Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
31ea6c54f777ccd5bb8c784e023b7ba6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31ea6c54f777ccd5bb8c784e023b7ba6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
31ea6c54f777ccd5bb8c784e023b7ba6_JaffaCakes118.html
-
Size
6KB
-
MD5
31ea6c54f777ccd5bb8c784e023b7ba6
-
SHA1
532a19134463a322ead23c8f940a0fe467060592
-
SHA256
066105cdcca1ac59b081367a7fc155c1c23e466810bb126117f652839eba0206
-
SHA512
4f367e1e85aa4446dcaa14864edbedde29933eb21044afcefec706ed95283c14514c83227aca5a594001b9cf9ba4fbf46c0dac2679ab32c63f279036309f3de4
-
SSDEEP
96:+IVub4Tsuxe5nLlQ63wZUWRwHW1ugc9BI/M69jPUwp9v+/DLp:+Isbyo5hQiPWRw2lc9BI/M6hPUwPS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BDE1131-0F31-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421550828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000000a3de802396cc610227d2e7e4d6b72ad8b028111ce6200426e3bd8538c4f6b60000000000e800000000200002000000026417a11c7d89c91b4ca021ae8dde57313433c959ab91553ca31fbb6f62608db90000000b33a4ba3293c6553866f2cde2699441820430c6f44042eb81623ef81f444e29c4a4edccb1b9bed0ef8c1892e3795b4b6643214f1eaed6bd60a68119da3e9ea8cce254b14599e73c433d968960fb1a6dc4202ffa98fca045532fad09b42542a5846eca540952d1afd0281db040439efde8b02f89e8c222b5d6e2b8fec856520420d239951bd5755a946ac74104efd1c7440000000d83b3c55936bce910dbc091e25eb7f003ec67141deefd8266e5342dd2f0ea7bfd53977265a4f461c5e64f904b47b9c8890fff82358859c278aed47f27d2529b1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000014c8763286db77f976b96dc0f04e4c70f37313dd652862a8d2957eaf38e34937000000000e8000000002000020000000f9f5ac1e532104153a921036428676a1b10b332497efef6f8b5b2278ebf90c3320000000acdda04d70a91628bfe6d886242f0bd711f37b3a41273f95139b2f4a6b44901840000000a7322bc640628cf0fecb164d0bfe8a2112e903865a7fd27bd0dd24f89ebbdaf68ded2bdf1dc28a25a234373444a8f9983a7465654e06d337940ee967edc764a8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e849103ea3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3012 2868 iexplore.exe 28 PID 2868 wrote to memory of 3012 2868 iexplore.exe 28 PID 2868 wrote to memory of 3012 2868 iexplore.exe 28 PID 2868 wrote to memory of 3012 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31ea6c54f777ccd5bb8c784e023b7ba6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a38419982774e9e742ee7cb5bc7b1b06
SHA1e4ef4e757b2fe67e16dd4290f6c03010dac2d29b
SHA256621a941403a643693357106cbd3cfb617656638f18a4a006456b6bf0f5de6409
SHA512f60bfe3ce913ed64ed71d53fb8f076288c43d84adf4ce8e51f5b3f019f7f81a9c3277aad183cc635562669746eafbf529e20d12970a88ebf57fa0e8f6596a73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebbdb4a3b23809526c82fc324e79a6ef
SHA1b3e27b1e633359e3854e6aa2c518afc8fbf26017
SHA2569bb89d958131c98c9613a3e32ba8ca668ceac85a8631effd0e71b0de6d297278
SHA512aa0ad5d78dc90b4983f5ff710cbc1f711d24e000591fe6ac22e7a99121deef46a15b4d1a24ea876100db62e548a04d2208c57a568a824c86f7fd3f63ee3dd1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b30eea273a1634167f3eb02f95406aa9
SHA1acaf3cf5643e7396d49e44ff4d1aafd8c3a1085f
SHA2564bb0dd3d0dbbb0fd946bf85c480e3a6b1e2ffe4d85832a7c09f59a7e6c5d40bd
SHA512656cc5cd38e5ead61670f70224628a834c08b3c7dcfdac9984294104e17600f233af3a510ee352a94273d4b5c2d351cb3389fd92438da36ee91a33927cf78cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f46d2481c9c724ce290dd92545b0440
SHA1b7d58ae639063d79a9d45dbf6685604b3d09f01d
SHA256bf8a6e5741344e5e22c2dcedfeb1b7074ac12ef48c55f0126db8b81f271f6820
SHA5125e7f26f398cb45849430e2c77048a5153b215bb51262f76a983f0349e557e7dbc7333112341abfb56923973a4343a3191c649ffb7b3df8eb173ca77a88428d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56466fc4c2d3751cbcd29a1639b9b3a1c
SHA1dbbe02d4a7651843487f2fb874c4ad3e09a6fda3
SHA256549ddb9705a0d9e80947124f3011d1f6c608f39d7299a1f3803493f13a089724
SHA512e335413b2d5f9ef0de0309abcfd4467332c74eda6a653d10322686d360ddb68ae16d4f3bbfae5bb0d1eedba5ab20a10caa77d15c9db227a84dcdc912588926cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d01f8e3d961518dd22901686c9ef647
SHA12ccb79aaeb6350be24511bb470fed01e288da114
SHA256c355ae410e27a8afefec784b0cfb696f10c9ecea65ce90bd34aabbe75a11636b
SHA51243da27d3ed897dd1e00a387a84538d3d707823e8193dc9f1013dd000004ff19aee3b6b516084d691729ead30de3bc9c701115899f55a04d6f6eaff445599b299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662ee9e36ebf51fd0154833d8bafe5f4
SHA1fba28b8c81009ae10a554f0ae5826f47390d9340
SHA2567f597d1fcd1ce9ccabf2fbcbd36c3d631316d94c9017330df783a8c5e512bef7
SHA512a86b94ad8e007fa50f11e0862b49ff36e230418a6470051bfe1952d1abd7a1055649b12e3ab44af54feeebd5e6c627e8ea57dcb821db1d21a483bb066b38cb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bdd646dbde491f42af8be7a0bc3bcf5
SHA1ca9ff572f016b30ae831004513f8435e510b4704
SHA256d35dca0b3c19c443f79a88e410606b5b60fbd48b5bfbb79f2a2ca92316760578
SHA51268f02ea515e122f790372c5bafb7c40b4ef205158a16cefa2893a21d08241693fc53c2f32c3afda91c586f442224ffc514efcf4da28e823891c83d9c4496539b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c89a6b93e10164f0ae8b762c2ae3e7ad
SHA14d294edf9df7757a5b84f9817d129e623b673b01
SHA25614c32f6d73b3d7f43ac1a63fe30bc663c91f299ab25da39b0c67ca415d5421d3
SHA5121c26dcf2a8570bcc8cc87a1b27a3ee513e092e92d773868f51b54329e761f526aa266e75ec098bdf4bda68edcc3bd7e83ba484ce856331fe2dfc7d7a779bc4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e132a0c902b759ecff6c1d16b22a87e0
SHA1539867fd05089b690605b36357b0b71f5f7c4cce
SHA2567325d163055e1e5fc049a978cab7daa1ecd42ac240e1268f89af1542ca9842d0
SHA51257294f330931f2309d7f3af7f32007a7dbca63be3a40bb7d4447f02e5797f0e46c331411d831bd052c8143f3fd01b519a141e7ecd8b260bddb4d196cf97bec35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55def8e3f5cc28a72b0f081ce932ea746
SHA10b72bf5167ccf0a223fc856afd227b9057dfc10d
SHA256a513ab902399d8ab192b666d697eb43a1d36dbbb463697df1e3b8ef8068a593f
SHA512a588c65af2a1d528ecefc80bb99ce64c1ebf6de934272ee15a3c7512e75a12dea19c490cfe7fa6ff4ca29e37c74368863c6bdcfc6e4fc1b7436c0a73376a9708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728d2004aa2aa78f73816475ad820b17
SHA1bca4c4e1ac22f800efa7a1f032c5e7c5c4fd4b73
SHA256e987fc78fb688f3ec8b173728a3720892a3ce7d879e04be7cb4f939ad82a3e2d
SHA512f3bcca4de118bca16fb2df4884f713c93a6bb82f665c8f83e6696aa74d049107e97da5b81f475e9b26f8fc9fa34f36315f0db3c34600f2718bdbbc27d0ff7245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54594b7e414f3790180d169edb4ffee3b
SHA11829ac0236a75b995b056ce73a24642518c0f9bb
SHA256c18b8db4b1d6c61ddc61c9ccc62834469575a77ab29b716102b1bb0659c16fa0
SHA512a7c9cd0538db12f2dad58314dba5463a09da0003afbc92d8efd39fa482189e436cfeead57a9e2cabda6b23066dbd5700f3b1fe3585ec68ba120ff0710fe9d68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d54dd0996cafe8aae483313340d809
SHA100eb79a8e79a4576dbbc61036e53fe121e79428c
SHA256e3abe09e6cf3e6cb672d5b7d3d8413e61e388937c9c5ef6afd1403f2739d0c32
SHA512464e14d8195d0852021549363303d8029ce40fd3305c3b60c98802afa7ea9644eea6c68229032e7f81905057b07b475e578243ff2923ad183d9dd0ee7092e856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f2aafcbec5fb9bfc4827c974cbf472
SHA14fdb4894a46ae61930c26e592caa8d0457219491
SHA256aeff6cd1b12db07c228cc1a1d272c3f37d21976b3080269dd64541d863a2d985
SHA512dc02b8d6398a212027cf11ad242fdae2919ff1205e6d8e07f97538e7de37eacf32bde1cd1e640ed8a3bdd0a52678c46a659f2285dbcc98069f05d1a0d5a43d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594653fb08729b2f24e175938dc032b91
SHA10218a206c5a2ce7647c71a415ae5094d1038f560
SHA256f1e53357c22d3ec65a204e093ca43cca078c291ad5323377ed015454fef5bb2a
SHA512cf6fc7a3a4929347cf3e6d7f8471c1846bd06fcfed1b8511990dbe26c42ef180030eaf4d681fa6a78ba8a1e3923882e7d6aa02bcb363e9a63c4b9a0c745d3085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5541514e0c14f38e3aecdffccdfbce73f
SHA1ba2b6105f356c7fea7678f101748f5de697363f7
SHA256d7360a24ed2e4314b74705465d4a96c79d10d8ea1e74a92792c3c6a11e0c704e
SHA512ccd83e4ec60d0fc13d66efb64c8b4bb312aeee7061984b2018e49c91e36a79f77a4aa025b5d70acfb685f74002064ca860df0e8b623a2d47a83ec2bb92350288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b95d2cd19418256a3de4e1159d4305
SHA17ed8d04248cfb218280b9ce01f3789f01a173bcf
SHA25691bd78b63340edbe899b2a1a2ba9250cb72abe821c4e6d8105022a9cba6a45d1
SHA512e4862fea93e3242188cbba12db6b362b7b8b35b3ed9ddf86677fc2b02b7c8c1d54800cbc9374d37c2ab6cbb5ad6718fb9567ef3496fdf649d05e3377ca825c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbadff4e60fb8d951240f061027f046c
SHA1a4fcefae68bc32c8d1eef64d945972c78f5f3b6b
SHA256cf440e3f3f43388828dc8264f40e1c6e02cb52729487582e0be84d7b5752d0ff
SHA512997d667ba56a5f1b55010033a565c06db933e814187e399f3fd9988d1dee8817a0ee6dbd9b79b01e5d06458be93b2885c21a0351ae91e9801563e06b95033ef2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a