Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
65da037e5aeb16957256ce418cf8f483_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65da037e5aeb16957256ce418cf8f483_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65da037e5aeb16957256ce418cf8f483_JaffaCakes118.html
-
Size
25KB
-
MD5
65da037e5aeb16957256ce418cf8f483
-
SHA1
ea2a1770cef11d8d5b57b8a8a14ab13277afb5d7
-
SHA256
92ad7b3b871b0ebd6d7d38edd58bc0232979c5f7eaca2ce8d1ca20bf9df9a0cf
-
SHA512
6f285cfac3ac8abcce1140c0099c454df4c353eef3d8005c2bfdfd16234df43c8ffc8f50962c645ebc6da1487fd06681e0c6ce699682511f1c654f3254f7a845
-
SSDEEP
384:IK8jD1gRlfQ8mq8FO34ykyq5nmK+06tm8t8FV++pCCEgEUe+SfNN3Vd//:IZKlfQ8mk34ylq5Kzo4YezfNh7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510304" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fb99152cb0f0a54188bd72bac4ae3f8c000000000200000000001066000000010000200000002230690835980aa59990641e4618d1129c3d783df6ba597ded840e4168e62e1f000000000e8000000002000020000000999257bb27bee538249b8d908d06a05b2d2aea875d68709e7cb16b826c3120f220000000f696268d35bc200a4489e6da6e5ec00e997451d327f0caed97abd11ced64910240000000df7e717fe5c1040d1de3e84bd62b8e542f21c20b82fde388b18a175fc53835f4ef231fd55230e6eb4d2549e887280f10afb026cd3e21ba56f59e61102354edac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80886f07f8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{301533C1-17EB-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2156 iexplore.exe 2156 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2156 wrote to memory of 2480 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2480 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2480 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2480 2156 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65da037e5aeb16957256ce418cf8f483_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af6ca6601e6755f9f42024757dc2b07
SHA16cb19a5fe9660185264de4bd25b62a6b80d8a9d1
SHA25651a2b61116b92dd0c5a0395bb8dcf24dbee6e47048b57f4bea5837ed48ddb5cd
SHA51263a6eb94080776755c677ec753c03f1536f27cd16a282300fc11852d1d6a1f3d183d98a1ab873d7bae7b16d69d0fccae665943680f7a7287725df67692e9654e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bc45d285dbfecc7abf346b9d27bcb26
SHA1eb3c3a65363cbd580f3eb538757bf44d39f9c0c0
SHA25684ba8ef61a96b8b29f8cee438f4fdcb265401717120bbc1bf4a4a38db0581674
SHA512301e947aa2b193689f60cda63300b648f4a2c29b1901015299ea2cd338341e6aaae8e2d082efc581ec9eb0a1cdb57744b31e40d85015eeeef55de4290af9c7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4810f37f22eee102deab67c073bac40
SHA1282bcef9d067b026292e365eb39d068dbc959520
SHA256d2120c1bc70927570299ef77375641b0f6b5c903d624ced6a161d2fd03c86803
SHA5121658eda45f707f5628097bc2bfeeb948e68f230d9c105ccf59f0ed5414426bac9a6859545a0fa51e8917f607b82ea3e3d5ff5114298c863d5fb21ad16b6e0ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51becb6a755a3abe81769c2bbb2a732c6
SHA1c1ebdcd87d9c6374f608e1622df4cd588dad0aff
SHA2569c995879ff4530c0230d1f8a89ffd8b11e4d9808cce7b9e60066b82272270f57
SHA512e1ba23c1b2b82a2fa37c0edb2fd2dbb76e7e07a1d9cacda600770fb5c43a56582e8a03bd00c53b103748bfd87ac30fd40cccbf425230cad133cbc0d7eb77159c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e6002afc08b985c6d9af3b818c4457
SHA1452f69ab96ad0ba70cc0a31ac036e2bb1d320d86
SHA2563016fc0c477959e33c44cf162e6bbd85405be0c05f880783a0dbbbd561f4c75e
SHA512cb699ab05673a63cdb44d575e5c9819add5eb7e01e21428c115df6c3b7fcabde50731547ac900e918c4c8ff81a25433a3d5314f4290d546529358d790664d7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1c92e40d14bf6b4bf8779f785e92416
SHA1dc7b5ca5575d3d7177a2693d12f3565b890a88ff
SHA256c9713452edcf51e842e5bf8c6817e4369401d048d652c81c1dcbfdf7b8f0c7b5
SHA512a86800036f999cbeca10656e9c9aac80b648ec97b64e665958597bc94ddabf150c2a351a9c5896196a58e4f32748ce0be0ec4bba0e77330a7bb33039b871b118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0067a7992b09726b99af29cf81e18e
SHA1ed06dd3cd0726a2bdf39a802bc042c22151c9250
SHA256380eda1ee0d7ee3bf6ae39a2ebd485f118e30101a3b247702ac76c1d776f019a
SHA512a3d8048775ccfda59c68fc380f5deaee55c21a569bf66b45dfe314eefafef8f514fc589cf4288d2001bea6683ab13b3620d519726bb74977e03680ff865344f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5997b574d6375f6baba6444c1104dc37b
SHA1035b61eccde821e3706bd63bdc3592eff49e95c3
SHA256cb33df24ceafea1a1498639174b0ee5738f3f55eade50f1bcbd57afc1fad1eaf
SHA512e45e4920114d60e1c0a19cb6618ede7bfb0d76ee246593a250a91dce25e777e477375d4a3deeedc799405f525bf39ed1f6db5ea7d40183832fa38cb7c8291799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592de029cc0c35884e8ae038e9934108c
SHA1445c6f20d1a43dbba8137c7ac612e5454289e598
SHA256206ac88ca30e2ccf52ed686b89cccc4e9f3a33e5d4938e1634fbf5ffbf135e94
SHA512949f49f50ba2444351776cdd88a872e4e63f5aae592db97bf170fa5ae764e804fa2000e618e6488fe894953054078e662e340361d1acccc6889deebc9cacd32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b455e0ce2f78f345589b249326af87
SHA1abeceec0eaca75f06b596a50b2226b22a445146d
SHA256fbb1a8daed0de1bf26cbe668282ce0ecb30f8af4644724d01f5812729e5e5dc6
SHA512398dbfa3d178b91fc448e8f301101f7717049e706247b81d5f47835d576a117ccae7d4964075a41809a8c160bb04b5a89a8e808d3512d2a78428ad847b934c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee53e8245dd57e8f409999530f9f84e
SHA107c7c5578f8ba0effb8262a379d3459824447ad6
SHA256f72ef001c9e744b64dd815241a5ccecc7376162935ad36f3079b19db293af76d
SHA512833577e2636da03f15dd88574c19ece268bbb4cd6b0c9f55debb5815dcff4eb2772e282f7c03e8c316a6af70e3890eace3477e56aad139b6a81c27fd576c5af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f050e28f40ff367e9d85bdb5e33d1d
SHA1f819980e62a50f17ed9bfae5c91babee864d7a0d
SHA2562493a065c6d8f7426e5e0861c83270861e210009b7b2726f6d68affccd52d64f
SHA5121a12b550cb5303bdc6c3ab29bd695160df45157d01dd5aa7f05d3d01357924ed26ed2af72f3bc0ada6e5e8a47841e77e1b3ac0dca8595ff8301356b1833dc98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b2714d5e5960bf4db88ea3cf2758cd
SHA19f60ef25e9ece07dafb2566573c0f19e3d43bc20
SHA25628c1b8331a8ae95d6565ebd519e3a1da1867ccd278ae21ef7465c9a744f130ac
SHA5121180c058104036efcf9e158af563afe518f6b6b8e4b4859dde3005a72d83ff9c6a192529f506e4d2eff623ad0d580148fe8f96603cc2e4797a14173c8c8733e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be349d7b242c25e1356537cb6dcc9118
SHA1c69cfdaa6b8ce387d75fdd58984f7c6fb7d124cd
SHA2560d721aa1f2ca4b012ca3ea8812584ca15270ba93941ddaa6be7f35e7832d79a4
SHA51235136a7e3f393ba35ce0b4c6755bbc563a4dbf2fb35790b40ad424f18bccf9c43e6aef5f8a4a7e74eaeb249955eedb716d38a23316945e01ad4a5c12bbe5f2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f4f0fbe1c3e78d12e7659bd9f35390
SHA13db746bc053a9ce807eea9e85b8799b8c4867ac7
SHA256dbed9d97975c68251dfde2dc05329a4790154fdc5ebf8ec016ccac0d852ca841
SHA51204540d8917e68cef7ea53d3b5793e09f15e9bb9df4d340cb343fd1dd279ee9643198bde6f76518ce2f1851a8a01eb3faef600a24f160d8d3aa6f57987af4d220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545859f8347f82eb29bfcf5f65d998ae2
SHA19fe9fde193b81c5e2d0eaa2ff0e42fca9c55194f
SHA25652a1bf24df16a81e70e95528b3b9e4a1b33bad385cc7b7ab9e5ef04b5e5671d8
SHA512102f67d5764c4828a8e4d224be981785b241ef824f05eac3329fe92346d68646bb462580cb0f3a192013274ee7213c9b2a9eedc1eea86a1f88d59df4823e63b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2410fab4a3f9d49901dd62bafbc732
SHA10855631a0479be938c59abf7632704002c36272b
SHA2563ee06661e88ad3cfe05e544a3dabfa7fce62241f79e41e19420e052b5b0189e6
SHA512d5d1df48ba05e93473498e0e1fcbf64db73a828bc6eef3af8db0c44d49c6085c0b804f3251c16f2d1bb3c837baab5d693eb504d557117e0257f6b7a6b572f575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f91eaa64571528a9753a53ac85f1c5
SHA1e25cc7f59a5c1ff11124d268ccf7d8165c71ee20
SHA2562c49377e532ab2e1c0ee043a5d572d592fb554ccd42bf27ffe68356004f9a902
SHA512d167ecb62cbf9b63551bf15e567d2ead7f223397017bb58337022230ad9935ce8ae31ba1d781a78f1378d499883d2f53de6f4fe5720b65d9f0fa583eabc93059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549c64a1ae125d139d0d943ab85bc486d
SHA1cee652c73dedc730097dae1329a6457cb3232201
SHA256ffc19245383935217f3d655a53c277145f8800d7553c7add5e74c381a6880d49
SHA512c3eae0df28be1a95f5020842f34f7cd0a1a29f7a46a741da62e9481e3ebb54624faead64a503f60c8f3a300ee96341bda1e471c815c47e1cfbceb2b0beff7df2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\bXxHQGRNH[1].js
Filesize32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a