Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
4619ef0880d04bba44714b32ac1b45ad_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4619ef0880d04bba44714b32ac1b45ad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4619ef0880d04bba44714b32ac1b45ad_JaffaCakes118.html
-
Size
55KB
-
MD5
4619ef0880d04bba44714b32ac1b45ad
-
SHA1
75dbe5f29dc7764ccce209c4606b9b88c6f15987
-
SHA256
65dfd4e18b9e56410a18eb742633a4ce88a93c4732770ee1ce42766afcd651e8
-
SHA512
6614fc44fe316745bfd188c7807812e48cfb10164b0a8df013a98ba3271527ad1a8ffc15d620212b8929c55e125b43633a29d5d2e199c51ed8a07afbc10c4c3a
-
SSDEEP
1536:etH0K8cxIu0EMt8U5naxqpdnlVdNR2AODdL/dDdyiDdKmQhHzzo5YAgz0kpFh0Yb:J3u0rtL51dnlVdNR2AOZL/dZyiZKmQh5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d3a561c0a6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ff698498399861b91b62834b538a57e03cd1720321bdb353e8f2290ccfa0427b000000000e8000000002000020000000b4501226c87c7f5e6428fe2ea6ccba84fd00cc37723814c653b9d8a76bc2cf6e200000000641f5361ef62a64afb80b573322c08ebfbf853e9e35208d98974f045d9a1bb1400000001910b7a9e568940ca208b900d8d4ec434ee432a576bad6b910fe16a103b9cf391d8f8b21b0dc5b30d08c26dbfa8cab655df222c4ac477f7cdcbc87bf2c3f44cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421936542" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B4473F1-12B3-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000037e106953094c2d159d9a610ecfc97568d3fe6fe5269048310ea57c6552f5790000000000e8000000002000020000000c411be757847ae3d42b23200acdd2a368996c94fefe92785a3287eab4fba6898900000000f7a06d67e2be86cbc8164701c146004593cce7488c5dd938dfde1cd8ea2b2ff62e7b5ba1539387e6ad3e066c6f8c4d0dd85afece3a608c8b19c6bb0bb50d38a3eab6248516bb2b620e8b931efc0833216694b79b2a8b1fc4f9a7d9bfa0ad8944d84665c3ff207f8422ace78afb330336fec77d5b64b39b047073eb80b00a3c087701dd1fd30731ffd3fb62f7f8589ae40000000bc6c199b6034bb4ffb56ccb959e01dfb6594a895f3e4bd89870ad2379af07f288247ce3fc8f8e2c7dc1039c8b346583b28612348e094096b8e6f8ed2fe65220a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1968 2600 iexplore.exe 28 PID 2600 wrote to memory of 1968 2600 iexplore.exe 28 PID 2600 wrote to memory of 1968 2600 iexplore.exe 28 PID 2600 wrote to memory of 1968 2600 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4619ef0880d04bba44714b32ac1b45ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c5812212164b83968df808855b8c3e0
SHA1f7530e119c97d9c3889600b92c5aa48e31e04984
SHA256adf3272319cb200270e2aca0845ebc2c26231cae5efa3bf06785ee94e72a5dd4
SHA5120cb59b4943a9560bac439e854c4c970aba9bb138561c0206ee09eb631cc9760df94e42ff10e658c3f9668930e164e6447b5a3d7bda9296a33f7ea06e8da3677d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d4978dd58976986f51f824749088f31
SHA198f80d82de34f78da342e944ceea32d060b8d8ad
SHA2567d233a314b1d7e5762ef2470992256bc08da12a9d1bb37e6d8d1fb938e7625ff
SHA5128521f4f1ba798378a2344b2e6602a36bc5588453eff244ca74f71967f29edd337aa4c94c5cb4a4ea61b11b843db54b076273489aa3ea215818a23da16022433f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d45d02d9426865734378fcdf37350ff
SHA1cefc876650ae15f44b7e303713fe956e7ad3807c
SHA256a89d1bd0c0181f9c004167ee8a293288ffa649f1009ae1e6892cc39b987ad116
SHA5129810fd41d506c52b8f85097858a2e47519669edffe6618617247acebdc7f884926278ab9a7b38ba6d836e7014c288f1ac34da9b333c91e0cc534d0c33a2275b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f498ff59c817766d48aa0481ae09a7
SHA11726ad6705b27598c3b8ea8e1088ae095f1bcf3c
SHA25605f98bc4a4a4a88144477897daa56777bc064cec81fcfc50b5403add8ef03dc1
SHA51291ea32d74ccc2bc3b5d9b6f290e89bedd3e11b4e0f9d007f305560f09c662cbda1584af10779495e08ba1ff504ff3196a5589d66883c0aa6827fa9f7c09e5135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55387feb99aa5cbb7fe8ccf88969a90b6
SHA1ca4588ff0d36a2d2f25a35a47b34f2aa77b0ca37
SHA256f19a30f825e70e86f9c7f3ca1d6a3bc527bf6b7a92ac4f360864ebe666006f4d
SHA51277dda084dd417764224f000f12777021eff4d9a24b27b8cc715de4df20efdf52c4bab4573a44750c4e3830ab2c1f35125c642acd14dc2189bf3fbcb2c2326a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587be99902d6814c323b9c5aab79d2222
SHA1563948ab8d69913d4cf904a809b1bf8fa905576a
SHA25626d8f2f85447939a025b057f5685c174ed12d74f732fee447904b73a6df2b0af
SHA51288849abf3a0d60bf653d068967c39a12927a540a7d77684938ba3dbd41402169fe5b6814dcc6dca5db8d11058b86b89ddf056abcff133e9d7f5172f2157f413b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b08ce1601ddda8ea09d4cb7d94c779
SHA17011af5c7450a75735c010fd925a093e7031721a
SHA25619ac3b980d2192183300d20b94d4855f0f467bcec31526c51efc4054ec6b5cbc
SHA5128c3547befb4b8c96a3a973b0dd0900a3702a725f94484c1c5563965bb852a7b7d4bab2b2f742cca29283c7ae2836e61373ac063e110b0614ccf956314800db3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5101cb1907389301f0d824d2676e50172
SHA139b2cdb28cd72a90278cc7776d14d521337b9d58
SHA256cf28d4276c08bb8cf8acda1384cd0cabe78d8a14d52b53b058f65318f74aa297
SHA512a2bdcfe43336554dc2f41b4c4d1e75c0f66b0a4cd572f0359668421deaae8e056ba5c6221b2d2e5559c931932a1626e844baf6680bf9926362033bd7152ff68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67e997e87965e52c73d187f536acdb0
SHA1b83f766a424434be96c73e04407bbbefb0266001
SHA256cb4bd6b1c1dac5e8ad368778fa6dc533e498b56362cc818315d9e0a13a877bdc
SHA512c020279ebbd650788348e10f6cbcf8ea04d4498bae844f39795738094a4ba1c913f49f88923db7735f032c6e613b5efe6525791d4deed175219d03a037272e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f4301c19ecfb2f241dd683e5631876e
SHA197de1aee993ddc62d8be15f1fc080565a5fe7d84
SHA2566443ba862bb4c84926840cd2866208fe9aa0edffd5f072efce5a6660b7647ac8
SHA5122640236efdb8071741a15c756e95b2e632192ccc99dba07bfbc26392125931cca1ac2c26257284aff6fc31cfa20e3d91ab4130a77011c09c9ab76b0e4f238351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea014de822caf9ea78e17c351289e45f
SHA187ceb3be93e976223194d0b252ef913ea717d818
SHA256c3d9f973778a2ab90a7ae267ca29b947966658b2a7b9ae1ac888085ab9315943
SHA51205b1ccf42258f9324de41037c631c222b550ddd367dedc588e99e4b748d9661a1b6695aa850f36c8cd088dca13fa08398baccd0014826ac7a516136aec5df808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2ccd7b7fd908e2e7942dd8cb3a52f1
SHA160aff6b7179b4c2e27af72e48bc72d8069f33fa9
SHA256cce9eeb619018012b42bc562f342189f920f0466c6e443d1b2b64a45a601e675
SHA512095b3b7a68852e112f5c49b208c47d7979cf2f389f3265ca880e844bbb82deec57e3d7fe1d9c2984a4b1df80af77e5b51d9698f67a88d2ef90d43508c975f936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357d2dc3f5e22908193c851f493222ea
SHA180d2ef76334aafbaf450149350a3fb3959980c87
SHA256c82a07295dd51fc58b920cca110bfde00b13f03df1e413e9234b88ebbb72a2e9
SHA51265de04b9d909f91a2c6659e98ff72189d76b00262a429026d26757b70a7f9106f30a1e46c9d64ce80f7926a482c9e07f3b3e4364e7d0e101af04f8af0841e806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52627d49fa0beef48e6f8c587d0202275
SHA1bba2f06235bbe07166e2012b740cb9f4d22109e5
SHA2560ec4b67760f4ddd7b99cd1f343717e221d9bd5d97b074f19720c880a3a46fb2c
SHA5128afc440e7fd42d87e6e418117a7265eed0a1ee7a1186e607a78d4be8cd30c7f4a7b6fbc901cc8e1e6ab793bd5d7c537dcb34e019010e3d0db251c57e676953f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115fafaae7a75a45073fbbb5c1b5619a
SHA179bb89336955a7a49426860450876a8143faa4fa
SHA25681f745fc78cb59632f3702063c83e00d0c11d34f48a4b877258888cc9d2dd821
SHA5124c99045f20dce3c71e0fe4c5e63aed79512b4c8a761d5ee68989cea78dcf9b2cff06b87dd3aa8db1b7420ed239c7eeca4a2fc57af12fe23bee572a6c50d8100f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ec7ebcee7eb56f917d0d4ae99a6b5d1
SHA1dcdcdbbda748be791ac451c0c61dc30d024ca872
SHA256818ab784785ba55f4d1a7ec9bed3b6c9e86e0f477a009871a1be549508160dc7
SHA512a34b88191d6e6f0e91fd2ac1f004b5d47b1e83bb0719c377ce3dee33be18fcaae392d1d80f1bd56cc989dbc2549a541b3a93f589759f2b49f4c88dcc81174fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b01423fa8d95a72bfe87da3b1639ef5
SHA17cd8c1a0fa0e9f44325fcd90d2fd1e744704e9ca
SHA256a418fb05e762697af641edd406ec3c24f75a801a8a990ffeb3984c77b55e52cd
SHA512dd7fe87a09cec684931cb3c29fb8fcc9dc198158a08d209cf5dc12a7042aa67339a178cd55c80ebf5c4cff5d11fc8923a52a1ccfc526d4e0f7983879af36e19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ca3d35ea3872b689abff55a60ccc163
SHA165f8f23370920e00d458e1c6ce7ec086a8a5a139
SHA2560dc3fef50618d38c616ebad1d0ea38153154a786b7e20646a921f386923a9c9f
SHA512748b8d8ca82aed29e89ccecb5e795db683b5361b93b62a1466c05c885cfe9d7a5d3cda5c1c3711ec1585db6577324ce2ef19b6d9cfde6b7b96bd96e16b2b8df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac932783b07d7432ba95ec2cfca8c302
SHA13317e883d369abee54dddcbdf7956b09b1f1908d
SHA25601d71d2064b0b629f53c421a3367b70fcb8a1ed5662d96161e15193faa7b0a33
SHA5129ba978a981f7604a95171e9d3abc5084a0847b5b4f87c67b414687fe6c269d5116d9e986c3e556e996e50f9f921a88c41669fa2f87e27fc6dfe1dbd9a3c8d98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381a3707fabb57ed19e88b1c6b6534b3
SHA179edc89723b2695ed88cd050ea93c36adfc66b0c
SHA256653ac79fc7ff7abc2c8172e9c04978f0a1f5a096843c9a351912420ee6f98168
SHA5122cb6146cf82b2fcd3e56735963d89d5df5d037bd768afcb0c8412ddc15105567abf46de1dcead9f08f981a481808963572899383c9e34f49f41afc2f0e411da3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a