Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
1090a1417fb5b20aade4024442d9a341_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1090a1417fb5b20aade4024442d9a341_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1090a1417fb5b20aade4024442d9a341_JaffaCakes118.html
-
Size
214KB
-
MD5
1090a1417fb5b20aade4024442d9a341
-
SHA1
a707731967fc0033b339aa4172fb71ec78e4a2a2
-
SHA256
5a9bbeddc6ecf80e8cf51e0b103c09991d93a2e5cdf40e4edb226e8bfe72033a
-
SHA512
c90259d9a8f7abce51afe56ea280d7a951f62fee31466095bbde00a377dc573dd2c8e1a623fa9b0917a49c10bd512535e43a8bd6cd4c072ec3b0dd0343a06055
-
SSDEEP
3072:xrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ+:lz9VxLY7iAVLTBQJl+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB271B41-094B-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004b147f316ca371f7ea5797a8e7d16993df5aaf3b881e257d50c01dfb44627141000000000e8000000002000020000000f412d8979a4189b31b209339f9c1adea4f334b19b57f81969480a1f62d9bd56820000000a1e1f7b4a92fdf70d17c3af6dbfa2ab195a9ebdc1219ac0743f02d4a2da22eeb40000000b2e828de3ed98876aa404489e0ba928dd7ed57b6545f867fc81ef85c2667a2d5977e6f7e4797b5ba5c2457ad771781cff1a1e5d8e52f2faf81fd36d236c5994f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420902609" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9098af0e599dda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2736 2008 iexplore.exe 28 PID 2008 wrote to memory of 2736 2008 iexplore.exe 28 PID 2008 wrote to memory of 2736 2008 iexplore.exe 28 PID 2008 wrote to memory of 2736 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1090a1417fb5b20aade4024442d9a341_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983f49bc02910e1e99b0fb20942868c4
SHA10d4e6a732944c776bfaca47f1195e9544b83d516
SHA2564a8cf696f7b763afadff8deb3138e6f0dee5ed4e208f5e9c36d4eb11fa09cbb4
SHA512b04ba97ac95416c0925f7c375ab6e5d4a2031fabd41ae38b4af8b4403f9e10f281c7d05532584b21925a82aa79e161c6bc580f7880afa7f22576d9f545d7a2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52437d2bee578fbc35d9b409a80cdf28a
SHA1c01799f964d7a7fb037cd00ce0a6ab2cd07dbd92
SHA256fe08b0ccbaf230c49e2367025cb95e45170e13c3b23707e50b133eec78149a2f
SHA5123ba8fd0bda59c0cee0dba89b60be1b336eef861fade6a9d950000b6c0546b2720c24e0fc5c81e5bbfcf810fafa4cb55b211f996c5357838fa2c9122b1f66a841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f890f3731a2da8aff188bc33a163b31d
SHA1ba8ac638085c9ed6700a2de2fe8432468a0063cf
SHA2566ff7a19e895990108b63de05aabd9be2b2e8787bfe1c7c53f39ddbded461be8d
SHA512678939997f1407a7ab858195830d121323139b3f4ce12a7102e923641c2abfb10872f9e31a067b7e80b07f7298abb45b3a867cc4fb4568bd23cdb4e36e0dfb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a05b6b441004b2567c081a6ef1555e60
SHA13bb573e83d59a2ac5b31b6e96d1fca668b6aed33
SHA2569a6c290350c96de71743a5bd5d1a7cf152153480b0d3afd61b074fbcb3049c3f
SHA51275ffac407ec4c4833745035b5ef8e3792727226975032e49d693f44eb3b203a0f35506bad40ff77d44bd7bd21da71167cfef99eda6f1ec5ca64295c5052d09b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54972cb0676bf35a93f82722350a1d4d5
SHA1ece3979736e81cbba78cde1b4db5bbd3aad23b05
SHA2564933b0a659cc8f934e0aa67f05a0c8e4162277b340921f84301752df4a4a9b9d
SHA512f1f4e886553f530c3ca8be823919e7ff34be7f191655c162c05c74dade62a9231a6156fd7d03cb1d6d9d3e31682215336e988e692a2843e2730a0be0f3e37a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eccc993fe8341f3da7f18131d6a16671
SHA1f4effe7e6ab5feba674e2c1f0e1a3fa866e6d59c
SHA256c7a595aa0a27fc7b87c75691140358fa0712e1c8a69dfd9c2510f6e10650b3eb
SHA512e0b110c7a1ee168ad13f1c85e0408c9fb39c08d1d5afe7b8b4ee79f47b621ccc46d579a2adb402dd019623784ebb0098e9129075eef526b911386e1480c5b21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffedd53f3c6c6cbec11c8f3c01bbeca3
SHA1ac1b2c9429150fb476060a20ad74bc4662bec124
SHA256e73973cbd53ad66bc88e70b5317904c9bf10385e32a60db73444829cdb99728d
SHA5126ebbcfe6e29ba01ace4f290323ea9e128b2bc6556a5f907a3fd88cde720b8e71f1da0c3a0047276d03397d4a95f9112a9291dd118c79ca198aba49889f0508fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ae60e37cb8a48efeb11db864632c94
SHA19bea47ed79b6233c07e8efe146535d24203c859a
SHA256e5168e08e200a0f540ac06a802e186b308c6db4e9a9307b63389a8fa27ea5b83
SHA512d74f8c14173e17b4ce8ca3b9a128b14442750e6639564fdbd120806e4a9a181fe49a7bec53675df9b1eb9b96c554d4d09d71ee8039b5d9f2e3ceb033ae90cfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51767affbe9040f542750e6ec0f9ffb50
SHA15fc67553dcc560addb6a82ee62d2cd6379eb11d0
SHA25652db9850bb7258060969fc98eb366dff8e66b89dc5ba6651b6eed6003f40adc8
SHA512ed2a1f0094916dd247d93818ebeaad92816e2142ec10552bb40482b45b3c8fd5db1cd97d913ff1ad161ef0c38050dccc2a21555cd05dcfb9fc307abc3e94e61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538317c5eac55fc75edce17ef23001f21
SHA1714a9af23c5945a36adca9664b4e6a2182bf9767
SHA256aa55eb562d8ebddd633b9585f7d9eca1f33fed780b6be47946a48b0842ddd024
SHA5123f76e300588a344169b6f307af86e9d8cfd8ad1d60081f25504daef323055198beadc80f9d40d7c4151ac620de6606dcd07d13e23ab0b3f1def56b5b6b7eb521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5505f1d52e5e548ce8ae6cab1eacec625
SHA1dfbeeb724eaab43ee3f39a61978dff0a76b82287
SHA256db41f72659ec723f76f16d9876a0fd67ca31566d2dc6a2968acc29167ccecb8e
SHA512ad81ac7a970999b540dd5b7a1d3b36fd5fa42853fd262dfb64403ec79439a67c59e5b66c958b3b7a970a92afca29068470c5ac7b556fa6652b2b02de334c71b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11fd84a0e8a9b146d5ee4bf50cc0424
SHA1599a455d63b9e2f34f366c7f551a1e838e89d5aa
SHA25671753270a7094d2d8f3a241458d5a2dda09e3b7b6633de6658f16ef09e91f497
SHA5127c1c2d19b7d86109e9c371a273b5b8383763b52305dd0993044418b6dc6a75a8bd82f8e8311476784427b8332b53536bcae11d608bab75dcab38b0d7904d5d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567d32a3394b9b08daac06b1ccd134a8e
SHA1a9ea5c7d7479ee6963ae208d4e1e21af42497393
SHA25696b6921e9405003d04cc6485004df87294f5f8fd245b8e2dbcb98857e976c58b
SHA512ec4c319c25b64fa051768cdc1b443ab098d666d49d7ad22acdfe8f4133849039aeef1b38ae4d33f7f34a38ec143f93dccfa82a673c303b5c01ca1fe4ccc749d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a142e17fcd92fa001e88873adbe1a99
SHA182690fb67dc7111f4e48a7d02da0fc0a5621d309
SHA256a00d8d8506139fc9124578e4f30e6947b2f09472e5f9936578bc90e8d594c90d
SHA512cd13546e044e31bdbef022d444d91389b33709fa285acbe08f898615112239aae541f29ad1d18fdc0f3197cd184e3777cea60009e71c7e196659db4ff8c8316c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3f4d428d66ccf31100ce7607b9f508
SHA14b5f29edd0bef5a537472c942f60940084c2b9bf
SHA256d5fff332c07891f579641921b0443cfbba0bc66218c50b300ebaf676722fd147
SHA5129f95cc26487e0a0a3a1883c594e75e3b15b1fee3afb34cc4d1cb6a885713cb69dd9ce470288160c382b36e5aa6cf9c7a0ae165c82dcb6e4584563cd8d9fd71f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718eca87d997b0938e2f094e7c29ffa7
SHA17d0eba67f9a7cc8a9c9e0dde17011e50d89d219a
SHA25663012bd13277765b19910cb5f03bae7a07e5dd10cd8438ef6a253a508c5cd767
SHA51261720f6394fdcd3fab050889600ee902a84924574f250f9c11b7e1e50ba8974fe4cfe25cf7a96adc0ea2a84731105591c3f77fd1d2d28fa0f66722030eef0355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590d5cb9af208eb3990d32387f66f9ce7
SHA1c7ac4e9dcb9ea891e1ec890c6abef665936551a0
SHA256df8a78c197f2b0945007b36454e3f0fc4d1c0c737e314a0bef06496a2459b749
SHA5123277744073102e05e4cb0418fb3fff86b723d598267abb2b54268b298e34d379e63da1329f9771d9db22491c9cf1fbd495d338071c6c0b038089a54a90f0b453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca41c9646f654972194b394ce72896ee
SHA11f402c766ed9b59950c7a1f5d4690596691c1020
SHA256f1a88284715d85e4fafe2aee4b5c598aaae2d37a51099e5734fb3aeaf2621027
SHA5127ff6ee18460e4443e39c7cda9f5be3eab0201c6ba55ed7312b093fd59e85341209adbbb1ac0a15f645653eed3e9e32bf4bcea1f5013f7295605c2ecf1a00f818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3148424c2b4e6c87cb2d40303f9ffb6
SHA19866e707553f940f796694b273f57b6582e57993
SHA256ab6a41528f9915eadbe143108fdf4cb38351a34dc03de3f09c18793168b5cc60
SHA5124ce5973ea760b129eb4934fab0619b005bf874efa5a786bba915a9559e12f6ec3de48c90587370533b472cb49210c4b3ce07091fc5b380dbe7dd8d5c9d8e2cf7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a