Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
42802f0aa1e3ff8ecf10b0a9331635fa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42802f0aa1e3ff8ecf10b0a9331635fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42802f0aa1e3ff8ecf10b0a9331635fa_JaffaCakes118.html
-
Size
68KB
-
MD5
42802f0aa1e3ff8ecf10b0a9331635fa
-
SHA1
aed54f035c6851df527aaff964dea5521ea618f5
-
SHA256
7cc6218a0ad160418ec6ee98498f9f2cfa9c613961d6efb888781f923c8ba088
-
SHA512
b8feda63eada445cf6df3a8bc383f9f43791f050b345640b545f93b1ee6e8fb6a2ec5201ddf2f11e2d2393112826a9aa561fe97863d39fc8ab88f7bcb6e973b5
-
SSDEEP
768:JiKgcMiR3sI2PDDnX0g6BCbwjYAoTyv1wCZkofyMdtbBnfBgN8/lboi2hcpQFVGo:Je/WYdTcNeD0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000048feb3269c7b3722c48fbb9769d596862fce3782a546c7c743a5bdd8ec04d929000000000e8000000002000020000000fc7395a09d08ad26c3d3c5a9c05896236c86f7656a527a26c37e536c5370a81c90000000712b51215c4fbcbe3c0ca95718a20a6a693af296948031422e20bb2e3f4764051d019d5f7df1996f86bb6d3dd37c672a88ed416749c38fa836ed1626dbd2e677752142bfec74c0ae1a5718fd00f8cc46ce67e4d287d2820ae2d6989b120eeaf784eaee226c8c213c4676f11dee445850d96c3bf92f67a7bd98bff4427baee9cc30b170d04919f383d21f43aaccac9a884000000043c7650dde1fbbd7acfd2dc0c046cdc3c3ddeea7d4958159a8ba766be9a099daccec306aec0e7a28a4831fe84af2178ea95329bcf3fbd178c51cce993836f47a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009a84c6a30351b57531a404beba1fff05bce317f2fa6e548e72dc504c3f9a80e8000000000e8000000002000020000000b304d456897510dd638ff4bf1124247584b7c75527bd0182f28711fc64fbb5ec2000000018e4af7d62f8fd34bd2f9a9a8ff0f4c576f2f4e78d3b4910a88dc7c30d6f0ad3400000007510df82d226c051fc8a7cd0a9884c43de35e7dd4c68d84f79674b322b11bde9a81df095a5e620b22417c2b95ab9cb8332ded92359fcb6e7cecf03c913115ff0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400052c82ca6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3AF8051-121F-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421873258" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42802f0aa1e3ff8ecf10b0a9331635fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574df61f9db7a0d342dbf90337a134576
SHA17a0c73cb7a23200221a2f17af96690228a73262b
SHA256f75b630da19609f46ec0dfb464752db1116e0ae4245d23dcc628fbf06b6ddeb0
SHA5124b8c565c5decc7465335af27c4e144aa4ffacc6a19631048b195894c05e033ed29838bb2c7306a895e709b4ff2c6ee466203458f2037b36b3f68b4567d680a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ecb030ef18378c2a59a6f518d04d4e4
SHA18d3028118fa10acaee6cbca9c2df9053e4ec4075
SHA256f8e588b32fecf8636f7edf180e2901111bb495214ee316f5db5a5fc33dbc8bd1
SHA512b7e987de645208d3a57d7f2ce20ac4536be849c0b13f83ec4c10f082d98293251cf068f4ca0b65f33c50084cd0892c4df526be2f6e003dfc0bb2837387e7cde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aecc13f0386b63a5b690f0dd51a7840
SHA10c3b276290c66d22a949c295d751b68300f6790c
SHA256f8403bd87c52f17cb4e4a2ecb217129cc67b1d31e0f87a20b89d49dc7eec158d
SHA5129668024c4ce8a548eef33c7f3e0cb35472ca158fb36a2427e62beb7e100df8090df8e31fedec981cfc3b3807a79a888821cf50e03896c25ac8a10cb8348edb94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcac0c94d076c4d4d207b5e41dd1ddec
SHA1eb2aee65183d66a6f6ca31fb63b1814494afe87c
SHA256790908951ebf53eca6018791918bd89d8ff62e9d83d3bb473e7cde65b6a15ae2
SHA5123500cf0dd95d1511a3a636639a34d22c4385ee3a8dd8dc17e79e2a3be3a61faab3a1bddbd4780c021584f5c763ad998e8fffe856bc2d3950243548af10cb6823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6977086cb72c1259e923b087a86a4ab
SHA10484b9eec4628111ac9f4ae6d13fe5442d9d4993
SHA25660460311a703d1c3584136a54ec0d9fbb34c3e0a902d855772ce9ea96f06f287
SHA5123d24c84295db719e78d3b33700b7db96c06751a877102ed397ffd9228d86e5880cf44ec7537e1b4cf06568d1b8f375d1153d69089e9de6c51e3727866fdb8eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb83d7756904c925f523137cb1270390
SHA18dc3cf3cf5261e09361524cba06ed65f0c742ab6
SHA256aea8b351df24a2232449d56bbfe18219e8207807ce240ff3b8c0bbe9a5f3bcab
SHA512a23d6cb4e16566d41d857bfa4f7773eade84e3c09de36136eac11386faa531e00ecaab3ad1bc3ac6a39a8a138ac7acbdd71a11f36ff488d397a46967a4adf830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c799f6cfaf12e47c7b9577f097274701
SHA1f8d318bf99ebbcb2be13d5724f09a3be60ba37d0
SHA256e2a9c17984d631414455d619e3480c0b493ce2e061bafa16ce59ef4da94b46d7
SHA512d4f46c727376bb8535d18f0cb16738f5ab76174368caa42bd81d2ee98a4eb4e7096455cc9b24f5cdd42aadb0b51cfcbbfdcb81614fad0cb8f7e6ba8dc1d0d9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511bec38fc8b536f6a35ceb576df7a5e5
SHA143e610db1911ba3bd94f72b3a0cd85affcbff2a7
SHA256998843bca025af806cfa4088a0b08a725d50d4ffcd2499f076e111f9d0dceb22
SHA5120b8f2f4bff3bf19a76e2d78bfca1ff7ff9d181683be7134e4f93e34bcb918dcb581bd223344c0481080053c8aa933bb7e2d2ff18107361834279727dc574ccce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542abcfcc10ce50e1e3c6c9ba1159893a
SHA1d89ad1dc6eb93288287225b34b9958bdc2bb3b48
SHA256b866df2f40e51fd0a2c172277b6cd5f26a1899130b3cd3954f67e153a420c0f8
SHA512723aca52bbf2a5b36d5a097d5685c17026f9ef9a49df2c179dd7a8eebf5414b903485ad7ffccefe305d3c25ed3f69e7c3fe7dfbddd11acd703400271cd451286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14f9d8a40f4ce36bc24a8d292b764e8
SHA1de3d0bb3e60fa1116282ce9749cc03da4648dcc7
SHA256459a836ff165dfa86092263e5aef8f4518de57881077c18b52aeb98f695d7180
SHA512c8dcab061a41575199517c7060cc11f8088f36d4effa99428d4ff058f9943622ebd1798b5bd027c925b3fa03057fa858ba5e98677bf17e35a58f3dbd16e4958c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bd2035c47133c66928ab637adbaa32f
SHA1e02b91c9d4e7ae9250957813dbe5e91c524cdf70
SHA256cf4460838805fb841f1b9cf8f1dc5275d9178f8eab09a48249303d30c9e39798
SHA512724fe250029871dc679a684682e2e447a96ff96f260b060bba93116d549998638d7096c41099e85428050072279163b937b3457483dafa6a00fd2bacafd7a78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503311514c6b726ce05d58046672d814e
SHA15e0ffd1340bdcad07e770638663a3dde39d346a0
SHA256614099bb88d7fea42fb6927757622fd999d5f5c5110d7da62d5eaab28af525fa
SHA512b9189bed3e1fea29fdddd21d264e6e2764b5c11e6cc4676c9cbeeaea2d0326846b6de78f2f57e630d9a32e9e7547db420b2910634d537ab142ffa975080b7430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2412ecc1fbdbe74ae2403fcf91a9526
SHA1eb2505f4242d73f7c206431e62144dcc608b4c21
SHA256f67f8bc40e8c9487203a329a1bd164232b5d668fc09ee0edf6f7cbdcd99659e8
SHA5125d673b3ce36d77cc9395e7b313bf38a1b31a33a4d9064243ee4f0b5799508515d9ce400b6bb5019542a3cd0c8f0262da40b4be0e8431c548e590ceec5d2516ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034e9db185b6ea8292559dcd7ebb7d57
SHA1fb0f88a12c81a9dfaa88364dcc86884724498313
SHA2565f8858947266250bdcdb96c84e04a3e41a783b4e41ef5f3d12aed80aaaae2595
SHA512df7225a528de37d6d6ad3f0d7a6b536b2f8c53badbab542cde95344618af8ec2c0bf1d9182c9281dadd398d83100a489573b33330264ac1a87b0d9abbb9640f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8651ee5c66c8f6c4088e32acee085f2
SHA1e61da37a52f78e61569b3f85cedf1d2b94b3f3b7
SHA256bc3ae776d9530a0ac9e27c4b59bfdd330ea3daa552160b0b4fcd1b9dba84feb3
SHA512bb08446804d4a16d813402c0fc7018edbaecb99c18ba554a322b0e251880bfc1221f72942f2cda881e00eecca32b56dbb78e86ac4cbfdd51a0516d1fe72790f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5012d2dd5c0b887d6cb4c1015fca452a2
SHA14a48671d517af7099dd55e9e2ad919d9a4f50787
SHA256518a96f0f5b89a43ca6662ea5149e98d9afc1ad22fba5da66d1620dd575b22fa
SHA512b8d3ffb9385face34556eaa091ad9b78439895824d77d9663209cf0d171f9a84d111f486c44e21b86056d850ce24cd72fc1178a952e784a1539306b8cec8bc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a64359c0bac0bae889dfea3a227aeb
SHA14b251a89d48a05598a25129b7f4de8e6851af78e
SHA256cab97bcfa676b9640a4893508f23b276860328d7e21b7d5c462171782222ce96
SHA512967fa8da1f9485e9c3f7f199e23429423951890b4d396082dce8a8348d5ed5b4cafaab761981e9baa55661c643eaefbcc7becc9bf319aa42a47cadc84276a22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4780c4702d3a3214e8ae35638d4fded
SHA14567c4a56bf539e4b4efd7352bd12053030ecec4
SHA2567608d128fe0cd7edc623161ecbbf0de5eff5f055f783ddb359001323770b8a81
SHA5122c0efd68e2923fe86b1fa9491a3854f8a0fcde1744a18aaf2c54e303e2082c9f95ce4518dcc45d1cb71f7efce78f7ef645e21e889ddb14a6d8005db9d3688e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5d1b85b74e294dc54a418a6ccab7cb
SHA1aaa7a0ce22282e21e96c1831bfc68cfdc39ca231
SHA256f89d317ea2c0a39c6915fcc9aba9925dc7a927a5db4c9119674fd96c43726185
SHA51279e41ed7c4f4b7c8da79ea06547b917f2fc54b97f57c46c34071a54c54411d27b8eacad0071c7a44b1d8ef57e06469406b86176fc5240a5957b5f98f375dc9e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a