Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
65801359af390f9767d43817b2385e5c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
65801359af390f9767d43817b2385e5c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65801359af390f9767d43817b2385e5c_JaffaCakes118.html
-
Size
460KB
-
MD5
65801359af390f9767d43817b2385e5c
-
SHA1
13145e094be24c1d482a4e677c6fc7e7f50157db
-
SHA256
0e41b4f3cf2b86c953dcba8879c695cb3d5edd84183f01387041b6beff10435b
-
SHA512
f563b27101d3792de3a68deb1f46b2b134dbb0e75b31cdefe7b158454a05e3d86e0c78b9b7b94017193a72e1bb842a40493735018a2a8d4c6b7214fc22be61ff
-
SSDEEP
6144:SLsMYod+X3oI+YC4Q5sMYod+X3oI+Yk6sMYod+X3oI+YLsMYod+X3oI+YQ:y5d+X3Q5d+X3H5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b713f1d30c0f2745a57a65d44d3b836c00000000020000000000106600000001000020000000d8d6d7eff2bdc96ab66e85f119acc3425e2d91d1033b8a98daf436de06986b61000000000e80000000020000200000001e60555fefda8a3fb41ca963c0643ca9589d123769d2cee79b9e911f76884a4820000000a81f4810e853b93f3691042ee9e1fc7bf1db95f36e79e1ea559446139cdbf72a400000006ccf8f95aad5672ceb7ae58791f987b69fbb24ff97bcf7b68ed947ff972ad13a894163a7aafd164ad59e057a79127eb6b366492aab61c178694c4be6deb35c70 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7824BB71-17D9-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105ab350e6abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b713f1d30c0f2745a57a65d44d3b836c00000000020000000000106600000001000020000000dd3ffc9b5c84680659287e80f463cb82f9d5dfd286c73416161fb0335295063c000000000e80000000020000200000004dcaf32d1f09437d4a7e9dad19e76efa19af9dae162066b0229656e0e3448d449000000051014b65afd347c2b0095fc469fe44c437c68beefbdf28400f6908a9e7916cdbad65819e6c560f87c8c408843c7c5984e0e100d985a2c5ad75bf616a374f3177f4576928bdfdac6f6d61968e85d3a415b42a97fc9672d791e89d4c5d1afc5c6c7d0cf65373e4199bbaed79a3f3ae39ba2c4f5cc71afd57c2323808ec33b0a887f45544500cc71b48e43f848701dc1ab34000000033cafa1c46a21434d74e206a0bbf41817a26b898f5a51ba456ce7fe677b745d40a09c0f05943a7c2246a7fc63e2ff67bb1f9160d29c75a0d47c1efed67928848 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502694" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2860 iexplore.exe 2860 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2860 wrote to memory of 2484 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2484 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2484 2860 iexplore.exe IEXPLORE.EXE PID 2860 wrote to memory of 2484 2860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65801359af390f9767d43817b2385e5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51330efd69675260e419e8c1f239d3173
SHA19c131bbea5ff93b5281354ebf5d0a8cfbb6e0185
SHA256842093ab39b8fdf84eafaa45e4ecfdfeb1a34173b1994c0f144ad62e6be254a3
SHA512901ebefde6663beb59c5752596edb7eceff4702d8d582921b57b0b2e83b518e27088885b391da0dc98092146b29990046996df84e3acef83b5fd037e716a7a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ed8eba7215c1ff08605a1ac80c783b
SHA1069b21a3a905c7b28e6028d85110f4cbe04efbb7
SHA256b6499c17e47e27586987b7d50903638b504d223078ffc8b9a988d2e97f805e67
SHA51215cfe139ea81b0216ef732addad200bfd6b63e8e54c36c441f3c7f8f830c907d1217965d5addd44fafb3fa12ab567de05a9b6ab37599d06c35d167a4fd99604e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b564d564641dad0f7efbc27cbf3f1b
SHA13f6ef9b31af248a4449724ba7795df53f1368749
SHA2562952518165a6bc6c24fcb36e80916de67f1c1fd163d952aaf02f31ce7f643609
SHA5124af26874a005a4161f81fc0a0e4c534a8bbc0d7c7a72ec2fe5ae39a640f8165759e06fd89b5841c992f2c9153488fca7501493b0916714b508d82156b5cb58bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b908c6c76032773e30bdb0f924a0e8
SHA1609d01d2c940258bdccc4a49b1436463ccf786dc
SHA256652818e1d2eaee5b95cb59b1333e7c8240c344a9c756c81a40f1e48a06b55cc3
SHA5120c37b2469313acc7134a59cebe9e5e521d19ac9076aa15de8e95d9c3c737207a91684edc5b4b7392169a85efcb9a651affd2a30d75ff1602cec6c66bfed996ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed8bbba45455b223e93e36689f69eb2
SHA1b8532d129b8c2252dabdb536747b44f6bc32ba96
SHA2561fde8387194b32644a8bd12c51475e2b759dd057349eff9bc1944a8e325a2fd2
SHA51264bd0f0a3775b874448e87863bf4c9c5605c07154f48d84a31b1282e7c1c6061c98a08da8586a713c354bc1e20a409dbc53ec8e9ff89f25676dc20e24c8110b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e757b6619c16b47a288545b4e25d36
SHA1207573c23205b5426acf3145bbe64c0973ddc3f3
SHA2561e35466c928119cd0738582388cfd89b5f317f067e627a8cf0036387a78fe1be
SHA5123ae0cbe4ebeb6709f11ef9d02d6d6d13c14b0142c57bf7c1a830a1b38307a6fc6660b82334f0296fc34829de68f4026b710c92285e9c803180c6e1db5bf65635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db550a88ba83f932350db25c8438851
SHA142a7c39802fb5b9d3e6c7cb4c189a1b1b690e7b5
SHA256795ca6b4b174859d5d8cca0c95cf2efbd26c391fb1b671f338e07e46da3845e6
SHA512c222eec9f701ae1efa0b4e109e37c836fffd310598c43a41f689ff26c415a42be198a917c350a0eefcd1f0175a4d93388d7486a046052d1db56927150d35d52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70c35439bb541af24a28ce61b1297bd
SHA18a6a8f1c36e423abe8205f0bca5e432cc0887050
SHA256cf6553e90ad0db22308eaf499a5b6756576d649a4bc99cbcb8ad2db2c0303e35
SHA51223cc047dec139a2950b18e93a9f0ef2cd14806f7895c9a661595ff426c49404a686e31288dba2d0bed770f7c512d8e31e6e34b6d5fabd0164fe9ff78ee19f8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cd62327425f33d32d060c7537741e5a
SHA11444ad5fe054abef118e5cf03119308c1698f57e
SHA256d4ed6c6acdf7387bbefed1c1f0932f176ec9693fdf8c8613e5a05f123d76efab
SHA512616104b0844033d7871a45f1f98fe45c2755c4eec57f8d36bb6f3258f482892eae7f7471d7fdea321276b3c01ca0cf6b528bb74ac3205a5fd5d135bca13613a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558afbd969a4241ef470dd3e179d10ecd
SHA15b93cc16c2f1ab146656c8a060927fa4b112251c
SHA256af922a900eb59e2fd294e1ff4802cab638166a79ebad795dd408db0a49f97fdf
SHA512f548ab2182ad83e4edb3b9fab3f263485508def8c970841c551e6ce840a757981421db1526861b815da3d5a9dacf647091c58e69d975bbc72fce00fd88c60c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55618a698dc8a2b2db7488022046e75bf
SHA1ee0ddad8283f39332c08842fb11bf075c39de56c
SHA256d0b29d3cc9713a4016e252f09c73aaa66b111066d6ba2e2ac750274e294b07de
SHA512ae00487f865dd65b4f0aed37b5447b73b883e408c625834f564310692aa02893e1ac8d2eb519eeb0ee5980eb4809a6f092cb08fb06e1d5d436b9a0ad452d4977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161c15f0167b4f7b69570b6a5b9888d6
SHA1766fdef60177bef2c49394db864ee87c2f0ce93b
SHA2567a93327306226eaff49f21e4eba2b25f0fd278cf8bb19f5dcc2ab8914a7147d2
SHA512c1faa514df15ceccdf7ab840aeec0a7df90c3ff01bd22cc8f222019be488e2bd85c841f32569adb1b535784996050c09710cb52ab23babff6a47b29d4df31874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a30c6860d855d59b9273822e64f760
SHA18c9226e72604ec1d492378338b7a94d47eda5b85
SHA2564dfd4c45e96ecfe1a8248b9bda3853eef01d53ce6eb50f53e28e94082a6ebe7d
SHA5126c25c5d45b360e5cc67fe39acf593e6e7cec58ab9ba4bd536989bfb2bde67d08df16c98e1c53daf9d9b63d4b99591d41c687f91bb1d7cd4d27526b37e116a339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5499f8460fea24267272613f814337918
SHA1ba4ad14b0786eb9638456c148540f4950733c203
SHA256ae8ddf9f207c3313560087b18be4de300bc208868f46dd12185737acccf75ba0
SHA51248044d34d4003c59e763bdc052223d63c40877e2dd9ec798f4c8e5bb425be5c64b3beae9206ab62abb58a8aaa5fba9122ef32d53449910d2a2eef9c09f389dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5333f20856ffb7bbb4959fd738857baa9
SHA1787e67cb753624efa998764a0821554b90f70119
SHA256216e99e9491e97b054609b8acf8992d3276d1340ddbec42b0a310b8849288885
SHA512c089f560ee90c7487e59116c199a3aeec69e7e69827527101985d833a036acad25da24e63133c29b9a4b2793eec9aedaae5107e948b4938d6143f245d57c05eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa34d029c725fc6fcce085c1006d6f3
SHA17a7b7198ec46ffe0244168c0896c187185c50f8d
SHA2567129142c64d1c45292500f4e4aafc86131d8f8597dc33c08dc3702a13d47f585
SHA512795c362754f445744772895b0d09a3bec7d4c3ba7e96c0f62f2cb4a09d80354799c4389ef8ab71dce75ec66fe8c72f13a5681cf8c2fbb879182a0e8b308f15b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca9ad3847baf989abf53db5b919463b
SHA12fbc597b7117773b43f415ca7fe34c7f76ce0bc7
SHA256013980a4e9fdd338012b57d19c3b2ddd6e56c1214daa8771b490968c1565c0d6
SHA512987145e195de588988a4e2a7d8168e6b0e2b5d5a17d9a7f92b001c2060418b6ebc446bebb110b0a13422a40bbbbd97823ea8175758dd14a3e202dd6f9acd89c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b9af370ee648084c4725b0d86c96ae1
SHA1f79e688fd8454e6dad29c47c2d3c228ef3fdbd6c
SHA256da7d258a543e956c0837b694dbb3e73ef5981208d09c0c10a36736e3500bc948
SHA512d5858fbcfb58997f91ce0f368d522028412dc019289f4732f4e398e3bd92b0494a09b325c070b6bf09480bede2d320d38850f47940e491d6246212468826a526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1cb179610fd35de803e431c9eaf292f
SHA1eca723ce7fbc66b692432ee653d2877d914712b6
SHA256b6f657caf4f4b5c29a672540d537765f2d0515a347fd1a7413ecd74fb41a71f8
SHA5123b8d954b51a30c0e46a2a7b97192a8fc458176d3b96bb80d91cafe209e85858edc75d178ab89ccb54b5fef98ba28627a2b40d073cadf577be59abc6b97708854
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a