Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
68e247dc95ab58ccae78f422871d95b4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68e247dc95ab58ccae78f422871d95b4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68e247dc95ab58ccae78f422871d95b4_JaffaCakes118.html
-
Size
2KB
-
MD5
68e247dc95ab58ccae78f422871d95b4
-
SHA1
a6fea24bab7ff385993aabe9ddf243d86f65711c
-
SHA256
24b926ac8970d200075702d754237b1992c7c3f4d7dcca55f10e5ac23b8cff75
-
SHA512
c7b762d03277f51b4662729a35e0e39a3de29babedae46eacf2d015507abde98a5c9deb972ded4d62f2e00d13afc7486e02d52af83164313fafa08cf14c9ce0d
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc1f62b5286ed742aa36ac8449a0fb41000000000200000000001066000000010000200000003e8e61c819bd5cc53718b339e9edf02ff44cb260cf9e7031ea2581dcc87d2717000000000e8000000002000020000000b646026b315eb32070c40991caf72cb13f4ad74106f14691b5cb023a2342de3990000000bb79bbf3abd52b06547dfb74a07bef9412c6b30f372e1fbd272de524f6e31edd173c3a0900d8f11bbe596d1809bc22974039dc868a4256dd54677d8bcc80526a22509212adeac2a80b43f0095f0f799c6fb802b6136bab4b465d59ae9cc8237081aeae54c679593ab4919272831072582894d8c3f9dd6c390b71b5186dcbb36735373019323b0d036d7a47766ed71eee40000000713111cc036e9b022388028dcdc31481400323af352f9c0a934010f0a1a90266ad77320921d31eff89feb5ea616aed894b7b78b4779edecebfb31f1b0ded07dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07421c199acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC8238E1-188C-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc1f62b5286ed742aa36ac8449a0fb4100000000020000000000106600000001000020000000ee4e6c167f563b228fddefcfd79719ebda2be916e3ea26ca827d6c11f0541ea3000000000e800000000200002000000005b41f08025b36a6407ee2291078bb09f1abf104ef165584db7e3890c7cb79a520000000a092bcfcc632ad06f43bcbf4d6bf81cc5955d5c072a6bcee07d35cf722f7a22140000000677cf7ad155ebe9c36e43533b3ffb665071d0d9fe65a7b8a24ec5ba2a435a410bfd6bfaee99ac7071e3b9d20294c9cac2b6862fdb6b82dcf1b0d03f60b2b2427 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2352 iexplore.exe 2352 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2352 wrote to memory of 2092 2352 iexplore.exe IEXPLORE.EXE PID 2352 wrote to memory of 2092 2352 iexplore.exe IEXPLORE.EXE PID 2352 wrote to memory of 2092 2352 iexplore.exe IEXPLORE.EXE PID 2352 wrote to memory of 2092 2352 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e247dc95ab58ccae78f422871d95b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88a6677f796a5a99a65303174aad66b
SHA1fab4f452a8a765b48c9bb592e8d5de9c2e9b7b5d
SHA256b71c14d1f21df740e24106acdf9150399347a0888a2e85765b4061e1d0395596
SHA512a692684e6fb965e9aa4cb26c638dd6742cb2993e4a9f72b42515ace17af7ba4537ff3ef5dcf10699748278fa053ca8baa33de62e6c2b586fe48bd2ff954ca7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52225773297d3c6f66b2ce173ef66bcfc
SHA1369c5e527e446cc975bbd20bc50e82374d82ff18
SHA256a0b46264cba8655494286b0c88cf569dc208fde2bec5ad4a11219227eb94c58c
SHA5126506d078ff8de889dddd6bab4efd63aa8830a8267741a7799c8f861bf85280fe811ef990e3500affd266c62864227982706998338ce626c36116db614094518a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb43bc0491f087cf86a3c964adbb894e
SHA10d12fd56ced73d4b161b69d13d26fe22c24240c9
SHA2568a8dbf60fcc791dda8491ec5f813300b37cbbac8db20f336b23c3bc2a3cd1ba0
SHA512e3c7f9266ca2d17339524e4604e7a1177a95df9b35fc2c2176e80d4f2dead87f772472c3011f15e2cd39cc279386189b7e6d6e995abc5be34423fc1515a4bf2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4a69ab86e98f397d06574580ec57402
SHA160c5fe578d3a9344a3fe3cffe5e61686a662b4b7
SHA2569b1db9fc6452d91cad5c9cb8bd86d1e65009b3dd7a76be7778c20d237d3ab8b9
SHA5121cd246c1800db217669818be2d494aa2236ef8ace2d28b5ae78082ba6cf6e166e5245dc1265893a1639a6a1f223a8389ef187413833f07587ae2b38009fd63dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55522fe6d56533bba0eaf292da793a9a8
SHA14f46410a424d6c5ce8788f4112ea8e1ea1e7a254
SHA256e6c6d7d8735f66fb75d718a6ef51913187d1ce1d2c33b5121996d5ce436b3684
SHA512e2ab6f47cfbcc11ce938cdf193fbb0d030449c9561cbf532eb4bfbb8c4314884e5a341ad61f48440f57e8d1b1c85fd3306e7758dd289661d8da83c027b7de5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c71030ab8a7fa32fb8fa3c47368f7d
SHA10a99c85017042abe73a349a05753b5cc4c182baf
SHA2564ae17f28bb7e02adee28b23f49d5cd55a7f3d724035f8f0320812219f7709966
SHA51220d1b30e4c874e2e2dee9006082a23d732cbf3f26d421e47c3026ed8af7d7034179c70517cab2b36ab7385f6750ac6ebdf46db94db529bf8b77d8d10d77bb788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dbeef9e7536d8a7084d813b6300bc3d
SHA1230d48bd8849f93cc40abfe80b6a79f6c975c1b7
SHA256727372d6a19fee8d1774a99584ee8aefa2df75f2bc49e8649edcb095d025559b
SHA5123f4647396ec6d3502503c01a3bb813170e541df7712aa9aafb8e179997ffc863d463b48d2f9aa0c5baaa4eb043a36aeb21730a72203fdffacdccb84c19390915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56487fed24e163de69b7e3811044fe5ac
SHA18cfa12a9356d59ca2e8ddcd57d108391317e7f67
SHA256f3d62b0232d512af6b7b834ddbf99c2b91775644ff438b11383e5d233ccb0f9a
SHA5128aa1a36fe6daec145b5251126f1986580b30cdb7a7f3cb7806875582e7c3bf21ca381089b8360233869aefb4fc714d31b4d4f1281dc35e4c093d95019c6a239c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597a62ff0309ffcfcc5467284f591a944
SHA1dec565d39c86d811e66b94fc4d8a15ee6120691c
SHA256078f24ad5b4bace281a21a3ac7eb09b00c5e38173f0792a0e0d164f15939558f
SHA512d1b145e9644b1c39302f4a140933ac6150ed63d5e31e808f2683598d26290b2456ab803adcb86f8334b4557ebf26adab0885a50a7c2e316d0fea4e6cf8720f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4fd15e9e17280e7ec0fbe7ff33dbd44
SHA1155ff4add503948b57961fc59f0506c1dbc3332d
SHA256d3b452076f8e2115df3d24596457c00324c527af3e105c2cae2a66d6cae69fe6
SHA5120aaf341c3d981f98fca6caa35e1e17498d36fffdeddc2761b7a52de25685b2cf0128ff15679cb6675d20011897b6bd2015a719d1d58d73cf1c08e94686a282c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9cc9fb0ba746ba507bcd5eda6a09d92
SHA152fddb252d622cf6cabf6de045d56c1bf84d72aa
SHA25641eea842a1efdc28dfd4618fec7b8f37dbd58332101ad6202ef1327dd6769f23
SHA5128c0126f40695c15a4f23fec6e646ef03f02c9dd9868db26ee562dce283415bd948352c795b342eb4268021c4d1e8da50979c46f7761cca68ecbc4ac980c51c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523cc9a58b8c494b3c25d2534123c9026
SHA1528b0a68ba97a24f19a12e2badefce53051f66e3
SHA2566c2f7d820de0a546774967a7c91992b80b5a44c67cac25f9c41eab0c629ed36f
SHA512807a249f07caeb7c9a0bee4f21ab1c2fe02a9162b1d30cbb00bef865115f275bf458cc17de7cb9ff02ad3cf4a459d15cec1787dbc3acf59664cb38741528dc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d1219bdc870b6a96337669a4f0eb41a
SHA1f48cb64d238ed5b73323de10dc7b960879f49353
SHA25629e43c3774b5e8d3d24186bc908559f2cd06af6c51426aeb1d57eb02a2e2a9e8
SHA5121bf1a702912d75a5938cce278af95fdc06143d882b789e5b59478874fae4591fda0bee335984149bbf136c6dc7494944aa1d7c8d87ac06e750555db28532ce52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a689f885d9189293a5c360d34fee38aa
SHA1b6747dbc5a75ae36849ea1e0aee23eb45c09e6eb
SHA2563a6f4ad03407c38b2564c095887c9fb2e1bc296fe43a880cf7a42f31684cb0e7
SHA5129250fce8a33a2bfc46b8584a11396c01878e3b9d8bcdd4a302c77e67ee182730780f3478b404ad8acf3ec5cac4aca0b1b20d3ce7e1b020c4aeecc43bcb9b8e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551915e4da694fec68d002fcca3a00d2
SHA148ae45a91d34e12ffa50f573918ae44951be3955
SHA256952add401c8185ce0183b1234ac4e9831d852f355065b836d8fb1b114bae9482
SHA5129fcd05f90dff29912bb6cd49486325926972f3122e484e6890672db148993af9bfbec130cb12754e98487d4800350b9fc430a2dd20e038e7d6f35604c01bd333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f141467525b5706f8e3ce2430eef7ec2
SHA1ca439acc15576e81d5a9a86b94a17b5bcab30ab2
SHA256e10e8828805f9a61704cc12228671fc65aa86d5dd78c3b8fa1c511377dd71be4
SHA5121895589104cc35facabd7d26058f2ff4ef966cf788202f0cbdc8ecc5aea395c56195c83247f831b7aa6f984f81efb545abd9338ec3614cf5329a76e1e2b41942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37af09c0161626b5b023d26bcd7604d
SHA14c5b2ed8a22f0cc559bfb7da25f4c0de2d010937
SHA256013c789b46436fa5ba0947607751f4ec362969f0b37a9a53173bac2306fbe72e
SHA5122941bb2240611650b085e03c07e6841a0ded4900cc37b4674cf0c6924bb9aab88079ebc771be8e7cb9069a74bacf9b188673ffbc3db741f7f1193cbbfcab11fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d282ac02c330c48b0a19f8e6d61f5fa6
SHA12760511635545c0f580ed4dfeb3d4ad1b1f77198
SHA2560a8cd51833e7acc7b2a74ef27549f5493422012e6a9340167262b6370e005300
SHA5122a09730498513625f490413fbbd643fa8bf9aef2e4a5239e83482db3b99ddf3f754a68382a7c32f74bb2ee8dc2b5c67950c2e5628166ae36a9ef9c8f821d7026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542020b203b5a2c9a280d4e8befe683f2
SHA1cbe04bdd9e991f872690997e8eb8835f68610457
SHA256121b6e1e96ed4c3217f0ca84e704a8318e9aae26df5c8ef89431675936ea0f6a
SHA512fab5aec1ea499d2eed3f215b96e9f97f002ed18c2c937890acfe368e8553b6640487b27e6d42f2119835b652b41990db16273428614cdae3945b948275eb78c2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a