Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
67e97e0c5670293fb78559628b287bdd_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
67e97e0c5670293fb78559628b287bdd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67e97e0c5670293fb78559628b287bdd_JaffaCakes118.html
-
Size
4KB
-
MD5
67e97e0c5670293fb78559628b287bdd
-
SHA1
c347aa9ae4ee2894e847c1346f30a64a391724c0
-
SHA256
1ddbf87d35b94b05838e110405140546434ec455064ac0542cac6d54bf150758
-
SHA512
d8f81afb1e9e465acc9fd410645b8b45dcde1cf9d5b6b3fa63a301bc602997dc608e196d7e1103a4531025f7e060ad098c20bca465cdbfeb37e4840423806ae1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oVZL1LyK:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f6aa2c6be705244be2b3f4bb3bbb159000000000200000000001066000000010000200000008135797b4c6bd361d58b3a183cdb914f5b6547377a751006378702cdc71a6fea000000000e80000000020000200000001b1d5de9fb4e43cbb674d2172461922f64323ce3c183aaba1e212fad1eca899120000000ddd2faa27c73f6b123ec03e5c634c7a77c27337cc6563964190d467588dbd1a54000000099f631ccfe2b9d01b79fb27cd58838ca98225654cf10882374b8407c9e38d73f7434e8fa2764dfca71e6592a9bb68fe288684d281721a5f638c533ee09838c6a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ac8dd366acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF1A0511-1859-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422557896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f6aa2c6be705244be2b3f4bb3bbb15900000000020000000000106600000001000020000000ee887d97a3ae8f3b2517c84945461f0ff5c5745762cf4ca5fb804bf9f2cfa489000000000e80000000020000200000000b5db2d3c5dcaf588ca10d7b95672fb75f99157b7e8f13577938bdee396ec9b49000000052e41e6e08d24ff415de7d24faaf83fddda9a3fe6d4a34708ae5314430c1f1d4642ee28d291f661b2fee68725d80fb73f06c24a1b30cff9b1fdd980e08cbe232ebc29274ae0e7138e97aa52b620b1d6608cec23be84e0f60f6a7b0b1042fcd9ca33077ca20016b46ecb1db6d1f227b9b736c5bc42110ce3abd6f2cd5cdc0f641601163de4892978a1e7fd3ccb134faac400000007dafd24b967ebf8b543cada7cab83797e706d5669b5f193a451e890b0fdb1a2fd5f6c040f8ef5688a8bdf54eb723d4713b11379e293f49c330343b37f6170337 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2080 1992 iexplore.exe 28 PID 1992 wrote to memory of 2080 1992 iexplore.exe 28 PID 1992 wrote to memory of 2080 1992 iexplore.exe 28 PID 1992 wrote to memory of 2080 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67e97e0c5670293fb78559628b287bdd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e26ca0fdf18860bf0a0d6c6408fe4a
SHA13d83c05485bcecc3e73b525534ecf00a7d42e37c
SHA256b37ac01a8047a703e2de3835a4c7ac9f3d2a87a4797b2350dd5a005c16adbcf5
SHA512816256b1b398047a011bacea12b41431ed39ee60c00764d5404ab1cc248926e96352afd30a6ce7770d8bee6e78403e2bbd8efa5ae70fb425d525fdcf41afbe86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa75df23b20f128fc4a78d36a8128c8
SHA1b52c9598519cbd2c5ed45f5667c939c6af579f2d
SHA256960f0a8d382dc28e36d75e7dd31204b542eed32c9a11acc5892ef99a1b0d2a46
SHA512ce58ee271ae1223e62f44a4fb526e2b63d90dcd6fb32e11c3e529bdd2d7493818c6ca8143acffcfcb2e1ae8b04b690d798f7caacc0b13f8a0dff31a803f29aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f86be3040d4976c0d3666f3a7718f3a3
SHA1c53843c8de5e1f8ea43e95bf6e137ace2b5c8a2d
SHA256fa6c7a729833a2d61e3cb293b41deca0258bb08940d09e38085fb82d3873f23d
SHA51267a5d8e1fd27b1141c8347cefa4d2026667722f8f4e4659ad1c148aa73636ec677c70b628bf50a3122cb72a7101ec42a73238e256d917fc128333ab301f83e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3e77218e31d10d2ebce1e11534f811
SHA1a584197f76ea695b8b0fd10b1732468df46db780
SHA256d94fa2a69d2ad26cff9b50d2ba271253a70f578878ef354b38bcf8dec0e03817
SHA5127a7551b0246b1387b56f2114fcb4c6988ed57ebc012ce102be356cd7d5ceeffc5b70a2c833549a9842dbfa71e0627094e8206216d30e907f2e2091534e233261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549f6c7755a320fd30059f6dbf10099b3
SHA1aa0d7fe3d86515d62bd43d9a9a903d3b72bf926e
SHA2569ce4563b517240cb142fd04739ba2bb5435868d43aef1762b65c94d59fe6ddc0
SHA512ffe9e77f4b6a9c22d670a4be5717690d5d44b37dbee884b1fcc2bd9d7f638b1f5351665e4d3c7aa3309f172264b71b4e08983423da8b38084596c1555942b588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f12b836871aa4535e802fb08a24ec0
SHA11d6233661bb38bcb257cac1af4d1c741474d60df
SHA256a58cec2f9ec2ae819127b7d2e8c9959f71456ebf76063d43ba7cce57a82c78e6
SHA512316c1ac1440e4abdde4fe47c9e7c00c9da52196caa09c69eecd9ca68653bca44c80ca8e1a6d2cf12aea734db221a04608a5bdd3ed4503fcd1b4009f17012889c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b72c004361f10ab70107b3376d9a056d
SHA18de121ca9d32ea2014daab3f6080825007d61fb5
SHA256b80a76a5096607fe5901ec56f6b171d2c8acdbb002232920d02d952cccbdf5c8
SHA51296f8d302f6427d2d1b384e4db378d259f44ae550f1dd5986fd3fdb41dc52d24501c79d14537cdad185967dcf423a0c48b389e7f31fecdea4f65ab1a50bb522e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4440d01e9263df3a47dd99f89799602
SHA1c0dd4150601276bdd5fa67c9d3f8f38441f3f8f6
SHA256d44e663ba14037f7970d968298d8a9714606652db7fef168733e05f93f13e196
SHA5124c004afda66aff5ba2e80ccd6ce0efdd2370d34597447e31b4180ea110ff08b308e778a5ce240dc6c32e541e61cae3ecb636af80a94f7c29e4fa6bd6389b49c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ca215c6cfcf014c1f80b4718e78d90
SHA1870b06938fcd7ee1683e1a3be545c0bd3f387e6c
SHA256c7b9e7624b3258e55804dcf8c063fd63df1e68091e1477e9f3ded76f0a06e250
SHA512ce8391c02c6b68afda24656e3741bbbebd31c66c2e82881770d785e1c3a799b4a8fe8d1c20a55743d2bcfafc35800b78b9b2840ac67dfc2ea8d70cf3db32f470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d188b0c8038e773cb519b640e5dafe
SHA1db80e3b3d36920b48d71e8ae3c1eb039488e45c1
SHA2563cd92c1c23e39246ec1fed30007d6b188c30a82ac12476ffcfff1636530ab6e6
SHA5121f79b95bba16d8e5b4d3f53601acd5783094f4ef588dc25df4a5bb48bc9e02ed86b7071a31e32a41e785a9cd0635a1b7a6d9b0f8ad674c27ac22c6700a6bd28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6de8b77594420e9fc33c9d6641d30c7
SHA1e2ba59cf2d57730fe6c82e761d9b8bc4d2a60d7d
SHA25606ec1dad454193fe67d15510b99103d09a6e62a52512faf23211efd3a55ab798
SHA5128ebc863a43a0ae8aca9cc3a135a84d3005613d06fe31b462a97e37edd3ce2f3d3403e48b71a5a32c873c515bd8373db928a5e70c4097bb737f7d7e33eb4247ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508f05b59c642d52ae2850bb173e4233d
SHA1e94ee72311905a4b746cf886adcf6f4fce1b68fe
SHA256fa9ad484e2d6ad8d04e688b2fca0dd0da1b52c8ac007157e93b54df78ac958ae
SHA512e5dc777c2162e53d78e9e535a7f6a6fb0761730f9c94df6c7afb30becef33a03e17f11fb8cff92e10ca4434b86c7e69a9a90e26ecca92709b78ff657a88fc639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe03f23d4eb4a13c5cca4a369161444b
SHA1d8194f844bf859a5f555603bff2a87cc1ac9fcc1
SHA256fe13e55fdc086e3a59af78b7729afb817a71bfe0fd49d22899103926b7491f82
SHA512519088ff7693edb6c87d34245acbc82810250e983d892ecdcdbe7eaf539ee4bea26589caa8e3aa4fa0286f0c0ef5a387580fb35e54d796628079ee83991ec321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54202d747bb875fd84b4966174e1cdea6
SHA103ba54e7e03c9d4d219e6e13d3c0e522c3a26dc0
SHA256797648ea917f5593a503d229803fc375ba0eb03ba9636452c0dfea535ce83d18
SHA512a023ebb30571639f292976a68e3b79ad551a932d80f80154d5d0bdfb7e62c85a1e1f3b08e7af90ec89b70690bbe841992cb95949f1b0a91f7217a106620afc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594e003e3512cb4ecb4d02071031f9282
SHA13132c47274afdf4405335a7a233c14ed782761b4
SHA256c100a2d6de3ba035cf8425b25f0f81bf0ddfbbc0bdb605c05497157dd63d25d9
SHA51227f505a3b4a9187282760d1c89850b88474326e947ff6460316be6419a6b4d3703d0a3c8ed858b2f37f72490a4af4332530ab8a4b08bc0bccaf21e62bb3d3849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0da3bf7e12e470e61977b49c3a202d0
SHA14db2c0c465ea28246446af48d34194fd47f88689
SHA256e5ee02916fa38efbcf3052e16a64038600797921fc2c2aa7332f3c80eb72c4e9
SHA512ee0ca3c8bc7dea917b5dee848dc21b97514649c3b3662e2f0d1abbe7017247e50161611205360e8528414a35721dba0052d5654af6383227d33a6f3b08d52a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f960f04135d05b6dc88be02f11aab201
SHA11aa05b94b3fe56dddba68fbb47a0cf0e93f5454a
SHA256af8dfd99200ede330bfdf76a707e4c5c533d07a82447de04b5152c819cf122f2
SHA512ee21f39079d3cbf7ddcc549e8c8a7110d424e70487b0c9fb42cc03524248b6e54fe97523d7dbab9ead6f32e5e7583b6cb0afc0c24ab847f0464fb890c2bddba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c60b0f3e9e51c22c66330168263694
SHA1c9d956426b4bf13ffc785bfabaa8841961b26d1a
SHA256d9bcd624820916b5fe7f5abaaf68cea943958ad8d2373af064799dbcc7519711
SHA512f43e9fb3de7948118f522c12b0477f6438062d6e1fb6f147c5a324cf583c9b41f919a3b3c63db4a8eb9f38692f95d2965402568cc120d5c08466b538658c1e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b1f776177cbda1844b58d540dfa71b
SHA16f6af334246ddeb9324375f7336c2a0a4169c9ed
SHA2565d7b7730035d893d21e4643044a982869b128645b9947488988b3225c87f4469
SHA5128c66e2bbeae4aff74594f7a4b450f9df37b6f83e1a1146e2b763d2e1ada66fd3f4624bf1f1918015819dd3d5d421e031df54fcde10af33376b6da14c75df8ed9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a