Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
0121a77eeff88ff08fca7c141fc9ac79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0121a77eeff88ff08fca7c141fc9ac79_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0121a77eeff88ff08fca7c141fc9ac79_JaffaCakes118.html
-
Size
16KB
-
MD5
0121a77eeff88ff08fca7c141fc9ac79
-
SHA1
0d6fa9076e4702234c0d6892f94191d62a2537c4
-
SHA256
da2e4dd142196e3022ecb9020eccccc2b05105fb040f5d5d0bd95710752c792a
-
SHA512
6e9b41d1e481f1850d36cfa4d29313240e5643005ec1dcfdae995c827204ec815941dd6b49026d13beb87d1e6a17b234756fda2d21d5b601bae7fbfe9bb8b650
-
SSDEEP
384:0tvGcl9lqoX++nTA0VwLfQPq/u7r1y0mn9P7YOrq:sGcl9lqoX++89LPuH7mn98N
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000077d5f5e436f50a503b0bb3adbcb9cd7e2052bdb85fcbd17e8d5a9397324c8f0a000000000e8000000002000020000000bd836b92455265c741298d2e751231624586946b11d63c67776a033cdd9dddaa200000003c6d8213af974bc6fcd5f2a4ec44ba74cd8f484df1b762eb00afd20c652c3d0e40000000c98af1de0c9b7a310fc1d6580968d8e7b866f34a9a1b3cbc945e3be9950cbe45c0ba0cdfe5db2b5f6d8968330c5fd020be53be412b7b843b6ed88ae2c0b987c7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B0CB9B1-03E5-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007e1e20f297da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b5e26abca0a0f9681ed98d4e42ce1df3b75b79a31fc4148b5cb01388f09e2f95000000000e8000000002000020000000849a8e663d5e5ce97eecac60cbbed90d4a4b8eddf2b04403d7278f25f5a93a4e90000000edc7a2d69f9b060b3c0686db17dc589e8c4758272698896cd1994ba5ef095daee1d2d8cf252401e74ff9ef24b8a79ec0d8850d38e3fe073fce21e97dc98c728be6214ff20409f20be10c3a20002acccbc3559fe4e94d90109777cd495ca29c74113cbec5f6f0bb1b3b91bccb16d6033d98255f8d012c1d796d24a10e5c7f40372b8c7c5f0139e560b31c6d4726555c90400000009d8171dabb6c5e810714be11dc258b21b6b4de9ad78934eb47be3d2d746946d82057b153d7c62dc5525c899bf31f71abbdb07bd7bf66b1202516f8188714d747 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420308749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1296 328 iexplore.exe 28 PID 328 wrote to memory of 1296 328 iexplore.exe 28 PID 328 wrote to memory of 1296 328 iexplore.exe 28 PID 328 wrote to memory of 1296 328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0121a77eeff88ff08fca7c141fc9ac79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556acde23e7b0a5cc9d7b93b118121255
SHA162f52e8144406629d2f41e6eeb6fc535d62401fe
SHA256558b28713df3023a616988c87a2a5ee1e49a11467c517594e8ef726629abf3bc
SHA512becff8cb7a0f732415ae081c3a69dbe37b6b2a2f7aaddda158ba1f03089566d48321eff0a50b7388c8e30cb618cf322235e2b30bb71c83663edd1d881001c1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593cef121ff6c1f48e58428fd36186bf4
SHA18db086ec500147f2d53ddabfa99c7fc58a18cd9c
SHA2568ac5c9263cf63addba9549f903fba58e01bc64e52f5316595695f954cb13c664
SHA512a196a78d050b1b8f10698e9285e7a54b8e2ae8e9fc28f5e1ec7f355797d104a50732bccf0fc53e68c35771106b52f35fbe52f1f597f1a50551c6544b2fbbad0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c246b4581e724f4e94aeffe5171ece20
SHA10c942222857e04c6ba654d05b908f428063c7aa4
SHA25696979db3a008f8d19353359f358eb2a155cf3b10c08807816325d0f1cc41eb97
SHA51261e69adc151dd0cb17609d076ef054d03762d054db17a4aa67aa71ac67c8acd5ebdfd7cbb980db81c8d79a3812c5f2c9934f0545a3663342e7a15d596584a51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945d50ee354f365db833dc0c1dbeb4c9
SHA1c889287147f5d81dd8ab65313eeab167b0e454e0
SHA256a2a93ef2f0c7880d5fc9b370135f33a2f38b925c5675683baac9b578af41b88d
SHA512880e7ade0dfff3bd2cfffa48e923624d7258fa99029611dab771a9e07fab0b30af005a970961ff4fb66bf5088295cf6e524f164fbb0412e6d1a85a5e6d1873e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6cd683801e2e176ca6998515edcf89
SHA1627887418e3d482d1cdcbf64c2d5b07a1e5e49de
SHA256fd20e684fc610b0e46d175c2c2dceb7ed70f20fecfa06670b1b123ff05ff8dd4
SHA5126b23aa83dd2e0e659708ee683ccf23410a6724385f1592be433add0fe78548ad763819e273e49c7243216d03ab0d4d266e787ac63e7613ee7d33d1115661f14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec1fb388fad95380809ba8d37f73dd0
SHA123534c59c18d05f2faee2ad376d8922f929a0743
SHA256b0e0ba4c614a7f010ce3adce0de114c8a00b86bd263444803d9a62ceb28f8840
SHA512fb756cb54cb58f4a6f1f0843497538add361b23ca1e19945cd361ebbe0337b95decb1a337cd92fad0fd243ec991198a2755b937b1f6fdae55e1bd1c55848fa02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a72d85ed6ffe025c5481f6720cfb5268
SHA1623a5cf6ed84ab7500214b3ffa4c9108da2cbacc
SHA2563bf43c358113e580abc87bd9450f0bb9f401ca23abb127072cf750452093380e
SHA512d7a3d76284a3b33527f51c03c27912f02de414504ab3e318dba784620d6ce7baef4e291cbea4802661c3b13667002544d4c1ddbb38a6e01ebb8342c86da6732a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031cacec08102304f583fc0e59c4366e
SHA1e6a0f2ca150b4d40b48a9a425e693bd67a31deea
SHA25697569b1c731ce28124cb26b626dd5945f533824eabf03b9aa44be2c8fa58d949
SHA512df08611b689c1b7827b0c7a7ae360029947a2763f40360e7c1c27230cfc6ae9b6acabb043f2c8a0d438917fd3cf1341851780eaf178f3a11e9dffb86a1bd4fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5550bb06cb910937c4fb326bb40ee5190
SHA1badc83e62afc7e171516205680101bd7f6e1bf91
SHA25645535e328b5e45a0d294e60fc209153610c0f83e5b9cb943442966ea3bedb7cc
SHA512eb61ca93b27374720be758fce79c1768b1510d219896abc4f260ab6e23bdf1fd9b856aa34d7fe9a7b28deb74839f473b450502964a6d196d3b2d95113326d4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526ff6818c8fa284edbbfb76927edc5dd
SHA18b2af83fa14a667b38ede28bd74a833ce9b034fe
SHA25608baf82192a8936cf898d4c06850c4d31421d08da98c28a337c335baad1b1fa7
SHA512f1a30d9effcb07d06aa2c730b2ee3d7c71afa12209d88df5f90975da4df4df1d4aa3adc0f7595b326db8ca92ad8fe30640c24c5c34697ec2b65b480c61d8d1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5623b5a86d35672d457509dccf0c5d766
SHA18885f85ffecfb9f13a6f20bbaf6e257a23f1194f
SHA256c3084a216c3e595281dc7d4e3cdaa3059ca48d228c365ad194688fbd851cc919
SHA51277459f6fbc28c03ab666846a1d47ed4a9a941fcca7e50160f33cda788e8fcb9bbc88962c36912bb033d1d621aa6f3ca47479a3b28ee6db59ca05738dc6a4dd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f668cc4678e7b520f7dc67dc018f8ac
SHA1325fb20cda202927bc46f594699e8c9012b6286d
SHA25699af1ef06f12b036d8d990757d760544c28a4408c5bc4738f8138dfbd7c18892
SHA51269415138a56c9921aa656836c3d8c704beeeb3873941a463c53cb63e2488f099241bcd801dfe848fbdb60b19c973cdc0f4eb104dad7ea284ee5f5e79680b83e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f9917a5ad869731d1273ed2aa486bbe
SHA17af99796db4d594c917b7b7f4484e9f24a4d1831
SHA256a8b73974c69cc70bce88fe238c68dde1406938d14e1df685b0df99ff752f3346
SHA5122552845753f95a9c8ba89ca8d7280cc8b87e53f8cc56626a9a7830cdeab6cbae8f3aa6ca79122e5e34c45636cea03d8ae7e612890bb0b2835415cffaa1dfaa7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504b54ba1768234f3ca68c4ee04698c1b
SHA1277697cdcdfe8cd4883af862f020138c1c19b63a
SHA256df11b95b1c12f7d23f7690832bf2f8a8a40a151f5a2044769233e8271ec96aac
SHA5126c346d8b2275563bebcad8e8399c990cb35ae8c7e26bc56c98a99ca863b29c15c821ef1f0de1ad1db388582ba1bb070156be2beab1230a37a47afe04bf71f4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e5566c895278a2a78ac0023094e81fd
SHA177048e0d65e90a4a88b2b7e594065859b6d66c5a
SHA2562bf7522023e96936791b1c155db58791f85ea06636a5c108e6d664542df3ddcf
SHA5129da8f6c19ac9ab2679d34c29c4847ee49ce39c77b60e490ab7e39c0fda299c91ea24980006bd9441a6098f31992bf3f359f90867237e12433e9742f6125b7777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f2128dcf4c92004367c8089267348f
SHA11affb556b47b5ca0e174a621062b948a2adbe3ba
SHA256be7d5ee8625c45ebea260f3b4277f54591cf1fc8879997df5984078e8a023964
SHA5125b7781a06c8dec014e13d28dc0f3d66ad9d5d3c54d11d65f4817fa33841fa03774d7af2f9521f2c27a6caf748b84d6f0c9d0d4d6d58ec566d8b41b5cf590e57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5079e9d71621c8a253cdf6b2764edf587
SHA121acac022c6d7b19539589ea643cde162eca44b0
SHA256cb69c0f3d80b8088782f4b007c1d15d371fb77ba91268a6555ac799a08cdf54f
SHA51290aab02cfbde43bfff74d948a716f44f76aacda2a44fd022ab7c118aec5ca9ec85fcec86b879092091399228bd0edbe6cf6e6eb659153804651b975056e53a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f1ed5b59e9ab88a6eb1c69c03add37d
SHA14c0651e6f3dc81db62f2fcdbf5f19b1e405132e4
SHA2561b73e5bf3cfcd8647160f299d8fd81b0b79ee9975453928f3d4cf2d4918ede51
SHA5124175381926888de0ddfd8a04e5960a1e9cdb12ed3e3ba8139816c926d87044f0d3e4f1311e84d7ae1bf4ad3932fc68e98e9350183327ea424fa4f0b4df03571d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8e2ea040994caff0754878ccd2e58d
SHA14785005ae9399218abedc3b2caa02f73e6e254d4
SHA256a36eb4e2b5d92063bab0bea662b5a0b8474fb41cd029d9a996398d108bddeec6
SHA5120721e71e8d90963b50589f0c06f54649fffd89289fde8af56b438cc825948010372fd1446bd3968ee70166073a0a3451336617b41477c909208bae19808eeab8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a