Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
66f491eb1875b8a4dab08a8fec7fbd7c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66f491eb1875b8a4dab08a8fec7fbd7c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66f491eb1875b8a4dab08a8fec7fbd7c_JaffaCakes118.html
-
Size
21KB
-
MD5
66f491eb1875b8a4dab08a8fec7fbd7c
-
SHA1
12bdd982b86aa7853865788bff044cc9c67a445b
-
SHA256
f142373752bb8ff20fd20ed3808cf4bc8a0060c11325b8b98fe063f9bba3f86d
-
SHA512
17962c5e8520c2cadb9b584522bb2692def97c508ea4b8377e364df2f770b6ea3c032e7fc1449c4f4246204259f276bb36a6a787c1d3c548c4ba4df6f3db1f1a
-
SSDEEP
384:zi8KhgefGVBD8cu3RCGokZImEfP4ycbp55zVcrZDJZTO6uC:zibfGgcu3sGoWImGP4yG4JZTO6R
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422535739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{688763F1-1826-11EF-9C17-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008563eb0223a97249b7b494c4682fa42c00000000020000000000106600000001000020000000e9f0f6475d22ad1fb825722099b5eb9899e25aa2b3799aef7efb71dff5581bb2000000000e8000000002000020000000029fbc9568c84de378b064a4fccfa9f483459f70489c0cb6b0b059c2b3aca70b900000007f489f89ea327b82eb063ac2e8cb4af186bc8bdaedd0975443e5fb5c1b0d7e6e1ee32624eb9271cde81f76dba9cb3a65c884eb820f829e1e42829d3a6ff217f895d092c07cac5c460b38ac9a3c502494117040036f643c9dea6af5d2d8e1f4d4aa855dea90cf7fb1419b8a3187e07965f0cd9c64aafffb57ec443957430319b9963004600549b5ef98fa05e1bf565e84400000002d5f96a09603cb2bb5272c1b0736d672622435e23e58e3c417aa088b3467130d0334e68052083966fd82409de2bd980966c673e2e032e11e592af09b4b48edee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008563eb0223a97249b7b494c4682fa42c00000000020000000000106600000001000020000000b7d58a5cb6d1d61fb7d34a5e4504af27ecddea96618833e8e00057fd712cd484000000000e800000000200002000000062276d653023fbf15d29ae2695ac1c294e0596177f17f04ad9efc514a86441ce200000006e162a98188d26d27091613eed2c83fc9b3b15af8a799242c8a90722989bfea340000000254af2152e40bb1a514ec09f3b270326ce7f72fa385bb0d706d29bb3334c6016bb56d8b570d58f69870d0d06b3a32d8f7671bce6aaa23c289a14b7ca48d748ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01b3c3d33acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2620 2228 iexplore.exe 28 PID 2228 wrote to memory of 2620 2228 iexplore.exe 28 PID 2228 wrote to memory of 2620 2228 iexplore.exe 28 PID 2228 wrote to memory of 2620 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66f491eb1875b8a4dab08a8fec7fbd7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5255ad87ac39961b3fe47a19c7140f
SHA1591e2715661cf9a5d957b314ac71c3656259e76c
SHA2562b859cb2256d0c18221dd3d5a1b9e71f9897bcffe743215ff28f7319767cdb3c
SHA512bea405ee72d1d9a45c62374371cfc18bea49c60a4ff4efeeaf0ce3510bd8d596c0dbef29a02ed2595a807d25ab950e377c2ac8479d46d1b0f36f9d38cbf8172c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5831e610535843dad9bec176d6833fe82
SHA19940a463350b9e49942158638eac87870f919ab4
SHA256793962dc1f1c1ea76b20264389f5d210e0596e90337ef6d88133ccc52dd6e6a4
SHA512c8e06f529079c8ed002063850da25e086c0c44a04f28017279309e939062068dd748e89911b0464659d4dc98ab0867d4529baad1d20e769e6331902eff19525a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b2e680417af30c176d2b0ed9c3e3ce2
SHA11a3ab5a1dcd6180d36d8af70487280d388144cd1
SHA256c7e35651152c56c56c9aa15fc4f2d1e93a82c6e9ba1b1524137e04730a41e085
SHA512cd51a99d6c62d00f4cd3122fe69f676c80605160abb4c9b52a49c1473cf442009f50e5134ab59e4ef10fc0bb16585e5bb91976d38da075b33623b5d98f614a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aaf59e26ed244afc040f117cb7a133a
SHA140cf3ef1720fe8ff36fd5a68a21298b48f24ce73
SHA2565b0c3a8a69cb845981a9fe65f3fb10597128f624085e7b1f03a0d17c072e7026
SHA512ad764c62aad6bc0d03fe4bc4bb60847c4ba0912e11d5d983b65c34215fad0780ac8df6be4461adb23dace0f6b0520bcf9a8881ef3067d6cbdd1f835df4ff0696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f18909990028baef828895b3f3e2de
SHA106773947d77b59aa01813f99c5b40ef85307fbb3
SHA2569d5a9151a9bf89922d7dfdb137bec564abd3d3c7d2dc76bcc5727529c89d06a1
SHA512efbcebf21053b5a012a03863f5a002e20dc7808e773b5d63f74810437a39c86e78fb3a297bd21b9a053d2548f90e903cdfaf47068642550ddc237ee4ce210923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814822105c1f610ac938e4868dd2f320
SHA10d7b8e3c42538c2542dc5c0b254f7767783d943e
SHA2568d9b8bb9cf4ba77551fe3c68fe1564d98d853669e6fb517eabec7980a72dbaa4
SHA5125d94af8f3ed6d3882b158d8205a5223f6e0eca40f7ab43ee8c4d009726d9ed15226cb9c9a3ec43cd0a5f9a5b864fbb2ae9c206e4d6a15ad0441f8ddec8422e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a8ed17073def5fc17197a86b8c9456
SHA1f2b2894abd03fdf4eea0890219aa77b6e37d8993
SHA256ac501274f7b302c8e816c08af3f91865bf821bc22cb51c57705130575b72dcd9
SHA5129ed970a1c1793eabb614722a28a1636227045e348d46a6e92454982ba3a921f444b1765718bc66482209fe64a727647d47a59a82769f725bd3831d59f89d81d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c13793c780612c72ad77f9c7e6452841
SHA10f23c11ce6b229f16062afde5b4431e3e96dd162
SHA256c752357cea81675b128d30dafcc0e8405a1b8a27a23752b46da8851ddc87cfc7
SHA512027435278eb616dcd2abe51aab10fb6c1f903c58332190711fbf3597bc3e633563e7747bd04fe6c564cd0bfc7029ea5a1564cdadcf30fa6bb3503be29cbbc7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f03c6b050486a5d9cfa1004406b3e6d
SHA1b9dfe4941e9b3fbdad86953d45662255a50a8ef7
SHA256f94c3014e11f32b81cfd812e02354012e9a81a02adf1e308e3b9e21ffafe948a
SHA51248d90370394f7178b04471777b4320d067a22c96d2be628cea17e030a6552427191aed343ac21378c7a3bff668379a903b90eb3ad3f410eda6c89e745d8649ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022dd1ba745749ca69ef4b02daf2422a
SHA1fa6326c905ac3b18f7c722c7420a72a7cde590dc
SHA2564b968b5ffca0fa2a75b00fb8bac5342f7c04137f8c7958bc01be72b71eb906b1
SHA5123eab3ae845429cbabcc8461958fbf2e2e734939117c68b149a055386e48109ef7b78cbdd18cd8dce8affb62d6604e23ec95d97c0934ee291114a6b3781e4a9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3786a50ff61fc4f06ec3ec8fd114f90
SHA114f3f2fb5ceae884b15d2c0fba6bee778179c424
SHA2566662b8648666265bab02538c8ebdfbe857571291f86bcade9045cdfed14855c3
SHA512d61b529599bc7ac3f53f00d69b4a5f7fb70e42d4cf584741d376d723a2494141c974b671622b394d1c102eb733b871ca9637e9dc58ad4a6d452c5164fbc6c0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a588f43a3076b80aee261740d485d0e1
SHA162ab79dc9c75cd56bba1054fea21381ed4feb903
SHA256a3f17902ffbfe31825b0a0f7be29391c69d5ed5a27cd2cc2e9daa75a81256787
SHA512638b3f007c73cde671a7ac022b31264dcef8abddc59e6ed0b63878f5a5a92a10291b245640da8a9fdbb1321235fe85da5c8a3b2f2b6fb89c5c303fcbafa345c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aacfd06cd03703a4507dc6378f5d84f
SHA12aed6672fa0bc5c19e0b5706439f0fa2b8031195
SHA2563665c30a6a43e5c0fd6947f7ffd71602cb977a0f296cb2960153dd02f2376a65
SHA51231fef69e19be639c4963ddc7364972c8b8976b7ad61e019f3e254fb7bf6970489930d33ffaa0ed49274651fd0e29b37500bf3ef9665d88f74f1f63ce06d9a353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4bc778e29d81f69f141ecca86bab4f3
SHA18e229d8b10bb94adc5c55cd66d891088defa83b6
SHA256f3761d03e458c788902ecae5503f7b3fe66654446bce27c80bdce9b73ad9a4ff
SHA512533cc8b3fabf5d384dad4f4d1c6cb0d0f3e529933f5169818751870e32f0f66922418ac403d04787575731b99a356cb6881b8b2b27ef669ae9c45a7dbefae0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d34a28a185d8cd5de43c4d13ae93ebb
SHA1ec2b917787dfccae31a23890784eca13c3246fbf
SHA256aeed602c8169785b611d9acce7a1ea9b8c9549c968ec68587772a7086c82597f
SHA5122f0a7284652ca80665d820c9b567e98fafbfa8e2073164bbe4e41d0f343cecf5c53e59979b29cc5e974a1e3a1995731719fb7282d5c3a96c0a606f8231e8d014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a968f116b7009ba8bdafe7164e27fb
SHA1b502e7832c45ae162038f81417d0c382358d713b
SHA25676850673a8a5ab8ebfab7d8657063eefbaeb1c9d378e672f02f5a54fb3d46058
SHA512ad9204c159786ed06fdb6bfb7cd958d9f80ffb15a8d4397bc2934386a260926bf16ba345cfc7a30ed448b049458fc3400f8345430b990d41f148c9bdb20809be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b3b05729a2be8de81363e67cf0cd656
SHA140963f7bb2ea8d30a9bf909913764d78eb4d8f1e
SHA256d2781183e7efc97784f35c586aa27988c9ae92fff4fa98b461dab6f8e277a25b
SHA5125521bf3b5c7829e9159dea8741f5a70d5736715f8e7e90a2e0eac5fdcc7e01da1af1fdde7e78f0bad72fb94d151286759ce08cb337e976e6b78b473d8ee24e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc65c659e67532967bad1a1c32bbb1f
SHA18f1c4f52f7ecd0d02cff496a7ab19ed1f8295ae3
SHA2561956eb4dc717755d5f07f5957cbc8368894704debf62ce9f79a01a1bdd787381
SHA512249eef72dfedf9c91d52f638922f5959c5ab2e887dd64984aedef3b1c00ed6a5e6acc4e91c7a35c296d98c2db74ad55e68de9dc47740cebd1d503d6a27c276c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88f8a2e9ebd2200277914c40019f054
SHA160fe6d86d2a61ce4f1e112d55cbf75eea316b0dd
SHA2560b4fb5d25deb516709690907606fef4e017b8137bd8a3d703b519259c888e4d7
SHA512fa3f6ec19f17af71fc0df0f246654b35c5d77ee51cd465932201016893f6d688ab80b2f974ea684cb2ee399ac53579a352c487adaec212651143265f5d8a4f07
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a