Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
36356036e286e1144fe78660d1ee7bbe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36356036e286e1144fe78660d1ee7bbe_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
36356036e286e1144fe78660d1ee7bbe_JaffaCakes118.html
-
Size
460KB
-
MD5
36356036e286e1144fe78660d1ee7bbe
-
SHA1
7f091adfd87885840dfa50e575197b44252f06d1
-
SHA256
bbec1a58e5e73c8c99c5b84f56f6ae90464b58a2e7251224b11baf2e6d867ff3
-
SHA512
e76bc56e086685092e208ec3d8c7559048b8d0976a978ea3d2c64a70ddf5e2d69747fe2a1b155e204b6476d2dafe4cbbf47f930f8c717d35f97bb398b1a550df
-
SSDEEP
6144:SbsMYod+X3oI+YQsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3A5d+X3h5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000574366638d9c591acbf56f03ab452dffe7a276a4a6ca66cd192788fa94161d3d000000000e80000000020000200000005b0809d1524236d6d6d6837ed703dd21883fb73ba72551135f5809845f5af54720000000b5e19ed0c6a7c3c5f85ff7ac859a5e409a6b7fd96a9f6eacff1e34b54fca5c8940000000187da68e864907831ec18952240887512f3638a4696209c2729eb7a8ab99f7d6ed081edaf2238847dad336b66b4e8a01401e93f77b9f8cc99050b3b2002e9fa7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{206AF1F1-0FCE-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301dfaf8daa3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000044f0def9334ff87463768b2913886d10ea145a7882a7e87aa0c7c6e4c5d90525000000000e8000000002000020000000f8500bef6d1b4184350c528c32b8ae5ec15695a4b2e8c1941980c0d9c38ea3c690000000af45b4579e66261028e24797ddf3386a07fed129acb952f96db7672c8dddc4cce58f17c994fc550ac21720c60a5795d0dd28de933968aac41055aa3bc0422ed304116cf6fd2f09c007bc14262bc48f87c46781513134c5a30b248cbeca708e9e9454f1bbb43f470d1fe336aed1f858802d69dcf6a19216faba6ed2fc025856bed30d338f4da8e88c002352e9d0ba301d40000000bb7f22c4ac6baeeabdfe2020ee23cf992dcb7288532e1b30840f9647ddfef7fe8d5a5bf79f9275a4b27df4354ac55ec25eaaadc379fac31eff3289389d23ceb1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421618212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1720 1264 iexplore.exe 28 PID 1264 wrote to memory of 1720 1264 iexplore.exe 28 PID 1264 wrote to memory of 1720 1264 iexplore.exe 28 PID 1264 wrote to memory of 1720 1264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36356036e286e1144fe78660d1ee7bbe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8110480de58282b37d8edee513c212a
SHA1cb89eb21bb16fda7473a681203bc4ead711ba296
SHA25687fe480e0879845f9a1ebc3807db663fe2a49a135f0ffe6af1f3b693c3bbb56c
SHA512e594b11015c5220c740c8b28ece767928946d3b191d7ec63f0161c57b14861930e72cd9a2119968d0b0066073c07974877ba996ffff17b960098d394d725c6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5557b62efd49e21221d22b44f4195f577
SHA18c74ceb1acfcec001ac81aeb4a29237f52aa9836
SHA256c7537babacb5bb31f97cc55f87f86c6a2852d7b09ccd7eaab71a52acc895b12b
SHA512493cecae1b8a1cafa3de4f61cc9812610b779cd89d377406f633367d290200c5e41173314669d2f8798a85dff7367e41dc770e2016338438e93a7d0fe3265954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d96c7e05e86b6cfbeaf6aff6055bf92d
SHA18c9137f982a7f6a664c6e082e7ea16693736caba
SHA25638095bf006f1dfb7fe2b67288dd6d10282ad64655eb64788901fb9666acc0b49
SHA5127555f21bce543237700e029c570f211a741075969e31539275c4772fd09e5ed15b3330bd3632cf47ed7cb69c12ea75c1dae0a655aaa79ebe489d88a9831d6409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae98518530fc505ceca7ab17446245cc
SHA1a26fd5b748d8f3e3e1252bc0d0c00e343ee6d368
SHA256f0a916211b098194e2228b81cb08f44b2cb4781cdc6e45be6c7dc5f77ff6cab3
SHA5120c1d340d342ed160f3abffa9d94ca0ea76acf2fd870384a318a60a623003f160371f6de8de73151b8f4db50c43c4c050195ab4b790a13cbeebb53fa26530952f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baef05b74d2643b68ff756e23dd2eade
SHA1ad5f93ffbff78385289b865167b6f177736bacbf
SHA25669f220d74d3505855bd498a23c3ccf14f2a89e3e99850fd70ead451cda515679
SHA5129a82065e687405f0dc673ee9423d03d2059d9d0a881769b88884c9190150301f4bb9ef074a17a8847f058f431e857069b077ff145a93ec2f47bbbc801bf05876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57544d04ccfed68cf41e971124a0ab145
SHA1271c22172a667ee2fcd40ff22dffc0d96e65540f
SHA256dcdb1cd142bc3af40be4b12fb41b8cb3d461b04b55ae8970d9b209973b72da80
SHA51294c76c5f0085b142cc2b4d99665611615263c35a5bae6e9d899a34d1314bc17d5ae0f3ab4a92ab0b293da61dd100950dc1bd0bad7766f6325c7d0885c399d018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8bab6ab581b5a3ab3b88d0e3f235da
SHA1729668824b113cce6a7ed1ee08561cdddc2eab44
SHA256deb9dc95e73a389bdc25a2d60523683885bb42608f5d19c2dbf720920a55cfcc
SHA51250481ac470b25379837665038b0999a00d5ee8b4a709a52f954e228899bdf317a773daa0f87c9c586939d4ee538a9de71c2ee15eb083399544d7814a71d467b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50034ef37ddb662e365b6a2899421283d
SHA1aff800ebdaa2aa56a09f40cd3bd43fec7bdf3d5d
SHA256e4c6bee5ee6bb4546c80960950f9a071b3b8e0c573a7a0cb7eaf7230428030dc
SHA512f28dcfd880e22b47e4eac593a164adc18089ac38a4fb4bf92d131cd6ca8a87f77c94f6f16414cbffa351035bbeab43463798962fecfb3b55fb382301d98e4f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501f7b4701023287fd903ebe1f0fde850
SHA1ca32bbd2007b56b5b84e99901fbd9d3e51fea4f0
SHA256d7476d05f505773304771f446515f503337ae782f7d06104b361f22a3c09f672
SHA512626916d4025414bdb64a8253d07a2e1d2c0351e95ccf1f08f215c97c2c0548f603f3664df56bac1e8a61f6d89498409836d81fe4ec7ebd7726c8e1a6fe547312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b65c206f5113bc1dc493011bc1e5f78
SHA173d5ff746aefb7fbc113555e0980ddd43ca063f2
SHA2567bae05568e9977a1483df6ad7546e11687c1e960201038c139da160693a5d409
SHA512d179554e4bf974737f73322d395879454080e16991df119fc64329bb29664f8c0890c28dc0cb60aab636a726eec91706d3d2fe374fb3103ca13c9f387165d243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56119f3edebc187c4a184e36e7f39dd69
SHA17083b874f6d277673b308665af5d0a7ec113f004
SHA2567edd5970328916c8d3c80170f3705ed2b37cd937f3c2051a81614ad4b6cd7491
SHA5123d8377e7287172f6fa2b46db51def25c5df8761aec09bdbed24a28a0f3ff688dbfc484d38fc9344566d6d1af317068ed0dbef0ab62800fb7e66f0249baed5894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2ba7807979ad8780089c90b7553bf12
SHA199c2a811eaf86444c94518db4a8de95a8a6a621d
SHA256ae04d298136874e59956b2db62852de86e258e46fa2097d129f6cddd461ad52b
SHA51254799947a249372439c701bba9f6a361771771906b7df72cf58868ce1ec0dafc409e12c1a62cd34e62d415b0d942662d6ff7ef716de4e7154bdf496439d02be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b5dd09776ddc15fefe8e4f8a2c87f93
SHA182aa138b191fbe4d3367886184fff29fee75c8f8
SHA256642311fc472131b824eaa18aaf632e0d88c03b12462212ca35c336a5a47b4e83
SHA512d0be9e157c9ea3906e2574a055259f0328fedf5ea3c01977178789739c88ef12932d504f3fbc927ceff2ee291dbd4448522e0f653a85c8a32d0964356c0d6dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052c777d9a9d94c43b4020861facaa50
SHA1795ada189fec12467f01ca4db52c0df147b1af04
SHA2569c9d9942c3b911a3e8d1c550ec976475eb1b7552551f88240e08d43142b1f053
SHA51266eb7f0affc645a6ddc9cd31e52b4c4c72fcab8fabb5e37c4fb7ed2759503b2d8197c24f51845d14e3dc4b6b74c34b2fbe1d70ba34c44e837f7cbae394da0936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50763b5dfa2da5fc121b7d6e872bc02b5
SHA195d455b1bd68bafa081ee254c23d3b3dc6cbec3e
SHA25616472e7b2f10da6824a577458c33b6eeed2ff522969ad00a46ce009b4047ef87
SHA51221bdac6216fa2dc201fe417e549cf20984523c15772afda4d982e3283292c153318494cb6936db4db998d5c4743119a69d49dae271d3920cf25c8836176e89bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d32a7ec1ff0756fc11432ce03ac9db78
SHA15b53946e84eaea7a4948eddde2e86c5089ca08b6
SHA25696a1d5052d5b0dd45a20b3db57c693b38bf2859c8e41d9df443977292bdaee38
SHA51230252393e8537c97a240b11926ac277a6b16a9497a20442d3ece9e24e3165b73948412cc521a910b287e2ec48381af19c92d55db9d268a057d93cda64a0c6f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b172d3a778c2d469ae565ddb263a70db
SHA120546bf497b4a1f469cb8c32609dbd2c6d49ccfd
SHA25616694844e96be77db9bb7d84f7eb79bd807219ba08b07ec83e3048fe35413ac0
SHA512559f059d16991bf89cb9578bcf2ea0cfc556c5f62db7a32713ce43412bee9dd45df3e76b67319f649a0581abe66fb6a032a4042ea3531fdfe4ca2e190184dd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a0ade1113bc3eff47bccd2f68eb7553
SHA1f8f8f0cae73e7cc743e536f3c422aac3911a9122
SHA2562f68ead86c25720fbab035f25a3556e5bddc38cd2f43291957865ad7e851ef10
SHA512a1543b2dd129b86b1c6567aaa81f28fea0c9f19030127d15500b70f41eaac756d82f24b34e7e5b47309c2e0d87156824ebdfb8c3f1f09020c72f56527f3278d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840089eac94e3cf83fc975b82aa1ad5f
SHA15966b3e4bffa7c7a40b7c20b1d679ae6e2a3a17c
SHA256540e49b866a6ea2ed77f675e3808891e22c2b21d44f4b024cae98a4151616895
SHA512641360f0aa79f39ca889c4ddae7f9e882b4c9a1eb6ba8b9bc9b2fd1143d058ac83a0437d064772b570146c79cfe7fb115ee02156971361005e2a10c183e45d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491ef5e97be7358e2058f868680af718
SHA1d51cc243264dd44efc3d67f64cb7db187765880a
SHA256b7b2fcc267047ae0b3d0d4dd2d48841d460d3e93b5af20729c732c4c861569d2
SHA5127dd6f5d71c5ace52436875f5254e20ef91bd96eaf1ea2410050d83b1ee3f5543cc54f8b5b6748368cc4c43816f54cb70ca0105259ef8a5515770dd4e51a75a43
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a