Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
3ddc6c7353f6f3f5a77ff6cf4324b6a9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ddc6c7353f6f3f5a77ff6cf4324b6a9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ddc6c7353f6f3f5a77ff6cf4324b6a9_JaffaCakes118.html
-
Size
4KB
-
MD5
3ddc6c7353f6f3f5a77ff6cf4324b6a9
-
SHA1
544747d73ad954b2de95d64675d0518920840810
-
SHA256
2b04fbbe74519e7d33ca1664ea03cf12983103b17b2757cc0c5dce26c93eeaa4
-
SHA512
b556dd96c8a0ae8e73e529b08ef705aaa3d8b7c47c77bcf20eb9f7af597c66494286d331cb80e20e23f365507fdb711a801721d4aa52827375d1a4ff9abb8afc
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRbcsJ57:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f914b4f4a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000028b43244eb7588d88d6c91b61a6c171bef69144849727e75bc7f640810b981ef000000000e80000000020000200000008f3e8126a13f37da238aa9fd01c0afbdc11a9200f0596aaf1770855d6f58647f90000000f117b07ddeb11b7eff2dfb7eb91b788515800236dcb2dfb8fd7b6afffcca7c66fb6f2bd5283fbba67fc293f1c1e97c35837000157abf330a0ebddc907e4b2a125bebc72e86b0b512370d931e095e4cc9b96e18bf2e326458252913528ae197d1ce1cf4b40747cde536075fbfa4a036008a210b78239751455582b2236e8fe539232b1aee13870a7c6cb9156bfb1b5f6440000000f118350639401217928206a18643f6930b1a12ad4306e992868473ded2bcfe01737122d40d23e023a0acda6305c4399a3f40fb5f04d3f739e83953ba287a667c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF6A3C91-10E7-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421739222" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000437cfcccf72572b58a9ab35ebc580b84f537d35ed31d2b07cde10a2451cc6ec7000000000e8000000002000020000000b69a830606040d0394aa2a2857974b5f4efac657cb64d62aba17938f48127ef320000000bae091e617f59b78ac79fcece77e22f0b918930267ed83bf5aba02c779df56dc40000000517f06f6cc9932adfdf98f59b8896d389b75a713f26945775007bfbef5ab068948cb0a353f3f0193127c9d2ba83c1d29f396615376ec60014bf70add50d3144f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2308 3024 iexplore.exe 28 PID 3024 wrote to memory of 2308 3024 iexplore.exe 28 PID 3024 wrote to memory of 2308 3024 iexplore.exe 28 PID 3024 wrote to memory of 2308 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ddc6c7353f6f3f5a77ff6cf4324b6a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538ce3efec05bfd011cef63af0f90359d
SHA1e010461b792152d22d3a74d5077377bacb1db46f
SHA256dad3d45e7cf04f9348e5e8eca52a0ab7702670978dd5e7b6e168e7be74402c09
SHA5121b099bc59ed3b2a17e4f7f232e9c7330e82b0b079a6ec5e9051a0b720f1289113b1ec5025748c11151e64ee27f6951dd90ebc9378bcb16e6a394625ae2d03cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf61f6cf0353b43ca54007757d69a12
SHA118c1916437f5da10843a3d336e0545c0a96ec9d8
SHA2561c328c9eb0deb0d05b15067534f3b6001f4c741a3a43aa1a93a72112ec91841d
SHA512357af98e167c68f787b326ce4e50ee46de401044dccaec23c09e5185a31aa3a84f4cf464b7f5145f1c02314ceb9cbd63d293df7531fd379cff04423cbc558b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f418d27dc8b7fc81da7829a09ba74df5
SHA12c64e6ed73773388f90aac61d0c70d957af2adfa
SHA25675209bfc8957c80a5041021c9e0dfae87df53987d8f360c7dcfbec29bfd50d7c
SHA512d58971351be2048a2201ca13a8aa5fa56af0ed632fddd1241f50d0c4ac3bf5da4066b3aeaa01a3a9cd3ebc499ba3232b668ce714da9974a32da19d814292ad70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b9f0fc23dd7916c18e2a41a25ec483
SHA17fa4f04cd55a0a44392899ec987aacf58933909a
SHA2565e0cd17c5de9f8bfd723c431986535c615a0dcbd8db3e028573cdf03047f5697
SHA5123b4fe2f580d5a0c240058360dae6f7b318f1d2fe7b7e26a568223134e00e570197ce4379d71b9c0686232443bdcd763b62009c16975e78e3db11e13cf61f582b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf57eb711ef1197dde7d7cd1eb8bf238
SHA1a1b8c4bb58e5e31a835e0252a86a7e00a7a5a1eb
SHA25621aa4c3c4d7a5a7eb789378850fe29f8ffb43ab17954c70fa00d4cd57e4d89cb
SHA51232728b75e906f284107a3b86a4d0132053fecec316e1452e7684c20dd64a4de479fbc220ad9d831205d786ad319f03d74986f70f821534772104a41826701bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526098d88e7294a7d93c8997a3a809a54
SHA1ba52cbb25887bdbca29722ac4772f5aa36c0fdff
SHA2563b6d2c2e91e3c52a0120747986285534813be17a6e7a0bf9c316d274e01e18df
SHA512811bb64b3e061b6ee15fe0d2ea07146e860c6a3cf91f841ac1a8937b510bd7d19c772e0f11165d18e6e496dabcef5afe2c1c0774134c128374e6b8d96786d219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f531888da2207cc7b467921b1129b54
SHA146667a2034748f0c5a3a438e3c845026debd16fb
SHA2562d2f151e361d378eeb052a2810ce9dea58c26dddc76c4e2af440c3b124fda245
SHA51208ab069d4bee76a414128049895fc7fb5911d9384abedb98e77b91e42e1fb398a136055b8d0191854cf49b17730f095c2f34ce29ee0c2fb790107db1796824a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b5dec1b6bfeb268ee0123888beac925
SHA165cd43c6e4e0d2afd523bc6f4102aa5772d593e7
SHA25602f98676aee28673ffdc4c49374ca547a61fb4378edc4b9507a0f7887f8ef32f
SHA512968d9faf34fbc417482017b8b130233f26f8f29c29012d8edcf9cbea9fef07762dc69f41994f30e4db30b75aa1864f3a5faebcecd99b2044c9ecfd471a91d148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced37b076058865a05cbe148e5ba9f1b
SHA1144ffc2ef0ab12efad48834e8c548c9876a76753
SHA25685fb1c681d496009cf9f326f3fcbd7a174376e94f472b13a8676468b582cb3a0
SHA512411afab5d260f1dfbed88a5b85e99153ec088ea9e4b5c3b9328d79b90df10c78ebd808115aa6a64d7df858c97e1d0db2b822b6eedddda963afc789c63655e654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb04adfddbfde7514f083d78ff8f53e1
SHA161ea14cfc055afe88b041792af3509dee2ab3f66
SHA256653b0ff196bcf578b3f7049dade3f6eb65c92f13130bd917dba844e2f2c3d9ac
SHA512e473cb92012549a4f0e05c5f95cc0a97a3fcd625f2eed09c73d3fb0e3c48eb3db78f29db7291a02fef9ebc90ea842ad80e7b41811d508f4604a734f82dc78572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5630a55926a5dc9b853d1f1181cad6d2c
SHA1f2eb7458cc77d970174443d1a97d358465058d74
SHA256369f329ba14582030762555b6ba52607ac44943b9e4453a4499c3bb2b9eec6ba
SHA512c9a8ca7a145d90b0d79051c31f2297bbb2c7b505d04b2eb90f594ffb324e13df8746c920f8ac1601653649549b8d2c7f6dc0c7061f4f0c1f5c389f218d8acf22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e1acee0d547247a4bef9d05ebb4eb70
SHA1fe152abd89fc3af890b5a7cc6b1480cb500fa5c2
SHA2568e207c06af0f1f34abe9b38f32ec536c324ee1d87746d7c03c1bec442f491cca
SHA512bcab5ae67923b6796a9140aae5d6aa6074c4a045c4621598b111ae8b0081c99e5327a4ac47fc2dd55576062217f6704dc3fb209fbb18f11c1190437755a75970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55340a0715f406df134059d6b488756f4
SHA1e54eae62faa156fb24b305b876580cbfa8a96198
SHA25614439afb9e5b4dd24f7259d8886cab5798113d0291cf6a64e9c792fe0004fab5
SHA512dfe082212d67733aa9b5a3e37b6d4dad1d2e7008390d719c8d5e10337f24a1afb63e890fb9bde949301ee80942cadf32b82adf098f2b0ce99f5436b718fee207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0bbe8f7c68a6949613a646d59aa42d7
SHA15a82e6e7c260eec5019990dee5157613d1791c5e
SHA25695a163a997f62b7ca47f53784897ef95dfe4b706afa28d869af0733602159ac0
SHA51274c356076f97f5d6b4364b947b09a49b7b5a5c5cbf1dd92f5b2014a8e8aaf0c604aa6d395e3c7faf955437bd3de0ff8532ec4147aaa23dbde840e08da8f0e901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070f329d2132d9d5236d6ca60f59fb1b
SHA1cd5b689e5f557d93a9d1bcb7a1c711b19b33d620
SHA256c5d7c2395346e23fc0ab07ee45bdff11d18a4d297178cff403a397ef0e8d70a3
SHA512d3a80944744ad162a035b10ccbf970531c437b71457ba672065db8dafa5204854077df473fd9dea7253b6fec7962e0d661bf24a18252eaa75c7210b8cc425250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503fff2c79c42b405e5bc546b1c430b56
SHA13c6c0548660db45f7a44cf360b51251bd19ac14c
SHA2563bfa28cd8ccd64bbfd41fcb756b5cb5064656cd5e3af387db2a95ac7ea68120d
SHA512490d35dbe77f51c0a85519f1397d9c2f568a887828f6a86af4ed031a8e1f03b415ebd2980a9ccfdb9a52d2b8bc85e6b93571b43f5cca8782c271198b9c76fe18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a73295f09b636b0f64eb9ea6fb72422b
SHA1f20eeb650cfefe714f01617bdad2681d2cb21512
SHA256e9fa4f3a3475f8ac7da900253cc1b7df951d63b2b431e1a97ef9fc428b4fe928
SHA5125877f5f5e3b1b44b19e264a91836e15364fac151ac08934947c1bd56c0d4244db63f1025046b4d5d63dc3c411d6fb733cccb426e807fa95b8f0c39156bcfeddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55781bb8c9ee41ad3694720815f57b8ae
SHA156d7302f81731cf5af0c0b9e6c985f1633219e57
SHA256b5d95e56353866bedc1f59d33b1eb7a07fcc9fbb1483eb182a339f9026be5668
SHA512193ce457d94d2ec209f61ec037dcabf824ddc8cd877a4ad9a931d2772d878dc5b4f04b6a19116e3fc4193c9420a9964fb089070fcd9c7469ac3aea9389b52e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506c86a8fbaa0aa0b901f53a2170fac01
SHA1b3b819c0652c37c90bc9daa42a541da8c370c50f
SHA256c450db95307930104aba782c4fe7ffe8474a77be158110f7d1f7d6ce0f6c30ff
SHA512607368d3a27279ed1bfa20017299dd1fe5a169676853958c6c1ce8da589d5a768f158f3ea9506837335ee428c80f240133ecdc1ea6d297b0a7b21b52c21f11c6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a