Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
245e66e8c0ba1ccd2996de669518471d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
245e66e8c0ba1ccd2996de669518471d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
245e66e8c0ba1ccd2996de669518471d_JaffaCakes118.html
-
Size
29KB
-
MD5
245e66e8c0ba1ccd2996de669518471d
-
SHA1
72ab0d8da7f8149e0c067222272b4bcd09d062b2
-
SHA256
ea08cd75c6a9f0a19fc0e7d5a9c376868a02497d3e4579b180eebabaf4a231f4
-
SHA512
01def07141fb11805b1f339249c2d622198cb86443bca63194c33be480f0ae032fabb69b36967f4ab884ce3fa0d4074e59d6325dca831df24bb1ce57b4cb306f
-
SSDEEP
768:ORWV5q4qGnGbHiRoCCQgNPUyqrVjoAmfI:OIVtqGGbHiRoCCQgNPUysoAmfI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421325095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000dc4a26388ee53f4bfd097c7af744c6be7b9d560c7ef3622c768ae34a32c3fff8000000000e8000000002000020000000006f48cf9dbfed14e571a9ab7533de2d6854ee235f655b9b9aca5bb7f74011d8200000002f4196860f8d68f21dd67902a774a89126a53841850451e774731fbd023772f1400000006755a32c3f8ace3659611afef92a36e72e7e36f0f05436971759ff4fab9c33270fe865184d5d3cff0da0720d0143adc9e412563207d9ddc9ad92a99d71aaba53 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a048f57d30a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000547dff34b79f6556dfd539c86c5bf7778e123b6ed72895b7f796ad838cac0b8a000000000e8000000002000020000000f39d89e2aec955293f0b884438e14068fb87197ed3e5ca0af04ee21860bc9bc69000000098cefcb369cc5d73cce657f120e5bba7880ad1f43b888a01e69cfed9bab67eeea2e1a61832ed35b49e98d447ebe8d1a415d655bac3d3f63629721536e055948bc123591de3f172c3d085e72c212eaafbf4016da56b81841dada477d573542ccd6b0719bd68b760e7b8b53e7143a50318b8e5963207a4bf5ab4b970bf54c0f52357cb1604bdcbebb19502d1416051a4ee400000005066e1a26b7ce6fe15fe2e93457ff11aee35f28626b84f294665269d1a5ec3a3d63fcfd92652f4a452d20df20e515fde05c5b4cdd4d27b0e472a3bcb596defc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A910BE71-0D23-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1720 2456 iexplore.exe 28 PID 2456 wrote to memory of 1720 2456 iexplore.exe 28 PID 2456 wrote to memory of 1720 2456 iexplore.exe 28 PID 2456 wrote to memory of 1720 2456 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\245e66e8c0ba1ccd2996de669518471d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa47f3ce9743a303195b422d1cfe0d8b
SHA1c9a9addedae2346053d8392f661c237d8cc007a8
SHA256319fa35ceadfa5c52034eed9d3a26711c6e9d97654e7236a7674b34894a97aef
SHA512e41a950f40aca066e367e007260ad2f93dd2cd95db8e245bb2a9f20b7f414acfdac9cdda0ae59ef825bec7ef389576db382ae9a80dcc1235aad164957d77a854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57283e8ba361c06fda31e09512ded7373
SHA19fa2b822e046ac474f4273117e1af3b49414ac85
SHA256b24686d920b283aca5f9fafd606675a4e2745cbf7806fe12718604235649c33a
SHA5129e95eba4a56b5f0350ffc990bfe95d0f75932d452ec686a0cd41ffc7af28e4a8b5a7bab85653153432bc160dc873ef3eb951f8ef8bc53f1088feebe18ee41030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51031ab31b49dc22ac968370392172550
SHA1de516572e1b95a6a366f8877bc27e6e19d0e636b
SHA2565401abe893ea114bf369ef49506153becb149d15f5f26a063f612c768588e772
SHA512922fbb55d28283e40bc015b522829136a122b40057087897927296ed11ad80c802dc7a859dd8cd1268d45305b0320e175b3252c95d31e3adbd6cb7fc7c792e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdcf407ef5ea996c3c3a476af84b0301
SHA1647445281ab7057fcc1af666df82422c549f8c17
SHA25695e551920b85cd94ec030bf3f97fee704358b58c6ccc5227286c9124b91dd070
SHA5122c7f6c1fde3c18c18220c650e1130ae29f0e476d32ae1c704223ed52881cf8dc6c912c0fe6be6f87e9bcd06d3375c3413a42a946502d575dee1531a79e3a3a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d22a4a193ef05b0b71d9d4ec2105dd62
SHA10554d7229849c863d670aa6764cf804ed4a4962d
SHA256bc7af1855cfbbef2b504b27ddb3368a2922827ca4cef3748a9b6579c9503a37b
SHA512aedcb61474e568b3dc40f1afd66b7ade7aefbd7088551bfe802104dafab9633c940f34b841054cfc683c4903b9733f3b9b2c555a454241e7182948643f1272a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ccbbb2fb7ff60d2c6eea6c6dc318da4
SHA1338f653406f6f8cf06a1d3b454eb35c87d342dda
SHA256c9aa585d8c13acbb3739b7f0b01edf9ba6ed83c08bd0ee1d957307f786468188
SHA5125ed753f367207566fa065ad8e4a64323b71890cfdacebc050185bebffa3d4c53d982d6ae9c8b957f05533271ba22f15259fabe09a6ffcef27c1eb7b5bbb78d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54938918f95f658011b110f6d75473f5e
SHA1d53a32d19713ff0dc5849b0f33612a19145ee8e6
SHA2561ae01188d7c8ffc83e1438584836938859f3788f38ffce36ef3f9629f1d2a3bc
SHA5129e2b567535ad6e709139f36c6dcbc9c55f1b130a8a8494df2d1761c3e412b7334c090ecd9deed04a74fe378d87d71a2952fc09900da8f25fb293afc2e78fb5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c4036c46ded8ab91f0582847b3e3c02
SHA123c13c87d4b0527e8fe4168ebde2e6882a44e473
SHA25695b92c0f78e5c32cdf448249622fc37eeea1d2ae42f6f38cfa54b51ca5982c76
SHA51297095d4d52ead30d7991249543bf999071cb70a08134f039a4800ab32a23d3c039a7fcb488e4c031a97dab8264a815af1b1e9379a760a0bd1918454fcba27afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b6a32ed50609237701a3b4eebbb593
SHA1d7d82ea3d934372e6ec8aa94f6d3f77a04e49a4e
SHA25660646cf53e3cc066b19090faa1fd0e8dbc20712fcb60bd54dfe1487e2fed6798
SHA512b71b6a6c17cd31629c572e9a4579b16e28168f4a47a494a3653b1d6892e5361645aea74e44e5c94f855ead5cc0e29b84d92e42e88c677511e0c5530dbb974181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f16acdb0f6c5c266bedd26cc1580076
SHA15da0d8c05ef48d2c263dc337249881e6329f7e63
SHA2569ff2b21bfc19d882b56bcd9a7df40887a40a0b3a40e9a9140d2e6f78aca3b734
SHA5129e28bd1f36a73e421e846c86badfda5353a61beceb6f122d65ab9eb857adfde56adb0a152f4124029c6d18f4ca8eedb99e4955def0e92232b84a88aaa1e5721b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356b8c9f0c78a1b195e835a0e1456a5e
SHA11e08d2cb428686806cf5c4da47e91010dddd27db
SHA2564487bc529d41c697d89954cecef409f15be9865438abd7a2e6e95b631157cd12
SHA51297f6af3b6280ffeb56352606e5864cbf9f911673822a3e1412e2c20c4e38b3d03c9f79bf3c8fda7d94b0bbb6c27ec2f0920adb3f106dfe2670003e5b5fd29542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268839440e88a7bbeced9082dcb18b79
SHA170df5746f0f863cba49fa38bf30e966ac7d1a5ca
SHA256397e4d50bc86b3a8f6e5499b06ba0831cbc713be593b99ceafc4ef0a887b90f6
SHA5129877c24b783b37909e0ba71c72195548c2d8ce4d33b00f515eec8b3838dfe280f84e0a40784b65e640ea5c7e733c54ad85103d43427e335b3989f99a8a96be42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8739ea27e49bcc24c840de660accf7
SHA1049c55a16e46034f25e24758de6c5bba4d6fcb7c
SHA2566886cfeea06c158bce1ac4f82292c937e4596081f901eda4ea5712947a1f58a6
SHA512c70f21b8da4ec48f0902ed6feb72aafa8b30ac875713abcf6ee316a5374aee0c58dccc1e49fd0f0eff6b8a4d0dbdb2f840a0095add17e81ed6ad341f48b5511c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd097c7e789f83e06448f072d5c1e561
SHA198020c2790c6ede6427b496ae53ab476de2888d2
SHA256ab11cfb9bce85b2cc279ba07dc42cd7c8d8a0b8b88e688ce75d6c3683e1732e1
SHA512d317cee67548832c8c01b823f80b8983a950210b1767bac3bab5946281fffb749f0cc449fc4e6a72ae80843d4cf1a6b9066be8aa8a2cc79adc6902b6da1d655a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e91850eaa895cceb3378a6da0a884d
SHA14c2e3f37ac1dcd87983f1b0323b7bed7286e45e0
SHA256ac6021184af47d240af20a7d322b36d20c12fa2b9efce8047842662ca73ae147
SHA512b589229805de93c3066bace083771da76409117c2b7e5ac7c832d67b138f4eee6aa9c24a418c3e67a48cbc3940b348fbef0be29fe9a1fd71deaeca8b13911471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5657e258d847fa9f6fd94dbea94ad382c
SHA19a472ab76bdd6b604a8201d0594ebacaca130d27
SHA2560547bc3b7caea33b6777884cd8e5293030eea9548510b0609458a58662f40fdc
SHA51223367a4fda11af34306fddc06f7231e614360f0cc015fda10bbb5d4435ca505372bcab6035e67b84be8548f1a02e332a8c570c02bc23811a330a6d79ade01da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582175e3f73997784d4d3e2e318cd1737
SHA19950d86ecda04f8f4eabef92f756004a7c6451bf
SHA2566b57b5691cef1266f14bf96ff43c899b14cb2e3a743053d4894c5ec6a7847a9a
SHA5120f84e29da843e1b19cc6e3f0a7c0cee1dd21746187b6d3cdd06cb2bad63e4399007a531c76b5db8f3200fee4a1c252dd0a511ce1b44c09790ba5b3387801ea63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c663e76a9279f774fa4664a2ff40f8
SHA1204b50d2742535810cfef22d7c387fab56f965db
SHA256bc64a96d056838a1c06e1bc48d9d93f47bd2ab3d5dff6f57529dd4c485d64497
SHA51295b27b62701290a6f13a819dd87cf823b7da8e6bbcb1fd1430374b7eb1734688cb7171b6f8c897a05e5cfa5e597c9eab8c3c7fb08bed2738af64a48d09b27737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a620250280843df8b7c515491241d99d
SHA1588f824223e61d4fd630c72a22b4208c1f5cbf63
SHA2567da09439ca2585cfbef197f4febecd86ba91e989f8556d0858ed9420bead29c3
SHA51261190e5c4eb0c66d29cf104f6d48a7d80e01e4ba595b4b4b798a8d7549d8722eb361b68410aa10ff48d70d2cdb3ee09ce15355012e2704cd83498559a90fd972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd2a1ca4bd1a361d2a82560c9da3abd
SHA1c4b10e74d1991ac3e8be67e4702d62782fbc2677
SHA2560eaf1c74dab96007db0241f99ba78d4cb0f05bf2c118485351758867b5bca959
SHA512a44c696d39819827ee0abe8bbdc78526c41973bfea4945fe43c263cd47c3fdbc09d1b8763a700cbad63945310731c130e02e96cb237f4b77b76558276d5b412c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a