Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
2d495325a085d8dff88f14d4f9beff93_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2d495325a085d8dff88f14d4f9beff93_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d495325a085d8dff88f14d4f9beff93_JaffaCakes118.html
-
Size
905KB
-
MD5
2d495325a085d8dff88f14d4f9beff93
-
SHA1
c61ba7ae547b1f453ee171ed8eee2e0b9b4446d9
-
SHA256
eeb1eaf878c002af91ef12c4f3607045bdd082a3cedaa32233b5a3ff97dc3533
-
SHA512
feb31014d9c91f1628972875dcdb87413b144d25508fae75017217b24e4b73b1a1d4a5e9b76ca9aa94495cd79e9f441061707f981ab7b7b7e9b91aa1f6aca9f9
-
SSDEEP
3072:Cpqf2szA0N/Gd7ZXtjgXJtdYyVeef0xOMQfw/df2szA0N/Gd7ZXtjgXJtdYyVeem:csMStdYyYQM0sMStdYyYQMpF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421476325" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f09cf74378d1b50453d8a8682dc082ad9425db01ee6ead1aa65b55c225f60150000000000e8000000002000020000000d798acf87a3a64cc686ec769482e36eb4174218aacbec4556e4893e8071063b1200000009bbb1bf4e7bbf671a43daf1b5e6aa0b4cdd61de8d5ec03462290ecd1959ebf8640000000cdd5168847fa129c0c30b98377b924f8de4cef6200e8057aa2ea4e819f447bf368f83d65ea1036ff5d499b6f27a20b08904b06ac4b17d57d6197e05c2ba35566 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000068e2e61dd4c0a2dc9b6b14ff2d737e93cdab6fbb4207097b727b92b9438fafd4000000000e800000000200002000000087fdc8a4e489e3dd32add3631dc47e328a83fee4075c25e37a641d0abe08bd169000000055d52391caabb06466c432291e1e526c229e3a709e574292bd950752c4c6bdb471edeca331d8aae1ee83eabbb7ddb381cc0fcfe3c0d33cc37449253d87daf11fc53d43d3171be969cc03c764341762c311833b96f358fd950ca8de26f7cfc3d815cc0d36e10c2732a15b62ca1361b08997f52abe7409383047beddc2ed9728dc321a1f5a4d9785c7becc59fe60fb6eb64000000005e10134f9ec11c07ad2b617a888ed4b8fc2d5205978f66666ffdf907ac1be81200cdcc0ad5be1e8616a52ebfa744d12ecb7fc8e1d6eafbd575db2b31337c912 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C528C1F1-0E83-11EF-85C1-E69D59618A5A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ce9f9c90a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1572 2116 iexplore.exe 28 PID 2116 wrote to memory of 1572 2116 iexplore.exe 28 PID 2116 wrote to memory of 1572 2116 iexplore.exe 28 PID 2116 wrote to memory of 1572 2116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d495325a085d8dff88f14d4f9beff93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c8cb1bebbaba1d17d9f53e3202d9ad
SHA176ebe64362059a0046563d8f83b288c506ded4d2
SHA2569e41b354039da6db9d09cf149c01e12e7b92968c97dbb255a18c5421d14f2658
SHA51258e583e0d2de5d19f37ac564ff4d860422e438e64a99903e01826a87ee2c6a376870df332d517d0c1fce6475b0cd1725a3aefe6b8d96b3da9d631682eb9c9fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53abad922da690f529c29e5453a78e18d
SHA1efbabb446e3776366c461f0f23ba55c6eb2ee8e3
SHA25637ca035e5b1d4ddc43d7aab7ac7c8e3e779fd4e1e895cde0d312a82d987dec11
SHA512925fd2ff40b1499bdff9f67301ba236a70f1cc38e81d0b0781194c9d306ec7b7d3d862d18610746979ed14ba4019bf4e5a040fdf66be1d08c37041474cb80c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512dcba38cccb93ba3b8d5f2a6a6b2f30
SHA1ff05b19876b95c9f6b99d45c2a3ab5e96af1e970
SHA2565b7f983300a5eeba7829db9ab9adcca4b1eab54d91083dcead3dc521ac0699ca
SHA512020a429ae37251147a461e9063ef010efc5f18fa8db9d9f600fb44ea54a148d8e65ca80326c85f6b034b435903718cc471a0a77593636c1f5f9905d2d1a5544f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524a83e70371e7adfa62b12fbd3ebfd38
SHA199a89e56fcec52717813704b69b34500621e49db
SHA25650b017a5974459d04700c2bf71bc2d0eaeaf352a29c13d4ab5d963974d99ab65
SHA51276a999b24a003bf49eebdd0cac9317c7379d9dea969365d08bc4c7dfa06ccb3544f1c7910bf1b42a4b368800e12a93444dc1788c61bc60d7eb402fb631326d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba41a4bb8e9dcae30d20244745fbbcb9
SHA1da2eda63d0635ffb9ee7998632bcc52926b792be
SHA256127ca75f9b3520d722d3f40e0c475811f01f673736e549c0fb20294216eef40b
SHA512e18073652c86ee402d4f6353acb2845b6d14204b73854d220e2e6d527a56daa120f803da0ab305fa743a129d049ab58886e6e48a25a5f8844e8f061c40e5d9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b451c95d8e43c64245a13f53be8f39b6
SHA186029311a35b8e6eb08637ae1baf9b29c3cdbfc5
SHA256578603b757ccf4a404234238f195fd5ab0578567f1b191339c01387acd805923
SHA512b9cc9f075872365711fe72050eca6bf4efb3e0217f8c01fea87253477043590b3b9e46e6679b1107e1a12b7bfe9d4ddaba1a24b2b9e78039a6ee6289968e1e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533a5a61bea2447bc8a61607514f0107
SHA1ae91755f90699f62895d3be4ba8ff39032504f98
SHA2569c3d77b5c654eb3b1b3d4762d5cc74da4a1a1ebc42047ae32e65b36b273d2385
SHA512d4caf9b459ed387c81cea31baf1d427941353d786b25346382cfa35ca50f9070ad7ef46acabd03a3fa8b3429b5373606b78159c980912e0e6e43ecd6515fbb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bea17989919b119a966229b75c4ca8a
SHA1b6fba96309d4846767cc802131eeab10e9228680
SHA256330dd5347cb8b9b1f0a5e60370cf27d3e4aefae4836b1257f3fd8d0f747f5955
SHA512d733ec6f0081a5674fd57a7772ffd064e964487e614064dc5e67307fabbbf6261617557010f3c48a0f7a2e50025ef362382e224bbb71a7ca66efb99968819073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd7f00c08c2f40d9c66a42ee696a2fc9
SHA1758739b62925d2405f2a0b1bbf58dfae7c4539a9
SHA2569f4aac10924dc78ea98f0ea009697cb552e1b6eed1dc48a0b43a2c0d46a77df8
SHA5127a13992a914f3ef36b6c0f99d2fcac9105be6d7cb4ff0762f2f1ee011f935a833842fecff538ab06f52d4269de8391597ac949fadd41ce2853dcb711a6b64dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589f1c7125da2b51f18f9e7d33ef8ff38
SHA1181cf05c55a8de9b6cd4dd1533eb20ee10630045
SHA256ba9e4095105654f8c330170f0b5920b0e4e00a873783133bbeb264b9c56f0280
SHA512c167014ef3fec9009fd4d2727b67b6d84e73e0cab5c7fd1f73e67db7a9df84052aaa5cad13a5244090b384b191b88f8c7ed8c36b48c1aaf7111d682580087256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51740cfdcfe8aeb78f478cf3562747287
SHA196a8d3884a1c42e4c5f133461b6dfb37d0e81ec6
SHA25645a21052d98e5d74864bc84e49835145395959d3f4caf7c37c59e1253bbc8ff9
SHA512f319cca87b8afd39d5e99c80ac48333f51962aca24404f6b2100421afa1af0363fe64355771c056c0bb1560a280699293b80ae5093f5e273c2a562ac9bcc61ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df422747aa457f69c7a7031090ad2cd
SHA1cbca3faa245dbde3c6a94a2a03e1833a1afb6e14
SHA25610e844971a49ed9656321f3f98ad092f0b1bf0304fe036ec9b00b45e49551459
SHA5128936f1080793def0d3e9f4f5afc53b9d65a398d54d8872a04919d528b2f24c0da52671034643bbc541dfcdb1cf54ae5512e6ff85e35ff126b4c0bbb7b14a587d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c90fa56b6cec5730c7e77812a664401
SHA1b6b680d6c15090ec63dab305a6d2852c76a17701
SHA2566fb64219b8789975a49eee59661edbb647ef373206dc774c853db12ca3f77925
SHA51299aba24bf316ed7d5df702678c29811fb319ddabae5fac7ee2635f53500c10504abd29e067ae268d685972f53b85204d55838e5b817c9e815fb084ab06472b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180f491aec46617b3cddbfd28ed5cf51
SHA1cb2cbc1b1ed60983012c74e228aa43e169fa091c
SHA256dbe75bc9a8aa4c42afcfd46fe61761db58e051008bb1eeb7fcaf6e4631bf34f9
SHA512fc4b0ce8efcd306457daa9f22965a27cea7e600628cb051dba178c3471865b95898e756af26ba240a345d65a77b5663ea98f5b8fbf9ae98ec2553315b116aad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436ae0958b76744d227eb24232a3cb46
SHA137902f6a76cc84f19c9280f53e1518b5ead1715c
SHA25681bb7059888b38e727519662d38a2a5f6783055ceb744800c8a6922a7c610c77
SHA5128828ca98c9521f700b4936a827130bd963a14942fa79912e1659db2bfbbcdb0fc41e5a3c4d7b55b041d5af02a1ba9827f52b2c3b4a36bf3e0cc069c8750df738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdd96fcbe314f8034a8764cd6737cb8a
SHA156c7e522c56825e2900ed26a5db6c959457d5cdc
SHA256a449e4b4138f4cf31579b8735e4d84d7bbb92f3cbdc470c98c5305cf01ef9e5a
SHA512a060e523f533a84685b4b87be3cb895d6fd225723af8ef747f476178821cf8aee5990ac0abaa26115ebc429d01b30e3fcf66403ab4094143be106571350afa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56267f52e226640018fe2c4c81a95cdbb
SHA1ff0152072c68ef5dd3d75330488b422de371f9d0
SHA256f6a35381a416167cd3b5323cdd47b59f4eb287b62241a0ff91ae9536d447081c
SHA512400cfde618f9efa310080a0b2016d617cf505e287e444350e423a1c9577dbbaec06f90f776980508c9a8774759033feff0b83a4fa5611d86fc4528779c48decd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdd67fadfea7cae4976c3c626a827ce
SHA1c33ecc9872fd5136360d0fc061d35a5742338120
SHA2562c21aac99293f8ae9e7bf7e8a7b7b3842211eae931fc907be2202768678d1e59
SHA512d1b1184db14a6aef655e72f22ad433440fc6680e207284620ad0e399bcbbe602890b4f09986def4164471e0c9225450e4f6f8c4da9d0a239b255b9a32fa340a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e86cff9819df9ab68631b0cc5406c3
SHA1c87464f5838a04f579139faf3a6fe7d086e34873
SHA256b235acc5eac3802bdc7999f0388d03d7c703941ae949ec9de4c3e1c9f337da5f
SHA512e57f1fe23839f78c96df23f464eb519829be7a5de2402d976a5348c4e1757bd8a6ab369f9bda48bfa744d7e9c60624e991f4f76110b0b1f1d51b20eed61f1c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52096fe5c0ebdfb015ebb2c1721c9d29f
SHA16a0cfd4863fb023cffedba2f90f68b61026cfceb
SHA2568cd5dd9246cd538c3fb914f4f9107de99d50aa28989c6a6d4f01986ed08cde0a
SHA512496e6d19ce162d6ff22697e267fca9dd68a85d2002d6695e73144456827311645790bae76ff73b3d73580c978d4239c532ebe5ccaaf9e1a0a668d796e6b4b440
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a