Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
3321922332b1ba5047ec175870b32b70_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3321922332b1ba5047ec175870b32b70_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3321922332b1ba5047ec175870b32b70_JaffaCakes118.html
-
Size
37KB
-
MD5
3321922332b1ba5047ec175870b32b70
-
SHA1
2e0d82157ad400abaa64080af3e8ca8b9307907f
-
SHA256
6220b0e8b12d9ecb7a13f511176c9c1ded8b4a8d0a7a39f49e6b86cf1cd55184
-
SHA512
4f5f41f5a16c9432fae96a9286d5e54eac82f88baf6c1186f67779533a98b9e37dd7b83b6f913fcbe0f0e679579de3087f81f541458f6a3812cef6ca33c68039
-
SSDEEP
768:S6jKMC6CYCdC+CuCTt27jKSK5e9sSJr7gIiI6c:SAnNq9BctDe9FJr7gIi9c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000f6e23f75e979ae8a71060742e8e413c5cafa5ef6a9d0ec793fd0f108b127be67000000000e8000000002000020000000e6656a50bf18ccc96eb594f110cd6ef4ccb5d9e9dead5a8a2cda52df0134b656200000008bc4ef5d60392e326939e6c39634a35922654bdd14a88c5aa46a9ec9bd396321400000006400c446225ac253a9f816ea1242c34c70f35743c872986c2f1391e81acddedd73fc2815b067976d923bdf375373878d2e84fa3eac1f12656006d89d1d844ff9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000034245f793b7c457805841b545fa20dd602bad8d1c2eee0eec663b97d0a367f47000000000e80000000020000200000007e689efa03d16511d52ead02a2ab7f01a14eb0df857235f7e5cd086601e49bd390000000420683b1edc12aaf60cdaf3924f9c73a0c7c6fc914fc09da2ad6cc42441468b31a9b70a5b8d4b15754506810ef18f40682fcdf682c70eb45ce6b90f75c7dd1d92985ab2c31c631070b8f5e9c0317a14e606df60d7048283e7e44230d46b343d3abd989532f149f82b54e7326c7fb02997f989d59054cd2344966cd7b66fecc4e39e353666900f3f954cf0a632f235d59400000005be39e1932f002732c5a166e836d8a311837a572e33a1be523e631e62f0850a2322638661f37d3d93ddb9858c34c1ec03eae1c8e53ebd605de20fb87ae37fda8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421569776" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a20f316aa3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A553EF1-0F5D-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2356 3028 iexplore.exe 28 PID 3028 wrote to memory of 2356 3028 iexplore.exe 28 PID 3028 wrote to memory of 2356 3028 iexplore.exe 28 PID 3028 wrote to memory of 2356 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3321922332b1ba5047ec175870b32b70_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ebff17e3f307a9837c4f2383cc04705
SHA1c66f51d92a289fc30a34b5dee9900b211fe676e3
SHA2565b3c634314eca5d74622ef32433d2ff2988fecf090cf2799c748c30735329f4f
SHA512b268f5e104c88fa4c2b0d475e26c1188e303b11b19399eddc8421672acab6e7f6cef5208b7df230115622ecd1d5fd01e042578a71b0c95c78199db070f9914f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d1b3089d185a356eba9a893cc7bdbf
SHA11d358d9ac6b02f2161be88e109a3c1f590be4c7b
SHA256d2d8ef85fcdcc87d45446edb22b1be7881fad09eea6ab9f5eeb9ece48c5eece6
SHA512f14eef5eef7e905431bbc1492a710763d58854427ca84887700c8747c8a0baea5a5ab415f80f73f008b5347230cc857346331968a68aa7fa1e65981b2610ae88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5025ac7312834404ef67d6ef0cd9a4fd5
SHA132ae0151ef996e9c0adb8c06dd4bcace7275d710
SHA256bf19b95ff170cf86a7086c8d8e914d401c636dc799c441e0b22f17faa85a3aae
SHA512347c86bfa7638c59daae6d8cd868adc4a70acb22c2037465c728bad8fe341b04cb99abd9a65a8b1d87f342be6c22e90340ba50c1a8b7e724cd445c52bafaf1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d090bfb8348d36d9d992fa05f9e485d
SHA109091f4e4039799e9869c147b0b26c4f72916081
SHA2566631de6a950c8392f175aef2e7ad9f74ddec75b14fa5f0487eb298c19f25e2c8
SHA5128d126c0094018b48124d90963c21703b069ca8ff1b875970e633c33cdafceafaf0d3f298069515c814739be433c8a0458c27a52a6513863039772ce541eb529a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3e9825227f2ddbc5437d66c0df2257
SHA14173bcfd5519879b0de3908a54642dce645a0f6a
SHA2568687048a4a94f79769f65d5343242db544d53f6f2371e47d1ef3149406c676e3
SHA51276d0e669c7476d2f20c0c25070d3cd63fbf5952a36da41adeef095b02fd30944a79d9d592f46aedf3225c68f4b1dbe3906ea1ac789c6a867921093caed56d08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f30b0a3ab428cbb332565b6ff16783af
SHA10977fc3c96cc32964f77d6c1ebcfa719f28cf569
SHA256354aa1544595d402a9dfdfb508cc4f9e59bc462f96dafc72a1cb5d4f624aa05c
SHA512ae99e68a2e5e49a28b9db31f54fc33d1bf48cae1bffcdfbb8189bea9f264b27b6d2119add157d399342613f8c70f62f0f81d8cadb1305fe66541fa10c30ba41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df69f33f7e6cdf54e1fcb3d86ca03121
SHA16e154689637a0ff6c1052b911985f90f8e418d19
SHA256e0e7f19ad1803fb95786d9416331557f76e21bcba9a2974f8a530fd2cc334120
SHA512cb5d9180c8699277cc81bed08a723ab1dcd90e9532ccfcf0a7c1025add1078660d9cd522112d019ae83da9c5e22f18148981081cbeacdacbcd4eaff90f3c8ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586e6740cb06338708d367df0b76cb73f
SHA1104591f89184643efecb46e355590e8d1477e06a
SHA256ceafb80dd5c076740536df97c344abd743aaef93d93c0effec62d4ab3ba6b040
SHA5127b5a3835ca450bb25ed30e2f6136f613fd52c2a933fb5236c41c10a48d6683ab5aa2096d50dad5bd96d0aec11c7ca960eaf5d6b643ca3faa303eb30a57328e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e98feabaff75f8a555584c08925b2183
SHA134659f5f0d0c9a818f40113defe0663407b843fc
SHA256b06f4f6d8c22813b53117f630a33e59c40577f06a1b41f0d2eb5dfcca9c58b5c
SHA51299fc322f20dac774fc47fde7f05bbb18769e54bb2e29cc6ed7f1e6838b6d7e506f0e037d31516c2c0d9c9f13a14a02f54bb7c4df334c391ca12bc5b9c06e288a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d0f5bc18ec6b0fee5d92a27a3ff5bd6
SHA167bd0e181068ffc8ebdc9a245be69c0492c3c3cf
SHA256fb336145d75b2bf9db17b205b306b62bc453117d13ee294cbf089e7f6a70ae6f
SHA512dfc4920bb5ee13004a1546863ee9f518f482e8da0b1074da4009c9941eae2bef1dff244e0716bd18ab0e1aa9e937f30058c7c9ebffa3562842c081b8aaa22dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbf9adec9ee30a187afad3bb1ecf5bc
SHA1acffd00e009b6df25192d99b30187542f43ce148
SHA256923ad50d0a59353cba01ffefb810695df7f117edc7c3be4cc1339843e863885e
SHA512d78eeecae9f662ba7ffe590ad153376d61d37dcf0c84c6f398aa63066828137c8feb1db738e463d497feebd43528bb6bda40035bbc2c55bfdd525c0d44611241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1f396caceaa7b194088e360187e0af
SHA186e6bba274cc896b6d30e22e59517dc912df14c1
SHA2560d38dd209b5e25019cb6294c247fcc4f18a465ac6e7f3020d93b16d3ae60781a
SHA5124cebeaaa0f6bd1afc6a64e950cc19ae38ed7b07e4e4bd21af8b2aebc33802884ed0c8b18b54047f7c33d3e346f934dc26a15e1aef56351b6165ce17a93fdfebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5850918b8c48c8ce5ce2c5935ee16377d
SHA18c69514cddd71582f93d2db04474942119a85634
SHA2564d7c59005a85ee8c6ba3741b3b8ae7ab965518cacc2558eff1430a071f92c32f
SHA512614710e0a43ccab38452b18e2b4e14b773441d55c5660a4bfda29b40a1929a4fe625034dfad701f157ca502c23c127957a40c94431221ac58e48ff1efb3a8eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd336c268caf8a0da96387d1398e0932
SHA1804ab4bcd2f9d5d170b908b85bd6f8fd1ca3407c
SHA2563938370933d2d2766a7bb1d44b9b7a76e8b73717fa6ef21a2dcfc0ec72a776b8
SHA5124d089e15ca37d2e71f0d211ce9b3f4f8281ca329faeeef557d0523fc4ca99428acd7bb222aa99cfd885bfc7c9d7576aa996f8306960ee048e8836e4499bcbdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2014e6e6110e156f1c12ca71a2f4724
SHA18fb797e9a8fd0df0999eba9865d742d835367a18
SHA2565ac29edd7517061b7812892e3964e412e42344fdf57e42df4b4c72a4e5f0d8c0
SHA51201666fde1f06cd34040da870ad8f644aefff82cc34672a6e272e5b1c3c6541b7c1c6c180fe6d8b37e120ee75e0ab2239e56c5432c70d561ccf2ea1c6fc202a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfce7043c8d63b59c59cbb18e02b7e34
SHA1496ff69a04fb3b0031e67e9fafd71bc79e12a63f
SHA256402093beb23b66f4b9c1b1ba11bed99b300d1cd7f442205853e91086dd83157c
SHA512aed081cd82c2226f987a436af7e162055048a2036865a75b989607a1b6140e4457bf22124af0e2def314e64d9be74a38723aac78c81eeced4c709b79ce2573eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5732e09f9d680f5a14b5a6956dee24ff8
SHA184ae43b8555fdcf5db228b8043b6a9a70d9b67c1
SHA256968e7bf8831a7cc8cfd44361449ef35c3265ec95e25f4dcfd56289b22228fbfb
SHA5121f3f6d2d9ffbb2060554077e87e035cebdd72b08b2adae1dea8de0379e0d70f14bac58031c89f26b3a73941396e5e5c584ed178cce9702d6cc4c12a29312026e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3aea0a5d543fc33c26829439a147e25
SHA17e51eb47cc32d5c69881c2e5dd7fc096725b6e51
SHA256f9a0b60e17a32dee0dd91587603ad17452e137e65b6c79aba9039f6b00ca8ab9
SHA512cfe78498612aa76fe8ae25f1817f562b638234ac04b87eef9d3df1dd30a45c2db1db0b0d7aa3b8a1c14774d859160b4e476cd9c4e784927850f705563a87fa8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1b27aef758724f179a8407b87268707
SHA1f0e1ddb2149aac3921a726e349a2e2a9a8b5d192
SHA2567ef7a5b8fd9456d3891fec3d076d5d99b7e349e9bfa162af443dc964e7b6f623
SHA51252080b648baf7ccd099715139e37b2ddf3dd1bc998c902b2f081ebcfb9ab87a5205c1ae4b32a474cfe8a3c3b998576c1d97de56eced50902872c6dff7de1b23a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a