Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
490a22598b5662c8a027a150330e63e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
490a22598b5662c8a027a150330e63e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
490a22598b5662c8a027a150330e63e1_JaffaCakes118.html
-
Size
4KB
-
MD5
490a22598b5662c8a027a150330e63e1
-
SHA1
18d3d117ffedf02c34be806623093c4fc1e1d43d
-
SHA256
23bcabe638b8fa5c1a667b5b239c8def5fc39aa0d50051d22601ceda106a26be
-
SHA512
acde938f05afd5f66930139ddee8e4bef103504b9fa3a597022ddefe4dfdc85c53e970e1b5acb87dd87d0be1b6170e25035fa2546a2c24d929c2ac0d901e5f57
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8omZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D65F9F91-1327-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009711bb7c2644b0adeb4739568a5afab8ca427ce32ea221619d4870bd546f4fc7000000000e80000000020000200000002f3fe13bd7b3fac9cd5b7b5cb1ca58a47b97767957500b5d0de4fa7c46e8f99320000000ca8bf26e10975d0c7d0212eed4c44a6ac449d725c6ce586d736a5dc077699ad04000000099fddb1aed9ff346978d428865fa62f7814092d0e4ec6435065537c8c5ba677d06dae56c4081bf0163771aecb9329714ed43046da53ff0a2f70dcb52ebe05084 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b5dcaa34a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000073997d8d0ecbca183db3cd8f74f33c6fd9bec30233d980cdc5c2fa355d8d585b000000000e80000000020000200000006885e952d82ace6b2ff4fa838c7c79d948961ea357e0a10eeb71dc564f87f6c09000000083892ceece2f6d84d8e96f4764ffed54a04c6f38ad4c23de7ca193b6e243e7e01b8d0488d523c23bd80919f77851627f6200af30abe98841ffbfb1c731404db832ab28b7945f888480cf139bd50e693e8ce5a39c4589f58d9add2dc5a7bc6d341d23df0be127ce8758a6292556a7587d1c30f655163fe2c13b8e43592f239348256741473189f7e2a465e53caafda8f440000000541c88977897702f592b5675eb1843ea376845b940953c5539e47a1f6362581ed9efed93ca3748bf640d219a3e83ead1f788ca7aa3ca3ed7d78e3139f995d4b2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421986597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2512 1044 iexplore.exe 28 PID 1044 wrote to memory of 2512 1044 iexplore.exe 28 PID 1044 wrote to memory of 2512 1044 iexplore.exe 28 PID 1044 wrote to memory of 2512 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\490a22598b5662c8a027a150330e63e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d04a50b65f44df1e2e56c1e2e72c30
SHA1d21c7ba1c2c5404dc64cac440ff348e39b04d459
SHA25614a116963cb7f2ab5f9508d427b066fdd3cdc608f5509429606b0deefa10b833
SHA512ee01e37fd11b92a83dfd55592b5f77451af6c460c08d24f6ba2c60cbe018f2a711ef9f9d39c51d9a7a8b3682a4caf623b644459d2fd5241f2d36b4bf2162e987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c5b1e49f919d8a08f91aa77d01b0aee
SHA1e7e05d4308251f904bdcee7bd48bb1616368dc87
SHA25679453fda2c1761c48fd31fa6fd0780275730f5fee88bf284d20e48a662006ef7
SHA5127534810d6987ebad5dfdf081813e9d9537b1c8c8617c9aae569c49b639fc3e96d11a4a48f6f8445660ef0be9ae5eb6c61ca098dddefe82fce26259a2bdaab184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a28b5696404045223c5b420b42090de6
SHA13162b6cc064e60642e6940c69ba675239150d507
SHA2563d00e22116c7afb7ce7cdecc41299419aac43ca6a6b55cacf69ebdd2ef15cff7
SHA5129e014333b5015803fd048b332d8f66768e14ed60a8e09eafecffdd66a14ce13c358c2a4f1a2bb8786b8292c04e83fe7f4f6256f861a69038e161cadfbbdbf00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a00a2f6bb6db8ccdd9448df11dca0d6
SHA1256138d7ace44e3b5a243c6ab2a53263c42520f7
SHA25660bf8ecc281ec49f9f5e37715e4b92511e024b49cda8d0c21f31c00b3c57cda7
SHA5128e9c3803a48e0aefb1320936808dc182abff189728d569d8680b35f52b83cce52847bf8c319666d62608f405ffa5775f82e7b377c562be983bcd0fbb1ee196eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b9483cbabfc5a1b731d3e02ddc64eb
SHA1b8852f746342329bc8820df068a36b4ad94482d6
SHA2562e2fc99d308028bf7745d31169a6d5dff0c99d4e440a927c4eadda45308cccbb
SHA512cb94a5f60268f5125f8256f30ca7837523cc2ef5d676009337eece7701abe9b1eba3f307dfa0d3dfc793e59a307d9529c7834251104b71837d442136ba6d304f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56207adf21fa27313f421b51e7b382586
SHA16d977e8f06d6fdd03ec073fd935c3bd8113becea
SHA256df58d695176568b24d2cb9193bb0c749970b3289bc76a68c94ea0416dccbe2bf
SHA5127ce1310aed71e7c1773de5cdc21fd0abc60868ffc02fea4b1f51bc3ab812139d30f1a7a10495606e98ca972c4902e3058d2fc12b9a66aed6f89393178b85185a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b34cfb2d7baf6c1a37b72a8f89696e
SHA1a5472d3ecb903213dd7c5077880c901b3bfdc80e
SHA256a6a894449a481d36d28ceff2db9a70e3582d3947fe264a91eeec64d7fe6eb96f
SHA51202b4e9bc7a2a0e1eb9a2c207efe1dd190cfaef1af3d1b75696da7ea3f479b4e6dbc1d33cb59b3aa1931510e59b42ef7caeee1d5fb2cdb7c12e052844acf05a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd1d1b84a855f7256a1be074b1c2b6d0
SHA1f88c6d9687adbed6805b7a793394644525fc178f
SHA2565f9beb07a7575ce1c83257d1686d320f6dd27c4289813c35b0ef51f96f8e0803
SHA5127af776aad45231536ef64b3aae6232c5d3e16987b3d7e5bfa0c6faad210067c50f6df56a9e2c27a2c3e54f3f98b9c74cdb9525363501932ab25a75df887cc4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5362ce6b4720e731d28f572fdf59109
SHA1ee845510eaf2ca04e9895e67f9001a6c47a44c30
SHA2562ad30559093553bae41bce43f15b6bcc8191c2d39360ba0df0de31dbf90bd1b8
SHA5125e4dd9c9bc6188cb2614edd1931ef4c2a974bbde4fdad9d2394aed5d0deb0c5d6e0d210bf6f9d0d3468fb53ceb8ca3c03dbfef8ca03c7320a904028539c9f1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d3bd43fa6c779ee467286a836a341cc
SHA17cfa479fe0c332906afc828497899a96296aaaa8
SHA256588b5099133c8d17e960d5f4590a830765318646d4d0210dbf77792d00f6613a
SHA5120e04bc0d77a5f0c1f5879687c751af321ced330920624e041cce6de9860db7464b9e234d5f5c794f04043579e0bbef4a288ca61b54f73c7bc5745369e2a7805e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc1e8877094a25e408b4970339c5d74
SHA1b98eff09f8e37db13c90f7a81ddf6e73a986b815
SHA2568d8a47de05689155cc2c8d9c6979d8a5905e740f2efd51ce3bd702054569d673
SHA5127730d5b7febdf4e0185a69b1c7bac5fe0a254013da06de0f5f7fb32a6f6719543494935b66186bcd5b1ac4eee8a790e6e1fa16f81e80a40afe07981c358989d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f39333f31f843f0e24f0c8419ef26709
SHA19efca325b90338c532aa06343106709ded4c5661
SHA25677c7494b9131a9ec500000227d44f61b6e83fc35b2275004c7e8a02ed8cc8d29
SHA5126b4e4206c429e79556c41a5e3f41d55b37958e00dc555986d0bf4889e70d372c8904c8d71c943217c7a8be3e4a539abb0a338c3a83c037ff67728874c40dfa99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57705bf1f6c6c5e6f63491d1ea907b097
SHA1b42a87472ef02a6f4b23eca0a45e03f0326b0fe5
SHA2567a467fe73f7715b3c368b02866fac58b9547a3ae967b5d86e9e93d975f3eaa86
SHA5125a35c9e6e26ea1a4302f8fbeb82f03db0c2d6bd598c8439825a3c218a9b9d0d679995c9f09206181ca4a63d416eead684d581db7f18b84a6fe44d512f94d533c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566976b6cd1a8734b17ab5c7ebaf9d0de
SHA1e507907c11d19eec2dad1d0946e7460ef10fd627
SHA256e8148ebdb69ad2f0e396a6fcdfcb6289c81b2e7504bbaaeadf67fb556a741e49
SHA512e96a4dbae45eca98ef75593245e5a51d86bcbf87a7f0011169b4bbada7692340c4f6787efcecf627d60a4ec879f86174f3f7a0fcec6830dc585e9949038f41b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57347ea73d5d4282eddb2697fb1d8d21a
SHA1ecb1b3adc520806c24d22c6b6493d502ca83390f
SHA256e30dfaed8ecc4be563b146a3c0312794f36472fecf2263c684ac229cd8dcd1d3
SHA512cb6ed8dbef7a204c2ee50380b9c4257bf55068a235be5e2d518cdfd2b37404fb67c14cbcaa21399eede3bf898edac05f95132be6f1c9e8123ebc7c1314db5f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58333d3552ed1e6d6d9017376dbf823e7
SHA13ba4c549d6b7ce4f5d7141a842bdab71f43018b4
SHA256232241e7401d8e14b8eb259c1d6a52acbda7d1a9f69070c18f93e54b88273457
SHA512e3cf014983424e8fa777fd53a2f76e2a38dfa748cafccce633674dcdf5d6ea12b156247ab7a3fb458a63c870ec66e08007077704f99cb383d58ba23f7028b10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c464832b7c751d2bfc6b0762f59fe303
SHA14dc6df17d3ac69cc93c5f1aa073fc514e6c6fd50
SHA25663ba45ca2f4bcccfd026ce2be242e95cb4bd49b19ee0d08a2131c5215ba67678
SHA5127c01bf0c2f5eb86e20a4438ee59c3a06b65a8bb442542e252b8f4e1c4f1d0bea695cf66529cb197c8c4b67c34f631712c14307e0688648e3c0ad9a05f8dcbc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1ec0463314d36d3ba3d1f1c1c6236c4
SHA188c60e29e6e56bbde8fae44c89f63cf9373a278e
SHA256d071b923d01e90552c9a8ec8da4d6582f288eb238e5e4ba369dde2f518364699
SHA512c416d30c4b2493f5bbfe9114a565e52af3d3c4a2700d2be380c1250d25cbc68967e4c6c61c2c817be30646fc166aa239c85b863305e5c94cc11ac210a37580c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57512c435fc933528b2927fb7c0be9173
SHA1c579a376226f4e54aaf74c485c0cf4975bd58199
SHA256f902f66819d614b078dbd7bf4f3b90a9a6655f56e8a4d10ae7527694faec7cec
SHA51203b6c0d1bd43d2c664aac2c246bdb53ec2b26931385cb2cb6dfa9ea9e9ffc14f61800d0ce90e66f872fcfaec1b74e5d0d03d6ebca847db13347d8a4154399bfc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a