Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
690b1cbbc414f942d8a4fc9212a54336_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
690b1cbbc414f942d8a4fc9212a54336_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
690b1cbbc414f942d8a4fc9212a54336_JaffaCakes118.html
-
Size
20KB
-
MD5
690b1cbbc414f942d8a4fc9212a54336
-
SHA1
7b18e648037e4d84810b5a09ed3c452ff8ad2089
-
SHA256
8c65733f3aaf6acd5d83f510c86f597343092e1e624393ec7f1ea883f4b2986d
-
SHA512
4c77d3361678205d3e1ee76b4933ff8c7a797d2b81b893c0f9f5084f505d6074b53ebe17fa1fb04e637a17973e468eeef5a0e18b06a54cf75bf2668319584beb
-
SSDEEP
384:ziHK9X0VBD8cwQ3RCLswOEdX3D4QAmccfIk9xheVzzVc93:zi/gcj3QNR1POOIk9eVvq3
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af44bc4450cdc647bfb85418e9249b440000000002000000000010660000000100002000000050765f2e60f67c399b884d9e11e4a825956a5578f234508f0a36f9195b018fa5000000000e80000000020000200000001082bf4b963b3efa6006432f9367b003a0a4bf4dbc7b7a611666b747a3c3fa0b2000000038ef893659504f0f6ec98d20e4540ea43fbb48bb965148a1074f992b6500b29a40000000a6f9785138c040174e8b4a0d52fdea6a2137ee2932c98ba0450b6c6d4afa48e49b01a5f02961212a82257ae5089beb9b939180b7713d8d03d9d8071a30b5dd7e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C2B2431-1895-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808ece60a2acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af44bc4450cdc647bfb85418e9249b4400000000020000000000106600000001000020000000d991a2c1f7be39fbe9108bb517a2e47eab43a8a1e6fa7f389bc433f1894e83a4000000000e8000000002000020000000876db473a921e98d1080ab1f1be2669a1e3b361116fec9e750a6bc44aa391fd790000000dd673d476bf4f8d158f91288b2e424ca402b7161de38c6b11f43592777bd028042910fb3e3ce43c84e5db869c9bb53d4d09a536b522e470919424fe7112ac455f525a8c34d0f90ddd7c39c74c79f6742b528f87a25633f9473fc543d2495620ab633b767cde84f2d1e1a0607882f76c44ee62f957ea6000bdc43affd300093f3f9d913a7f9faeec966c752ca18f1b808400000000f6ade6a4e1d7718e9255ef631f6e41f8db55aa3aa68ebc675e46ea8f383f355abf7647f8ecdc1eeae4acc20a357c775e5c4c06931488ff520fbbca1d3fd2000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2868 iexplore.exe 2868 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2868 wrote to memory of 2956 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2956 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2956 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2956 2868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\690b1cbbc414f942d8a4fc9212a54336_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563934376a97d8f37eedc8c5c80c4db0a
SHA1acb19369326d7ad7d09817e16fe3a8c6debe2f58
SHA256794c45a28e1c9878bcb70943af91437fb71dae2d51a6903fe7c3d5013ee13355
SHA512b99a3d37a891237253542bdff92215bddd4a7d53053c597e332b85c4adade0f0dcd0e1223ffefab08c0df51377eb6810f7cf1c4f9f661e9124ece86916c6f2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aeebfd5332e5b5df25d04b41628de32
SHA113be1cbf3681349a3b29517256e60eb2bde17644
SHA25684217bcff76bb627d1474c9ea41b1b52dcff6fd37c21d2d06f35f74aef5ca931
SHA5121d28bf67c049ea7e14facd20ef7b77a0ef473fe7ad9f10b2997dd5b2e384d65fbb1a67978db5e78ec9745a30350f8e68a68ac741c13d4ee300eb77df247b85e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f51dc4d37eb28f5153636fbb4d20e4
SHA142fcd5a6bdb6000404e56ea419f52de0fa090930
SHA25638ebabb0dc49c398fbbee51f18d354c87f519a1a780b0ae1a1016f99cabec41d
SHA51264cb625fe9faf3e556184b0dfaf7d3be88e1ffb1d2ba45e27b06485d9b55acf2cce0743599ba066b827ff456f7c2eeea36b1360782eeb91dc3399510e730789b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540088808a1427ab43c387a04cec5019b
SHA14dd5ebbc0845a564686c368da378dbd4861feef4
SHA256b39c2727babe35ba7faa9192ffb36feb8cbd48ea730c8e284e4ccdde3cae6002
SHA512958a067aae96702a5ebc7b78891d6faf02dd9ba413192f18f5ef0d47c53ae290fcaaa259f9f2cf622e8c665c82eac052c9c16d9d21ee17746229201488542944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92cd5c36eadb710a24582964f78ed15
SHA1f3b8f30c47493d37d965bd7085f1e468f4699e6f
SHA256e4e40de382a311dff43601f8db4c7fe539ef6ccec21dd69e025de97963a60010
SHA512c73ab3efd6b2398c3c037650d08a83570c704471ca7dc2b08ba38db4cc003e0ba9f68022a959563a1f790aa353c52aff4125e007c401777f5826e0a5f859a80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936005d263792cf39a1c289f9134e0bb
SHA178db69c4ab803544db056c9039aee483dbf0bb64
SHA2565260ab4711b28f31b7d44ff98f9c617e0c64085a1f048553b598515e1b349683
SHA5124939a955b5430c440a79bc269c2dbf988c8aeae8bcc90944ea07538e09cf005f003961c6d61e66763642e67b7ea825aabe983282f4e04196162fbe43001907d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5132b3517491db78d0083d9090dfd29fe
SHA1503e4a464a0cc95acea1a236604659830040cdb2
SHA25649a24c7438b84a4263bc2412b3cccc03f4d56c00ddf0ca5f56ab5f828e2d2aa9
SHA5126ba777cd09eca9df90df1f946716deaeb5dbab8467be95495df259664b69e6eaec0c41de8c6d35b4f57a536bc34db216bb7414228a3c49a2ab0f8b17c60b0430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc887d49f38d36a0a4745aeee5f6dcd7
SHA1bdfcfcfecf3b1c49dda3b13958272dd2d4f38705
SHA2564a067b9a046828ab37218db8873b5e20d26f224545bc64a27b7a4ace811d9996
SHA51242a0ead9f34820b28960ae3e44bad98513864c97c17f6ed93fe80731cbde327b0b796255c4639817006f881722b27fedc946524cadbcf205f13ec88ebfc2a788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c94ea5062f6075fccc2492b20bcbde31
SHA1b81668282084b84829a486083f94289c15f768b2
SHA256e3bd6daa19e1c474da6197505a3143b5e246e2ab1e9ad464636d128ffe3124bd
SHA512ad3ad5a5f08973d836bdd3e5589ad8a4dbdff62f2df016c18c8804aa21df7dba86167497ed09141327bd6b0744628e3063293f97d474c1b1c4c59a7c0b7bc49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551c69eefa209f37635dfc2fc7af009f4
SHA152f676c816697e8dcfa526c8804c8b9174eb1c15
SHA256ce7818ffbb41b4c49d2ed5a1d634b9f217e278d58fbbeb99f7377449f12f48bf
SHA5123c8be86ce89d50468484e2ba3ee0b0737db720fb65e5ed92c3379cd093c94c3e792b64052c2e905ddb0435682ae3bfe9b188f7ea6de2deb3352251aae8f7b143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f78b6f52491ee2cc06049af799ce49be
SHA1e30429829c418917442c9aa097f3867e6a37ffa7
SHA256636a586ab9768d444729026c023f174789687ff7baa47fdef6854f18d31ded53
SHA512e9076b059a65ff31bfef12aa03fedad5cea45b56fced97492213c8be9bc5d431e32ad258a3f0b3926e2f19e64e28b82bce5932784bc25fe2621d7684e776ddab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d56711c296c619d3bb75c25c52258442
SHA1e2e7c47dd24a0330a768fd91323c4108bcffe436
SHA2560b417822a8a0c581cd4a123328767414e3d25dff7c27628e0df0c6096428b865
SHA512a6a8965c376c14f58da3c16188db1251b53ccfef2d1546ceb0041a58728f529b78ce87589f9d694f970911cd87643b49b61707f439a241a4d23a3e7752772fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c00e3f11272513c250c34ad21ec19d99
SHA1547419a375d899eddc8b1dfe2ac9f1c61b623a7e
SHA256b2deb215df875c5052a731ad93230ce96f30a5a860d9b6c1e1e11c62b1f6c4f3
SHA5128a6125dbf838486321d127348dd9d9aa89e4034229b712a5a99614677def941d3acdf685ca4c8fb38137c0e65edf3d7568a539ad8a5df95a3058ab2e8d938ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95126635dbfefed04bf90825e551994
SHA1f9219ef1e4ba69ca6958d70e134d502486be9b79
SHA2569ba37186a08b12e2f3b4397d13f92be08732a6898848daff3336cdcc526317fe
SHA512b87d391082798ee8ffdd4135de52915ced9205c2cd1f409b48062e1dd8cf13b6d980fd26bd1c47de5a520c524d8a3b1d05ec3cdd1a2107d535c90eaf6a7e8b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f596713c7dba41dd2ad5a11462f21e12
SHA1e58978c7cc65462224406002bf97cfe10cac17bd
SHA256c58fae8ee84818be487484b9178f6939ddfa6b8670625702e246f37f6086ba22
SHA512c269c869b2ebb9c4d61d4f9b79126083a5de1659f5bfd9a175851e4baac2ef635cf9b943b5456bc0babddaef1d4deb8cbb9d99e227768fdead7d7108a52519b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f95b92b9ecd35d14adbfc0914d20fb13
SHA1cff4030b7bf58844307f10d15508102a48d7754a
SHA25638f2bc975c5e2d2b5265d8920fee3870a89357a9777058f971e67cc1631575c9
SHA512ecfe2bee78173ba8a6cfca9199b9558c077f5e850ba06c87aec1a7704bdfdf3529c9be0af91f7b92f30c303cefbedfdb4bbfd23638635ffeac786287ef0a58bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545487274eca88b50603a9352f1b9a821
SHA1054e8df2ae7aaf2905e9c0c62c7d51920d95860c
SHA256162e0754c2df99305fa81aad21e2c145ea3110ad16523433fbd9d7bd35f3c1b3
SHA5125d8603c0fbe68a8b57308e49c2e58e4f7aaf541a619e7d81279d6a2df1c5dbfdf8c0d22af9dd2270570dd136965764d95098f19d11c14affc7520d65a3ff65a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b618bc6cd576425545250c805be14786
SHA174243253c23818ecdb3f52bb09d10efadd708e1f
SHA2564c4ea66f6d28eee2d82b8f0478bc45ef66396cc0b764d07374a31176c4051b55
SHA512492dc67cafb0dbc03d9db3ba86d750ca292e43334f21215c84f56fe07705b19459cf79cfd288b9902509dcb1dab95b63f5990928e21b7e179e3bfe91c9f0ad57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d698d016b95753532f306b7bbe1419
SHA146791000fa6501eb67304c1185d638ec1a70e75e
SHA25630e2165f5103a48d5720e6f236607322316a09932f9ad5ac2240852c5201f160
SHA5128f52a4edb6ab75e8f92a04177b263edbe41e284b3d8887a5159f14d99c24d1a77c54859cedb5208025f0f5780fb5944f7c8873f28d7c82c16a896887d71b5211
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a