Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
22e51e7fa1d37f505505bb43de78d0d2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22e51e7fa1d37f505505bb43de78d0d2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22e51e7fa1d37f505505bb43de78d0d2_JaffaCakes118.html
-
Size
4KB
-
MD5
22e51e7fa1d37f505505bb43de78d0d2
-
SHA1
d1b37f8799bca5ed5bb842c9d96c7a8dc6723ef6
-
SHA256
2d0d33e5390af42f1cdb411db4ba069b13f4cbd18441df65fac565fb14a80aa7
-
SHA512
10dd34474d1538385c5c6b57551ab35ba2cf5caf2b4463c498fe65fc1a2148cca4bf33518747a8f7207ebfbe35936f902d090750ae6f97e4c0130f5f1a3ab416
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owd04dQd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000fe2a7cfe1c3dfd2431419c110dcee5f5bcfdca74248ac8a89395d56a66a8d09d000000000e80000000020000200000008102e6a1e42023368cf11594b3ea57e0c4ae71d26b7c694856784c8f10a982e7200000008e26d498628b454e07844cb4c0501e24264b6b66e13ba2d81d2c29ddf294017f4000000092a38bbf986c19cd68c7b6e8d2cda52623ea72f538d02ad81ddc6ac67659f839fbe63f59d4ff7884b446de9531e1b4075dd776bc7599cbf4da9e2aee22802404 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421298782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cf4639f3a0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000002dd1595b1382a0a456ade498b8bdf2ca417bdd1373a2f12c7104ae293ce7f619000000000e80000000020000200000000a2b62540cb13e94a0f994dc4f218785f3d7da81592777eec62cfded6e1b02bd9000000000958ae8a1f342377d233f05cae59fe5b5869d1d2d05dd74cf0186092c888515ab457a97c95db30739ee96ef6a38b693bf88aef6ec1458e3904a6f80a5437f2e6e3a40a4db8594dcdbbc0887feb45383afd728772a2bc95596aba0526dfd1ff2d9c29b5a3258fdc58f780d3a3f375d2c927501b8b44d2df738735403ac5ccd902d119a458ade0fd81beeb9dd43cdb0b1400000004a9cb9e83da6d6d9edae7752e39f38069c44faa09927138f787c4573146cc20e15e100c8dd2ab8e5d123e7618884010122a8fa14c4bf99ea1615a00e676b72ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64B5B4C1-0CE6-11EF-8FBA-CEEE273A2359} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1884 2436 iexplore.exe 28 PID 2436 wrote to memory of 1884 2436 iexplore.exe 28 PID 2436 wrote to memory of 1884 2436 iexplore.exe 28 PID 2436 wrote to memory of 1884 2436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22e51e7fa1d37f505505bb43de78d0d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fc8b6ee67b27dee11b69bcbc89ecdaf
SHA1620bb0f5b348e66d6cf2a41461cfb07d79510342
SHA25659c973d812e787a20d943bfea3911203a6d05dfd078e3182b42cca2695275fb3
SHA512a89000ff015dc7ca20a86c9362aba3a24dc321e11efb244559553baffce2019d9cb90238b9ab0d161537d72d7c4dcc108e4b754c586eb1e6f243ea803f87660b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9e082f4d4151d65638496eb1cbc36a
SHA1bd159d8a8046cb6b3e627a073aa809e99b591aab
SHA25669bae1bd24ac5bf018720f585cdcd27e2c8e5ba452cc2de0446a3229fcc81fdf
SHA512471eae70431dae94fec23e5377b823c229cc7feae9651b5206034592d5d7ac4456d9d009851c35441efa79dc4c03ade5008f9dc9df87888c530119636be8d0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532741bc0e7bfcbf2309549fb46d9e249
SHA19a9865ae6be157bfceaf7593c06ac7b5ee6e07d6
SHA256d0d527342fdada19c82ed91a645440e25d2cfa9eb6e36628b089f70f66954088
SHA512a9847d18116d623f2e939714e64d68e56016e459f3b049f104585364488df487193a7ec7ee17b0a096815d317a7f362f6c8fa0fe67ea6585c415905b2174263d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08469b71bd97e15a04019fbe0cd148d
SHA108cf12bfc0f534703dd24bd761957d9e654c10ca
SHA25691a8480ee79d88026f657d6204001ae35e169e2f069557cbf52c5c9a95c912d4
SHA512f62eb0d27905dc563900b2fe3e6167d91cb9dba2976576b0a20c798acd6fd359a4d0e35c65d2f50ae1a57a0dd15e2d0b1d8eaf54fe5da47b5cccaad20801d8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f03c837ec74be28e005a15057b8cde
SHA157bf48707361e4a43d7530ffe9975633c54bac6b
SHA256978c3c7aca88a689a0e369bff6ac1cf0e83e90cb18798cba1ffbda923632b2b4
SHA512dd51f0703ae489d594640bfe188cdcf2c874efcaa5259bfa311e56a4c9b693bf4372f84b67e4405bf05ff324898a64672641225382eec509c9bf27f7e6913bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca3bfa693cb2bd85b36dd7dc7e66282
SHA1a48a84183d8c0ed102ed5e7223ed249141755572
SHA256f262fe8420cb22a9882927f43f0b8363a45a8a3e19ad93a44b1b4b8d378f99b2
SHA512fc6a1273bd33019a308ad6922aed78915e045cbc8fb827d008d3cd0c594faf65738cb143eac00ab69a9db3aa57595b05e1736b6322c4cb79ca1d7090cbb8a712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50505270c3bb32e2e1e81f73e012d76c7
SHA195aa1c5a0922bbc862469103d9a488f34a80a047
SHA2569e3dd3f6c1ded11f12ef2c33469c9d6ea119e9377dbd926939f653fea25d3d2f
SHA51281040b35f459dcc5445f4da896ce9d6a9f4b4636472aa38ad2708b7a9c5a6be9bab61b7fb67805f3a7e43e44bfeecb09d66065883b11ff3ddfc725718d60d786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a74ab257f89d2ffdb256cf623d8012
SHA168d4a871308432deb203749acb7233905174210c
SHA256d560a1bdf7d86a90b7d88fcb97109646dcf43bb7bfa414740a81227b0ccee113
SHA512b0df35728983c7026cebd50af1cb7c98ed7f43fc0e128484ae7de9a8a73a94879ef9470c81469f717553dbac6a8aa09343094b14adc9b741a40b760172beb77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfef18009794247f133a0d09a7e605b5
SHA1907893132881ac385119bacc6a40d2bc276feec5
SHA25618b5c21e869567fa39bfd5ab6225f0e7eac7f1212a9de9e0a229f83937fd7a8f
SHA5126d31b6ae05f31e2577dc125d41ad09fb0cd552377a969190eb08dcaf2438ec43664f5eabca25dd5a4c7d16153a09a8468ea7a81acba167c0645dc3d04c205b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b9917eddecb06a9b3bc263608082263
SHA15c32134c78c96b41f22e76d826784177919bbc21
SHA2567e8c53dce894a5087dab328cf0c915681c00443bf8ae375bb105634d60eac7f9
SHA51298d81de7c8eb60918dfccc3235a35b9aee8a125b6e738339c6da94ed4766c29d84cc89b6c3704eb7d04f1d6f36765e1ceb83c22bed3d8c1c67de4f088812f0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f110e36f43eeef0b732641a5d13781b1
SHA1cc496dcc087acb74deb72d1fa86f53c12d288770
SHA256184476949b0aa1ce9dc08d2f89c16040e31584a893863d9fe3885bdd27dc7044
SHA5123270bd37b888437fed679ebaa023ef25bf863cd122448bff781c43a11ecf51a014540809bd782e9fabb48f69aa51866b68cfc2c89b342db5b6bd2949e5d321c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbb9d38d8ac8284f32f0fd441079d993
SHA14afdefc7c1d1eb40ceb9b250e92eb64e00bf33b3
SHA25677271fa31e08841d575c0d0e1e496750662ce343601dd23ef505c1b47d675b40
SHA5125f88283e28f17a98e8b2cfde96bf144f3f09c210e6724eb7ec839668c524d7eb65b33efe3f6bac30fc537117177d43d9dac485a5eac4293d4e7aafa5f9e153f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3cc24a3627e93359778cf98d8ae9853
SHA17b648816e5df43a7a13cb8613bc469903e1de7dd
SHA256adca88dc5d57032b1489392dcac8097a41304a0131977b626bae9f098c380210
SHA512a40a820ad32c044c65fbb6241f87de3fab04b0745444e51469e9c95b096ca114f9543d49584033c2a157c5836fc293425634597a4e2cbf5fc35631b6ca9cdbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b67354a6878987d0e7930d643519fe
SHA163335fe969c4eaabdbd55bd9a51eae0b3720ad31
SHA256390114838148f224a04179f1529364ab646da41ddf34a8f5aac2ce2f61946117
SHA5125ffc0cb8ab50a9460c8f0dd660ea420d2b5bf1b40aec51b680c32b47a0fb4f5b67edae9dd8eb3b2701916b0540e01ffc5d06a62baa1fe7e65eee98fbeea8e03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070f33156ec057b8e93a91dcc46a0126
SHA16681532a971d9f9f16e0ce4517c9133daf1204f1
SHA2562c7e2c4a8815b4563556c30c90ba5145ed77aef2e32b3bb4bd545d30e933bf7d
SHA512bd842db30e0073b39268af66fcc3faf095800021e98335c756d9d53383fcc99f2def56a0dd96ea598c90a5e5bff803b7a2d9c08ac3632ed0eb2eae5cfbb9b1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0788c062428a596f614cb0cec4321a4
SHA1803c016e8a236ea7ccb5732982f93f60f757db85
SHA256cf4faa04e3aa9c239f56301b6b5d6f9e26aec2d79c4bbe0efd6e49f1fb5c775d
SHA51245aba6b42832fa3a5f12226540b23656fa82604d4db247e4da7c5f29780a4f6788b250eaf73f24422ad8d25d04691ad0fd7958b19a0c1a106524c5ad35b095ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfa92c38304f774b72928fc433e8086c
SHA16aa54c48ac21f8235bc4d8b45f006aa46df73223
SHA256989022ba429c3e9e25d1e7ea758df4be88be7475216de90b4ce931dd81feb17f
SHA5125f1a1341faf373d0721e59b2a7f6b3425583c1a9855c1e08e862d9657d577626ea3153881f936f127b8f462747fa606398ef3087333f8f1d6b54972781d4c553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbb4a5da27f29f71cbb7c5d37e001ae2
SHA13917ce770c331a4f22e19940fd42e844721355eb
SHA2569b4bbc24d43257ef97e044eb30197117f3191df61a9acf01513cbfd65c521946
SHA512d00a315674b1291cc0c8f45fa5c92d06bf0974705e5eb6b539407e768b9e2d40758088e7cd5cdd6f88884dd4a6c159ec813941897d6b7b68d3d0f960dd5c6a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566fc00f3abc1f42c1d1dd13194ce9192
SHA1db6cc02d1138c79e24c290f960e7bb810ef021ec
SHA2568cc46eef114a568feb9f2461c06e13706c68a569d8066aed2460d6514592e64c
SHA512895ff034a4711a7aaf760b56c9a5fab9622814adcc153738f508afc8518457cf9b54e8783dd32c019b61f43015a3e507657519d3e2cc254931f0615d113e5f03
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a