Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
6925e329e5af5bd91f43087f2fc6e3b4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6925e329e5af5bd91f43087f2fc6e3b4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6925e329e5af5bd91f43087f2fc6e3b4_JaffaCakes118.html
-
Size
4KB
-
MD5
6925e329e5af5bd91f43087f2fc6e3b4
-
SHA1
4b07cec2239135bbeaa0c8eeefabe9c63ccf6479
-
SHA256
fe1eb9a29d5d94389a68c735501597021019e380c25f09800a17bb2b26f59cc4
-
SHA512
70ca99621838fab4e7f7a8b1e60b1af9f9327468daab26677b9459118e1253e7de8384d2f9664716defc66f85c59012b1c29416636ced813c46587336a0d879a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oCD5Sjem:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9D7EA81-189B-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a010db7ea8acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000735f62b2d2142e4a92f20c05fdaf966b0000000002000000000010660000000100002000000037d95b3a9dd8c21e52277cacca54e01bc2376e142b0f5a922b96f3fdffe514f7000000000e800000000200002000000056c5d1101df0a671cdcaef6cceb23352ea255fb941ec2a3bdc3ad59cf22c9c5a20000000a251ba93f5f9d760d4197ea5daab3e1b5d664c66ff0b8cc423c0c28e01aceb5340000000e2a1191a00bc078a96f19dfb16f703cb7aae3d9b3cf700c090f6c1acdb30677e34cd386530dacc71daea5f3216ad4684eb36a17243ff55c55938a989fc9badf8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000735f62b2d2142e4a92f20c05fdaf966b000000000200000000001066000000010000200000008a55195462c00e013b9db1a8325cd69ef12839ca8a4dbefca93f174b2b761a74000000000e80000000020000200000008f5fc8d8ed60a9db30f755f28b9c4b9ffe951b5f77280c014465e0f6ee8b34fd9000000032ac4d3f301a061f53efe05225c5a307c8c273e4aeaaede737fad12eea8a62ccad93a5938b8fb37d8c99f77ada2ac3dc262f91d5a49f6def0d8151df8331cd1651db9572f1b18c236b3da9c56ec75983641f24b7d1ccbcd55eb6e7861ee5047421ea23f8643678fd28951f4b475b2042a25a2d355045af1241e9b118d2299adbea0ba15819f1bf9b5ec3d42ba65870e640000000abc30ab13d2941eb3aa9c87cbd38abeb1c74df2284e8e780d913049bb67568523f42f653549e2018c8bcd7d6f2f3c821f61996cc2206e881132522b6da4e829a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1548 iexplore.exe 1548 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1548 wrote to memory of 2560 1548 iexplore.exe IEXPLORE.EXE PID 1548 wrote to memory of 2560 1548 iexplore.exe IEXPLORE.EXE PID 1548 wrote to memory of 2560 1548 iexplore.exe IEXPLORE.EXE PID 1548 wrote to memory of 2560 1548 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6925e329e5af5bd91f43087f2fc6e3b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55323775a71047eee9daca4b7cdcf49a7
SHA1a3427a859cb7b6375e1f0562ecd2bea6ed1a5a34
SHA256dc592767edfcda055e4df9e4b81092a33787decb915afdb1d815cdbb7dadf9dc
SHA5121b2d30f394591438ead7fbd8be54feb4d8dd45723930a470661b11cb518a59958419ac984c40a9415ffe187cc0b4e4fbda908107456c7c69cc5e05f75a7ec961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597efb6fb4a600297c1070d20b81a071b
SHA1465ab7d928d43cc21833b4297c6368d44334edb7
SHA25689e7954a29299c049c2d7d8a876c6b3b6a1cefbdc923a1def52203a602dc2d7b
SHA51281a303ea6aa5824f2222786ed47fd0059f4ee675645abbf8f14037a8dd6b0ef462245a839ef304fe862241f12ab85305d88ddc99d654282b0e4f6e6df37eecb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54173d04393465e2b2c17650fda8c680d
SHA12e5c9f03f72a12451b8441ebf3b9186da0010448
SHA256f0000b1b392cfb03297419083effe798323231e48a661945305a077bba6b9dcc
SHA51225f146287f83a880829bfbce7c199ef98ee8953eea458c29727527c855b3588c336b5d2de97b6df995b707220db39f9e1141cf192bdc22e5a62e665f0ccf5502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511b7e40a88561d5b838e8839d0806848
SHA1cdcbb588ca19eab2f56d03fe70968e5e07127e3e
SHA25673d2c94000ad9de849860c5c9ceba5272c05ee6d2d7bdd706fca19e99edc6aa7
SHA512fa8fc0b07899abb1101bd181838b1f4f9077ca50ecaaa8254e1a3fd0a5399313805d1bd3813740404d217833b392af91c0fa92f1e9717f4c8560edbc989e863e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e09c1bab43155ef1067d12e1a5a98d4f
SHA1a581d45dc70276dfbff3b50b5248dc8a5855d8d3
SHA256cd8bff676290685e2502c5adba1ba9f6a1597f77a4c8b1f806de27d4ead60f02
SHA5123cd92cdc34eb484c7dce7f084134a71427d12ca79f5fe49e4fcd9acd079118bdc0adabe1b0c611654266f44a5c5906edd299cb383721607d236087be1e931c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cca40b1d32be7b84768f028047af770
SHA19b9af66468749aab20fdb7655bc64246a05f3fbb
SHA256dda4981c9d4e3e5172882162115a11b5491767f16345c54464221327d3632d18
SHA5123c672aea93d3be250844ec651034625693ac3e1475dfd63c06a214508de1e1d6790dcacf4d347826f51c2331964833b15902ae57b2de65ce01306513c29d63e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e722aac675ebb4b7c5a53c1e3206e8f3
SHA1f384f91e344571f484f879eccca939fc61667ea6
SHA25645dd587c110ba3c282ea37f24062021d17f64996604b92656fbf7465efe9e53f
SHA5129ec619bedc43a51e8ecf395e3edb53f0cd072c6e3e7aaff16050e51e3f06161caee630426ec98279357a3767e31068d943a3759ec613f1dd5f0f2ad345fa6e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b97b167ce6aa1f39b34a8d71c878e37
SHA172745833de3c4169fd6ab624b295860af0c2afa7
SHA256afc6f55b490c02e207ee63b255eb4505b7a5bba4d59f472920c7d26e6491dec5
SHA512ec950684c7e83e9e6b8fc61c24538c7358b6896f0a2bad819b4561f3b77afa891029176d5cbfe2d5738b287d327b7efb05695fc37d5638a81ed080febc2eff80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace994b0fc08989c3d5c598913886763
SHA1bcbbc730b94c0bdac7f003ba17f7af8dd3de31a1
SHA25630accd5f22e79dddcfb1d76d8682c53da8003d9988308844c46474c51ede38c8
SHA51266e40e440f1130c291de8d305f87e84dc52bd3b7fb7f60acb35898744d5a13bdf852b04e47d1a25de2c59d8c4ff4c01dbf07198254c3389f367a6d32cc913c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b51f797a33d43a0f6c6d782ed1bc508
SHA181dae01ca35b0cf324862e57be6e28b869d82014
SHA25659653a850b5381b8475d4916a5c09a0b6dc01a5af9f9d43cb455d6f0db0f062a
SHA512b0d0a33d41fd88abbaef97a2c7cf458a0a627d9d6514512ffc68e793cebedb0a45dde2ef89dd1de639a5e7045f4eabe7a319a2ebea7bbce24783390b0213e6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5785e55417d78f8b73eff33650ff12844
SHA15628c96882f11eb1255dc790f1aaf2b74209471a
SHA2568e5744d46330bf49c747c1f2ae89baf257e7c9bbb5c3facbaea78c0352639d3e
SHA512760a6b85bd97b1ffeeaac75c56949b3a1c2a540f917e6638bba0dd00e1ce7111aca73a04353c3eb1041faca150d58e429ff475c7115721f4c650111f7f42fa43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fa09cad747f9350cd1d1ff667c57323
SHA1a6a214288a1b6896e72183d53efc04ae77abc8c7
SHA256bbc501ab0d8095876f92f423e0097058ee2f82a504380b2472437ca2b50bc370
SHA51243702956d61e6ec796739de4c79fbdd3408ca6df225137dfb75ecd306284de60a1520595c67877045f49c0ca8b20a569250c7982f8835612ab036da94fffdf92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7be989e3695d167fd7790d22d51101
SHA178a27738cc70be1e99f04b4485a0e495f0a661bf
SHA2564e36287cb129920fc04649216d2cd046d0a07bc4ca79d9db20516a2205451b63
SHA51287fdd9253d5359a47704a2b61c6e6e9dec99b4ee2f1ee8bb47e49457c5c257aba10a14e81b615b0ac6a7ecd76a13c01f1e8fbf80527e67f9e1d95a7106db1d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015a83661a69c579fc0f17f676ccec23
SHA19de265d3b4f805de3a70645ab78d538120cbc394
SHA25664093a3e13603d355f8709b02973c3b078f21ab96f36891855680bc3f33df744
SHA5121d4d00cf7d91ef4dacc6f8c8c80a6d560b4a83fab479ba00ebde48320b7d9402fae6bd2405842c652316daa86b422fc9ec34552fe1ef96f71b95a5e64f6bc709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f16dfdf061253a7cd8d5fa1ce049f535
SHA11d78894d3b147ec42bcce693ff5bc84c88f12b2f
SHA256973a66e9a1db106cd7332d115ef14adf1da2acedb914fa70bd24074067fa4535
SHA5124455fdfefd8c91d44db281e3a49d5f4c4155abbf184f98b9504c9f7d564190d0a1318d89ed0b6f573d5308900e99c494e49f9ad54a8843d635f88604ed1e1f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c72c057cbae1b9a009073ea2ec61728c
SHA18b51481e1d8b9dbdb92e56a5799d6faa1ef80de1
SHA256030f605d3e2ef39ff373b1090df25f31e7884fa25ae48faaf6baf129e9cb2e88
SHA512893a285053a83242db0afd97681055c44985af0b973a38570e8ea694756641142d54d3c88f48b4c4744e407cf5488cc57c7a6e37ebc212b68b2cb18906f2e91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c407c5abd89b5aa8244eeb208cb8445b
SHA15ed6e8bdbc57c9079930c4b28244278b310b9d58
SHA25617a70a452dfd1109a6001d6e98166b4075cf18c47a60e57d7f81179729f26bfb
SHA5129ee69548dbff7b6d2284aad69d63c1dea9bfefdd6ddbdfb6c6d46f2ba9ec48762a2505d59d01c0002f45149098816d7d73a3659c9aad958522a34815bb365cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8a6b6b52adb308510f26ca7705c6222
SHA12e4014f58c6fbc58aeeb15990b84aa7008db0266
SHA2562cf3bd0009268d38ab236f0a7fa483f3e988d437167edc8c393017acabee01a2
SHA512b896254c7fe567e136e1e4e209c6bc24215b2961cd8eb176f223fde4f7cbf2dba044465239960cbea7c1e405f0e2a4edebf372d588c9aa77ff8fb2d18215adba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514519199894bdb05d2bfc3b00fb701c6
SHA1a6a5959b7ca08410df79c58eab9d24f9179cfdc8
SHA256b6bff86b93445d764f477413f856174ccbc25130f84a94e1a0f67d3f391702eb
SHA5124c2cec34519aa60ae382312491e5a117215d49774f4e108eef295b9334ffd7b7126934528a84d5dca85e43fe119daffdf5b57f88adab9d21ee007e033c6d368f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a