Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
6931394fbab49b26bf0218881b5fe4da_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6931394fbab49b26bf0218881b5fe4da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6931394fbab49b26bf0218881b5fe4da_JaffaCakes118.html
-
Size
2KB
-
MD5
6931394fbab49b26bf0218881b5fe4da
-
SHA1
65593d416fbcfc29fdaeb2d7d79fc03705fcd073
-
SHA256
e50e1ce048a5edbdbbfeab57fe26a160b03324d63df46bc3b6cc741712bfccda
-
SHA512
1db32a1de611e3b0c1d9db40304289e2579c8303b4c477fd4e292706e5e670d17fefe01bd62c8abe7f033e85229f6f0c813a718c8e8dfd049ddc0aafec40d844
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b5f79e809d671ae8be397dfe39e6d4d711a0cdae70be551ba2944907066a870e000000000e8000000002000020000000c4f3915c99425531fa20e9f7b5a1c80c736ce8efc4e40e1438999fca590703bd20000000a865a87ff130f4dd3ee3761ec26ddfc107c65fdd87dea4899d67b057b1c16d2e40000000a152406a224d69edb9d7a03ce9f178cbdd05dbb83134b3adfceaf1634b6720c8aafdee6b43e78f48a6d2699fac3f3132ea6db1ff1c2a089907c9349ad56c6b61 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001c5e2b30ee25b5d6096262e06144290d665e23ea1d6d7cafaa3999d3b52161a1000000000e8000000002000020000000e8d7409b2da583d963930c0afa712a6620cc00abae1bb78cb12049ad30d586f790000000336798336402aeca0d354867283706b493ba6ff025f04e68123f0ca58ddc28c461d30988262d5eb5d473cafb23770907872a3995b44074f1ede0e85bf53bbc81647d37787b31877b9ab3c5d1484e36d5ad46237d659eb6a448981f7d1457954d1153988f0bfc28f7ebd2e80ede36affe558ed1cc7e4d84fed18c7bd7a4fd19fa3d01f3d7c3c46f56b2a24a785ee600a240000000457ec082ca882b1cb39caf74927279418cf3912bf1c65bb15d48ab4510b906b8c18bdc27a026a82f1171e67638025b64bcd28da355423cd339b6f655dfe47e8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25FBEFB1-189E-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587166" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103a13fbaaacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3056 iexplore.exe 3056 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3056 wrote to memory of 2136 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2136 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2136 3056 iexplore.exe IEXPLORE.EXE PID 3056 wrote to memory of 2136 3056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6931394fbab49b26bf0218881b5fe4da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56db17005949656a240a65691c3eb70b9
SHA132efc641349fcd6e430656fbba353d0efa96074e
SHA2568c278f2f169e6caf74019307d7f0890e4e33d4003c3d91825dc4caaaf15a6517
SHA512bacd038cad4b5c4efa721bb03f2cb92301176b6a4d1cc81049731687a65d648ceae157d371d7988b94233ed27114e686c065aeefd9ef5b48d42f96e3915c12d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f7d9c4036f0ab606e1fb07d00de7f7
SHA1505840c05a39dcff0ed4f55657c680bf0fb4d55a
SHA256d836973d1e5537971ed58dfd05308f9d685665948bdb87e4f1f6964de62bfc47
SHA51212f239062c8ee4372ac667e67901b8310932fce028ce7fc9c6a17770ffbd92f23a8f036f3d923853635a337dee6c07044018e32a16c023d2e79a6ed7c2b8fa8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550cb7877a2895ccbc04207b1c6906724
SHA14aa928bc9e400a67aaa9c9fe412e741abfc3f910
SHA256d5fb16341e7fe73d21e53baed7d8714e054a9d384ad02ef035617c50a8a32918
SHA51237a5b05ccdef0bc4efb3d076f7ab197c0273c1127d0f8a4191a1569bb5f2d9060bf5cc71e5e60243213ffb7e05f8c0f4326ca97dee9d32276591bcd88a757cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3a1c9d4c8d17be2c498e4afe29c00c
SHA182d64fe5a68531a2936a4a2a7d9cbdc3706aace3
SHA256e7af8aa88d62a67b675278669082af801f3998b0c010ee80d3698499d254c744
SHA5128dd003d7191d3032161a3ce5065ea05dd10c3fe282616570f0c399a7eabdf7467ad49a2bb0ca885ace441d7e96c3a0c139e31cba3eb6541f89fb218c78c8a6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c2e3b9a0aca9ca3fdb6c6411bf2a0b0
SHA190cb59b47099a8914d49ab36276d16464adce0f5
SHA25643aae1e95d2abb088f805ec1a795a6bda937d62cea5126663325f965b374d870
SHA512cd3ba236bf98d39cc90887b85acf0f1047ad6190d61d8815ba376d8aac07673ce3b5dd593dcc557ef6d5e9f9243427ed2f356dfe2d47d4d7b8a2fbc54b7b0468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7030a2c32f65b7753b13934ad603b75
SHA12d315899d4f150cc150bb5ac10860c8c1b7c2c1d
SHA25654393723197368d820237a45848137f58f678123ae7c3dfc6d58c3d5281b715f
SHA512399facc7048681aaf026292d286e5d72d45c215dd764f46928c6ec325a7adab164db5969441c520dbdce28455479a5a9a1f6f1f7d0e8694bffbb2d3a54b2c089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59477a1861ae6c33d73daa53a06605d78
SHA1367b800c1577e39321ad9622270a8394c950e08a
SHA25641045fb78a034a152a8ae3b57c85283ffb2f759272bf9d102b131980fea3d12f
SHA5120e76b1bc7a8527d0072e11e7d80bca3eedd4eb6d3f577f0982b8482038ce95d4306fdc62c85aad53a08c6987273a47bd4bf9dce764d8efeb04f5e3fe8e55ca02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58167ac84600bb1be3723d3b63b94e718
SHA1f4867ff0dcce404fa148ef1c646aa60126e3ade9
SHA256f4dda36f0eaa8edefb2d77963a8a2c2b81e807845ed0958167185e4a4d5a2023
SHA512af26c41c8c98f46bd8e85a145097784542725309edb0b127bb00a70a32482b9c7b6ced1bf6a1332a0a37b46f0a038d6f4fbf82d4394ba3e3d5c4aaf6fa0ec502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe42f9ed40c61f293e461809cec07da6
SHA1b430985aa47f52e1ccf964f0629a67a53019c79a
SHA2569bbc8e9df400c2380287fa1a6caa7f2bf7f10befacacaea197462f1216db3db2
SHA51200554e76b30477f2d4a104270b279c1d38485d9506612e34cb63a65729106e7bf64e5699dddf8b2e820d1441c837480cf4c70a586622b171a48b9acd5b706a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b763f8108275f49a0f632fb09048480
SHA1c33a749b8e68c75b7c554a94b53d005baa996a54
SHA25621e5a0346e1307edd0abf85ed7cbe800c89582089affd6f9f72364503fdf0aa0
SHA5129caaedbc9b31047b45d423118bfc3bb66beff42b7aad5607f6eb76c7ebaf0e5b02e0a4ae0ae370fccfb112d3d6bc70b5094259bff29d37c5c0cd6ab63ce26581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aaff6f6cdc226f0105f307426fc4b41
SHA1bb94bcc92901b4b50057b833681681fc499b251b
SHA2560e7a910ca400b4fa6eed830aa08b838ec620a42c179c2450a2c08b734e12f2d6
SHA512f1f91970d68f026e95ae7d7f64600d630f3b40cf237780c1eceae68aaaaa36be84051a4cc6ce30e131ec5b006f796a3d187e1321223c7e823777acffc4c88728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500445857a53898cca235ba38b12af40a
SHA1591a157711cff383cc44303c88fba4045556782a
SHA25624d29d0e3c332231b79b7942686e7bf6fa4a44a1f1e1f860b666feaf6a2e7c24
SHA512404903c161a38feca9d2b3c850cc0d01a6274fd8531a90c05478820e472cb7b891fa8cd27d1cfb25e9de4ebf53be503b08042380511c0d28d43c91457a482a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146d7664524be278eea883355f909374
SHA1709dbade588d0529c5ea888ccc9b4697fde69270
SHA256b7d100e7918a1cd0f7a18a67bc0c03e6e3bbb6e62e760873394e58df8f6a4739
SHA51283394fb97c8f8388aaecc1be3013b307cc5a1ec96de02ae9c4c96d3de19d430b276015d65af4a7a6794d2e3a0265ddb018c2d873ddcb1b8dbdae75d36e72bc12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e4ed863858815645069df22da7091e8
SHA1bbf6d8e3293d9e4711e935f2d32c8a0bf93c03b9
SHA2561cdbfe515cbd83de54e5572aa6c331f54062bedc762362439fb4fff23596d1b6
SHA51255c29eca9b04ddbbf7964574d10fed5babbe667ed6ee70b81ced92ff0e54838a6800e0ce49d39e2738a8a7fa94604caa7ab712bd6ff682fa7ee3ce86fca02164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b702d98ccdf70505ed4833e463d252a4
SHA18270dd7b086de9d0ca852173bce382af3cb9b3c4
SHA256330562b235d1825146437f0f73fabfcc158beb7d7f65bef2abdf8e10ce93aaf2
SHA5122fd5f7da7bc3ec878210d7a42dc623d6510c0b849083640b439e7d3b1e2d3459151046524e2b2f2d21fef8e138f6d9158314f335c3adee2bd3fd7d86a3874408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e421333f60985ed13f66d195786bdc
SHA187c902dd22aa1c32d33378f7eba0ab27ed4b927a
SHA256201caaa0d53e3ed9ed0a1f0ea4602adbaf1f091a5067deb5b75479e579461657
SHA5120a774e7d015fe47a7e4742aec1c952930a5485501512d0944eabf93d64b2ac663e30d70100f303870d4fa8f8ff47a64b45e578517a936e74b28edf0a131d7545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e63b7641a976cff90d831163099ce71
SHA14ea592dff26c76393ab2de48ba2e70526edcb3d7
SHA25638b5f1717f1c4f279cfee1d770c7771d9357e84468d4657201f9a71fa61d134e
SHA5124954cafe2a527e99860d12f18af6a3021452e4978d3db5ff8cf2c39a7dba880023f3b017571b5a9ff3faedb078551a2419c6d6cc36303731eba94dd4ce878c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58998cfa9eeb86014db085abbe003ed35
SHA17b22f83462102c66b56669195362705eb572c3b5
SHA256dbd2b3a54e18e1eec15178a5d613e785b01fe033218c115e90a9da5eff169354
SHA51283a081b1a559c178bca992ed0ed4903a08d7ea86a912dedaa9ea3dd89a266b6e6a79f389599ff9942cc2b3858dbc08077cb64979a58e155e385e1bad41d4714a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59755bfb6809867204535d31868644004
SHA16452ef1830c68ef816f15314503f787dde4d0797
SHA25602dc8682db82b4420d510bfe8113974694a04e98df18e052642fa264527b4bfb
SHA5128b572f52e932a46f02177711150f563b783b5f9126f6852832a13f50f9b8443ab49c31bcfb643413115f4986e33dd19e33c7a5ed1cafa0572e2ebbe1f666ac62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffc731bdbbf63469d90dda72c28d2edf
SHA1642b2d5d6b2db5c2f6f0dfb7713f2478c675dd67
SHA25686787699c81cbaf470a80110451d6c307364e2e7d84d945a95d847050e352666
SHA5126eb7c80b76095bedc22a35fc15b9c9acdbdce4d0e7182492fd8b95974830bd84e8b75f8fb3202bd7dd982b5dd989d3a8e10a9c3e65fc896e05f08993daa69fd0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a