Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
65792d18bff3a1e818084d303a6de96e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65792d18bff3a1e818084d303a6de96e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65792d18bff3a1e818084d303a6de96e_JaffaCakes118.html
-
Size
461KB
-
MD5
65792d18bff3a1e818084d303a6de96e
-
SHA1
1e8ec00b9ca93372f5306f45da72d66ee7ad47d3
-
SHA256
2687f7470e8b400a36f80db1c0b65954247d6a5df378162012c275043e45be78
-
SHA512
967f6e164e71b4e4fa98f18a5393e3b24732652383355d68db225b5156526143793234b53919435927311d1c199674d5470710cacf1d985ee28a9ee85af5c357
-
SSDEEP
6144:SLsMYod+X3oI+YrzsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3l5d+X375d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000769819d04180e146bc69851f679edf3b0000000002000000000010660000000100002000000002b63a5f395c9b8c30aebfb3e81535092aa635daaa0d8aeba526cc7f179ba105000000000e80000000020000200000000624c7907eff15bc30f876eb7ecb3df26d6d06f22f765e82ee6b9b9a095f23a69000000025cf8b7fe351a99c98cd71e54e43e0a2219aa873b0797d148e3818ab9106592732c0f3b6fd2fa904e34b432730aed13dceb971814dc3b6e4304daca8e788406c0fe3085d5e53a0ecf1bd1caa242a8a73e21bdb48895a5e4dea79808ba27f5dd2e6fa2e6394d8cb02ee2035a205336c178af3e1c4a637c403deb5c6dd5a20eee45ef9e52746d3aee03fe212fdc6bdc90d40000000dc215cdccd31890639706041e79c06611b327c607612177617e727c5df41c4b5541180901f3f8566a63f758a3ebb181455ac5dc49db00557686c07c570d31e4a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3780E681-17D8-11EF-A3B3-6A83D32C515E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502156" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000769819d04180e146bc69851f679edf3b000000000200000000001066000000010000200000001a79cc552ce13059d187cc893dd1fb47fcd31a5ec86c8b59483a3a7386311070000000000e80000000020000200000001c7b3a815f80181d36057b31fbb68f5087f38a2f24e3a5cdf3322cbf90b5422020000000c0afbfc36b31543b2692d068e7f875c42a27c27796dcfae973fade513f17c1254000000084a3c6dce814c38797b5698d5cfa657391f95bf1fe0c96d9763e3109e3d8fc66b0f9304167ca32357820f01335071b27625c1e24e0ebdc42a4927f0372d168b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30410c10e5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2276 iexplore.exe 2276 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2276 wrote to memory of 2120 2276 iexplore.exe IEXPLORE.EXE PID 2276 wrote to memory of 2120 2276 iexplore.exe IEXPLORE.EXE PID 2276 wrote to memory of 2120 2276 iexplore.exe IEXPLORE.EXE PID 2276 wrote to memory of 2120 2276 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65792d18bff3a1e818084d303a6de96e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534956f4f08486f49867b837f1ce5bbd7
SHA155493edc6665a7ae1fc5a8b5916fe930a66bb518
SHA256ed302c242cb50f2403ac65d52d5f5f207b1616082c5952bcbeb41e4d1b1db139
SHA51273ac8a2eaa87a57c0679f59afe577eb8cdb2d79052e74afe986586dcc710ba1b850c2db683979e6b9d17137676433f70fc04739847783d5267d98243a96e9892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435c60b07f5d3cfb975c65709b43bd8a
SHA12da635caa0a4b5077162f1b30181414c9917b489
SHA256b1616152e280b4ed35d90ff2a0f8f496c4fcd94085ec00b2f91c9616a69ed4ca
SHA5129bda5f8b9d229866adacb353e28b531307900e769f91ac76917b41772923ba884e7e5ea753564016475f198c38b5ecbc51ff4b1f82994d75a439f24976b68de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ad37a8b801264478a81da25b428cec
SHA170271deebfc7735f256cd6fdc0ebb19e98429997
SHA2569e4ecde9c150346f7187db694442fdef86d44ed6c9029fddd7069c1e5309a104
SHA512236d662a5043fcd5ab0ad4ffc572590e36146f0bc9fad05d7befdb4860131d4dc23f51e3ea201b6db3437708963766e34815d73311234028b0250b357aa4f03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51785885004d1483dac759d567acbdfbe
SHA1948764722a4ce075039280d871d2a4f02ea2bd3d
SHA256958284a4a2e65ec7cbcb204048da4e9b0560b6254e77ccdb8ddad90cb2ccc1c6
SHA51249e5d463eb2f629a951384ab37d42b8e76e90a12b9fcd13787ee3cfa52f067062ab1e42df4a8f19db03ad97bd27ccc2b035223d71acd842729a2f2719849d3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705911ccce45b8af2a7043502d6045c2
SHA1ecc4b511c54f121e56a093fdf1238c8d7790c04a
SHA2568079e390d89121ea6c438b440ce8fd211e0d5116cc67de73424064d2f234f612
SHA51297e9f3fbb110ab1af2630306cd7275400734455f2bd05f03e52d74e652287b651b08028edfe0f4cbed15f6378744fae1d7e8d511c79be17261c25a013de70131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c35907201caa8f7d008d317f065a9d56
SHA178db68ab107928e6b022e7de6f8404ce93f0458d
SHA256ab50cc454798be57c75e75c2555a5c0e1bca77c7f0bc7e08f185268bb62375a8
SHA512423f35bda395d6a5f9c841af1b282d66b6730ff527d2022a29e9a2b0792ddffd7a58a62da38e776109abbca6b532f2d45ccd6570180ccaf601aa98f22570f931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f878351526b28575e93d736c5dac002d
SHA1f39b6227241cc7119a9c35015cd3bcfe8a9c09cd
SHA256b8206fc2144802358b34c0ac4af6d23f411e1378ca62987c2e8bede766616d7a
SHA512dab75a0595e5b1a160d918d3b1eb21d88b7cb8c9d367609e1d498742b12b32143aca9a79d60c42b046d400ba0420bfad1db14069b06bf7babd2650a0d4f80543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad691546504af30d6c482f96de5b504
SHA1976e0c306e401c3f16c15b52105bb08f8d09e46f
SHA256af8a898b7cddf89e8c6c587271ce387f25b7fdd8f12acea2c77b4f32a5469bf3
SHA512a3d13eea5f9f1f403feb90337bf937ca17e6c6f5b4f802f706214b4e1d3a89ef51efb410d5e9cf6fd929d71714de738666df233043f11c2d01da26fe2ab29816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523729b4e07bc2274b109dc4977f0c72
SHA1b34bb05b752cf4c21ac4c73a6b1b1de58d9ada11
SHA256a17609f63afefce01d0ea449e312de663c3038f64f3e712f733621d4cfaec6b9
SHA512dbd562e1972d193c109fa22dc550788a24e49bb4c581f772e87d36b7d6a59939b7e09008b5fed758a420e7867aa2a0f5cebd0382bc94d02ed090784f69edf539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570447d7e6e54406ce89eba6f45572ef0
SHA12e86fd81bb8f703516e5616fd15416612b6d1258
SHA25680d04fdf0d24eacc0684d5d92f1e613551203f2943e0b4f53db6b616712a71c7
SHA512e800886a4af26a56081ce1ff0a85bf7af6fa2de96e7f8a99c345b129c11552a5a1bcb6bff200d338a1ecf357a189a1b544211c9c516ce07ecfe344cbf8e4aa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0a4644e14fe3649882d491ce2e4202
SHA1da99135d2006b187e9846c34012cf24750ffc2c7
SHA256ddf24c6c996761fc0e67c9b03d75cb017a45af7b5ae40b1d766d0505ff4af1bf
SHA512f19a5f9a49de69cbaf0183e3d59b9714f44f729306822d3baaf0765c327e7cddb57836ede37a7e081571046247268ec593afcfaa557798044965991997b9d3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c690829ff7fefd7553e4ae1006fddd6
SHA1090cd7a4c913255f43f406a8378a4ef1b2c0b8e0
SHA2566e3adb1d953b6c6d1df7ddb71c8212e28a4d9a855b3221f374e38b10df836b25
SHA5125f3af641a2b9efdd6201626345871a9a31566d8cd8f09248f2b7590b15330d29a96e2e24f9d4fc1a51dbd1996ab829485d07f6359920f597fffedc509195ef6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc2274e18b9b67bc47e6c0278c3d9e44
SHA16c4616632e686f775c43f3af2511fdfecda7691e
SHA256e7b4180a958af12caee8c81f408a51f6df521a07e73490617f2ba2c713bbc501
SHA5129da8d2f26ee0b81c040e1351063ba54e31ae6907a81d2b0e13ed8ce30f90dee0fb1933a7365366436e21af4d08855f4c49f955c7ecd8ec7257dff4fc6823d218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319ae16328ec7fa79f1893ffd3e37fb2
SHA103e2156ebc5adda930097a5436867bbcbe98d10f
SHA256d9515735f54e203dfb5eee2c5e0b5b6366554cf2e500908301dc66a5822db44e
SHA5128bc4a5e0c6d89598a6a883c4540aeb97f70a2d21efcc06663cb152d12a221cce1f024ec312b5d4e1773418d8ebee88b23a9628ba3fd86681bd4b6e7281e92a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c3b66b3c23f68f569c7763a8040dded
SHA18d97e56e9962a513a5e08845f5635bafeb336007
SHA25634f059c579dfd8b9ab5dbbe1ea3bc26c833f03a35e3411311b7ba3531f52da20
SHA512ec51b65cea42dedbac356e3ed491b76c23d1c9d1c3578e3401f140e124ddb6c5ca3f47b318a049ece4cf4e1c101b34b3ae19732225311a3bf6bb63907abdaa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e096041ca32be71bbcdd9030713d34c
SHA1f6d8e23e0fa32cfe63cc9b5f3bf046cac388a8a1
SHA256b5f81cc1c1ce79cde3f5c49c78be5e159507239cdfe64791e652fc2cbc7e7512
SHA5120cbe6d949d44472786c80156e8066e76df39204b9a118465fd6c81a88958a3d47a8c75e24ed7a6dfe973643acc2d297cdddb78198177fde6b012c42a2baa3ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512063a23dcb4d94ea6bc9eb517931329
SHA181fb0d027770753e2058f488157949b153ca01e7
SHA256330e8d53680036918fc8a972c51fd5d5b76841078856123d3487fe78041a2fa4
SHA512aaf8f9d6a3c988ae78d9e58b3e60754a893ae97927c5d6aba193245674280f44b64d4e907086eab76d486a654336b41311f4204a59edaf650eb3cd6e5a5a556c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54342d13052d8fbf4210d7d4b587688bd
SHA1c3b0d151acc4857aefa357b3e4b381186d3c9734
SHA256e0284b4171f076e141d59ca1870e28a4a6e84ac324eb04629c5c45090cbafd8f
SHA512232c4613c4616b53139308d4704c913ac8f1528c33af0283e5d9471128e854428d5d2973f13b1e788c1ffc4e9147be5ebe429852d344527c7b3be41ce276e900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51562d221c58a49842b11f5ea94e33ec6
SHA128434fa4d3c5fd87fdf725dbe26397d6e3c10baa
SHA25601dfd6c3ab0d6a8565b96f8bc850c81b7566624f86839619975706a9b8687fc9
SHA51283b8f5cff2307b30e3a9da882031b8e20dd4fcb162d466c2f34b17da94a69f46f59f7aa940921e3e15d6bf65e43de70de3118ed88610e1e71e1b6397543fb24b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a