Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
2002dd8147c8de438fd54c18f53d86ce_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2002dd8147c8de438fd54c18f53d86ce_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2002dd8147c8de438fd54c18f53d86ce_JaffaCakes118.html
-
Size
35KB
-
MD5
2002dd8147c8de438fd54c18f53d86ce
-
SHA1
12ff8f41d2ee7a00dfb51ddb1e1b319e47712fda
-
SHA256
e5e300738a6f3bfe80ba09620e8ec47101b827cfb36d5216a72044eacc009187
-
SHA512
99876c50d35ed3ba1c639839a5fd556d1e6d71eecd9891de9e643a72c2ff38024759111fcf2b01bc8d56f6a66a24f4f48b0e36ab16697505b8d9221fa74577c9
-
SSDEEP
192:uWDAPb5njgdnnQjxn5Q/nnQieWNngtnQOkEnt1BnQTbnRnQaXCLAHskY3xP9YIDV:YQ/aaSPr7CzRti7IhjU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421231785" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003e1d583edfdca6347cc710a9954862a162befbad9fb98717671809830fd192e9000000000e80000000020000200000000417269d31f445d8ae07a077f9a7e1729a9fd372f08cf2e853ba0e4801130da32000000009e8cb7273ddb3cfee222c8b271a72eaff32829c9c2ae9845688a7172218781c40000000f63f24a53c94d3a6929ede4eb0ee8444642beead9c0f806fdf8e50dd98f928be6a10729196c39b2e8ac533b2fe1403dd859675b1ed0446e3080df90754055571 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67649161-0C4A-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7036763c57a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3040 1928 iexplore.exe 28 PID 1928 wrote to memory of 3040 1928 iexplore.exe 28 PID 1928 wrote to memory of 3040 1928 iexplore.exe 28 PID 1928 wrote to memory of 3040 1928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2002dd8147c8de438fd54c18f53d86ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c6d239ce5e9ebcdf1bfb8a79db7c60
SHA14ac3c5cba58539ed9b7704ec8dd92bc94772e59c
SHA256c43b1ddea13dd41cb1fdec89ee57841fb2c00b3a745ad8b3b2cdb9c75ef12c4b
SHA5120913a59fdad53fc4e6f4cfec2006c97db51e294fd23e7f2a35d4ed907336c63208c617f29f575a6bd674002ee2d60fb1859b134ad156e6997347c3d2b39d80b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e08005f883f82ed7428a74fa0bed0dc
SHA14c5f17636bae2d2bf6c5c809aa3bdd82006cca4c
SHA2569c4bc24920894ce9397a3e850276435c79941fdb90a4cbe0a1ecfb08ba924189
SHA51234a4d3cfcb4910c809ee75fb145aed3161b9c7e9c6fbbfb560a0bde0b68f78a43ad6012bcb2a8eebe2ad180f03761508f4958f9532e97b89d217e5bca1ea9871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f1dc9099d3a17e0cb0d7b02027752b
SHA180bbb5586fbc00efa04dd24d16a1218a7ddde13a
SHA256c3e4a2c9c31e3f6d5de0d311057a8a477e7c8c841e602c83fda0502ba8156a54
SHA512911e338d92e6d50f282a4db2021f2e884bdd55ae7cc04e04f111722ab32be649276e5164fb59ce5bdaf3e480e474803d7d9f6988c90daace4211186495de54a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac1970aa03b27444d36671fce955e6d9
SHA135b6d5669a4636ded5721a20ef87582376dec164
SHA256a0dbda4df65fe3acc2c77dad75e88b5e8cf6f915862d7d512d0e68b590d213cc
SHA512c206f360e005a983d29a05ac84a0ae701460fee9b31be6237ee69367a8edf16827265028ce1f17fd05a2172415a92225c33498175693fc0e88bb014fd2470c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53866ff5580dfa330a7a3ed2588efb77f
SHA1d0181075e32245d5c43079a4c893107574bf83b0
SHA256a5f2352a51b9ae1427c5590f1d0314e9e464e36dfa36566e046364d7a054e0a8
SHA5125133601c3025719a2d0a59610531efe31a65b7ae8a70dc33cf100c0d2d0f45a23379d6992c28e905b76d87add6e4e88d9d46e292d9db748623d4991203c60ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b766156b627554d2e9f736acb86109f
SHA181543ec1ac70e30fc2c87aea948eb9b8daf3893b
SHA256e23acc238063dfb4b5fd84ab4f325f984ea6488ade660419a50584b43caf3cac
SHA512c4865296daae7c1a9fc6e5d255a918ad67881c19965475a947386c3493d324142045b02277a1ced918c96f5f1ec641c3a37b6f22c5c4725f281112ecbe1e4746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbb15a80a88f144e837f4820459e158e
SHA104b028cc8ee4c8ac397d34b46bac8204a69c21e9
SHA256b000d3c6f969bc12c291fec644d5b37c210cc128c654404a9f72cff0c8e45fca
SHA51234ec692eff7408c688260eeec1688d05ae051626d99ce01855617afe3fbbf0f1b6fe6aa335784bc4fcdd3b219ebcc558fa440d840a34b417d9f080596932988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d62d164dc37e9f7ce0d72d0db04b1035
SHA1f6fc3adbe833ab4ed6f6e7d5d3eca883c50ea25e
SHA25613a2230a77d038c0c9149e4cc824a30f191f361f864d8e9e4aaf6bb8db31ea21
SHA51245602af77bcb247d16a54f16bd0ea6105e5311df6bc668087c87a43a1a8b433f2f1f40ed12b3889ca1c6c7ee7fcd63d60999fca2f22ee52be874f18e159b472e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5623fb59b4351e1036af24c3c4c519bee
SHA149f5b0f03d80fe5c5b1e810e34f4fc97d59e586a
SHA2568cbbb0a658f5bc95d3938aecd002f8fd3637627a37dd30a53d72ec92882bab9c
SHA512af0968bac6fa4c0b957e01d03f839b71bd8909a68d225dcd7b89d6706688bea91de7ec028f19a0a819d0db3ea1807a1e902356dd22b2e53f1244b3fea0e02c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5858db26969d0231802a041da1332265e
SHA157811a60cc2423efffd10b409188257fa4621220
SHA2568698173b7e972a69232f74b4efac13ca0b689bd3d37676ce90822fe46af10157
SHA512f7732f6dc6d5544100cdfe9ff24d27c6f1ca920edb18b790c5dd7c3ca467839a5ffcc94e9861d225be1ce31d05c25bf114fdee835d431d86ed6a51b5a338364e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c38c76ecb985bce5562daa72f7652d6
SHA17a42e3c69a532a01f40d9f9eb035c4e0c0cd7ad6
SHA256d772a780749a397c854f927ee1bede9e10c826ceebf27e95a327cad3b6d8a023
SHA5125b0667f5c4ace05acb36b692b53a470abf69869f91c703711b008c2fed17ce189e6b89c112c915e8e0cc2d8c005c1e0c07b99f5ac8ecae77f1ff479987c19f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e05cfa80519729ec5a337beefaf91c
SHA188478fe3ce2f29c17b25034fedefc59e98389762
SHA2560ec98e1f0d698662aee7bbbb3a9c476e11e87608d1f0acd3b184bce3925796de
SHA5127e917183ab8a9a98c4ea405740c26d0164e51372312878f57bd09233b79677fe747cdab9292a6875cbdf2578d278f2d57a57b361f2d87f354312683d5b2ccfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506379272c03596f2db30e398c9fae153
SHA1d2d7748db3b6b4dc6329c1db31b3e90a904de1ef
SHA256c9b09b2db4daf96bd5306b79c995219c499df6ac922dc771fde7b545a41369ab
SHA512e84a73e594ce3249a8d0ba81c2cd5f72972bc09e009ea748c3abe8ee0606ba30535f534b77f90c18fd267f3a769a16ac3746d81e0f486217e1b7d240450e2b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2b6c84beeaf6b7867e99ce97278a57
SHA145066fb8d6d6301f613bd15a2614055289f81484
SHA25629af3e4dd0a877d8851ab06c8de80f8b8a62ef28f1f86b8dd0c852e6c1a4e8d2
SHA512929f7d848f4c485c160b7e5e5017a7ad7dd8aa047256cf9d69b20cde97f73404706239ff971b476f105572d850ec74c865917238bb18ac7d817695d717ee5a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52732e0484d910327ba6b0123479d4611
SHA1076dbae5a7dc768ee6f2453baab62493881d42ef
SHA2562227ceede2a060e548793d66283576721767945b19419a6f08b07c2cc952336e
SHA5122dde0a0bef937b6ed351901bc2ac15af45538ab9be0079024b8b7af9be3258ffb2ff6ce315bfeeeb36f33a5ce4d4c9f1d53d46fd528b81780480184762d36a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7ac16607895326d7d7bbc6d909740d
SHA1486cec64fdab36a13544fb5570bf4ac112b9c06c
SHA2567009398aea9e390ce89d195f648fefe156b7342035b310c3d1e00a02eeed447a
SHA512d394254e2bf0246ce13bcba6fe11bae855cfdc75201e282e5e5df961556f0bf6f88cac8f2a23ef2ed14b43c52d7466730efb39a577853f6fd76d3c11d9d72be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ecb03769f54999eef58faff3a2dc4a4
SHA1a517c014a21c40f81d7c3934ec1663b695b3a5b9
SHA25660041bdbe99a6933bd1a603fe084dfc502ffd2671c3d3c9958153836576ea078
SHA5124fd6f2526245c64c756f82ea78c00b59db56cd8a2ff88fb31b264cce8653b4c2f0c98c148eee47b1f9d2aa17d31752f0fe6e0193edcf8b7880a62660836583e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f3e624814ea07659795471410e0df0
SHA170feb222f1a9c277d7ce6d9a5046785113012272
SHA256f88f3c488f266bcb96ba65d54f2ae2a223bc5b9fbea7d3432b617045304dbf0c
SHA512e05658ae570fdd5426a79017e39c37769605865184d54b7a7b3918181605a7bc0e7ad8dc437d7a489dd6ae060a6c2eb58b6d260dd1d5ffb3e7a4ead70263565b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a4647df85be3b3f440654ee3b670094
SHA1bd8cce84969fe2ae4ec7f745d7258986ee8126e4
SHA256f586de10d4b631153247dfa41e060e3ebe171f488bfade75c3330cbf5594eed2
SHA512524cb1613f2a586c2e64fb769f002db10bffce60a2ca4028f33bc9540255322bce6b3162d39e95e7215b08be0b8af7971390d19cdacb013c61e4b65555078876
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a