Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
6370cd680c90b18e6939b0bf4531e947_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6370cd680c90b18e6939b0bf4531e947_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6370cd680c90b18e6939b0bf4531e947_JaffaCakes118.html
-
Size
460KB
-
MD5
6370cd680c90b18e6939b0bf4531e947
-
SHA1
3ea9fc81c4e50137f99146c9e96ebb2a8bdae278
-
SHA256
a07aedbfe60070299556ef9e50fc61c52ea2a59b662f5ed3cb02741cc3cb9f0e
-
SHA512
46b20edf43e656814d749d68c26a23d6439fcc67494fe9c0f37e1500985d2830e9db729fb33f7e094b9b06e63c4de544cf86117588c3f3497cd099226e76a1da
-
SSDEEP
6144:S0sMYod+X3oI+YEsMYod+X3oI+YDdsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3U5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422459665" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dea02182abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48E0F6D1-1775-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000004a83b7713d969961295789f24989b68b87f1c7a2df4fcad7282eaa222a8ab8ad000000000e80000000020000200000003d187c6a9bedabb5ec5ee4b1a0e3da97d890e47bc886c3bbbfbbcae6cfb6137620000000c0910e491a439751d97e2f854c548da77313867344a98fd9caba39e7ca6f7249400000000d5fd5d11911028d56ff791e5f1e8bfa5d600556c35d501c54a242426f55d8262941a23c007d0e6d1be9b5a0ccbffaf2b5e4427ec76652dad462abaa517b0175 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000128e24638af30f77a8132c8976def2c9103fb6175c8c242a1cab75caec54d081000000000e8000000002000020000000599aa5d38c3a5ea998573b2c85367c09a9489b45b17426eb40cd13e66f191fd190000000850aa2407a3a7d7214ac75332a131ee6e18fac724798d7b27d80e5658993cd1b36e18381ca70485cfa91b5e672c7a9d914012bf0b6f43fc955eb8212b5234b1730bc8009699ac07783069aa5104432f1fcecfa674bdd1bd9422c2e4febda619a9e9f227123c225af5615de910b12f5038949ca6cf19155980b9d4f435f9ec73941ff32cb4f8b3e17724ae027dc6571f3400000002922c47c61366ce69cc19e3e971796834189494ae8a88fdfa3bbb0830f31aae83202aa386831238f590767892924c7a901fc944acbc916651c0b823ae6a12bb5 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1448 1460 iexplore.exe 28 PID 1460 wrote to memory of 1448 1460 iexplore.exe 28 PID 1460 wrote to memory of 1448 1460 iexplore.exe 28 PID 1460 wrote to memory of 1448 1460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6370cd680c90b18e6939b0bf4531e947_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd31424b23c47f6d776d13e3c1f6c287
SHA1688ce96cbd7fd2623074459a24022359006c2a2a
SHA256d4da0699881bb24c8c947a470ba826932cb61bcdd302ad5180752cf5c107592c
SHA512902d1e3d62d0d10969ad080409d2db89fa1dc57e8cd7e2215f789248f2225687ca645404f41470545fb8fd3785fe6bebd97b88729df93f16aea727a69bc690ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d296f6189860078917e4a2c1f1bffbcc
SHA185261adeb0f3d0dff889a07e1ee084c3f7692f4d
SHA256f2c51527bd804d6ffbb832a4fe9fad1c0698c2b87a361d631aefc249b2f936d5
SHA5124d27bd3e6602afdbb62c2c7443536de29406d642de77d403202cc105911b8e9f9ae16f2d26b68e8ea35c992dc2c7a392b89ec9de2b55ba5fccbc2eb98b7aeb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516b75ab949fe3177f0a76c1f1677f9be
SHA16fc912834af6bb7faab90b757cd421aaae8c3828
SHA25665272a72ca237c67eb84812cd6e4c55aa96658b6c939aad6d1189d755a2768da
SHA512e6a492c04c586dd63f5bd1ae31dd2e1ba74acf2f2c21ba76bb0c0dcb9d763f3bd896cd3f8df8f606a00b371d5340ba58c80e7577c4cfc32a8938d095a6612d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d86125ddc2c5854e8dc76ed00b1193
SHA1205d92ea036c729e3675cc2ad34570c1d8e9df7e
SHA25699e078600d2ab06ac4a8503db487e63694bedc879a0359fc475dd722bcf74264
SHA512bad8d415b69d7ccd4777b9b0ea6531dabeb627de5ec651cd9dbae2b2e23827078430161689739986eb386fd3853d0b8aea8edb60289c0d5cbeb2b5305ce5567b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543bc4a6608e83b261c0b5215bcaab055
SHA1737894a05be0489870e164eb7fc67f41a0bba1a6
SHA256fde013e545481f50dca1496726a02a64d1d2d232dbab9759e7492790fae30940
SHA512855ec71398c63769e09498cf2a9a5a0c9615a852cf344dfdc48fba692ab8de9c528a50e179ba078183fa4ecfc9d157245faeb60821237add37d86fe3340b4a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549df6c609ecfdc323394e3b6e72a4060
SHA1e02421e6e7f9e93dadd91d31a61bfb6250320c77
SHA2565701c14e802dcc62fa96c7cb3d1b58d7f99361e385e99d4b9036a7a685051bd2
SHA512cc6644be58cce9891dd5c60bc892faef6d15455474783bc399e5bff4e1e5c723332367f38fd78e36e15368cb6a14a07592c20c03f009ff0f9a07215c56fe4086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f7f84ebff13b375f6d1743153ad3cd5
SHA1e978d2f16e5aa0b50bfbd223c60c09248097a817
SHA2563b590393f7e4e4abc7c13d94fa94f46308d658a7d5a4ff060733e127eb62c21c
SHA5120d190351463d75188a709e784cc6d9b86e8ebe56f07749565275dd72e8f7cdaa7595fb3e99bd838a5743047c72c4e251abbec42c8fbc6e4128e3be22fe24529d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d576faf6e6dc7961c503a0ad688816
SHA12b543b5d42c4117ace85d91b6ce91856d00545d7
SHA2563a51db1d6363f3d0fecfa152a5ae36e13b48ace6dfffc6bcfe37904068d4dc8a
SHA512a46c4add3ade7ca12922e00888976659aecf7371808a8624524d1df66569d3c625efa3e3fe7df2f0f5771d70823321f2cf0eca4bdcd92e00fd714e88465f3ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b33482d3a490ebd001e9ec0ddd52fb4
SHA188dbf55cbbd46073775035de45a2f3242e1d68b8
SHA2568234ca65fbe2fd4e8ca53d0085e5ce3efd952fcef439e0a2bdbddb89f37c47af
SHA512a53c97ef815ee41f396907903b11ee0cdd8e8dccb0ffe3864fce7c612a2a1e48928312c629814737137bc9642ec9b65ce86b17680211918e2f71fc5647e6f100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718be2ce8f11e8d6e0518fea7d619746
SHA1c3072493aeb00a019380e56b366a41e4dc76548c
SHA256d2e56fa71f315cb0cba2c79f764e7553896ebcaa6606edb155c576ab35d16201
SHA512696b66a11e6c2f6f411c5c90164714a1e595ceda15b128c75a1cfe0a2df1bbd7d92f05292083c6986dc9d2252c79ec73ed666b29664195a39db91fbcf82b04e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad19fd5f345d7e63f2a53d34900c29d
SHA160f54f466659087de8b8f085db779fc2dbae0042
SHA2563d0b7733812cad282bc0f7d6fd050b5bdf5af314721e4899f134a2a6d317aac6
SHA5126d725905acd0ad05f8cbb6b18041d2e91c5bf2278bad8905eb579627c88c9489d229e1e7e0cbb22630773f47e0146174432173d982c5d31f0c588182edcf9a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c556b5996b0d44df49ceb29508cd1997
SHA191217a4669ca06f48b4d0a60346b61296d2f4cdf
SHA2567738d43e8df3c2318257de629df3af937956799333969bad4dc126f5c0c9ca02
SHA512d0f41fb4d1e06d8d96c06ca8a9be8b679842c86c0a877025acb0b0ce6fdab66adfd8f56d32ef27ff625b71d3d36a1b001d7ca66c4e563e50ad1e38b485b86503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f45322872860df43b6aed75119f1825
SHA17c9800514c016b4a91be7a5aeef24c33cf52e742
SHA256a0b5b960ead83fec88e2bb9313c33528267b9ad4fa5adb11603d6276c310ba60
SHA51263ef2f13a9612803b5b94d941273d50a3148452a764b198be478dea9d7567d52170aa969e2883f6e07b30289ef19f17e4eab05d5d95b06c010b24ed8c9c40b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d57bb27e7f7570ca2781d5bfe9c7bf11
SHA1762f0e5a4d415eed975c70b8bb62a0670221aa85
SHA2568940faa5ddfe67fd6199a6e8fb198b2e04618fd19db7128345ae6cab1b82fe02
SHA512cefbbd701ae4f07feb697346908ff325ed4395c11decb25cdb3a11ee7a186a9922e5d05ef968430bd3b1d7025f7888854c0bf78d89fd6b639aa82030636ba7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad04a471e7dc86c25bdd43a477d7f673
SHA111c77a89060af7fdd5b516c4dc01f2260d52b332
SHA25670ec99f0e8200f24e67443dfd4a2684755c9c1320c32cb942958b384fc009ab4
SHA512192e9e2daffcebaa2f672d92767da0c5b2e9c46321a01edfff98684301f361a68ab19ca23a41d71c6514ff16427f1f2ebcb85f40511bab197d6753360f49914c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf2a9009db6fad77ac0eb7587d7528eb
SHA10509b36dc462520f620da435bacf0d8729711a8b
SHA2568e155dd3b294937615432a06f14a93a6926da480c0854c8aafe0289e55ad269e
SHA51212e8ad0b9f9ee33b3806bfdb388a0ad454ab53d23442ea3c695228185b64b271c03dc98354a90f48117a65d680fbe96b23855a947b20dbae3de672a959188a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8b3d8c5baab33e813b9c77e42ce73b4
SHA1cfed95b5e2b6d34118044b52abbb10702c8521ac
SHA25674ed6a8329f488b0ab5b2e6dae3dd8f628aa2a2f7352cf8e711a8812f9b845dd
SHA512a17766a384175089ee766e6c2847a68e74159794195e047abfb2f0db95557f030d47046eaf7d94734df9eedebeac5cfa6854b5416ebd7061845d6864cbb228c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd7cd84369c2860040cf6888487c495
SHA1e0173c4622348e23b10b748899fbbbdf1d127306
SHA2562e0eac647a178bf087c59d478aca0da8f4dcb56b3a67494c3fc56ece757274f8
SHA51290d7358ddc6cb55b2028c75f5bce33cb787c0a5b54b9629394c48fe24eca18c341e5ecf868f1ae94c976a92a6215690a784a47b6e6ef94bb97c435568dbd2e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a81d053f0194476c88619c4d96b536
SHA10f464e273e78064f3d3957e107441f642779d0f6
SHA256e3372eb03c9e230f1c45f65f37cbe055f57fe55d0b562d60b166e159c271c01c
SHA51287d4a371268d51cbd562d4b0547fe55e8f3398bfd4ad1ebba4b4f0bc77bb9c02860d1e9b67bd970844af91d1e5ec3b1d8e67ecd78448f553685bd5983a820643
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a