Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
7bdf4fd0182b3b329864f92088fdfa44_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7bdf4fd0182b3b329864f92088fdfa44_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7bdf4fd0182b3b329864f92088fdfa44_JaffaCakes118.html
-
Size
26KB
-
MD5
7bdf4fd0182b3b329864f92088fdfa44
-
SHA1
0b3bad38c82dbb05335424f18f39e2df3f3faf7b
-
SHA256
296ad045cdc364b310b311798faa9fb88feca14cc6e7afa246bb65af72dbb26d
-
SHA512
d6faf255c44aebdbb7e35a82661e3e51f6c36123be54cdd3d26475d65edd43a64db6cbd5fd81a9fc27c86bdfc44a9bd543a3f50ab0ad56f0d66b8c2acc7b5ca4
-
SSDEEP
768:rrxe0NcT6tlHv3jTHG3zUSDvUgqRqzbYs2:rI06T6rHv23zUSopq/Ys2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1191D91-1CB3-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004417f3289a463e176efd22bc85b760538d522e64a9230d8978c526d4dd172719000000000e8000000002000020000000bc51dd92805b828e9d22973bcd192d6d0f7bc5aeb25c36aaad59854253dc1223200000006d38baff0ecce9f0f374ceee92d7fe949b71a059bdee6cac9d582d78247ce7c840000000ea9c72b7149198b2f6f513c059f74b4c58930d11795c71f98ba4d58c0c9898f99d6c54a203aa329fa6a8ae74ede3f447bce0247cad080d7a224f1413b91cb51b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504457b7c0b0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000008b5b64bd22847abaabafbb2c70b5f65a40d7fcde6a2e91c2d1b461a6ffc0d9c000000000e8000000002000020000000bbc77e4e555ccd9ae8478a3e9781cbb1c7bc9f9c2ee74ad14aa5bf4b4782fde990000000edeee95ce837be611cc409951b791c790f696dc1bd1babeb94bbd0cb68c288a12e40baba318c4acb329ee92f9310f323c4c72eb5c060b326ce9f39d01cd3fb50d5b83911e6a6e392024da53abcc601d37e174b572e8a389c1001cd890caeb3ffebec8cbf6c98fc2877263a7704032b68a905afd3b8411101750c186c09061e7584beed3d6bd2203fa11ba10fead84394400000007f2c354004421579600df6b8865836f1cc464ebf5574ba2c989bbca4165f07ac6245eb77430df9ed1e538590b37b5ad59d3cdb05d52e7c69a5e6fac30311fde1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423036304" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2924 2180 iexplore.exe 29 PID 2180 wrote to memory of 2924 2180 iexplore.exe 29 PID 2180 wrote to memory of 2924 2180 iexplore.exe 29 PID 2180 wrote to memory of 2924 2180 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7bdf4fd0182b3b329864f92088fdfa44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f77aa9181fde14fcb68152672908c043
SHA15170b1842f70f8666ed902b805a42b732e4a9751
SHA256c98b15b1c3e53234d45045e89010cb4bb75b67a145a667ff031cc1003971f0da
SHA51208195319e05adc69e3f77bd76fdde4048eacac7a8dfcd302e91870b9b24cc021156a0ac4a6908ce530a406681824cba0d3d30396666b8703069a4db39a8f0840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547bbca1270866ae98b4d02c9deec235b
SHA11d7173bcce5559f231812299427f3be5f08885c4
SHA256d96f0b19a87a741d0d4b5abc22866866274c2ff05111d1d2a0f8e4dbb55322be
SHA512328ae4d962f58cb144e379c3e756a71336eb6c12a5a1dbb3db960f920cb435cdaf8a3de245c8a8a0a8862dfcc3d4fd4e9f1c6a4ff2b1c5d3dd3b8b2c4341e3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54472169ced1380654dbd49ba238d2b68
SHA14781664e17b4a45d77b9fc83d9180c4d92e362a8
SHA2561555857363656fa5f9accdcc5e4942a117dde622de8ae7fd5e925fe0fbc2dd86
SHA5129ae7b834d3d972bd43a338905f16916eaa423152d5c50249773ebd18b605a9ec1a03cc7669c13fcefc02698381b963d216429048ca4f13286ec6187806653818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d13127d9d3e26a3ad67f1d4cc8a8d6f
SHA1bf03f73fcafd2c5595ded7b84fe19c685927998b
SHA25606a379af637e1350d7f7b87d13584cb1432ae5c93e1f909e1c72f8ebc0b491a3
SHA51218311dae8ea748d6dbad22a940df0f1f5596f37a9b0c5446c0378e919840a91b47e603692aa1ee27bde8c505b0c95692a37abc2a69f33495373d5f47c6cc2736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5011641c5abb46a96e585dbdc6094776b
SHA11f8aa8493f5e7ce316ca65ff9aef2b0cabf5e22e
SHA256ac1c7bd5718c9222201d0d33e400cf10d0cb6def4517ffdfa5baf7010dd0ef65
SHA512fb0e58e2b0a169a543778f83acfd621c94b7a091ab6f8cda38cfc4acbaf94e578e2f91c62508a36917333fd85bd379f7f1c96dbf91a6ec773a39729d7f7b1f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859fc80857bf41083c775506f45c5b19
SHA1cbffc8a47266ce204e23a43eec64d644b0c9eb03
SHA256c20b196790bc024c39cf602b769b813dc83c5130a7b62dc1ed9b23cf8249e9e0
SHA5124ee375c436d0459a1a23a75fd30636ffbba4a268e324ef70249c22b2e848f91ce4cfea0a1fb9d814806f5ad7d797862758ed11c8904969cad4364ca8d64676bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5353ebb22c25e958993541e3a325410cb
SHA1ccabfc68138658fdb88e75bd17dc03088843e151
SHA2569c3939301f459c9659b3287e681b6f6a78b5c63d7af0642dc4cd2d2240b3f2bb
SHA512612be0f369ea11fc1eaaafcb51a8e5f9c0642970195d29e9170a3ec09010896d725e72844b6388277c63dea8368e896f118b2289511ec8a20d5243718da42e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546dedfb0473553074fca3fdbe288b20d
SHA1d49240d557f05e63926551dad129149c749059ff
SHA25696000cbfdeec8fba85a229c3275e52966a41df54254070837113658d540d07e7
SHA5124e0155eb0558ecbd0c94c50a9a0fb43c358075de265affb9ffec9abc6c93256a95944e8e6665e7bd266ec5b2dd3c0ade0dd5df69577f74bd11b782b0269790e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a4da391461d7b68d98a0fecb8da08ac
SHA10e92d1ed45dc1fb9662d77b5675a0b14a9c55be8
SHA2569d51951ee3aee9afface81c03dc33ba85b91faf2f74136fadc1bcefc99d7a0f6
SHA512eea0f0a61064cc68388a31a717546566018b1ae7d801208e9d5eebc3704385ae45c409ad9bc3ba2c7eb5504778bc50e6693436c127710ac63015234cfc0f5439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7f2b7fc9c1eda381d8f38a48544d7d
SHA1f5ee5e012f64d4a733f77d50ef57d845d44ca0a1
SHA256e865f0d127562037bc5ef877c3140abe6c79081c4aaa064853230109a9855919
SHA5127203576171611099ba3609eb1ec29ddb51bc69c2dbea5781130981158e5eb1f869184eb49c42e7c3e83dd962bd1b23fd016764dfa7794845919b4ca958dbbec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b7508997a1d992bbdf1f542657a902
SHA15e0611a2367d36af1edcddff598db76974e298bc
SHA256951acbffb668c396d775e33c2d4588ea34718acdb7c80a7358a0979e0f835470
SHA5126c53cc1d0ca0d055ed9161c856fa2abc8ebd29ce3d6b6051bdd53d9470f219b37a6a801930fd2413fd1d7bc44ee56ff4ce659603aeda411901747cd84e34e853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59226e7f2f3d5774c8d293460ceec9825
SHA11a54cef52a11c60866212e94567a70c467f24a0c
SHA2563ebf35ee8b16e2514999ee59f165a0231090339b79a2863e9922edf16e8edfcd
SHA512ec3c2aa5b167cb472f2ea0a428c4d6577559738adcc3b90e9839e5cb431eee13a98dbd82f912572f6a9852aa2544498b29b2fe1ce04a8d4cb522523e250066a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54165ba4f7abfe0d1cf032f7dc162a1d7
SHA1c5184d2f8c441c067197dc46e1eceea215ac1542
SHA256f40564a7dc71afaa3916a804396953d9f39e1f3965cf383deac4171520365223
SHA512ca3d876f3357463d555a5d99524b6e844183a5ac5d6a1660adf5c30d0b736e1c5e94197f05b520e68a3066c771f352c815c6623d0c5b5c082452a8a4a5095348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a12d16fa3d934250d5a4f3e5b532ef96
SHA1d573d3b7e09ffa435384f0b799bbd8d0098d58ac
SHA2563aa0d83dfa76f338241c0050e06635c56d53af363f6546bb427a33c764e6d614
SHA512964946e8d559623e13e0e6f73ad71787263dd476b29d1b6bae7014ae7ab485b8fd5f4bf36f506c1644f768f8598856216a5791307dbca981c9039ffe69e1de0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15258d7791563d31b9e677b9d4fd9b8
SHA18c4c6191e3fcc15d5a74c4bcdc7f6f285149e644
SHA2563007fdb523be6a0291a2a14495210e388e4c82f1061ebad0411d8efc7f144296
SHA51263f1d0d0130db32a2cd6fdbd863f661a3304c80bfb5ff9d6ce9dae70bad66d82bf27d922c176207fa5f4b6fd66991166baff9444099cc27f85ff71a14de25ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d2a6ccf76a941484b1928095f478a7
SHA1150bb9827bc18fb8ed8e87058dcc5c02612dc045
SHA256ce7ebc52df28ef284c3b028223924b4fbe034c283b3fa3b495f3486767242c39
SHA512a06bc618419360da2adff8b8c3d03fed90aca5ecc0ed322d14d47c3ad2817329a6bb07fdf839bafee4359cc38c61a65abbf915798d467213672fe1c83d35df15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c48ff331f4c8bf850b732795a879e4
SHA1985c9312fee17c3639375a9b832bb9edca1f0236
SHA25617f9d71d847ffc79d3983b0a845486461f5ab863b8948dc8f59dc5409ce9cae8
SHA51266072100adca1634853ccadc532cf9899d822b35cbf47c838f96616cd5a88037ddbab404f1fd1d3128c3417b3f3aacb2244b33f1cdddf429c6bc8bb01dd9d872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5080e458380e7a9c75e4de08c5d5f2095
SHA1fee2f51aba2f4e4b293a8c7728df50252a130d19
SHA256bb850a7b6c744df37ee18994a461fda4ffcce024646eae753a2a26d058100d36
SHA512cae833f652e123b26cb85e85940646c35f497c6e6638dd3d7c801d416233f39996d5115f8459145d0eb673e45804743a53fdadcfcec4d4339d43ff36bf3909c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ee0c6ebd5836ed015b94cacbaa6514c
SHA1f6eb498758b013245b0fc1dc912f25216d5e89e8
SHA256fc3470c9e06ccaf94c6147304c8713cb30e5a47f538380462f52f36322e32c42
SHA51252e78d4d8f9c1d1171db659355e8a13af565e96ce60342c8ed39bc77833a8cc82b8794430c7adc50e68d64a2f437b071ee95e83bc69e1c862ce20961a715799f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\front_end_script[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a