Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
4b6fbcddf30e1d460f8d9515bb5f9074_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b6fbcddf30e1d460f8d9515bb5f9074_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4b6fbcddf30e1d460f8d9515bb5f9074_JaffaCakes118.html
-
Size
30KB
-
MD5
4b6fbcddf30e1d460f8d9515bb5f9074
-
SHA1
8924beec78a045401cb018cf30c15ca07df895c7
-
SHA256
57bcadd5245dbcadbc4d387802dbbe8de1edbfdc14d2df3c44b6bb64adb11257
-
SHA512
908b71916a42fb9ca251acce9214b8ae6e263e18138638ec4695f5f991da18843d673894cde4287152d332230aba569e17cfd8850c15d31639ebd6fe6239dcdd
-
SSDEEP
384:MC12DGkGfGJG8GxqGDG+u3onzQ/wu0xYQ/R:MC12DGkGfGJG8GMGDG+yonB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e3fca0118c7a18bbd9700bc407dc8b70abb8d4819f671fce59741edff8ae0cfb000000000e80000000020000200000007869bcf5ce529cb0d5010a511f4d6b96ea654b9b36d31ebeb78190825f6d32d2200000004370539c345192f0d4426192c5cd2a10196a1aec251baaf731f20ce4463285fc400000000370c045ab548ea5def0304357e4903a6f26a80def0ff886d03c44b2417f97f651e281429367e1af0a928b5998730cf0777dd043f605d0bcc63c96f475a673c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422029861" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{913C3D01-138C-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5040ff6699a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3016 2772 iexplore.exe 28 PID 2772 wrote to memory of 3016 2772 iexplore.exe 28 PID 2772 wrote to memory of 3016 2772 iexplore.exe 28 PID 2772 wrote to memory of 3016 2772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b6fbcddf30e1d460f8d9515bb5f9074_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ecdf0376bbd067151fa3e755203c746
SHA183533842570efd0c77e9cb34c37c0ed6f51fabba
SHA2568c72bbe00239bfc4fcedc8eb4ad2cc3c657ce4adc7e9700dd7ff726e02eb5166
SHA512891808613c7f7b25c5792a0e8a8138b87837ec5a71eddcccf3c550fda9e8e96af94c6ef67effded3f9053aa7539c027b34be5c4cfdd87934620264061302a2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2338ec29db338e318057d867ef3e969
SHA135a54193ea42085cf383b4e4d20c687438ef49a2
SHA25617370ea005d8fef40afdbbfdd4babe69be54bf2065c4c25750e5c27e56a98bd1
SHA51229b0c04d4c8ca182e5202bd3cdebd4184c7cc3ca1995a43d9e8e315037c9af2b227b141279ba1e6f87c4ecb433b611ae6f2d954901ecdad2de17ca74b3e4f0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712eb3b34e2cb9ae1ff28dd111b919dc
SHA1ec41feb6fa4bcbcbfeb644d131fabb7901b51d0d
SHA25678dd7b55af28e031ef4bac7e0a7ccbd2af698bd4301e49699c1133f9f10d2534
SHA51277e7837da12253f0a6b50e8312ee0f4d0de56d4e5e3c8d269e361baeadcf2230a353d85aac5d59fca864db1ca9803b6f47c8907350b210a00772ba938f3279ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d9e8cfe64ab9886f877b7bbddd7b6e
SHA15f805e80d70f79d2b267ab048792701c602b9900
SHA256a162c766fdce6d571e633bddc2050c518e48034b57521e4ecbdea581eab8f2ff
SHA5126debf682ce68f9006d4bb7ab3bd4b86058376f09021fe80affab1c74f5ceb7448ab199fc1542f26f4e355413e2cfe93525bab4b76eb812051b589994d34b778d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552ae56f7388cf786b204697561880798
SHA1701f88129ac8cd2f16e1494819e71d3fc79c2882
SHA256a03b5a21e487853e076c6b092e7aa8af1ac398e865919eedd6e12956c63e2ad2
SHA5120c4db0bf15e64d91b02c69f430cc330b93854e7def387a529ddbf2fd87b896330ce1f2954562feb76e3f4ef25964ccbd0eda93b2dcc045758b56fad7116d7806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8c931c7680dcb9000b02b5768d03a3d
SHA1bf01d77f4598e4d7d103f54eb604b55d406317ab
SHA256fd1dbd317a0257c334cc82cc89517279afc48a37d4f7669e4109d388908f9d8e
SHA512bfed061d866a53ca15dfd516fd8650a371f30f28783fab998dbc7ae3b6209c34475c41adbadc729edeae6a2d278b63f845e535e09c2c426798921c6c513fae46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f70682aa2298d9756f7db01b6bb89e8
SHA11d93bc72dae187094298028b3bf14d2482d04694
SHA256e2cd4a6ac29ec77d3c2491af07fae12296648f0add5c2d9e4d9b3ea56700bd15
SHA512deb3a1d123768276b45e68822ec702aa5a1b0d8e3dcef6de64a97ee989aeca6f37767e76e6a2f147df571434ce40e762b2db23f80c4118fe725077df27e88d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed020fbe716871249ef560065c683446
SHA1c0aabfa4d213e46786babe310a7d203d7fae19d8
SHA256ac6410f47769101c48e43bde6c843f73cdc1e5badf628f511883de3148c7edf1
SHA51292e633a7dca72ab34f4f29587af2654638daacea6eb77ba3c5e3ea15be61af920def4b9ccefcd19ae325cab7960b441f59a16699f2b813299652d75562ef9705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579f6be5e6d2c1a90541214adadfb5b89
SHA1f6fa74c35b3194c97e92aee4e6019add477b04de
SHA256d6b4ed0ca626302d06ee8de8189657449119248677c1ed23b0dcd5e1701d4bd8
SHA5120a68992e4e465446a1e4e229f43a5c28af939cfd5ec57aec65d4a015a1f47eedb6c21a8951d7c61550039d56490e2844a80dff0eaa02fcc5014886f06e728862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599978812d9fc3a3d7ca313946b08faa8
SHA192f34a8dc47e9c24b73dd4782e591d16e803336f
SHA2567daabd5b572045eaf557e5828bc56db092cff0289e5e6a72927e24f3d3dfbb2c
SHA5128875f554fa721afa4b2222020fb78ee0ee4c8b31db9ae2ff0f17d563e4d745092c1b07c517ee70b9f971644432fdd6f1d0fc00668c0318722f57285d13cd243d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53065b95b6fb3dd50fa1d676258204662
SHA1a2fbd59d4e7b087724f9c333cbb8038a4902fbb5
SHA256ccc269d766633704af297f17461c68483b2a3b583e273500b97a07e0c6dae0dc
SHA512f861962188593bacc817adddd4f119312d25427e3680f842fb5ef475165a4a092a9f2eabc6444c0ecd0aabea059284beff24a54831b294e64365976f0dceb249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c43d21de4518f768faced52d7d726a1
SHA1a1c89aeff28ad2190d52eb2a3ca7f81d149e5818
SHA2561aa216c4a1a07cb2d2e417f1f866517c0ae0a88480b9336c0ce961789fc4f5fb
SHA512ce8a72f831277484f8eff9ef9ddf6ebe2671bb0744ec005809caab0ef93ecff1b0026ea8bccad487a454bfa52f2423f36c3cea1fb9a42c99e213413566fa5790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031353c2974fceb79ca1891ddd2b8401
SHA1828ac8766f3e8924f36b03c1724283a63012240e
SHA256de63097e94f88833fdbef93c4de59db3c7fb4c3d36fbce5e690fdb9b68176833
SHA512514dd6c45b4bcda43944f0725d96d6ef13be63983a16253c827e5e132cc47d8d584915574b796b522d623d05be153125d8adde935ec462fe893c774f81735677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380fa8d55766717736a590088dd14fd4
SHA107de7e61a56eb824f73a356e7798d4df8dbeca99
SHA25671619b875a25bf82e9be8d8d7aa9fccfac6907a9fb1ce0b88f40f96298fd8f3c
SHA512bfa2e777b67520d6777a6bf2bf184bf1ff0a2a5057f31a8efdb36766c699a92de8b4c4671740fd45b38824569b5236522a0d263d5d96608437dae97f1abc53e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fcbddbdccc7e23affbc7944d51dd5da
SHA1274f857a23426631ca378a3cc4fc3f087f2bb8e1
SHA25660bf29503038029e97264fb653285acb8bad3576d3299906b6ab62ab72798b9b
SHA5123ff2fef3822249b2c6832db66a40f97ecfe39ed6fd7eb3737920fb09fe1ece1194444523de831484a229472deaa214d2c85ddf432e185e3564cf41b0bdbc5cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fab804359d8e7c1ed338a708d6a6c2d0
SHA18dab80e5c38dccdf03b8eb3d6b1295906ae73a85
SHA256ff0323aa0aaa7fc9263522766f9ca020795cd98916063b6f442a8cf2329d899b
SHA5128c349e07727ce85651dbc964156ed391d8b82ae1056767d64f085bc2bb3f9378038e13ad56985f2eac40c26df167052974df0763f756d72813375a1cc2f1b22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503aa557f11387735c215c2f2d4dd6967
SHA16a018b9ab7142d70367d91a0940902db3441aaa8
SHA256e1c07c455fa2e1718bed7c5e66aeb8b59548bc66dcff983fe1a770da6e263a00
SHA512962a6588a336d6ad41a19737b290b060622a1f9d54dec2e2f963879e63bfd7bc715e9b46588e05cb0243414d67b74fff464d3c1bf7d47f807d8102c21987bbfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aea61c36a75ffa21b32a24aa84a8b58
SHA192adb7542eb3ed734187a5c9896b9a7bec7b1c02
SHA256d7c2fbe4e6ea3f3a7cae1fe65816a4ee095b2a6018f886654c593b88f2aee953
SHA512e43486f61f53594da30524b2572ee138d1a84fe1fb8c1f117db87b0567164ea18be12e367a9231ccdda542e1d61703a06087a3f870aff2520fc06d70ad99df5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6f7dbbb41816b4f9975060751747bb
SHA109705eb214b2a27bd2f7a5c430f894e6332847fa
SHA2561a4f028e850a774364b843e02ad8f8e72c5a89a56788d51a60b03b67c543153f
SHA5120962c06aafa48410a783f14c3ca23a861338f847bdab1fbc6b181d2da13404471e07872457ea77c168941b67b185127f5cc88863db1cdf11270dcbfdf315ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51012292cf44f7ae9833baf75771ccff2
SHA1bcb33dd24bb32947098f47d13d9000998348cc63
SHA256e0f2af9a8e946c2d8fc49e8ab3f1b05e0106d57924315aab3bbbde483c0c6bbe
SHA51224e2881754baa5b9a9d3d1657b79704344dde5313eeba3df0f54b1f18a3e1fb621f8f3026e8b503497bc7916eb9a50fec9c0d57ce8076ebed2f55640d2c3506a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56270f9cbb900ce25581451a8f0e9fb38
SHA16169cee2220fd6f65253158b40f46d91d8960c28
SHA2561137070a0d8153902e3ceb19817d70ee9334102da2cb0c224942f7bfbffba2e8
SHA512ff70640404ec4e988f88992de7fd36d3913245d1d473c863981de7ca2ac01a75ee027fa6da789e26c416f91eae531aa6438f8084937a2df7909ddc4582830ad6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a