Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
12998636937734ba939dc1a062f704c7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12998636937734ba939dc1a062f704c7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
12998636937734ba939dc1a062f704c7_JaffaCakes118.html
-
Size
460KB
-
MD5
12998636937734ba939dc1a062f704c7
-
SHA1
2621dfcdd4991b9d41877542f988fe1c801bd41f
-
SHA256
6378d441639d886e671aa747f85f3f26dc73006cbf5d73e016069d180d463f07
-
SHA512
e9250996469752bb53b7fb97aa307bf58142ed641bd4f243dc2fc0b9f741d2f6ce16649f4a6f141e6f28d595eadfc7c5e35dfe2085a2d63f3081e083d01b53b9
-
SSDEEP
6144:SbsMYod+X3oI+YwsMYod+X3oI+YNpsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3U5d+X355d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d1331c199eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ff13f4d2f339327e18f5f1b2b98a13fbd28a242e66b823b9a3ad4bab61784576000000000e800000000200002000000017491d8aa053a6b55529b6c2836e896477a4fec4264a4863a44d9eb736aa68dd90000000c81c3874e92f136a507c4ad95b5c17f74754de29ee84f57be76ad27ebb539d61c8d934487ca4118e6fbb06561c8ae296151c149b0f955ece9c2c20345b85a545d3e12c8aa85347af633698b15e2b107743d29cd837d0c5aaacfb2aec47ca1533540965bea7607de3929195fa701f91152066e2e5e9c0cc9fefd64b0d588a7282d17e83c74d84cb1cd552284d2cff4f0240000000eb32faf9ac6b903dd8b910d1972a3e44875db4dd106f10ef19e98be18b6ae7459cc0739fe202ed2fae3b310ee85084c093c59ded9bd2fa1c480b73adfb23307d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420985193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000001541d0dfadbdcc14be5129243ea1c033282c21c0a9914ed69ce5fa09b5ba10f4000000000e8000000002000020000000bd70e974c8eb8857cdd2f36fea50a43623b5c5d04ab93e600445759559f15741200000001d994f27a4cd6110e047b56e83cddbc123853da5395b7b5c88ebdaa16c43e3c640000000d111dafa226af4a100ed51281eb7fa1134b425b774bee191fd416a7bc854ef6c95ea150e4aa2a7624f4461c85d31dc2f7a82079422e4853c9563fb996cd9a6ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43A57181-0A0C-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2944 2240 iexplore.exe 28 PID 2240 wrote to memory of 2944 2240 iexplore.exe 28 PID 2240 wrote to memory of 2944 2240 iexplore.exe 28 PID 2240 wrote to memory of 2944 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12998636937734ba939dc1a062f704c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c925c7eebd4f4e58c412878a6850ed1e
SHA1c682fad4b541587856b83c08dbb7500260578875
SHA256541d347f813061c4821089daf16a6fb852f4d88f42cb87aa1d326255acaf4312
SHA512a059af93b90c3e596738198eef2d1e35cf4f86816f3c08b65ceb433e4eeaf574d6c814326ab6f058458c3ddc99cd0b0a48308b2ad6e17333402c2b818e2bc89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530317c95453282b7c09b66fdd4297e76
SHA1c1eda6c73d8cc83832b4965fb77ebe57293b0ebc
SHA256e0a224cf66f0d43360a383cee76f2df4e43fa33defdf9dea386b3036868c7835
SHA51272faa1f17e8d9e6e6c6256a1be89674edcec2551180b381c9c25d214559ec8093afa67ff2473d2e12663b2558f069288d4d827b2ada210130a3e4cf1247ea6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acf8b691fcd4c1687cc13ba54c8abb9a
SHA16dbe53136c9c99b834a1af22d277c42e369324e4
SHA25669ff448c76938e7a7a442b9b7bb4ac6c6a68143e094c19c7751d77c93aa21a63
SHA5125b0fd385afd838e0c234ff656ea93b35ad81c4fa531f3792ae9a1e79161a14be45cb4d084e2caa87c79d1df567e6ac496fe97111cca52c4884647450b88c6e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642f8a7cc29c29a790e34fc6c55b9672
SHA152507c3a21999257c483d9f13443cdfc7818c838
SHA2560e8efb38cb7d96d6c0c7f74571d0a8600c2afe6a0a9208c94044ec5437767793
SHA512a27d6dea6bd0e34a158d86c06b252e79ab6358ce5f32cef4eaaa137a2d1a30f23f6c2ad70bc12f9f3309f133d25a00e9c9978bc06d7dc132cc1fcdef8c45047e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d7ee1f3e602d5d98c51b5dbc0572f2d
SHA1bc67e04bfaec6a0455512494567b43ab869e73db
SHA256eb4e3d830549ac795398bb3ee1c38a69e4a4d9c710d4b301b70bdd7adb26545c
SHA512c8767d044f02e808c4e20f52243c270ea1bcbacf5899e2fc028a90b7f0d25ce375fc4e4afaeaf8d141bac604fe681e79ad3e2985761256701a2760b9aef59c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d09d71312f9e3503f56bcc3c99e47b39
SHA17039bec8f7648f3993a8ca68faa6d900264c4b14
SHA256be85048efed0fe69c8a18c736d303ed2143d99a0bf93c5769a54986649d3005a
SHA51265041fd67f6b63913c5aae3f2198cc3b548c4f6f515fa0fe5b49ed6cc0ee803de8d9d7b9c2bb26066d5ad489c71d01ee26d6e72458cc3ac665558b432a0ff7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ccf5fa132e88e9d748e14095dcef916
SHA160a90ad56adcf2bdaebc2fea1a797865f8f1a7b0
SHA256fdc2c71cf3a5769bc27d30914b43a9b1f88d9edeef90a3a6b0e7682ca61829bf
SHA5121666f2f3703c46432b859312f8416cae8b83ebc5c19b1592546bb2af18d79d3d781050d69c2bfd966c0163c87e7e89fd5baff6b5a4086425c6c283fed5e17465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52286253db90556c1fb8ed53e288f21d9
SHA18a9ad2e0f939a8fa94be09cc06991435194f3c39
SHA2569b14be7cf60eeaeec638b475c1505ab88a4cfcc67433f939e7e74496e5bf5479
SHA5120cb9b23cbf8c720256b73c3ddf210234bea1222b4258d58adbc9a73edbeb3f2310bd1eb8c4f6a4894b56ba7a54b3813c1c6f8d32908086d142ef5d05e6aaf961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9b16f7a04fb52d6aa03be6897a6ed2
SHA1dc3337d854b89cf95a3efc23f686447c6e93b232
SHA25605f31a8d7dca8f252288db28d73def30a7a2e4d3d725b86684f3f1aba2b5f2ff
SHA5121f2bf85cf9945b80b4e6843cbc4c2ceb89a680d5c5861d1567f79e9899b51bf68dd2534843028bd22b3becf5ed47abf50d191dec3466999e9b8d0f48bbd52e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b18552fa04ad95823c6d3263123136f
SHA127c1605e2d61923fa94228f23a69088a11db64c9
SHA2566dc9f7ef824962042f262f7865ce1c510fd7e1cb9599d53efb7174259c681d65
SHA512874714c8fa7fffd316fab71d66bdf0b8106e305ae920037da116c1999465d648b2ff454916f08b24b62eee4f29135ba48081855d6448938696bc9beb9a5a5a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50239c222b95492384d81b39c9f662207
SHA128a474ddacba68b5c770304b8156cf52ead32fd2
SHA256882187610164982336b0c0dcea7b58f58a3dd08402e86edfcf28cb6f0a5d7c30
SHA512d538f01ea24ade6711eee4b38f509f01dc2374f38a7441914509b5e0600fcb3e0f1c2f0538f379a84bf233ba0278478e0c2c7419b5449a0e6956c6f8be972c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a155b5479f25d5260d48085566b96479
SHA1643bf21b7607b076b02002e1ead855231a74e586
SHA2564a70a767a139a6fab2b26ccf36a9c00decee76f7841f45e6edeafe45a9eaf487
SHA5121476be442087fac7896f8ca86d391c88847d4f15631d1bbcf45d907e6a0c65e5fc0ac0ce43b5d189116b4b5cb942880bd8af99f7fac5a9afa7f0e7c396ce39c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1890dd2eb80398eec62e5d2583cbeb9
SHA1634ffaed356f03889399f783a6145605187a1b3f
SHA256308aa8790b29dca6526c620494fb87bd3ac1f1f18cb2aa6e776c1dcf0eee664e
SHA512a8a45d8f9b980d6d07662beb20a19e62595a40d8c81c027927e8766c79fc5ec76169f2a1b8262acb1a9198fabe17ae2a754faaf694235c867b36d4f829a0da43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad478e83323dc08246ea3292c036cb2f
SHA1de774e1bfd092e51c057e030450449228aef1341
SHA2561d5c52240b02c87ab35da64ea3ca5f5fc442ca1ff10d671551459510e7b84e02
SHA5124f33aaec968738ba052ee7428c588f4f6a253b34b70c91e78398a70c2fccd1d224b37cd2fe5119a5931725e5bb3d7ad2ba636416f34e85a49446171ca3981d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570d425df125291c8db9a792ff6156f7b
SHA14c4666132e76b330b2a895cf6b72a2159ff26b8a
SHA2566997571e44804752356dc1f700ef5fc863a4bfc0c23bb7f4ede52818b4e888a6
SHA512c72c8e0580f3ca119c9ee7c91e8d6076b90a899955b6e902fbb5d687ac60ca6a4068428cfb2e116a4f6523522e3b39313f46784cc9095ec370dcca1ab94f3e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db88c6bca15373abdbcb517086853faf
SHA1a88c23714808dec6866b350eb2df9f557493e38b
SHA256256cab496df53d9d32f71e476ea195d64e374c2d23c14292f1cedcbdfc4dca24
SHA51245a2a6a0e7cf4c204960e865c8808e6b6def7df25e8e9066038f05bc2c9e637e95cbca9fdcbcbb86238897a9cc94875f12f82b18c8d97651f118cf8735a6aa91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e108cacbe3b00688fe64142ad3e0ab9
SHA138d364e0c78a85976400acb28de641a793c7daf1
SHA256147108196b48c3cb7850ba18ce4fb29a7ea72198aaa9b86e9223b92988845a74
SHA5120ce50f0f3978476c096ddd75ebfef414e9d1ffe99e1a12f3ad383909cc78c71afdcaa7b224924fc96864d2975f59b4311a2fb78f5b6f9e1fc2b4fd1471ea384d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56185eb64f5c8ef397e588335e55f1bf3
SHA1d23f54f94b9ea949b59399f7baa7b14483cd8a74
SHA256c2154ae7273fe994ae13ace1c07e3c9380b7fd496ab5b312771e18b16223e135
SHA512459f3d24d6ccdbee5b0206050bbe2e31afad27987b888f4d12c93a12c0854954acd68d554822526129e5528c608a025f764590d0bb39dec908e2a884fc3c1668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1349d8c8f664f2c092aa22896ec1c0
SHA15af6a941fd42ec804e53a2bce06fbb617a5859d1
SHA256110e135fbd2a98670e2995af1f3e67e798b2f6525845ebcbed7e8f41dd4d86ec
SHA51241fad5f8024a9e91188a6dba7e9ca1f865a7ac22dbf3b8ca836b92f6262a29ce21867840b1ac2dc16e95fa11412058f77d6a354201750defeab301d803cb6184
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a