Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
2e034943b71245e67cc6e9348bb35015_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2e034943b71245e67cc6e9348bb35015_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e034943b71245e67cc6e9348bb35015_JaffaCakes118.html
-
Size
69KB
-
MD5
2e034943b71245e67cc6e9348bb35015
-
SHA1
035b01d8e75f0c689229295842e4e8dc88e77282
-
SHA256
e9f4c769588a63bde5c227bf2efa7379c6b9a71ae749d8acf12eb9612def4b36
-
SHA512
032ce4806823c116ed1748753c2ba90dd9b3448d95213b09b93635149d8aed917c9ad10cc6fc880ce87856b53a3611fa8012a1b7c1e53ddcba7f718fe2a4037a
-
SSDEEP
768:JiRugcMWR3sI2PDDnd0g6f96zoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8o:JyxqTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000001554e4e16d36db6b5a136f1c0a63a997a0c69a435873f241dadbb2f077377991000000000e80000000020000200000009cb8a3e691df923d3ee03ef967edbc0d57e769eb1acca4f6f0e14275779a6d56200000001ec8df5332a475ecd05f64c806f012bb3d6f28c66ba3b918deda3dba85f41f33400000001a09a9d5b83fa3dc0c799b0685d4f573fd00023a9d5dddb3f3f1525aa022069390430650fae2a70ea3c8d13d6f07afe0ebaaf30281e5cb8ae138a274c96b53cd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421487957" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000053c35e15ae603ea05f2b98d504a5829583fd07c16195289f05637df10b130ae4000000000e8000000002000020000000869e9f7266a06a298ddd87752235adca68cabcc77e43f58ac983e7e0cdc7725490000000c504309e114a464bea40cf252008a5d9ca53bd0bb34c3478617bab214594a8a18457278f5f45c0f096802d2c794c12f796a3d2148e97897d6af06e6c8febfe4dfa055c43b83ee5e4a9d907c2e16402d33c0db2de5e87515208e0c13e7134a578590bf1a9f1b0833724e9a358a99fbce8e73e95479f993de1796c7d702cc033087412647a28318bd969a5cfc18b6c80a74000000070ea5536e694342c5299f5d071305b0d6bad0c6d1dd4afe1b0e6d407354938e8419d7e425b1cdb38a355280774a416c36472c7b5ddf42ce49a58dfa9b7ac8ec8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9CE72B1-0E9E-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003aa1aeaba2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2884 1688 iexplore.exe 28 PID 1688 wrote to memory of 2884 1688 iexplore.exe 28 PID 1688 wrote to memory of 2884 1688 iexplore.exe 28 PID 1688 wrote to memory of 2884 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e034943b71245e67cc6e9348bb35015_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD522f123a8ab988d2e817df714618f961e
SHA1f8c05e1855bdc8571e24663c19882047c240d79f
SHA256d5bb96f83286129c2b883c5e7a4bc9809ccb4bebc4497545425a001e9fdc5221
SHA51261efa61a9fc875122e9bde6d588ebaa47d1f2d6117c91b72cbd740b1689358b5bda9ea2b5fa70c758e149bca07b8b28478e869dcabcf38ec6ad2eb2c2cf9c509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e104cfd5d17ee3507859ffbd9f233e3e
SHA1ba01fca4bababf498436f625a175233a88248725
SHA256a55bec52957dadbc7f83717323cac888835db75fffc33ad006579445dd8cab10
SHA5121e1e8629d29e2a60c8fc51ffd4ebd8035fc93c0d39e3d8e993a223cef50a10f08cdfdbf4d2fbd6a4812a2b48672d9a990c5b6ce167f3c0183617f8a680d09edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d1515f9be27c880571154abab69cabe3
SHA1cb44497898a5764c18d2c2176f2be058ee9884d5
SHA256c60310d6dccd2b836f7fbd0aa77b3123db6d7c853670df1598f598115cb1c36c
SHA5126757866e0475fa79c8161372c24bf31f41eaf40fd45367d3186308feac210d9638c7d3f3e339b9aaf6f34114b6c747b3b09270b46b96665940427498ebc3bc3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f890983977d5d95bf7df198cd92d0901
SHA1dd6170f444f6ba45537b165aae6a21dc3f0c5299
SHA256f4a0258697ee85c619e0611d5800bd4db04624f27365af22627d63dc1fcd0c79
SHA51227d6299a49c35654c43f106c550a363ca9f522eb6f38b339134acf9dc9a04a7eaf12259b408a57ca5172622f7681edcf6fd068c6404d26c7f70a7980367df562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5138fde75c4706d7b50edab95255bdbcc
SHA1648723b17520e30d6e77b10ac860c7c873a31fa7
SHA256c3f775601ef5da1952d6d43672d85022beb859153c0c309cdaf482a7032cf7cf
SHA5129de354375c3a95ccbfc65a59fa8886755f8dd1300c08e389030a2ed143250cbfacd094ebbf5b17ea9b38b8b2aa891759a7ee5efb460c2fbf229d012a380464c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54adcc5c3a53639d02e30db9231dc097e
SHA1fc1c492c7412afa2b0ffc08beaa064d9d9651b2d
SHA256f0be79f668a6894ed1dd16b91e9c8f21f805267fe34e56a92418c627fe0ab1db
SHA512a2f601a3ca4f8f05c54431787a120fce09b7ebcdd6bb56be9784e122b99cc174fc4134770273ec3f511b365f9aeb8df07f008e06916bb85c81ab6063298b3602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ce2d2af0580c247bef4f1cce08fef83
SHA165891aa19cdbbd73a56c52fb8df53a920719d004
SHA25678b3b14622d6ddf372861bb476167bd661ecc780d9483f512c6ea7e7d517e7f3
SHA5122e38d70dfc7622223d487fc9ef6007f3119a87e80a55b30ba00e720ff56692cf50c5534681590737a9a90efbdf33ae204e3d73810c07ad61c495cc0435511050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f62f58ebb64838f3384498da7eab0586
SHA1cbeca83b6d3884ebeba2bcec7e73d8361d6ff623
SHA256f0fb958e1e7093cb0e9baf3eb2c74c1ded77feb0ac9aa5c8ce1a774d0165e40a
SHA5127b78e21528d4d95fb5d246cbce8fe643b89aa43b4578172d4e807c400bd606025ec889dcc6d5d141b027dc134aeb4d1344af71f30a9fff8c4dcf6b2f7c8376e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54155f55f21316660f6fab23920ec9714
SHA13bb140fc9266b94a77c4a4253d58c1a71ce64154
SHA2565a694c39c8e8e04cf6b5ac0a42b9d6352266d644ca4365a9369c5fcef0a3171e
SHA5122d1f942955bbb4b7cf43b0fc6ea341541b0e822038708e8c0aeede0f20ede509c4d8a010841b95b474892141901b0ada1bf754932cc246e6410f871710566997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50566309e8eaf529391779eeefa38819f
SHA1c2704395c0a2e0a79cfc2395692de14b1399c48a
SHA256d49b6b86c05d172ef24af616f1406152f51ffacc9414ba685256de5bc7e6e0f3
SHA512f703857d3038afa986757541b0d6ac3853b28ebf9cc1c7386ea6c8fe9a5e1b2d5220f6aab1ed77cc7170101bf9b900bcd69a1dd140e000c778732e24469b2a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d55ac78688a82a8cf6d93fcceaed14a
SHA157cd8811ee1c700af6b44ecfc91569e7ca9cffa7
SHA2560df78e90754c67e2796817eae3ab6d644d63d5d5eb05f483a52af731cc8c6a74
SHA512538a41f0610343f8ade205595e5ce7121b25793a7b7de66bd78f8478d403b8177a33114e4f6016ee546ccb9398bd217483950a6ec1a0d412c8d70b3aac6b54d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7a77457e90531f41814b4874f2f336a
SHA196c1f55ea0e292951dc9210393c2029b511ca8fc
SHA2566b1b5857e216bb3d76eb86d39b4974778ec784da0a252c13c443e3041b39dcbb
SHA512e14c6a0ee4b29c1622c1a4330641270f3b7904814cd7ca7d97c213edd14a65d1f82d6a6668490b48d7c19861b7913966bcbd29b03b53721811f0ab4d03a6691f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bfd12043174939dd09c85fda4ba77e2a
SHA17e1aa7ea9adc16b0addf0d8193867423203517f8
SHA256ea61e03135b893b8aa7ecca49994d51c22b9e99395f77a8c413ce6f0736b84bb
SHA512236dca95d7ed7b93b44a30d37e7d16da1f08606dfd70d2dd50149d62923e11496e145dd234ae1230340b3e7d2e01ad427d430a870b26ae70869c9ab1f6f1e84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfc31f68994712833d4bf50ea77deaa0
SHA152fe73425f403f40d35915965f66f3b4d0a0dad1
SHA25609f057dfafb2c9b770fe7898a0c9e933a1f631c41a8b807f35b2b442e22f53db
SHA51205806226169f20acba5e0a3f26900e3961308421516786bf93500f034fa136f3302d357210a0adb6dbbad2746835dbfaa63055aede895c645d0e3ab53df65aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dca85b37b7a433c50a3ba0074d5f2fcb
SHA17c4bb7cbb4120c12991e8c1cbb72ab2c5d71118a
SHA2565320cc8b886dc36daa7a6a2927831309103ce8ff57213638851ec4c8bbce30b8
SHA512edd7a17a6cbe41c91cf67911ce644cfef86ba21190b7a1a4a630e33a5399bb91a3ada12fa0ae7f74dd6415d2ddb9d49333bd666b7fd850e84b7c7885657dd4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55fefd49dcfbc76805d66c0828e7ba05b
SHA18439fe0d2fd622ec45d281da58e1fba6eea380d9
SHA25645ed73f5c4a963667dff72a850a83ea97db3c0847f607f3c81fa587e25bc1200
SHA512fbf817c7b64e9d2dc935502cd9bd223ef416bb1f8e36467832ae3cdb2a27d72b7a67385a02501c7a5819b1c280d8e2b63216ebb74dcb3b6387a73134dca2a89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588bb60d594b776e83c1f8626419bdc8e
SHA1d65ee3f5f0b72fd71697025947d8951957f5053d
SHA2561c496265d004ec0856d996439932572aa8c98e3240e678e1c91524285053bd55
SHA51203ea9849c88728a07430ed100bd0a274e6af98c8181de721aa76dd88ddbaca5b0bacc616fc42c703968d75c0743f77b46558f0ca02ed489cae8c5136289251ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59875936cb93f0382b61d3a525145dda0
SHA1f30e468f6ba2206991a4fc0f64f47182ffd8db10
SHA256748c33542269a24232b581d9b583d7293dba9d9034d3c624652cba04a1bb1686
SHA51223ef06cf574964fa76f4c62ddc45b212f240ab2f83bfba24ae1e9b85afc6f41cc285541a7405e6560e1e6b62cea0a49d94c897d7e9b3b3bc84680f6e2ffe59e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d05a86b375ea10b18d8c2e0f6b1f2691
SHA10783de60d9a149ac1b17a3a36c248e2e198fbba7
SHA2561b8e0afbddef10527222a36dc57af3046853063243eedd7b5b51df9c579a00b8
SHA5129547c17f09fa3a808d750a8062cf56be87cb74910aa091ebaeef6da3ea5be94a3c4102925caac815af4fa0c4dd2b882f79b0bb76d873f6dd1c62c8ef21e2f666
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a