Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
65c88e9304218a5a029c59fa21fca0c6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c88e9304218a5a029c59fa21fca0c6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65c88e9304218a5a029c59fa21fca0c6_JaffaCakes118.html
-
Size
460KB
-
MD5
65c88e9304218a5a029c59fa21fca0c6
-
SHA1
f655513f0d52bc96f972a3e979188775ca660037
-
SHA256
7279141da38a25ef32d569a67b4fdaa3239316d285eef08d633c5ef9208d710d
-
SHA512
ed896137cd8fa5d26f4849ccd00a8846abccad15423f0210a795ec987cbd6e5eda20d99ed74f0ec1b7147106b997a6024484a08c9c4c8ec93586957d311004cb
-
SSDEEP
6144:SWJsMYod+X3oI+YyDQnsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:dV5d+X38O5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508717" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E279C01-17E7-11EF-AB14-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dd34736b82a9840abed7b5693a97d7f00000000020000000000106600000001000020000000922978507ef267e043427875f2eb2dd92093ebbb8ba3ffeb105a29c442f0aa4a000000000e800000000200002000000094eed48b9d5b3c66fd58ce58b0cd3cf5e168a3d06a8316b8ab698fec00f35c5120000000972367bc7316b7505269d104c2db15befd47ccc121818a8b15268b396a75f761400000004dc85597f3256797b2f1a565edfb7a082ebb04f5fd1420c06333874aeb47eb2733b4d7b8fb79cc643d144ce073350ddb7a589ff9c6003c3c3e66c562eac71908 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d044b356f4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dd34736b82a9840abed7b5693a97d7f00000000020000000000106600000001000020000000d76235bdf797dffd6ee3d4cf973400c844427c922eabbb362646ae55ab3e8e9b000000000e80000000020000200000002aeec8573bb5ef8f5e86db8858f46788f94d46e6dc8f8cc12445cf166196fbdc9000000056230c9bfb710962e7d98d5a5b445f2afcefad1468498759047d1fcc6540990d06f639dc5356c3b2f963b1437e4ec8490888ca8a21897351336a2bd1a2cddfd0e7f4addf226cf8a8c9bccb0ad399205b562cd52398340f94b30e9452d2a55d8f4bb283cb197a91cdf10d2249e0ec18ca91f9e0052e915c507e5055c6784eccd37d8d9edece0cda9362eb646227b17ac940000000c828a39395756f054db2fb3c32b87bcfd6cab61b054607c72573d3a7c98f30098b47a212b2189c78757b08554f76872952c54512c799780337139f3154f44c19 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2612 iexplore.exe 2612 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2612 wrote to memory of 1688 2612 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 1688 2612 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 1688 2612 iexplore.exe IEXPLORE.EXE PID 2612 wrote to memory of 1688 2612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65c88e9304218a5a029c59fa21fca0c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d4085e6f3d043f99dc032d02d7edb78
SHA1b94fa9eb71dcdeea26d965a6db5fc089b8e06571
SHA256eb7422e43b50af440946881ea719164e746cb3dbc979af498a99ec507f21dd5d
SHA51228edd718856c56befb98cdd390ec25151e481730986751fdf4645df0ca981f898230f02dd3532f22e1c33acea313bbcf2f3545ddde695a85a90fc0803bc144b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769ea4093238466d9aa89313ef597d54
SHA1fe1f78166c47e9d0aed7708a4f0ff03ac543abee
SHA256287aa73b874ef92099aedcf4cc23877706e7dd1eeccd4093a9cbf8960f4bd4f3
SHA512bce421afd04fc88970c26db480f139e9c126d0ac7a05bd94b163bc3add289e699a240d803f5610861c5e1790602a2db60f075f994bcc2bff25675cde86ef2513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff88e4b4008eb990b084eda91f0abb6a
SHA1a2119eee50771e5e17e5c8e7a3447853677fbe08
SHA2561b258e67bd59a8b7fbf81bec4c11afea9901e357c2b5ca51526c1f3966a22b29
SHA512ea8fe63688760e8cfac472ff468044d4325e634b0bc3865abf5b98e5078d5691e2c348c93c1cd21a35f4f20dc41b893d62bd6f2699a4c1e02d664ce99a10724e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa37e9163c955a494940041698cafbe0
SHA1a8f4c940b53c3ce39177f7a7e40ea14820e63de9
SHA256360fbe8fc8482371604030add66fc8e01f925e3966058de56bcc18cc46a9bcfd
SHA512b9a965e726de72afb6b5d19a7202e01a257453b70f560066f3c63c7f0b70de1ff042d5d0150856b0af1f0cad7b565851d2137bc9c97824ce230456d0723f927c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6472db7a5c060b7064bd2521696abab
SHA17d8fb96f10c3dbe425befa3e372662eba23fc885
SHA25631aebbb50742702f60fda88e727930f901f520727a8fa957ec1ae3eb2e9c0a89
SHA5123df85ad4869e8305ca3ab893425b6d4439c546c88920c190440d469e2eb7f177b8d98d12fdda21d5034d8ca8a4c7a164ed4a3bd3ed397155a3a253fd013d1c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5a87c9e752d3e826bdf94d4b44ed61e
SHA1417f6b653f67fd416052141b16ecd85810ea0a69
SHA2568da65c0dcb9bd1bb167b9dd65559c2aa4cd269f6f752b5f6026af3fa15e3c5fd
SHA51242118f34d42c26c43aac89697803be7b8529dbde3f0c67f95af63c11eec37456a68a410040410903ad0afb86abcb4b507e3b67d467b9ab600412ac456db53e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba3ce8df361aa6dbda6f7392fd0d7a03
SHA1037d30b51ebd657d0014d04493dfd5522e2bf570
SHA256cffcd726ce89f220cbbfb17848304f26ac836da9bd5d0667e00f176477b42758
SHA512249cabe61cbe17b201380d10004b5038df42a617dab2b9890a0e0dfc92062aa2ea15e183c713ec9738b200a636e0f61c05113ddbf0db07966b3cbd98ca5f470e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ff33c8aa3f130d960a84e3c557029c
SHA1959dac4f4599c34ab049a3f7408a7e6a318bf1ce
SHA256c0c940694b0fa559f29eb9d0304b66a6f25b65107f0ad2d487df5aaec876eb6b
SHA512ba59b9a0f5e4d7473b8325c3f1a9ac5e9adefa8debb486128f9d0eaadfea090919a3a0b829125534565b1f2fc31cd65fea5f4e13efd6055c6c99cf47ddbd37c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a464e525832182cce377913dc6f7a913
SHA144518f72a4be737b03fd1d638559eb1620f7a81c
SHA256e637630415ee037472100fd0e36d42cb27b89d8b78f4139418d8735d65cb2223
SHA512fa44062b99c993a53859b31296ebc34cb32a6cb04d6414958f3a3753af1faeac8d62f297d379e40b133140c2e17d18593f1bf67093d5c59b9a3d3bc92138c933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704d3803b8b50ee2bb8ea1bbc75845e1
SHA1a6ef2f5560ee3a9fbfe3262628e691eb27be88de
SHA25661b02eab781ae88a187d6052cc0cb59194d28ec53e187827adc5c87b8713ec81
SHA512084d0afec41897c0b881329bd3ed4c9ec37e5574ba3dd62cf500a6862944f928f100f8a8577406019283206dc926d8a506ad1acbd03b4817efa1962b779adbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db175920202a9bd34087b99460272dc
SHA1cd818d178428c4d42ab75957169a00c60b607c89
SHA256858bcf69437a57c207d8948733b4b2ba5426a704a28b583118287baafe42ff4f
SHA51241208b72ec01983e9b7778387b23a375d5f3dc2f9ce905494d08eb8fd1f786d84da09af807732ef0c0ec6dbe44073f5b98e54558c0652a9e0bbbbfc99fac14c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5322ab57ece90da9693b5eee139639d2d
SHA13110a2bd2ab5254a7e238f832ee106ab9c648b84
SHA2566753cf1b278e63470d1f25c7898f2e4844a5185a91459038ff5c7384df6f58a2
SHA51264693977fc3fc6c1f314862fd00da4812ac51a98ddf8310f25a16094d87a44d2a96728e685f942bd1478d891c0fc05a879aa3fea25cfd09d398a3506e9d36352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd95e36d821b4614dbe8445a718facc
SHA19939a22ad8e15350a3bd63bebc4c5c39c20c0425
SHA256d108459a6bea9d8ac98ed9ff4b4c2937817a39f9d58960005fcfd40272c398e1
SHA512a5c2e71f4aaa6ec16e33fc6be9432dd3305f2b37803dd8e2f83bbffa1c96c31619dc29efbbd76415fd6774e5849682debbe866cedd7fbd377b10737c35dd2c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527fe0d5f452075304f1585b455db57d4
SHA108ae98215b26ef556208a1d0c4c5ac5257de28dc
SHA256b5b82b06cccf3e4a9ded0264bd0c2a5d678b8144447cf4672de7984bcb9643f2
SHA512a513df5b2a20d2721e189710575e5852a5ab87ab8748ddbd8f5fcfdb413046dc63f39bb05c233de5ea04cb926ba7af3e91493e2dc9bef3ec53870505948fad42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595c695c0c3b2486db7d74bfec945668
SHA190e7a2f30ba2ad74320d2e6e47e7ce4c1a5e109c
SHA256e6dfddf1afea08f2848825d06eaec7189ca7294c20f38d4609a44412f41f8a06
SHA5121dd0915a1c1f24ee67487e42692805c5bc6a7d09f1f2d05134784ebccd2389daad661e497382f10a5f97002cb09bf5d9907f049f375e8657afb060d3063740e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e534a3ff40d0ac7b26c9352ae4f660f0
SHA14217576921f5b60d3e96019a6584b20f14b17a89
SHA256f63d7bf31229ac7e123a7aed467a60aa836d50d8cfdc365fa0179b936391662e
SHA512410219d53ca96c50c7a2d010b69ca44a3c4b7dc70b69ff6a3fdc78224167000ceeaee6c40d42982bf34acc9100a1be5e0ec45c6aa88187bfe5791cf95cd5b24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2ff6d8c632d54ef90c692665384e55c
SHA108c6db33a41081b1b877f42bc49737a04c7c1628
SHA256d7d30ab834d0f5192b9c65011ec6bc7f4e39c709b6900d08e3d37f0ab03c63bf
SHA5122ed4420adbf39a89915435e83b48b616dec125bd92c81b7c60052796896281722c97cd4399faa4f3decf608d7d8862aea34d532aa8cb44419e3ed43b7079aecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e46c191f9bf4776f3adead6f0f6837c1
SHA1c6e2940de99913b536eee7f6a03e235163b5b041
SHA256b625729d1017366c759a04e5c7c9a48aab16d88f532466f14ebf37e2ae6b6de9
SHA512a45ac3f15401256b68ca9f1f83596ca7d64265e36c7a552db57671e37c4642e916c13e6d42210bfb11df3d97c1c67defced39170bbf695a6a0c48f706952b62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4e324bbb9f40c102f4d307f5162df0
SHA12c0782436787245a72ae293f69cae34140d629e5
SHA25617fc985566ac374b2a5366ea3e6b0bd76a8536f5565698c4ffcf19e489e7ed4a
SHA512d5b6f7692cb4c4dc5ea79fea4c6ab4ad29a8b033527a62b32e600378fe97bee8a8fd186bac76bd3da192aa79e549f4d6d1d28a950b5b5b5b9e37bb65d4c832ea
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a