Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
4f1728b4e1c85644d67300eab05e8f34_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f1728b4e1c85644d67300eab05e8f34_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f1728b4e1c85644d67300eab05e8f34_JaffaCakes118.html
-
Size
6KB
-
MD5
4f1728b4e1c85644d67300eab05e8f34
-
SHA1
32e32bebb19436b824d448cc5e20320b9f2c00c4
-
SHA256
001017f43ea326949abf336d62fcd560dcafb53b37f786108ac7b4b667dafa41
-
SHA512
0ec4248b1e21f3bf35282e9440309f146141a6270980bba12cc1a6fe34ee0c55fe47f3af94eb0dc6c2bb9e7aa9ad8999253d36fc211c92ba9280939c15d25b31
-
SSDEEP
192:IhUPTNPa2EfcwjbhlhJALVWlF2jIDPT/W3K:EUPY2E7vrKU++rO3K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000161fd74b147174c32f50c6f14f9ebad0d9e558675cd2a42ad2f24e9df108986d000000000e8000000002000020000000cdbf1698aa334c995910b59773c75e330411f6a99aa79b250ad27ceb5b667f9390000000fa5d7d3276a1189ebddacd6ea3339e54adf89ca4e20e6259d5f104ce0b0d3198988c11323c935252f0cb1f6affe1e78825640acecd9d4a1f8a30bf1aa1900fdd856f3313f85bf747ea43c8ba8f0d57f1b058189d459b3cfa32510029f53ee7c42b20bc9b771a97cacf526e80188b917dc8a5a84d0a8555a4c1041f6ced1581759ffb76c85890332bf22e5ee6fe59fbfe4000000062acc84eac2d3f8b9df96b794b12ce893c78afc5feb7dd24663f5db7fd601aa990f6800c7b11098d2cd8ee800fd812a516d58c08c8e7c0e43a9838877844c59a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000462f417772439f1214ec62a114c192a3f61f2aead63b8cdb25f78acf767cc01c000000000e8000000002000020000000a04de3b618774bee067642291a5908026ee918b0e19ab0b6c04eeb75e7923f0b2000000068f97edcc9547958bfb02f80c775bad4aa5e1f31c330a104a6d12f08e1d0e58440000000d97e74eb0f772aa0c9d89c6ff90b1e8782fba86ae6d4dd275521a220855c6a2016381fe70609e5a5406cf466f45ccd6476f2ec96513abf19388814be389d5c30 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06aa84630a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72211BB1-1423-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422094662" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2832 2664 iexplore.exe 28 PID 2664 wrote to memory of 2832 2664 iexplore.exe 28 PID 2664 wrote to memory of 2832 2664 iexplore.exe 28 PID 2664 wrote to memory of 2832 2664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f1728b4e1c85644d67300eab05e8f34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679cdf7d448a89b56129aa0ee59ab955
SHA1df91776286efcbd9589940079f4378d58b433ac9
SHA2561688d4bd1b47177049a15fcfdc4787823efbabdb47956ec2f0ff060a1701fcbb
SHA512e4c57b737fb4e558b089c63a0671ece579492b0c9151e191b18474725d6179ff07be68504cffd77d518bed671b27c7b583afb58e7dadae457fdd4b690e1f8896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc87c1f2b6b93db8f36740b20322f6d7
SHA1c7a63f3699ffa2e9ba24b0062b785db65dd82eba
SHA256dc9e3556911339dba7ad06bde53f17b509fad4124d721b62a8057fd6b2a28780
SHA51251fb05af8c67737262d3029e1a7ee593a61247afdc244948fa17edd906c354e24ed5ee34d34927458627d312af004d5a91cbb471ec3d3446c7c966a8ecd540a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d0ab36a2931f45339292a33cc96875
SHA11526e6a970d16a5321561f6e081378a635392511
SHA2567ba721abb86f2fa430ee36fac4d1843368f4cc5f8b27416cc74e78c260f504f4
SHA5127215be245aac5fce5d7592f549b3a654033c6ad6d84dcb180005f5dc6364066f1797454e711341cd9ecbc3c0a87d7c6f61b782f48ad82a0ab7f5de23cf178b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f22aad8f168aeb324d93d5355af99e
SHA1c080f883da221a5c59a6e367b20f77e7116f99eb
SHA25635da9a1a97c265a4d13703aab38be1546d6a6ec626776efd212559109253cae5
SHA51235a521fce69410806565c64632a0e8037e4424b1328ea85142b2abefc85ede6f4f0ea0f8a72c8ad214138a0aca096e026780c3ac9ffaa4ed8c4ba39b0fb7e57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5848c10ba3a5370e0cc38991904b0c184
SHA123a6e564a0064dda52913dc14639f8f5e4a7809a
SHA2563f72def0a5e5af7c7ce58f466cf33ed5b9ee309e8805ac8b4d18f429473a5565
SHA5123d2ae86f39ad76f18a7f3039190c47ca32c650bdb1c54d512e796fb92921ce378a821e09d841f6ee9a5ec3c794a0ecba24997dacaf4da1df703ca42bfc3cac7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514be5b9f370825a6c2b86ee5a426380b
SHA159fae7bc1ddfeaeac67fcea05c0baf9456c04dfc
SHA2566bd138d20a38cbe763ea75319cbc34f2766132bbf8327e07873707b1b2624825
SHA5129da3ad2c4870dd3da6e86aa5bf017a07a86e47d5652b56b435947b1af9302a87a5a41ade089d0af883b7e14edcf5bc311f572eba755bcd858dfd720a36e1fb8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace12332e4e4d5059eb76a91329e42d9
SHA1c45c3ab4c38de3fff1419fe53b2dc5af4a148c28
SHA256c041e36520ea2f8aad3dff7f1cec7171b7f99c2d0d6c41808fdba15e00713b69
SHA5129dc7f0c693af8a86edc11821220cf061432cf1a75f98ae1b0708c8d837f5cfb11392f12a6bc1a3bce8c4671bf6bff02a1f4510be985d2cd2477d3217e33cee62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2b191464963c603fae8bbf9ba57b960
SHA111951afb5264c9dc3b434b24f09871a9f537f5de
SHA256db3f08013d76c30a3a9b195d5132a9636fdb73780d34e5f915eb8aa0107cc9d7
SHA512669b900c294edc4b3c23a4644d58f9a66c6d3d33ca2f058cf2683755ff9e838e4960ee4801769b0acc996e97afb589eef99a8096d85e0d13cfc77fb8bb594110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d2b5880756c55be534118bcaf26b53
SHA16265f2a922a97e4b401fca1bfa3f0baa6cbfdaf7
SHA2563b76a20894a59ec4718008343f2cbba569811117e095d1ddc1fb04aae60832aa
SHA5126cd0ae4c4abaddb998cc697f68d5bae122dd4ce0396580be8f8469d0274942c58e9daef8bda27c4292d52b5c01d3ea1212fc067148ac8dc7a9645d6146420c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57650aa4c253c0af4f026b8f17caa4e13
SHA18c6885b7702df1c1d00586d85d65a386628f60ec
SHA256452316cb5daeb77b391b00fbbb20a25276439008dbcf51b7f7d7410c52f1a13f
SHA512db4838fa718524ed9a7757226d2fb319fa15f5eb5b7fd48ed5cbca0bcbca6260bd68c4bb84089502ca2b9dcf51c318f31d1a237c931e2637d3753bccdb2e49ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52440397833d9a86a86a53626ab267a38
SHA13b1c636e9236859bdacab692f5ad5f797b41802f
SHA2563699f25224d139a4a54be3ddbea5f0cd3f1a03b3cd3f476cb972bf0bda35eafb
SHA51272ba92a676359999f55811f9f214499929b48280ca9f65455890a550116bcedbbdc142d05f47e55d6ca73e117f094610ba2f02630233e99e7792fbe2533de0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5277c57d1072fdf4ad2ffbb38b2d04
SHA1ae45942e1a0c3876c7b50ccae8d51ed1bbd1377c
SHA25636c04f14cd87c52f8e49b46913ab3e5fb331ed34c7c2ac72365bf3bbf13a5869
SHA512ddff46a102d734506e6218ef8d90b2d8e16afc830c79577691efe286579bd3fb99d35ab337a71c87190623dcdb7be01ac564c6d69850c28eeac3c6b47547a6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3114d4c36ac55c9b8691eb1ffcb737
SHA1751a3595b8f3f55148bfef567249fd9e4e3894d6
SHA256e6679b5bd348c49b20babe133ada02f75323d64cc67112b3a86a9c7b56a93a54
SHA51225dd8f5bac47ccda848af66898ecc50ec3a84e1622696f485ee72a474604f6947e830845c731edf13698fcd17439e4d6ed4554505d364301e595a31b8950c9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ec662992b432c48d23dfe94f6ddaca
SHA11e73065c8af6263e2e533f75bb29c0d06eb1a365
SHA256744b476ff03da8a6b4a02a189577a6cae89adc98d31e4b55b2e8b6c25e506c5d
SHA512acf79fd1c86fa0f748fea45174559a13546dffc34992f693aa54acc5fba4521d0caebc2940459d523352cb79706d767e124fe13574aed45cd14e6e8f1e71f022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9c3e8924cbe0a14f7bbefd62452fc8e
SHA11d0334e4ada02061badadb5f12b4f3e443fa56b0
SHA2569c14c1bd0769f9f82d1658cad2afd82772bc39277e5defc00e6700eff24fe414
SHA512062eb312065930dfd9813de3d5d27e1db10c05c3de4d299cd6650e5ba931bc7f341bb3821fdee6058fb60dc46cc13f6d905ef330abc7afdf8c5882f2b1a728ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d3fedc412d7109858527e05c3a3ac9
SHA17cdbf1dc2e56e68031ff15d86af44732bdf6d692
SHA256b37fa97867b434aef9bbd596a88db976d088449c9995e1808380a9873e727851
SHA51271c47eabb725d267c98cded882451678d4ad3879ef5f0ed9d3d1696c6441acb46831d4039ea3327e9886c7d421d808f701a6a7b4a348746dfe7f41d5f599153b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06c0f837ce169070a1419ac689bd674
SHA1d73fb7e09d7359cac384ce048d70eb3e66164c65
SHA256c8a912917d3f5f0f4fccc4b4411338d1d93bef61da56297f04afb7333f65220d
SHA5126e181eb104704efa8f3cc4d03b9f4019e0cb2d188dcda5eba03662841515bbf467af264a0b91df64c9669e8b2bc82ea98852dd196e79a7f3febce5aae54382f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c94576c04a10ddfb0f4dd36fb4fbb0
SHA17f0ac74a6a140337908cc3d255289cf6639c86dc
SHA256d8f343a1129bc66571593e2fcde3f0a25932977057c9a6c1aec92f7ad2bd8025
SHA512e1a5e98cf0419c9af88562547ae3f272ab85771a25d794eb5de4c0f0de949941c2a2dccbbfed8956cc1650c4b40013ab5a3e0eb2d9a3422fce611e7ffe791b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e370bde6521389fd74d5ebb5776269f7
SHA1f5a2b342445922331b2a8ee240252fd9e0596a14
SHA256c4a2f416c73af1b218945764c527eeb4a54377cedd8cf80fcf6b9a834835c923
SHA512a6b601778a381c0d6ddbef4742da4892c443152a8054d77d53f8eec191ac7cd2edccd13a7718f3f1c21a168a310525e2742b69bf39daa83e251887dfb10311de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a