Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
0b8929b97a061bb27bf960e10b03a9d6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b8929b97a061bb27bf960e10b03a9d6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0b8929b97a061bb27bf960e10b03a9d6_JaffaCakes118.html
-
Size
68KB
-
MD5
0b8929b97a061bb27bf960e10b03a9d6
-
SHA1
5f129e342e91f2fc5d01432d09498e6ba01f19a5
-
SHA256
42664863a877e2aeeb2fd374e3f8ca172e672f0859a91e045b723b15f8fab165
-
SHA512
03934057c8c402602e3007fd5fe9f3896f2387e3666e86633ef5e53a92278175b0787d5794d6d7fe8801a373cf6293960ba256ad6ad0d55255bb80aaea62eb5d
-
SSDEEP
768:JiIgcMiR3sI2PDDnX0g6O7ZiUX2UunoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:Jo5i3poTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003caf65c433f5ef14d00f2d995f86d8b0d07789cfd1aa92c8fd4b25f1dd83c713000000000e800000000200002000000022b89fb767c8d1dc1d4b825958459bb75ad2e9b81c81f04d18b233a39dc2095a900000007d2c117e6f11e2bf659b225c318b7b8a0a89720aaf76d7dfed85f9157211624919ffe961168a3c78caf8178c44174f9d6dd121b82ea444158dae741bee510d681c12e576451ea23f8a41ea30ac070ce43ea25b5b0b069d5a81c5cb0a8504c92ad0b5693ec06cfa69a757dfde7cf6ff42537f59d989a3cd456a2b74998dd745beda42a94d1ac6115905afbe0f12c282674000000056dadc47a4b8528b7988b884f7d7ff2465750f824384c7c66a363edd70afd23f281743f325d2a16962513594a6fb81e76d5b6cbcafaddabd9b007b9fec622fb4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420720498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105a4fcdb09bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8982941-07A3-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ef092d1194a23b9da26afc692b11332dc229f9f49f846b056d419d7ae0f68d90000000000e80000000020000200000009e36c488ef87300f1b1ee6e4a47d800f918fee4d241c395c7e3916529ac8419b20000000820f751e252fc7f9dca2381a6a6f2744020486c08805602f0d0c125b889f953a400000001f5628e42cc787e2bb254cd5fcca17a2fb26043f13826ea0add4c1df5550920b0f852281fe15c9a988f50cdd7abe4816c854072eabc36750bc12d5101ba60057 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1720 1196 iexplore.exe 28 PID 1196 wrote to memory of 1720 1196 iexplore.exe 28 PID 1196 wrote to memory of 1720 1196 iexplore.exe 28 PID 1196 wrote to memory of 1720 1196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b8929b97a061bb27bf960e10b03a9d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e26843087040c1b579dabadc52c064
SHA166b443eb2b4ada2f62c09fb025cfbc895ece32ce
SHA256728e1a449b9bb675b701546eff39a9758543e02344991242e4de28dd863d8e95
SHA5122f36115f7a5b6fbb7d17d630bb309af1b5690155d561e7deb8a0a57ccd2ee8e349df437a5b7b6f668c69f6e056bf53fdafb5863ffc5725ca3f04ae1048850938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014200ee5b1887bcb57e93a76133f597
SHA157fc94fb0d336ba270f54f859092515ca9d245c8
SHA256f26b0beb8883a5b6d66f1dfb5cedf034ada2fa7912c5befcd0c3231ccfe4f580
SHA512a8a4d3592788b801ddc4126c2165cdf79da755b36c6c439bf4a99b5b679eed51800f168ebbb384a4ac9ee5bb164e46b692c7705ad07d59ee9659b6d4cd54624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448bf09cf2c9d90dc47704f8733bac6a
SHA12ced928f0253a269984b80dd90cd3b2d35ccc224
SHA25683bd5ea0d7f03d7b8bc5468e98a70e39d1421b9e4aa258a6ab8503559a133079
SHA5127480f21225f7f1c8df149c115fc2df469aad0b272aad6d3a5d4334ff495f7e5bf46cb744828ee5eb3ef32f66bd9b6a3e863c050fbbd68b71ceb2b1c106fda482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1c3c180ba8139f73ce1a802999c66dc
SHA1bb87610402a511699798a8f85259b98e690a9b83
SHA256624163ee0604572d40d5570bd48d63d7a565058caf72c28c0db64ee64b588421
SHA512a26f4c6e292ef2ab4b724258bae0aedc08691c2bae3741e71411013b57932a1a007572f7736a4fb0197f82a0cfbaded20b8f6e70b7fb66ef58965ee5f69e01a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f87da51e9b8646995704a2c42c403d6
SHA1d5416777b5ee12fea2681005f4f5d0e6070be403
SHA25689a8f4da1e6d279f158e907e17760c3ed0c65fe9b1ebf5c2f85648c4b525ff7c
SHA512f4d74a0c8f0bc776cce25afdb01304bdc8a6425848cb51b41eed1c43c5171f42e26c7cc5888464960888e85400cc16c979eadacb82f065fe9c6c9f8c9aaefa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515f4c5e207f299aaf935db1e30195272
SHA11b0bfd26e7ba437add8179a807b14e1445f2e8c3
SHA256739ca98c87b045136be9d750d3a19fafc2c8e711cb46777372b08436154edc27
SHA512caa138bc967e71da4dd440fd55097e6c49af90df3fc3a351bcf7b61bd307131ecc380c5f435a1fa0630fb05686659b921961d8d08363cd19e3f2c89069fa1643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5411d195144fee663686303aa4aa14
SHA1d620de77ca28964980730453c853b7c514c8255f
SHA2560bbfdf7e8179e3d7fa2ede5395f9fd413351b2c35d68fb22ea65baa237f38661
SHA512bbc4c4d0086850fe6a8840da990ce94016f90f8178bf4d031312829a899b93d4a630edb4fd9a10f6336e197c0e1b1b0c74ff915b60c621753055ad8790053b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d9456fab400fca78a69770069b300e
SHA1153817d94a3b8bf4a511c5521179e3fee754a9d6
SHA25677074cac0b72a4d62754592c4fddeaf0a680f9f9d4755a58655181878872faf5
SHA512f8ec0363e982ee637da68407904f5e35768aa33112258bd1d843cd020dfe3080dcfa72d525602e68128c6f4686dbc1f0b8b04a4b55a415606e43c511c4dbd799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f18674e9372cb23166609fe66277a96
SHA162a9911c01864bbce561b1e8ac332bf76f3aa225
SHA2566f6f40e1a494a9ae245f8004b7d97a0e9b5d2917c87f2ef0a5bcbce16f3c8bba
SHA512ceeaa2783045a842042cef466c296efb3dc3a9d3f35ed7412204526097fbc01ef519db7dfe8428de5a60b0ed774fb6e8aac4bd3a70ed910e13b6f75ba5413470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a46c50aa21e834bf2085b83e5f93aee
SHA14a5b74d64614796c572a6337a53c82aed3a942b3
SHA2569c3e626dc49cd69c1ac071ff41e2047d7f1f3dd8dfc7244105a69e2235313855
SHA5124efec7de36a73a774480c75deb3a3f1731738aecdc33bdeb0868720ae686083b66ae0e84b4d9824aacdaf5cfdf79df943a3c42b386b22837dedfe1efd8e0711d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521a6959c086abff0a071d98803ff39a4
SHA1546f2bee10ad89fc017bae2b9cb38ade4b0ea3b9
SHA2564c84338a8e28f94fe4723aa4393a347358c5705d41711718d9a73e382534bdc9
SHA512e2817c6f914fc940b6cad081b8cd69cf5b070e9f51ea39375d653722824003c4c86523587ec9cab49a92da35164824318fdad23cda3f75d75c348fbfe965e30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c89f40d1a5fb28ae0d7fcdfa34cea1
SHA14097057b981436475e9bb1d712d65d7dfef6e9d9
SHA25669f90590eaea8ab721010f61397361ee27aa714f2d1b709b9c38317ca4eafdeb
SHA51295f50d86d11b6794d72858aa8e9ba92775402ee2ca4a1b2f917efd5d64ee2f808eea57dbd9e1687d3387a6445db05994db1f3e842b68062c65fd089dca45f448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5122c626300f0d95f6c14d128e8740917
SHA1ce09c935ab1802605af52ca69fc2e746138f2cc6
SHA256080650cd8ec2e60a2af87849ce872ddf38acbd8baaa885bc3854f15e7363865f
SHA51206bfba14b322dd59d62bdd56f1aafee34056331fc9490857389ff0f48b54907dfd4fee8c6d7b0b5c2218bdcf0fc3fa63b827949456863ff60a3201f46b31718b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629a47577df3ae331902560448e643d2
SHA13725d4097f3e70f215e0168b4adaeca6c0045e2a
SHA256fb50a1fdcfa2b4298d0762b20690da58b314318b3af347ce01f1f18d5a633405
SHA5127d3eddb0d134e0e9220435da1a165ab9512ddec08d63918b4cf262e301221573c6c1ac8f9616c147ee46c9128367414a1e0cf83e54ffe08aaf87f14bd00ea7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d0080f5fb093ca9b5347c1c688df44
SHA147c4f622fda319e69238bf89258edd81cd99296e
SHA25623d12c41b8d8cbdac43ea36e651b8686732cbb7b35eb4242d3844d941da98c7a
SHA5127b0c5640732b5cec9e9ae23312c6a5156abf17c5493d25a7d9d778b697ffc04585cfc9fd0a8a50b469bf0a0a70c34ed2642a27e7c328661d71b879fa6151a60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad280d6f8bc4f1e4d6df8f49d7747fe7
SHA15c893ec863a773f0817893786333347b1bce8f54
SHA256979017a87c563dc8d48302a8a9315c53125c9f3a9ff341532936862a15d1b3e2
SHA51291a738568510e9752b4bedd7e93a2cf3d0e8be8a2e08bc3f791712f5137e89e72211fbf816f138c6fe319e27b7dc2ac5e9844bac4a6804fe3086703ad9759ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502c71337de67ad149b8e69e9f0624c2
SHA145dfff2d99eb78d3ac9d7124bb34a1fe7dec2392
SHA256343419503eb10fe81b01bb82c9c9270e12793d9fe550fe1a11c1ac70224d3402
SHA512e5e1f7aa1b0f03aac4fa5622d96109254c7834b90c172a09f19cc34d600a44f88dbade4b812b420e7325af760614e205f599e2d5406e4489c52e88bf174c210d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bb0cc4ddf05cf48d7e5b5b890183005
SHA198a7fc98526259694115c4d450deb1284c3a1787
SHA2567af87fff8af5a05b4755ea490d39e7f6294c4f871a10f9eb151f48426fc5fa6c
SHA51240ca7245ab46b48016048836fab2ab697f1e1ac87f3f3b51eb04bb57e31de2d77c0566e0f81adce61d49afdc283ba82f0b56f22047f0e5b0f22118b74acc21c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b264a234eedd0adae21ca7e35cbc4df
SHA132fabe035e6af1aa50ddfe75dd5480d9a2805ff4
SHA2564932b66636a5781542a5b2f626cc1a53a199e160193ecda8f9d21e2c24508636
SHA5125b0397cd3ecb1aea297a4fbbc631d46cbc181a9d7e8c7bbb410cd36cd9b62d6ec8d14d08af6b5258426aa200058ac4b9248805569444d3f5c7dfa61e54fc0d55
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a