Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
65e4b775cc7f103bcdcb4ab3b72bf753_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65e4b775cc7f103bcdcb4ab3b72bf753_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
65e4b775cc7f103bcdcb4ab3b72bf753_JaffaCakes118.html
-
Size
3KB
-
MD5
65e4b775cc7f103bcdcb4ab3b72bf753
-
SHA1
877694f8a44901c1e3755d943f2f14b0dcc20517
-
SHA256
bbffe649f564f3ba2b311a1c683f89b59c745db597d5d1a74409ff11e0984c29
-
SHA512
238f1ef46a31dd9a72f6092b00a8b9a6886d263de9feb0aab7cb71903e1ad416b84f5010538ed38873fead5b1756bb2e2d1edd88720e9390d597a25667d13702
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFD1C131-17ED-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408ed777faabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000914a49dc4efbb0428e84d444ebd45ac200000000020000000000106600000001000020000000da639e95e303207a073308f4b34909fba3598f1afcd1d3438d5f2b9c57c1b4bb000000000e8000000002000020000000df60d98f3e724375b4800b34094aa0387c4f4925493851b0d65d16cfbcef0fa62000000047f812d2affc4e60cfd9f29e53661589fcaca015fd70467d4924dee2ac5c4038400000002f346d8a64777bc61112e87edb900e107e8f942e073b8d1e6ffcc7c500c0084c1651bf6b7da082ffe1df60be6dcc46d15c098f41df26f39e65944bbe67f65305 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000914a49dc4efbb0428e84d444ebd45ac200000000020000000000106600000001000020000000c22f8d65d08488e7a919203f6edec4e43d71e992076bb92861e690623badc652000000000e8000000002000020000000665298df558a5bdd059c269fac82dbb5151fd0c75a75e5f47676495c3ca90e0490000000bb8245e87e553e2fad4698067965b5620509303e193708262ce98198684d10f5214aab831f611521e3eb1f7f9dd2f8fc5f09379e600db1dfb55be4033b3b6d46680af47674b1572fe3ef73b04482da7ef1dd5c0da6b42245a275b0a8eb7c833a6da9cd1f30c3ffe44fac5421c237effebedbbab206de6643f69e86913fc2b39c35cba45dba0e42b6ee0e11726244257940000000478e79e73d5f1cc9c667db52cd7c4693ef94f3ca8a11546a0d7e4c20d49ff718afc4def281d3b124fa0d9689e1edc98902072da1f85f7e33ce0684949809529c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511377" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2124 iexplore.exe 2124 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2124 wrote to memory of 1648 2124 iexplore.exe IEXPLORE.EXE PID 2124 wrote to memory of 1648 2124 iexplore.exe IEXPLORE.EXE PID 2124 wrote to memory of 1648 2124 iexplore.exe IEXPLORE.EXE PID 2124 wrote to memory of 1648 2124 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e4b775cc7f103bcdcb4ab3b72bf753_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc83303a4b288948c38a77747365e2f7
SHA1aeebf7a97e3a8e5c0e174ef45211c9748eca47f1
SHA256a0beab84fc304992a10c3578365086c34cfef74bcfe0a61c4e4d500fd8382aed
SHA5120df98b7557e57861a5bd5b12ea86d64e9e1682efb6a134e36ba410cc237a4d913680ed16ebacd2817d6bcfd1e34840b93471f02cadfe636a540948ea383fc230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ad4f0d6d33eeb1c43a21d68f2be780
SHA1d2c056b6d623c53276360c7c46e34a0a16949b4c
SHA25684f2ab6ea2a52741be88d19fdf5bf156c2685ffe447d2abc451546762711f83b
SHA512d34885099940ff3bd7c90baaa134d45c7401281ab32317c7a7ea21b04b771b6d76576b7c06e22ca0bd5553697e2a9d5472ed67270441d05397e65193d5cf61d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591bd401642a642345ee44646e5b5dd61
SHA1cac1436c980ec3a3bcc58d3eda921faf42ac57eb
SHA256367ac81fa6955299e995fc2290bcfe4740e14c69bfb6949e53625034d4d4dafc
SHA512b86583145bdc5ef214e924d11051021de21b1b5cc44ef1a803c774778584a5ee7f25ee45341ae5ab381c189019b0c4d25d09234fc376754a9a04b345137fc749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581517bf1c09d1f9b900a22edc67fe189
SHA183a0fd04f7f9fc1161d6fb02f41abd7cf6017e59
SHA2560a91700daaa256121b62f9d408cd74d8db81c4a7889223d5d14be099a616afea
SHA512b87c894ddf4803642317a94f2961fe8d64e31888f1cbaf02b10d6ba64a91ea3a0c9213bf8bbed2daa4915bbd7a4c08d5e96c3b9594d3ae1b1e241f1b3a0d4169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e6fd5305b4c991510f018ef6b9b672
SHA186e85e067f7f3af02defd7c6049b9d5d96d7957d
SHA256c07cdbc28cee76fd8d739e10c7f077ba7faae354277f633875b1c0395cd30170
SHA5123e9f448d8d4494d4512d504f25b59f06b211bc55ff18d1533f25bf90f4dfa9d1636b9e8197fc05e603d74f8ec81cef56d91711e66902cf13a1231eeeeda3d58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959aaedb4686ec81ca1df8b18691b54f
SHA139ae72dfb76a1a9f2820fc9bcd1ffe89b64ca071
SHA256174d3746268a1fb65492551b1a0f0a0f589cddfe2979b91087dd208d10bd6ba0
SHA512435bf52700372dbb4058a264b2110af56222834e96db67c3f892eb16c6a116ed889eb9ff3f7b5021bf1acffe48e39aea588dd038a47e864d26a804781a123cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ce6175f58c43b4ec43f57a6be310aff
SHA1ac350626824df092d17dbf5fe5dd5ca9f3fc59a7
SHA2567294e008ebd04506cde5cd98c054d702abc9d2ba6756fc3ad8b8d7359f7694e5
SHA51233caccb343467d2f8449d87f5ea223d3c17e3052396a93f7fd5a4aed2a88acdd17bf74048123de20e99c8fe8e12b76c1e02062c85b29927e977cde388a77c0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e58d4481542212958bb4f122372549a
SHA1ea4e8fe902f9add0b3be2313917860688db67e95
SHA256730869979e06aa34b643eba62dd4ce158e0405ad030c0892aa5402639d36edbb
SHA512757454c53b59e52215167be7a978908ed84a8834b2fa2b7434a67e55e2e9a11e8560f4e40e56f9885032165eaaa2934ec5a12e6453819a1b2995ff2e293a4a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5cf6f660e5d70c153124b0027564484
SHA15c35c8205cc43db73b56b2758c74ea92a3f5e38f
SHA25659a0810d354b5d9ef10ab793f075b9bfd03620c5258055c520cc76840438bb03
SHA512fdf56bf3a18304a757b7865e40645a815edf4c339818e702295b06dedce2bb64a28373ff38e563bb8ff403e2dbafc5824f73bf554acb7ec7ab486827a54a1d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5920028b69ae79eb688f4e3570ad42b44
SHA1218074fd836cb48b5aa4b66c87d65b24f3eb3477
SHA256c77b45d17ce61dfeecf221497ce733aafe46865b49f000e1c2b9f734f72e3672
SHA512d4e949897670abeda3f7251f1e37ff990c8377eefbe531e538aa1eab38dfdd3b85971433e06fae541641a26c09bac548438daed8c8f9c1aea6b9753971d73705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d9cd5bde8d77be0d157c22b5ce69e25
SHA17ee123983882348548ac3eda75650317ec457b76
SHA25679c17a2b0065029e10f9fec996b18f1b021d1f5a4fdca172e1bfc70ed55f4b87
SHA512262222455bf7e7476a01229a193c9e692470df36f64132d15c2cd14f96cbc284b10491fc4aba931254716f4fdee94aaaf1bde558df3ac3b8156238641660e834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2026ab9d7fb4966b57f2072eb686070
SHA17a5749e82138fd8094a3a4a2c70b88b56eca731b
SHA256a875d29674b5ef596948593a2b6af90c17e09f3f9e3302595bb482a6d130ba41
SHA5122649b63baf83f50b905799ed0cd8b971b4be45d32260f72898ca90cb19ae2f3eace1723d90f9222b05600f92947c73b5ba4feed1dd60d0a33ed270a82ab318a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9913c46e5b277d529c810e4ac9b180
SHA153ef6388ea2e4dd53ce5d4cd6e85c3e8fcf40aba
SHA256c013f4a1fd77e442771896aff3f0342ffc7f1af83a56f3894f6764f46d286f3c
SHA5121ad365a6ba43717ed0258b67ccff8c8712a533ea741a1a2b8d3a2daa336085b71c7a879e1a8136a76acf46a37fea3fea773146b7882235864a2fd923916a4f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5fa89afcef333dee2e44a2cfb608a10
SHA1c5977d552c5a93fc2db1666213537a961e7f7b12
SHA2560056eb0d7cb20d3c1711f23666791ded52cfd79dbf61a0c11ba9f3806b92f0da
SHA5127f55f3ca0df76af8b26c3298e3f67ec3663f8e2a2ae0f2034bc86d4b99cf1171453cfd5d4c111155c121f33221bd5c1ecf8aeb48858f5a53228861d04dd719ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595fb92177a6f4986e9f52e2cd1c12907
SHA1150c71dc3e8587529ec30481bb1c73e8d84b4573
SHA256b7a1ff08227d124d7da5d247138d0143dbd2e95d2ce4d5ab6315b7e2c33db247
SHA512d7c769ca44c2b133292f862c00935d73b44fa4b90921fd69b3f1d6e35e8d183a39b2d1cd88b97c82edbb3684c64f3452c45d8518cb304c2282171ed269956c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5311f4a90ee52c6ac22127a7ee0b889c5
SHA1020739883cc954166cfe77a6f6caf0c4eb6c8347
SHA256cdbcfd38e52f19f5e0a1a28a0e6cb096f852d8fb7c43dcec8455da05efab18b1
SHA5127290c789e4b16eb44be45a72fd7d9babfed953d25748a4ec033fa857d4e3eb06e6aad066893c41a66a842aea74cfac27ea55dffac41897a45b4e6ebdcc2e7fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bec59fa2c826020a06bebd88058735d
SHA1bd0b5b87fb54d61319bb26cec9dd329ed0ac5845
SHA256e2a9cb34451305d5fff56478aafd61ab05f3d131d0beefd9ee94b6ae82b59784
SHA512be185611f5646be4977c5ff5eebf349757759286d203bffc91dec420075b963e88f836b58e28829a4b95cd53a4f6817645dcf9e14c816e15344f906ff5e93a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534197fc70dd2c8ea9659c35005bd8397
SHA10da1a986fe0a20736da1dd592e972e29604ee4d3
SHA256360674a4e9a7092680638650e8dad382d0ad43681805b9a2bf27c285ac5dd2a0
SHA5128d4a6fa75949ef0002280c415a3a698f8532ae1ea5f771c2a46fcc41a36ac8f6efadae0a8ea7860601e2cc9fe76ed75ab5f98b4b0ca248e31a30b19817301238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5421d01e748d3668696ce1711483575be
SHA1301d0c85603c1448596cd5cd26e71cb99c49965c
SHA256e417147d589e394cfd6cf24bea39df1635d4f81ed217917135fe8b9234949224
SHA512f8aec530a2522125b974c7c0e10fc24b41d4b0947d890277f1f28dd807e5720e3688a5ba393e744defaed600cb6ed495a9fbfaad40e69069eb48f0e6104a9a0c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a