Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
0262bb5a4bcb6ecaaa6cdb4a2b3e1005_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0262bb5a4bcb6ecaaa6cdb4a2b3e1005_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0262bb5a4bcb6ecaaa6cdb4a2b3e1005_JaffaCakes118.html
-
Size
4KB
-
MD5
0262bb5a4bcb6ecaaa6cdb4a2b3e1005
-
SHA1
bc8920f7378c105d5ec8603e2194a0fb441825c9
-
SHA256
4909eb7eb4c586fd70923d3a3ad2876965c0e41a803a9fe41eb226184ca8d969
-
SHA512
79e1985081a04f51a434b88824d3686354c837298e63522712154dec3f9ad18f718606916d45b94b9bf05156bab9cf4b9b8693844b82cfc1c15961e56ad0ff7e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oW+YsC2d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03f527c5898da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d0e572f3118e6e178682b7a9646da9aa4f5b6e277e735c99d06c5b532433e01f000000000e80000000020000200000007fb4b6b2195fa49cfb88ff5f99cf5e28fb7d2e43aa5284fede586967821154ae200000008f4efe11bfe0c415df9640ccd9a1a1bc76557f1852dde51bc344645cac59044b40000000994dda2692aebcc5b38990e2e5da71520d4612db90ca3edf8efb67386bb319f1e61bef43a60d4b3fcb8e556bdd8739293e8ee79c5a25990ba09ff308996fc4fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c989b68364e6812d964c1a3a3be15c68b5d0cab223c90cef1f40ab1950a0e22c000000000e8000000002000020000000ea5b42406bff1181979ae8e1cf50d7e69d9a2089b8d40ff67a57bf15ef8a339690000000f02e00de0dac0fd3637eb0041d387ae781608112d202d292d80f6ecc1dab9c7b6fe6d1ee636e9820061dc779e6928843470b0c40efc25bdebfb1ffa6cbec6e519ab474d2fc1a53e2421276564a1609b9fa71ac542090a4f0ba01175d0f0963a6d952963c72d43317986549b949817b1bd29e03b5c936610726312f67e869b3b99365167c0d858b33dd16614b3f2a62964000000022556c4ec4d99180d6281144c45c96b2e5b17e9997a6804a0455b31452f8e5f81ca2ae87c02aa0f294671cc10355a7836eee522c2d6ae768159a7088140df114 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420352713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7A23AE1-044B-11EF-A34E-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2612 2236 iexplore.exe 28 PID 2236 wrote to memory of 2612 2236 iexplore.exe 28 PID 2236 wrote to memory of 2612 2236 iexplore.exe 28 PID 2236 wrote to memory of 2612 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0262bb5a4bcb6ecaaa6cdb4a2b3e1005_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0c3907cabd9728d647976249b91ff0c
SHA10bd78aa1d3a5912de1260352c319a88e1134cf65
SHA2562fe745d35e675c1a4b3bea01457ef4ea2e0975880714d3f409ee56f3f4235634
SHA512dec3172e796799064b3b2251b8cca7bd596ccc7acc50976b6f3bb5373dd91452418f001e1132a90b87e62853e5b6b29a0ce118e9fb2bb5660a84fce42139ca3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a50521a9afb969b6baf7598b7a171218
SHA1d8d47d7788f227802e63d97571befd5651eca0d7
SHA256107c3b1b5511416429a7799d660a13dc92b66ae47a96e51584816ffb3c5f3bcf
SHA5128ba4937103721774fac7261436f256d87f76163034dee3019e89bb257f064d87d4dbf77a6706065e065c25faad53d6712a8113b4eab07bc929524356ec19f2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe8c76f7597555ac068aba906e66f30d
SHA19930b89dcffc50ccf1b8c172058d0ccd7befde31
SHA2564e768955bb02efb8ee8cda35ee69c2f60ca4d4916b3781e384a5db73a4228cc5
SHA5128e103b405af1cfd40381b886533da7a03e6a4621abfa2ff749cd244204a394970919947eb0034428e4e40d55bf78cfd06a788071f505579c130b0911cd1ef41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500af1a2a7824e17ae817cffa0a4a1193
SHA1778361d1d6aa1e49563f9fc96a9e5799f087644a
SHA25693f41bd533c1526cc3ddfa87184a97550a885d967a59c29806c830f73bc270dd
SHA51295bdf9e89c8d7efe0bbb183c3e54db4f53eae583e3ce93f0eb13d695841fbe1e3fcdd8cf1d7cfd8ad3f978e65ef8c074d2d5bdc6b19756f422f829b6cb0ccf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5836c6ff0486fc179889a8cd4b72ebd5f
SHA10bd0f8f93501ba13d8eea526c95c455bac3415ba
SHA256d8da76c9e0a3b19b9ead308a7b09e6ea192841a329d0889db9810a7376c5841a
SHA512e22e5842ad2c5a415bfc40f91c7254b27c17bcf7dca76978d190f7ce5217e31f47ac7ca2af87c8fa55f5ce9f62f5822e9628d331c64b3475223b59eea78f7f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5256d8bd5347538ac722ecd91eb04229d
SHA15ccfafaeb9b848c398c2ed1c4946c7c7dd864343
SHA2568339894d2016f6cc82525f5bafd3945b320c3138eddfa023bb409c289896e2a3
SHA512304b30371c5374057d75b640460bef6e15a5cb9eac0aa3d70fe6d4cb723abce35a64b6fa034d244b0efba46c4dad92c12a876b4006237a4b1f22b8b347c85a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ea663bbf39b7c1134a0332be2cc1f9b
SHA1577ec3310545cb31afa738f3326a134f9bf6d47a
SHA256d443f479945b4d2bed6baeb86e6f9b81537da8027b110703e45af23b800d6bd2
SHA512d4b2fa85f2f2da3f6b7df95fe004edda0848c194e8a1cbd891edf8312675c6fb45415c81631237ffc0ec2ee1174ebfd6bf82951424cb2955af02281f75db7bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fd7fe8932b353d37e630b31011b25a7
SHA117809817fbce8a722b04198525a9aa55f0ede78f
SHA256ed38a0ef0a151d43dfa6c1153a297275ad971e4ccec195b1d099da993d935ed6
SHA5122d26ebedb8b7af74b3fb8047e0243fa89472b07a101ad606131e066872b93b31d28bc8b95dc0498eedf1c35a10cbf8b564429760bbb0b35b39fb356c473107f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdbf26c36d662c8bdc3e4477e9618114
SHA1c53697e0d5948bb38781bf08427f920abf1a4597
SHA2561b4b947adb5de7feef1036b5c13a623682f0a8afdc7e9dc94ad0d41776c2740b
SHA5122f019532b2b07f910c5f2757db67139b797d16e801abda09493398f0cc344cb08ee2eab9db279c32014f464f3fc2f347959cc1b2c082af35d283584ba277765f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5987bbc10402d055ad6e3e6c64f37e99d
SHA125df3b6c7f2d2fed0ccaca2673ea091dfe949ca9
SHA2568a2775ccc81b8cafde0fedba145d983eeaee01854db5081d9ade333d6003b0ed
SHA512a35b890e3e1621ff323689995faf0b77e9beba39854299a36698df2b4a8841e9c98c9679dcf28fec485ba943ae3b2c47796e0d05a36d599d96b6df9667852fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57de6fd650a019637d55370154ade9816
SHA1128e53bfb66819281a36504981924fd42dfd98a2
SHA2562772b150adf6490813859b1d50189267d5397b87c804b4ce7a4456dce3d1c98a
SHA5120545827054874ff2dc7efe82bff86a1ceaf9cb57755ac4f9deac091cd49c388c96e2c4880528485c7da80012839ea9b27288b33dfe6f07649fd0dc3d260acfd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a78b0aadf90c1c0962fa486d1f32d5d5
SHA1ea53e5e2d3a6e2815659dc9577e39c31c50832c0
SHA256ba1512ac359f74f4bf749c25e54cdd917e295ce1a98588bf0337169105be2baa
SHA512ec6a2154895dfe2de94c3b8baa26e8e7adda51f871adb3b04430db361650668a2a4eb12839e408139239296cc5e28e1b07fa4d77d4f3694e066a3676d5b6c94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9bb79be0ace9f2331784e1b6920d61a
SHA125113a70e2f116b5ae286fda3e7c8ce4b49592e1
SHA2562bda1e3871c734006de87a73c31ef42cba2c50b545fc129b74fca3edc4d7320c
SHA512b578ef8a963fc1b57da9e1441c82a481f3b006ee09a4b9e833d9d630bfa67cd829d34ce921217f648f6e99ed313a93842804bd12d315da5f7a5130a70dc84898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5583bf02a69dc5b2ffd7d6d6b3feb151e
SHA1de7502db43735bde488cb33f4fb68b3f33e0cc1a
SHA256498de990d5c89e291021a6c4b2e1f116596f696d164dfbd207389fb80994f303
SHA51221de2e213c923815786ab6a64d7308bcc174843f88c418255fde1f9c45e22846ab57363f49333958de9f33591f2854f9a3dba6476b60642a35908d9e265c78ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD538b7a6695079916614ccf707fff7b89c
SHA1d3027e61b20263923f1b28a7a1a650b1c048d862
SHA2564271cd59d47257bd7dd081b3f094d4c83800169b56b845e10a828876d7f6cb46
SHA51294d8984769cd523756b4956c88bb5596fe16a6935f40b3a3090d7b1a4625092c92da7e0565a1e01afe2d4d472904be384a34e8f977824d52c89acbc87af42c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9aa27b2657cc6fdf5600529a2ba0f36
SHA18e21ab3a1cf0560edcd1b39b435991281d32f157
SHA256f5ae75ad44ac04baf9c1569356b62e2899db5ebc81411acddbf5b116ec6a2eae
SHA5126cdc298f07beebcb21a244c0666cb3bcf8a24bd3b2111480ac86710a9f7fbe4543cd600922b455f0f840ec43fb06e0fd266f05e41bdac0727e0493fc9399031e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53630931e3984f5d214102a3efb73adab
SHA11ef8d5de43bc1f108c6acb926f0c0baba75d5e9d
SHA25600c9401e915f66aed84dfae382cfab946923f3f8977486030a5210bb3c20e40a
SHA5121b21064d2d83502ac870ad1b931258f094e61facca21e545dfabfa84e73c8232ac23011d15f34af3fd383c87904404c09b193b1da40df0b09827aa9f834cee60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdd94d1965a16dcd7c3e41af7da10fb3
SHA10e7dbb13ae54b384e5713010cb7c41bac9336c67
SHA256c99bf248c02fd0002bd88855ea63a4b97f8736b0d82179f1b4becb8c7be064d1
SHA512ae89dd413587a6a0aa4b83fc758b0ca19f25f8a13fe5804a4e26617900978de4452073f0ee04a0bd9eb4673f6739f7e0bf568bdc3476638a28e5e7056a1e3e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5386e1321e07c3285117cec0a74f15f7f
SHA12b2856f5326742a1a84cb687785b7059b7e4c96b
SHA25691bfb5b7c493b4b78b46f538133a1655702b8a35ef3be58167f62f84656605fd
SHA512ee8933ab1d93455eef06010b98dfac9a2d7f2b89cf7cd4213604ad5720ddca32dc9c5d6fced7577c5b403de80c22629e34e8d320d1a21d9c8f3ea185e65b9b90
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a