Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
40b5512a081572851fb56b6f46e8c3a1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40b5512a081572851fb56b6f46e8c3a1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40b5512a081572851fb56b6f46e8c3a1_JaffaCakes118.html
-
Size
448B
-
MD5
40b5512a081572851fb56b6f46e8c3a1
-
SHA1
2cd4c4266524711f1744eb0666a90f51174715e8
-
SHA256
c992d5d31f6a069cbca4020bdd193d914b51632cb1faf347df1f170fcf4d5d12
-
SHA512
43fd3ff06e27e72d9b1282ed0e35d519e426a573dc683346b47ef77568df004e33e938b6adc5a9180d94905abc9b8949cf2ac2546e15ad50130ad2f16daa8441
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08186A31-11C5-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421834209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009abd07978571f5533cfc61d0697623a148fd5c3f05714da4a51f97f0a21f41d1000000000e800000000200002000000020b4bf232fc97b947b98618db84074ea3a37662418ba89a005a538f1407b1e612000000026c6ddc130f7b8a8a33d8531c10250204eab5216a93917c69b85de96d1b84d044000000059c66ac681efa95f3957991f1b5e0f38851d23352b35968401ee89bef992c100acbfc0884f1669a6d51d9cae4da6c5114ec16ac816edf60189f4ad8ad8d20437 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d031bccad1a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2224 2512 iexplore.exe 28 PID 2512 wrote to memory of 2224 2512 iexplore.exe 28 PID 2512 wrote to memory of 2224 2512 iexplore.exe 28 PID 2512 wrote to memory of 2224 2512 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40b5512a081572851fb56b6f46e8c3a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508d020058908ba942829cc8ac5fad08f
SHA1cfe806a6ac5e5627135f8270b0436bcc71693d7d
SHA256b7f0a78bdd304de26668463fd58a37677806eba3f60dd9fadb0ff14f2c3c2ea8
SHA512992e63a8c020c04bda6fbfa22b39e295fa3aa7e39d08ef629d48a9761eec477ec2f873573a84f0761443d773d44f090c6753d74ae63cf7d9cbc22c89437ea5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7dd6167766e0127c64fea46072fe1cd
SHA1a5a60387c4e5985b8122dfdf3ee59a78968f254d
SHA256240f87c047ad6531be4eeb89d5fc957b4f8535d1bf718ee89e09e9d91c2e8759
SHA512e7870982405d4f77f7f2c46965a288223e9b21a0184f5c641d3662daf4da917527955748cc4c0130c98d4ad4bed21b84d99f564671e66824aaa7b0778b3dc5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0a4fd896607aeb62de5f9332042139
SHA158ca66a11b7d8c7d2264dabf083643af4f7986a1
SHA25687feff0bf3f00685db1969c50926b872dc6150ca714213310d8300cc41cc687c
SHA51209411de3d60e30247d872aa12207b9cabeeeab8ac3a7e7bde3b04f6730db84d56702a7207c2f281c7939856211708a4b5be8dcd938473ecce7f7ac5b1b44bf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55899766b422e02d19755f2d021b2efc5
SHA13733f5c4676d70c39895f418923e80503139d62a
SHA256850e7505a492fa6e357c88488d7e91dc9ed4b0e75fad77083f06310cd30afa7c
SHA51221477082a59e584132a5821857833959aef0f64fa2edccf4a461dd3e8cf0c85a8805d541d68210d4e1960c0832da6b7204c14e21da47d1b80169f2919ab24219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5149521fcf6e8a1b6021f6500fe091760
SHA1a2a8593e5ce5fdd5970a8ecfe03ed73d77485773
SHA25600e72adf3de72dea32d0cb52b262a24a5219ebce900d14c9d8bed24bc971f90d
SHA512b5ec7b4898e2f3459830821db55576a4458bcbd80cd97a12f0fa43dc294bc0f1483eafb8f192540990b6903c9132e92cde48d5856f5a417969e4ca61db7619c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b44feea2854387392be18e80796e881f
SHA15cd58ee9336c00f800132fc3c973dcfbdf67c73a
SHA256b2317d66ae6e8dca620ff86432c4c238e803c9f2a69ba15fee1a78a9cb9dfecd
SHA51218115bfd9321fbed1da68b5e33ab51fda96257c5689061058b2bcee626c5d04ac62c62f1fa6820ecf46cd04b99481ed6b74edfcc321b94af06a643096925810f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5879e4d8708625bbe38a1ba8cedce0a89
SHA1ac93d2bad338cbcb1e49eb9c3f5390b3b3df8fb2
SHA2563dc997279628a483673bf22331784b1fbdae44770e0d52217de963e8b86a7488
SHA5127a1095f26fdd6deee0a1731f5af271f14eb52fc30ef6c28222c5f568ed508fe0ada2b6ea46f7dea812085a278f9b31109fbd78945e78f721b3d00f3ccb0e701f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c80be44e1ff1067df5503cf6486651
SHA168b9ebf6cd3e49af93a33311c9d2c96c64137923
SHA256a27fc56d247d58d02cc2539698e9d31bcdb567b7238ef4c32e3bb34605c279b6
SHA5128fdfcabf732e68a3ab845ad3846e27b918c04a10f902b0d0da573299198f388a2b53f86a76823a797b2dd8fa0a112ca40c4b806a55cdce7e18450ca0f904ae9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706ce5b66fc7fadfecb11a30a7fd1113
SHA138b858defd66c4a0a72c1b5e8e11c3d18b8791ff
SHA2561d32a3a792072c7667f2b71c84c37ed71df5c87c111f22c6c7f9c1cb7e2834e8
SHA5129d9b58b30ba210dda244dba524ce98d02c795995b65e6ee324dae55fddd7559beffeee75b7f16e4de7052010fba2a654a6dd7e75c13ca3e6cd7c1a6ea4237055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54873124a1e4482a61d765a8deeb63471
SHA18bc6af39780c689df64ccb23765b29c6a48bc272
SHA256d0ed161c43937ce690ac2937dfa20cf5dbf368f0416cf7fe3876f84be195cbd2
SHA512c552a3846398d12f831318fb8c01f4cea3a3c09e62b183fedc5b15b071e04608ea9475767216956a278bdf6402d9a034affe5b4e560aca4becb18fc8851b8f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c63268dcf57c1beb4ce4b998a5325d6
SHA1ba240ce2f7fe6d5010f6e8c9be9dd8e6c79b797c
SHA256a391288dd4152425f5330fbe2f59127351dd6c1ed9ffa32e403b2359a645f8df
SHA5125cee193e488dcca423fbc39d2e402512d3b8efbd0d612e7f9f24e0afcb610beec48bbf1412650f0cad76461d17d7c48f778292e7f57101f68ea6f2d6d9010f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58379de87c1a619c2fa1a46ad3d602de4
SHA1d89b7606265cd82c9a593420196bed33a52ec4ef
SHA2562ef1751dca127bc4ba2c3235a66ca5ed396e5116becc25478cfde2ba652c0e52
SHA512ba9af8af12fb7ae2b6be8a3fcc8e40be0fb0ceae28d52e5aa9b8e64aca41838f57f7a355f6ef13346ad8d3c28098721e48ae345d29376f1fb04e227b6f0495d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b792019e3ab80e0c1ea6e988c3925b7
SHA1353aa71360d6fe36c6606ecd269db137aafbd99f
SHA25642baf14c677694c22164324ef29d92ea6d04c701c4c593a08bced535f9457339
SHA5127cf547f9bd48434671bd92cb142d14235fbb95df55c66815d7814bb363fa5d61d3a3fcfaaf7ea6ed02b46044b37635fd4cc2090e71aeee5c059be2b9500d4fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d2e4fdb4c1c45b1048c1f488de8306
SHA12cc9bb261cfb60316787b9bb27abc5408d4f4575
SHA25601add417458f805f6715a3bd7b2313e9ea91017a480d7410e126e039da4c5738
SHA512adccbe94e9dbd745ca31485e3e71a500e850fc36943b3f7819ba13ea49c7f6aa6e45acccd36782aa636fb467a3310d89324eeb227fcb66f5e514bfd09e68a3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526528e5bc16d4d51812af66f83d20381
SHA12a0d9ed2d197991946d6f00e9299cec6ef223e84
SHA2569e5d493ded1521bc4af43ba9341aaf22f479b827fe431198553f0c865596a794
SHA512fbfe0ec14366bd94e2865df534a729a96e2e27bd7f3d961a2000e71c3ab8a3271aade9e33baad9328e3b42476d10dd5efea2d3c846c3184600a221e3ff9316b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6c5a73d79177f907f8116fb6b31885
SHA1fc4fe84b8f6185b401eb2ebd88c699f05b327739
SHA25609ef376c78f964661699ba9baa70a90ab55a05a07d35b69421b9eb767ffe9682
SHA5124b34768cb53842205556983ec915c6d104d6cac7b6d0f9b074924f2b0e9ac54b61451afc4d2591020e374a7742e719dec9ffa80940ee48fc1111d51fca26cb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5911d4eac42765650408bd8b72a458478
SHA122b69f0da894c4c3108361d7b25c48e431e00b93
SHA256da7b520b4e21cfadb6bb5f5bab2d2e56c199fa150cb0d620cb6ca7bc01fce80c
SHA512da99f0576678d64d2e9148d76e86436fbb9d39fa5d690821cff070bb6cb844c696ec57838dc246dd249c7680d6560e8535abab11c58337c481672ad3261f15af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd25c9764b80bcd3d988a30cbefa1798
SHA1f30f5e46f556b386630245e120d1e4ec29ece1de
SHA2568af4e1d019d06087d625b87558185916d35195613993c0ed149b2e1da53adecf
SHA512cbcf180f4d0d53b395229a22b3d2df08fb370c026275beac3bcc123fab7a70607d8be21072ab76192e8be86747df32625b2b75394c2b2bfde8e14c8417d22f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e4e874cc1826611132d949b28b30adf
SHA139347baf5931f5aaf797dae39f79a2558709d58d
SHA25682dd0a03f312564a55d71af9b4a7306f63292cd3a788b22007be691833664db4
SHA512c60ba4809b5216cfda2b4cd08c1e9c42d72d09f50eee83fa354096ea9d32b78d9c53c5219352d031a3856e42780e9ce65cfa22bf2ab3e1c787e66e310b5e452e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52247c69158810275b96e65dd31d6a362
SHA1eefad05c206bd719ca458c5523744c21c2a8871c
SHA256534f9fb01947aad40b6ecf6dca92e9924c9afd86a0744dbccbfbed793e8f39b2
SHA5127157c46a5c59739d1b8f7c26c812522ac098127dc684e75eb04eb7f1d89c52b36d3f284c26056c9046c01a61efe75203a1b83826e0965a16e4fc768bf99aa9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfa192323bf9155722ccf5c110da9fca
SHA13e85869aeb268f3f3bf4d0108cd059f605333635
SHA2567424991ae74ec9f02f17709ea08182ed1f2783f9fdfb6f595a43a924340a725e
SHA512b50d101ab9e827555fc34bc7d0072f0108f601d3682fb1adbabe6c3877a8a6678d263b0e38d019007fc2c29c1646801f870f44ea45b7e85c7065e3298a8e7dc1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a