Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
68ad83249e40f6088bcc2702736432ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68ad83249e40f6088bcc2702736432ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68ad83249e40f6088bcc2702736432ca_JaffaCakes118.html
-
Size
21KB
-
MD5
68ad83249e40f6088bcc2702736432ca
-
SHA1
14f538f25e0953a6dd7ead7b7b82aa45ea48b71b
-
SHA256
f1efac8dbda9b2529c7e0fbd25d79de65ece96740efb6f01a5be8c53abfae764
-
SHA512
041969813d520232d843abf2af22d44ffe790fdbab5ebf724c7ce2a6b89bb98ea2e781c4bb9b00aff813c9468b81077f172528d38169e67fae26e534c10e2be0
-
SSDEEP
384:ziMK9XfVBD8c8Q3RegGicXHmTD4QAmccfIk9xhedAzVc9mqL:zidgcf3YgGRmTOOIk9e0qmqL
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4ECB41B1-1881-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005803074469cb6544906c603595f7fc1c00000000020000000000106600000001000020000000be249375760c5e29bfe0d5347eb5f3a7c5db499f1554f13cc3336ca983d868ba000000000e8000000002000020000000a8e1f9cbb943ddcdefe4fd778870fb0268d97dd415e9e3417f04b6dc84c7ff172000000099a71adcbf18142774b49b1688348d5f967632e8da087baf130a560593f0076340000000923b15fc3f2dc24d40b942e9d3dc0fe4f73cc5a74c0439fe043bc08663c8113bf51fdfcdce047ac06408a186cb78f1732146fdf34c00ac08b4a75e1ff2218444 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005803074469cb6544906c603595f7fc1c00000000020000000000106600000001000020000000870aa59ca8d1b9e6465eeee01bb132accde3c65e0a1a96cba8d8d3fff7d19155000000000e80000000020000200000008c0531bc256dc431be7190822d4a030d9eb735de62c4e7311335546dd474bda79000000060828dcd568c5d26d7dcd3855af1c629f14c0ca0102503ffb11098797d753f3199a2be14a80033d820cb3adda3ab1d0289444367d612dc46d7ccfb1cf6a9f184b1de8919e523fe7d241e0eab97c27084d045b76a7827c4deacaeeb9400cc00f099f77044bcd402fc8647f4d2ab4cb3eaa152930962f9ee87e803868889d85b4787e22b47af54fbb5faeb6b1620dfd92b40000000553bbbfee979e11122895fe1a06996a5a7039d7895fb4f99972fc3f472e42748fece324f1df1025b58dfb895c3330a40c4559c9761732a2d819ae0b3a81404d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0019a238eacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422574780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2212 iexplore.exe 2212 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2212 wrote to memory of 2440 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 2440 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 2440 2212 iexplore.exe IEXPLORE.EXE PID 2212 wrote to memory of 2440 2212 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68ad83249e40f6088bcc2702736432ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc5de686a2bb7de227b5e13a7729b50
SHA13d9621545737192f03a70224badbc876fd43298d
SHA256f8ae3ed977fac7c6bce0847547f9abb19ac1341ca1c2f92f000c308ad505dd88
SHA512fc4580bb5eb1fff3010b5d0b00fa09ee9bf1ec8535c1f0a14922dcd3f7f8f68ea7cac68974d187de6b8ae5b5985901782160faa1550bbe390a18bca0856ec9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5830edc4bb07018cca91146b2cac0bf09
SHA17331b8f1003a1352a0a3cc6a0c0b28c224fcab64
SHA256dc50787623f0d9ffd49d5a805500391545f91a643a5aac86539d541776c7dac0
SHA512f13e5c236a2b23708ba3ee636ed21b1167cb7951a0c4389b016857c44b5ea7531f5958a764c5a5b85444cb3722c4fb76d22dba7f4c3c466f5694346cfd954d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f9bed94ecfeb01d66c4ea6dcc1536a
SHA199aec3be8fe495772ae1a1b8ac1790642fa81e7b
SHA2562af814bd45e42c262c6e7bcbe195cdb8ef0668857453d4d08757e18a164cfcfb
SHA5128da0ade9c6295c34e9853bca6e03c8e1acd00adfcb261595a77932f8c7a7b79f15f1a7be12a4a4d3727cbbe9f9f7a84feabff50844647b63b82d11214b58ffdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a8b70d523bc15f241735ae67e6388b5
SHA17e0cf2b6c500e09536722af572e0cfc85055191b
SHA256643918254a2835cd5250ff795684c6434c948dfe4010eb2fc3bb1793625fed6d
SHA5128750faa876fdacb3da64682cc6fa250747198aab3eb11abd28cca5320e71059758a581fb37ec850b744d080e648f6c71179405e79366ed4a1eaaee59c7e31125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d738252fd7e50a5e9064d744d4fb42b
SHA19bf3c4fd0e232b32c7f22c80d75e393699c0b41a
SHA2564234b23ea402d207e0ce2054667ceaf5574b4437ab2b22c3e64d45abe6df10c6
SHA512e19f73454907ba7fa3108cf91c00de6ebda73bb5c05fe2e9f74c66861766cd7373152613520d5613f51755bc083c67671c18b6e3ee0ee2fc37ebb0eadb07055b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2aa14a48f45dea75a1bcddbc82ccd4c
SHA1cc7d7c04075910e16e26df330f9341e11220398b
SHA2560ca824e3e7fbf1d1092a1a7cf109657b2fe9c414acd53c4d575243b710564919
SHA512adb933574d116aab63248d8741bf4b6637bad6ea5a9253070f3cc5cb0b9e044c3bc98f8feb1be2131be30b306ef96d820774a880cf98c607addb2ee49cac2bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54027333e90490db8ed8cf22e5c75f961
SHA134b31ba4b89fbc18d9c55ebf87b5c4b0533156a6
SHA2568ee46560c01b7b62da47c8d0dcee082ec59a53409ed37729b00fd2da1748110a
SHA512f906dab8f4a28233eac602f3355a92fa0531b8283c59dc15b9954134dd82323ab12acd9f2d7bd13b0867f8fb57691b385a9a3a08b22d4f9993ee9d26778ca911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df51fbb18d521e90b7696433af0a75d1
SHA16d7ab8910d1e0b71d5c91fc3369c4094176ed3b2
SHA2567ac5909baf2b075ed0a4df432f38e5a174b657768941f899b01c8c49ebf6f3a3
SHA51292727accf240c326c817d9b74d058d0a02add1c2b01b8ac64bf6d51267253987c245ffaf6e532cd2d9228d3894c7cadd8e99fb8afc767c42d93db3e3a9c590d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b521b09fbbd4296c686edb10554fa3e
SHA12b469dc07d8f672282ca62148e649e0391de0200
SHA256251ad5a9b90f5fb6f3210d7c0b7bf87b2a0f8a6e24d590b4860e09c8c908d894
SHA512e0aa92374865fc6a9904c9e9a86003171dac79eab1ec5a8a135baa7168b5bcc8cdffed9e532cd5a40d4f016448f008f40d8b66b2628836d3007722f061a8c221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4448b8c120b4a78d12bd26eb6b9ec6c
SHA1a285ae2802c2ee2e9e9ad71f064079a36bdfdf35
SHA256496b3a2deee4f27cf8c6769f81f698ab19e5bb31244b09b3cd90db238c88fec9
SHA512e99b558c400fedf97ca33e2e31b89d37c3b03e24923dac8f83a3b8221151d0c37511a8347d7175bb24492fdf04e67ea5b6a518f2eaeaf7888273e5d6119f5ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510e462537efcfddfbd2a98559ac34dac
SHA1fb50a906670590260d5ad3b643ec610708138662
SHA2568a00c1103b40f16168dd4143576ebe2a62c82e4b8546b454e6cc0115f6231fcd
SHA512cd4bbc6a6f3fb4c494dfa6c9622aa63c03f5d03c4a0f512954cc93246047f6729f3291f01fbe82c891725ab4f63eadd1bba04b5fb7028f93fc7f12cfa7004dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b51ed490899f95420f98f36ff3b42e
SHA1ee7162e60f1f5fb305f8538e00c349b3de2688e0
SHA256fce7220248c7c13d5949e142df5cb644a7849d3462bcfd87ec290f8417f6ecd0
SHA5121f123861531057794788a7e510f08d4adda4321a8547a7c74dd22f8f38ed33cd817279e35be307d57b823b85d8c81578949c1277e05bf9d86a450981d13e3b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e489bcc26187964a8da020c6df45593
SHA17fa69a7c1ce50d8a04bfaa4aa79dec16f28594c2
SHA2560e02841d34ae9ad820296493c64e2bf1304ac97cd3cb42ca19732bdb8951c3c4
SHA512bf9242526a5be71def1db323833a7470e66fc159f118def8b087aecc0da5cae505c3c02dcf856f55ce0b463ed5f3bdf890da935e523ec3e198d1abfd9c4b983a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f41232aa0d172705dc7e957ce56ef229
SHA1b320a437c53ea45b008e2e9f0df7e9ac2bc21ad3
SHA256132d3ddad86a363155b1d0e6fdc60f3bddaa9dc25c30ef328375708428ce2aae
SHA5121afdbcb537753ee46fdece6042edf1f07703dd325049e8f9833d9e555f59bc71ec33123f32cee0556f7a55784c5ac96f52fa2670817420306f577c26561fa46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e60c60481a1c416937eca4f1a3dce6c
SHA1cfee4a928725dfae9c55c86e29943c9a5bf128db
SHA25667e718499e1a52c564673b61230d85a414ebb6d435d59a33111b2ce601a36c71
SHA512320c834f8b2aef9e8e36f21a8eb26058377773a9fc725a7ea2f343ae0031fe22930adcb000eec2ae13171c85112448a4bfd98abd4ed965c624c867afb9776303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebee688072d01f72c187a8c75cf061e1
SHA1c07271777e21ef0f2cf544e5c3e4dd3f1b2aefc0
SHA256471b3a12ced82360cfc08531947d6dcd8a491aaf0090141a43a05e760d1958d4
SHA512f50bccd335312b9f88a2b121f3265faeefecd4fa58f39efff0d989d4dfe7b73a37cf34b16e149b517197568ed6e9c21445a38a79c29fa3f20f0388e9c1274d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f988471cadb59d157a83de7834d10993
SHA1ad802f389668c06fb367bf5087c3325de71c8f8a
SHA2565d4089726814cd87fb3465481dee8ef3be2379477670bd133a45a58e86fe9075
SHA512a86bb9957cdcec81cdf380aeefc048847dc9abb59f73f73ad8737687ef7087f9ca94a5afc1cbc97f0a72bb2d442527add0f215f1c4c0f12bc3736227e076e711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56501ccfc5933fa81406999fced464c96
SHA103223140865ad46e98e86099c044abb0ad23ffea
SHA2563c1b4c1b63a9b6776c385cce9510850f6284390e3afa7e0196f8452d9f882e26
SHA5129293e5d3226f853772a5576ac3cb61e9dee12766ebffca41ec92bb0f913ced51911de10071aa205b7f8af441c4d0c318d030d591de9b983e3e8e60754d6d5119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5809439252b5d3224e254e575f924a882
SHA10c2239e3c63dfb647f8832db8e0216a1350e04a6
SHA2565f1864532cf25601747a3c399fc7420f4ff7f1e37ff92c8157c84781182f31f7
SHA5128778dd702539c5fecb723d2cf40e3f9ce82e974160fa98a9c7eda0d8e7f870df215d2e67e33ce217d63228215ce678c487f8e22aaa92d4a7b8da6a2786abf7f9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a