Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
33d9133db658023c9307939451d8bb4e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
33d9133db658023c9307939451d8bb4e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
33d9133db658023c9307939451d8bb4e_JaffaCakes118.html
-
Size
461KB
-
MD5
33d9133db658023c9307939451d8bb4e
-
SHA1
31fc7b4a5da82852cc539833af12b5fb76ef5fb8
-
SHA256
2d7df77f3c77157d14714998ad7567095495cef75532a418a381384ce7bf25ef
-
SHA512
d13544757b041c2861bb91e5e52208b58d2dc65513b9b697cbc8283df61727c47de9a66c5d6a4fb94f0b57275b2fadcae2287f947778ff657cd4dd022dd51f3c
-
SSDEEP
6144:SkesMYod+X3oI+Y1QpsMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3e5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421580763" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007838815cb0b215c09c533f035e09daa78a5ed2c5896b8e50a9bc2b6a1f2e4627000000000e8000000002000020000000bb4819de20482515bb1d5a7c896bb82599f71d3cddc92c61bf3637a6212cdfbb20000000b0af2b5ed44bdbc69a0c78cb0a6b16827febdf8941b840db0b86257e9d0ff35d4000000026fd1de5e512820b19ebe0292f476deb5f54bed977a01a94809cc5370aaad382f719406d9a63a226b01429e65057a2c238284b13c573aee6e326c2374375de3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF0887F1-0F76-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008c8ac783a3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000cc7d583dd91f99c2ba9936b3cb1bd5ae6475bc8928dde61affa26f2fbd9b1f18000000000e80000000020000200000001aa8214d59598e4fd2433a1e4b1921d8a08e38f31e98050f4841803e940be2c690000000e2e28b6e64bf4b033c9a714abda1e68890cb85c4116d4a0655b268394fb4affdcf7ab7637fc9607fcaf49ac1df7be18304ab00fedf68c06d8fb012aab01dca74b518009b0bb6e274e9c26cc23ed853992389baa66134da63d298e455e6dee3744dbe2eb1bc5cc3c0ab22c448d6fe9ad77e8610476dbac1755f77e43b79537fbc23bcfa374b1e70c502d29780d78fa0c240000000e8ac4f0219a8f3d0623e34f1010208aa5d79b218b013f0ab257c6aa96dfffeeae718cf0d8a8948df2886ab759f91b5d896059ecedd9dbe9b7160ecf9dc7a08d8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33d9133db658023c9307939451d8bb4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffbccbbc917499f30d975f9292d72e0
SHA1d717e72764782025eb1da36b96dba375aaca9a36
SHA256a01462214b4d48be5f220ce1b7fb24fddf26e7e532b45a3a87b5877ab4132aad
SHA5123d44de09c5a718efddf780b13b304b84f6cb92638cc9859349192e91755dce1df423fe6d6bdf6a478341ffdcc412f7f2347f72e459e1d732b97ee96404b863f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdc53662495a806c629e9e9cd57564c7
SHA1f0bf9854c20b875cf46ae002c11a9bf0d4a42f2d
SHA256bcb4cfd9a92e72885ba6cc57933222f9e970a6138caf332635f0c37b8915f460
SHA5122f31c3192d93f47eee3bff6b0c36046846d187a2816a468b73a8a77477cbe3d3fb6937f61600897c6b230a5ca6d351a57f5c6427b6344d7e5d802aa5825e0f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae4dd3c88ed49548f3c3f57a4af5943
SHA12f5d9f32a0adcb250b24a75152748affae6679a1
SHA256ccbde654be8cda9b3ed6a2232f74586de99381233da364f8ab4d3cbea723adc6
SHA51265ee1fcd3b9e8ae0c66421189e51a3b61f4d256bbabe946a94c535f58c5eb6a3ce31c4b9bdfd8cc89af65896db607b1b8d46e9389c4e6bea0822aabc29eb8e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4bb151e9e72599a887fb346224427df
SHA1c329288fb3b4e6962f3afa86b42ac1196d0f3838
SHA256753e479fb40e4538068bb9dd4e10c1f8177f18f5fdc3b6241135c1acc885e89d
SHA512dad0cf695d961e6a2fa3fbf4adafc6fd8bc1c1b5c4b75be65a2bfc79ac121645110094a83a953876411ff4afbafab73a02c5c11a458f303e46aca82d4b84fa51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563afe9ee513c14a635b6cc086189f190
SHA1229061c9fb886939c2fe40bd7f383a69c1720c3e
SHA256b170de875172a6eb4ae16734756be7c133d0a81b8c7136a0d212d3c6d7010fcc
SHA5123f085375ece22a2d1b05663608c875391a5325f4db5067624f75d6b26841dc89ce63d7832f228c866c56838e44a05aada4584ce356d61168397f5ee620e781bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5444a01992c69d964507441cdd13a33a9
SHA19c4e648093d99f03867d2ffa022abd637e02b8a1
SHA256b4a87d494b7f231be31bd775b2786182ae8c1d7818ad377d1a76013d20fb5d7d
SHA512ada806cd8e686aabd1a4d4b725c7d12a407c54db59caf0a59e2149da1d8ea1b38daf3b7608f1eed26f42a04f52d8ff6f3f852f709eb82934fa152ab41fac7ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b340bff49265e45b7084cfd81c97142c
SHA16252c5ca0053b999a16f695504cf01ecb58d6101
SHA256d37f98a541e1576bc5c5e5251376da89af329c91acbed1c0a0c3067307105732
SHA512ee3177b5abeeb75d05c8b34c87ad4c038a0550baa7565a5e02b6d6f73c3cc70236c016c8ca1aeb1098376edcd579acafe9da2e38c4a1a19971366fe6a7b7deae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5acb1362f7253ddbc46b39a93a29e5d
SHA1bf4ccef15b5ea0566f1c1fdd6c6835fffa0a0c6e
SHA25680def27a496a814c09221a9183e0d1057de8fe10cae931e97502010ef2005908
SHA5127499bdaa3aeb5ea6ec9b706bafae6fb3725c03d71e6a79ad2fb2554b5f2e064fb7239fbe4bf65055ce8166cd4471a4e622f5f5ddaf2c6f3284851e002e7e7f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575bd682ba265f42e8975cb51de3e8c01
SHA1a058ad2d93673afd3f28df901bfce1325b16177e
SHA256b553bb27af5ec9d34cadc584bd43e7b7f8e1aef6b488c93b5702d5b018150c0e
SHA512eec35238bb3cd73f7d5bb82cc424278899180d8514e7064538118e9c4ab567d9f1dfacf764fb03c66cf28b1ac0ea678cd2434d46ab1c23a9ad1e518e80296589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a32f29584c808ad74884c07308351228
SHA1868c776cd67464e6114eca3e7699359b517fe35a
SHA256885b6203a7043751ae3793cd6cf387b9702ad37ab44d7958be0a0b390fa1ec8f
SHA512d297498593aa842dfd579233e8d48fe9868c023e997abb726df429005e531b6deb63631c52d9dc61e7e1d04db522cc4b5bfd15ab27f11d5c1ee64cc76cc8dd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8dcc13cc27a7027e14d10e515da2c14
SHA16e8fcaea2dab029bba35a13a5a9ed8d1b2e412c6
SHA2564cfbca07933dbf848a0dc91b7c6385dc21be9a2775060c5dda3da374fca89ed7
SHA5121f16ca823ef587a499f825a675a44239ec8057da75cc7a99ac8d71fb778b23bfb8cd4e23f7d928c0953962a7c310acb84f928491446ad17227f7658287e11fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28253cf3194b20a3c9d860dd475344b
SHA13e1ecfc4c30311949f72766a97108f228796aca2
SHA2563c69e48c5465ad0a95dfcb4b28712174509b00c9dfb6d4baaf0a4f783fc7f87d
SHA51213d58d734459012f2823c8728e9bcb203aa8bb82d32957bbb410c34c2a3798df820c20a32cc77c206da0541a9b126e94bb4f0a8011e973c58bee6ea4bc5f19a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b157dd33b9225801763aae40ecaa524
SHA1db093bab5c4b9d185b3ac5a8983780bf93ec31f0
SHA25648ef1df44f6804453e18583c275dce2f199823836b88a21ca6e9fa1b3fb57be3
SHA5122d31121f06ad4cec5a77dc35819f63eb68c28d5870cf2920241920c8ac505bf15000c0e96c099502747763d7e716f6243d58c2cc5646f36a0e82fd89a294bac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553d3b9dc999d38922fdc744ff6852227
SHA1d68f2a0494f06cfebdfcac727296c0b0e4a61952
SHA256f8acff82f339ed7455a3bf53f6f756893f341c00069a55afb98d3014dc15b737
SHA512efcf87413c8920e8696d525e5be4b327d9c698901da7f453f0e8ecd6826fb23506f8f873ef4d2483879ab71f1795b6fac92a415f472a71163cd442897d76fcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55490a01392ff3226bbdc371b758c1590
SHA12ca5b2501a6afbf92cff26080ae8e88415ad4d91
SHA25690307556497ad37d2954aa7ea2392fb987a1dc0c02a2c797d17927600bb44ac4
SHA51232b1d480f7fc5ea510732433cc0100c5de61c34ceb2d99f1273e466b607e62d350811b06520403ea514e97c9c93fe553653c6539dfb180dccc0f5cd6df1f1728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5630891d7e8da237d0d634e188c49dc48
SHA10ad081abf18282eabf2ae8df84ea1af8a70e5b0d
SHA256650912d5a7eb9ae589c5c873eea0fcbe438abd7d5e40e2f7d1eccceb608f68a4
SHA51270a85768c5b25a2132711fb54308e41de612aa16bc8bd0e9d8e125d14497dbbe76363c3700f5cf3d01958772c7a384e1be520ed125df51c795afae96ef96ae33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b50dcf62a0c1124a648d47fb36e809b2
SHA143d67eb96df2b9f929eb6f8c9bdfa1ed7800a0fd
SHA25625f7df18ae8a98f9fd740024fd3fa744f1fec3eb0316b4a546abb0248c86055f
SHA51247d8f0f0b6f5594b1d35b8a18cc1ed5fdfb18912d3f53d0bcbcc98515a363f32c1dbb0fbb290b58306fc984784e4bafde7110e8b47e3539d31154f7b34181d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59719c9a2859c4247817a00bebf9f18ac
SHA1344bc850f10fe7c8cae516da254400f05ae9f135
SHA256383e98ffac22b92073f7d21ba8c3715a1c572e3e26b336b9fd835cc2a66d430d
SHA51271e95b1905d2d60a23e3f4bceaaa7c86f0a93c87dccc12b6176fdc38297f72d70f537c3ff0a8421e6dbf21f67e37e16d6cf8c379449b9f9cc7dab1c7dce41e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f06f411003bbe0dfa32ddb5f79000d
SHA1d2d9f3853ec43cedbbedac172e1c246d3ba66eed
SHA256c03fc34242119b6d308a928efe8f2798cd78ebc6fa525acf25de8c01640f26e3
SHA512e31ea63b719e73a04ee71e29c2a3c97cd8e10ec47f409e5a9ee96e8bede68a4fc2e5337ffaf974b89fd6588fcd7cefa84de2b005d8e75e9e7a3041c9e9011019
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a