Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:38
Static task
static1
Behavioral task
behavioral1
Sample
61291838c1ba3dc9f21b179e3bd52d51_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61291838c1ba3dc9f21b179e3bd52d51_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
61291838c1ba3dc9f21b179e3bd52d51_JaffaCakes118.html
-
Size
94KB
-
MD5
61291838c1ba3dc9f21b179e3bd52d51
-
SHA1
7d0ba138f1f5999c318f2ee84fe26ae29c594dc3
-
SHA256
4bba4dc5864ccb078214186b9a845366ec140dc1acd3c73be808c70d6b0611e3
-
SHA512
ad36f72924a2b937b5de9c102ee4804d2e38654ee2661947d9cdc065246d8d2ae7e5e45f269a2bbfab5404f1e435cdf22c96a2fd4f571d5dc4a163704417b723
-
SSDEEP
1536:WMLiNYfU1a7LeL1Z9zCwi6PVCRhFL/LvZNHIynNBdkrY8mgHC+qpEyW:WAiip3BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ddaa9d0ac5b72d17cb95783956ac57640edc0107038f56f62946aef3cdbe7ae0000000000e800000000200002000000029b89337503e5c2b796d366ba937cf2054900754139afd2e279788f273079c5f2000000050fd3cc85faabcea4e408c203a9ef49a9205a683c53d63ed896dda0bb629ef1540000000c39d4d27641d9403a5c96568eec3adb942ce1d3159553cfbadee0538de0529ef883a3076c06a2088d61961adbb5c971dc29c67f08aeeca33a6144bab596b62d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b69dce4f7b467178f0e38d2f3e76b7ee6bf5273d2b1de237003fdfd832553cd9000000000e80000000020000200000003cff6af807ccb04103ebb31cadb04514b28073099256cd715790b5edefd1dad290000000c81f6c570d5bff1e392ed49272cb1a0b803677d312878a7f39e137a294f797a70175b0b564e42d82e60b3640704b2bfbab250da89ea24cd1292747a0789c6f205bd4c2a5f15027e034a38676bc47acf3fd810a78552326f2e5151881b4b27f927a75ef3b8192054f8aea9b91ae520121aee43464ed3d7f230e99835642995052c8176a9d28b11bef24570690e6c463ee4000000074c0e298cf617a69f477041a893fed75b625abfa1e73d00e11cfbf5af4c0eda83dc1c6d9df596abf71824eb18f89a1c04ed7f7777632ef28d533398cf469436a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B05A0CB1-16F9-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422406581" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4057bd8606abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2156 iexplore.exe 2156 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2156 wrote to memory of 3068 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 3068 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 3068 2156 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 3068 2156 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61291838c1ba3dc9f21b179e3bd52d51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d58075dc9e7e439ebbe3e791a1333d
SHA105674a658500e388d5c88fd87bee76292baa1279
SHA256e5fdf4498dde4ed26eee3d44c2379c0d70f6630c6acae47a23b31e077e356318
SHA512d446adaaa8ecf6b8ae53fd2299a5c5db7226e2dcacfc54ff7388be4565c92e12d05473d46c9e97948cc7f03ba7b0a975c50873e69d1f49745ab40ee45f00f4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a04391aafea64b929c953bd53dbe62
SHA1089918e668e27f537a3274ef2605b04786d9953a
SHA256c99f55d205efc24c90dc77b91882c480c7fe91b536566291bdcd6802b699b9e1
SHA512cb775fd807e1680b5bd2b1d0ad468288bab839f0296288696174a4de02a708420091b5a494d38bdfadef61d8995385237264b7b4c9faf673bd8388f469b62c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02cd2599b169b323ea7cc25ed250e1f
SHA154acf8a5fefa50b258279f7cd0412dbbcddbca08
SHA256534c16692c1ab63b750715efc768be35f12c2c78d7becf5656af73ee5fa217ae
SHA512d2061271a76ca9ea58f8d38eed57d62612032a0324cb3de5b55830e899e63b21cf830c835640ff817ceb4518039c9302637bb5a70884fbe8cecaedca482bf963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd73940dcb192605452f8652d928b089
SHA1728d4acbc41e9f753ece5bc08926ed3c04e68ab3
SHA2562b9852c42e368515e480bfe424b5e16dc012d7edb2f2c60c3d60ed58c226c215
SHA5124bf85da1e70f8afc15c7cd08f04944a77e5d09f2f4fd43df288e207355ca1fa29639cde3b62f3c11c5e1054974605b65b2f1228b50f3f8fa803a86a32566adbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512604a7bd6a0b92e1a6595fe6c5a3700
SHA1a621364183da7f83daa88ae17ce35bfc95e06b7d
SHA256d0424b8608185cd88fc53142d7b3070a00070d8cfaa432f466b399ab0195e6e5
SHA512db8f4d735afd8172701cdc149149a797916c98a3ff0d1a7c5e8738c5de60413cebde1d3382b62afa06188f6273e442e0f714910114bb625bd4077f0ec5666671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad1e223cd4e8e7de0cb28bce21fba3db
SHA1ce1218a72a4e580fb819a76c9a0deeaa0f402922
SHA256f90031f8d264d48058e79755c9b3799f7d8a3aaab9d711237a080f805be7ce98
SHA5127398de1625ab678ffd5269c5ac312ae54013d5cbcc5b0b0fa76a4bd465e8fe18f9dcd0a4c5cb14376984ca6abef9c9d136df8d40381fe8588356083ca7c039be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df2c7f94fb9a7d678b62fc54161a432
SHA1802546da18c59590fb520d19010fe24f830e6c6e
SHA256368a20985418497685bb0741dc6fc5573b3d939e338f721f2749ed1125689c4f
SHA51272e0dccaae34fafa680816729766fd8969bbf94a20994791dfca184fafd9e1ca820cae56c29684fb91b84edb949bbb694b06e1531885a6f38991376d1b358c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d426bc2813441112c67b9608a4ecc428
SHA140bfca6a91400978630941b6d9845dfbdfb50a97
SHA256106a067f333e28b08448d63be7c9c583a2983e26021cff50854da0815a315e4c
SHA512eb7c796ec8ec5f29a712eb393c4ac086e9c0a4ace28f0affd5603316a805042c865e737c77c57385aa430d7d6ad09d8c97ff35bb24552be3b537afe6f54ddf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d16a813f43926859f60152801b01f04
SHA1da04923ee3bbcd87de2efe80f42c77b6c3ba5022
SHA25613860fdcbb6695f6f824a81f9a2ff49db6808eb7fbc939ece2cc3599e5c5d418
SHA512222310d76998a182367472609db9a53c8a779e4361d64393a2b4f44ae556825980999010fec1576591e6f92a7e378db74b4c5f41e7a18c44e355821ece429e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575873263f5e51d4023df736d5aff7fe
SHA17c01ee855418b07b34c5f4ba35ffab1f0e414769
SHA25624503b38b3ec92e80cf1be044851937905981d3ba386b97a94fa06479d37b613
SHA512b2f5e6a6b65276dae4e7a0f7157dcc396fcda35b74ae62b377be0723abb3b3818229895a59d6ec10653bc60c9c87b4535830f85038e70c66d7775550089cc50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59679c5f96921963e829bb2c0cb29b1b9
SHA1d0a23515438913c829cc16d94160a5ba53fd59cc
SHA256e6c91dbaa99fe059894b77d799e1d98e6458db4dd97c36236a6290e278560a6c
SHA512c628405e4137ae070a7df3696d1008bc5b7eb0971777ba556e0464510100db5b87237f9661f45665ef899dfb7677530628a449899d2db5333b8389b8365311f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5d4831ac054c229edb2dc1f115ae49
SHA1843130f2a0cae945e514d0bb433b17c93827df12
SHA2568aa6c8be514007ad08cc8ad67c6ae33288cc85ec12ccc4e77a074e91e3710822
SHA51295f327e126dd24b52d6aa02b550e29c55f2b9b768d5ee4beb211b444da529ba18d4b84f42e8b2a22486a603e21405719750d6f25f1d9710f5d0fd864dbc29c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b43932ba8bff0cd10a88b005768c0c5
SHA14178a1a9908bd6b9e47267e94010fded6ebe19ef
SHA25661069b5d156b078c62003c47d492069cae56065ceea1f19aae26f598c178f314
SHA512ab5a9187bc95d0bf462b415c79a1b0b4d1d94fb28e6cf642a76bd814a48567891c336e42b3404b63f4107bdfbcd742d40be9445f8b7ced28829e098ae5fe0750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544840cae00787e3c91085540739607cb
SHA1b5137ce4ac105f8ba28b46d35b1c7981f334ccc3
SHA2564c6f3d038376e980bb65fe4876e6d24daa3fedcfad2d84f0fba8ae90e4dd151b
SHA51243a23a199e6b203cc2b30feb7aef685ed2af3dfb99b37ead4e9af707ef5aec813f6523e8e83a801367a72a490e6509c28c7277c4eae3c7e43c54f091c145afd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532541a2d1cced9b2a8ec18681e6610bd
SHA1315fb6f0a335e33c06df7156e131a4e37015300e
SHA256b2a8b0063bbe4407b141ba56c439f43dfbe581701085705444dab8169bb2bb9c
SHA512ddd6e68578afd695ef90580206b61a31c525a5565cdfc58032b042ffb90c5714cfb2d34bebfd7366d61dd12c5d3d6b5eae3037120bae941a6c6f880c3c0bcce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d26a4d02af8596d94eb322f19456b13
SHA109349dd0cba68089259f8e9ba197691e779b4640
SHA25612acc40be944783ec0449d0825e1469b9795ad98393eb1cfb1d09fb68792b96c
SHA5125013f39eefd1db7546b570198906aa93c4bdd9c8a03cf4c628eff704168eb22ff5198c2f62acad22bc08a5ebcbeb61e4fc45c9b80959ed70380a4107495a2f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500d2e6b6cd1764ca3a04011c49b293c0
SHA157ab38f1b989d27160229a03f16cf02aeb413e6e
SHA256ac341fc8e442b847f92abd9e1430d9a3d062fedb21cb43b086f3c671cf50ee38
SHA512cf8eef1ba9b6b43f298a7c453754fd4848966fdd73b748bcb7e05f0fa33e41c95cda48355cb0e5068e4a018eed3a7031eb54bc8bf08f9cc76949a39b5b56e720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a106a64a71dde964bbbcfd2ac905490
SHA1ed8788fa0e0495b9b7bdba998a48c42d5153e48f
SHA256bf1519e5cf6b0a78b416a3e951ff2bb9bdb62e1134d3af6dc2d9b330167cc3fd
SHA5127d7eae8df40d6c19eb3945ff707437a6db3bd831cc00c54ba7f62ec7f80380ff1018ae14fb1e52e5ca3ebdadf7323522f0512dd5ced90c5393a74717fe83a637
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\gmap[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a