Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
39c696e9fe65418c46170e2ff805b67d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
39c696e9fe65418c46170e2ff805b67d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39c696e9fe65418c46170e2ff805b67d_JaffaCakes118.html
-
Size
125KB
-
MD5
39c696e9fe65418c46170e2ff805b67d
-
SHA1
ccf433dd612f503d4d269ba9a648bc36ae33559e
-
SHA256
2c453fd1038f4547f72c9f6127b0ebf33bf3c775fd156e82a0cbd47b1ba1114e
-
SHA512
94fea706ac93dc0d7ac088e9b9e4b4487133b7dfa4d9c57692c31a3706a780d2b7c1d0fc2e18f77b721b02eee0e6b0d728eecb28e68415ee70b80f2386652b0b
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dp:Sv+yfkMY+BES09JXAnyrZalI+YV+I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8773D1B1-104F-11EF-8554-DE288D05BF47} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000b7390569c4b6b723b2c5b694437c44b2e8f1bc15638fc4f701828ab815f7b9b6000000000e8000000002000020000000f9043afcb9c7415334142ad2a0f2c84796faebd09b8919dd45484bb8bf141ad590000000d966d236fe570a9ae2312279a4469f20b32fabc4be9804c18487a1189ec6edbffda385f5526f14be2a462844dd94f559b88537e9aa8ebd536e4015fe5ace9e5a5d62ba05dfc861a64878f142218d41ec69da91d818cf082a8ad3ab51f745ef1a4b6cc9c5dbf85b42fd6b251de9612ce90f95af2dc541d9f53f3964eb7d24482bc87a6e36c9cfe13dfb5a6bba9753097d40000000469458edf405cc6f7acd9d664204c2c3f9e410268037bdddd6a135097f4ea51f551ddd7809cb9267b5d3a31306914ed2c28b02240432880bbc061599a1da91c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000008b10e3bd53874c03b8423ab8c75e102d46d1782fe79dd9a3dc16586cd860c651000000000e8000000002000020000000690b1f8b6419c74937ca6afc2b1d82742d9602af7a53db27005d221cd860464420000000f867a84ff4bbe8e0d794bdc8c20aee8e373e2a309f70266702b443f6f989d08840000000a9c859c5e9cff630399d92e482f295bf9e56da1311ec1a887c67b3320fb5b1bccf7515fb71eadc5577b4d57406856aae0aeb87c2f5dc7eebccd987124fdb2999 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421673791" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80dc545d5ca4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2260 1684 iexplore.exe 28 PID 1684 wrote to memory of 2260 1684 iexplore.exe 28 PID 1684 wrote to memory of 2260 1684 iexplore.exe 28 PID 1684 wrote to memory of 2260 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39c696e9fe65418c46170e2ff805b67d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e075d24aab1cdd3edee6f35eb51f149
SHA19bfb33640d1d3583a7e3731a39ae1d8848416438
SHA256e6bc7553f8e61086c92fcb3c33893b4fcb313c66215c286615a4bdba0621c40c
SHA512c112ab531c5545ed4057720f3cf05846fa1482544fdab1a381dc5d447224c85b92497876b94b2e36284e84d5d93ed7eefa28f6a34ab0afa32e79362932b34b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ab00e0831275833ce9e1e8e4cf9354
SHA1ac17704ac13ff1e4f7151875c042dd93cc3ef0d4
SHA25655d5e7e1082f7665dd81a1eeb27f41a20e56490ffb514b0991fa333ec2af6512
SHA5120091870a4c2b4b733fc8cf0c65fbee295654c98fa1631265a5a5106a93094fccea02e575de8fc5174a51a0f715b2b372dd7420e497fe21d92b9884c03eef1a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110171e2681602b6c6d10b07f5087873
SHA15e43dcc750c83ddfb3c94661eefaa5aecc55df94
SHA25672deb33f17776abd6f20992c4e94e9d14f648ff9f402221f474f2f133a71fe84
SHA5126d3e9681c3700b727fdde1efe0d21fbba6391b7a6f050722c015a5d8004bebb8a0cbd1be5a444a8f2afed6be6f65c77eff603fb18e82e566b78355dcefdcffcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552ba3e769afd78b57cb1477c4613baa2
SHA1a06551e08859049040b46428d284ff3620808c77
SHA256fb833d3e06e1bca5d02ae1d7865d9b8c54899a4a640556ec6fea0410ac5db562
SHA512918d1176ae842f9a75efe9d2b891052b1f6f4f22893910199ae3ecaf00afe89d8177e40612df9d1bf6850c1aacc9e1b310104bd044c52131fa3508878cc31e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c700e96d59db1fd2522e2890ebcdbe23
SHA1bca119bd3390d3f267e2be7ae9180e22d2f63c64
SHA256cbf38c036c172b747c0ce8f3322ae02a635a21ea677a3b60cbd5ff4e362eb4ef
SHA51284c3f2079cb349c1d5f6596d0da960297179141c8a7ab980c34be3185a127da25a9c91192db2e2856e279e211b055bba05dcba252ca1e6afe6e79a25c30483ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4b021a06e5f51945edbb12e4dc2864e
SHA15007f16f527636e237859d26b6e1fe88123c7e3f
SHA256da00889922097ee5f27bf6abc0cb7a3fc70f64c84b52af729cd47518986ee8dc
SHA512d875dcf988aab3bf04101b9b2b10e0928490f803a71d096ee82f7c8ac31789ecd7a54b2e9e3ade8aa928caa6119ae3ad59e0601fcc875f6b0a7ebe365c80beac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d2ab404e93e05ee01c3549419beab97
SHA1684fd57dc18cc21676d16733067d81de1fb74588
SHA256544202c8fb484c5af83255ac0ff5ac931ca48d25e6d56de7df4f200e3aeebcca
SHA5124f8cedcb83bef6df7cab45317da0b25567a4170c0e8e79846f0a1d9f38e7b0fa80b2f72a690d23d38ba1025d0342af5ff339fa1a944412d76996f85371c86365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fed4a1e3aa23519683b278da43ae769c
SHA188ab663e77307a51bba10a2644bf3575c13fe184
SHA2562cd5f9a1e764785b7f7ae38bdce0932cce77e41c517f39d17cf2299c949744eb
SHA512b47dfebc2de5c5d840edf9ccd93ec8d3f4c89d07f83aa57d0cfd8d0bf2459515fa9ba7135ff625d28f6e18799a9b740a5668b39cd244d35f5298f0bc72c0afc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ce378ccbaf9c890d3b301373b39ae93
SHA1fb3411fb24bcc51a998a8389395822023a8c7d9d
SHA256f1330b49c706fd0c5e66a9af0403f2490f61ef84336c61b3384dee7386de09f0
SHA5129bca0155d591eb810d9361e02175e2760dc6ea006fb2a507d5582a347ac17edb93ffd97ba3cfc048a7436abfe9e5c8d9cc36cbe93690a3db9114d85b201e9bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536dda4a2492cd80769a350537db8eba2
SHA1ec3b30d36d98c40fde47dac9727204d301948235
SHA25634c01814577459527c5b737585e89a04edfc1b8b3c609e16d1ae5d795d95e486
SHA512a5abf7f0397fdcc079d6a378d5f38faff3cefecd64c325cc40de4754dcef773a6b6e1cfd4e8aa9b85a3a11e89f9d275e2151c58e18b8a5db5eddadb89cabf06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5422a619d843a95b3185f01036e0aad37
SHA15375cde1e800e3138ace3c82e3de4759f36efd12
SHA256c5346e2acbe28049cb43bd4d997e75435ff09875bdf8a888944af42f5b4bf67f
SHA51263b8076b1ee69353b5a6adb113b2c2e011a7b587e66f5d74199b280a0d2020e54398c5a3f528907253949a6762b871b8bd0141767be5b3d34d0d1df81b957b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a41a4dd4408a056192c5631293d8198
SHA12b0d6cb33fe40e96dcaf7578f4a662141738fe77
SHA256eda09a6ca416edf1e58c171249739efa31c8c597db2803a6db697a8c155f57c8
SHA512109123a8700d6eedfe669a84ef60fa7aa45f6836dbf6d2dd0acc8b33f84d17a86f74f52578379ff842f7fac23e459040ce13c1e5e00e86d9313b8d2ba93dff21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b2ecde32dfc105979b00e4a42c6eb9
SHA181f19a045af846a247d35d0132b94a548743c6fa
SHA256387bb4916d55d1805fa320e1cb4b6be2a3bec33bf2e73a65da0362ed2cc8feed
SHA5128dcb625e2136de3a494a8ff8bd734d500259c3cb39573d23b311bb17da18c482a4a66965467f9578dd7f5e33280d1598332d1fd1dd403760725de331a6bdb3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58a452334efe4751147b4439717a0fe
SHA1fc6e4e8cb53be1c8deb6357b7ffbc561307e41f7
SHA2565c4c7011d36f12b0c20a221482bde1873cfc3219485c96de8cd5429781eaedbf
SHA5120419df4e62ade2f7c8e77be9c9348bcf90ffcfd65a689fbc090197a4fe21174c05e7d2eea533d841626f1ef4f7c497cc0ec53a816f4d2d4bd2240718c3b7aba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506f8e25804f00cc4ae59381af0eacb67
SHA1f21f33fd6195f030506127c2fd13c0a2f3d8c9c7
SHA256b4770205ca0ae2d9e03c8c1a467d20da9d445616880f4e528c4d3d69377c43cd
SHA512dbb2c526b4757b578117fa9bda05aa444acd47b709eaa602b69e956680543aa98dfc6f5e604b199a2b663785973385f696fc467b11573cb256d85be17372353d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e6c0e04942ca0188a12e3bd6bde8e6
SHA1a3ca86c76c0e5091d85cce91bdab9206b6cf6e34
SHA2565d639d2fbcdc870bd6bda5ee3029f926d815cba0bec5a62c76d070133fd77734
SHA5121d5de323a962ffd67aed91d8bb7a173ab10f23f1fbca727c96766b8103c6ab9ffcba5f5e3ab0c64aaa9f7a58f476e340c03b481775aaa894eff3464ca38886b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdea3e02c9714dfc6576050829fc5615
SHA198516c058d148689c6f16a5fa8a08ec0a9e9bf9b
SHA256fe0f0a118c6be7d031c16bf826a5391f7c596c70de4710fb0c4490aa592dff96
SHA512b9cd1cf200d48a705af1906e573da22caa8e88860750a1c93b1df25ddbe53cce05af0826cb19bee9bc692aab8bdd2a161f2658b41a30da5335ffa5c5b40f4f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560adcda3ddf30ea4ae69217749180e21
SHA1c0d97e5d59940dee1588105fc4a995541ced3b97
SHA256f197e0f71089f397a4e726637d3bac5a3c92d356e5fecb5d8f2f61152288138a
SHA5127c10284a45cdce1e2c136a12255403ef89412b9aa56a4c41eaa3995146f065a16bfa70650c24cfdf63b181821d4f5e13d5c841e9446567a4ccfcfc9e6fa7dc43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4f99dca71fa5287ef6d1a227f7cd90f
SHA11a38cc2843639467e1137382942af99641a06c51
SHA256fa5c919a1c6110f63f43c4b6c6c4329139e150897073f447033b889101e8e927
SHA512dc6c87d71c13ca336e9ff5b4ec87e6c66bedf287122535ef1dc9eef18f7cd88fcd7536c4b697ddf8ba112304114aa4620edba10eecdae927516d955b3cdc91ff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a