Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
06d03fb9c35cf4170a3fd6b23ed74338_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06d03fb9c35cf4170a3fd6b23ed74338_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06d03fb9c35cf4170a3fd6b23ed74338_JaffaCakes118.html
-
Size
70KB
-
MD5
06d03fb9c35cf4170a3fd6b23ed74338
-
SHA1
c29fd80d1d76bc0d349c1c622aa029939466f629
-
SHA256
d55de8e74e96a3ce6337781a2381606e1acfba8b70362af7145b32d3fb41b992
-
SHA512
f242c55414f051e9ff11c679bdcf8e3e7da4bb90a59f44961e9c260e3e9efbec356fe3e85058faa3e6ae848e734329970963d8a296670eaff8a295819b3d05e0
-
SSDEEP
768:Jie7gcMiR3sI2PDDnX0g6s+67COveOv8oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JnU5TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c5c782ed99da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f1435acb85dd9853b0858f824b92c7cf67d1a48b9c380aab27f10368e26f0564000000000e8000000002000020000000099bbda7479cc91b9f8049fd3a19a3ac8c250773e57e84815f11e2a1305da5c09000000066a7fc92087aa6f5dafec9126146f79f3f8cc817fd19aad650b908ea341b8a2df4fdcb1e8d9aaf93f1266a9c4a3bb4361102ce14a9ea4e1a5f83dbfee3eba246d5fb90681c1609cd9a0d0deea842eec169dce23565a43ed698bcd521ae3b7ab32c1a858827fc3be0bbd76f00f5af1a36890a66e1515a791d0e71d9df135c3c4dd71dbda758ff6d678f3ad13e0b51ce7d40000000b1345f8655b170c076e0a06d551f627f6648faff5a79da5e0fa74cfd90b178d244293afa17261495aba0c5527e2040191fd09334f8be6718906fd36c3e32eded iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000905c108c7b4512f1824f7057be74fe2d4ee94b01df37afdcc7b1cc9e98813b8f000000000e800000000200002000000075ee5c883b88c0fb6fe9e8b6d6299a78aae57fe4f1fcd9212cfdf42bb420942220000000a8409e89606b68b3bf120fe2ed21a92740225f2710d67ebfb79da73639af6b15400000003b21889f8cd87a4b9a534f320957a84eeee2cdda9e491fe62ee52011b49264b6a18a64b0440cab703c2fb55e6ca0e583aa9e4ff0406b3dddaccb71fd62d28cb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE161271-05E0-11EF-92F7-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420526669" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2372 2868 iexplore.exe 28 PID 2868 wrote to memory of 2372 2868 iexplore.exe 28 PID 2868 wrote to memory of 2372 2868 iexplore.exe 28 PID 2868 wrote to memory of 2372 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06d03fb9c35cf4170a3fd6b23ed74338_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a00c36572c629e9f7a4767bcca695f6
SHA1aa7b86057a24318f97b61918854d3ac7e58e123b
SHA25683ae80c4d0a3f0bf684e3e8a8c718d9a541aa42634a5060e5840221987bc510b
SHA512dc03004342dae356579b8d31ebeadfddec7094d1959d87dac8d5f8f3dab3a68c7df18089af111289ce13c82c92de35009a39d363818ada62d1b3d9b091e84b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582751bbc31110dd161ea8063a7278754
SHA16cee2329340775bb280357dedda799b49ff21277
SHA256c8774417c5790743b52158f89a3cfb594b3a1d09bb7001d9879a7ddb667eae11
SHA5125bd3432c4b47869bf0c39a9ec89adf4052d37a1d1a2623f2620607f4e2d9832d60ab9d3bbeffd3fc206d95afd9255975ce0309912d07348cf30a7db1019a7389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5708cdb719039830e80c87b820f3cfeab
SHA14d9a2e5836babad65b60b347be2d60b708a5c734
SHA2568d3c518407681ea010e1db7988779b1b30ab42363e159ab86b67834a4be5d593
SHA512ae032dd32a356ed7af00429778295520937572e2613277719ccb29e42569f8b3d804b657b79b95bf93895309a991a8e531217cdf7fccc11fcc518e52507a1bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da5b56733a1702cccd025f1599ca113
SHA1f773c93a9107bed0ee554393e75f1a1297c84939
SHA25600406ca644f1fc47cde7871d4759e8b2b1bbf50bbe8a81ebe20877e81d359a33
SHA5126efcca43896ecb6facf7b990fc635f316f8b54a5b47d672607068aa9659ea451fd327b1d919329270c47cf9d94588d524c8b57568b690e5435a15dd8ec74c3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707fbea367e1977d606dfa04d37f2c2c
SHA13a13f19608b78f8ce03eacf0a0ed67b4622a6dee
SHA2567970e725aa2f3de5bee7a0825611844630806ae1073b520d4df6b4aa1eb53711
SHA512aef497add1893a1ebac58348a9808a5ab6a2aa46eac5cd50a0ebbbc74589f68f2efe823a6893a832864e393bdf5cf601ee563bfb1febac8860fbb6315e021480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575fbb1169af8e08ff9d5c56654a062dd
SHA148ea7e18bebf8c450b214e1974591c767d5792b2
SHA256e611342193f0744303e3414c923593b7ad5bf8fdc95f52ec917cbe28a1062ef4
SHA512bcf07ca51278530a003ad27568b11b3ef2e8590fb825ed1632ec2a682e3de32c3c57a1ff50fc3a71cbecfccfefe6c603fb439150ff9ca4688f90f8007587e1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ce36551de04e4c438eda1909a2904c
SHA1add3bbbd9841a590f16d1e9dd1db8d3e648e5ed4
SHA256c005ad739034343ec25fa6035a865b6e6039db9a827afc59f5eb5908f936300d
SHA51207f85f7b1cf33a69bb0a5dddf75cbeffb875292c093d8f912308c84d3f3138df59d8c610d484be04260b8244041ba2d37bb3143a2d50704d4d4f684d54fb46c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558ee31c93edb633583975760a38d4b13
SHA123db6e28689e18fdae348cf3d725b8357836fa2d
SHA25695afeeb45535dceddd754a8d943ca063d0ef3e7eb1cab43d2c7e5a1b04af2c87
SHA5125ed39bc395ca8134ac88c3f34f6206c33934a9d9aacc1ac9a98090758ff022db90b5d6dcc9889800cd14bc2af85e5886501e8e726be149f6e6483348bc8ee64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3a20c07e9e3d3088ebdc989580c254
SHA12bd8d50c86507427e76d0d9016b0aaf906f8b715
SHA2569ed95c29216149a866791ab50cf5153312c0a3cc735aa57301631ef230d3bb70
SHA512cabd827ba6e3193b04aa519504c889f398c52f09c2aab81774380b0621eafa84b6de28de708373fef65d810f1e92e199a8a64ccabf69a8d0a3d17396346444f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c159678a42a25649a334040627459a
SHA11d4dfdbc45bc25ec4b10f595fab54c2a93f07780
SHA256cb7efd7a920713c7c690aeae4823fc084bcd66e82de5479f26fb8f3fa2aaf6e9
SHA512dbe487c4ceac59311a6bbf644c88c42f60dd7be511caf1b796046c5b1b00315b6b66c9a7e7b128efc5df4764ba458b318ab41be256b414ff3d3c50ac1da89529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b458e37aa0170645e8cd4d491b1f38c
SHA1cae810a61d7701bb0a349768492f0a5bf8aecaf9
SHA25646dafb4c6fbf1fc92db3eefd9a4c2ae0de515de4818e2f52a7bcb5a8cbb5bfd3
SHA512fdcf02f6f30da05b807de16e83313df586bd3c2b4ea98f7f0e411b6bd3e20774b272d3c7f2604ecb379b8f906f05977a29fab184a05372fe59d11a680c24b151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e122e43ff6f5385e02388d45f2111bc6
SHA1092f811c1ea53ce4743b727fa6d5dd4d2002ef4f
SHA256607cfa19495d97f89c248f10bb51061b09656fe7c5568c2749dccedd7837c792
SHA51205bdf5f0b7365c75bf52625ac5e51dad572003e94a0169804d64f14a36d2e32fbb1d5f9906a5c7a5a35ff41c3846bf7a65bf089ebd9ac6b0f9f44e8c29d94193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f729b4b9b2974228723f602dd20d7a
SHA13783bb3530ba6b8965a6684ba40910dbb5d98804
SHA256796d58633f0f0652a921ecde548726df49c1e79a9a127d83af31df3380733c9e
SHA512979017b1b8a5a2cbf501e32177619b52073276f762e79952670e78a58e2f92b3a49930f0e9b18bdbcc206a253b93ecb4a772e575600e2cbb0c3764d07496570c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e065def0d80619954ab4ca8aa997d5f
SHA1a0c10f0979ff0ef7cb7b0ee9122e867111600468
SHA2568280c6fffe2d5d50b9db07a0c70e85ea67114bf39f7ecec5c9b985f9571d5d53
SHA512f20842c6ad0b2bef4a3d92f4d9b5e689cd55beb9fd4ab25842b65375c5ae514e00a4d1c72e46d6a2c88cfabea7ffce1138392613b203ad0b264dc355d2c8ce5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de18590509f21e29c59576c8976637d0
SHA141e77613382ab5e66bae019e882172cdbd3ced8f
SHA25651c11eb507ddfcdca2471b4e23b620b9082e212bae23d520191885946a1c4e28
SHA512916cc50f345e0687f8eb464b54dcecebc1f9107636ed5e5dbeb7d00f48ecd22848ca83810888647e8cf8c2515445d0c8887480baa0a01714da7f7d859a865202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580fce0cf750c760a67466c559e2528b9
SHA1cf285de21e1c4d915f165362be6c54a41e67eea3
SHA2568e3c42dfa278d2ceabe2960001e119fdde4f3b38eaaa12e497b6d0acfe7579a5
SHA512b346d0fbf4ff3e1d80b52192c05f36a3de867a7708aaed1cf6ddca34628e27c9ba62a7e02cc678eb92ebe8640422c2985246d3af36e9a37283cd6b20876da0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e2687d2f1cff6b7d3791b259a469ebf
SHA11e458aae032dcf948ef52063dbc33e90b5aa6cdc
SHA25616eacda27854377709596fc42d7b69d21a0e48f72a58ce9bde0aa1940303ce21
SHA5129ae578b466ad28f6bd662e453f705a488bd93e9bb3a32ab970d25c95d1dd7b1fb7b0728a402accccc39585e26ff06d16c2ff700d68ac028d73c00994dbfd4fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59003d4139de336622c07b1067c7d61a3
SHA18de842a8d5f96b7806d2d15c677a641c73b166c3
SHA25633b7d70513d9d7c0e7c1a567cffa9bd5006b6ad556ff17e2790ebb6044c067fe
SHA512143b740514e9fa56a23c7b1f2e2a67cc3656396474e5734929fb7f7ab8abd246d18ad8fef9a767106cd202521b6e0f148cae843e494bdd8f8113b84f82ade134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3f8f8d29e04fd13d4ddf24789eb975
SHA189c906db82ab1ac7c4d9e16fcdf3411e6c2551ad
SHA256355e92fc47380f18dbe25c79656f375c1ed8e775234c4141b59e52a4b6130d05
SHA512710e8629ba71ad48150023ece7d9a2242d1ae43d90c6d9dca0ec87b5858a5397718f18f966525644245a87181f413d939314520d79bbc2a35402c288884a7864
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a