Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
27e702aa7c792644420c42479ee469d9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27e702aa7c792644420c42479ee469d9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
27e702aa7c792644420c42479ee469d9_JaffaCakes118.html
-
Size
9KB
-
MD5
27e702aa7c792644420c42479ee469d9
-
SHA1
4795c3eea1254d1c029d94b812d41274e4fa9758
-
SHA256
e262c8d7a1317005d10a0ac96e7628dc1795b04a5c6581e9c7018dd49b6bdc61
-
SHA512
ad8a91b623f815dc42db8c2e74e4d6ec0246975a0dbe376fbe8f6f8247fbe87b03a6142ac7ef27f9de7f03f25c08460c27a3750db10621b48b28faf8a66d4f3a
-
SSDEEP
96:Rkuv7T8ZDHyR1GJDhVH8lACUc9L6/azl22qL4eMyFi7QmX/T+K8BXzR7DKJ1UczJ:tv7JRxRqz9ET+K8Gwcz0Ac2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000007199fe1c13ba0fcc000df7d98f6ae863b935273b1e315178fefb5703e6a7a613000000000e8000000002000020000000bb60dd4698b4226aa83f224067c6946d57dc26f71831db69982909e133a262b8900000005c4a5fcdef657e24ab1d38abfd147cd01875c8e67c610c347d0f386e4be883148b9d7d02314efdaf5391b275b241234aa7634ecb9b218690e62bf3aeac0aba54d234897a3857bdacfa9058f85e08b86ccf234bf0b635507b963c8c50a955ed18684a7602338da7f243edc0171cac6388ee8752427431f72a29dc97215a439f3f54fff251809a56fdc4c70d96bc8836e34000000038abf6e7ffdf569dde7ce0a0bd1d8ac26d973f5f43212567c7957ca7b99459615ba3d36380e96c52149f6626691269610c72adc6d81309ded5ee5b6acc6fca68 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{905C7381-0DAD-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421384325" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000001ca72a5e5a5b3cb4bb15ff52b287d8c7395bd65b92082c2544caf5bb1018c453000000000e80000000020000200000000395c5e93957c61419debacd63961442c138360debf6402f60d90d34789179e4200000004fa5df8be2696660f72478ee922c175ac038e402ee8b9fab73646bf0438783c740000000cdec078f5aab96569df02c16ec176f61ca766ed751b2d5225304656cd71c5b45f94858741f74dad632e67ec29f79e3db63ff1046ac0b9091c531631bb48bf7ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7095d866baa1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3012 1924 iexplore.exe 28 PID 1924 wrote to memory of 3012 1924 iexplore.exe 28 PID 1924 wrote to memory of 3012 1924 iexplore.exe 28 PID 1924 wrote to memory of 3012 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27e702aa7c792644420c42479ee469d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903baeead99a40dd841f0c0297459265
SHA1c3c838e553c932fa0cf68ecc5223cd4d35529f1c
SHA2564771b2a7b0fb11197038b2dcebf650efda26295dca4deb154be7e61317e08d91
SHA512febf019c3b6e3dd5f2fe81adcdf0dd07da327cb69cadcc51d64b00507704889f00e8b8add832d576eba29b5f52168e9bc28cb6e01bb0fd7e567796ac27dad11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552a8eb2329d5440da6d4cedb1a462d0
SHA14929cab663d1a7bb662afe88a1b12cb68e13ee52
SHA256586b5c8c4357d47cee8b33eacd68e287b52be37518705616afed11b5c8536a73
SHA5129c04fccf1f7a7c48cd780dc26b8fe5a7c530bdde1cc8269f79a13d13c3c282dc065b5c6444da361bb29fccc443059f57317e863ce34c836bff477f7ea6403c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afa12658bac5cf3ebf6068c776a2b684
SHA1713e20b952467470ffb60e758c16e4c3da0be970
SHA2565256f0b6599fa81db330a27f6dc290fd23bbd531ae90af5e786fc16ad45192d6
SHA5124c05aabd78c252d9342046af1e78267125147307f8e487dac26e89fa1773f11887075ac915de184d87d7ab59c22cdf28055ccd0316eb512ba603682acd3979df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199c92f2a5b6d4fadd1b75dc69579f2e
SHA126938b0baaf56bf67559b58c54e6fdc7dc01e24c
SHA2563ed3155af8fe2b9ee36d608670f512dca5d26fca40d483cabe95b462206e5047
SHA51240fb4db4f07f1170d96ec4a045e38b716d3efd207b2321397ea9f9eb88689dacaba5398eedd7ccaa23b9c5f0a7e60bcb3736160d5cf89a14d72cea315d7209a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c427d4ce1acefd78343edf1d0a0fb5b8
SHA155c4b7bffeb8d11e39c2147044adfb6e59eba775
SHA2562e8e64dd6af6810f6b607ff288fb7282a786f24ebd8ec63091fb1a2d54f7df5d
SHA512ecdb218177ff6b60ca4f7afe9b61227dd41304890c8b502fca9b0e57e034ff69be2e09e555c6172593d0cc31578e955ee6d514a49d016313afebe0185b4d9d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a8b93759f62e6d0db9b5072b1df5932
SHA158666be2f4b60e0484254855e668daa14d16b7c6
SHA256c4f8de1799885f9e85a36f5f3c70a305b6cc6e9848479398cc81fc7a4d7daecb
SHA5121c6df529b7510c9f5712862142ae1d0c85108b39cff56559acabcb1d51bcd7951ecdafa21b075931fad066eec0ae1e567787e8a123d85d48741859b2ce8a3bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff07758e20e3d0e609d2b3e90b14e54
SHA10dbf489eb18a23acc8be3ea0ab6885560776c40d
SHA25646af68faa8d00cac01765ec4555851e86dcd7dc880319c1513c9af0029842172
SHA5120b3c41619174f723b066fdb61a2e79f0c1c3c94c60babb48ba243c93c17f1f0bbc42949f87d225941df8b47dfc7c2714c7caae17cb199fcb60ec2d33de7c2dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fad53f3d0bdbe8de4782f86dc9a596a
SHA1152fb35e38f0972563111b9bf014f1024b7a0c3b
SHA256098b7b5b3d79c99a4a4fd576018929cf568b4d3811d2b96a702f87b546511ca5
SHA51263c754c9b7f9a920682b774572ecfbe2d827f3cd22c743b1e68f5f778855ff3d03591970a1578ba174142a5c5b7fdb3d085f99cda5e64086387f976b3d3d5b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508bb54ffb088f0ee52f50651df74ef9e
SHA11157362ab37ff1c6c68181f08d5cd103eec5adc1
SHA25658e974f5fde99dc42050a0a6dadd515720c7ece4b73c04d510b1d5acb009067a
SHA5120f433bfcb3ced2caf6676f31d2d89d6222d82f638b0177bb8e5ed6e3f3ea77af6cf0541166b79319695440b86a603810d47ede3bda4b84c71150b1607804cc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563861c62bf24b9bf2f648bb54c0ef17d
SHA1fb7a5c5e33afe9132d667af9137733d628b694ea
SHA256c452ca212381a02b1fd01d35bf692063969d6bdfcabc8957ede3d95470ac16d2
SHA512761c03ee72a388c4aeb8c22f50980b3aa24a80cf3a791e199b8ff042d09271da5ef7a1d96b6646d3719ae58d476ad732029879f3b85733833df66a5e41baeea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de51be2ebda6314ecca69f8ebaafdb92
SHA1cb9b6fdfe8c6dc628ccf5184dca173330b48b4e1
SHA2560eb72169b23e7e2594d9819f3d892375c3d163bdd24cafc660a9852dd102ad79
SHA51268afd81a8c7aa27306d4b7e2a58b0c4a5e9f77ae06d3711ecf6efd32b708a765cf93b4613e3f23ab257945c3b50e5ff11781c6d0f494aa870795a3518019208d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f4ff0e639115b25defc771e3ce2eb3
SHA1081fdd2348c127f4157a1ee2bebd9b175311cefe
SHA256d27a7c61317bbef9a7cac4e11ad7456db3913710c0f0cd655cad095fe73eed1d
SHA512541a8506cf49eb82de21f2edf26e5b8489056d1e73ed705e1af6f80e6ce4ca4d6be9f1c6fcf59a86d0870052aab8de6efd65f051750481b1832ac18fe063882c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbec618456244f7578e2a348efcdab39
SHA1366bdae3b7ab7696a5d998376511cefa535385e9
SHA256f8e7475bb396aee6e0979adcde8c99ff7c2b28bb2274d7b2f701700df6458690
SHA512570825a20f114c1b8d8a3eb1f0635e51c02089f8ccdd219dc851e58c7bfbc1735c029cd9d489ef0d1e83d0bda0596ca9e959e3298cc6d3f0c56bca541d81527b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee06e520bfa9cd952b6b0ec8a87f015e
SHA1db0d53edba77a05f56044b9e92f510a9ebd4bdd1
SHA256517c72fa8e08c4b5a679bc8f85a7f48f1f8250c834439c0bee8272641a366cee
SHA512eadf1cf56578d5c3c6a4978f67e1e2ae62319ca67a17ff0706f2b08770db1d4ea8e4cd4cf16e8ef805bbb2efd80b61f2e5803eb77078d88a2758357947afe712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fb1fb81de11e2151b55aca9ce94531
SHA16fa0888d7a2a9f439d731c01e0bb678815c765d0
SHA256158145cf74b259526c61ff27aa7376c4e7b6735fc53f098e3f9cc9c4d0874789
SHA512b3fa3789459baae8c330d151d548c1e4026a9db84820ece23d3cdddc5a5bb1d57c568d85c18cc0b897133b30af5c385f3af7199289f8cf0883bf93a6ab8b2c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56310ae0eee46ef42332ff8788a54940d
SHA18813390260cd7500b2d51a3573d316c0a2798583
SHA25667b6738dc2f2c5e2a1a50f950e5b84d304adbe12587bf2e790205f7ef4ff975b
SHA51204c5c49ffdcdc9b59d96029c294ebbc09b74f19180dcc1a1a89d1745ad9aee2393515587b5da85010e8a2dfe0d4bf3ba52ab8ed5d24912c8569869e3bf912d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a25e798a4adf0b9f30f4fdbcc2390586
SHA16012f860de910fe1c5a38e7ed97f2a4dd0a77d4d
SHA256349d5c4b550ec6f030588e9283a7d810dff6c56dcb78e08a64a9ca6f9bb2c56d
SHA5125a0ae6db5e0dd7703b1907071c14344f0892f62922fe67a677c70753db22730718e46ef423ed669dcd6cffd5aa56f1552384ff6e322fd5fd169ca7ec8920ecf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570aed33785a7fa8168c75658cb43e34b
SHA19266cbd1d399d9e662e77e658cace2ef6a6d6478
SHA256fa52736de3761712e4281b1d4e6e973a2e69e940f821ed5d69651c48520571c0
SHA51266d92d7674496706849afd1278193b4e02f67ff8f3a504c810495a018a941d1c217a0c4b7091af0f460773c101824c3849d5a1d82befce86c9b47466c705ae69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce04dd3fbf7cb91b1b8124917f408112
SHA16af90dcec9d9298a1e155de2486a7d38d9b7cfdf
SHA2564d3bedfa5ce553b098834b064983b183ba26023218e759f2c3281fb98eb4ef44
SHA512788ef8d1a666cc5dfb42762b76797cc5c5ab3edb7c5e13978f2420c91c9b3508781fc71f11605c8c0d2903d844b771d8af8eb8eef6b06ed1559afc254a4d739c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a