Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
0e0acd7bdb5edd7934749e691e331c89_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e0acd7bdb5edd7934749e691e331c89_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0e0acd7bdb5edd7934749e691e331c89_JaffaCakes118.html
-
Size
461KB
-
MD5
0e0acd7bdb5edd7934749e691e331c89
-
SHA1
1f0d2cb4bb4e6bcf9ae344e96b3a1968faaa360e
-
SHA256
52cf8f82aecc02208344c849850a351b80b0086ebbb0389641524be7d64731d1
-
SHA512
be2138847ee4a5c654762cdcb464ea0c24b296324f4e529ccb5b55ace76837e1df24c98999e0cfafa89c3334ea8409f8d6dfc67c9fdbde3af83907786369f57f
-
SSDEEP
6144:S5sMYod+X3oI+YUsMYod+X3oI+YdsMYod+X3oI+YLsMYod+X3oI+YQ:85d+X3I5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000017daa8b362e0eef2f0bcfe6d997a688f5e268297dab006da9d952e8d5493beb1000000000e800000000200002000000026cad539220e2bea66183da8b3b439565441ce317f6b6694915cf7030dbfba5d900000004c89baaaacf6e8bf124c674cee488df001cdb174da703e5ebf01b6e9bfb8adcfa6ee74fd05747f39e6171228c2fd8d96c22e3e8c6bc033c15ba5a8823b571e2410dcbecb3ac525c6803821f2c89bfe1326f202f7c43453b025b8edf16a06c36c062443cc4f0bb3b9c8095423e106e0a417cfbf484228a37481be8052c10138b8ee40aaa2c210d4c29b9360a31d550b4b400000004ac241e6d75b163f54ba02113802bde6b51db6fcb79da56f94ae9dcc88dff5f45e12b32ef06a849deb876e7fb567288f89de28906e48f848ddc95e0f2eaf0a04 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000f6184ccc7c0fbaebe5531f5fab1d58fe77e24d9e8f44f0c8ec2f8ad920c4a58d000000000e80000000020000200000003352d756603ab6071c3ecde833e08d229be852a520d9ddf9d07681c901b90d0420000000d09ac8ced5e5ec2123a6627677c4b3effc63f61feb0ac033b9cf9644cc95add640000000e84da1f1e4a47e1ebdcbbb4e8b83050aa260f96cab2e86d66a42bcdcc9a7d1f063aa06d33dc7d943896d60397eef50b9ffdf5ed05dbeb00ee2f1c0fc17ea158c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E32823E1-0860-11EF-B991-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420801636" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f7a4bb6d9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2892 2452 iexplore.exe 28 PID 2452 wrote to memory of 2892 2452 iexplore.exe 28 PID 2452 wrote to memory of 2892 2452 iexplore.exe 28 PID 2452 wrote to memory of 2892 2452 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e0acd7bdb5edd7934749e691e331c89_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6c3cf0701b7103b9109d79df4c0a07b
SHA17e5d111c9a1f563ef1ac6fcd2fa5dbf22393f921
SHA256894534438921386a58f7347ef0f219e1fad1508c7133a75dbf08287a0f1d3490
SHA5124d04ffa0394107a190a5f85230ac4f9d6f4b7b88c93f785cbb0d61b05642388035dd659f7f9bff1b51c0e7c194a3fba5339188ad40b4dafa2c6c372a8967ddeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5035b57a6c7ddeac499bf80c20d606b47
SHA132e51dda706580998cba5161613497caa21142be
SHA2569437a5cc3bc2085ea9a39d37d3b3229d0a742e5d8ef819e4c3fb22b79ac67395
SHA5126c6aab29417e03c7a09fbceaeca7475c237f4bd2e9ab6186d350ff3bcb5c1d56eaa943fd295f2dc619019d23f6e733284f0700b55a93a73bee40ebd0ea4211c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546962b28dd4ecd9d1a19b86568812238
SHA1e45da23bad55ae407b2a9c83b03f26a819c95d65
SHA256913391b3641eabee89d5e1d3be2d34eaf34c5ff30a4514a9afd678c32ca200f8
SHA512a3b7b771edae21d0686d3ae02e77ed7e2569107d816d8bc1cb20f10d6d603e80a7bb6f8ade111ab5c7d84eec4b95a5efb72af78fd7d49192f07e251787ab8c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566831f7ddfe7e3e737e8a68d46640f54
SHA10a7f3bf7a469d61364c2f55ad69d111e2e0c414e
SHA256a4b5798f1949765d35e7450298844670cf55883c5dd4f21d6ac25f698d05a6c3
SHA512af05033286bc087ce2c8868aa2bdc171a7877207cce9b623ea53d70474b8969379642e5ef9339fdacbc7bb6aca8ce210c2b0e6bc0625bf426d48ee6551fbe2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530408ff18ee1fbba3c15c04357eeb486
SHA184550f774a1e3067f6a6293ab08dd738f38a2f8d
SHA25683371361f4729f0e7d9fc1154103c432425ac0a6264f40e9f16350a23d25ce32
SHA5123ba3e8a2e2f1c9b0fb4641f5b12b4d5cbe667f142c90f30f09a67eae0e023e90ca718a65ea04e91899566ef978272581050bab4ca37faf17a1f3b8161ce7e891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5f69bc1d2cb1d83b9f77c1bbd24d34
SHA17a74e95ebaf50726374219249ec397d61f22b6e8
SHA256820cf1c0bb6963dc99fbbb8f9138ab8e4b9b4071ae81ec2ca1646ebf834eeeeb
SHA51277b5ee3a0b7d514aab72f8013094df9a6bf4a2b838dd95a371e2d59947f937b4f79358bfbe6a60ccc45b441375bea7d1d2a1439e5a6af0aae315170a654b4393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce67bca502411fc871d7bc4f8aa317b0
SHA1e093a2e866518246d37bf7ce4598741eac13435a
SHA2567e3d009bd7abe8b65ea4039978b856b7b1cfd78b9e09d936dd75dcfc5a0d085e
SHA51231904de06906f3e367d5dbcbf04c28acc28f91325153cd6ff171f2c45aa95ba9f3fcff4502c0b5bfcd2d0ce5ebdcc6c37ed2b3b50e93f4db4157a57267ab3e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a484b512cd3b899d845f7240b788b4d
SHA106df011f42c376933a9d8889272473573373b850
SHA256400649afbf9e64d868be76cb010d8726887d64d4b95cb56603325cf3343f2667
SHA512725f5f29c67400ccd984f29958256e57aeeb87298472ea81859f38916617cf40bb69f4f72415116e8c4db5c4e7a03beebc37d9b59d3a40b264baf37696e6acfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5935ee2ad63270246f674d794523c1bcf
SHA144cb7e603663c2f2be3651318e383abb9586ddc8
SHA2561b3a7518a7a8e09751a98292921eaac5fed4b36ff8df2e601d0404bd29ed1ef6
SHA5125f113c7382b9f5615966f15582a2df1658c5970c1a0b78cb9e938f96ce204c6f0aee03d5d6a7192c7e79afc473ede30081b57a77f9a6bc0fe3cc013a74682813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e520d03cf6c07222f01aaea1491067b
SHA117ec66169697c8cc20af5c82cedc4d37d5a85f83
SHA256df618e04702a526c536540c5c3a6c518bcfc8893afebe991bdbb48306fdea25a
SHA5122f4c67837fbac588361fd52ccdbadda9d442322e3cddd205847b18b1bae26df5357cc0a000af548d740656d2edc69b66d7b741da7e7f03dba29a4b453cb50950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8981ed0ae861f4e16797920167cf1e
SHA121c2d661c4e3e931129be73f629cd44e94a4fea1
SHA256bdda69a03098860bec3e81d3777af7a15dab81c0669de9ad553b798594b8d429
SHA512d45e9956e6502a92ddc79d92ab2065edb574f697fd9bf6bfff9cba2fc31ce86845566750a01846dc0c07fbeaef11a219a5b56f0a00a11dd20d6a554edf070381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520965f8db07c335f90b3e1cf4fca5c78
SHA1f5ef8a4eb7c50a3b3fe57a23c5265a3cb914cc15
SHA256949370e4af7bab7bdaebf40c785b4a0a262b299f67379aa21af20782fa72432f
SHA5122be4cf689e40e104d99e11bd5eef39155a4ec1bc26ac7f9436f1c3f3377e14c7f56f54558ded7f611fb288306d1d734daeb4aa006ea29e80911b8696fa610f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bd294e65c1230175a9d18933984174
SHA1428e2a5d51ca24b8545f49e1f757b1420d0205e5
SHA256cf5d94ff805e61c74ef1d254657719f946d9a046d37eb3ff7a9bb9e503718a62
SHA5124bad20fc1a307438dc79ecec7720280bf0a917af24a00a5545dc43f89783f59750c36201ab2f9e1c58a408996ab348c1c1bbba25dc0a72a78d3ffeabb89f577f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d01f44d8d256274caa0f5c9b034cfc
SHA1c97dcb0564e754f4017654593829729694658dab
SHA2569947423a447b8b3f80464c9642231133e02bf02cc2ea198657bbd755ee3c686d
SHA512464ef3ce0d16de06e7b3fb90b164d15298abf953982ba5f7a51b88aabfb29bde2907e57e1e5554ac6449980b3af45c9633486730b7be16b9380cb8a071e26e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5243d6e718b9a177ee42ac68a8e424b4b
SHA144a8b318a0c00efe326197c16495604525154368
SHA2565a6d370562838bce733c29329eaa25387694b140fc083065ad754b79e481f315
SHA512b01243613ea9ef3520fc657f5f380fec25575c7d7332e8674e92278b99fb76b5a8e50a42ee335a6a408841555a719832e8942bf9b04d5ef023ea60a552718be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a064f170f035e3ececa338046d77965a
SHA1f903aaf31d7120e2fc0cfbb5d2eb55ee0b648d3c
SHA256cbc9d6e6bfa0f0fe925b3dc0e6187ad539cd7cd4899e9d7ad4b977289b462ae2
SHA5125cc340bf8aecf6b0f9927c59b726e982b42100f631c6266b862eb10975da58417ead1f2bce3ccc88388471f151792fbacbae056f61064764f1e07c15c848f09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3dfc40d1b18a11b25774705e0e6d0c
SHA1ef61ccc8daea3c85e2d964998c5ff1cfbd560bbe
SHA2565184788e37c9c9701e1d1ae8553a86e61c56aa63548368c6207a821f3110be9c
SHA512d70c19440707663b4a1d12a4fcdfca346dcec5e04efafd87c800e008fc6f589b3c92bfa4bafb60b213ba822d6ab9c9632ee600ea636cd79e68ae5e18701d1d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a95f28a68a205971bb2792319be8df8d
SHA1018ce04c99dad514c0fb484880ab0d523f451b00
SHA2560188065eda2b7d9d09e53a7b12f8fe8fecdcf7d6f42d8005b109caa11c5e02ba
SHA512ae1d953b539ae8ec8c6dc4c2356718c4b4c97647f4e4f6c53b2ba54941635555c6309a019cb947bd3e8ba56fa43c239c5a16195160eaa247080bc197c885e480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f3253ff406e8b925b2d8d11aa27faa
SHA1a3c418a6cde245cf90ae43a2450547030d4f6d41
SHA2563d42a21d537d44231a8233d263f4c97cc2a7486635e61de8dbefe348295a8b59
SHA512b1ef25398254de5c688a463d8d3e531b4e12d21ff6de6aa3d7707af4fdf9c0570aad03336e7573b49f7f8d1191bce00b39614b1cf41dcddbb77552fd0e6e8057
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a