Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
0c0e65d6ce8072e6a25dd1e4a6601152_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c0e65d6ce8072e6a25dd1e4a6601152_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c0e65d6ce8072e6a25dd1e4a6601152_JaffaCakes118.html
-
Size
13KB
-
MD5
0c0e65d6ce8072e6a25dd1e4a6601152
-
SHA1
21c6101bb54e08524f7c1753738591bcbe849160
-
SHA256
65ff261cce5f47ac66b745a70db4e706b7e54b3cc40a3f40ad7d0869e6ab83e6
-
SHA512
d5318122617f59a6214feff6ff80f383a065d48231b1d80cea01619b954afd3f0531168c4630b2f402802ac030e1a21609f0fc1a427e758fbe8733cb41bde5df
-
SSDEEP
384:eudqj/rvG0/ezMNQDgVjrthBXjrOiYxd2qW1jSh73EqRxs8:9sj/rvG027DIHthxHOiY/2P1mh728
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FAA3881-07C8-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005df1d67634feb7dde4f32de42c39ae2c0be9163215d0559ec695b9cd813e589c000000000e80000000020000200000009562c3a32964a287a72d5b6449aec5dd194589bd45582de8a7a5d0d62acb09e020000000164ca86be3a9073e7c5aa16f65d04eb11fdb9d1269f7b78df810d07d030e7ea7400000000d2f5560a4ace39db75642856e2b37ad35961c7c298ac2e236af1cbc1a0f2875bb1c4eafbd9ed489b9765b90c3b14e59b25f336ce3360559a3ff7d53ee4c99a5 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000cf174580460ae54a1ea732660a55e878828bbb65a06987456a757774e12e1ba3000000000e80000000020000200000001e844f2fefa0d18dc574216f811360fc7bf168cfed21862a99541586461652ff900000009bcd43271ccdcf780ff1af9ec80ab77cd44d25410d842109b64b711f698958c03ed685e3ae3ba6a895914f2f4521430ff6c7415954b389bdaae89a754c02a20893bdc94aea4566ef8ce25ae92688579ee3c31b8b86c9040811bc2ec54dbdef8a103a0633cd69f1ca4758a5526b2385479392156a84cb9ff219dc3482f9e2ce5defd87a30a86b65ce40f06565c04c55c440000000b948cece68ecc1b435212fa6326db3218f86cd162826e3102b54526bcd6eb44d81038fe5aecca16aded4c81dc244c0f41c3023e05538fe633ae64f8b184f044a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420736106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80aabd24d59bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2624 2128 iexplore.exe 28 PID 2128 wrote to memory of 2624 2128 iexplore.exe 28 PID 2128 wrote to memory of 2624 2128 iexplore.exe 28 PID 2128 wrote to memory of 2624 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c0e65d6ce8072e6a25dd1e4a6601152_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50394d6a2d6577b83e2196fec9c8cea2e
SHA15a1e0d56185e504fd803df266d43d362df11b7a5
SHA2565ae36b42dbfc42d956af16bc12e76fd24eb55e830d459059c6082360da369003
SHA5122fa810578228843120544440742a922264d747cb49f483c940f8059472a7841c39751bdba80e7f28b372810acff52a12de71525cd292d7ec94040a9234b2bdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51094e9ea7d03a507bdc7f7bfc8d0807e
SHA1865a2616698fd00471648d26ef815613f8b215d4
SHA2563d01c682402b5613af4c9fba3d4893a1d16788cf7f712d2dc039de1bb495e81c
SHA51208251ad274810dbdec8d5e3de1401aec7eab5312f34d07d42ba650f6dfb086b9cc710bf63a906699afeaa178e7fbf5894d9940896ebde859bcbdd062b7604520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2acc5a0af54bf46db7a16950d1d187c
SHA187446cf68b32c7b1fe266bae8f53189e54d2b450
SHA2568c1c02c696a78fc36c54dbb41be259d24b0666b6d037b039c5cfd6698b2dae3e
SHA5122024cadda18eda947b32739524c208ddd11753beb1e1a65a7ede2ca5075e040c6d6c2c5f899e5a87aa3b1ecdf65d3786471ceceb18d696eb54368689d1ab4586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc83d4682ce2f4b6ee382444006bc18
SHA1f8a526a21ceebebcf6c7f61809c5be2a8ba73a86
SHA256c6cadea8b8d59458af1af73431b9e551763d3b7d400e48016ae05d5cfe661d5e
SHA512e38bd39242b97ad9a71d820f4294e29467df57e350022b483bbd87f965f3111b5e10f44829a60a5c190290c99eabc839c43a073762c34013fc80ce515028fe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558626014b648e5c00d95702efbb84d46
SHA1bff5f8217042669addff3b7d640d851ead747900
SHA25654c36eb7fbd8ada30279f88a0e78f0e63dcfe5fdf264770acbe50aaba8d19b08
SHA5120cdd286a831875829a4423637214402772afeccd5cf8182fbdd11fd68c96fc204964e45e5bcc7e5dd88abf8de069f6c1fdf6ed65a83289ca7ce17b5467cc3c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f91e3d90fef140212b2c2f6f4db7603
SHA17d86839376b97a5bf7afa9a90d01bfa551928c4a
SHA2562eed9edbb6dbdf231045258fe4392bffeea2161f03635fc866b01f98a0576d65
SHA5126051d178995ce488b8dbb13009f3e3725a69074f942834aa644a5391983becb0e0cfd06ef215ba0d1816eca2f1cfb1e339110a64ef6ad7be26d7a01632698f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a59c1b13c76eda601976609fe1437bd0
SHA14a1547c8c8a69be9a0a22e71522c5fd34fdbe855
SHA25694c04d2afb35bd969682049db544fa63d8ceaf6f0ab9bb162b85046deee38e87
SHA512773c2b26582478678faa5c7d706a250c30c835cb2d8854a9a001cc872c46fce3f736b777a4165c3afa4b65e734703d3ac304dbbb305c9dd1c924a93119de2a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c1d71a5541bf9d8f7f6bd488a74c94
SHA1b86df970f8c4e351b0ce88204b75fd06272ca31e
SHA256b14523938c0344594df4a7c3a565ef4f190ae35787e937e3b67c0ab0e4c5bdce
SHA512671840c37908dab24fefbc7d865b18ac8b55fbba7ec14e73a7e87dcc39f006d4d0a135bb45eefb6512ac56e3b39ef91a5f1b38fb7a04dc0369cc0d24e897f637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58601228869e2bf8218c6b92fcfe51b5b
SHA1f5ab1d042b95916fabf19425a7601a2de09a840a
SHA256c304a84628adfe0172f1a88aaaa5a8f6c5a837a16218764e3f5157ad7ce33143
SHA51287fcb12a3f26e09bf8cacf36f78958d609798c21f3655daa12cae6549eeeb5d0f29cd859c051618b38db1279514130c17b431a34885abc746bdfe634aaaef1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553e721ba3e6844c0eaccda6997e50dca
SHA1014bc7f85ec96f32961a5431f7a668e6f9ff2abe
SHA2562c9d49f2a215cc44ef99c14c3d67bff92b2914fb8f1bb7c5f98ac48b71144e0b
SHA51227f2358a78edc0cecc01ddfc003f48a55199db218c080c53ace8cb875fa159e1a51d7691fb553b6b2c8b5f76f02fa6f3becbcf462ef423c1d6d123ded0f0a48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53485531465a16b6cc43a0c36f3ddbb8a
SHA19c308a86312e466b71f9dd98cbcd9200b665d266
SHA2560ea17f99f92371654ef7fd7c7cdae42147b171b415fcc4fd39de06e86f8bc756
SHA512cacce0398a47899ab4d23646627fed2368a003ee770681a282cd5ff3d6eb5b062ef17bdc72970853bc9e3ad442d5b1da1f8f93f896e12890d4de556c1de0f112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7e43a541a99ad6be34e4ecf6d3820bb
SHA160301c325987d0c9b4f8b9e1525b4b0452d04d42
SHA256a6f4407bbcf16245a068e814f0dedf79366190800ccd8f86a1140745f7feb436
SHA5126bd9bebbf7d6580bb6cb0f31968ef9e47c38425f638c4d097783fc6b40e3dcc4e3e3cf3119c24b0a7154ee7826fc0bce210b0db2d9006fc432f5ab71c7dbdd0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c9cfa738d6f3fa927f49a30edf65ffb
SHA1ba8a8f7430f8ea68496264de773d98fd354164c7
SHA256f2787fb19998bc749d42053e4b6a59a9710e37990505f0ef5b7a668c7afa01ae
SHA512eda089c3bc400b76973cc90b9d6e117c6b3acbd160eb380ecdbd67b382ae556ea07ca4549da942d7867008ead76333a3053bd5a595954dda9a8e168aee1f7874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155ecfd28472503ea9f3bd5a96c33e30
SHA13c10683725b23253c452cae43b3f533c4d6f2485
SHA2567dd38130463f0b7c5cd63c872d9389c2ff57a7e0938a26ea54f1a1a794418d58
SHA512e9fbf8bd9a5a03a3b2f2cd475d74bca17ffce40afdd73165729618555b2e59d54e9bb49e0665f0fd1b18c223de1782fd7764202d47a276e07bebafc8faa8c2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f51a42bff34747d0e7a51433ba29fc83
SHA11306f60de22f98018c851f442e5f24ec30cb40b3
SHA2560a2ddd391a0a6284e23fcbea9b96730b9a1b317fc95c733e721a0f9774a9ad21
SHA512bcb2b93eb10765497abde447278d51e80d3b568163eae575655f49e3cc60e894ff912ca1e07880e20a6e3be49c57f47db5ddfa96dd937edb73b7c98927439efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512afcc600484e4c6a61f9c0302951526
SHA19996f7db6c6ea1d6e7a9a18da37eaa415e5f2b58
SHA2565b7a422ea4a9f607705a618a8caf489bd6ccb29ec381dd97ac85b6e4d829551f
SHA512709a80f7517aebfe89449d5e30bde391029cd89790ce017f8378b41d35f054a4ddce319be4341aa328e3dcf1dce57f6ff0d86d10131255a3b636db7cc454ab75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6352acfe710e7a3abe277c7f32c6c5c
SHA18a7a80e0a494fe0e640fe397c35ca34b80f6e475
SHA25629c225488ad9cf4260d6c12acb17384cc919e0040245356a8aa825c3b4567e2a
SHA512f5556c4e51bcdd62ee5b7fff4983d300483e819aa0ad5e02147096bf8cf682be12ef4079d0d09ac804d9b06788b7f802c5a2951eb89d854d9c321f8abf8233dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b6d946981f742861a733b6b6aafeb3f
SHA15778a0fc99d903aee06eaf75bbdcaf801c22a696
SHA2563237443ec3ad21c83f64a40da1673cda8d9e6b35759a3eaf9b74e1c31359b19d
SHA5127c5dc0babe06f78952b54f73c922d6b549f8952c4d77d1be453cb85ba60bd3240ae5e79e08cd79add4fe52559c4a43b8515a04cd907870a49e27966aa0ab4f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eebf79a7a8f5e55fabf2d6990ee3eca
SHA1de4986a61cfe51162ea18b65174db89159aadde7
SHA2560a30fe490ac1de500ea968e36d69caabc26840a1b486bd1b2dc672929b4660bd
SHA5127766dd2eb11380db8942333240f292a22d5ca550114410f23e9a1b27464956d297fa91c6866b047c948766f32dd1e0c09066164acfd4ceb0f7698d41423f840b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a