Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
4b7ff93fa719dbc446a1a8be75dfdb20_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4b7ff93fa719dbc446a1a8be75dfdb20_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4b7ff93fa719dbc446a1a8be75dfdb20_JaffaCakes118.html
-
Size
19KB
-
MD5
4b7ff93fa719dbc446a1a8be75dfdb20
-
SHA1
b2eebe150841d042454ae4a4b5243cd04f8546f5
-
SHA256
607c3b9e49cd21390f3d1ee1c76af9990e8978c57e33944cb9e0c3838eec6100
-
SHA512
bf881c966cbc9975891c5e1b2e0183cc4f789f2c5d7154eb9a9978640059e03c5860957e3e44329feb410f26ce4b061680c18317c0e6c93b1fda6b571e4799f7
-
SSDEEP
384:PJ4JwalZmFlWtf9Bgur+Gf9/HeW5G4/L+U5Us743ShLbubO1XRRrmGK8fCEkG5:P2FOohgm+G9Hv5JtN7XDmGHfz5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009ca8e72b99f635d474a84bea95294f6554e8f4047409730f92db1035627cf796000000000e80000000020000200000009d25ad1955c8a9db554d1f7f7616fef3299961c6240d17e9a5e3feab5c0335b120000000031515e347041561a915fced9212c0026b4cf99cd87659b632127589085d9504400000001ba094a2ceaed8fe74cc3c4bcf4f34c699a7e64b886554824da9a326a794d5f07b362d16fb15e32af4cea765eeb33c1888775e12ddd833e90293361d5ab49725 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422030843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB0F3F21-138E-11EF-8554-DE288D05BF47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0136ab89ba7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2144 1684 iexplore.exe 28 PID 1684 wrote to memory of 2144 1684 iexplore.exe 28 PID 1684 wrote to memory of 2144 1684 iexplore.exe 28 PID 1684 wrote to memory of 2144 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b7ff93fa719dbc446a1a8be75dfdb20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51711ffaeb7fa8bd83bb81528b441139d
SHA1958e228c977d32e8358235424921bbb4c5d5e6d9
SHA2566224f9d1b9205ea8c005457417dcf11267eef3f0ac8a9dcc64d102fa080820ae
SHA512fd905484c81ad7fcffdc625962fcd8551684733bf7b1f8c6f2971e3722128cf040bb1dbf892eda05ddec7830274b0de8fd37a6d9aaae027dda2278d91858a921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f7cbe853227eba7b60d3c8020ed733e
SHA18502cca097399b85ddc55074adb5ba1265b9d1b0
SHA256520a5ccb720c5065f10bd39b8ba5d4d2e2cb8ff4b353e1526dd1a57b0a2c95cd
SHA512e82d0d085c5f0e39f5ec518e4856ba36fbf5dfc1004de288c677dd2664f69eb4fa83511f5febeede8284ecafbee623aa9e02590d6d0c16dcc5531df00e74c97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385f7821da720367f1963ff1a08b0357
SHA1e6eb7662893180797207ddee8b7b957ebcdede16
SHA256e3efe18074b471104c29a0c832b0cc3739675d701ecd6e62fd68252395bfbb3f
SHA51222b438a6f0e228b9fe249d188a08f35ca406f65042aaf150f1f3a5b2b2bc692b84c518684bf3bd39446ceebf4be4f7a4d53d3952e2586a304b55bce3b4526539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b5eded3c794f84e47274114f139d4d
SHA107a350d77d20d700bc6539e6b62d5b1912517a99
SHA256f2bbad8ea965a6a2d06a7a5e3b181ac7c01613ac2e89fb9b54f79cb9575b7da1
SHA512aaa7c39eceaac5fa81038696824e0412b9f4cb18e4e21160941247c1af480a86f7103df2a3269fdf9f08144ee3901c82362ef00ea3f772dc36d7de1b6ce5973d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba067cb2c3c3382081eb311ac3681b9
SHA19062284d4be25f23b441cdc70a8212acab67bd0a
SHA256830659f39b93549c3c5d3c54515aebf3f57c67c5b16e11cbd904a6dbc8f02299
SHA51293235b881f91ab15a4721f9fb185844e561b9970020cba74875ab441a844940deada4a0af7c7210a0928fe063096c1822cce888fcf5c57464777a620aed7c1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594956dee1e6dd360c7636d1ddc15f6ec
SHA172d7821fac9bfd2c1c953e666328228bb86a180c
SHA2569da9b3a09a186c1e5c4d1c964d80fd1d4d453529179ec1cb1780097aca2f8b11
SHA51295b6d9343072a4c157e948f9b62bcf830256e9e28199e2bd67d61e796222c2153b2d528b6f89ebd3035cda2034e67e67242f83f212c9e56b001aeac427190539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d506893ebbe90a1812b5e6f91975d0
SHA14483482b7c4582d1c7782631608f1ad76d11b90b
SHA256cf1a36b609e9ecc060d542ce2a81e22db30c8bd67b252e78975cdbb6d7c63cf1
SHA5125bd02bde1b7dd9ed4c63c10069202a95d845ef9f084be2ffba7cba73daede078271e5e4536dd03e332cc3f7a0d20e3599fd5139837310ad715e7eda769185355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41dd6341f9ad05fc942f21cb2a15e34
SHA16b7a5b7c65879e728a8e7b99744c1c301f2aa775
SHA2567d2b81446c6b6db03ccdc1c2781850a8e8b60953ed08d4eb06462b5ca87b57a8
SHA512b0a253168778f591ce7753ca1e3698ee1e8eaeeb5968c21bd4386520ea13997e9674a212af1ae5f92b38ad9c5b3ac22b5fc6f433c89b2132dddfef1be061b108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5233dc057fa78fce5a5a1a3999467ccf7
SHA11186e2d28f46c531dbae9a9a0d01fea947c3c035
SHA256cdde976cc3a76f29d07e4a4393d918fcb9f162b8ff5204e6fa67d39dcf3f9a93
SHA51251bccbc4ddf0e6b32d9eb73d8c7f47c12cf9b255ac7d150480804faea0c559fd46a638acc8d471db993e4d4980f199adb81c231c5bb5f4bbe2071b4798e3402c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee03fd392d870ac81f82f8224343adc
SHA19cba8116e3d4bcf773fe265eff9a018dcc6a4f8d
SHA256ca1b65ff74b4a205aa4a5959d0df74fb2cccc213569807b3fe94b1fdb0930456
SHA51249457807b68a321533ee4074f9423ffa871f5cc859749f3eb57989d0f9c30bd88c35c6b10b301335c84f88e1f546d11faa27966af60655c8c93ba884baaa684e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5829c195c3b186b5ddd689effd30a76b2
SHA153cc9764ce3af267dedd44371a1711280ab0e865
SHA25650b7410c43ea34eb5721f61e18e31e2c83a2c433b385bdc2924f53fa8d9d3b82
SHA512bff13263e8eb1bec6c205473ed87f857554490f8e81e9cfd407b70eed3e7ecb002bf48b65ddbc5565ae40776a7c4ef4145798f51ef6b39b92946f03c984610a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c265cfe44f051cc5bc0fd3a9fdbb229
SHA19422ef0c804fd648f466df4e44b201cbddb99289
SHA256d234a87ea89d60d30b8d586f49fa67d0a4759a5bac9d6e03809c7a1c4b3426c0
SHA512d3f40d163c4eeb8d18f398ad64e30876061e97ada1ed5e23348330cf4301e0165e26d661031a9c19cbab5523a358a433a61eb34b407f0fe481ee44ac09c5bf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df738e86cb2261c4c13a3295f0846ffb
SHA1f4fcc652532292cdb29e036edf4842176deb6425
SHA256c921257d1706c70ac30b098615f8edf837a5c7a60a298718ed0853e21c97e2d4
SHA512c11117863339be0183c82ed9f531b87dad8df75a6a1f632cb0aad77f5a15835cccf310271f8f1249fc4efd9de734f2415b9af51ecb4a6bfe74fbfdb8e7cd4a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a89ca4559619d08f5ffca47dd2445d9d
SHA1a85d34dc1ab9fcccc7e9a7c5a9ff5aee0df2f083
SHA2565fe5e196150524ef97c370e779ab45569c047f7b871c0b3864808e53d1f74c76
SHA512eee1a9ab17b11f02fc1e64fb5748b77faaedd6a471cca2ace5b35bfc68f5e8df9d25333737b5184acb2e17f31b284928ba00bb90cbcad3318028118c35d15a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad69f2ff86e28084a7424dbce15bc870
SHA11db4833887646d9ea0b4eab08c2e5388261f4758
SHA2565ed326b902b01dff9668c5353d79ad3cbf4cca930b2c5a2d06165d7898130027
SHA51276a754ca6620e01ce1246c5a07b6085665afd05f218ee7c52de00632742d09fb46c72cd407373d993395383cfb539dfbc3a0a11363d1718e9287198c396703bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbbd36f04c1e5c49574a7d79af5ef53a
SHA1fef726094e4618ce62783179da2e458fc6e0f6df
SHA25687fbc119f75a87cfcf9584356df2da6a4b1403ae976935a814676b9bd483c323
SHA5126ca51d317b4effa7602710d46c3c1be429ede43ad0e180d288e150ab08ccff360d3ea85346bb93bf851a96a50e8a8b5ffee27f85496def46a6619797b643abf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52866b9ee39b35cb7b99400bf56e13158
SHA13bd45007d3675163a57b7d426696238f876acac1
SHA256e37142d0473bb0c663b127fbc96d80fdea55a942917d78d66e5a14fd6f33869b
SHA51235318351c53b4d29f92259d1536c2330da2dbae8d338a4350e08535e43140b49c0cc6e0437cccbec195e3bc8738bebbd3791be188da975bdf6a7b6d8368cd2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d93989686d5b8364ebc3320c981b3739
SHA1eea2524456204d8233bc5e51d699f58624ee48de
SHA2565bb250dd3ce58788cfd3f5837da03b9d8e0e58b85c918c7b9a5daf4b61fce7d8
SHA512ff5aebda0d9c69a68023f94c8c4a9092861cdf69afe9032689c754c89d2ca4a350340255fa716f82860e105daf9ed7fb9dc61e2f32d6c88ef65c1b2a2f444b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c0832af4add65a539dd2e8b2e3436ca1
SHA17decc3c4f81201425a2ef0ca44ba4a635753e30c
SHA256b6726f5f493f46e5882729a9ac147c8d72161731008d26f486349053f131aad3
SHA51213c7a679300fe421de7c6d99db4c85cb19019dc644ed25e5172994cf5b78298f07942895b1d4130d03655bdb4f93e44d33bdebe66587d2e06e06d695933ca50d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a