Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
3b59cc2c3c21374d4f93308151efb5fd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b59cc2c3c21374d4f93308151efb5fd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3b59cc2c3c21374d4f93308151efb5fd_JaffaCakes118.html
-
Size
164KB
-
MD5
3b59cc2c3c21374d4f93308151efb5fd
-
SHA1
ae9e809f1b4982d3fa6922feed8ef84fb055da45
-
SHA256
c2e9bd65f6a428b6202d0e92b64ad005149a8137459b0da92f915319e7e82a69
-
SHA512
b07bee8c9499f11d95b6fe9d5bb5f192b6203a8d227d7709fdb756e30fe4729289fd2faffbcbd74f7ba99c7b395380f92d71876e9e11a9c635a7a879701c2242
-
SSDEEP
1536:e1GOcX1OJgDaLq0mnfyQ7CWmF0Y+kyIpWPAXCempCgXoqVXlt7XWfCRu0Tz5yWeD:wGOcX1Oq2AyQuF/WPBOdFAIdp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36DC7161-1088-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f0743c95a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000368f954cc71d18e00825de5f68a8426ee3dee2b70694561c5cb13ddbbc7c1ad9000000000e80000000020000200000000387852cdbb563585a8e4ec0b2043ff033bfa2883ed7bc43e3f2c60a7ad8f9d5200000000064d3c551cddbdf980b63ca9906d2bdb1162215c34671a923ce6c317d91ef3640000000efb9fe3d2c2b4270786437edcb64d363c1c4f00417eec5af365ae51dfab12e0143b563c96307868e20a86beef2e400c2a045e16a2078e6f63ad433e2c8b5a9ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000008d65b040c78e6f01fd2f2c3613b82bd9c5bdc687439e37aac052c6acf6c30c9a000000000e800000000200002000000066cd04416fc194d27008180b0251f7fad5bccc2f1eda13e80aa8911243f89921900000006ac5b4c4c9c13cc1c02a7240058ce8be173b2684c3a1aefa9c1ad32523979182e8547b9fc8e367695a94026152e2057d9c47c9fab40254dc04e9955a458b68145973c0a88beeb46ff3531b90239f2f0c8331c62317a9873fb67b55d1588a14cda57f1ce619e830ae95691a569e11fb191f7984880b411927b16bf1b6fa2979d37ea4008dbbc6cae39d7a12d83fcf69f940000000b5191565db8d53734cf8eb9772a1373663f1acb091bea259f0ebfa749355e02fdcaf8cf18884f152b172215d13c3dc4f869b9012c7d3058197442c823bbc8c5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421698137" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2080 2168 iexplore.exe 28 PID 2168 wrote to memory of 2080 2168 iexplore.exe 28 PID 2168 wrote to memory of 2080 2168 iexplore.exe 28 PID 2168 wrote to memory of 2080 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b59cc2c3c21374d4f93308151efb5fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dabe99793dce59244cdf9879d7e8452
SHA1b6aa2afc8cdc73d9e0601ffbb0ab50196b88c39e
SHA2567cd709df7c9f3f57ef0f36f731be689ee300d5506670399b8c5c42b04dfcf586
SHA512bbe01be5f4ceafd2fbe56692ab850db62540bb2ef48c7e24ed90a4297ef48ae3bfa0e8d71d734dd7d9b61e72ff9351a3fda4cd7a9294727c8c66cf6b17051788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a187634c881fd8365ab1c3c00a9553b
SHA18e80503084607170390ec03f841fc12394d60497
SHA256be3dcc7748c11c7bb85351ba14a837e84638d7cfc89ed1e0c625f5f149a156cd
SHA512425bd79b5d52d2338360226e65d479ee7e256f74f9de1d0c4f2be01568d61a2d6180fe187288b6669908dcbbd32bd5f92e4334e43e75dcfaa9db6df6459743af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aade27ddfb4a966cfb848dde8ecca028
SHA1c6fa247f817f28eea278483fe624ff4a16d96078
SHA256456d02ff810a13e61561bf9dff730e431516f09dbd254e098d525897707a06f9
SHA5123dfcc68bbbbdf35cfeb2b5bfd640d86385f00ff07aa004106a2822df375b60090d967ea2032b1232557970a84bd786d8647be5256078da7cf43cea2d17cd1968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cbe9e7ae77b262488ebc51cba56beb4
SHA147c536d059414d07fa9643397a80d7fca75d80bb
SHA2564a203d66813f018783ef65ca57cc77ce922c94a04080dab07a4b18e72c1d8efa
SHA5127da310532e48ae0d9fe2cdaa6157ebaf7f2326f4d718dbd4d8eac6f0c8faccd2902d582714f982e3242d9394a257002b2a361b921386a0b649610eeb0428ecec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0ab80dfe9783d8d8665fe9b6cf22d47
SHA1fd216903ed113c5891b508d6757086f6517b7dd8
SHA2565916bd0c79a25617f0c9e07c62db2dbf94645f245cc0498dff765135c236a98e
SHA5128ec8a54a59b3f5a776b9892aa8023127375ce19df720f281b3d920f041bbd42e9165ba07b7bd3a5e6f4fd6a3ebc6420fba52288ef8748077ec52ed5e1a238d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aedb52bde2d6fc990c6606db5788f3e
SHA195e99fb98803bdbc17a62ee257aced915d80b6b7
SHA256f45d8899b466b95d82bfc9ec1850f0a798d45fde6f5c11acdeffcb8bb8bcde3a
SHA5129faf52d238902c696d1ff831528c18713b53789074a3c9273a677809e4026b36254734acbbb7bc334aca98c22bbde15eab6ab38323f8955585046dee54fb93f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229ac9517906a7a1b28a5d04988f0936
SHA1134795e486c5b75ff986819c9079b947243f7604
SHA25658b5c8061d13b896fa1ebe5e1ce748bc379de7b24ed32790db0c345a7cb58bcd
SHA5129e42470830261e29b874aab32981390c4f76d6560076e6c1a18f2728ce631a76325831f0be99f35281680ffd8b7ebaff72eacda141b61bd249162316cfa76690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583a4ed3b5adee9dd94336b58081f3225
SHA1118c3f43954be2a0c559b8da3c32864b4da2d6ef
SHA25632052cc6d427f08bf96e23fe2cdbb1746f42aebba41d071c9a88fc9910b79d42
SHA512651df3a572c0abfa024dada1ec346eef655f7d47000e2dc33532cc8e48b66ec24762fb32637fb2d02deca2172db3ed6e1166d76ab53ca5f1f7d603ccb330c095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef0d62ba6ff738efdce4ec95d4bccdf
SHA1832d79e9398727a895190e654e69c8ac3069c10b
SHA256989568bcac26b06e4115f116dca989b3fd66a3e21b7345d1b9a081a01179a1f3
SHA512d4096cc7d7eda3f436e74f3eb0314a94392c10357927b7276a28b0a48bb2080b2d03e0fe4651792e25bc44180e4ae745291d34ac22773ad3bccbc81cc910ff9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634b37bc663379a959a8c487bb139e38
SHA16457600a72a6082f70b496504c68f052616b287c
SHA25690db888614ebf3cd7436728578ab82bc7942a3b3673e031ad5a45a24bb26697b
SHA5120a130e15cf5f6a86017cd97082abd511e682f2d99d0066eb034cfff3561e8968cc9a5d8857ab1ddc3b5fdf35012c480c4f555386a6b620e52b00cc0212e589e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9e357db1bcd5e1bf30d5d2dbbaa01f4
SHA15d6e59decd6194e376dd84834646ba65ded0e5af
SHA25613a4d3ad98e3fdeda348b820aaa51615327eb4181471f94a27400d6e491de9f5
SHA51269679a3a6f98220c1b9485c7aa9536196a63e54767d6d238af9b7a6d32cca516cc0e84b09cbb76ec0e8c6846bf51805a273c04d0e20fac451436d7130393be2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3cedc1bf01f6aef067049efb5b2b394
SHA1ec902772cf06ed8d2094127f7af595f786c6b88b
SHA25641a2506b608605fb0b6c543eba99691f350a8bbd592482f936aedff1397cad13
SHA5126fb1177c5b4143029152a5dc8520a0ec8cf1e84942e1a3f6a8bf18a9a1436b5c1d4b9d0ab7b4f8ce976d8d90be1b70925c130d88dda617ef6ef8cc615dd44f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a99912505f94ba9f01cbae2b951e680f
SHA1dd3efe72ab2c9bb860dc405856c19fc00b3bc382
SHA256a49c303b278d4a2731d3662ff829f541d8668cfdd9e27323bd61aae0f7f7b3e5
SHA51221e5e3df744c9a1ec02e1cf88b60696e3d5d72de453b112e3ff6a52d94bf4577a2d468636be3923697b4d558a0d84035fb1de17d647ca3c9a88b597b45c66ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e897db5d02ac084ead00e2817965b4f0
SHA178e54ffb1475134d4d93e202b7ee933c1730b9c7
SHA2560b30c08a990e62c82e8ff9b9537f4ba16f9b517cafe60ff3d0be40ec201623ea
SHA512370a28f2ca6e21c49779b770e3ad2e07e70532231127d5e9575a70b6f75a11ae2de902cbd964122f2698959c115b0dbe12b08007f0fe7d5e61f2b684ce4e345f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a489c70fe700fcde32eab0d6c2ba0b50
SHA1d2aa557bc888764be8aac19cb8792fc1dfb1c21c
SHA256ff4f66b5b4962c1a0502ba24a46ce30f581e528937d74afe8f2e465150c8456c
SHA5127b50090da81575344d7222dcd94868f74efbabff029c8b80abf5176a4cbefebe8d962a6e3ed8299d8ee27b31ade5ddf8f3c22c760ef18f76566c55a9a5e56a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa79b18801bcf7daec6129e74eb8f459
SHA1bc845c6239edb46614732e717e56f64f78317ee0
SHA256665ee6172b8950ee23252c36b96b022d72eefb6e3615f0620a4906204040e943
SHA51203965b3c259e4929ce6e18b76509718c48f3755f856823179be228500b91f121bde715c4324ad016adcdc4fedce2d01b1453a1f43a51283dbeef69db20422a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5232e68af30461b2b5b0b6dcb13513766
SHA1653a4ffc76d68007f15caeaef0a8f93eceefb59f
SHA2566f19a2c693b7b257d3156b5cdac6f1482f6e2808df1a11294656a2e36a0cd5ca
SHA512b48f44647e19ad6c1862de46be53e4da5877e8a123285c6be514176a93d3a34ab38d2e63768c8da0ea36cdfe72c714dd9027752934451008adb7a9743e2975ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba094963863ac5a9f54bd1a6b28ca87
SHA12d232ff0ac994780552e3a88295fd454da348bfe
SHA25656286c4be69e051f4c3f1ce63c806a6b0c7d89fd6ed0fb6fb73f14d870b47ee7
SHA51203a757bd0da10a97ca8a1be24f6fd2796064cf94b7450081a71651f2267fe0279ae4c033cb2b9688d7965b8b77ecffb0a2554ad7070440767c0a9608df157a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8c43ace42dbdf2dd91b7e98e6e6616
SHA15ca6e9260f44c9e0f5b5c93210d533b8cffa4b19
SHA256d634bda54e0daf362ec7608df768d9e6749a81c453d456254a88c71e89ccec79
SHA512fd2cb4ee25b3a2f55441155dbda08bde01e2ba3cb22a9f85e371d2c41bb4ce245dcf3df5df126099b7a2389126fb2c3198941b0c07813cc2eab0134110de5672
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a