Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
6894fa20b998c59267f256273bda7cbf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6894fa20b998c59267f256273bda7cbf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6894fa20b998c59267f256273bda7cbf_JaffaCakes118.html
-
Size
34KB
-
MD5
6894fa20b998c59267f256273bda7cbf
-
SHA1
72a7ad890af4fc76c6e146865314bf9f5e3451c1
-
SHA256
ee8c63ea720843e0fcaee9673613dd9c765d356de680e1c8da563ab1796081a5
-
SHA512
971f298750c408748889233218cfd79a56a60a55ad57fb89d4ec41082d0a39ed5511401592a7c6e4f3b1df6327d027202efb875534be89654f039e905e58969f
-
SSDEEP
192:uw7lb5n3CnQjxn5Q/2nQiedNnQnQOkEntaEnQTbnNnQOgkcwqYVcwqYZcwqYQ5vo:fQ/RwpX55vLKLViwsTbef
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d7a1a2e2fd56a40bd46e7b5ade078530000000002000000000010660000000100002000000049594c16a5bd51a035416894dff9129d4407d7b44c2e8fce1292fc88060d03c7000000000e8000000002000020000000144b5dcc11ed009da1e0d692c27ee3ae37bb188b9d64868db9575ad40908392d900000001991c092904cff184909fd5f6bd49c6cc607161108849ea885d8087d9ee2b5293834f8c5c0c279785148b11da1565bd51bbe634258b637ce44a242cd8546046dd106a6347823bf18906eb295600b05e5468e971e83e594610d49fdd6a0d373781ce074bc96a68ddfdca17a1f5d058860b0ee4e5765609d612d0425ba88a2f0cde46bd960ad5c8e9cd646630caf6e5f09400000001c70143d3f155b3578524de117202333cdc413bab2c944d7555136ede216344b65ab19351f8495346fdefdcbd077120b3d7c172f2da162b8d82eb3a0cb30973b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d7a1a2e2fd56a40bd46e7b5ade078530000000002000000000010660000000100002000000059baa0fb4f18b8df938f2bef28d17d2aa79cb1c34408b6dd6f406c33d3095a80000000000e800000000200002000000072588325ec7c1129a5a4ee3d61dc1774e59c9af8e3dec1f64de28f87a6395a0c20000000ba766b88b5335f45495ffcb073626de1b751ad9d1a1c7f36b98bec8320005cab40000000716d323415e6d87fde3f1f0cd53c0b9afd12e8ea9a92d6c760bc717267d9bf67caaaeb2b946dc0ba71ba4e10a99ec67448c9e2dd41a6ec6265c7bd91c7c4c93e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20999c7e89acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422572785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9AC37B1-187C-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1632 iexplore.exe 1632 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1632 wrote to memory of 1804 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 1804 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 1804 1632 iexplore.exe IEXPLORE.EXE PID 1632 wrote to memory of 1804 1632 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6894fa20b998c59267f256273bda7cbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524da387b12f0432101d39c469677a0b5
SHA11fe97d4e864d04ef5e6d38f4515f300d4e1e29e9
SHA256c4ad10021275f3f55eb2bc274bbf2f3744e6beb4f56d6f544421b3813eff5f88
SHA5123e2a06332ab6388bfb05d88c9b008359db032c2ca45028b4f4621a3f1d210530b053a0f2f50a08954ce5ff580d4d1cdaabc2672bfae6c9cb5e290b3fa7693431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f330ae17744e82e8555a56ca79bbb1fd
SHA107ae5e33613031ce6ec921df9161f39d4d181cf3
SHA2569a9c6e741f3e7b73f0bcbe458626c9c257855c55558ec57f9d6a2c899909723f
SHA512b49f2f99c5c4ff6ad2e58055b03eb92f351e7ea190862264ff9ce6da60262aab380089a1c21ce794fee2c137ca4ed1ffdb4c4e789d474cb7a8494edf80f519fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efc6d06a6750e947399de63a57539dfb
SHA136950fa811923987c6f397866e5eda8f8a8a91b2
SHA256b4568c564ab7e5db9f5bed0f1463a630c0bf1b8d9751740ba89bafd10b172711
SHA512a42ce5e135659635230bdee37ff14fd1821e3c0c80d52bbfb6d1137b818fc0cf315a19aef61c7c3194eddbd05f41168da349914a87ede3c08f843be1f80d2eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5056ae9a56331186f0c30e6982f37f2bc
SHA12ff7a19326ba2dff0a4b25762219eb930ba0753b
SHA256dee4202ea61d1a54a74bb60a4089f4a3b4459f25133005b04d229cff6146f41b
SHA512782bca3b1a527b0404d9cf296cca628ea71c4fa55307440fa251da3b8cb7ecdf16181e7c4f702755acb2bacbe3312b5762a9ab88dfdd4030a069cfde335f22e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ec92dca63af1e0d2c50b9069c1c18eb
SHA120834a0a641a67b4a3c857787833bda831361240
SHA2565f73eb14db85ea4fdb8fb52b85e1557c289fec3f27ca662fe446d9ecb73c73d0
SHA512fd7b3ab79028fcc543fe55a9edb92ce4f2f8d089003b47d66c79622d8eae94deff63b49bfcf25c90a259d4ecdeb65ec7d3a1531f7e82ac6bcf6f52ad32838aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aee7cc7fbf350227744f457125ff1dd7
SHA147223f2cfa9819e8854d229622b4f059508c39f3
SHA256481bdbca0c8bf724ea50ce9cf9f0698712e429cd58ef69c2267fa79e4759a246
SHA512f58233cdd6427bc747caf9b35876067a00169397d664199464b411def92b345a681ab4cc987440e8885e4df3bce1b5b8e426517ba9abbc6750c78ce4b15e43e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061a2fbc095df161517a3fe5d5b2c78c
SHA1d3eb36f67076bbfc8d1aa0e52917e598612d0a57
SHA2562f4e4137fd18114653312919233a3c0e24c8df25b3c3f0ebad54a097447bade7
SHA5120d1adaf0bbd5bc1f75fae16b186f435ea8c44f6cc148e4855ba6414d587fe5a8a29d375fe2ea58a436307ad49bac9b5e085747a087a998eedfe8cd7d4d97e323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd689fcf4abe35051bdfc8a74d232e7
SHA1b5d62b1fb33a0a794b27876d6df7d31359d73f38
SHA25673546a9d6c333e50228025759ec396cd1e86663c014d99a1c3ec4233da98fca4
SHA51245a0fd526ee062e3632e1119fc426a3ad9b0daaf39cc4abd73f88b056ea786820bae41a02b81ca4f834fbfac4182bb51362b77df792877d1e42c58333bd2177c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516acc2c5043e98db6f4d1d613879b3b1
SHA14208a52bd2912c6926ef233a94371526d64e38fb
SHA256cb72e87af5c9211bcc45c1ce3720f2c225d7eb683812a65fb6d9b92129efa7aa
SHA5125a692866ca48b23ee2182b55e1c11f07f5c6a76d9a0a3596d424e83c22583b1064b97f209f1f30a13badbfce78008bbcbd4ef2b823d8503968a875670799edbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58013eec535b3fa95fc20400bc3ef5895
SHA19fbda2a18262e856efe26a0ed0e1230f7d57a35d
SHA2563fcfb21ef21d95c129f3ae64f6956e99415cee09dce87de3bd88df6dcf000ac6
SHA5125c37d9c1204b554d9cd54a5665e28e9d30448c29cb5c8d055c74ce6dbd6bf59acee0db46c908951a2e608f2a2d26b975b2143e6c273d23b4b87ec96848c1c90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52316e92c2032b3690c990e696c36875a
SHA14d1ca0a40fad324a209056580c2896a0fcc9533d
SHA2568ac38a2635559a587bd978a9a5a7d0c2e1b899fc2086a7ea831210f4591ad812
SHA5129e255283d549b8f7ac5d4452df7541c9167d54d41c5c000aead1842a6c8d69309eb0edd352e2500a69c446423b9c9e334c49d9196bb9080d6f1538882d1f1ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081fc7ae5cdd0075ef359ec2ae64ef47
SHA1c1eb1f45f1d490b10d3665a2ef87027f4c4017d1
SHA256432113fed4a3af4c7f4d11f84a21c58ab80b5a811e60f4542e285da3033a4cfe
SHA512927bace4dc62b95b344a36d23ded172bc0070c02dea34686fc376c6229734d9ca4faaffbb09a16bf127bce952773e372d147f449b9c9d7cbce16194a6ef48a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f10307e3891a07854db438c415c6fd
SHA10d21bbf556731666e3880bc39546a0fd2c6e89d9
SHA25644a40235130ae2ed30f8fc3696d36b390d74602210caf84b0e48432b5ffe8d92
SHA512f228b6c3a310a6337bc388afdf108806e96929fa4f222a9b52c4799a259a25f67aa9bcda4ea5f46117a629e3d9e975fcde61b24fc2843ff2d768623ea08ee8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5964811888a91e65444c07ab45caecb42
SHA1b17dfae59e713a387f20fdf23117695429d54179
SHA25617624255aeb29fbd91ae1f8de06b1d7ea299269ca68e470aa0f99042046a8fd4
SHA5128e202064ed3a011c6c9433719b1101a2757b32dcc9e1fa724c8606ca5664f3f6342c7365b8f6b8aa131be8521c25cb715e9f58b8066f97cf8a9fc80835d33803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc917b5b67d930580d403ca95849fd0
SHA120187e35e148061599421633b35573e209642616
SHA2565abc73cd152abb5c096886e39d3bb606ba24273f2b25e21e7a4a9db42ca5324f
SHA51259bad9c75de4599095a7c613cc50daeb79748153132afcfce3938293cf069d33ab40c7007bf09bd9f0ecade43b8e9270c55d5abde99df2f437f6dec2eaa037e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880d1d64c1c1ae574b15873181d199b8
SHA1826d7333195c41fd13fd812195af006a6a63c35b
SHA2565dd4820691129c40a7fcd485150d822bbc058aa5245c582b6af4a2cd4df37946
SHA5122dcfc6bc5e707f697d8f09a8de27962931b077d5309056fb07aa1b1d0384788aaf9dc0cb005c3f7ef919917e2f613d312ba9e6a6dd499c6826db9c007de5873d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c7e498d84c56bb7d5f36b6c7c2b5d57
SHA1a22aa69c22174fdc23029dfffd51fe1fa22360ed
SHA2563985b1d50a04dc6a033ea1ef03c7eca152ac0be75e791c9d339769fd50202080
SHA512f49f632a421204d9fdec3f149a4974919589312c760b0e463fc86e5d487118e2fe01fcbb08ad9e5b90ff1d5bef23d7d5954fc8fe6df758637c688e497146f9cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a