Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
63d1b478fcc2e74890e41d9ace40af6d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63d1b478fcc2e74890e41d9ace40af6d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63d1b478fcc2e74890e41d9ace40af6d_JaffaCakes118.html
-
Size
5KB
-
MD5
63d1b478fcc2e74890e41d9ace40af6d
-
SHA1
d6abad870d5819bfe693ab2c9a111e0aa51ec5f4
-
SHA256
df24e17d999d718d5ca19e188e7988c46c8e33e84bce1401653638a74f248a0b
-
SHA512
1f7157cb6cced7caf748635d57fc2bbea7ef79624af0ab8724a4382d7689d25886e1e9be0b32d993a601a481e759ed8cdba1c2ec6ed3687ed20ba95078e0abf9
-
SSDEEP
96:L9Wym27vFWyC27v+jaY8pYSgvyax842uVSJrSyN85hC2pfTr7Sg6M/rgWQWu:L9l7vFZ7ve4Ya42vJ2yNYC2pfTPdPQWu
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40696b3c95abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f4c5fd12ae95644483e06e2a246e248a0000000002000000000010660000000100002000000032c9a66ca469415b9a73f2773d81efb2f28e4f4b7fe4809d9066fac3b65b4545000000000e8000000002000020000000f9a464ca9c2cdff9fefedaaf55e53d2cb8c7118819c24e7ce4c7ab8d5d487d8020000000b36a8e05e7db59bb938b5311b0864dda84e9f82063f0059609762ab5402510e440000000846277ccdc07bf96158e8b918aebd9388b00a0f148ab9f1ba338b6de3ad62dfe045cce8cfa556e39c622eaa2bc9c8aa1730757c532b9e4314c9336b5397ebc86 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422467838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f4c5fd12ae95644483e06e2a246e248a00000000020000000000106600000001000020000000790ae714a8a8627487d2f75b640ec417855aa6817e04f310caa0e18563b0062a000000000e8000000002000020000000f747dac06db1d6137b584654748cac4976922efa3b0eb9374870a35fed360f35900000008a90cd47a8c03ef59106d168915e2b4fb8fa8ad105e6b78a956ce5d19ab8df2c706b9744df006cf7c5bf6094fb63ecdc53c9f774efc56af0250c8ff781fdcdd439c5b2241a8d0941a9ceedec2618e48e27a5ed1eb3d578ea339ec64156d496a28c3c917806a3589f4de7a3b49cedaff9e9b051dd82af8bf1a876ff2343e6d1b3681feeff621beaab12744731739cd719400000006780c1b34de4d15c2451614eb81a5925fb056532de47568e13e0089dcda25c560ffee8e7d0de85c57aa110f91022dc10d2d3e22c61794bdc268c2164fc14eeac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{506339F1-1788-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1844 iexplore.exe 1844 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1844 wrote to memory of 2712 1844 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 2712 1844 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 2712 1844 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 2712 1844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d1b478fcc2e74890e41d9ace40af6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505f3226117cc9dea3196f2495b152956
SHA186b268a3d29e889fbeb701cd83a8113c891fb795
SHA256da05566a9218ceccdd648627d2640b6d46ef3957e5255b9d4edcd42b2d6a4489
SHA5126faa7183bb409da61e26420f7dc928b2250ec425e510617e212fa83684e9d076ba77bd5dbccd63f102b8eb0e6430a06c0a0bbf906d5933e91f96c798c98655fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532aedf830ec00679698f267459ccf210
SHA18a0a03c0ef657ed114cd49f9f2b6b3157e6fc998
SHA25695a26893521e081485c3a065e170e62f37d33b51220fd917bebc8b5742db13c4
SHA5129009ad474615bbb50d1db427bfd9ccf8081ef8c8432c3d07d5bc005832ec6fbb642134443c7a5aef4fc480f600008522ee1e163585abde284ac9003a8f2a31a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ab514729c06f22b00fc55171c99336
SHA1c6349e4e61a5bbe1c438dc47517de1dcb5265eb8
SHA2568a70610e2a28002df48094c8b946ec9cacf3002a2de1c35ff23848b926cc7715
SHA5121543384795676b5249cf269c62cb78633b897e95a1de4025bd45573e92d8a207a67d6cfe2257e3ee3740c01c73ac30ae9cafba8336ad0c6025d018c887c8a3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c4ef1ac1021a698af729c2a81a1622e
SHA14acb51ca97f82c98c87800bcec332358a59d0fdf
SHA256f50c3799dd0ad2d36d8c4589b63d64022b0c8f862dd408fdeac31dbca8a3683f
SHA51237291160d7fd28cd2a337b661219f664847a40ae76a249ea1aeb234791d997a4775416d7602ff59adb174c18b47704656ae68a134d721f0f5663e6fd9fff0266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519bedc0296b0f53314521460eaacdffa
SHA183cb226f9a4f749afe3fd09068e024e78c62e1ad
SHA25631575a22f838ea4720b484a03394007c91acee2f349f094006440451558721a9
SHA5122978ee54fdf85a36b80cbe95c5696f742e1bd45de5cf3b3cfb36347f1fbb01fddd91fc219693c43fd9541f80946f58e41418208f2d46d799fbc0fa6907e2943c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56639c73d91de33bdd03508cf209156d8
SHA141727707994cc0fec04664d27c1f1a4ce1c25c53
SHA256c1dcbd2c6112d46d48eb6e3b6b4dbaaadd5aa8ec88cb14c65e126f05290cc00c
SHA512b2874cf348a0665509ad57dd651b39855a5a8d37056910b20561cb5be45c9df76a845758b2ac63cc6606100b6bafd38ec0e256ce3b13a17837f5e7238fd1d830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5843e332de771834154d60c69be65198d
SHA188ab7bd0025c67985fa102300b4d260ee52a40ba
SHA25632c962db05ac93e329ee6b0506abed815b47b451c24883c8284bfda9bf4f1385
SHA512e6eef9438a24f4fe2147d8ec07871690de8544f93d4587057873d78201625a1c3a672236f0e96b255c2fb1169c20986a88e43db5fd66614c8043a5d9130b2472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d70ec2ad0d8a0db273e30b0b30d8e6
SHA1f9adf63e17eb45076ff6ef0b5ae604e1ab6e7c55
SHA256cd8fa054eaba26adacc7e9d95b70853d698e28f857c701fb750a6cd1166a7014
SHA512652a3c1d2156b12e41bd868ff7451acd1466b07be1d5ec305237fd0db1fbf8662a207ccabbee1027a56389d97d40139535b3545ce684fb6472a088fb0c208e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a4879f240edc20f9a1344a5d80ac690
SHA1d156e4e0be3bbf8998c5d6f423ebdcb58358c682
SHA256f281e416beb6e7982c6de873cf4a7c562b728b6253ba102ef08d955c5e830328
SHA512fdf69218e62b2a0b8a69f5803c79ccc4a07c2375e872c4875d9cfcccb857990a09d32d2017d89d910b6bea32e1a271333a69a6c678551c4c812071d62652ab91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee6ed7deee6f615f080cde389cf253a2
SHA1803836b45508668a9ad9c6f4f910dbd5e4ffc476
SHA256e05aabad5a8949a210945c933f243c9fd2e8f766d951d5db85b6e2c24c69092d
SHA512a907efe8e8d7cefcccbadb00302b5d8164983454c2ca38d506b66fee464fc38b638fbd248ffa97f5857a313e55118b7052bfdd1c568dc01b4c2ba9dda5a0c65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d47525f62df5f9c75e99cbef5a0694d
SHA1ceaacc92239dbbd6b5e849b0aa5e87df9c139c9e
SHA256682af25813ff323da4660a63e86e6727b4dade0d82f53175508bdb4c842394f7
SHA512393b485a91f107936e29e565a735bf2f2e91764980065f8a3ee779ed51bd12936190690c310d0fe08e252eaf0ecb8972588f914ef65c56669b9a7ccb942809b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d57b653d5fd43293316e96d1963be440
SHA125656e49cdf4d31a1e4b7109ff3747df35ff58cf
SHA2565a5784f5e4a7afe4cb64f793dcfa3b4bad5777f61d484fac07502fe824d602c3
SHA51233f1335d654e4f0fafd48b81fe357c11b847341be129dda3276dca0e9f6493f3354eb67f738a7dddf8a59973cb783aa77c56cf0cf23e3edc71293eaa051974ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f72e71cff9c1833e548016a0f9061a4
SHA13666139ad37eea67667cf4c64e2f694446f3fd4c
SHA2569ad07277cff1908729ee15ab7a0112de1bc3c91fe265aa0cf60f70389ee18873
SHA5121c4b5385a487261976a75b44007848080fac059e28d67bdf43e493f6668c43966ebba626c21428dbe6ae2edc7e29afa109b7f2c15e2298bd622198d785246800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3cb6445deed3bc9f10ca8476be9c33
SHA1395cd95ff729fde735e7e7ff0e9371a140131dd3
SHA256b80dbecef4e8123dd1d24c52c88e602f5cf7916e9104f30345b2ba79a2bb8761
SHA512c640fa19f6481d1e8af39b15f8c46de2b224cb6f5231be318d3a12f13fdd8d86fb8a0bce17fbb279bd13974c2a7b615d26d0b644b1561e9121d493c3d1d05bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e78241593b466667ef826a8c40cce458
SHA1541179da43c6cea987590ce5ea28d45bff12d6b3
SHA256f34f7386e51823c41d217b906917257297e1ef37b7f485185ac88ee1ded24c4f
SHA512256dc612895b540f6812ccdc85f84f4886e22b0a1af96c55bf0b7a125e891d4de2408bd4b8820215c87a3e42e0d4049c9502fe40a3b9091927cbaadcf136631b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a851befc77e2c19f1b2f6e18aff26576
SHA130a0b6235e67c05ffa571a17882c2f02e5c50ee9
SHA256d1563344a78db4344dd978986934c1c020565e54efb6151a1854184b44f971d0
SHA512c8c74cc66a412427eec34df58931e6d94354cc28b967fea59422aef1586ae59f2c0bfff57e790a97679c5550a7b290af37c90258e99756f4e32e70f27f126f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4436ffabaa83ca8516fcf29c9bdbb17
SHA1b37e8b1894a3eddb95b085f204b6804c615e69d9
SHA2562784804b204993e002bf79fa8b583a471bab97b7995937f9437c972f41e4bc5b
SHA512271a8730c2dcaefefcdb140e8149d02bd88a80c15caa1e7ec9db493ee8f4cb5d25ffb9fe6b2de9eb28e7d5d6c4da8d29150c8e7362f4b744003ae89eabe14411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50792939e75c777025c4809405ee06538
SHA1cf078603401115ffd59714e710b7b699499b5ef2
SHA256da721e77603c05d6356acf28ba6942acf7263c95016694c3e81d602e42660ce5
SHA512c3925bd3a58f49f93646705ea184f285cb008cb704f177e03cfdbd8d989f8b1c032b44c19252267644c082e752c3817b880e192dc397602387d6a175acbfb23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a605f0869eca04c42a3918c2fbd98a5
SHA131cdbc0c986b3710a26312d55e30c53c919bcc7a
SHA256430268a0878445a8ce54c82b642a77acdde06f39e3a98d125014e0bedd5463a5
SHA512791e628442bd02b2ab4010ffed8ed9b48ed1bae6e8c998c72f1aeb972e005db5a77df9b2b21cd5624215ab230f6b308ef9fac147bd96e74bf94b418e4373e694
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a