Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
4398a09eb30ad9ba475f12dd0da38e73_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4398a09eb30ad9ba475f12dd0da38e73_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4398a09eb30ad9ba475f12dd0da38e73_JaffaCakes118.html
-
Size
763B
-
MD5
4398a09eb30ad9ba475f12dd0da38e73
-
SHA1
956c4345eb1bf5b00d11ae7cba1e7478002051d6
-
SHA256
7e30080187c8a7c526999551f377e7e28cb634460ea3fc3004347b54c3810d7f
-
SHA512
8f942c91eb4552626f0fe36b785341d8524371341f57a3a07d98fc6d85509b547572242c04789b556491ebbada49f4f9b9f204b7801b2367e25a1ffe09ad0c3c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102900ec57a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000315cdd9d450c75e3b88b3e80fe95c4c540396deb0f65147d3cbff5a781bfa8c8000000000e80000000020000200000002d0e860914ed554208bbeb2ae66f2bc0bc81b8f226436fbcecfa53a4b4846271200000004785c494f680284cf9f3f941315624f03399e7e3ebadd0a165f55b4580f82b39400000000241ef37d989870f6f3e54f606475b837c19f54eb810fcdc56b6941d9eef9b8f4c2702be599982f1293baad48df5799a13f6346e36051807548b572b8edd0e59 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{288385D1-124B-11EF-9449-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421891815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000ecdd7e34c00e371577dc4bef21e4eb25f629ada07c0408083654cbeb93440dc000000000e8000000002000020000000df520fec667de8ed2ec9672d414358093bf0885185448d04f55178f2499a05d790000000cae760d453d3f9c9509876275717180c29f4ac1cc848a0d63027dbecfd640911727a5423ab2842a2d53f25641bea0844fc508fdd4608faca6e492da2e529d8e5dd8289ab833c1f9df9ca08fbd4326113f716a2c8feeb2f9e24e095b2b07db6e05aec9013327865bcf22c7db8b0264048ecc3ff8d91eaaa942f889f610e6cef45cb972827811f65cb111c7bd65abf5561400000008f060918637c6eba0a151cbadc01bcb16c3f5ed4bbb6bf9d4cb35a57f31439ba9d75a4fdde47c2ebabebffeeb60f61da06fe0215b7d3bef93788b7ef8d19ccfa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2108 2128 iexplore.exe 28 PID 2128 wrote to memory of 2108 2128 iexplore.exe 28 PID 2128 wrote to memory of 2108 2128 iexplore.exe 28 PID 2128 wrote to memory of 2108 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4398a09eb30ad9ba475f12dd0da38e73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1c3db6444dcdece8e81dc297f8bfae4
SHA1f1675c2ea00a01e01386214dc9a3b3b953434ea7
SHA256034d89666934bd075f4a65fbd5227e5930384c513b4a779c981051f658451ad0
SHA512aa13eda355546398c64ecbdee1f24335cea3432c37bd11b8cc47b70f91aae27b16d1c1a17d5a07202b598f79114f39a8d920dddb830dcd379a99570c7dd6f0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bff30c25cac8677f7473948284acd5b5
SHA17c0aa341c8751e3992d74af3ec6032bb4e4d5155
SHA256a4f7d3b1f0c9e405c99d6cb160b921ff3ff964eb18d095c86dd425d9397e8c7d
SHA512d33caf153c65419bb0991164a349c369ecbc04d6c4039b59d08d177a42eacf9b66114354e748b264fc331adad0e5fd698648346d1d3716cc96657a556e338f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7d57090b4b611da42ee90fecc6c9e0f
SHA1fe59aba7b38ab4a90c5faff74102196e995f472e
SHA2566729fe03ae385b46c481ad65734e8e503e2a07c78b19d97f440484ff21caec16
SHA512a3940796ce77a8500f83eda3600e4f7a667b5cc4d57bba707a39e9f79e87bb291dab0f6fd2f6cdfb6b89d1a8418401830e6185f9045839617bd2a9afc2554d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587ca8ec52adf9101e77f34dbd99e6a61
SHA1faf7918f6b8ec4de7b5237079fcd5773fa7115e0
SHA256db035946cb736dff3a0fa7fe8e87710c15722e7cba7be596098fa8f2f5b087dc
SHA512ddf8a17901b6939d2b35c2995db14e56ee557d18d785b59ea56dd28528c1787e7088438147499e65415fceaa77c59b9f6ea44b972fae19ca2ac1d28adf1046f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb64027dddf52b8aaba080e107a97f3
SHA1549c997198e62c71637ed9e7d58f248016a72f0d
SHA25625b4b91d4409a8024d2c0cbf00b5c8c09bb475a17abb524eb1aefaad12e7b9a0
SHA512c7d2f52b73a56a473e56a8c4973ac57abc08d267c9a42312026317724867c3fb73fbeb76da60a200f08844e7e8d031e1fbcb2b83c438f081a20b310839d7c495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270216f13e4dea15720dce2aef34e7ee
SHA1dc75477535a1515622255d3edd11160416be0ee6
SHA2562451e423b65e76236c44f970a5990b33a078189fb6577fe391f4c3210a5d0226
SHA512f83c81deb43a82395516a99c4aee9ab6b854d2941797447cb7b76dd2d04de8baefba27ec479bcd9d9bb19adbfc7166c4b34e89209be4ee1292d099b74c593bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba268386e8d2d158f92cfa2c7b15cf75
SHA16fc79ff17dbb9836a030de0af380f47c41a9d0b5
SHA256b585e702c97e3e0c5350c42e7d929941ceb6175576e40f2a31e779f3e19db3ed
SHA512b572f35adfda564d4647c83bee183be2270171a287eb4b83b8444b90cfb3e84b95aa28ddd52dfbc7d0f977a18168f76d3ee65ce9f99f41468640ed7662187660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3b53e959e54c46234404ec9cf6a232
SHA1421d7095423f139013bc0ff4a0efa59ccd1f5204
SHA256ce58e7be49988b8fde1aa2b75017bf02f1ea29b0a0dab7895468d84d73f3359f
SHA5129e2321263005f3a44800a4375931df97c05ad612c83582b40b4bc324154374e81ad8a12865c5229b616d6c8da9d2907b72545df74add12aa9dc32a8a74055ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a7360c1d19afa4119aeaa02e09f2cd
SHA10307340b14369a83dbe0ad176abbdbe12e4ac577
SHA2565954c0138221d325531e3c8713a05688773abe7d05be74222228a69d8795e8b6
SHA5125cc1b62c6977b9b1e40ab981ec050bbc3dadd6cbb373390e5d1b4d8255ae072e1fffd57ee9c9c4a3627fc563880bcca9b4fc5ce8858ad1588f413c3d65c9c126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d6e0f675048f0f387e9fb6ff197164a
SHA17bebb8b7f862a22da56b6b479a1da76262c3d1b3
SHA2568459b7bf068fc856d3c2e0c1eaba0f384c9389976d381e48161e73f6f9778393
SHA5121ee7e8e78b0e522daedf11a93aecce912d1f1ed5fdd6bfa6173ae552ca4371a2d42b0a868bae04cf546f7a0649a0cb36a7819b9d17c48006ce351336c4361b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58272da0615bce7a76fb3e720634ec03d
SHA19721c0a0456c29a8ca41cb19f2a1e8f9a11c6f99
SHA2562c860ee3a0c7d12a7eba3a40b61f7e16379eae66150b2bdbd3382556f1fbf794
SHA51292a231a89f174b2f266e7380b9aae3b69affedbc6023ce93bb44e8620260440b8870a841ad6f187a4f2ae0a3e6f68aab2ea5658a56e9636b986e13766276800d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b536659cc953703bad1361deefbd0e9
SHA1bd7944dcc4ad0b7786e4e61c8b3ad908f8bbdec9
SHA2568f1e8feeae89ee940580a09bf73d30d0b1efb38d3386621712391b0efb896e96
SHA5123fb8fdb3bc2e2b5ec7568a0c7f7b78e4622662108fb2c8defa25e34febdc7041bfa0714866968152a729dd7649798f3e919f8fd4760f16763bd80a1ff5e5298d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d811e83369c1aba20695949aaa8cb0f
SHA1bc208a3a834c5ef1ce84bd22dd9e386359b9c31b
SHA256bf9e46a082f684b430bd28a56002afc36db1005113f27bc43411792c26ea211a
SHA51273f935aa3ebc1ca4483a8477d61a983d4323fbc3bea88f1897c7b220eaad6b274cc426c5a67d5c1f438ff8c17cedfada0e27308bb7731fa5661cffc0d85d28df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed2402632b8eeaf33205dbe1f84eebf1
SHA19ed156a2cad0f4d7ed6704d73f0f6cd195b816a0
SHA256faa04355675002c0ef0fdc8c006be5cd3be6043eb7124d20b03cf618beaeb1f8
SHA5124efc32c2f080f4d789a8f580d46727cd43cafe9f9ab6c936370e8de2e039911eb581540041b98943f8dbfd338921b46908a26d1bf8f5d92492d906b774fd1a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7e8fe609d74409d2f4a7cb0420c6da3
SHA13b9815ea41d5a2fcc2c588dd2b59bc1e8e3b81ed
SHA2566f3b5f0a434c8538ccb2aacffaf09e6993c82699838fb62909cc64457c8a4caf
SHA512ee8796308fcbc51a1b6c67e2a51d24cda40f806d368a4b9ae534a8dcfcd3ad81d1e2b790b138cf638c28c6c61fb1fdd0203de2d5eaacd72b5feb4ad08b6cf4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff3b4d1453131bc8af2d1f82a1a4290
SHA1af4b6cb4c09754e40389fd41d85809062f80db9e
SHA2560e827f27061f530f6caacbb3348894adcbe9a456e26f92ac5432215555d8861c
SHA51207cbede8f6f2f1e0e47e3c9175458fad5c64ccc79da7d2a5d438a5062a643cde651d4a3a6b4a6ba7340a68de0eb1fbdc2d0e46a85715dc5bf38cd0b72bc4d19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596834c4a249ab90b39f2a6ee7860e60a
SHA159103f7b667ad4fa40cb2b6d4b66421deea45c81
SHA256df4930d855a5e5967c6aa96f5a4050b170ea418f3fe884e52ec8ea97232cb559
SHA51280378431e2129ed72c25b168e0d9df0c52d55bbc4f03b8d3ee4d6ed4ada5d4efbaa028576dc9e9f9e36889194296f0e9b2234ca2c10acc63605daed5b92060f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd4a1801dd440447468d06502d6d52d
SHA13bfeffd091f2f8a866a52bbd22be68ebc4d2fac5
SHA2567f6c5e0edac5d31a521d76b5c12f1b1b0d216ce5f09fa7d22b856411d2f63eb9
SHA5123dfa721ffc15f8b9509a3830804d2df6c76ba0229d1b85397c522f4c1ac1893852577ad51376b11f64fbfcf2ef1037aef5d32258bea5938e189b5adc5d6734bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b2e2937f74fbaad38d34d21606e998
SHA1ddf9f6ce7ce8496fa658ee826ff407b32119c8d5
SHA256477b0d71e51dd7c80e9b31ff27b9b20890ba3f88c6295460e0ac5bfa0ec97d09
SHA51225f337e1eecc22d9142b5550f82374ee6bf262697b7610ba284c3c17146e4bdcd2baac24a44d7763649224e8fa2c599732866b17816c235da7256a044d2ac3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5cd6017288c88a619b08b4acc434431
SHA1cd2bee0ffff38fc1bd58e54c08c17a02cdf99db5
SHA256338585bd45338be0307e63fc2490bc75557ea05288b098975edb5b79c9cbdc5b
SHA5129878da2f350670679819109f727dd2f40d9ca6a0aeb9ff6820b06be253996ccaf6a8901f1cd141a18d0d73d2052450c7a00a085f075dec006576077a545d606a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a