Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
63e83bcab08eb59bd26ba09a05f57773_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63e83bcab08eb59bd26ba09a05f57773_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63e83bcab08eb59bd26ba09a05f57773_JaffaCakes118.html
-
Size
6KB
-
MD5
63e83bcab08eb59bd26ba09a05f57773
-
SHA1
3ca800b405506071e7b6a3eab6d66f74a4e7621b
-
SHA256
ff799c82d4a6c861a9acaf33fe8dfa1793f6424813d4752b710cc2c5629db310
-
SHA512
7cd422806bb96b69debbab7cb4c583df183e89574d99948dcae654169b1b4f363bb49c4a1183a2d4e0a783ba1599178f83dcf2d22e286523bcca13168e07254b
-
SSDEEP
192:m9iqZOrjjUL4ogsK1Vgrc0ddZdRdhdudIdvdAdId3adXdCdVdGdLdmd6dndwdldt:KcUWWNy2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000aa2188a4f5df33429e9bee829e74de340000000002000000000010660000000100002000000012799f5a89f78e7364ce2a9aaf99d600d9386e221fe59d183abc90c21b1892c6000000000e80000000020000200000006e06e6c1f0fc06f9847e4729c1ff7d0223a40cd4741615d340ac4cf1602e872e200000006080bf884b0d68822ecf96259753f85ee93caaca5bac54bf04902a82942ba9e740000000e78e8202a698f990f77f53b1229f1f26967a06e33c01dc50ad006667e78a2031a79ebccb394fa4cfdf38d640010fabda10742b352446e0c34962cb1eec20f6e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000aa2188a4f5df33429e9bee829e74de3400000000020000000000106600000001000020000000020cac6e9061069d63cd1e468c8d04c9341b789f05cf89ce312336cf155becc5000000000e800000000200002000000084278218056a33640bb3b53ba7f3a1eb83571d601b31fb306ae76bc3027eef459000000069a8955dae37275f9717ab42fbc1525716fae409748db9de49b554810448546192771c0805673b68a31c3b0396894a1a6389c767dfa9704d3a8c96a554a6ccd7c0fa2034cbcdb72ce8845eaefd4e7baa7c13f9b35838826eeb074014f8ff684d7a55209c9e4e02cc9cf7e9bdea8e012a5040a996147c65892c521c2d55908d88fedc997bbe3ed9dc929489212319437940000000da025a7ac2481f9e03bdd004ed464008c07de2db5279b4bc2e3e3e5c8d1e31149f61737bcb130fe1b1b4cc5ad280d5d4e0fa94f73a1ecb351e3d8095e3e1e69a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75EB9381-178C-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09e894a99abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469619" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1948 iexplore.exe 1948 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1948 wrote to memory of 2664 1948 iexplore.exe IEXPLORE.EXE PID 1948 wrote to memory of 2664 1948 iexplore.exe IEXPLORE.EXE PID 1948 wrote to memory of 2664 1948 iexplore.exe IEXPLORE.EXE PID 1948 wrote to memory of 2664 1948 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e83bcab08eb59bd26ba09a05f57773_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525e27ffabd88ef5a0f3eb31aa575d150
SHA1080ba620908177ec1d443cb11d91c98493e80861
SHA256302d090da5ecf6bb2079d730f22d341b88855a17c070591d713ae39998df9fa8
SHA512c683ab5b3467222ac40de9a847142f5720a340f5bee61ed745c6c96fa2fa81a4677a22449893de3ebcc97ad39a5a995d08262c1b445e2be5741e981875c67622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3f352f41f84e3373e8eaf3a0c2a35f4
SHA159bb10f4513e979c975178495be7f16cda458f73
SHA256b442ccee2151f043d58524b3ca28a0daa51c4908ceceb5e064fbf8ad97b603fc
SHA512f5dbc7cc30c4ec99240e079a649a6cc4581726d29ed9eef354de2d7b70180ff3024abe9218d5f0ab32a6f69264f331b09886d11c5bc7a1c40c77b7d6f2d7d202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57bdbf293fef3e88b70dfec3fb860c6ca
SHA144d83e61384fa6bce7a651d8e5de380e676acd6e
SHA256edc4478d97734ac5511eb3cb7a41147695259821bbd0b1f67cabc9256513c934
SHA512d558d854de5ad81d4a19a3e80a629021b695b8b863e4ef691ea8941828bfd1f15f06f4d011635bec0896753c6ef05f7ffd20e8f551721276edea909437a668ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD540d8d5056e143ade5dfdb4e3cf66ccf5
SHA14294e54b6e81b09b41ebf89ed204dd6f55e74bc9
SHA2569db056e272d529ab1b2c9c923d4faf2340cb9c75e0624c1a9a481208e4f04c07
SHA512d6e79eb82b08d87da3f28e1e974b0fe8651638854af69ad5c0b8b0f10a0dfb096668943b672e239355b7eda83e85963ccb77cd01b1932460b2e1081b3cffc9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55844f5b36127f9dcf0458a6a24946110
SHA126377ea972e8049fc6f0577d2f8d3b55bda0baf6
SHA2561a2dacfa615e2e9dfda51d5cb1a96a2ab7380e1262260ad03613fc1279801593
SHA51247eb41d5918f046cbf0a1926175e04138addcfeba3c8005c5744fff32bd9dc188322725067442acc44e59cf4a2df675e981c172a8702068d501b0fc035729dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1ebc1ca64ae7fd810686bc6cb4e52a1
SHA1aebe4032ee28312feb2f6241083d91f768cdf7ea
SHA25666a0ed098c30cff3e2f9793e0ff0c88b9eb7af4325ac88861b5f0bff74c2bdf3
SHA51253287a753639408715c616df0c2658a8b4f86d85335b3dc58826bc72bb50938bef452996cc5bb0d992c372764c19d346ca4590a3a9644d2cf96107e2fb9ba24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59890b494764be259e7db7acd7615c463
SHA11429d520a40f64652cf6cf258ff0866393f658b0
SHA2567bb28a29f5561e817311bc5b193379274e91f7f153f77eb68efb4edacad495e4
SHA51290a25966fce7d7f5a1f46e79d4cc35a14972734aa485c5a23d2fc6b9fd986779e421e121ed4e93476cc64d31746c1ada6831b57dc02cde57d3c8e3eba6261c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6b67625276bfdda1a21524465e39bcb
SHA1121aa0d45be4e9e2fd16185b17f450241877e89d
SHA25606fd07216a564982d4a7b7ff1cde5e0f492d2b548be40755b7393d177a56a98b
SHA5124ec1eb1c1c363d7ab916f38d5164e69fb26b115445aa54c52534bb31d5223b30a7b6112f9402819d94440f23c0bdebabde58bb5cfc6de37f75e8559073085595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af42e3bb06d2edb077badd00b47dbeb2
SHA1f48b21652cc3a8777480cce061ad65fa130d556c
SHA2565cbcc67a12511149bf5c42f59d3493b79e49982b46e9209a1f971a2f3a8582a6
SHA5129a0f53002a1bc42d7904e32c9d38b31cd954cd8df31b62c0a45b31fa39716012ff7e1ac55fcda888a413e8cdda9681602a86f091c61531d4073dca0f7cd7eeff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51cf2e6f730eeb2bfd73aacac5629e48b
SHA1d0bcd685502917d31c9e6e2d37fae93b87a0ad67
SHA2566d58925b855dde201e3e5e91251c312a78fdc9887683947cbe9d83bb6e09c535
SHA512b974dc273b41e4ee510f5042b60f59357601a74690b4488390b5f1f02bb1b2b510b760ad51cc0398971cd0040aca2e70ef6398b5d06d0f4eedb6bef10195444e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5042c01d33007551e4d6768e28578b812
SHA143c60eac3843d0707f20a07e5c165168b4f06d21
SHA256a2e0376a4c959ceef2b04958f1fa6320ed477c9c889a53ad6916085c63c2460a
SHA512f453e662714624d4b75f8a0ea1995c6a80d65c21eb47671d59fe9f0961681513be7d323f737cf5979d1e8ff161471b7bf001e6a11149e5a5b5d0ad55660ca0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0997bf28b759922a421100f40a6daff
SHA1bb01f062b044e832aece9b70aaf0029b98f14c0f
SHA2563c06a9edcc09f2f254b63635ff218de58f197ba264d927249e5eaf4245fd5e9e
SHA512dee968d79b3f6af3e3db482b5460f78518f48e7f62503aba2f46da553ba6668a89e5b6e2057e092425aa3f454d87d0cef6266d628468542f8db92517fb3c1e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53eaab55f9c86b4e0a52f730b3b830e93
SHA13e180f68424890178ab931c8f23feb29d49a5243
SHA256d99429a84f5d52e1ac88dfed31e6c94a262e70c39a9bca970901376895526c4a
SHA512c7579da633c3b606971e212b2e534b6c5874f0a957403a357803d0ed1fefe39d09427410c9cb4121c1199170af3df1a015471e0dc7ddc34f0bff4c1d24265f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5047f5bf6bf46bfaea9b128bf23922548
SHA18b69bf54e87201170845242c48b4dd0b6a410334
SHA256ec7615d39e868e8582fcc074d0ae1c2168f0d0c3d8722edd3ebf64fa97a39d66
SHA512738ce0c87d0633d6ad27bd215031c7c8240119957f4d537738454c90f3850ffc151e620e2f770e9a54f1fec298f79dea95261953fee3f7ab8c0adcd116759eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b2ddd5339972618281d93a8af8c76b3
SHA1a2837335daed9b5220e8317ef799e05f66760034
SHA256336092ff21830062ce9bbddb450e8699cb5483033a4ce18df443d0a4d01f00bb
SHA51215ece1ce13bc7dbc39a8f4319b07600d1162c2f99a61b9775b9a4e854e1096ca6388bab88aad484666399c1015a6bb40cea9c9b81e158b3cea4418caf8a40164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb7770788746045a50697cc8c7548852
SHA17f137953034d1bdd2eae150808803768c5a5ef55
SHA25606a84b5d08af174ee3d8c16586071c4a966bf204f5c18408c452d8a196375c0c
SHA512cc2ed9ef77c166bd967d11c980db33e857193a5b5e429ad1bc04935e355eb67bbfe10d816f7765d5fd8ae498eec9adc8a4104e06fb1860588e2ebbeea9b3144c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eec831a6d4c2ec8f2e4519bcf0753d9e
SHA16fec7770f2a6936b74618b810bddaf47a9bb7574
SHA2567ea8df2dbf21482115cf54a5c91e338cfb7b3d41d94e36906c43a04cb01bb072
SHA5120c6d66d4bf39e588b3de6e6fe15859658e9cdbe932358883078bbe59f1f02a606776465fc05198d5916f564b4a382d590a5bf436fbb323f5002e726157ca9851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ffb5747bb42b9d61b4ff6f7b9364b4b
SHA193138e4b5265f3ccfb251892c16e7a52387d0f9c
SHA2567ad3c0b65c8258fb6334bff77898b95bd55d5c761f4fff920e0a58639983fa22
SHA5122622959c0b29d51fe196b4b3e6ec3152438e46e62c4a7a3c125837f865d3bf1911b4d14f62e04c73234f05601cdbd5ca6e2a8684067723110f26752d40486398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3d933f1033e4a12a92a486779eddc44
SHA1ee76136e61deb8dd1d8053cb51206d32f53a6596
SHA256977cfbaeb03411ebfe4e51d47a7f68ec33a16acaf3e056d1dcc1d0e2d9dbc0be
SHA512b517fdfa992125ceea6c2324f4daf7b4669cc3b4ac431b54abfd85cd64d4bb76f1f536f7cde3f3e93afeb02530f77338dddcb13a24f33baf04d6dcd9f2971570
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a