Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:40
Static task
static1
Behavioral task
behavioral1
Sample
63fff51b7b5a97edbb9f442f21bdf476_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63fff51b7b5a97edbb9f442f21bdf476_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63fff51b7b5a97edbb9f442f21bdf476_JaffaCakes118.html
-
Size
6KB
-
MD5
63fff51b7b5a97edbb9f442f21bdf476
-
SHA1
75518fc2a93a4f0b9406dd4bb784988a9775a96a
-
SHA256
ffbdd7cc72655636736b00c556e990f99cd5ab46b28b51f8249edd22d1f12db4
-
SHA512
31f0de255ae3294c4294e4a1cc618fa178df0d7e3dc69248c89dc36e8e3bd0a5ee777fc608ce21dbe7befe7d2b3828366836faeb1d561b8575877da1bb5f83a5
-
SSDEEP
96:Dohb3MHTbyYYkuLCcJ8HJKkFAS/GDPWhWJrwGn:Dohb3WKXD8HJKkFX/GDPWo7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D844E551-1790-11EF-9371-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471503" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500fe7ac9dabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c4b2abb1750fac4989952beb933565b600000000020000000000106600000001000020000000623d519f3e6fed8f54a110e3d4395498fe524482414ce182a9687905f3eb5cdf000000000e8000000002000020000000dfa80874e6a3baf6f70fef349992b93c73af66b36b5ccea402410d06b5e6f107200000005a48f83eba4ca3b1c664ba02e714e4409988cd6898dee9ef131787657ecdc3d340000000eabf6ebfa0b2388f2730c2e0eedb0b953bafc3e259a594440bfaeb7d331ac20c3c40f1bb43ede39603744ac36ebba9cdddfc0baa7461dfabb1832782176001fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c4b2abb1750fac4989952beb933565b600000000020000000000106600000001000020000000782cdf45f605ee1ca41e989fd53930ca76ac22e63435bb59a6d75f6e4964a06b000000000e8000000002000020000000eabf0dca557f40db825ca2515f33d82f6a31eb75a44e5dc0135d6732aaaed122900000002252dd2c2bd91f0897649758205e4fd768d58b11425bb4c53997dfd57d75d833ce0d5e13ce65e6a9b1c5c0120f04758e0ee1006043f064a8fd2b6afb2b30011e3876a43b8f6ceda1cb8d30e77fab246f25967f3661be4513a954d0a4d79efd06a1d67ebffd0c52dacd7516d86acdd4332e986228a624496689c6879172ff1d4ba7fc69d16f40c97a9e36e92bd7e9be0c4000000042ecf8d4b286433d9d5cc97886fb06aad41e10d63924a74678e855690318ff2ea0d934eb8a5d00aaaf28484686e86e8dd0d11002672866f77cc29c4c5421e193 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2100 iexplore.exe 2100 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2480 2100 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63fff51b7b5a97edbb9f442f21bdf476_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faa072e574e8d6253c2eb1848cc24974
SHA162134cf4004e6a70caacc73adee1965c255ef02b
SHA256f4c4abfefa9fc3991d5d9ab9ab88181c7401b4573c693cf0db2232f64f1d173b
SHA51217454dc20808a02ad664d2a2b6f553a6e8ab66422f4e58dbb50882a3b7865a12236c4ec45d62d7cfe2dcd2bfdf62699574b2f14933eadcc3a01e7fd08187bb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e037e3788fa058659f630ba27be0f40
SHA1a52a706dbcc64e162ebde9dc14bbe147a09fcc0b
SHA2561e2e3b24d3504dddb4a4ec27b7ab693bab2e3aeb35d87bd25687784c9ea0cfcf
SHA512ec0011ceb427f85163408db6b6405a887a827cb48f2341aeb85feabb2ce170e9ccd024ed4b9df63d9dbaf700ef2227a5bdb6634ca527e515916793e335034dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591cf33eca6ab970769e4a1f71462b2a5
SHA1db6eebc12b3371361ba61462c3b998b201b9958e
SHA256408896f71747d7dbeeebf68eff0a76e7f8234e6fd0827b402ac0dcf385f12cf9
SHA512bdeb61833d6f664dfe942387e16ddf1573104c2000d1fa7ee9304f2133aebf5515cf1ad22829fac18d39eef06c4d16333d542f3f82cb99f5c2e7b61d013717cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e7e512148ad922e62e83fec7527652
SHA1ae7c0208d2d3fd130fb9fb1f0a891acf8038a7ff
SHA2568385b7ccc0ca4e5cf2eeca890db1d804d4a5b44d331f8e1c1493038e2c152ddc
SHA512b0910ea3d51744ddea3fb96e2640cff998fc9e0856afd194004af4776eb6f08a2d516e160f25002a0c43d8b022ff848bed47da5da0a5a05b9cc7fa6b510f4ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce89fbc01d4b81339a097d2c4c20664
SHA1b73409cb484b3b7ad6fb70f937ba705f0570b522
SHA256767c9692216fc5579d308aba4ab04c3e53d4ac0b2678f6deb51f649820ccd4fd
SHA512574856c93e32e2634284401aa8b2d3a43059a797b1a96a7020237c2b64bab06710842a200ed3f31cff61169adb14d51299412c4c1915c56c552c4990d4d8a7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7a41a4aaae50daaff9726a02e9b92c
SHA15df51bfca57be8ca4a180f76e9ebd8346e717398
SHA256eea9186286ac0346fa0cb475c6e9e451736f07fa1629488e41c9b11ca4bbd8fc
SHA5122e0c943062bb5647336d96d3d8db036ea3663d132270abc7953da6d0bc363f8424a931e6499ade6c5aefbb5ad801ade29d60b7acfe9a9bf1588ab61cc82046c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5937169b8dae4fda267f8847769cd02a7
SHA1d3dcc137e658084d0562db82517a5c505dc11881
SHA256f02a7acb985022029e44d9181c474298512e55959a80f674eba53fe2477332ef
SHA512cc324066a1fbb19e28753aa06a820dadd56736ad5486ae0e00a2dc612a587437b6145b2ee0e5fd358cfe82ef6af85868f769cd01df7c322515c42e757bb8783a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d55d33bea52fc1fe16debfda91241ac3
SHA13ee760678e505733d33619c3613fffe9f264d1b7
SHA2562599f700731e94b8b2433def3d9f70c049dec6c10e64fe424d60f8661157d91e
SHA5120ee67ae5ab2797b555fb1b0cf5e59ff8d4cb77b7ce7ffecf576c45c7500582eb19cfd70addf51ea81b34526a261a1d0938e3394b17703993b14b7ab165d837d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e23f2e703417f50b5d671c6c9c3296b
SHA1cd2bafbd16312637141e308d26860a5c7dc94137
SHA25604d6fa962999223fe45ebeba4394851b4f92440166a127667f3a65f69aebcc2b
SHA5120174ed29d11419f4a97277a5e961729c3e081c496c62e5329d07bf494d10576d2eeb6f0c7caedabc062760f1daae59438d1285028abc0664dbde88537005b4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff702c391345cf7d2372ad702746954
SHA1cc7fa2918955aacd6c901b30f08e4e6244378441
SHA256efaa2d1273906dd4dc8135015a36a003cc6affd4d14b6aaffc930fcb8333abb5
SHA5127f5d9438f4376a4a465a53cb788c81c9aa0facf47deb9f865e420afc408ff189bdbddc79e4a498d10a361aa1d0515656b296cbe18e8f08e2d4d7ed1606e43f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d32d9a606df27a3b0ebcda137c85e12
SHA1f35c2f350abaf822e3eace28cff180d5066acc8f
SHA256e551828d631db57394dba076411e3a7aaa547b9ddc8e52edd7640b08edf7b250
SHA5126e45aa2f24b1fea3bbd8ca48ca310956513e59950e1a13eb491645578463ebf889ea1721421062b9d42e062b7984b8557ce12d1b7c96736751effcc9ca5d3eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f3bfe4f5c8e511f4c0798c2aec020fb
SHA1151d772edcd45628eaf2c3cb0dc319f31182bbac
SHA2561b3ae2aba2864cdb1c23bc5897099e582c9681cd3171742a8289e2950c0b6a06
SHA5125c6e330d1298507618aade0ea04574071bdb6a2bf466930320da5ff3fd7d33f7fcb7f4581341bd809624082ed8ffac4ee557dd9484ebe2e537bfb7d79401cfa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aabd4806615c4d152e6d3ebf5d76065
SHA18f0970604dc79ef18e93bd306db5f14dfdc7b61d
SHA2563eb421fd6c7e97cfe917c69089f3aa2ff7efd3801926ddc23975fc10028ef298
SHA5125dd05530b853133d6283e9fd250bf43d09a606772f4f8b789d329d39bf267f83c3ea5d00080fa51b42ed68c2aac15034769f60860490e15c771813ff248a1cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c93e0d198dad0b8297e6e87ed6166e
SHA1e48eafd9dc70984665a3b06cc9fcc16b3f6c99f8
SHA2568493b40169d67fd8c87a83bd4f8936017974ae3be6e7bd111a6af21bdf8173f2
SHA512a6209ab533070921a21acb3383c21c2f5ba3681a9d50d99a41e31dc32e190f231923e5339799664ac8cfa46d087561feff0847f847a503aafad8cf0bebf107a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201491652d2cb19a4d06e82df033a925
SHA1d4bfacc7c438b13ac9add1c0bf8815e801353837
SHA256b22299ddc6d4569d9bb1ca379d8c9a38158a09fc7c893ab8cbb883a0044208ab
SHA512f214e7bbb4cc6a41dbbb7346ea15a9d961f258597391a590ee6331fef96b207e53b94f3aef4ccb71b314d4650dfc29fe3d14e3a134132e558e334f8594bb370d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582dd226c1b48b6dc91d8283cc067dc9a
SHA14cb31c6e34781cae543c72a1b9d8859b4e93a296
SHA2565991919d70c1007765508158c589e1a4875bd5f6f3fcc99d43382d30653c7f64
SHA51241360bb7e7314147da0e94e9b6d565c3f7a5327c6a4aeda0fb56a701927735b826745a39815a084f9f172d0ad8c70c7a0eaeef0553c94b5408616a2297324769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5d61f4c775a9651802e4536be6aadc5
SHA1e904f5ed5c58680c9a7e23cc40fe659a6b5d3601
SHA256becab63f114e6f0fdacb6fcb19b721381268cee270217c79d9fd38428612d62d
SHA512d0e52de3a1ae21a284b002266746fca39324bc7f2db689653928e175ac55de9a25d25846ae11393bfbe4640e1b50926db35a9c66d8778ff1453c5b24fba01782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53abffc78be9950148e33ac4f3fddf5b9
SHA106ddea6414f661081ce4d35f94b678f5b29c18c1
SHA256e10a0424f88af891c86194564e27f5cbd62ad9293c350c6c14e7b21a9cc140ce
SHA512ac2ab021196b27673b86ab1470a33b813109c41f29d06c86e5ebc8720c644b91707baea71c7efd982ea4c6f888ab3e2af715f7f209a9425cc1eac47b0fa6880e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d6f28bb6e0986c6ee938b786020cd6
SHA1cae103b46a95187145c288ace343a6739c786d7d
SHA256db97e4c6e8b63e3392ddaa90dae293dd68956b92311361f398bd618089be0d16
SHA5125be8e968625900ce4d9019048370f7f4c8fe9cb281487b51fd48da661ab34e185ca8bc350435484786073ba52ea06ecb27b69dc11abddce9f3aca54d425942b3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a