Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
09ac64b68fa261c6702a32f112eeb092_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09ac64b68fa261c6702a32f112eeb092_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
09ac64b68fa261c6702a32f112eeb092_JaffaCakes118.html
-
Size
27KB
-
MD5
09ac64b68fa261c6702a32f112eeb092
-
SHA1
91aea71eb9789ed4ae558a79fe81eae7dcc4ec8d
-
SHA256
1f686a7678e002112af534dbe37c55a0f17507834f38c159038d603881afbfe4
-
SHA512
5d8d59600d9b3bf840dd6a59174b8ce1be7de985c5fdb50420dfaa0086a13aa57eed60aaba1fa6ed4313643b5369fe50fe21dde939bdab4ee3101378afae9ac5
-
SSDEEP
192:uwHsb5nGunQjxn5Q/tnQieQNn5nQOkEntvfnQTbnRnQ9easm6uZgeQl7MBwqnYn6:LQ/DPUEg5S61W
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CCE3011-06E4-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000033c5300dcdb5a7aa036a92d86b547cb7c4bce6851fe0c240e3afe3451bddd4dd000000000e80000000020000200000004bdc200e58d8904945731495972475fd3c441515b5d293436913cc5f6e9d65472000000086c00e89f39ed9983a25377426b744c8b912f7c41044e486643a4aa2851a6cf140000000f98f1ad05a175772fb1b5357cde1704868ee46d3df7c2c9f46d8dd480d9e461a9bd37bc14da37db0b57f44e154df377e241dfc2cbc140c8a3b0dbe6141a688a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ac7b21f19ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420638175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28 PID 2184 wrote to memory of 3044 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09ac64b68fa261c6702a32f112eeb092_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77bffd54cb816a374a6b621c5b39365
SHA131d96f822f1d8aa1d0a889f55d55a224fa69dab6
SHA2560bdfe4170c260f0986e6e41486d0211e620efbd805f66465823ec9e4392ca1a0
SHA512b96411c7ffe4e246968a588fafa325bd15dd456bbfa2efe0aedd202572715f12b389c5e8bebd89bc1dac5ee6610cc658e2ccbea1c1b6f3a2267a074b7bcccb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adbb99c61083833d1d2d47c63115179a
SHA156f2f45d9f2a5173520a16c1f2f9a3ac3625e072
SHA256fe442fde3160f81ab63c5b7ad729aa98850e9ced41a86fd09e61913d58dd2a3c
SHA5124f1210f24d48c992a553da4ef5d13449fea89c29c6fbe13365ac21cfb6ed5fcba4432ebb4240fce09a2e54732e52aba4c260de9b7f19643debac30878ee5d3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2de30c527e0c6b9cfa754b7f7655f2
SHA114f776727f3ff6a9ec545de345fadc2c97906fc5
SHA256718f827cf4ab7582f3b695c32930c22efc64bccb30b99a4edea80c1ab82bfac3
SHA5125188f8d34053a20297c41eb489a27563d24b9d72354f2bd3dc94e73f755a89f70f23fc3fce635b78b3c10653aea3afccd3be8b0096983696843374f07f9dde79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af761bb685f3427fc2085e86721788a
SHA1072850af6333b853e5c3c5c4be37063214e53a74
SHA2568b0a77b2d0d6981a19c4b7f4ba03ba88bc715f462f82c93fde755bac495dfba8
SHA5125f532de8f425116f4ce0b5b095405708e4b4bde740e0549508d909a723afcaffe79ad22f8336c2bcd56ed5ed5dfa7477f87aab158c5285ded0579ec1ef11b53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fb6faa979560ee254eb2f6fc7f065cb
SHA122233edb1e8d1ae481b0b740309463bc51f63e4c
SHA25608ad0954c05d51aa968919823c9882c13a563e90d0928f78baaea875ea8c4670
SHA5124639bc73aeccac377777f411e3c0c1f855be93f18b41751ad9843ea6ae392d97b3728ea9fa32b90a5f93523c7f4778e7dc7065b44736abc7667c1dd8788d5d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58029933677d226deeadb7f7863593fd0
SHA1dac7ad3a6c6852ef886d6453743089e088e59efd
SHA256966600c2a32335ed69efeedff22b5f5625f4f33b5fb6dffb9e8e8a742ea60918
SHA5122a7bd242952af2df3d5ff5badc87d75f222ce898c3c3d03f489397a3bfa4a656a6a6744ea08480230b1f1fdc4449e343267c644fb573f736bccc3875fdc62019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f409c83e20b393c75ced0538198de6
SHA1e1fe722987aa12ad698a4db60a744eabc79b0487
SHA25695188f36c7b0d0c7c35432138450ec3580e712c74c007e18ae47ddf99bc7b02a
SHA512741c8479c86fe7573720297fde9b603201386ac29a11f2062a795044b26acb2a8988f7f7e1fbfd3402d8b74f12f700635b3faa11bac99c66e8d5d79636b9e688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e74e1e7a258cc318addcf11dd9cd21
SHA14c174f58f4dbf97c630f647f5fc7214a08a02b95
SHA25660e9a0d184b6ccb4821b0a7161360fdff61d1612df49c530b87e28654a9f6f71
SHA5129e45e63e6a4b901bd2d7ef56af137c885082ed85ea589c735f3d52c0a05f45072dd0a9dadb2e8908255cae5146d1c7ecec930b5177c5cf07f0d6d4d562606769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b62d48b97eba3674b33dd9bd947e8a
SHA13e002f60443ca639c53501a701268ef5b1be4372
SHA256429965a00b59dab5cf52e4cdd8b440d939fcacdf3d35213260bc450659fa7dbe
SHA512342e4a0925a3e972f33d1645dcf7f903ade0f347412682e55f2c6d95d72bc20959a5761222ced7ebf7e47eeb0b1028be06946f6d001db8315991ad2c699d964a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2a8aa9eeaa9359c175e3e53549d4c6
SHA1672c37f0dffc5ca0e64d6605b61a106fb6482fd3
SHA2562e44fa84f36191fbee4a0206882f116d01d9171cee12680073fc8dabf6b9902e
SHA5129b6968cec9deaca79402c2eb98e9575d9d77d20ffa57869818f7a44d1bed0aa22d75c1dc1987ee3fb5717a3dfe14c86aacd7faacf695d79400a15a00a9933ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bcb5da3f9082b427f27e093206e10c
SHA148546155c45c38aa3a12c7594590ce1263ab2395
SHA2561015ff0517361fa22bdbbeec61239add120e12ae9ed451df5c48fb3ab5100a20
SHA512ab625799c6d0f1a5a7d41970c65cf3d7974e770bee356ade1ab91f5c57527e60d6b220c45402874bc1d5688f811556a374460f61bd81e9783884584f2e76a690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f63cd50839a228eccedbc1902322d32
SHA1582304c33bd8c95b00f4eeef4c32386b03776e48
SHA25673ef31c8e6a169b349df7c3f2d33eb40041d1ca278e08b150d54a9c4178995b0
SHA5128a86e59e6fc4f67ebb4dedf2a1a0ec043a3766ffc67726cf28fc13c896d7675ac16728d3bd302b13d7f030a942871e9727cc1027178235b3754f1f9d2c2b1aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a86bfd3845ec2346d8f8964514869ed
SHA16e75724da44464ea6606de67abbbf5eb6ae2d105
SHA2565de9d2ee9106722d7c1f243a08e563579a37d147ca15688e75e2df44cd0d3cc2
SHA51256f030212a00514188ec80d434723e36a93cc1b9dc9c3566ba4f1e93f8285a23118d86ac2bfb0b3aafb3f2d38c6f43b31bd5d2dfd14623217a8154de4c8b161d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537597d9500c91d2ef2c53db97b1bee47
SHA13c3b0bc70746731dcf70ac4f7db8c1e6e48b9465
SHA256fd417fe4cb30fd00caaf21143f33eb7afc8ee732ab1db83f9c1d8e20ef8d526b
SHA5126f7783cdcfb21b42f2afa0fa16b2cae0fbe7b18e8c90f0f5ca187d26af3f106cded77d7a6d7183c808b8b6ad06267bd63800299629e98e0826db6d198f0df538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575135f554a71011a1b1864a27cbdd91b
SHA1670290ca6be896da83e897fc53686b90e4837c7b
SHA2566323700f890175cbdc4b3babf22550b7d865433d20428e64a4124a69c3d268be
SHA512bb3e642ae532e85cae31d3def57ee8b30f9b6d4ea3221007dbd3a32003a800d8fef59c12db1fe6b63e0e76e6e178790348581c9e29f7e15c556f715db4fa032d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57099b6bc10dd88f4931c91dd7545f2fa
SHA1e1ce01e1e981342c3fa6349a5869ff8a8a251c11
SHA2561b8cde6a75f20b60249235ec747b35cda851f35450007ac2c13a16915976fffe
SHA512f714f8634836362b312f5b1e333e1664d0260ef4866a754b0f25894a8a83b0f54159355aa8a6993b722b69181fc8809c76d99c9f795ee8f5e65032f9087457b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078417ced6d7015253f944ea62dc9593
SHA1b9aa2958fc68bae0d62c443528c98c97f0b1ff7c
SHA2560e70cda607b00e8cb9c7002312928cc02306cbfa6df49680aaa95247bfc68be6
SHA51270fa63c6383a1b933c6d1139bce60e5677fae4251a6f695ab1a5042b8779903fdb3b98213020140971da29eeb1184c6d3e58cde22677788a7cece8f6719875a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f54dbafb521de769296679ecdb0f6007
SHA1252bdcae4ce7cfddae15ad28b206ba30bbf75d19
SHA2563d5b46686502ab672d11132998b14ba1acb3a95fda3c47e15a323a8e33412dd8
SHA5123fc1a263117a372579dbd2e7cd75fe7ebba839b5a866389e3edd18b2a8b6894a73920b1b114d23c1d058befc62cddc188d11a705b9a79b15919a3119874b4bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6c8689dc69e31ae6a441a8ba54e00d
SHA1081d078a718ce74b622e1fe6c006b3c34c1981ac
SHA256cec9bcd1151053ba17128517fabd0856f6872c7defb490b95ec2382869611b79
SHA512b1b8b60f0bf89e658b7febba71f9379f9fca864e1aac47c19ffeaf8f5a24c44ceaa54680e53c23011613491b0082a692d6dbaec807fb9a201933d7496d24a7d7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a