec65947f669222b163b97da715eef000000000e8000000002000020000000bab13a93f21538ffe50b6ff392bfe47e2b8bcd2f147b1cd9ab240814cb29806190000000b574ab3b4769a32a7fda5019d9af9997db865d4395fa7cce93399843026fa3378bb39221a0961e784d30237934ccd1bb8a9e3f9538827f57bb83d5846caad22c0f356627341087c4b439a479f5079ef4c026c0da62e5d3f827c1efbe3c0f5e1c5cb09e064ee0effa77125f5631b64647640e7484a7820f0e8d1842a8b08c4ab0086e3921e7e963a57b754d444a85b06040000000663f2d4731efa95b6d3892f3da1b6f4f2b55ccc6c1cc58a37dae6f1d3c10d5967874bdc214135d0cf0af33f54e716c6b22f70a6f599bd5f5cf0f7ddbfd5b7a30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420379407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF1010F1-0489-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2852 2088 iexplore.exe 28 PID 2088 wrote to memory of 2852 2088 iexplore.exe 28 PID 2088 wrote to memory of 2852 2088 iexplore.exe 28 PID 2088 wrote to memory of 2852 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\032833dce1824079ccf13cc2fb6ef171_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0aeff12e69ef129a05e419f75a3d77d
SHA18916f6c3f3c690c07ae4b554fa2843ba4323a9bc
SHA256da100f327512c131a2cf42caf6f1353a4ad24df485d7eeb377ab1c82ac39a52f
SHA512c6e82028c82441bfca240a731f27e04a49cacc1997fc8bf917d2353d98f6a0ea5aba0b32c752cbf831e12c45f44f80f353aac81f26c728baa6b037fabe5f90e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541648d3d6eb29757738a72a515ffe6dc
SHA189f50072d95315d464c5370bce5176308d4b6b81
SHA256ad5e5635fd84062e3b6d5912f059dff2a7dcc8a37f8b5c1a78c6dbacb8332bbc
SHA5122e501fea37a39d427dbc0448db83948438d826b0b111b3a0c2ea3b24b8ec6c2fd84f5ae861d2a42cc02107b038e2046d6395d7665a6187df5ad790114dba87e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537ab86fad1bdfc4286337072ad68478
SHA1ce704e50f513349a81c03873c30a296459dd81f8
SHA2568f63d4fd88758c5b5e7e95c6e668fd62069d1e2183b9ef26b1061ac52cc598f8
SHA5127ccc2434d27f827099f23d2bb78a655a484ec0323ba78ceafc4e59a6703486dbc1e7519eeaf65fbf57b845b7ae66900c287071b7d502914117dc8ca28a14e411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae780e2547dad4a6b364918d98fa6cc
SHA151c6ef920c3caa9407593c2748942434ce3961be
SHA25669f71aad920cf791688448c9242d0f01a35c6a92cf1c32108ec921b42d0d5ddd
SHA5128ea0a82e0e46dd71eaaca660752a16dddf23b4283d0ab89b786eef9e3518aaa696d8e653d1c85a93fa10e81aa70e7b52757d87f4760ca043645b6946d7bcc169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f5aa365f7728abdd3541b7f032181e
SHA16ffb13edecb023bc55fbd40e3ea5611c0fba0f2a
SHA256ff8ac0fc04a4cb7c9e5cf2273c7e114fab22cb9862e078f2b665a148bfef55b1
SHA5125b47ced2881327ff5c06f05389d708c2b0b1754a3be3db39e63233ea32f23cfb21f87c70a3779514ca83cfcc5ac9422a6491eb0a23ee818cf98ef7b8f9cc64f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c66588cd2ad62523cb16d9dae33e76e
SHA128beac519bc7f6aa6dd8058fb0cc21a7d4380a59
SHA2567324054427ce3fb08917d36b95a237a68c08708188161f56beac96d8a2ef34ff
SHA512ed1c1c316130013f87b673d8b72d629444aa3bff12cf27d10861cb0beccc6aa18507b9b69d42c4047580266a7dde9d91cfddee3e73a11be6d911034a78f8c8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5752f22fa18d72729f60034924e27ca4a
SHA111dd6432ee8609c9fd22baf40922ce4359ae40ee
SHA256fe5ffd98c841b996a7275ea487ad12758a669b27ed3284e74ccfc892d79c6d12
SHA51207e88bd97199a9ae69b96233c58d4912f480363f99d04e3f85f479367bac6a4a86a03f4494225f38286437fe9fa9bfc18ee2831d2622a5d2a6ca2dbb9857dc37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570e07d0bd6b011adf2b3dc7ec604f55e
SHA16dd8bfd7aa1a9c2259ace8b67913c9baa12e6fe5
SHA256a67ce883b5ed72181c086af46fb2b6ae53c2d15abe2f7084110ed4e89b825c3f
SHA5129a77064e8260000de72ac0cde599731c1bda612bb2fe0c0ad913e2d0aca9bb4c836e15acb5d866d9444bf2f6eaa2ec8b679ae7ec558849bbffc795acfb8466a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4a7fab002550eaa4d543214d43b2c0
SHA115df8ed263e05f92465599d7a66c47fd8eff17db
SHA2567f5158a5c7437d550d776f8cc9ea108d58bd9cc77ae8dcc46257120ce2a8189b
SHA5122ba36da7ed1c75ce29cf30d9e028132a07d233923be7cfb104e4efce6648833088e1c6b2588b8798d7b3feb8da12e0d70e2593b00b3ad9a25deef4b91ea8ed6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52463eafb2c9b3278fa8a05d8d4facbc7
SHA145f6fc9568c2fd8b81392008ea7ec6f571cf62c3
SHA25666661638d2efcf6cba8304804f883e18aceaa5fcf95865b9581cec257f0023d5
SHA512ed4f6a98862caf8e19edee90a12cdc0402fd904643e1f875b187d9ae16df89ec003f8b73e4ff4b4a5dae6be29d82ba71c86741c91844acb72f601995944c4455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f066ef8a0b47cb07d002eeb0044258
SHA1bba809ffed52c235cb0c219ec6df2795f18d59da
SHA25649a3b4260171d1eb637955629e35082619a8ac552cee3235cf1549347e5c0dcd
SHA512166c70d3b9cd0bed1ff22cfc7fefaeac7df563d0ec9937b595f5a8b86cfec8b217ff25f9ffed601e7a2300a930e672af5c80a70de50000c373ad90120e8f9bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e03a22f41bde863195aaa6956616c579
SHA1b70000ac99b30cb0ea069633bac6c90b5061b7b5
SHA256e7fc5c390c89acb142bd77491131e1b37d26ca2a6cdd35627a142770e365a194
SHA51252316dcfb14c95890cc8d7db5fe20614cdaf17d5cb2d8434e5719fab33834726805248327f61de3421638db3572950c4c22a6cc300119b73817dfd0a662b7395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e312d37096b09daf79ab4e853fefcfb
SHA1e6a987389d3d0ac106aec2fc71471624e7cf3d20
SHA256f71a9d38dfb9b2432df34e76dcff5110af198bbc127255121b2c1bd60d60e279
SHA5125631bb854837e2d4e85b773b5ad9b177ac6aff3c1824c9e49596abd3df1c77f9d9d6f8bea7ad8c6b54b06182d5724f41536001c1cf8a7a3bfe657d19a98322c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b331e8225744a281420f31c2a8b2e251
SHA11c4581d635b2889ae769f798bda92e69b8017d2c
SHA25622d4a9892fb0444ff0224af7d7d075678622e1eb27dac733f25a28a0eb51bce5
SHA51208e8de4691e3cb0c173f7ae7426f2607e3961a22ad5586b26c852cf704aa6e5554069c63fc6965fd88ab7e862d23f969c6d26b35f01720bba2593be8c80ac635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5211eb5b659a6219b2fb84099c21f77a2
SHA1ed54cc008e9811183a81b512ca2642498f99b5cf
SHA256c92d512bb2bc8dea37c97d69f48b0e85065b41bddae94c54b22e62f5d4f2a548
SHA5122f3d4c9e8b8fc3b6009a2246e50274bea7c6532bff607ffbd631f19b3ff18b8f767a2b40b72b42435b08ba5e61b335547868b1373bbb3e04397a7ea7156bf6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a084d07f54054dd84243d1a1d2d8478c
SHA1ba297a51afd6eaae49b5f3699edff98492939d06
SHA256b342d9e0cf96264cbf6cb1cba7a207a4f95a5f414be012a1e2bf02603ba604d0
SHA512af775a28c86d73c046a92b3445a225079e2abda3036fdc5ba118b86006eabdaeab0ac4260996d6346ac6aa857e38717d1fa77a5d28963e50b4c0678393544751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e5b0c09e717bc3360c5aae55d62f73
SHA1eea1aeb975c97fe6b83c3844621273eb66d4faeb
SHA25640eeef344aad9258eb7a9dbdd39d136cf1244711b72bbdd53294e481cfcd2536
SHA512284f16ecf4047a1632c6ec20f44bd305ef4cb97adbbe014907d509d244789a6cbe6fb634e2956acbeb29613f0325cd1a4529690a946266e8013b16a845072216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e641171e177cd40f3380dad1bc9ee6f6
SHA1ca9fb196c5f32a10900524a289e3aae1b3e4ad70
SHA2561eca01b8be8143b3dd1f51a7e8e1bac41901ab5dbcafc58990f6a76c73325fb2
SHA512638e50996c310f0685400150c22bdf7fa7a9836d4dad0d0ed6ac8990af960cd46eed1357dbf19392b2d5b147c28cb96dc7148bbbe24d3aab6db4b0c9ff4b6234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50556f967039c1339d99183d39c05a251
SHA12dfe12724fdc8183a9ba93fce976f01843f51cac
SHA256b8ceaef4516ca6e556f441a157deba5a1e15edca6e6059aeee52b1927d0d1aaa
SHA512ceb0d06063fb2abbf107cc63a2219ed849f729a727c6312fa6bc94182a4cdf23869964c8b067c48ef3057649d5ccd3920d82c63e3cc4082fb1696a7a6c0c9188
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a