Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
69380fd09d102c0fdd60104eb91720bb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69380fd09d102c0fdd60104eb91720bb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69380fd09d102c0fdd60104eb91720bb_JaffaCakes118.html
-
Size
348KB
-
MD5
69380fd09d102c0fdd60104eb91720bb
-
SHA1
be924282d4e5c0b960d3b110bcfe84892c65d6df
-
SHA256
4ddf8fc10e89502a039f96773cdf359e6a701069bab5cf7642a033c6cc44dff5
-
SHA512
02a4fd951be692133d652715fd29bc211f490c1080766cd211238ff39cc0dbc93a87b730e01f933f0aa4462aa6f362cc76296462d7bffbcdf833351f50602f12
-
SSDEEP
6144:SfsMYod+X3oI+Y/OrOsMYod+X3oI+YAsMYod+X3oI+YQ:m5d+X39t5d+X3Y5d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6086ed8cacacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B43128D1-189F-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007576cd67d8a4be4a9d8374855cb47aae00000000020000000000106600000001000020000000c7c2af5d9dabf1ec2230dd696ea42863d0881b845155a65093f1e8321137c46b000000000e800000000200002000000030d8768396f570ac0e3517211f2b70d310c7f4f5cea03efcd95388da1a30ea9b20000000b9d6f48a95373f41292e9fae2b2b3d67d6988484294a8f418c89a879e52b5b7140000000da8a295610bd739f3af61c26286afbb68cf80923ffbcf3ca7cbfb67d335d129bb7c0fe6a329a0d142f9c1a63afa1da6164498d0ee0f415120f2bc4edecc14265 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007576cd67d8a4be4a9d8374855cb47aae00000000020000000000106600000001000020000000244111a6cdce9f703220402087c7009724f1639b72ef8cb168a4ffdd72248dd5000000000e8000000002000020000000474e4e732d482a0982d3b0ba956ef32712eb8305e65f7f274293807dc63f59ea90000000e1bf04e053b37daba66b8084344a1ecfd273e41711c0099c12e1a464ce905e1cf12adc884b9ce24f3d08caf8e3142dfe8bf697c2464d72a486b5ed7f540a667a9fcdfafc249b78271f14a00b476c6442f321d3eec7559d10ec736ad71cba13f8f42b77986d119525dc83b9a88f82f6e62ba8f7287114b7a4b68507733c40c9725dfad6d5238118aaa6ec02293cf4714b400000002d2d898e0ac4dca5bba1dd3081fdc54fdf92ad544d0da50a5a7dae8713adafe6f859083b8a84deb4aac872c7d4cc34affa73fdd43728ca348a17e716e684d9d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2104 iexplore.exe 2104 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2104 wrote to memory of 1188 2104 iexplore.exe IEXPLORE.EXE PID 2104 wrote to memory of 1188 2104 iexplore.exe IEXPLORE.EXE PID 2104 wrote to memory of 1188 2104 iexplore.exe IEXPLORE.EXE PID 2104 wrote to memory of 1188 2104 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69380fd09d102c0fdd60104eb91720bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aabf08b2d960ec78be4a9ed95306726f
SHA101bfddf8b86c0c5055473ef10869ebd9e2ebb59b
SHA2568afcdb1427821d9846daaf1a1ffba4509654de7032b064309f91fed9025dbe02
SHA51207f92fcdb933256bbdfc349268431b99245867e6fa866618c13e01d332b5d65c389780de68a2f1cc3b3d11e0d7acd55f9ed50e40ff6a233cf06cabebbba8581c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561115e573d48a12eafec504cbcf57e5d
SHA1b9694495d859c4f29770322a45e08df31acea2d0
SHA256dc54d73def192162dc7d38d2d3d96d89783636a383a59fc8e49c8aaabd479a04
SHA5123cbc3db3f287f2a371b12beb75597077f82af48b65dcf3d4dff1653af679c377cf9c34197289575e513f895175370852415329301a8370015a54bae0800ca518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c243eccd870e6cd24f1e157c8fbca19
SHA16db103e5f735158e8070095039394420e61a1dce
SHA2565097bf17876eed002229e90da51fa783e64c3c48df3c6a5a34a400ba4228a9b8
SHA512db1f2c2c7279328225bf93baf4959427990addcae8a47c5acf49fb94282825dfd33c362ea4f6bcf446c5480508f0ae296dfab78e16f12db4cfca932c8a36b6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e958d3a278fdb0816e5373edef90a3b
SHA1df0189331bd0e7c58371864a8db6825fbf25180e
SHA256b6fc21364a70043e6e51d8085215c021b734958a529b168b7cb5c5297f725808
SHA512b172256a4561dc1b6118c41547b901ae9c1d1918adb2a99bb5f2be415b8f188baf36a8f35b77e2c327503b46a40fb09c55e8080b38ebc89ae00d48149749119b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a941b03f8e3f32ba9f58da2999c5d784
SHA1f6cbf2839dfce2cca0fcc9f868a59026348382d4
SHA256e19e2a7077ba40bfe733da9b1a22280c05b3afb1676de484e1dc6b7d10b98dc9
SHA512f7cdcdbfe4dbee6beb66147799a9141efcc0dbeb05a5827179123bed775d302024031011b1af89a859d04f89db8fcc49d4ed42654345811f28ec4d6b1f45d168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaafa25a689f439a0f67ea7421c4982d
SHA1204a872d6cc483b1d7a970373ddec621157ba42e
SHA2560b33602c840b8dc1cf21476efb4bac792c6fc93700486a0704743b51016b999a
SHA51296f5519fef70f2baf04c9857cd71b744786c522c3ad8fb8225fd2710769cf8418df0e75549e130df6bfc5ebd347496c7d8145218169e349225ab356dc3b8b4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9c74b3b5e3c14420760c73cf9d04a0
SHA1af03517ddd48865f13270101582d7c882ab69563
SHA2569868cf02a6e639d006b9b72839e48b51d7d8c4bffcd352600853073ee0c7cf0a
SHA5125f10f0df79784f388f869d50919e4d5b07ed68e793aab9bc576e7ebb3f3aab1525f636a3009b64e5df8c586e84b06d3bd22512d2edaae0e1307a9193a15771b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb47d322e75a8f091ad1bf9102929498
SHA1c4c9fff1707fe779e270e41dff93aadb61c04f4f
SHA256ab2c4d61e04d14d087f353052e8cabb0c3edbe9c21750540a4d8d06a9d570607
SHA512a669148d153ea2d7c9d52847d90ed66ba0ee693776948cd8a550b28deac6b3932b1b4533f343c35e04fd11d59a76d2d9f3447654c2ce4415f10b27f977e81047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5280f385481a53033d774b647266086f5
SHA14eeab1c40cb94cda3cc7dc08312e358174a9c9e5
SHA2568d09831585bcac020394374282f34ac35cb7b8175e2b00ded84369c4a65ec24e
SHA512c1c520e97cffc605917619c2248eb7969a62648be135788c5103df38f293d990eb221c9665b8d96bf11b78da56f3b5066a656567af7367f1b6fa7f52714c3d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55446ca6bc2d1259fa659dd96306f6936
SHA141a247489dd65fcdbc365637bef799be5c56822e
SHA2563e069d49db625cf9a654311144912d3ae955cf94db6acf1f98f35548cebce115
SHA512842067952aab0946dc0554dcd22e9f6c71bb23470254266b7da6f25a659a00569b827bff8d418c79d7cdaca0009a31073263763a510d39cfcd39ff78d31d0f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d1854b45cf87aac3d26ec19075b54b6
SHA108574f1d2d4aefbd069c837cdc0ea1f63a24e75c
SHA256713b5ace7186151e26fbeae62e3c13a7cc464e8cf1e970b2bf82db412ea27ea3
SHA512bb86640a9c8be83e9a38425cacbdf20a40e1536f31b7bbfe9fe1c7b3346a50e4c572af9c1f098f4c225538dab7e49b3a1357a4190f35e159c31fc7f7ebabcd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd91b29855d6978dd9f502f0db3e2da
SHA121f446c11874b370bc6439f9e6efd555a32ea9f6
SHA256d07120751a8cae6f9c3baa7b13e3bb3179d72bb02d3c81e58c4813207fcade10
SHA512a55afed8839ba8896b4836c9cb38dc70d7bf83f1fadda89318db20a02c7a709b85ab4bb0a048721211be89b9e765d6f44be989423dc9385010b552858caf8bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd340b246a88fe581e42bb89d4efdeb
SHA141172d5b3992480ab65e9d574a2229339ffcaeea
SHA256121e208276128988b326074ab84d82f04b1d8e5d4df5ddbce88d95e93a1a42c4
SHA51235a3b2b49b6565e914426a9c58eb307a11207fa7b5a98681406df0f631966014f905110d4992d36571faf0097321dc41d150dd029bd480da483b9c9af3eed105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28a59c2d9bebd9c782fd96ba6880bc5
SHA1c39de8dc818ae6bf4150366284e00911ab53c75d
SHA256fad8f74920dd71e8f1b1516796c96389627d19aab88c04a3caf60f45649d4f8f
SHA512be2a40639f5873ed62958e2c39708a967b87017d707954cc06e2e6c0a901b1cb6cfb9ec9399d5e98fd833c30befe2be832470e6509c106170cd1c54e578ad391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3b2d2bb0ef37c392bffcc856ac4f4d
SHA1e5df00a4ea2a626d309ff586b13c23d06b3a1912
SHA256de73233f301d1699a178c2f615866b219dd6321589fcfbb059b7e65c4af2e209
SHA512405c62739f29f4bfeabb239ade73180dc5765d77ffa68dc7f11dc250100050f035c692245cca396f862b328ef0ae96e9a913ece3081f62c5631affc0f8850ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6bf035c5aa089531b914e20744d722e
SHA1a018318ea00bf9224379b30ef9024bece3bd726d
SHA2564c0fec38a5a08181bb65a11e8a36047f896bb521597332f83dbdeadcd30241ec
SHA512bedd93efe3add1431e3f635d60cc9a115fbe8aa41cd262d920584c8e1d3b21c9167d54c31c9d1541658043096b66b89ddd7945713777b876f11dc63771765c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d9dc1e71281ef046336e3297c6e1ef
SHA111541725914c4c5cc121d42524a4c08df68b516e
SHA256d80cb268e1ebf6bd306926fa81084d0bc49decdaf73d9a22e144ae153fcb43a4
SHA51289cff78480eeb590ddffd3582e2bcaac1970130500565f6ad37f7030e63142e6c4a6ee161d409e0c5fc74ba4fd11a247c619967653fe24654309145ceb5a60b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3159ca2f8467bd1d245f85897ac3c9
SHA1a6c9bec6e2ebba98a279297df17bd03e84c298be
SHA256354ac6f2680ca65e27cc98a5dcd3190260e9d8e3a900490e48d470c58328e6a3
SHA512c60b052be2643a2c4c06c220df4b6617ff9dac11baa7c430419f9f1d2da5bd2aee3937ef106212c9096a954d042aadb7330b1231f79f41a8df757d384490a4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a188fe9b6f1e4bb2baa09065961fdc3a
SHA1a995920126fcbc58540ff970caf3ac05f0151ec8
SHA256d281acc746cf6328d2d2d7e5fc7d6294f1a79c4132e4fa87cd80b7b16203f116
SHA51220cfa1b852ee39d965ad9271c2a15df91060e2e59dd3cec0185f16aa8f5adff56c975107ed86b2d62f7078ac70b3dffd26f00c739b8060fc017b60eed59d3403
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a