Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
e9024b2e6309bd632b9fb14f71c104aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9024b2e6309bd632b9fb14f71c104aa_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e9024b2e6309bd632b9fb14f71c104aa_JaffaCakes118.html
-
Size
10KB
-
MD5
e9024b2e6309bd632b9fb14f71c104aa
-
SHA1
a5740cc2a37c2588e3b38ec2b86bfe4ecaa018be
-
SHA256
9fb3b19dfb9bcc1cc5d99164d562612ec78e9994749c1ea70b74a37793d15652
-
SHA512
7d7d5960fe680178276cb2e8f071630ac7ba80cc82738b68e38af61f5e55de546389be05f7cf9d2a7295b2fec4e75074685ed6388fd6e3aed6f06f59a0a27d4c
-
SSDEEP
192:nX2Ru4JLmfiLxmihpxEagormsPPaek+LIewq2GC0XgcU2:maUUYTS9WIPGpF
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07be319268ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000085dbf79daf19fe57c0e18afd3e4f06f500190e06c079423a32bbb10a59d933c4000000000e800000000200002000000030999261bc78b50b136814a67791e9fdb935044814875e116ae24d14397772e9200000004835fa9ac5fda06c8aea5fdb48d1310f55bd4978179e9ed5e39dc20061edc59d4000000050fabed5550c0b420eaa8b983bc9866420f96d301db2893dae573ce3e0e2910344f96911ebdb9c1d164e3a33c562dc6c696776e351e57eb4a1ad6157ac6b1b69 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AF589B1-F619-11EE-B559-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418791713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000333d0fa00226c31fd41bc5c8c8880727ba9e7a6e443e58cd5d51ff68b2604c32000000000e800000000200002000000096f1dbd1e50034c0775e0edd249b75772914922a52a95021b80ad48845920bad90000000afd2000a02899dc3a35c7d1bf3ebe24e8ad6ca895a4687eefe5359b108a786dd9a79062ebf9f757d5b81ceeebd01e7310c3b2165e0a1a03e2958fcb16d9fb7a6def62af9133fc1674d5b1f468766efd7bddeaf0e275579a8617e284e836e4c2521cf2a0c867097f715a301aefcaf424425cc1cc768341443a77c0a34b57308c11a6262e67e75d9ec48be722200a1ef08400000003593abe76797bb14cae3be15bcd87c5938ec7c3db96a6ca9bc8b0b5afa5975cb4f0bf0ffe7077d6aa3da9485dc9c9c27c35e320f26f28e7d9ca018851578d027 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2036 1648 iexplore.exe 28 PID 1648 wrote to memory of 2036 1648 iexplore.exe 28 PID 1648 wrote to memory of 2036 1648 iexplore.exe 28 PID 1648 wrote to memory of 2036 1648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9024b2e6309bd632b9fb14f71c104aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533fbbc2c741320ee34f6ce2ae97d39a0
SHA123515199140d8a064fa81e1ab749e6d4162605e8
SHA2564f100e2ff810a2329ff01fa9c0684f297fff4d2e9282f99b171923a1e04c4133
SHA512e4bea39892636d89e662c926ed70a34cb4da8ed6d828feda602cf327d1f214aa2b4c9cdabc9fce2fb053d5c711650c660f35061c57ff9bf7bd4fe1197f5a0b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592684e63a3ae113a1f449ba059d8ac8c
SHA169e4b77a0dcb86fab0c0b2325298a28f100ebdff
SHA2562a1e836a8d8119cdcd77bf09d21e273786f037abe44d1f90001fea6a285c7a44
SHA512affa696ae9b5cbf12e8050f008dd3fcc853a19c2acfd5ae3810afbda273e0a4b09ec91e9ba366750b2c5f920f7d377c413badbe63fbb8c84be238297753b912c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2c7c824aa18b86512b3e994c5d1abe
SHA13afa82783d85360925d8bbe0252a058d43f59c68
SHA256ee3a569dac58022e607d2cd2790e3158e93ff020f2cb5e6f86e79414e6edc85f
SHA512492981fb55faf906664539db06c771fffcea2ded324b8f12ac208c8237c2703a3b5ca68041b15299f5aae844ae3857d0d214314fac0b6ae6ced14038bcd16b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d292f759a2fd7049f77b02a2a7d4f50
SHA1755991459a5127568a761e5d16aa9924d053a7ce
SHA256740d948c3d1f056e6e6440e9dcda224f5b7b026cfc4fb3eb6c64602481f665bd
SHA512fc29b57bbb2331b1a7f682c3e708d5e7fc65904c62b9d17d82482e9206eefdac803be04e307e2510315b2189487fea76bba1bbc5c40f5911ba536ede4618e6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516c17e43c82833e226b6dabb404b5119
SHA167bef3ed33ddce4ae15d79cf24d065561e7b5d28
SHA256b0c51fea5155d9afc6ae22ade73903c1bd7c0675c1f36ed60857d292d00dcd51
SHA51203e4acdc86a61475cabb9e9791358461d93f922d6682d5a21c2b6ecd6dda07b4398a80fb40603761573e3aea829f9722f354afc9f342e87bc577cbc77a51e681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df71118f0e3ab4a843b0db9b75ca53a
SHA1efb9c544079c719ff5ba3a10da65771c4b9028c5
SHA2567f040ae93b7edf8fb87b411b2255b3a87d1f3e8bc995e0acf279bc6745bd85fd
SHA5120edd15bf212f4bb34fa8d799242080e99c3dbbbd6eac39fd0d052fb75b9695dd229929d85e31e7d08699d2dc0cf50526049735c37d71601c502cb3cc883f990a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c5998cafd0c0f758c339358878ea89b
SHA111fb557f308bb5f56fb1d41202141a49cdbade12
SHA2560fc664f4a0032e310e6a88be3100baf966a4aa63a014da18875d095367e2f9fe
SHA5120adc6f6506cb846f14dd9edd48150f1e5e6abf49590c10af4f992a6def1ee268d75a8a3b8be408cb9b39ed5331ce8d071d96cdf28468108b4d91d027194091c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac740391aede4cc2f06de9efef5ba22
SHA14db095ad30d158f08c76589a681f87f948a7d885
SHA25603f756691414d99028e69ef4ff2a9a857db1008644da60d3e5bcab052e915b41
SHA512f9cd9a30bf390945d412c84e7e44abca16672a7878859999a4f504f18d5e107bd43950ed12d648480de27ed4aa9f67a4f59d6e406c62c564be2a8e8a1060535f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fbb1be5992243a82699addda72ae2fe
SHA1fa08a0e37c3edf76d50cd80c6ced2990dec818b1
SHA256f9865ff0f327f9ebb20fec53469e4bf768073ec50c5f1c2579192b257b8759d5
SHA512747b7e9177b3252a17d59eea4b6f80bae902d7a1a565b457961b08ca5f8b52987e5282b8be32df8a7ca4f54fa2e5c148681b3bd8098e98df30cd5879e134c4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4cdd1257ec8290b44cf186302554af
SHA133249efd73dbdc0576de30f9194296cae6290bc2
SHA2560c210c57c0fc18b03a90c200e31e15ee3db4659b630d7e8d53b55c091fd18c80
SHA512efa55a8d09962196cf65e8f8117a64a25a702114acfd1fd7db8297c4c7f862a61ab4435f23f5dea5734b73bb25e0dd29b2399e825bc1274205038ed8d4d8549f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1802b6e53b3f11f18c9cdaf5b4fc1fe
SHA1914817530421888ad0798162f707474b956cb2fc
SHA256305c5124036926c394bb18a15536b28b97a4c1afb6c7aa86672eab7ec186727c
SHA512abfb0f3641003d3695050a3e92742d7457f228159931619eac4f3e39fbbc43831672db9d704740d02d5a000807a84ca63750cc2e29e414b34cceb2214c074567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1dd982bad91f058b265d571005487f0
SHA166d51b4f005d59415238edbc84031a5c7818b49b
SHA256a669b6aa79e29e30929cee152bae39bc461015b81147a3c8a4b0eed6ab96054c
SHA512e9ab36d4445f1b7f1570958d8e062ba58557452fb38875ba400c733be72080851af71ca13a01ef2e44b44e884bcf020612d1b9a29bc254ae607304526e851e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500ff4933ba3bc861bd4d05710b3a2e21
SHA197e15bcb122016960b9cdead416872009af532e5
SHA25601a23afc39de1ad8c03925ba79bc0f0406a946136e15539cc6d7d5474b5cc0f7
SHA51279918f72de2a6b22ccbcd5731c3a90315fe0b9c6890b85fa45b69f769b6ab33fe11390fcbf3f96db065034f06715e597e021130b13ed5c175067ce22b0daf632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58559942ca7b07cb616fa46b90f7a2742
SHA1cc3ccbad60213ecc3d638e7c6cbff5dde7601165
SHA25671903ab524eaadf4905628c67e7380698337726350269a4ace74a9dd84e064cc
SHA512b7021afcb6498debd9ef0051eff79ece0843b50d02ad3579cd7890f231102bba2327bf33b398b27ab157cb83f1e202ebe388b04694899e5efc830c6dfb341df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f123a88769e56f5687e6fbd991587e01
SHA17265329fcad702d70180aca22029e79363cdfde4
SHA2569cf22b88bb42bcf0728238c8bf5761cdc96617e58c85497f18269d24253e71b2
SHA512a6f16c5e851d4f3bb00c92ba9e94b1a3a20a867b48877b63832fef589d3097803e9665f70efa2ae24a75beaa9b9ea92236521700b4755ffe1a762a9f989fb4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50dc421953a387670dd87207336cb7b
SHA1df84e467af0bd17ca50ab8893bd26191921ccee2
SHA2564e165be20512f3f101b2ddd961fdf859b445bc757526515d99b536b16bb75566
SHA512c744904a9bd0bc1aa80a1d9d3912a11e6560af2fe2061c4dace16b96156147827d241fb98fe3ae5ca03844b49e3ea018fd53e01c80c5332bba054501d06953e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564bed0245a40362e83418db873234b85
SHA1b07f4cf9b6b2e68ac8a62de28c01acda27f4adce
SHA256d2762e33f61053bf0663762510895aa47730e963e5b0dba29a5f5d00248f8b4f
SHA512735e91c517ee86d41a8ef96372b3b697b94b793502474ba67b12b7dd1b2923ad8e168f0666509c410823e8648d05e7c6fc4ff86693d8c8d2487840f64eb8dfb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5800253b956b43203eaae50f6462d0b0b
SHA16939137228568d49f11213b1b4a442d84026efbc
SHA2567ff1b11529af0c706c2450c3bec11085c522d129e224e652c13ab228ee8d2202
SHA51278a748f41d6db771787a8a58c94a3dfbefa8c991f752382b7b2082807b0b8166afc2823209e31b772fd269f1752bd0f48d4a7a2fc9b6af0ea9414a92f089b5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5514ae2e7d46bea118f98fb9e41d08eb5
SHA1328fa35ebf48a25db757099a6341f18ca9875eae
SHA2567263542448001eb3d7da1fcf2ccb5b49f753ff860f76427c2f5a460a3b19c96a
SHA512f51cbb2b8b44d484c4bf0887e5451b10b89c4b6af39617d7d82670e787356c09894de980ee6096f6b8e387d4923b60523a250eb213e4f7c1fe80b52a6c805b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f15c4de03066ef5862233f1734dde633
SHA14cd914dac885dc10427401ed8d71c0e4d3355b95
SHA256bbb8812f9fc26d8177a47776cfc4517c4182ac02a0c1c7edcc507c145c094b4e
SHA512ea2921336abcc278a3117df761b6e94b7a6b97201998fcd10ab9572a02eb699c8967090928a0d588192fc1d0f6126aca07f6a71dfbebb32072f0849207a03b22
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a