Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
70c0e72bb8915cad38d80a3df009420f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70c0e72bb8915cad38d80a3df009420f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70c0e72bb8915cad38d80a3df009420f_JaffaCakes118.html
-
Size
1KB
-
MD5
70c0e72bb8915cad38d80a3df009420f
-
SHA1
211556c4d7159d1ceaa6a0a9ae4b74534a4dab44
-
SHA256
19ee870affc003ee8eef4fa32babef86a0e7a26c14e489d6835717d4564f72ba
-
SHA512
0f971792979f03b10e804f94c4ec08303e845078fe0e4c6f084b69c60ef9fad9c88aa5e883fa53042c564b9bd37e49fbd43efcfb99e9e7a0739ad64caf7050d0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422770401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5F68E21-1A48-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d8469d55aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006902937c8ce9ef59c04c0ee9c5fd6738a8a9db187fa54914da9c9067b45e6991000000000e800000000200002000000064fb3f84bb8e6399ed815fc875f7d3a6ce2c0526179ff39de6fb5ee83211ebcf9000000082e2db43b6bb1761c1346153e0d37f4edba8ff4b538324bfea1e60238d0a0080891d86692e101df99131eeca385fb50e3e11a3a05c20f8008b18cf388c7c7d46a308a76dc588fa7f75fa5351002586cbd6b319ec74444e13c81206bb129fca83e7f77ece55b810e53117d0ac14a544246faab4c5075d8cf052a041d926ce23ac549a5378153ff4a683d8166b9681c2c340000000c6b41f984a4791f7c1db95b7d44281f018d65e65663c23500287447f85981951ce0651b21705667ebd8133f2d8ca39b23187957c85e94be13e95af00343a3bfa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000743f3e8f5f2b48eb21ffe6e281b0d40cdf1a6a50d6dd52f44e9c13cdd5e889a4000000000e80000000020000200000008ba1e2803af13200caf2cd978cfe93bd6fcb390ca8ce373210c3034508299fd2200000004d0f29f8792c394c986498f41c9e975786f3dbec9309f33c4efac9352bff6ca74000000063a750d0ce72a68ab89771ed88a2559d084d5f377700b91d12551894e3c00f1dc8cd06b95fc91c08764fe0d387a9c787d470f7071a7e14b197a80cf40b7dc240 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2164 1284 iexplore.exe 28 PID 1284 wrote to memory of 2164 1284 iexplore.exe 28 PID 1284 wrote to memory of 2164 1284 iexplore.exe 28 PID 1284 wrote to memory of 2164 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70c0e72bb8915cad38d80a3df009420f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529729880a91ef67f1f65d3705ceb87ac
SHA10a11620f03d0091b5ed6a61f9c7eff2c01982312
SHA25661b9920cb107c97f17c97e5837541f0aac8df7d26585c480dce6ef7730dca7bc
SHA512a14279d781814bae6bbe9c84e5f01b4936587313b7e474bf6a02d9076bd702bf7b211c5eaeba74f1541d5f3cf211b26d996aa215678e4d1e5a9ffc6acf20a3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536835f4b072f3aa022491e0226827fa5
SHA1c25a0d95a33e253c05ee9b6cb5a239e68c2fa1ba
SHA2560bf131118496924daa47941ff5e46d372f63704f10747fe410f0fc7e85ef1e03
SHA51209f66adbff0820f6fc83271b50893116762803c09d636de6f7c1fa878e52d33ef6ed187f997a761c8626c91c1e6e546a4c96eaf698bd7390d74675df5cfb99d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1cd518eb74b79fa0b4788e0ef12c63
SHA1fd123c79d81737170aecf481743d91e28ef81204
SHA256763b422bb22089940acf82cc6c1a58e2ebe481b15f246e1ad6b04c5cc337d43f
SHA51225270a01d14bc8532748bfee3ce509a3758889ada9ba8e81358a68b131b313c4a02a348b504602400cf6a96fd4cebfad0c7bdc967edd31ea3d22e9e3ef5fa3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8ccf454b6b0ca4bcde67a683190176
SHA18b5ee79cb57ec32e954fadee5604836b029367e9
SHA2565bec8254cf7fa61021eb5a0fcfd8e90dcb0224aaa52355e91469ecdbba9c5d17
SHA512109d270328f735f8b1e871e74f9ad0ca1c6188ef50ffa0a4f4515744efdb803f7addb67d7bc28c6f2d3648cdb6adef6b0fb9add679201daca95e740d0e303c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c780f7ee2616152378b45680dfecc7
SHA112cc1b36444194b0f78ac49c59a0093cabc01a41
SHA256a278fe0bab57f86bcf609d2e079817c5e44d2be6cd20a76c4eee77b830cd04f0
SHA51238ed3312040a16232133eb92cc507f471ee5c587879b769ad263aa4de8e2e49b42c0d04e3c77bb33a65e525462ce68f50ef96c6b0f21c7b5b0c7f34365ab4aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51be6f56561f9432a2aac7d6bc726cae2
SHA1378b47f8f002dcd71dbfc182b4c996f4616bcc05
SHA2561dc339b154078990527903b62a2b5d81872c75f7785abcfdcdbf7e909b99eb42
SHA5126571d439ceb018cbb436b7a5e4fddcca61c74f4a210f04d929f97e85efaafbe86c853a4c129e386ee9a1cfc41c28af705f5a0481fb727c3329a8bc4777fd76c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54566755f67567299484996a483cf4a9e
SHA10cb74204cc625db9bde1d71b7e2c812e8b3ae035
SHA256e68bf7c91c6d2fc9fe4d684ce4d8f2f408f721da63a8c19e8ed31685b2a958f3
SHA5129b445c63b98921c47caa0283b310931cc82dc2bd66de68e28591d3b3159547fd72da38f1e31ca04fffc630ec619a75d6f33a77112bd966916d272c94f1b0f6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4871a5537e668f18bb03ac2888a4e29
SHA1ea45836977c9cd18458f4477b9c8cdd9bad4ef89
SHA256c1637d6b86179a2356352ea036965f6ba06a0108448d7bf475bae30f1706de08
SHA51270849d833a8e4a603526c2259f6065c16f54feacb784336a1119eb30acd0271868e624aaf2b858d46bfb0165c5bcc9c1a458fb9f92753233dd56783140c3366f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad2b6fbfc87c47bb5953bc4c2c71000
SHA11263ba77c9f97818a1a18bdd09eb64c22a8e0ffa
SHA2562e98944518f751ba0224b92a075db3d92d25e50a4ed8ae16421a4de554ea0ea8
SHA51225a52319c267d8a8d688a89d9ba00315d2ce2d5d3760d6782e5e549b38419974ee4ead37c1273d93d43aee3dd0a74c40709a4f1fda076d71d5e8ee2ae73d397b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a094f6a934acc7fc099088524b7bf6
SHA1b7bd3e0f6b204c234fa02dbb1b399939a8c81340
SHA2563002ad6c5318fd0ab17e1a42084014b26b68ae3749b73c1542de1ff3679df5a9
SHA51272f07c78c8faef8dc6e2e7c1e7d8ef583f96a46c7d6b8f9d22cc905251a111784840993a29de57d5851b84a02326ba25b93347076e3b910ff2135413da174051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56074a89e3c39801662b1872e4171f940
SHA1eed0263f7d1e368c480c5aab59bfd7a072e657d4
SHA2569c0debe1d3f2ce1020aa5ed282f6a237dc97bfb09c5467f900c4d3fa364c6d75
SHA512e51846b13e24774dc3eebcb117b83fa5f0e625aaa69cdb37c5be1a88a0a44e8fb66805f79070de2f8a8b5b6bfa73305685c9a203c4561d0f04459f8019cc648c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e921ad063e977af00fc95ce371fa6e4
SHA128e5f20879405a2f3d46c687a241e6f58e49dc3d
SHA25612c2b0a557396ba7e14808baa39dcc266cddae4e0d8f4fb26818df76c6d0c43a
SHA512f78f1f0f03f20f4440834fd66113988652476e08649ae637790ac7905173926d060aa28245eb9ddeb41b9768ec22208121d767c3ea015c5c3455acce358d61bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e494a3f2dc123441f9f9892d648dac
SHA19c0a2aad31c3a80df0ec2e8816ac235256871c5c
SHA256f4e0eb739d97d40a81a66e4f43c21dc430c26fc30b36bfb301554f241ba84c1a
SHA512e1135884abb53e091849620bf135c12881a2f0b6b99401bb59b417967e973459ef30982bd1cd9f4a6ab6377f830945cce499b24d4301afbf1b1063e56f3adb7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf05bf1b975bcb39a8b9fb30e001e493
SHA15aad3d2cc4c2502442130078aef1a9f6c3e89145
SHA256ac3876c4c8e4fa992d4f2184b1785471df7214a66ff3ce33fb1423814a691abb
SHA51292b83c87a5746842f276c335154eac06f870005d5e98db49db8712eb76739a3384315b718105f5ef186bb8d127f58b610ca6d80e0d5a2b26e7ad316ba09b6fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578865f9527b8cf9602e2f35c78dd4257
SHA1fbd4bdba021e5580a6b37cae2f382b8ecba0a770
SHA25655cd3b688e079ef1534ab30df0fcaa6b032a8e8b7105292402abdae86b97bc0c
SHA51285819502cd9c22fa75355337569d2d631cd42a905677c21102322eba0f4fe3e218f4313761eacae30005b1bca6f75c16d4677d3585dc4227283b85d0f9ebb235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53852c9fb6764d54b4c653f44acf413e0
SHA1470461846953ead00e6ca6651dc60835ddf48146
SHA25610440133ee0c08735f919f89a8936145defb2d5206d0a2fb601b172bf9248615
SHA512cb1a45ad5ce4a0fc7a3c6b2312660577593724b6b0f037fb201f3b605155c19ecfe1bca88e4b73d3f8e63457b497b10d991bba0ada3d3bf3dcf795455b8e038d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c92fea8587eb793b52559f2a66ef87
SHA17e6b48e7c6ddf72cc9aff372d6a07a0ebf3fc1b4
SHA256149d10f5d2aaa83a64be9fc2b158feb9a001aaab3c74c158f96a01ef95c80a9c
SHA51259bb0e71301e3dbf9298dd45d1c535740699a849ffc13518b883aa36f77775ba6ad660b557d25f4decf6e017418da6d17c57d40477e9eb7a1808db59875f667e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501883901e9896d14cfd26bac653fed52
SHA1c1fcada53b785a7236b189b0e3174eb2280456d7
SHA256da7d61e2571a953245d1590525664e9138a998a80065fdd9e3436183d9b85207
SHA51289a977c3ca8407900a0e7e2193c8fa9fcde10ad85c4fbb769bb0de4d825c4124641e36a6c74b5aa2ac04bd1434070bc3bb1e384ecf4d3a4cafe6d58119994511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f6a871039c5e502806951df4329700
SHA1884d8b63acaf8d4000459a3a0282d529c12aef20
SHA25638d02aa771cba73ae4d6ecfa733a7ab3b29eba8316b4330b032e1024e4502455
SHA5125240b1b36fb8415114d387b1235112a24dc058ec033e77c1337268782bb4785d5ef24ce7da1568393d938f963a16b19619910a7ec80fe5349e8d695a0a265ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505b827434be94ad2f22d0b2d5d8b6fe9
SHA10a6c39d05d476d61314ad69a23ff7c8e8a2796c3
SHA2566784a5212b4f15759254223cd76e9deee167c61a260df1f475b76804f573dea6
SHA512cf6fffd78de17c2198867830a6404f531834dab60783899183eedcf042db37ad2638c486e874c09e9670061b016bd8b906c7a79f94f1b73740a8a7287c996726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5044a853847667fb4c5f6c30fc4616dda
SHA11070d7fd2bbbccf5a10d0bac152d1427e12b39cc
SHA256a0ab08463853c356c803f5d3c98015764a684fc82ed793732474cdc14a165f4e
SHA512a6fa2fa7924763313193d456279ee7f5448d1767970adb8c29517723a8c60bb9ccbeb18ae717bef7ad19d433e6fe2274f3ab5beea970975c5e6b8ebad392da0b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a