Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/05/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
1eb54227f8b8a4a259664943d211b2d5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1eb54227f8b8a4a259664943d211b2d5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1eb54227f8b8a4a259664943d211b2d5_JaffaCakes118.html
-
Size
12KB
-
MD5
1eb54227f8b8a4a259664943d211b2d5
-
SHA1
c98425be6675469c0c92ef969317d7c4a6878fc4
-
SHA256
6099cd79798fcb603fc033978d4df51de4a9b96e43b07c824563969bf0740626
-
SHA512
7460bbed278f5a234ab74f36d3310e697b15983ff1cc5c25dd1891dad58ff0712c11ca4ec1b186edae33ab29b588679f88a9ac0bd63136ee098f48cef9542fb7
-
SSDEEP
192:SIHaepCrvvcG3LH9T4nu6MEndDAx3wSTKEaL1Z:SIHx8H3L2nu6MEndDsbTKB1Z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000007db51512db8b7add57ab871113dccccd5f898d3c13a45c8d7ca5f83b2ba28691000000000e80000000020000200000003b4f77800af1d696e7502117acc6683e27c4ebb561e52b778d15358053a84bca2000000086b5e1327ea0cc7cd1896051dd3abb5f91505d0d8a87727faaa00f6e3b3346dc40000000d7d70b4474a06d670e889a2a555e67d13dd2cc68b7a6c9e8fe64845a8cf370b949fc9354920f4c2989b92f47b9365a03a67d3afe69c6c838dabf3f5de3822084 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1ED3A471-0C01-11EF-9DC0-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d95cf60da0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000fd2b6db9063c5a86a32eb3fc0a2887447d517e654919e1cae071ed2d2174da36000000000e8000000002000020000000f6231586024186b1771861751541648f8fa2862f27ecda0a6c783cebec3ece0990000000a84d39fc0d932c0dc40d2d9b98ef8024a5603cbacb4d2178ea27b22f4a778ad823c8c4ead270f642da1c44a57f7c531958e3aea44c6d6fd17857e3b4889123f2793fef7d8a308f47a066abc9564d72a2d3c3e53d2ff43399ccfe26200c6b303e893caa13d3c0a5c84189e78fa4b60c23e4e564bef9640eddcc0fff42296ea4db685d1f932828e6590f7b49fed52e88014000000061821dd6a9fd1f8a46237151992afe2ba2d794eccee0fdb8ad61bdf586d0ae9de6f74fb5ba202d4da35d561ad53b51078b780ab59c4187c6b6b15dfb84094802 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421200310" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2380 2196 iexplore.exe 28 PID 2196 wrote to memory of 2380 2196 iexplore.exe 28 PID 2196 wrote to memory of 2380 2196 iexplore.exe 28 PID 2196 wrote to memory of 2380 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1eb54227f8b8a4a259664943d211b2d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509bada8a03b280e4f0297e98b689c71f
SHA181e2fa8a4e05143908d646181162089ee8b79be8
SHA25699cd84e9b88bd822855415bd1f955ffeb6b177c463639ee43444a55b3368d7d9
SHA512a135420253f913329b6dd26c21f149730804fc216923b87fc6e6d081ef05e9ab0cef12cabddcffdcb0fdaa2b240c3dd3f51d2fba36195fe1b6c285da1966fc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ffcdfaf25948e3674620b65f836898d
SHA14327e73f4d34744b69b649b343a64d13f717c1d5
SHA25647ca40a364d1fd13119f965f99e2d5408309f6262fb8136b70674d220dc85457
SHA512c9d3cf766d66346a7f85d1d57a676c3f311dfee8e0de79bb9d393e34748fdb970f50afe79f78b7d5b501d9af2805bd486806ff9c58a4d0e2132bf74ee5e88bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5873b9dd8b7fb61548ed3498264efa4
SHA166049eb042febe5acf82d9d088050454b4740f18
SHA2566fba4d50d18887e60a9b36b8bb41645be733fd579ab4bb5abb1c06fe732f3642
SHA51237ede7d5d2265bac1df335a6dbd0f07c1bcb3e5d0a3896eb56596e3b5b21ba471e59e4b2fda1cc6bf1cced9fc9ff7f3ab7c282d529731002f1d229db2fbaed58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53408cd550563ccc763edde403653b53a
SHA10f37bbf60f20a8a670fe435efe07f525db40eb73
SHA256cb421b7d737c5e6bdd9954dbfd67c62ac1040b7903e50c52e6b712dcb7233b36
SHA512c945acf8e193e443fa95169d94e69c493ea99e4022701daa9193a9952c4209173a97e9cb96a36a02c63be8538e8e92cb20949dfe42cdd9a0c8c849ab2b23b990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1ee3d372092a9b1e0df0afd9b9b1865
SHA1b1a651b1393d1668a7c3d4807ec3bd8c9f8ed8cd
SHA256100109e435959d6c1064674c0facad90d8d9f3d25c336c5d2faf17a85a04af7c
SHA512d6873eb4d4565b07b57ff75858351bac56c289935e192e2fdcfa300dfe4741d33cec76ca767cc88316eccd9eb0c2443ec17d3d3efd4dde68dd0495c3102e0607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5029b74d61d765e38ae3c43320ac2638f
SHA1e5c364af37dd5933167c28b933db318b4f6b9b27
SHA256c0427ffb0937ce19418019acacbeb039b2085d40c3fff1756283ae00f5aaf153
SHA51298120b2a95008f620c772e48fd5941794678644a86cfc8df39411bb0cc7a0e233e42e024a007ebb3636fcef0398635ea477c618334ae7b62e2b9b2807b3c1679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569e960029f7bddbeecfdfb4ccd1430a4
SHA1dd7e3db7fd8d8065c388f5a8d73e9b61e78e0f81
SHA2561836693478661869fae267ce00eee055ddaf09a1977a6b3a8cc6603ad0c32037
SHA5128084d50b34cbb38f95a740d2bcda76fc8114fb54d8420540a2b756b652405949d199010231c70aa2f73e3bf83e88aa28b00a3c47e2e0e1a441eebf65c3ebffae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b01c9766dfa90ac1e8be58129971f273
SHA1c1f9b984d18a349f9981a0fb986f9d41642e15a3
SHA25673e64a7bd558fa77f7de678d7734aed5a1fb1446fae264a2ef4d8449d6a8d1ab
SHA512e7c02355e648b103318278190e18fe574207e01de04b2f59f61cf1e80b64e37fdd2f082118a17367ba46341f88cca745b5be3d12ce2e375d06c184d3d90b8b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c4be699080c96bc1c4b23f5ee4347fb
SHA17a7b423f6d36f000fcc8f8e890af90b488b1bef4
SHA25660ce237f291928f743ac0240c9ae3ffd28f2763e05b320b8a7565ebe61a63fcf
SHA512a67ecd182f25f9af854798b743f1a7ba767dfcde15b638121b46fe154794d361d67ce3510e1637576585198eaa2539353f85fa4b66e7d6ec07a01f610ad2c4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f564aa47afc24888e054ba31c07cd03
SHA15dea9edb6f8b69b68f84ba231f40b28045a13c9d
SHA2560adf4700841f3d6a6de11345d5a6e377106bd418398d4b39192d3ed7eb420a1b
SHA512fa53250bbb23321ceee6d0c562e047d26b38432ad26bb030b585faa9bc225edb7bc7cad5f9da4314d0c81f8f0ffd18b87fb794143a4f8d135d4273ab957bd541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8a37b118ec4ad7354c7d6ad89a61712
SHA17f22d75fdba7e1dd4fd8701e93755da81d8c140a
SHA2566322a404df7b80c4e65fe1be838ab24dc11b405fa2aa4bca9df0e73a4ca3fe73
SHA5121172db99f7e8dfc6cadaf181a598b019b22fe6a9b5f1e6bd86b12f4820748afa997457f69c6b06ffdffd07b995b3bff448afe723cd43332e95662d64cf3c2f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b77f202ef71c6fcfc2e4aa70c7c86aa9
SHA117c564ea43c34c9c079e6d7f8e385d5d81a8400b
SHA25621ee8be9ba4a4bf4368926c975d7581adc9e8df8ddb9bc9109c976e380be2a35
SHA512571408a6c603f195d82c797c37d3dd945e2675802347d21784caba214ad95f63129f4d9460c1288732fc9ab097eb7994c5708f1b6cfe6126d98c8f68209bc7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD587e3a33c9b452634131360c39920dd9f
SHA17e41d14f5c47f33d71173adb96813d5256da5495
SHA2561324b0b1f98708a81fa31d471f36c0b5f1b5980369fd9c64e5a51dac14b95487
SHA512b4e49f117a951d9b95ab8dcd9f0f8ca16c7aac7c9f25f16890f3efe06bf9d256874f363f0ab3b4bb35139f875f98f792cac6fd96a9014b88882a5dcbafea7238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be6bd147d33c08e3dec1fd5309ec2c27
SHA1fd04dc3786f8c4482318d7c5201f4e71ee87f4f9
SHA256c103312f60fed7bd41ac92726f140dd211f44c39ccfe265646046ce03591227e
SHA5122b4a5865c087cf44252d3530043de6eabc7b9b720bcce5f414734b8bcad46871aee52f95b0453aab892d1749681599d8649ebad3ec4fe742ae467f1146b6694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5930e3637799308dc1ca2b19e64d4ec2c
SHA1e3b536cd0e8e0a83baa3d01d7cc7f516f88f3373
SHA2564664487b354bd15abe686729ea4a71d0e1fa8d1fd4c3370edbe50d47e3061fbe
SHA51279a728de22c9c037f305e9a2f1fbba1498c4b54d075f4daf8f8bb235bf6f725d5286f735a5367bf593b133e79011b6ae2424657c919687ce9bc32366b920521e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535fb91cbd6f8e49b9704f3fb5434385a
SHA15159ded00041a3bd97def9ca98c31678464ab81f
SHA256e91d0bc9b313dd6b1fc20342e8946d281b06ede21901c9bbc65390f7ae5991ad
SHA5120521cfa4100a543c45da0864615c6fc0d48e803893087a1d554a19519f935b66263323cf9385160cb08e5adf70c5af679a180a0d71d6d3ab96e5d79d58d030d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58eefeb533b06495af61a336d18871bd6
SHA1955243f305a96f2086b8308dd6c9818ae6c427c1
SHA256a6ac6ca085b926e1b1044689161fd18f76bc9cc54b7bbdedfe1ca22a6e0430ae
SHA512368f52f8b7739b7c64c5d924689eccd89ede3c105c320b973fb8acc04eee740cd3c851d29318919ae9d4949baeee50d0e61e5c4484d3f5766055d50147aa2a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531f50d92478b10d4acc881ae4f0c2eda
SHA18b748fe9cd1cca522b81a26f1ecaf9455cca02be
SHA2566cab676985ea5565616c3423739637f8fd67421d403d3bbd2c2cdd1375e75d09
SHA512f1481c74e7dc74e711c24e8416f815720c7eeff6179ccbf1ef17f750801513fb7c6a89f6b90563016fdeff026cee8559bb7cdd6b015ab23ba06a330d3848359e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5370f421a6339444f49cf686c2902c20f
SHA18dda5a5b1fef7fcccba15b3a588b00ec0de2dd6e
SHA256f3e7cbdbea413ddd6674f14ee323d795cfd29a9261bafd94d39ddf227144852d
SHA512a5b43d853ed005387723126a81134fbfda93d6eab0aa9901ecf8f4bf58cd1528add377545947269da5055445c8097c8afe8992facd090fba02c0ae871df94666
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a