Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
2937864941a27dd4686cefab74caea3e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2937864941a27dd4686cefab74caea3e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2937864941a27dd4686cefab74caea3e_JaffaCakes118.html
-
Size
27KB
-
MD5
2937864941a27dd4686cefab74caea3e
-
SHA1
46ea717568345ce641b91239f466ff2c785ff392
-
SHA256
08610deb58ef418ef6aa6bab925fb254568e796950df984e061f366049f5a495
-
SHA512
433613f42543c4a6ce2d05ad5301edfe3d0abf995bcc236ecd11e332e96996a4cef6a94edcd84d475ac656e2405e8f2290b60ab3a846b70a28da77c958439de6
-
SSDEEP
384:ngXcUrtIE/TWnMIwkze3Fk3zHQ/5jePa3Nee1ygcUSSyVvKi/D1TfOTtGi8Gyx:nTl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47FB9231-0DE2-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421406967" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000adf88d4ee1c84cc82f3e7ab293d405633240a5309570686dc81f601dc2651a24000000000e8000000002000020000000486b11097d9db5a011e25f5453f438ff2c8242c9a21c440862dfa0cd46f2a1b420000000dcaedd9a93e077d3d401485b68c8be794a8862c37b9ef502a350bcac19be13f040000000c1e2c66c911f2727e7314a57b039c749fef3570f5467ed5c8f6cedbfeb629feef869f25f90c9ce4c94decd964d7f5f93917312c0c4113a8bcc0725d406be883d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0058af1cefa1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2937864941a27dd4686cefab74caea3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3dfa960a5566d74407d731026ba79bc
SHA17f0f1b41426ddc3a1146539518f769e2f2daaf61
SHA256adc4c96fe46578cba092adf38ced1f5df0bedb50dc0521dca2f1899556d03114
SHA51205de7a4cce8fa97df6b933ae57040255a4a78fc30a59f0db553e47c4721d94c42472d967658ed6de09c9c48f9824323c675c046a9071f9c604bfa07c6fd98481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512d5aaa86fc83d46f30fc95377aac27c
SHA1aee4672c9f99d78b0452c184097e302b7c8eed89
SHA256bb6d6ad9bd3b736b6e0365912b2ecac286abb2f75e3beb1b3d48e8698edfd622
SHA5122271b59fc55c85c74e9d403df96e1727d48507ff029c75b8b619cf02e4127f6e4a1e2ef1e1a6802c2b92e3bed0ea15bfb5b18ac41c0a0b30344a90d0e1568d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6d7163c0a02330c6460b9390f3666b
SHA14a375028b981416e36222b144807e58a1f4fa7d1
SHA25609bd1115c5362e3fab8f21e388002fbf4273dfa6cec9af441d30c9d04e548f33
SHA5126fb0a3c54e2f9a2bfa5ad16465b166d04c2bb57ad21520ec8ae71849785d42db82028a25a9acc402b1fbd38df1dd1f9d40b121950350286dcc105d369aacd4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc0a9ede8ab3e53374f59c54732a5ffc
SHA15145a2e6f8da8e72e544f5430af61aa6bbe5b05c
SHA256c50319c53b8bd6b6b142084fe6ccaf1c21c38bc8aa5c5a9b2b856b467db14c1b
SHA51211dcd5560368b678cf919fcb1291383bc5cb43be4de5f0aeec6d6a4aefbd82993bfdb1537dec9322f33377e8342379de95dfe94085015d5df7543f2244f23fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598478c2da4174f859c0c10267ba5fcbd
SHA13d7afad84c131ba9e45cee2261b44c4649f75b3b
SHA2561f75a98b7c890fb78b8d13f9fd21071895906badacc7cab73be6bc60b26987e9
SHA512fb9e92af44325787bc455779b496d86eb972134ea5117fc69c27a0d8fa6813c482ef994264cd9ae039bebc4acb87e8f9f56caf5cda3f2ac53030ec0d40a391a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeae05b30aebbffd5a52a16b17ee0ab1
SHA131e73ca628cffc0df75770753bbb3ddc8729ca62
SHA2569629d232e80ad1d43054d6c323a0d531839801cb8bd6d318892330f31f58ca2a
SHA51258b7ccf3588c4a1d433271f7cf7a5b0c88bebf202ae2ae0dd1dfdd0599557bfa4a639f7106fa2529350317a8e43467e706d28b659bf9c61114fba8a1b295525a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df87bcab9b3120c54e1c9cde40b88cf
SHA1d7242c381f26f24029004ff9c6a6d9a141c979b8
SHA256867ba2b16937963ed3cbb7955229f4beed6e055753fea3cb59fcb49f88cfcb8d
SHA5123b5e0a9a7589b7533443f58a6bf25a7a3aba6dd331d9870eb76530190acde00157e96dfc4f366615e73030d1835909f2363040a8c764d968f190ffac6aaceeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53827a14f519360499b185a7bf83f542d
SHA15ad1fcdb9d154d6e89501411c8a5df630decefe7
SHA2562353e112d041637bf44634a836b5f30f7e2dc8f7b01bc886ee32e3e31b085a3b
SHA5122f22967f3562769cc6acd21fd8e031528e3144cf1242820f38ca1a8a3d888d58ddd9fda4169afcc1a5cca7fc65784febdf26592429c543d3ad3a55f98afe2bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d3c5239d3d495077fbc03d445182cf
SHA1af9d4448eaa684541793d8383d609d158515ab0d
SHA256f39db89bf87436a34e00292ea2d44c9cabdce11f3c6716f8999094f86bfb0678
SHA51261a79738c973c1d2f1a33d2a2a776cdc3be26c6f2d6ec8fec74c1af665dbd41fa211e766150289724f798d3ab7783e4f4c83e80b96f606bb2b5b7cc62dd55d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27fd655d3fed51e0ac6f73486f33b93
SHA15c4345e37c5b03d08ea100397ecab64f3b55c0a1
SHA2564b4b2203cebbf6bbfe257c7f99085ed9b3985f0e73faaa965ec84cced4a6ef6b
SHA512258af08c514cd2ce20b56a3dd43c7ab4bd9343b72d1690d597f705560deba3656f46a4b4a7b74593d650281ef2df5b66e16b68a5363df4aad1fe9a458ac33fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53672d093820deb1a1e59e0ffa8ded7e2
SHA15bc9e2207d75827177579f7d15f697f7a6d05bce
SHA256b8b19de556771e3d50922237eb012051e53537e2ce0c428e905901346e81a7d7
SHA5122b19fae4d10cdb3c3be99fcef377da4314a7ee8a55cc7f210f39e83a9894e9ecbcafe39f19c881d80b216087faeb87c8f7b12a183f41a590e9a04da28f127281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8f6cba96ae3bfe21f6bd7340de8cbd
SHA140a11ebcb75b707892d94c235d73bb59343ec3fb
SHA2568ce600194d2f5605df88c6a8bb1ce02dcbb9bce935b69f9c3bc7f61e9077b149
SHA51206a16f627633e963ca97837e2e4ff2f7736afa424a7924e39607737fdf6c17e2ca98ba7cc595915b81cd06de96b7dd4ffad1a5d40264f74f322e95bf000aeef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2bf5bf9cfb4836ae20bb97c182393df
SHA12251b2321d0d41c103ef7b28e24652e771b26303
SHA2569f865ffd85257114773143ad61d35dfe65ba31958b12cad35547c2b6f06b3e1c
SHA5121980cdb3be005f7126646e74a45288f426a2463f7860c6a03c25916490e3c71ddace8dfcbe4e3f2f68362c62a6dfa7a9e886009dbcd59493c697be54a93b5e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e97ff1cd3954bbae001c12fd624902
SHA1e648a1b66ef9c4a9900850bae6ee9d8293980e3d
SHA256c1d06e41154c9f300b0d05117b47c51a90ec3ceb330b5858f3afd6d7b2f34d9e
SHA5126162c9ad2ea1567c665127eb26620dae59c0811c836d3b915afa092b948296bd831afdd8679ef63fd58f348a26a6c0dc17ef97d0d9dfb78d5e09990a025bb1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbafd837a20f5dc548fdabfaf59e2bdc
SHA17bed6dc74a625f45c5e8b38fbf5bdd252da25f7a
SHA25650ac305dd6253625c23a8ac2f3a8ba205824690fb9ed434f54b086e2b95888dc
SHA5123bc6c1c1a004bf3d8d07cc63b8f2a4f2458646ae60be923a640b614ee29cb8e097edc09722a855b1583b341d16c9150d0b6eed43969727de7e85d7706bc671cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d36b34053d14c3f11c4fdd68c046af
SHA1dbd55364384f6d5f25a6848f9a4bf4a6e9e1064b
SHA256da35ed358ee88d4ebd1a43ef017bfc33e5ab7fc0dd628f4b1760632ca845f217
SHA5121de88d30b47feac77289d2e03d3627736952216cf652e14af0b4f7d61dcecd71fd1dd4e04b5116ec786e28203e79b22485f564053c019a184d69eb1feb524f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579f74126627f01062cf4ca6291cf930b
SHA1d58a8d5fdb3f3ae104c029d7e17e87ecd30c6b51
SHA2567fb3418976386dddb5d1b8602d27b969c6e88532c225db13557364c7b21d3617
SHA512b7d12b2d52617e1f7875a0c7995b32c3a67af416a1fc7ab4089ee1d8cc2be501451765a3f7358e97df7a7b5905cb84e78b5e2ebb686bfa7b0df3a31eb9f513c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d0a7a71b91753c2b8cd7f56a77592d
SHA1f9b7b81417c0a1881615181211ac86f27a9412cd
SHA2568059ce663998b9c70d77d5ca1c45ae897e186ec7fba5e8495490ea48df61cbea
SHA512306401e842dd69ad1cfa754e9762fd0e27070784b8ca8b52e1835b3dfd02cd245e63851fed892b2721b6d291fa51ecdf87cf7e1c49f2e7924411151973650688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9130817663ecb218ffe0eca25d3088
SHA18c2f0ad8139cac8133ae51270b707ad2859692a3
SHA2565f47a533aac2e66efd285a96fcf62ba769cb2e4156993f1f2a60778afab599c4
SHA512c149f9eef7f22fe4475f3e18ecbcba28a670793a51622efe664e532c2afc6c69d715ef123d6c77a4066f83fdd29c0cd51c0384ba0cf7a6906bcd788e77c5a71a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a