Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
6478759dc2e6bbdaac82ecab4b677c58_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6478759dc2e6bbdaac82ecab4b677c58_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6478759dc2e6bbdaac82ecab4b677c58_JaffaCakes118.html
-
Size
3KB
-
MD5
6478759dc2e6bbdaac82ecab4b677c58
-
SHA1
95499bd5ec99f82232d0879f3dfde86baba03b8a
-
SHA256
8d3c9cdfcfe8c652b599db5f8db6e11e6b8006171535688f5c80231586fde290
-
SHA512
046d28ec4ca17700b4e92586a945b1e22325e8ef747f5da7acaf5a4a6c6af7aac85c6f778b57d8d3540079fa42082a8efc7dd3b53897fea6e47cb180c4817428
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89F9D6A1-17A7-11EF-8E71-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001451a1fc68a2c24eb2ba5921e154588f00000000020000000000106600000001000020000000cc24555e29c6007176675cb59ecb4c086a623a4b7e397fa76d41d555e50a6cdb000000000e8000000002000020000000c2df7677da282ba5d4ed106d097c24568c7fe4ab9acd6f50698d4dadd7a3bce020000000591bed0793da6db5965268a363b238b4838cef2f735cc55647f25ab605fdd77e400000008737c01e040185100d6fc8c2acb08c8732365ca54cc52fed9550d5e89aa3246d3ad0e0bf0ce3f742cc310f7e7b2bdfa0c4fa6f37d8ce755148c1ef860355df38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001451a1fc68a2c24eb2ba5921e154588f00000000020000000000106600000001000020000000f2f6ac86083ebbb3f98cc76dfdafc61536b82d0866ce41afb97e5a5b0de9aee5000000000e80000000020000200000005a16b1154bfd3979bdb56e34352223413c9b3fae0e3fd98c3227cd888faf1c6c900000001f3d5c2318835d1dbf18718ed1f58003606088c9c2987eec8e26b3acab2e97cef6ba4006a98b41ec03362a12f99307a16b2eeb30c8a5e1be46d44442174946e163289c5adda92976f2ec01dfb7b9b885616a8489d5b226be555498ee6839cee8d6a7445d1be47d969e6e85225b01566a994abf3b69d9e271f5349a8fcfa1884910baddba358870a1efb3501c6cd72f06400000002a5bce6c6139b25270c1d816fe31ccc2a2c70e2343fbaff030b6f855a6e968d818afd4cdccd798a910475c79406e988fc027ea85c360b0fd3a1b61e21a62bc19 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422481249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60aab95eb4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2880 iexplore.exe 2880 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2880 wrote to memory of 2536 2880 iexplore.exe IEXPLORE.EXE PID 2880 wrote to memory of 2536 2880 iexplore.exe IEXPLORE.EXE PID 2880 wrote to memory of 2536 2880 iexplore.exe IEXPLORE.EXE PID 2880 wrote to memory of 2536 2880 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6478759dc2e6bbdaac82ecab4b677c58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c79ea50294142afb7a7306376404d39
SHA1f8167a294b641f1d7e10e879a64c1a480d8f0eeb
SHA25645fd9cfecdc8a6b47cb87332f7fe6aaf090500f4b893c606b15cfb6745f5bad3
SHA512a8e353a8a8ec413c6a811cb7850994b9d977d3d01db6a23cac4556d24b0c6a1107617fe502526b1940d926e89f3c7c64ee1d598e737e5ebf10f3838e8a535342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a87d36c606c728bc1b3536c24a703ea
SHA173178e1169df37500d7c9a0715ee0ce238627dbb
SHA256ee41b6854b04b488d07458b5318d194bdec17087316351771913d3bb387d19f5
SHA512c8648f183192e7478567172c017276a81e06cab09d1f20b0aa1f4100fa8c6b66c0064687002df6af2a6e4cbb46385f72b838f5f2ce53381c880ff4d3bc40e8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866f3dfdbbf11b0fe4f7f68b06f4e3ec
SHA1a8a14988ebe9074393e35fec5a6a5e1a78e85b52
SHA2560895d56e383b50ce0fe4007486d44fddc0afafb2b988c5437297d69447d77314
SHA5128c49e631f0e4e93852ab6b79a06418ebc72853d56e7ab79b3551c35545d23569473cb2a69b328369799c329cfc47624a97e7621cc8996e4c5cacfaec09abd0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7fd58986a7b5ca9122d7302a5378c87
SHA1e6cae7f497b310602c26f359eddf53468711e3ae
SHA256ae33db2e0ce800a509253c0c68582cffc3db5e83b0967bb94b0876a8c54efd8b
SHA512e44778711845185739810b4eb716382e961b39972bf2aec61c91028d85cd57d2464f8279478211ab8e883a46da3d6a5f415a573a0d0429e455ed30f7590d86fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51753ddcbae14a57b2f8341d4b484446b
SHA1d230bd06a78eeea3c40746c398cea2bc9d0f38b2
SHA256b069381a6fc2d4bd06656ae7694168d657e3f6d2457599d46eb5b77e9244e605
SHA5122898a45135d296b061d360e5ae269a96b656939b127e0082563a29d9beb3d49fdb99282746174d84172ee4803fd2a525890825ea5348b47c44fe9574a84e72e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5d2f4004e48ab1b8721179ab106cf6
SHA135589f08b99ecbcd0f00cedb78a0f167dd180b3e
SHA256c79a35b94fba777ef3de57b4eea70f9ce5fa57adb6590e8b5dd713486a5a67c3
SHA5126181ca7a3b4c35cd39227b94802604d4ac128e4b849f4c1628072d00d068daf01fd5333f19441114362a5f416e0bafe2673bc398a9f36ea57fd465df5b8971e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6720722555eb60d0df3d2c59344ffb3
SHA1812875671a75f51d601531f9fe0872108ea24649
SHA2565a2114aef42fa5ff2d71cc80a9d4a669a47fbc7fd0ec187d147d6085210e2192
SHA512da51c5698ec034f79e0c913d66fd2ae607aebfde6376cc603b64f8babdb5d570b26de646ac83bb62f35a5416d5b7645e9bbd080165f86ae53cc7ab7b9baead3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d1b4f3c5c0d4b26b072010d5b8be063
SHA11aa72c8cc3c9bbb82c58b8ed3f9630f29e63575a
SHA2560b1d18ba5ebc6a1dec9cc390faa869ff3826f00627a873b9d4ac7aca77dbc4ca
SHA51222fb8a4e6a6f28c666dc3ef6bd405dbf4a097183dd9b70a28bf63b5e295610e49b62a49ae9398286217a2240a40cbc31ee198f356fae374cb2d30b86b1a64bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4fabefb6bc155aa4d7b605ad235bb2f
SHA184173288b9e2db01b6308c75cd342978cebe4c16
SHA25627132a8f80f86b60e3591e11406faa100b2e21606f63e044bc9c423dc088461c
SHA512f9c1a007c2b74b04eb00f3c43460775fe95ec7f78ea2222447a3a57336a1c9894e48e4d1109c02f6ec380fe45c7e4de3ddb9d99bf40c54f5142ba9896a296fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c326d59be3f2a27b0745293bb56b008
SHA1dcb393ae373b4232ebe12b6c9e442f7d4b108ed4
SHA256093c2e31a3a07b5a2db2a4e73aa75e9f79b076268508ad9cca1318b40e96e13a
SHA512c2895db255100c376271955189a6f50a7507228a2eaf92f2315f0b9faed1d34298dfbf67bfcb48a6b91ed76dc0d31807c4ec799780d98aa588e8dadbe3c58a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554fc05142186894ea6c8cd3768538f33
SHA15baeab6a1364800c08d0ff8a3714b470253221c5
SHA256ec08e67a3353ff44ac896cd5f6b9be923a8ab3b69a5622125eab40bbdcfbc37b
SHA51229d600563bb5448a0c49cf0d05c92d610bdbd019879a18e5e2fad4eed194810c30de0c8f733814c7c12e5046b986da5b6756ccedb0e10c125e44cc8fd88eb435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55632222260057e856f45fad6de1ebda4
SHA1d96e2bda37a0d901cbe38fb825408f68ccd1003f
SHA2561cfa985697af7acfac42311c42ced3438820b43ec599896726a4719ace0e6ce4
SHA5126fe82fd944410c5d12d04c6b2e3e7c2fe57c1e758f8c4e94b20a886e27c30d4ca1f443286e4ecb4f42b029554721e01683631167c3be218c25641358e628b89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db8c22340599912aa0857bc0f6cd66e
SHA1406680df23591892a1ac66105c23c3b057ff4b3d
SHA25602481fe49fb47fe05b46c056bf7f7dd19113461f27c6eb5d2c8ea76fac670b08
SHA5129e717d012fc820041444ffe9c71dcb6c46133d29d63e9c5496f2e3ae18f1ccfe436d2e61a5ab54aca5e751225fe8dfbd79a8331884bde990c2c87211993007ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec337ca68215114ebf8b698c295bd3d1
SHA10f9091f6c01d0810f075b922e882d716bd268207
SHA2568befa6c4d6e14659e4a92944ff9393992063f36c8ea55423aafa3e2e7b39399c
SHA512469cd9a794f06a6b4a3d267e8f28afb8f15f4eab603e0d9a13603f1a66cc00b40c9bd8505a6b72e3490d48b1c69c88d151264f0ab500143948c1c37f3091cc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fad42c2e26d9c1bb8eca1025953bf0c
SHA18a06df166df9fbd5a3bf454c52da23c3ee6d3363
SHA256359b205b60c293b83a44161e50d950aa2a96babc69750c6dae765b38d68bb87f
SHA512036ea1a00be81479a06460f316edb0107d762050723c932ab048d33913ff117960e54d2b30bf1cf576e713f6526931e374fe51fd0e575b90627188adfbf063d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfcca56d072003692789fe674348da17
SHA1a13eba8b5377bc0857f7ce36280bb14857b29b75
SHA256569e11ccf2e0bdad78fb0228b9ff6776eb3617664bf8f97029f61b5b3cd42efb
SHA51233503004bfe5ab98ef8084e348747f67796c96055e5a9793d5d704387d083146a74a9e9298a1af332f3f992d9bec309fc8dd07878bdc35f222ea6a8e63704b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b44e2969db74f735a83540bc4fa2d924
SHA18f787397f6587f1250adc436511a364e4163c4f4
SHA256c8b428f11186b8c20a445e6ff6788d8d3d8a29d7206b96169de6984f8ac7a9c7
SHA512f219c6953b94a56f2ccf23926710c906e177d092ae754a380d7bdc081bd218c430987a87c04cd84e03de21d9ca4227e50f1ed91853335ea8fb4f44e962b0cef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff5d99d008ac44730cc0c4526552bd57
SHA100f0ec88179e2614732a4005131f6b1c28b9d109
SHA256ea42df14c021602f3daa49a211d87603b3a767b5de920e78201dc5f60a3066dd
SHA5128de44219aa706c2a0dacc41f5f9ece6af1ae5a078080d1eabe52cff4771a7b24120baa3a90d976927b4d09af14432b8b5ee3ecd9f6e8fdc865216df5b0671d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505d3f4ed53ed4024031ef35efd625fe3
SHA1d832cbeb09acda62b6957c4b26ed4f21ea7f48f0
SHA256b3fd7a350c48df8e931735c6b384e1fbc61f7356d6f27415cb9c2733499a88eb
SHA51240b50b6d8b3803a4720be31558de33b87265cf84dd9b7e49d4da544e56ca5a0cad854ee94a0246d416df760a4f65ebed4904c02c4e0cc5ba2935677371a4460a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a