Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
06c84cbd1c560a10fd5167df7908a4a8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06c84cbd1c560a10fd5167df7908a4a8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06c84cbd1c560a10fd5167df7908a4a8_JaffaCakes118.html
-
Size
3KB
-
MD5
06c84cbd1c560a10fd5167df7908a4a8
-
SHA1
0cfc74917854fa4cfb7bf7669fda87574ea59980
-
SHA256
e3b2e4f90de374be30174f0befb352fdf62928e8c7844f1ff647008dee4ba2e1
-
SHA512
37b70ad4bba226fc7e1cc570277f5564a0f45782cd6bcc9e0871c21d5980bc5892855610b6a3e3969b92cb092ed0f56681090f7ee4fcd3600a2b2ee59e5debae
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000002dcf514a1cc57818bb963032a8375d3da6c5f1b7fd4fba023d5ae2696d285d34000000000e8000000002000020000000fe26866b577dcc720d910f53b4311c1312d2e241041cffb8c68271ea7ad4791a20000000ca6517b014a4099ce43af4556a014ebe447ade199ced308c8ace07bffd5511f1400000004945b09dc489a37fbe1dcc50fb1d94e773410e07ccaf8739ac3bc9cd76eddf17c1bbe343206f4f1faaa66834b62eb7a6dbaf2504613d2ad6c621373e0b08000b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420525482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707e28bfea99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA878CF1-05DD-11EF-9969-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2932 2980 iexplore.exe 28 PID 2980 wrote to memory of 2932 2980 iexplore.exe 28 PID 2980 wrote to memory of 2932 2980 iexplore.exe 28 PID 2980 wrote to memory of 2932 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06c84cbd1c560a10fd5167df7908a4a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3041f5aead9a0b39ea0f1430c227bda
SHA1198acf8168391fee8694c52549c1040147ad2734
SHA2562ebd3e2cd3e53a37afaa596c39c33c27d947f04d971fdd01682b234c2d052ecc
SHA5128a906cd90eae39c15f56964fd05c525b6441c8f8dd96e64249c0c9aae8b6838a71e81441954c34c07da320e1d42e340b038255a6fe1b56278805efff9b9ee3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3238ef1132b0e22b70ad90283ea6216
SHA1cb088784c52b42c0bc80ecbc46e435161d3565c2
SHA2562674952fa19ae104cca759841aece181c867bda4a652f5a35788e1bf929a49c4
SHA51215d8a14e34bf0f49a34a7a22669bf829274af0f1a5ad1fa0108ecefe4fb3cb31a6a1fcd593e8b82f2ab8dbc770971d48be1adedd179108af47e69e4a9723ae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530fdafb1df4278dad646f9ca5b631940
SHA1148c6ae4f1e29c8f83d6f11a5d2fff5a6deb82dd
SHA256e8ae956f4f2b0b9073c49fcdc941e39e4f9561cc3fa5a2d02b2318eb1d13006d
SHA512ba18d4cf970e84f98579e1f91053ee730bb32b4687a8bffbcee2a4260341e27ddda7d369a333ffcbd8a6d4cdd9353865dd0a7c0a846032ca8f6060bbb6819bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cfbd5edeccd8d35852b96052ec5bac3
SHA1138fa8d217644071b449fdfbd0f68519027034e5
SHA256b29c83e97bc2e8c726e4c43f804b843fdb566fe76b25e240d9a6b2f8822afbcf
SHA5121f67c5ae24888acd437afb980fc3fd6e8b1a7dfa745351ca58d789754e7ad3bb5b0a29c231cfe5cfdfc9e932bcd3a459a57ecb971ab75e7a798d960c269fcef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d68128c3cedd2b465a3c2201cb1c56c
SHA185882c23bee62b17951b97cb473e28f6271ed24b
SHA25659597d8e7ab24e5842540af04c992f2f46e0e29de9e2f287d9e6225fac6bc3e4
SHA512bd8f732118772d986454f570a1f2bf50ddf056343f696c169c01bb650bc633a68e5418d4e92d756e5b657bb972cc12918cc297aceaa193731a990a65853eecb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51005a56dadafbc81207dbe90ae5e26a8
SHA1b54cc0cd28739439933219b1f4de24ac6965d8f6
SHA2567742bd1340e5709dec2a6da34e27b885b5411a9a7cfbef0a23e583e50b5019ee
SHA51201395a763027700552a9e835096ab4f5bd92a07de8204d7a2ac89b07f1fdc46002f7cd69573b0130e471634bb5f7250e4245bb0f4dca5b977e69359a9b8fae10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c33f76582bb8c8db17f3a8a2f92486
SHA1fc9358e415e4456f20cc5c1cc65ab155235cb395
SHA256ffbfafcf7121902845e0c72747d184db948dbfcf5887be7a14738632f1cd2107
SHA512bd8dfced4b31be1f62b61dd46008dda5a65dac92c466c3a078e290706c4f43a2e0e18d884856c7767025b70dd2ff0d4121dfcc34a8c8eeae78c5d8182a60cdcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1f60322ab260138c75f5e5eb149a75
SHA19225ea0b0836a5dc1cec006307f2b1a867495735
SHA2566f82424ad7eb4bf07202972bb2f1e2ca0435a4ae00d5401695c80aba6520ca0b
SHA512693890e618c2b56330e182f10379c60a6e2415c51496a30745ea4a26c9b46703858dd6f3c1cd4ff9404187141f2639132e6dd6c02b1a292b25365efa1e76925d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9dd56ba82c48324a7a0de0db7dc2ca
SHA15da50ef75388f683c1befc81397c7ad5187f4140
SHA256909abdece4dc98626283c0cc030729d8a8e4d9eb0ca62a7ee849c3c4c98bce82
SHA51224e9d0b0fd90c5e1627da797b6888de981b5b20e905158b59449e34ead6354a5d0166b6cc8ca45c0e2bb9f1fd348645df90e0a4448596735db8df3d4a377e085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b233bac5d4bb7f4cc54e9c42dafafcb
SHA1d6ab565f63fb4081a00b9d3c8d4976e85201873e
SHA2569b8034b19937d6d4c7e090895cc87d257cf2f9945a26801d1bfb6c20e289d457
SHA512e7734c7ce523f8653a4849b5b87e456cbd8e30b29efac654d9a158a5db9d41cfb777bb0816f63cc728134d9e5be2eb7897781fac488cf54e4a29807bf4230ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726f4fd7fe3cf2afab80d5629ecf3d80
SHA17650e3aade2a3833a0216f9502a0fab3209f2d9e
SHA25602748b8d38adc51144f4a2d840e13366ba9239db0985aafe698b24c5d66ab707
SHA5123cd7871c327100ce81d74e3c810bdec8f84af99be22e3309469427f29350c3394c852fa4946c9430e549014452bb66f146d22bbf0b57148cc0d71da8e20e9cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a15e804e92bab33a1a763fd6b1aca3e
SHA19f395540107ae8cff1573c0183366849af8c12a4
SHA256ee9d98969b628ff65e67bf096b52ae78271fe0eddd5dbcefb13b338d1bd169d1
SHA5127b674c14bc3cc614eeae69d50316d0ce1e9af6bcca500ac4aaf20fd61abc5636d0e9a99fc9e5ddce89bc4d199dafd874898d7dd752c7fc25433b8736e639ce24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55440922a8f90c8f3e58caad6557a71fd
SHA17f6c58ae32173a3e2349b935f58e65487a8b03be
SHA256750c44ac2aed6f5ab3d9a0a58707f73104553820854a5bbc72e9f3f4b2e3ced1
SHA512d6dfb73325069ffd39cebbcee401dccbfe125ad50c0da235b893f6c2ed749fcd6301ac0cb1d157ac3ea8a049725852e71399220bb371faf2607f5167a9736786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac3b1e853fa0efa11d13b16ac072845
SHA1031dcad9ce8b7f98d5716c7e5bb0f8a0c0c3c004
SHA25650b73d26107cc3f847c261db2b71e93ba09fb4766cdbdaa573c930be53bb132f
SHA512b5720ea0d6874ee1c20338494f203451a057ad6d1deb613073b55fd8076cf3b712d29f806a29e1b504679a867cfb30158e0028a26293a9a7795a751496f829d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae7eae10ff5bd719a32070b1c846e07c
SHA10eb44dbc38b04572d1d3d6d9de7f5400e8ff2260
SHA2563445253508f1f8a0dc1dd27ca195c9d2d49a4146bb3409c8f04c43270db49cf3
SHA512f8aa926d8f6eba8bf86aa3afa1f56ab3ca3fb1e9920f59bca2d518ac03b44232d232c682586b8e33c8400f31ef80dfabf8f8ed21540333e3d78a1cbea6edd42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c8e749c85114840742ac47dfb0d925
SHA10db30152e4ab05c8a441088c844188d425c9d2e0
SHA2563e1db02303437175ffcabe41298ae2c93a0ac0635990f22be7c30ab2330de455
SHA51240388db1c2e8ea1b183fa8c4a341feac007bc6bd47d71cdef3bced714b79eecf9930df8d76411e0b07bc7dead7bdfc17fd904a5e775351c07c31b2081a6e8fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdca4158c9f788b5594a3981719bf34
SHA1be231562495af6e2379c0c57f7a651da24c7e3bb
SHA256fbcd8e58f6db34dcda8e80388dd9370176dccc7954f6054296818d27f956d0e4
SHA512864b0b60ffc79f1f9b296640fdbaa89835e54c56044ab179350fc5c7729a860ab772a48a6b5086d2598c7b0306fac64d850d2df1222670155251c72dd9e92710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b054c4048af6f055ec1b5e07c80a330
SHA1da686bac07c1c3f0cc6e5d41ba1b7c40a0855c8a
SHA25608c68b6739efae6d4e083a4c22c023039785da2170fc84844f32b5fdf27c7aa7
SHA512d7c8c62143d3f37a0d75dd134956c2a7fd1d135b585009d4a182c68c61dedb2c5f6ff06d1a8a5dd8044d48454d9bd7a587219d66af21ca975c36c5aa3fd8fb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ca68f80b6b8a3bb297abbc9a8237dd
SHA156bc16e4f5df5dc65852bf739fbbe32ff450861a
SHA256196fe3dac58762a1fba1576e23973d5e2a04c8687c5d7c3244d1ce28f0d88477
SHA512d776b78d45c0cdef2d2443b29d6c39313e067f644cbace60fe23bd771fd7fec916a390366830044b3bc29563979c289649c710156c30c2fc2cfb27f17579512a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f13e6d119be5f3357a5e827f926a7b
SHA1c33dd072b79b5ac02484899d759b20bae7c78772
SHA2560248a0d724df60eddb0df409d185d723905fee739e64af30f1974e77d47d3556
SHA51290290a230c98e077359e08b9ae5eaa2e9b0b31f3e7e261dde0b30e3d3fa636bf21c6934d8843715f26d802a44e1a9120394987ecd1eff8d024be2abe87ca26c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d137a1b19e58775d293b3f6c5444b3d1
SHA171e5c487068e20776b9050aeb9837b7118ce99e5
SHA2563d956dc0f578b1a34c348183fe20821a5a78722f532f2205dfa74722167051f2
SHA5120efa6739aa8ac144662889d4dc2013d4236da23cad8daa0387a0055350898b492467f3266140a2b3a32a7100042d936699b08f7fee6227db6b1a7ec962eb5332
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a