Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
08834fb2f5adfc4c7a8ddf04eaddcef9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08834fb2f5adfc4c7a8ddf04eaddcef9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08834fb2f5adfc4c7a8ddf04eaddcef9_JaffaCakes118.html
-
Size
20KB
-
MD5
08834fb2f5adfc4c7a8ddf04eaddcef9
-
SHA1
0d5234c63cc23fcf8a0c5a8ed7f8e7db4e9cc6b1
-
SHA256
43ca1080f13dcd98896261e41a80482a731e24d69246dd5875201349a0837b26
-
SHA512
05679b32f78bf495322094f0b69a0a7733799e889f848681925272ea464fe2854129d7beb20bde2aceece3498a1e89bb861bda4b173029f00260704bb13ccdb6
-
SSDEEP
384:PAO2n6pLnZiZo90caJu+s/jIBcj0/eUTQuJaTD7AL/Yv/U3vvF+3nR:oLWLnki90caJu+MjIij02ixaTDt/U3vI
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000000f542556e0911b276d89a99a35a03b5f4a2ddc6b7553d3f4d7eb46a5fd3def04000000000e8000000002000020000000e9d8a7d12193f63f4efb15b901934b8053d8256cf8513472a2f5f9161265077e90000000704adc8b41b539ec9845a8d653395b533dd56d235b9f6648c1724f83d11768592822ef74086de122088c74ff0eeadad1f68f99ddd9d464a2a19d12e4601e68ff3892887be57efe67f50b0f8fa47aaf4ea41075bff5ed004a0b5b459cf884951dbc1a15996e9b7c25f47fb0ef1ebcc5e1d63f83e6efb28c8bf97b8f9c8d093ccf0c0ceffbe484616b6609bb5dcff957f440000000d3ea71e5f0b6f39742f0ad176d4ea975d03c6f5b266f10a57f1445b7779a554aa45ad0a83103821bde1505ce11471b66d9c1ea5f6178a999ef4c3d01fa96a0c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000e9f99f188af105378a02e5fb37885648290e0e03ae467c5bc511e9bcc576e365000000000e80000000020000200000004c28def019d1ec67c3611d45ac88103df07515e2de45a71097535c2e18661913200000004352d0297d2c4fc191bde48f7a95f74934379718aa54c345c99e8abc04592e15400000000f9f6986db1dda4ef6e171996b94f84cce1c2046358cd1fb33c512b6643405c694e05cc9a66a430f1e2644b59c1e13cc5c31bf7ddc84ea2f7fdd66fa02d054cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901896158f9ada01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420595997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{182F7831-0682-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28 PID 2168 wrote to memory of 1612 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08834fb2f5adfc4c7a8ddf04eaddcef9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f2e3b4128f63c4eb12807c760e417c5
SHA1898356a342ce4fb3237386908fdc76fd091f36a8
SHA256260dd04510eb71c1774f916dfe02b2d7208efbfce00e5270db67caa1b704f009
SHA512a304863babbcfcf9dc33a458aec8e092033eb3e73b62c4e5f949889b942aa60823f18c13580745b420d5760bf771a637e6cfe9ac207ef46fab71d6655e7fefd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b8f6d5fe3cb11f75c6fa463d1577bd7
SHA176a8b33060f2f3fe286cf08b0ebe7c9049280bfe
SHA2566bd49e1364514ddd0289059d0302ccdc0813f55645a10c375e66f5680795e81a
SHA51215dbbc59bfa8895f9c7392811077c5bd04b6ed7e87674c4d11f3512f22fee0788ae512c89c7710def9a1ecdbf6217c1733924c5aaddb7d28ddf9bb739f4fd449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD508150597c5a5e3007bae959d4b584cb1
SHA1d16294cccf46b20cf6a87fc49225ec9b5f2a4649
SHA2562786b565674face3bd4fb3846afd4b4cdedde798e393b4496a2ed22fc50156aa
SHA5129f085068e6117e7eac6c9fd4a9b1828b952a0edf50573694d4e163bae2510064cad4d62f726d1de622629fa55f83a57d351fafa0afdc4fe9072cb51680f693b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54704a8b130c24c6716e1611f7dc6092d
SHA125072c12d8e732fd0777a3b9a43540fb42c61cf1
SHA2567cae8059c66f24c07db3311637989086e03fb9f87c0c8de4d4c2dddc32f7b2fb
SHA512c604efe70eee531606e289e2cdc42f910d8059ba8f4c8802c3b5ab0ae1f7340205aba69cfa0679f054fedd0237273a1732652a3032f62e1a46e0f84d0a589258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a85d84a048abace2235f7a96f57a33ce
SHA11a0710a06c86b3ae25081a3c0dd14cc494c4cf5a
SHA2569d18668690cc1d068ee81e8616e04c5da1e8cbc0c310965499160d9b191b11c2
SHA5121e4205c6988a7578d5d729460fe6c174084be981ec2213971ec3c44269df663e80183d4a29d45ea6ff9c6f491a98ece9e6e74aa59c88a69ed2ba1a4cd96da242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50fd4baf24b03b1591f367802d779f5af
SHA1b919bb2fd4cbe2504208f053fb72974e36b34648
SHA2568b0e9604d08d4dc9535af47bed3ed107fd7635d65c62dd43aca4bc093af291de
SHA512294e098f978cd1e96cd86a397ddc28fc99b64f7b96f41df9dd4ae5cb6e4eaa38a24b0468d552281753b39b07f66000b5fad77d1e03339bb0a0f3e4ed02ef2c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53dbc5c51a8b8597840c88fd08aca70b8
SHA1d328a3e095482ce3b6bb0cea28579e3535292010
SHA256fd84fd3180bd326a93d54a6b763d41072a42c4767969eff9dc18a0f4de2b6429
SHA512173f3f40a5c7a5c5b9efe395cbef557f9cb70e2b68ea75e62b3e951dc1f86337755721a04e51593a239f178b95630b02e4436250da9363659179e0cfeb152329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d12101d9e73ab7b16e995d3d47e2241
SHA1701ed3f89c15f283519e13fd729fbbe13c5a33b2
SHA2564d272d2663509d8cb43074dec8269e01a96aa58579255dfa3ce48ef9f9659e0c
SHA5127c06e7a24e7d2403cb686ca22d53ed200879e052f6afb8902cb7a4335efefc60745804a2dc6f3f7b1cb5bacce22461aa4da1f1e50153c8350fbb6473c420aa98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f0582b3dd11a7a58546d193960735b3
SHA197a7e2d41f427a78a81cc2595194af817231012b
SHA2562ab47cd60f9fce6bb7b3dbe98e7ca616c5d6b5b6b52ce97372acb63d920ce320
SHA5123fcb4d5c291a07c21903923e9369f08e29b63cc0a17993b4ad89a5846fca3991d897a1102bdba0327b2ed02ec659a9b8af4b1e7e93a2ea6542864ced5a5e5eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a149979b4a009934d63a7f148bbbaed9
SHA1b3bd28856bb4c623fa4b993b5b5c159f521646f0
SHA25637d288e3c54d1ac805aab5f52bf3363a63c97c0100a060b7766751342db86639
SHA5121bd2d67fbbcbb4cb02e3d6d061ca6bde917f3d1a98e6125e919913694452619603d2d83ad0624f59819a6ae3e14857cf20ae9e32f8dcc9ef7dd24127303d86c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb00a0e66746262d89fd8407bceadeb3
SHA1f3e5c96c777ecdefe157eb3214bb2d2299402772
SHA256b14d8efb3e4746a23391c91d55a04a4a94cb02db6dcd11c26c628f9b92c68a19
SHA51260c341268586f7c0373618b5abf27e2d12ec022339ae4b607f4c194715a9bdadbf26297fb433d30354950be8e1ad25da819d09b1400dea573f7a8bcbb356b566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f61dcd2869ffb73d86b97c0de08ba32
SHA1ddc9107106f4cdc4fcd6ec99b3177a0e16300ff0
SHA25624b6c3cb34dd8260eb8194f99a093190368a25d7e23c261dfc6546493d5900a0
SHA512eee8b08f4c805d88c39c843c39292486cdc240c2a14e52c1610fcb13d77e6f43fd03bd32547177d2b1d7f3ecf54e7e5940555e230570ed00282624d59457c8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fa40e17ad54c1cbe8110a1bf4210a7b
SHA1eea6f3502a45b8cad9c533725b5cde1426d6845b
SHA2568e4ab1ba9d7982a7647b42ce0db30bce1779353ad54138d5d50b2550e8f1e4a2
SHA51283fa2204d91c2be096718e2b901858c40f453d9ded319e5b67eb52656d96517bd701e065fc4c6416d92d4c163d643775b1c875f737cf216951242b81c86b8a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c86d52256b513ed85675bfe13785c585
SHA172861d132854261bd876bc1c7a3eb868907cb582
SHA256fd32c463fa0022fc864fbab679ee46fbf42477a5ca4bcd138057b5866ab04d45
SHA512f1620026bab31e2a7e5c59ecec7acf3c1ee6f24455ecb6bcf5d1e03d9d69e7b64e256ee48d106d8a4b18269a175e254ce749a380dd81cfcaaef07fe6d92c7b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544dda79651fff178ee40dba4c18ed0f0
SHA12c591d3ada5aaf75af73e7ccc50319d468fca55a
SHA25639281b6bcb4c3505890a6207f20146c6cb5de5be216452ebe51e4688d64639e8
SHA5125f5fa0d58c37c864be88f80fba18da42645ea26b2e8c442cebb882259f4e933062fa137a1447ed6e8db87fd029c42c83d98fa98d7d2f23b3848a45fa76f86da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594f39645bd028a045bf78ba6cf3923a4
SHA1aa6b165da1d48c8040c868a30ba3851cbaa92d66
SHA25661b5937cae3aae87536783aa6d933419a63a5a3a442bf23a910e3d8bd9b3e520
SHA512ea725d185f29874a28807dafd29ad1722a292a63f287ee9010cbbad1c7c328aa83b223bd1329cca799533f57276c62c0ef63e1b2e70bb3efce831530fa2de5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f54be6d805837020f130a79f18d634b6
SHA1f82f69fea3f9dab6fcb35ea2d1e77055db3ca728
SHA256fb3edd65d5237d85e41f73f0e1636c6817cc5cfb388e77591d4eee6db1fe9d45
SHA512c44d709638b1a943a2818e27ee8fdbc7b32492b80674155e0f14829d5c92de64b2e86c6d5834b281bd28af3353cf61f447c9342beaf4004c3e153a88cd825027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50849d0e8aa0bf9a65ca28879442a17d7
SHA1b5c078d4d4098102e1731d3d92045207b57e478a
SHA2560a81a058e66c9460b42ab0433f478b7f7ecce05ed145d98c7dd62d2e8e66215f
SHA512631c65a4a6fcc2e47e557acbbde0729fcfc631d05698b58b708a79e8cdf361a7f6d65840d18467d7c0c6251539b3b8807ed475cb8721dd89ba6ca6911952595b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5beed1d04f7bfc85ec87f0f1be7fd2de4
SHA1e087779f2241a5c76ebce6fb1f8119e9f95d98e8
SHA2560cbd38ec93122de976fbafa21f0f60aa07e7c045571f2ed81801909044c5caa4
SHA512969cdef3238d3c4051118a1581b259352ea8404ab248f4767c649cbf98433ef6b08cf9ba811e41c96c77418552e568010906239761964473301bb0bf47bd1c41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a