Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
68d69b1c3a8f95ccec083029ce6e72e8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68d69b1c3a8f95ccec083029ce6e72e8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68d69b1c3a8f95ccec083029ce6e72e8_JaffaCakes118.html
-
Size
48KB
-
MD5
68d69b1c3a8f95ccec083029ce6e72e8
-
SHA1
5e779889a324ca1b7ce3518ec176feaf534287f5
-
SHA256
087a672e753c285d6291ba6ea5f26853228261187df6f5066e78ec6c68497669
-
SHA512
878f3504e990c5bf2d5ff7bcf308550175e5825a21b8ea18c8450a481f93a4d2613bd422d33cc113e88256d0d36582343004231013ac86f24d373333c5d95e43
-
SSDEEP
1536:lgh8KXNS3m4LFWwt/uUXrT9CS8BM/cVBrVVY0vkSTk/e2VeE0R9tXnjGlFy9ChK5:UXNS3m4LFWwt/uIrTUBAcVBrVO0vkSWw
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422578472" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000091037525d3b51f10286d5234fdc0e2e409ad5c084d4eefae4e4419219a16d2b8000000000e8000000002000020000000f9bd76fa92f60ae5b615ab8623a75b7cb3f192a44940fee94e5a33c08060249d200000005bf1cac6404656b0db39ca483f9fd3e978158c8609fa7420c02ee42dfac6309e400000003e3c48da5360ce871fb24cee213b2eac0a5eb118befc6a60f3436f7407dbcbcf6cd6ae86324c8b33f50d29b409165426aa95caee96e8f81ba5c8afff57f0a0aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608541c896acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7FB5891-1889-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1708 iexplore.exe 1708 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68d69b1c3a8f95ccec083029ce6e72e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5e84d73972425cbbc6a17bd202ad32407
SHA177045065b791e675deb52aff4204643891a154c2
SHA256c04040d9810339203d493a39665883e400a5bad1315e118d814b205b15ebaac1
SHA512874295cebf9ddf5cae9436a08014a1099178da66cb8e1245551ff301d6a0107be0501608f45c378d76da0b36b7f8725b8a17725e9db943ca2bcd7b8ee29aed95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc72d63245aa2eb4dbe05f91cbc5e405
SHA1366d564a4966425843cf67d0416f05ff6e125346
SHA256ed3fec01b9da3389b04a7658e3147aa42316686ab1d4ee52077f7a553da0b579
SHA5121e035ebbb188f4f7a86687fbefd0c4bb13490356a7cdb4017e058ad0a694bba1758a63783ca3f28c1e873bc4d15f31b87dccf1524e525bc7285a675a69e199b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e73555894ffa599a54d9f9c902a8b1d0
SHA19c2f538495f660eaf6620cc9e46d59ad8f2e5456
SHA256592536d0c503ff549276d032bb143d8dcfa3d153d739400eea6ca65251874fb6
SHA5127b3529856e06b5281c0392ab4a82bb2241d4890b6ebb8db95e1448c73c5536bb23cc0d581f1c8da5116dc684511103716d7728b33b6a48bbc1dfb076094cc952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4aa23fb44ec7d6a328ac84fc670459b
SHA15262bd4a921163caf68f31bf43d6bcb321557ef5
SHA2561139ea5a98dbd666c96c7b242afed584c4c6f74c73570122fc240640c77da9eb
SHA5129163645b2de67c724547f923c09a94283a23e86451ae44042fe835ca1e604117dd0665c25c0c014db61228301b6acdee00d7b8b045b5c1d89fd909f92cf83ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d69219c5432ebbd80eb3f8bb03823fd9
SHA1dd050e06a4ead4b4b53e5720f170909d673b3229
SHA256059d530e453da4dfb1b258d2ff7a0d5c8a5f17398f5ce045bbaf76c7ed959b9c
SHA5123ffa87896d5c345ecaee7cd830424a1babb0e001fc12b193d825a260fc5457268714f8a7ec696243a6aca3516fd5e52f4544bc4ed622486e80cc2d0bf85c1387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ece74efd89f487f2f7c08da6a3a5d9c
SHA124b97bebca966e0bec1307c35484ee2f2511e76a
SHA256993a74aae021e2b1a7e2b6d81406dc7f3fcd5b20734cc74d05fba563752a7544
SHA512f6c8fbc59f4b07ab7ef1bc7fbd5d9aef49d5c06251d2199986de29151393a58cd2ed4f118ca4948e9dfce18d40e035da9e5df8d9922340c04b7e6c70f8b9e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532fee3ad0b427d97ac30df9b4eb77e82
SHA1c3d066c43041ce991c6a6740491e8a6f67ece394
SHA25604d856d28ce6990651437c7760a0a6b98609040528588edba38ac1963656588b
SHA51204094a32292389c6c51727c035b42d179adebf02d9b15f1ed28f6420d9917889a02f78028bf9fbc5c3c2f59f27c59df940404b7b42769bb36bdae87102433bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfcb918ec632df04bc1811f5a74527fb
SHA1ebf507f75089624f93d272f4fda9203839c4f707
SHA256140bc1b3dd2bfe14b81b78c2afe9752945a7b5b54e0b25dc88346efae0fc9434
SHA51216f12d17d32cb316b1a46776a80fae02c1b50278ad30a3aade0d512292285f92ff2444b7d1999687606b7b1434633e63e540abb0f88cd34a293df8d1d6c94703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52749e8010ce8d571807f48ba215e3af9
SHA1b3d1b3107959c23bd0cb10f3e094e7eb8cc67b33
SHA256cfcdcf5f43292af867618c93bab2e6c9d7cdcc120e614683001ce9d8e924daef
SHA512ffde6309510fc974297b65d1cb38ad1faac6462a52afeb66ef71faeed003e5d7176b44bbc6b0208c2e53c7da1bb70b92334f0518e0ae94aad2b885117ed1439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc559c3a02fafcb5b2604599bf686f39
SHA11f95f4cc376846d63f9b1178a88f58701c7eb1c9
SHA2566481e9dd86b3e2850d786a5ed6e7c5a9aa19bd80b7c1f76cbd28c333908a974e
SHA5125d9848847b5829228a86378babdffce3e956dc52dd296aa48363d1dac15463db413b83f3ca44576a0e08e2cbf51d5c603fa7362a5894208e15a5bd9daf460472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d6f0c3c159962b78f3e6278ab50edc
SHA16755ce168841657a01937aa712a7fd1a0518bfb7
SHA256193108e416e3283b79f32021c8d0bf0e3988471c345cb3a0ba89b1f64b4e7d09
SHA512d070bcadc26fb8d3b9baf2fb13d0249d1dc34a0e41674c55ea93f7b1c945889e33e61409a305e4814fdab47b72198b3faa35e5c14f467390d98510eec64ad459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d0351ddef932de372763c89babfbde
SHA12b8c5542a7097808de566d483c45b8a59a874880
SHA2561d36ec1d6d441a9f6c6ada22cf623b28f6d2f9e7a4d4ed119cdf92ad2e03412d
SHA512972ee12ec165633806a51649734748c58ff1cac93ee3c6a9d24a17e015ed93c120dcf471ac025a9b2a657df9ef970e9c40936cbea0c3e3e5967d243801312874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb0b274c7e6d4d38e53f848fc3767fd
SHA12e59d40f4f93920f4dacdf89e937f3f762538d8a
SHA2560e14ab8a5880ba917d0480aba0dbee50875d97debf55607f2ef317c41be86e1d
SHA5125e337bfe7ecd4b4aee82efb6421bd9916d1093c223a5bafda36a5df40351163b7ae07d963c1b1e8bc551e6f771fb1bb384ff69c6a7dcee7a22aa79b67de21166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84a712043659a8b6369c2ae33f42ded
SHA1dff46a84b91675866b052795c08f2c9c31f21b09
SHA256ddf43c6b62913b867e6432230cc7d4f46d42a7d27bfe520ff7befc0c8ff3b6f5
SHA512588a396dbfa603b91352c8216f49b400f90136a3513694f0e21d30a38e11c71a15bdc79fd17cde92ee41e30449fcab1968383323e1172dab17f0b2f41deaeff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58faf07c0c545313097796a58ed28bb99
SHA1ad54b4592d413c88c0ab4c382dafa92ee77d13a4
SHA256708efe9007b0bf77edd39ceca59659fb47df15b63455e963902e48af15983ece
SHA512e01a346168b5e7d122b79058b1fc068ac2d008a9c641ce73c4cadba1bfb0a30aceeb681038f617f79fb78d697d7ff008b3eecfc2cc20e4a3a280798dbda2a6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcbf10a6097e8516df61918a547d44ae
SHA11b5a4bcd91cfb22f2c51bbcfd22f7623d960d164
SHA256831080c5daacd196addbbcafa3c3f21929973ca8d30bffb1075af1fb62cc5066
SHA5124b52c550561f1295c9d2f3ef88ee28a0eebd7f6850aba7e1e40184dd787112a262bfbb4a235cdd118666a6bc72de07a5713e6c0a1f09dcb80bb59f8c86460831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9d553b24d6ff15114c8105c3f02635d
SHA1d5e026f9dbafafe2616a5628868a9b9421e333be
SHA25631c7cccecaf418ce59707220fd334f2101e2063c7ce7188ecd020210bdfa3f81
SHA512f21e76cb2812f3bc2755df931c7b768811e1fae1e71a1607e17e076b4a3cb7d89cab946aa38c6e06cc5d755c797c0a98e34e3b80cd6594197e1f68eb1483923f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD534f8f93cce443873a37ff04e0db85e83
SHA162f1c5a201571777b358c811c6e58062f02b6108
SHA2568e9fcad53aae4179e64df8b2aa2b0dab0da27c2f014846383d0b4616d26da120
SHA5127dce20e6e0b36d88076bc666a03720599a00fa58ee33fe1c714566b5ffe39fb52a49a1232c7a90953f31da750fbc2a6d859228d485df6f953fd32441e27c01d4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\TK3_WkUHHAIjg75cFRf3bXL8LICs1xZosUZiYw[2].woff
Filesize15KB
MD545bc57eacfe89ccdc7e071ab234892b2
SHA1e2b048a458abd95ab5157314426d6c1518f64c62
SHA2561b060ad41a3e4f9f26e0ab5537722cffabcbc5525ad845ce8c5fe598273a3b20
SHA512b0177593bd2ea8d2158fef29e47e9a664a31a15f651c490116470cad438bc357997ecc425cd5fa135147ad425e886ff4dfc908a173ccc97125fce11c14ff834a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\pxiByp8kv8JHgFVrLDz8Z1xlEw[1].woff
Filesize10KB
MD567a18102cad401f10ad39a582de224d5
SHA1468ad29aecc3ef946c7c19fb2a0eff3210394fd2
SHA256bd83479124cc5bc403c9e0d320840a5ea0e896e899689e5d37510444f5c7b763
SHA5124bda29a09c7029b2c0a010bbd4fe2a18902eaaca5751f6d6db265adea86e5b412f51cc910b8193cb1ae8641c82acb86c76ce5f6a0d7d453fe9014b7abe21d205
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a