Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
6dcbe063a75a2a8d0613912856642de5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6dcbe063a75a2a8d0613912856642de5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6dcbe063a75a2a8d0613912856642de5_JaffaCakes118.html
-
Size
54KB
-
MD5
6dcbe063a75a2a8d0613912856642de5
-
SHA1
e17a1dc71c4da3b0b17ac7bfb79cfd480889c27e
-
SHA256
46a570369002641911a0816fbe11c5001eb854d3ec5ece422fb60a3a80dfa6bc
-
SHA512
3a33105dc3ff06e14e0e583ad811d4afb387bc057e53bfdac15ca8f58f803d80ae5831e7a90d910f866d893c819b49cf98cc908be10ced5d62b5d09d961b7149
-
SSDEEP
1536:SXM9y2zE15ORhP7t3w43bqyEgU3H+K30m3c+oxOgvMKr37oZ:S+y29eINr37a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c36406afadda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422698853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000026167d7f944cb47d01814dfea2a8f033480f8748d0a60a5a4cde7d2d02d92711000000000e8000000002000020000000219d167930463daff33a5e8b58d724c25880dd7298b7554be75c4936f535ccf190000000882e5855d809a08287705d9b53b8bb5582a16d331c95709bea710ad3cd8c10ae64cb88a90f2279c8f05bbac4f1670b2d81b0131e57808feee6574a013552ab2fcbc590332b41e26bc2ef17be79527f25c91dee884c1b91aba6dc9c71cea9b8afa99a131854893b98e2bef0c942f29b26531958963feb7918dc48594d7c965ac0f3e8672c032e9aa2543be74f567f324340000000650ab065d8d29a7104d2860bda658a6267fc937aca2b7b1177bf6feec05cfad2b8f7b1cf851afdc18b295b44c881937d308608045308641c663674f705226990 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30A48761-19A2-11EF-9449-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f09f9356f86d89e5d085713ba3def41abb0af4f53b9347be89191d8a91844936000000000e8000000002000020000000e2f506ccceffbbbca6881639d9b0780b109dc024078813d97a936927c2f4a7ca20000000dd34bc3ae5ccaaad8ea1d4f968d1a7d4b75930716ca42739650b8d6def00057a400000001c4921181891adb0d43ae98e8bd3aa537ac333e589c9118873709e13d0fdd8237458a0b2e24ef5e81910d219da5d7728638e551ce04b6764826a70ffb9350f9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2080 2348 iexplore.exe 28 PID 2348 wrote to memory of 2080 2348 iexplore.exe 28 PID 2348 wrote to memory of 2080 2348 iexplore.exe 28 PID 2348 wrote to memory of 2080 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6dcbe063a75a2a8d0613912856642de5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63071761e98bdf9d84bde20cbcbcedc
SHA174d7623ea50fa4592ad77d2ab41b66e811e04a01
SHA2569f9d6274cb683dd49e7223ce6de6caa319b2d69ad1fb4e5dfaed9177845ec927
SHA512c9421cd1ba9bd9a0ecf68b6bbf497833551cfea75376a9a1e0a5960139fe8304ab06bb709e42a1d8291fcecc1f378f814cc87a9c32252f80acf615170cbf8f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186945f12631edf91e9622314617f7eb
SHA16badd30ac7980cd18735e11685c457a6b793a6de
SHA256d01ce152478f02cb53d3491412745250e1a0b82cf50beadc04383c4add41df15
SHA512b13f317c4c79909816e4d233ca04467e11c81e6a26b30cf18f21bc7e2e721839b4e35c06df0bc0940db280f42881b50c7d2ccd84572a53bcbf924782cbc70f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59517421ec1889543c03a706b41c074a5
SHA1685170be2eff4629049925946a560be763ac8fd9
SHA256558641d90c3ff922a81092f90f9d4a5b1d49b4201f3a0d49afbb7c6498e3759b
SHA5125ef5a4c64e67d95feb9eb27a3f1e934f0b08dfb788a1ec731dd3876bacad8f17fd3e808cae977f8bf84a64d0f25e0cb3cc21a66edf1d718b984d1f7c06e1a560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b2f15b7183d1c00d4973bdc1af9e55f
SHA15079bf6b5781f0fa4c792fafc371f8b91953f583
SHA25649b6ef90ce0a343e19b011b3c7338f6888292257e2d68723f68844f6ac42b83d
SHA5125038617c588de545df23886c02641758f9040f64fe8fb852fa6de014d7f45036d1f84664e9490c970a43a0f02681788811dd816acda9a5afcb595c1b380c8fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579a1a09a37372356b05d0652b6ea9368
SHA1a78e46007c2aa68822a997c5fa0ecf8f69b7ca36
SHA256292b28b454bef4f6b51cdde9e6270d8909e784476eac5691b4e57265b73aa3ca
SHA512ce240120cf29dfd962fcb0be98fc47dd49d4c8c3a4dade52e19085087aac7de9cccfc6bc87b45a18da6a3143463f051ea51d479e53130005d90e5dd4a6dd12d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c7705428fc0a5c89f0dd2d59f84f200
SHA1e368f4c16b5d85a011f4944d342dc51f1d1dad5d
SHA256b5c426aecedf03f82ef91119ef64b3eb1676ffc5657604d03ca145062454af50
SHA512a776823315324cdfd1f42fb73931ea65f820b6d31b365f0b02d1885b314e861c30483403e9249a402101b8862fed16e94b7af5e315d1e0f973a686380537a533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d487833443b25551d762949bed922cb8
SHA167437c767fd87ad98d3867ccf498a7d68f8909ad
SHA256cc94687e2e954894d4cf23396f82d30dae87dcaaea119ab321cbe2dd0f5aeeec
SHA512e45efe6d8ef4fa9b2be73659d58caaee9cc84b8e20535954e90b6903a626a44c05bf8c98c04f0d6793fc8b3ec8c6504492cd37ff7785c681e06115124aab2110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513f6b69db0c765697dea152ba1639e63
SHA16d1d39224fa5c812f65e29e519f676d87a767162
SHA256851ef3757ba1827bbbb8a5b31dba0b87673f5f206c2e1e2d89c15420fda50f77
SHA51207f0e56a286526a8869ef1bb33a31d8ea853b77ebcae2f0f5c08ea734be6bac4561a0f9eff81b91d1cdf68de73b52bde92a9b54a2c0571f0b07ed66412df50b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52be087bb2ce9b54b81f7de58dd1217f3
SHA16a4c947b15ed2c0e37edc66cade91070640599bd
SHA25671d8ad89f25084bc11a768bb047e27ecd4babda202b40b89f2d9fdcb0fffc9fc
SHA5121b694e9e15e3ed190ab8b8a85260414effba1b3435a0829c1b30d52b77b50234a1c1249ccf54734b08657bd1250c00136e4b3fb8e0b0c6fc5c7ef801f9264c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7b5853612db786f5add14d314911a3
SHA11fe4546c37b60921a3db8a84ab82ce4c80847ede
SHA2560de6b6bafd320f4735d80014e8c33a418b8a96b05fc1ee585ce7c172c12859c9
SHA5124f249e7376514e04017f7083b540ad1e6f02159ab0f015ebfdad6a62e782e3e6dd93dd569568265224e6ce80e3985878197d1e995d72731020becb8310e31ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e34fae9f246b6765b4cd0a0aabdd0f9
SHA14fa74c8c34307b0369b6a46dee63603caa3b452d
SHA25629e6e43eb81a8fbdb630a72e0c092f83434da833b54e3e4ef0e9e093f2f0b0ff
SHA512e68fa90f9fe112b709e4ccbad0f542c8d01e7bfe0f1cc7d5adda0be26473f6843affba2239e0debc1f0f96be8fcf2f08da99623d8ecc9b63248fe51a0cf0259a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba860d2c5ca2f43a98f798f25df8f3d7
SHA122fce076f845bd5808c664be072299789aef4673
SHA25623fac0afe662d787d892b6317256c324194d1197421afee6c1d7e080672ac57a
SHA512b5ff895abf7d8a77ad49d0fe04ac6f7f6478f766eee6dac40b018c68f7b231fe1c5b8f3faea57e2a7500d7ddb35a4069c091096e27441a48a2c0f0a7590e6af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5376162f51e068dba8c4e25fea9f27a3e
SHA1d4b58fd5302bb67ca6c30309b4a14dbd4682bf8b
SHA25632e3293f3ab074e4b9f0ca4a546a7fb69aa2317e65efbd5917d1acb2f53aeaa9
SHA5124a54a6ff7163ad84a6e7d0a6a9465550a8f8ef23489c12388cda0ec9b696072e7390870b599e20552c2fdb6c5f7d50d9b3e9d3bc37ad81b62e484e328fd261b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff228769029aa3eea20527c64ba7032
SHA12fb07e45416b21037ff00a19601586c4078d44c9
SHA256ad5851b0769aa9a99cf646ac54d9731a9a9e94bf1de7019cd3c7e49d519cc455
SHA512c0824e3d54a9392abe2eeb6da51fe3058ac5be465c93da3e6f1747addf246afcb51683f40067d7dec7a4b8a996e797afb5a20ca155ea8a62e3a222de7e439c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52277cbcf3d682973800f48e3a7cea42f
SHA1557b7efbf4c70d1f9667dca52fd270f4035aff81
SHA256fc71173093c1cc2f858e1c2ec5c9f424f8c5951b1489ff87bb35475324f9b24e
SHA512532a7ae9d6fb736695a0595441c15ae088ba260ec7125b86c5f7134097d6ca087bfc6c3a674b027debfd68a513dd81716d61f75f66a0f7a38cd2370c0f405997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93ccc270ab26ef1c7cee7eaf5b5f089
SHA13df2231d24bb47a98f209e9a6ad698bbfb5c7388
SHA2566d0758984987243dd3cffa1c5ec3779837d45f597ed94d09e8be432bfd105ba9
SHA5127cf011e8ada74b68be2a14cd017025e834de7e29e7c55db945d298efa06cdcc60c685afb7f24e05379e56f3187516567a03c5c14d068881cbb781d0424af55f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d78a685d8ed9f53808e178e91767a2f
SHA1a76c2d32252ca70d7c08ac653987b98650436713
SHA2566cd71077bcd06ff26cd910ccde8f549b051466caece3a4fe1880b97d5d1b1459
SHA51267e3dcab45a563adb0d62be2310fe901e3a799dcad3bfc215764384cfb7b0862a248918f2c2bc8e6b76619a98380d22c7471fe72c01f63dfa0f6087d30e56f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50061eebbf5b0ccd8cd8e8b2654f6b3
SHA1db611efd2e2fcd642b94deb2d3f37e6cfe5e4873
SHA256f5e7e59df6f7ba71f59cf74f29ebfd0016085e6b78c8a338cc15c93d4586eea2
SHA512e84d02c63a274629115a1aa84beaeda5156ef1813a2f347c87797713d7d9d42598a295bd5523e5821936115e728fc6c2b0b3a537d38d1833e94f68e296d20283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e9c0f6a722d6b9b30aff689933a4d0
SHA18572f8f5851c76903d6c33601e235eb0b151dc1b
SHA256615742889f47e18f1303148e981d56f923f704bbb244e88797edd3ff29216b5b
SHA512befe30875c839c81e1b04db7f17a4f4a6c1dd48eb38a5198bb609c7e1a8fa9fef50fc001e251337a043d70f02cb8bba1f1e8a62bbab1c065ad755e0646c7dc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521323ea571715a9efb2f40ccb4eead04
SHA19da9dae6e76a4c1047639dbc6bbd325d61793814
SHA2568714675eeec53d23e1623229dac4ddeae35b3e929923a11a0fc3e28ca4159f83
SHA51266a5708c3cffbd033537fd519343835481e4346c52074d36b9ddca1dac8da5c7c688ed5ae41cbf77b10453081eb75cd99ec6a04f6e685076bef8234358846e7a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a