Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
6c954bd5004025ec0ff100c06681233f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c954bd5004025ec0ff100c06681233f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c954bd5004025ec0ff100c06681233f_JaffaCakes118.html
-
Size
42KB
-
MD5
6c954bd5004025ec0ff100c06681233f
-
SHA1
7cead112a72a4bf0eb8564907bfc2986bd015af8
-
SHA256
f5e2bdf28daedc96927946db8bc43e4d179fdf6c62390f8d4452b32120339d86
-
SHA512
7ca3d2d66e1070c38d2cc2dcf17fe6620046f0b1b4c05b832e43ddd05af8ccaf9c5ba0cb4b9c188abcd61f2c502144497fa311ae2d48fefbb3719b5b02a98e73
-
SSDEEP
768:XQPxTb1t/4hf02rm6P9/JyIDpHOj7EHYn+xYyxzL02A12wtPKYv:XQPxTb1t/4hf0gNHOj7EHYn+OyxzL02+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7957FB1-1959-11EF-8951-5E4183A8FC47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422667754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 912 iexplore.exe 912 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 912 wrote to memory of 2164 912 iexplore.exe 28 PID 912 wrote to memory of 2164 912 iexplore.exe 28 PID 912 wrote to memory of 2164 912 iexplore.exe 28 PID 912 wrote to memory of 2164 912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6c954bd5004025ec0ff100c06681233f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d82e2c677b4e3d00ec351f54eb64e5c1
SHA1985fd619d661c629d7cdffe7dc6ca43360bc34d2
SHA256e6652136628003281d3e1512d1e7b9fa046bffa9112f88912215634e28131c8b
SHA512237d95891a981dba290537f32598906ab3c10f0624406a4b988f962a674a929de02db3416ce3e43ae691e111b8d59e8c54b2b5400160262f4638506a0234f2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56deffec60c28fd2a82106dce402d1b9d
SHA102f83098ca3331384efbf10715310f7610b5a166
SHA256355975e0d0093468266baf6d2da559f946f5b9dda091904cfba705c7c30596a3
SHA512bab03de97c01bed03e7f5f0e430123e7e2a86c5d9ac5021e9bbbc1284f18f35f3a4873eabc4bf322576057624a26f6e1d70374f6698a5037a879cb81ba98f899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5898d2aa9f65768204996c0a70751a08f
SHA1edd9c02a1b713e8511093cafa7fe6c8d3c88db7a
SHA256920f08fca7bbc18bd38df1b74424bfff644410d3ff794558f469c2f07b7b05ab
SHA512e187873a79571ff6b1664aa583ad88b5ea241d9518c712c71f8543969de20dc3435cd5fa1d887629c5498d4ff39356ec51a8823b6625e7789620d928a922ce0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f202df98923f88170abb3db7538338
SHA11b55998dd1d46617c70093fddeac05059d58b1d5
SHA256e0ee345c04c3ab788408529b4ebe36e6b03ce192b86d706ac43390ac9409c043
SHA512322d1645539a7994330113954c55cb1a11425de8c0717cb5b3d7bc5f450ba2a75d821478082a008fd2372998b7c34ec69c1bab3e96cb6000b73c0cffd25f024e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd0c60730c103ffebb3ba2fed98512b
SHA1022112122f52638873e5d15fe8bb0c7a1dfa560a
SHA2560f7e1ed96eeb6acc3f7bee7bf59781f0f9bd455c7d5a9738d02bfdd38c789b82
SHA512667bd82888c2526bf85a2c389930dab642ddc8f67902c86a8c478a4b4f6ba6d4b887948e43d987b706810e2300a7bcb160c13ffc6372289ac391f8e9217f0d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d899ca70cfe25fd7b1a46c46a1bb0b5
SHA116a4a2b5db273b23bdfc45c5498e6f5dd9268530
SHA2565a646e4b6d24a5895e07a54527f076518c38c7e309be77476f3d13457dec4fb8
SHA512d2e87fab8a21288403bacd8bb7485ac4e59ed67d3c7763620bb788acf682f14a7bbb454dd6857bcbcbf7cc1af1d51a5a9f8e5c503dbb8d6ea9d4c76ae00e5cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e6a14c8cbfd1017a2a108af2cd3ff4f
SHA1a80f20f7a954f5ab2e96c7ea0982e807eb703c77
SHA256e42a10b34e690e66e06097f06d1bbc8bdeb3de6ed7194f95f24421ebe1d6d7a1
SHA512667d636f152fb9007b8eb1d1fec3159e8090712472b69ea1b322407abd1dc45e4509e7a92bf13f887cbe7a7c08f5e4d701d14ad422a583c7235ddcf5e146c38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4497ca351024a3e571ab93bad0d42b6
SHA12474048b84b5d6c7a36c287a58be6871d642091d
SHA256241b390997ba8a8da01bdb6e04a5cce66132bdfe796db2464e406c7d40c9c752
SHA51297863ba3163bc9c2b5a8bb2b9960cac36e1b79fa6f8330d0a424e9af1d54b071b7293ecc532159c7d7fcdc802c100901acfd42b389d7ec3039d3cf180ba66b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cabc60850c0a3fccf73a8fab1c7ec819
SHA1c16777d59b87bfe0adfdbaf647a734f5c8d4c2e6
SHA25636a2f6dbf61081d2d393df1ce560f451aac1ae1f77fa395077057154699e2f05
SHA512800327b599088262b3f6397a61b8ae609636ed79407cc355f2c7ed99f0fc164be2bdc25f1d86430a44131c89a5014ba78efbf70ece3957917b94188a5e2160a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c47094f3522c8c40ea8c1a0d3468b27
SHA139ef6bf278f3ebac704ebec82fda00486bbb06e9
SHA256b2a0563ad3d01ba818913bd64e0feadc1485460f5da2b2788a2a2b54ef93be70
SHA512577cab932b51d52a1febce8bc77f9dda02aabf69a294da47154581919763a8b5e7c98faa327a4c57442ab11d42ffeaf2f92e1892744f4ec44e8db61be95701f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff68dc270b51db556c209afa44986255
SHA1c6438aa80da75b2cad9ac123cbaf314c1d109024
SHA25695a6ac697e1d7cfad2d3ccd852e325348a70b6b6e2e7109b0efea24c879fd7d3
SHA5125d4c49910b1d50fd19a592fe24ca64183a382f4a7aa218354bc7305854dd05698f5e410053c70f280888105168e2dbaa041c51e3595102f4d1e46cff77ffb26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52698aef6cd44121c1837c96df1ea44d6
SHA1b2215115bfd23dcdf375ef4d56db22432caef2a9
SHA256ff69ec009075e6e6ace89d099f8f1821283184bfd901baaa90a17db08ea7664c
SHA512dad0950a7d360cb599658f50d61d7a245693a99013bd4acede1de672ebb52fd56bd41681945e95773097e6d21d4800612c02e33d9d29c40b6daba1f7dbbf5c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56775bc8adc4f7f70fb02fe5d7f92d059
SHA1a2f5fc1b141006736caf4aa2e6976f4fa3cd6241
SHA256486eed2f71ee1867ad1fa0b5e78dfa5c46b7b6ba9b5598f791dbc945bc16d415
SHA51229bf89ef4f52ad309443ebf1920b7a64b5c867465cd646b45904a6244aabc3da95b3010c4fa8ca4bf04ef5acb9eae6bf5f09899fe3e82cfeaa6be1ddbdc69681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523f6411c3ee1ca45aa2536ec3b2edabe
SHA1f3f929abb04f7b22fa3505c79976211c39b9d2f4
SHA256970f477290c2e45cd8e94bd626d72c633c37777f8d4684e5a722604c4d5ed989
SHA512ca2b81b42b59a42552014517317789c1bc3cd5ba45bfeac1e76e82a524befdf6f0da8287306640b214b87f39b0db56801f74b629d4241cf3d1f1f3dbc8b138dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d288205ef6004ccabe6b9500baf1b7cb
SHA1798dd8502a6cddd61092aaaf68337b6a6477c767
SHA256716f59ddf3009bf240a80add8ecab8f2599ca15db779505c9fcf4142a469e3f4
SHA512022db27aee87840429b944936335d1496550cd0e804e49586903be125d7ff35ae2e9d61fe104ec3c60f4e388e3f269219b69870ae8cc6948802ed5c91415ed3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a13cd56357ca63ffe0e97da423594f
SHA19e67943fd85de885f48b4f9a93527ddec77d93c7
SHA256028f86ae3816ea5922f64ae441b639642b67ec214d268a55077347e8d61684d4
SHA5129154fa8e081bf5b145b71dfa117da79332997795cf27ffb416d1953f998d9a890dcf67c9c4ba6ee9a010a292683add9d00d34d39c9845fc7f5eef07dbb0122ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5104273146f207251c0275717a3ef8b13
SHA142c24d7e659512b962142540f604fbf206505481
SHA2564d0917b7d09c1fa86e1d59a1d0e2617a73a3372ef789f5d54d7c45bf83614287
SHA5126791086366f2a447b8b76e111dc8922e79bf58c11a65050d81611e8fe4dc44937fa6578002ed89538d5132e46f5151a400ff5bae42e9e8b1998898f5943bab12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6bb78b943c643ff8dc862ad9b79802
SHA182fb73aaf5cafdea19bb2b7875e4d49975a6f57b
SHA2560e92bbab7b03b3c4ea36effb9fab927561b6ada584f19c73df9cbaea6b945aa9
SHA5125fd354682f8b4f7e6cf434209a4f70225081dc615fa9ec88602824db57eb63c378b15350a67d60c6305c48d92641a9ec6fa8e0749566057242891de2ea459560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0c0f53aa286a3e38a6755cb1e2d38a6
SHA11041bff9c61e97134e3265b6b3603c322031da33
SHA256f5f361a41eedff9102d31cbc25c1b6e96d04923a6a46cd3345390c43f86d6ad0
SHA512b65fe02df86a575c913bd8f13c28fed0dc4f4c073fa71e217b4254db8c264662943b234663f8bd1994b6654d53e2971ac2fd93b254b1904264506c7aefd3c6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae01ccfb4e3fc58d9ceb535209471e5c
SHA114a62dec75425421a0a9ad409c383afbf4abf969
SHA256026962bbf5023d37daa98e5016629eb3bdf890c066335b06ca6e9d0389f2a74c
SHA512df9279411a46704c0fbdf4aa19d98a572e040390a2503cb24d727d5c7dee5b2c7116b2a067a4a7706b7fd692050059dcacfe903103d228e47c83147dbc36d7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bcf311cf54f7f7848f1a5cd129c21a28
SHA1da50369e8e928ebb1813188565e57a794091e4f8
SHA256ebd9705b51a759d6468dd8ad91d8d582708f52ba5260b7e6bebb6491039d988b
SHA512c871bc00b2f1b5c568ab0ab1ddb1119e5ab8d4813964ab142602393e518c2579d4ce5000b045b0394c09aaf8ee46f44da8bab2a839b6190c3e11bd46b18adc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a