Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
61286490068587115858c6d8833f0963_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61286490068587115858c6d8833f0963_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61286490068587115858c6d8833f0963_JaffaCakes118.html
-
Size
15KB
-
MD5
61286490068587115858c6d8833f0963
-
SHA1
025629d586cc3cb6195a48524d1b69d6ac69497b
-
SHA256
119f560ec3d650cacd4ddaeaa44dcdbeb81c569050514a7b03286b466643c409
-
SHA512
b7aa2ab2c57c3f8f64c2c30c0469871aaa3f6b67c99bd4ce5e21091f3574898b38a64a69a69dee14cca2836901fe347aea5fd009156f50ff4db5b65f4eea42d9
-
SSDEEP
192:m8tQT71tCOzgGVK3snXiivV/dCPtzHndJuQSXsm1ZBFfoeCx580wogbq4aJB571u:m1COUGjnXiitlu7mRt9qfwPbah3WaYV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000019c7f04a6ec6b2ab57793f2eab43c549c3bf09d51b8750527cd5004cad1f2f7f000000000e8000000002000020000000b06eeb1c6e83be7a666adae8f5f4ab54af565a610be5d12d8ec1459b7f26da21200000005c849ff1ed4ce720fa49d05961c8cdd04b2f91aaae8a43773f30312cb7dae15040000000a01b6dae127f5c68361c9613d733a144b0d45ad2eb974d74e0b355f12ec3513bf4b2e7c3bb8067ce8013f9e56c130ca1925efa56e43f04c948a36c7f1554a198 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f7c16e06abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422406542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99B5D891-16F9-11EF-A4C2-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1704 iexplore.exe 1704 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1704 wrote to memory of 2732 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2732 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2732 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2732 1704 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61286490068587115858c6d8833f0963_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5305c6630e2e85eafe30e4b3c8c4d5ea9
SHA1ea60102bc6467ed07d44d397305460ee35dc0f0e
SHA2560be15347deb6fe1d48d0fd695d6af4cb7225a4491c1659152e1b9c48b2de0026
SHA51289729bc43b8a817a02971906b451599cc2fc3a8c4ed4f239ed83e039f645aefacc725cc3b76f1ddf256f187a0e482a9728e305c8998d25047a81a3bfce5f5e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c14195363bb1a18700e7c5b16202c60
SHA18c10c36f5de7731d74487dc61173b5d96cbfd5fe
SHA2560a4bc4bd5608d2210f85f58322c39ffcbaadd0e03355adb553f2267b20d92289
SHA512f9220ce780bdfdd9e17a8250ccb33782a2c41a97d70928b6f07d3b390ba35155e353bd4c0d66f0f959d2c39f65a80fba939146551d76fb8b8d49069dbf56faab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddb9906d43bc69d295b4da4f69aaa904
SHA1937d2ed8f33188ffa1413d1ad9c74bcd80158b02
SHA2565ebd49227bb296d5613ad37dfbd54da11d7dc43c5ac45bab1e137a7ad5058aa4
SHA512f00c0367d7f50662b476550e4b950f2585f2432a9af27a358686c2906411e38bcb96789c14b05962b7e074501d934fe1f3a7dee5b9eec8cba37461c1fe4b982e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588bbf0c000bedc8dd4e5cddb585f9576
SHA147e5a88b4600036038c49829a13105ea70e63fd7
SHA2561c6796c2f36dc1e8fc0b30ecbcf75f8266649aa1197dd4eb7b63f74d1f30ef7b
SHA51268a8211e0722687041f63e43b913818d99639ebb87f8fb76862474ced3a725fd577bafb4b6c8e20d45636675be8a0c1bb7b7e51d121bd5fa82e1af50882ab093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234632b545aae5b5d821c065c08070e7
SHA17a036ce9daf376a84b3e0641f3acf6d29780a745
SHA256b57fe6c55db0b94c588d802cf06d43d9f4f1c5e187daab22afbdf3d64de2c2a7
SHA512aad801fa3a4addb26f8b71163518b0ac7634dee74f63192fe38d75440bdc062bec15d163a72b08663f29dbac98817081d5d88823d6d4bb43e73ce5ad93031b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86a6739bb99ec6941f52c30811c78f8
SHA143f903ae291d2165cfaacb77e068d1f3a3d3fa8f
SHA25617ca03809d6a7e2e7c5902cc1721461e14bcb9245002da7873d43707ef9719b6
SHA512f14b7e9dc19de28b97c3fe36ba5a5a3380e52af051d7f09a3a187e2563d86244ec5673209dab16e0e3b2f1feae8f528a903517add2d43b6b7c3a3b0d19ee269d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584247d611593c916df31b9b580e4755a
SHA1457c1e3352ce97a174eb4def34cba46f5a24bb6d
SHA25639bb06db8f8f7da98683a18849eeceafd0f42743dc3496d8c7d80c30ffb021ab
SHA5121a961989ef0b1e4709865870a99a5ac84af455188f6d5cd451ee858832727ba953e92f278e0dc0e1d4542aef3096a7fee751f128695529e240ddf45db4994f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5147e911249a585c41da6cbc0125f17b3
SHA11ec626e8d55b76c791add82e91d024a0bc8efe4f
SHA25612b8d06c6c1d5a9254932bcfa49550dc780e29427e5e3e920349f4f3a4a3a92f
SHA512b7fd344cf88f4dd5fdba0d1e471f9df78ec6e36602503999067397f6166b90d48a490323dab8cd7bbce51a287e6752cdb3c00b59cdcf1219da38f9a5d1ddb507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb08e892bdcb01c775865a1ef7414f47
SHA186224fc29751808b1df543da3d7462eaf6567bf6
SHA256c87fb5967954b9af30c6714759e6c60d45e0f55b3a63ec53d2251837e0672f9d
SHA512ee79049b59a7e15d924826e690454f36148fb994d8eb1f34737bb98d19a5e98ca8c99dcc3ab59a69fe9ccb9a15bfdfedf6c223b8b726a908d417cb02c5ab7adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7ddec8efd67309f949ba2b184621eb
SHA1cebb65dfef1e5a6bd2ff53e03fc47e3e4333c8da
SHA256241e989fd157940c50958659bdce1b3e01d7dd37c6a239dafb121edb004321e2
SHA512375733f899372af2c2273c8490c306760e6b04aef9ae31797ab6564d9a2d5f79a0b43e157a358fb8301a1592ee52ba94e84a0e00a3988dcdc780adf891c04e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d1a5637209e53ee925d8f1cecd2bf9
SHA1d8d35a40d9fbcaa292b751bfc8d19b2fc338f0e4
SHA256391d0537e821ad09f23b10b0c35dac5be492f714a4a2abccd032106742db482f
SHA5125bd8f7efb5e5a4a232a90be9c5cf0c696575833a2f47cf60e69fae26b4fa8e3f249ddc25a46bd8540a7763207f1c16da511f2112c2494ac52eb9cb9ced6f8d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac0fe3e18e446611a1cdfb0cbe600e5
SHA1f0b2a8cd3d8a3d49f8af24c26417141a91320da5
SHA256e49ea66538fbd0eeb74c7145309f53720825a566e76818e5d798e24ebcc9de67
SHA512798fab66a795aa62250128c86d8750172b18504148a7766619e160eac54e4b1ba52ca7f0bae49b514f5b400ea47af18b205fb296bd2833576b8b8ad4c40fdc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b4b9f4cf51a408a181dfcc88eeec269
SHA1ae761bf67c708cb2cae2ea091b9ad79728d12b7e
SHA2564471c908d3afa0628ca3b2e203048062b38202e8225f15b60d4e5e6334460413
SHA5124a38a717f02374ffc4ff2d35f5ad97709d6b11c3a49c1afd63bd5e13c97ff6bf81e1343a0f8f3b8121265eccf67a2f455abfdcca5a873e1623af9408aaa0c61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2d06b14054556836d901578797dbe47
SHA1b1d74073f0303f6f9cba518cecadb78e8bbfa613
SHA256368bf76ba15d10f9e98d11fd3fdcbc0191d2fd9476e69b2b463149caea60bc0c
SHA512276ab28b49ea01cd5d7c9464cdaf11e19293b9fecbd20841717234b1a668395d938f8405c63f8c594f583d880857cf5b8d0815526ec5da95f5aa9fe24ed1e54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c5db4a03afe9ea744454e806cc0f1b
SHA18b783898337c83744a90e606e6dc39b7653caa24
SHA256149a269909a0307a5720c83a2086ff38858816b56fab0e1077a5600b95ced86c
SHA512f95267589c6cce7a4c3f5c881b3c7a6b1aa0de23f45b29e76d141035b331a59fbd2fbc1cb208752733083983c5cfa60547173c2a451285534d7d4d16383ce4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a58dc4853c663278f4dfe6ddcb8d9a51
SHA11a98280d01a2ad0994d93a88cbf631489493a33d
SHA25688675518af128ab7d5df2ff1f3754ffd5949de049bba210a484a955a2b67e9c5
SHA5128956869a07431b4a790eb443195fb62ab6c863f6b8c9649178353cf5b1877a4fe3b05c21b992ba3a4cca9e11dbf24d5b22025fb43483fc3aaff8dcb18a9ae7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521972bd081c82a58d9c052fdba09baf2
SHA181b3bfb4fa566066ed06cb436c56ab9c7077673c
SHA256d64e4d3e058a77161bd99de5d128d7fecd8241eaa79e677b141bfe3dd52359b1
SHA512c22f8395261642dc92e4bfc5d9d4450d4988e057010940976e024d9d2a0027959713798cd0c8d092893aebf165ae73cc6f177c0f9a651bc683150adf07d4e84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582907ab83b3555011b0e9a6864e5db11
SHA147b5e8fa04e4472e38d6757082c4d373c62f3ad5
SHA256f6562a9d2ed1ff44fdefbc8c1ead449d344e8284c8e9c9b49ebdfa3f5917852f
SHA512e7cc3a92c5d403a492056f266c9e687c9b3a7b3224cdbde1ac7794e7bb13a8930af34dd10543da146429cc907cab77a1004aca6fe006eff0980f058b11758b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d9f9f6bf2208a28acee963677e46714
SHA10b4ff03ec3b1ef5c582fd823feb17bf601a0c7b3
SHA256b6f655b0ffa30fef7eaa72804267a7b1e63a24d6da4ab555a96f14621af5bf16
SHA512d01fdad6700f0c220718952934a1a54a9ef667844029632efb2a6a7977fc833923c3b50bbd3081e054b3a0b500080d41c6bc427688c080b55d23fb387490c66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53393c6f951798ad125751a9af8899f95
SHA1db00c2de4d4f8816508b4761687bb9632eb16a19
SHA25680066912b89c794f733f5d2d616f58c43e3f326489d2a5180d8adbf033252459
SHA512d117da5387e6674e0cf2b193b611e2640b09a16542cd3f98bbe74a6a9d01c1e44b41de2c33d6caf4c5e89a9be70507a782d631dd14b6c6d82b9dcee3089520c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e7fee785dcb401f50cf84b10264b6d5
SHA1d3b288dfd80d8632758035b16c321edd307d6c43
SHA2561200086f07305cb777650f1555612668d129b525692ab8ea803460e89f9a04be
SHA5123507eeb0d2fac75b55ec3409e525d84b15a98698e564bb0036331e9dae74cbaf841fe9e2d8a5cd0aad2051fefb7c5d75c9525adcaec6eefc517a1c5d431338a5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a