Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
3ec2e6c08579c7c1c1b3642d6bee3298_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ec2e6c08579c7c1c1b3642d6bee3298_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3ec2e6c08579c7c1c1b3642d6bee3298_JaffaCakes118.html
-
Size
36KB
-
MD5
3ec2e6c08579c7c1c1b3642d6bee3298
-
SHA1
d739007f24c5018bebf246bdd7bd0193114d160d
-
SHA256
748f497e4a5e1456f48d0987d220dba5c5da9f6b7a98e32ebed8dd2208b6a9f9
-
SHA512
ffe0f218a992972c717c0ab5ef614fdc20b11fdef41eeb216860cff43e25ed51c05aaa6c19f5c8d8fad545b5a4e19dc134dac6d2b853e301c7ba5565186161f0
-
SSDEEP
768:xQ3reKEPy/xGn9DO0vXE75HxPlGZLC9hkny0+wn9A:xQ3r9/xGn9DO0vXE75HxPlGJC9hkn1+T
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8A481D1-1109-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421753733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f84581d4fef248607c6decead42dbe24eb402ee85a980f3b93e5db62c445382b000000000e80000000020000200000007f3c2b4ea0b848c078b11a5e198ec9dbd3071cf5d215cb5a523f58855b2f9e8990000000867fd363b5e71f4506494d217f2e8ca83957c52c7178f1219d48fdc901695fdebf0da938087675c477432fe91d4fa473362ea51b19f3b782ecb78109db21a3b6d3fec997af8df3c189957d237bfbd5d37bb52cac3c7225002e232f1a9efeb00af222194089a8e5ae1a0c7767c6252f7eb0b924bbec104afc0b007a8b3082e654acb881977c72a3498329a3c1ebff315040000000c34c3e9500dc6b700b4ac5a3d40fa3cf7255e1c453588e215d7838d3f768eed68c1c216b0625a2666a96eeb21add08efe5e2d307630d3a0f2b9bdab52cbea596 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bed67d16a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000358ebcd7987a9ff277db1aa39505ad762039dfdcac71a7f46079ba0ed3e32a2000000000e800000000200002000000067d6b6581751f55a5f50d0964244f03a34511a7b8551b31293f87562fa70316820000000a05f09c2402be8db7ace8b6085217eb2133de031bba6092b7781db57dff7045e40000000001281a82fd95195d23064265f735d57cb529589a86fedc255b1c2cc2fda48afe0278ff3d3389d5f2e8c016b434a938180de3f72945f5214b40ae80b30ce301a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3044 2892 iexplore.exe 28 PID 2892 wrote to memory of 3044 2892 iexplore.exe 28 PID 2892 wrote to memory of 3044 2892 iexplore.exe 28 PID 2892 wrote to memory of 3044 2892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ec2e6c08579c7c1c1b3642d6bee3298_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9741c27862674f724bdfa2736637759
SHA1fc4b5aa49ec202e348c6d15162b0d1f6d904761a
SHA2567f94a47b5c4939960599611cf8c83cd4899c3659330080f0179d01abb248d32e
SHA512da170d0ec827e953b796475f61a83f4bc671c8c405c427ce78dcad9623c804ce1a4dd5c11bad82f23ead3fbe66b86601895f21aaa7d16795cb4c86875d21a2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c212584ad9b0cc481be4d41ff2631175
SHA1b7a292db3a3920149a948f64bcb82525536ce263
SHA256c85edd41b3146582a59158d075adc9b5160eef107c1acb0989b9afd41d472152
SHA512d89c4d99ad3afa4445fba9df2e10dc1ce6e3ad7d0ac22c2e811b8b915cbd30e607a4e05118ad7bc729fb3a27e0ff69ea5013f7ffbfc46875dca4a3b9c76a6a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188cdf576a068ae7dea6d01d0573f04b
SHA167dd66c8e804767078f4b24323803bc70e992f8d
SHA2564c0258ae544c9095ecf4aa1baa85d5e3f28d2e2e280db71f9be9eb38bb35e1ca
SHA512d74012cc98584ca74af966266e14a91384f07c930c86f81fa8d8238019d442085bd331343932d452d4b8eb932b3f18847a11769c6c121bc3b8fe41aa5aa82c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde2a3509bd2d888d01aa5db4c85a1f9
SHA131784f0e30f1c49c72c09423554df11c51091833
SHA256dbb79bd781bd4dcd886c553d3e58e735692075db4bd0c0f3559510a523bff7f8
SHA5129a8ea5c5062d6f48d1f2a1b34e83e27f0823dd558fc2afb1886e53ca7037ff8d5feb2d7f8c59ee437554014af7b0310cec538a5ff271485d93ff81a8d2aae8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a90ec823362393c6442b1c9e64ea6d6f
SHA18e7a2344fe21fdc6a5a1ad8c6fb30b5099eb288b
SHA256a225f7e9c84575578a5f035dfef9e7a54702a09e7ae4148f9216c4eef4cd5d14
SHA512913ef9ee3b1d3d1fcd6bc85f873746fc837dbeef6c714a5f12358b0327194de54f5877d2fea378b9127d61b8b2986439d09ca2e051334b4423de50041af91349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665582fa969109b9b47371a3e02d7e14
SHA12f3baf7170d9e5477d9204b77207f2c283b95ec2
SHA2564c5eddae6dbb4b719106490f3c41992f414793440c8a545b75451668ab6e348f
SHA5126e6e1c96f500abe25c579b62188d49fe94f6b92204bba2be4205c5a1a259924775a9327befc857bc51498556aada2740d4131b0a52ed5177503020aa069bdce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db4cac09f2488c2928d53bcb2006293
SHA1f5bf95b3461172442f4aa4368ef4fb1814128165
SHA2564ce7f4a657e583f75712c85d75fd8a4e8cbc4cd50edbc2131a5a3335bb0103f5
SHA51250e4486ce9dd754805f893f46472d7f8736acd44f3cdb15b860837296e9e767ae6e816288536c846d00ffdfee1a44db88e2e0711ef94e38d99575f8c29e7c089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533240f66a0d06a0497d819fd6074bc5
SHA1db7b01369cecf138a0a2e21a31ddec2a2f88a0fb
SHA256d5af64b0ae9cde13e6177e7066fb684586ef9b0235f403e9e30aeffdd6334bca
SHA512204fc4a69d51cd7d59abe9b865c98643c2fb204295a8fbeddeee23f4aed6c159c6e0f8d16e0de7bceb831e6c22bbfc4171a0d3ca78fb5d0c36abc9c6c810d228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a631df99b21c0c3a5eb7fbe439583af
SHA1517ca8fdbf58bfd87ab14a9c80095558a4924a81
SHA256b7e1ac2ffa71783dc05f78ed325540b66f182656aafa93bdfd461d3533962dba
SHA512fd4b4586804537a42c160880e3ddf644021f8d273c1eb15cc93bb802a58a83e1c2706f68c0938640c006178673133aa300a123988cc737923f774426cde56363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d414b10fb2f4e2517f4eb11d5481de4
SHA1fe582437c36862a9b8149f6e5ba7a8455a8b0206
SHA25661cbff0ea114254ed86ee191f703b2693dfdbfcf412e5d59cb32a584fae0cce8
SHA512618e5b9f0716b95db9e4f777e30a2fad1a3ee4f1c699329b7b436792ea8bcc0a1cdc71d09c186e83131ba462e266b03e7b4d7321849befa1efd35a753b8dfb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a364a8c150e62992f9faf1f430e6c34
SHA1a8758213f4a65426029ad28bf0f34328be161c22
SHA2563e5634fc91f8b209561b24c71d8ddc7a1b8e9133411529d9a01662ad8969594f
SHA5120758a7af28472b63c90dacb77cd1074c3c2e8b0f9ea7f461764d88ef75487a715a8c529997eb999be1c2501a521af8734d5d6995122ab080a03ae3076f7f3562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b69a97cac0eb86bdbdd67e7c593cf843
SHA13122465c08fa621783e503d93b83eab46b75b3fa
SHA256b4103a91be0c90515ac1b68fa35e9c46a70264e34d631f1bd1c1988c3c655132
SHA512436290bd5518bb9b1836ba6347fe8b8af9a43d988c9fc8619d1c965667fc3924e5bc64b9b5a0806bb4e7a9efb62f7137ef7448707d7488f59c05d74d324de95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880cd3990e386e5c7b713adc69080665
SHA13ed29641658fa6c3ad80b85e152a4f84e023cf8e
SHA256d0124c1e5e143610cbf86c98d3c5d489794b4dfc1339b06b6ddad0ca2229c362
SHA5125ff50250325bb54e9731212cec713d9176de5f2fe59745385310cb8cbbd7df3419e07edd263634780b8d581fdf007ca8e97b7cb8bd2a8e3e6fd645578d521976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad7b7310d6a6c5ffbf228880e3fe3e19
SHA1ea37e700d534083487aaa7014969b714bc9b71fa
SHA256b99da284cc77c9de8be46422df76342081faa6e1302c0f82b5bff105cf6c8943
SHA5125a5eef2ceeef54e246c789db5fc300397ce50654fb0edf342749bc8c8a0e0ea537e64ba9b7e0d866610ed458c73ea33f5a0012b229c21fdce2c7491ca8c0caa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e68487dccede900f805715ba8474938e
SHA1e8af6806a5c1740405e4d20ddab522dab4db6a02
SHA256ed2f28a517c26865aa6a5b31de07c3158739c30983c1635463bf7ec36dd5ee7d
SHA5121a7617abf79b29c8de31eb1b024055fc260cc5ca0e7833da7fd66f0c2884d4dfe6bc9c6e29470247787241248336714f3c0af57d81d2d346759aadb9ca81914b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3802f01964aec73a0ad8b1a8c22404a
SHA1dc567c70376639461fc4d6d67b9bff47979b464c
SHA256059355b15455d639c08d5b86cd74fa914cbf4665c95c4cec3617730426fd3bb1
SHA512a6df965cceeb1b122d70cffd230e3b2408b4add5aa87bd81ddb6a08ff95f14be6061120e6891e34072654087a0f97d3b3d1624908ca9a8d46f842358ab3bc010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56c02c68567754b19c3037f35aee790
SHA1b299cc5d4fec4010264990fe60cb0ce1a73db1b2
SHA25644514ded4916632c5057f20cb65f3c91677d17198e9411eb3012d11ec95c43b7
SHA512c6919e11489a6ce2743e0fc82d8ccc807da9f3a339d1a71ea56cdef572f98cadd93838a390a69c6b091d49091a7ea6416accb5a7c30cd7bf7f5d39d909f66e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48ded0e23a2637328aa7ec3e2039270
SHA11319a96ce60995d375cb90c6a4194cb69fc8c81d
SHA2569d0083e93feb1b6b1f03e042fc67128b96dee2950bacfac37a47b5bf1257b928
SHA512984f250ea00530470418063505b7f8faf8b117f3efed33e8baa96ace3acc6ffab2f0a5689da958bbe914af504faeb5dead9c1077ee01eaedca05ea6e50c2d8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b4a4e761ac8801d644c801b2501400
SHA1b3e709a045f36f26bbe529fcd5a66ba006e29df4
SHA2562d71331b2baa78d88f279692eec5e97a6fb864beaef8511aa895e2b747aa34bd
SHA5126de7c5aee75898544cc7d91a276c7deafc0fa999e2dae9e1dd7a93d66b3d41fa1cc89d4286109ab3d16ecb37a680d234053d1afdd8ac658cf54a2b973d1e1860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bb13e6635db182a370942ba81097b0a
SHA1d2c42356837694aebd557c675d7883d504ef6d68
SHA2569c81ed7d3d67c2e20e65bfbc22159614873bdbb5f905793413453e483040a049
SHA512b14cd915f20d914a0f87adac9e1e33df920d271e1415a551ecad04db7724eda8d228cc952dcc437a1d3601d2a1953e288d3b4df9115dea3c0974a0d9ce6a7969
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a