Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
214c5f2d0d0b8a2e2223473c6d14d949_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
214c5f2d0d0b8a2e2223473c6d14d949_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
214c5f2d0d0b8a2e2223473c6d14d949_JaffaCakes118.html
-
Size
68KB
-
MD5
214c5f2d0d0b8a2e2223473c6d14d949
-
SHA1
b3d10463b2133c297173f59039438bb5c87a7d5a
-
SHA256
908e6681a85180ea77409e17571acea8166b5d7680dbfe805cae71abc2a43633
-
SHA512
d67b2be993251109a51e867fb55c7585165e70e044ccd52697a72dce05f1f5e6635dfc7d5022fa9ae9dfccdead352095fdb199ec01acea4db3ad427e4aafe801
-
SSDEEP
768:JihgcMiR3sI2PDDnX0g6+rQGoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JzITcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EE0BE31-0CA4-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bd95cfce1a1f52e6ba47832e63e2d6f886b9167a06abb2f02d1a0dfef2fdece4000000000e8000000002000020000000a0e3fd45cc239a370db9765496aaf876f356a915a4f67413b71006963f111bb990000000ac132b545ee3b9cd16bf5a2889e8641652829ebd14e1633fc1377a0e854d2cd6955b21a5ceeba806ddcc4c8d6273418311ea702f8d4842cba5f627cc837bfa7f84c0f8eee0acf10dea9cec7bb077d9e45ed8150e0d970e3b75f11eb0a2070b6a7c57e1a33070d2c34525630a80ed90512972c24c3a1af8eb69bc63bdc58d347642e00a4ce7d1d62be2c7e7405448b2314000000089eb53cf81dce4a32732923f8ecd14a67f53a590e498b6a9f6d4e4b25fb11a572ef4ba35ed9f637f757c1b5251ba4d6547d302c69fa66982e59f9f704eaed294 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000004ba7499f8dd190443e54ad4dc9a55a2cea0c1768546e31580773e72ef593d88d000000000e80000000020000200000009d851dd5ac134de04523b3227d1b505cd12e5a5202f7f8b352ede74827826bd520000000edce6087148816d8c2b177f9c3339dafcd5af0ea228232b4ae85a53af391e69940000000f7b01ca4d21d1e21dad782cbe0330c78e874bb09c35a5a79bf8ffb4724849e1d09fa3505895022f923273e0dc69368efc5c18946bd72b96e34df8504fb348d2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0577363b1a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421270505" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\214c5f2d0d0b8a2e2223473c6d14d949_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e874982eb31ba453d61be79e6e838d8
SHA17fc294ba45eaa3f585db821b06ec9e6c6afb414c
SHA2564e02a0f746826204b45ab471844fa46181f7e460f33d73aa9fa71f9a3ff3d5ff
SHA512aafbffb86b7c3ee2c1d5009e7775520bbe9ac618e5bb723c7a3b6f8959ea4fb4150f3bd25b7a7131656c28b87f4a6b63e89da086c252bd6bee5914c26c95efbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6aeabcc3468e18126f2526f3995318f
SHA1f35d549ea51c2a1d42ff6593946c043a18e516d5
SHA2567365fd5ffd437bd3c7dd2f732f6815184583b71bd2b0678898d37acd82729dbd
SHA51243a28355c3ab6616285bddd565f9d64812554feffcd6ba63a4e9b2d4cf8026fbfa142379d4164ff821c07f244e3cf65145848ff9e9df5299a7d4255175dd270f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf76d19062730b76554058460a7ea7b9
SHA14039d285bf82acf557be7b65633f64c38f357670
SHA256ee6a9f400760ba3f3d4b6d52ae522b2fac31be61580d64f2f15674c2582aaef1
SHA512344ba5db158e80808b402c1715f03105dff3e6dbc5039f2138563f819fc8fe8d3e02cf0a42669a84a7c887902af77e7bb58f6509e7a59097dad99073b04a80ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554dba720d9a6009c0d86a971bf016dae
SHA17ab919a3bd19cd663f7a28a5acc7b5339f6ccfd2
SHA256fd3595bc90989e2c91510e544fc70edb8ea9daa8e1f88ad442eef160605cadb5
SHA51215d995423acfd37d0f17967276cbaf618888cac2a6d68edf309bf72e0c0789e4193b8ef695221fb3b0d8a43887464644d6148015a36f752a27558db3f1ac0396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cea626fa579d846003f82c4d743b1a6
SHA18618c413e9bc0ec5d676efb03f2e28a6ef21d7e2
SHA256ad13f2cf27e891879d59ecfd4f8d5e500312330b0fca4482657ec1d27b9356e1
SHA5123a82665d99b8ef7b29cd98da47e56585b2b6f86351320fd1a47fe1cee7e9d0b5f1c7621bdff360242167f1d685e6570593e9c61f72761518511df1311ff13256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0b4b13e4a87a23d6d827dbbe65a38a0
SHA1d847aef181b165d5e315066a45e84b23b30ee589
SHA2564768844ebbc62b09736136fd3f39d340a57c6ed622a81c9b97bc6ed2299e682f
SHA5127cd898bc42215394946cc1f12e9523fcff259650d9aa2cd18cf01655acfd7ff3b340208812e76af79cc62fe5e9b0365c3b0b5f9c80328a3a1ada20b0486dcae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b769f269f7ff1d9b7d655530bc4fdec9
SHA15b2ae96e35f64c1f65226905a538ff70e839cfb0
SHA256c9731477f4a8194df506532debb453164398d385bb4aac88a8dd3fea6728b6d9
SHA512eb048d21bb79e8f5315598965d8e43695a7db9db788921a221cb86dfc2aebf699341691d79b4299e5ca91ac09c2bbff65367b9c6b95c3f5a20b144230753f2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3065a547b7ec576f29174af95cf77d
SHA1cad329384288fe2e700397a4f526906c96b3fd31
SHA256c331868bccf7e1f91f5efafca9c810692e8564b8badf9add3777d28522251717
SHA512940fb2deb18af18915188e528184f2c708c953dc41c148526abe8b8a61d2c3212a8060451792a9bb08df20727f10441da23b7dcba54d1c59be51797dc22df4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffee8e439accb604bc54c26e3ee03dc
SHA1c9ace1407c29728a26cae33e19d1839f709c6617
SHA256c51e6911736d671dd5ff705451cb28c172abd6ada34c05c50e91fd8ce2f29bbc
SHA512ebcea5ae6060429fefff2413928b3fd83e9a337e3868977567ac35ab5a3a937e53fbb5d907b6e52b9ed78349c3b3355fef96fa9ef14a41a0d5a40adb2ef9d526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78c3eb4e203796df4deac462179b334
SHA17b66c620646ee6f0251ba5ce21cf7fc140a4fbc5
SHA256c8bb0a42ccf7fc085b572043fdd84ba02851c769ca70eb1c7c1b02a8a8bcff50
SHA5120583d5edde86af716199176dd6110ad5fdeffdc95d6c30d3555239b20f20099fe6163173233d8930be9dfb5048423e402c424c86ea3c876349d87a905e356746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daec8572f69722d414274dd480da589c
SHA13920058621e4a0b1eac7b368454f7d9ee401fc89
SHA25691ce5b1a2c4931c4686f9cd7018c715edd6d579ac0b8dafcb47f3740514a21a2
SHA51220db7ebd0c099e111a2ec0b5f7781e3eb3cc88ccd047779e9ba8923da87f10e42c114c377131da52c5779d8adb1d4407965930ed85c66dfb69b62a8810aac312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f05178fbef4f8cda487d73bd21ce9a7
SHA13c2d54eb184b45aae8e1e313bb0b07876f228f43
SHA256250f6d3b15814530e76931dc876a861047d4f2de26e2e0a1e5c99a5c085e5518
SHA512f35f51106dbf7767b5df1254b47c93acc1504f642a9475b51aee334bc6a6a2bd3585c2726f0f01d9ec6bda326aff6d4cf7fa0316988ac9a3e689a8b94f87c2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54357c4d36ee3606ceb2e5decf1169363
SHA1830ee66d41afb9b230cb4d2b03bdeb7f0285f229
SHA2561c3e0bec8312aa5271b7fd5e0d2e45ffb6828e16fbf2fb5034b7d37ae4a32f2f
SHA512e0a5d0c9c5a2b6595decf0bc8da720241b27b52b835b937122083bcf23490d793590c5079b4f99903230366843ea40c8a7abaedaa299f7efdf6632fc2e7839d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa134b7507e9b83d9a3069d8f6c6c96
SHA18df6980e1044fde6a5f9f679835891657f118aff
SHA2560de4323d59be610391d611df477b923182a5a9ffe52c6bbf56532d11e7f329c2
SHA512add201b3252b37848260f3ac0b2d9a12a50c61813337d8137e47eaa56d0ca9da0ae08e33ba8848ac95fb839b3450cc677988d86ce7a4b1b94803f81bcd219ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db4d029012e3b787520ddfbb949f4ce
SHA175a07ed861a3da0319f5096ffeb1b7b6683ca2a6
SHA256551b76f505e109f83f75a269bc4a742093f1e511f75eee520ea1475d36786338
SHA512c0be9dcecd575ad3aa48cd1d533b60ec1f5c36dc75274f29d209bfab6cd287e3304c0ebe34d3157f41b2f916a1fcfa8d9dc9f48973bd51f4671fb6f49f061545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51137936cc64b976c69b911374613c3c7
SHA1228f26c5c6ce09a27c5e3bd637753ef4a5997c1a
SHA256ca6b2448a78d6091249b0a7c65918c54ab7a8134ddb8abf015aee0bd3d641422
SHA512fb497b5c1ce5401316b033e6f35d931af7119e8f06fc7c07ec6070bce7369723f9849044923b11e49dcb17a7ebc0d774254f8fce95a0657827d8a50e3296708d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba56fce7ce5f631b4fc52fcb82ab5be
SHA18641fa511a1fa63862326ac7111b805adcb9b5f5
SHA2564c5ffb1c1f41ab1cc931b24c0335542343e09e94042724125d68280a3cd5b801
SHA512c5f4bbfb0b536d32ad52618c7dc6d37b11bd2f096366be0a80f9deb87cc2b1f62cf080f9a9f40038188baa7729e4f610b6cf48a5b7f67c4d513fd851d05833c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e31ac2e363d43457d62cefa1b09e75a
SHA12318da2efb701cfdeb2a44b96af45685b5252d94
SHA2567db71d2eaa5440fb647f0d9e23799940acb3dd105edefc9c78796be0363c47c7
SHA512e5272062d66eaf8e0f48e02e49e0a278425d7ea798d58516a36bc46e113fd73bb400a2646c6e0eaa775baf27533b980ad775d16fdbddd0b11b6ed9b2106592fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325f7f25fe991be6c38c894ff3cfde82
SHA1e0e1e20256d3263bce784c0eff8a0941a3c52a81
SHA25670609c507596f72d3ea724a2d1613fbbbdf72a4a9a78c9a2047dec59c8b87ed7
SHA5126be226d78c459ca39e94e34de5acf2b7650c31fc55d94e01190099696f7317a68bb71b19e8787d9fafbe7f8383e2f5e0db2144f318c3c019de08ecbc94b59305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532364331bc47bbe913b44e9dc036915a
SHA1a65ab5b0460716fe5f5705bec6a09fb9763316fb
SHA2569d6684140ad4ac1990a46177a93fdb75d3c3cf55dd27dde37e60f86b4a45e2cc
SHA5126513a808ea6db7a7d92ab3035ba10a35be7be1680d03ab08fc688d8e9185999c188e2165e3220b253b4804dfc239d9f691b671250c8b2af4f0cc148cdc802b0f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a