Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
2feeae999a7f0cf074d4d37d63cf9f7a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2feeae999a7f0cf074d4d37d63cf9f7a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2feeae999a7f0cf074d4d37d63cf9f7a_JaffaCakes118.html
-
Size
4KB
-
MD5
2feeae999a7f0cf074d4d37d63cf9f7a
-
SHA1
03a971b53a11af50a3a01eb7f4c1b955591a4b1d
-
SHA256
2231a53156b8f2e345d2b6d6acbfdd45ab0f87d608f8997301b10399d9bbe74d
-
SHA512
69fe87f5e4f2715130d92fe0f9f4422a4cdc681561ddd58524d1ef4f0b393dd0285b3060758d3da358e96f96c95fcf239d14309066b43287bf39cfe4fb8b56eb
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWCZCEd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDi
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421518999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000696d8e11085bdd0caf4f2409a0720097df1b3c698c4c566e89611a7adeb6c6b7000000000e8000000002000020000000983a2fe08830b34a6195146d85ee975ec22d52a76f6b9fadd5eb5f0fa99545f2900000009d45e541ca7ec70347aa76f1ed22b6e9300b022cb73e296271bc43c0f63d260e04872b2187228d5b2727692223e922baf87a2ae60c27542bffee0c643aeab1eaa0b3fb70becdac5d869fbac1c4aa61764ddf7076a79df42998682f7612d1a281f2ec1c4b76f7fb5d22ac677558d92549cb8918c6b5971c64366d416e604cd9a5107107699602d28783b4d7649f13e33c400000000174a6dead8cfb5bc6b913f65511ec066ce54bbead2f18547eea439a54986bf82236f9429813840a13dff9c68dee2e1e892b05342c3b3ed4ce29e8e0414eba43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000020c488f06d3ae6c8bc7f46c89513aedb3e8d4341e1824c2aa7698ed3f8c2f18d000000000e8000000002000020000000ed15a91e699937a59507336b38949eb7d17ca0cdb5e6f4622030a9792e3550dd200000007ede20c7ff3a56dd3268e62076c5b6531f66f32f67a5e07c7041a17bcdd15e6f40000000fe8f5bebe197a3f241fb92bc51525ca68d25cc696b50ac9a7e49e8943be51dafc00347b7b039e506ed9e0cd7f7f9e744fc391fb00894d773596c9958a837bfda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{203C3691-0EE7-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f064b1f4f3a2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1896 iexplore.exe 1896 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2872 1896 iexplore.exe 28 PID 1896 wrote to memory of 2872 1896 iexplore.exe 28 PID 1896 wrote to memory of 2872 1896 iexplore.exe 28 PID 1896 wrote to memory of 2872 1896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2feeae999a7f0cf074d4d37d63cf9f7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837b46a4523ed0cd399c1097441ee255
SHA18787ebc782945da72d709d56982b03be8039705e
SHA256808afd3d86c76c0789ca025b1106d015c69f0d259149c61ba0f20492d2a67a25
SHA512ee54b741b79aa07e4007dba165429d0576a71c381cfd2939cf12ce14a90f96071f8841c6b62d596d192c5746c90129f01a9a7c87e69bbb790801e9dc09d1c6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac38452ad5a73632f283a1f48f4d3ebd
SHA17ac36b6aff96859fd9c98fae78d47ba0ef8ee20a
SHA25653c2b12c2bb2f7eb76efb3842b2618ae1ec7b8ec6ce4d3a959a806e237f1fa02
SHA512fff2f37b46093ba6ce317cbf106c1f2f5443308e8ec923a4bdd8806925fdb4c42aba4f8db734681d61f978b8623331072c51d6770b1c6cd0706614660f787cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d95c52c94e873589f4de8372599ca5d5
SHA140d9bef3dd3db6dc6d50926979212f039a5016dc
SHA256cad7497ba9be41e98bf0313af893dc784bbeb2a24a1c3ca35bb53de0adc00802
SHA5120400be54f0c30cf6e206e2c04d520d1a841c72ba389a4a0158b24d8df8156046d7ef960f60ff6454726b3b6d6e1bbb45977cb1ea078ef09fe0afd5cf2f039aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c01aad442d15f45c39ad81141b08702c
SHA13c5cdf2251562048d18f4df829a63be4712bfd24
SHA256b667bcd5d4849436cd5f1acaa247899e6c78b5718e6635ae36155ec57ebdd2a2
SHA5121e5f21b5bcc83a7cfb692729e008d08426d15adc7088ccc052c029dec64cc0e7a182a00df3da3f8c49317b5243e4850c4087a6e499147c6e3f6431dd6dde3c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb55df9f8d2059c985997330992aa104
SHA168e0a6b37d5c17f7c188153dabccc11cfe2c3cd5
SHA2567c5da9b6f9e3076ad18d2bf9e0af50a60fe2825640c007fc493b37200e6871ac
SHA5122313b36b1fbe2a8a00aba97a54d21817398a9936cf0d61272c73c156f1a78268bdbc0f6531d68f31598de2ded3bf6d5a547b65e832b823c8aecd377c5a428777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d2287198e0b519786214d3d1f895818
SHA1516bd116312e97ec98e13f526c0cff889c96a1fa
SHA2568781cda8621a75842e45ed46e8832ac237c1667a06d7b2d53429ff6b468b99ed
SHA5121254207a2b58a05d0cacccb994d24185bed3392829d0dbfd931e48093f460fd8fffa37cd64b95d867a73a87710590ac0e81a865e1299667c052517bcc11fdb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507748aea7728739753f4e43449ef4ffa
SHA140fe9228a5c97b08183f720828ff7910068a3da3
SHA256ce7a002fa086ba0e57247f165e844586853c9d2a7b2eb7401f2ba854f3608a85
SHA512bec52ba892de40f3beebf4c3999b801df5e6376b3d2b894365afbe75daee4e38519e46e7c9c689ec4506e20e5e45fff747ed526a897b783bf0755c9a9f4796d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f650afc989cc6ab60d0e7d21077aa16f
SHA1b295568c3539dc4f55024f481b99cdb94ef91be4
SHA256e04247342c3be6d40ef71abeedc18f99519294d71563fb2b53760c9be78d1cf4
SHA5129e6c1e5347101ca2d425c618019204f7f7eb8a11360ffc8727e41010eea63d6c6bb367bd68262e6388bf2b77a58d9c03473673c3ac8fe79b0919faf272840004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578341cc0f03ae41e7cced39d3e872978
SHA100e5aad40796c0ded750814763dec044660a21cc
SHA256e72aad05f75bc78793c5b4976a2b5cc45fc325e1d618650d1a24b36485652de0
SHA512b64066c539c4102d83a1eba9fdcfe33fc50c27b8282d9c168b16f1e87a607346c93b60b0ddb13f72ed053a1f22292d902af58cad43959d8795ca742ff5eac2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07ec70e2df9f9e1a1ad195c8af7e8b3
SHA176e091e469c432f6ff4a8cae5f9991943745a31f
SHA256e2d4ac013e28591633533bb0893b56d207a953994948bb49c04d2ce7b2b54163
SHA512f4435b0b3731ddfccc27be0531b2d41d6bbbca2ebca28b23535e3bae321be9887f794c240b5f8da85e53834e1304de8b13ac77e92224bbce20ce2eecc64aaa12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55229ac29142798f6550eac4d12ba9946
SHA1c70f4000159a0b7ae3c05b5b9680313a684246bd
SHA256b72087bd08068a954d0f2bd1e6f3337b95fee8cce670ea207717ed1cd3fa8051
SHA51242cf125090591a176d3effc08f6c277bd66ef4ae0ba478fc22ad6e101225ae4c33f11b2f257512e261b28ac52de411a9fcc9984b2868bd6d2603cc2fd04a791d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55949ebf40c015e1fdd618a10030063e3
SHA167d5b5e5c442000646f63bc4cbf5ace3edd5e1ca
SHA2563f97190e7b49ac78741e193cb271eb6f475e131071860a6918a3be284fa4bcc4
SHA512827d24b090fbc8e869a9d67868a5bfab03f73031a30fa85060ae66205150ba3f4a6b3e8a19ad82862a47bbf9c13abc9e3f41ae97896ad7268bb70716c98c530d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94c9490d0eb14edf0afcf8281a16840
SHA11a2f5a4aaf12faecbfeb6ea09ef8a744d2d40711
SHA256efc043324e92565491b68bd5e4922fdbb738f1ddafa36e75f8ae42103c72e2bb
SHA512b2caafe9dc8a7f7c90c31210cfa61c872c355be128127348c1d784adfed1096cba7c372f1654c543c9db17242aa30dffb2cc717778a8b2e2ab5adbe791316e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d0b15070b60b9efe44084fc796b305c
SHA13e4dd79d16b9b0d0b923bfb6b3fa2d6a438696e6
SHA25654040405a3089880f8d9f8a7894a28b60dfb0d34b437314693f241900ee39cec
SHA512ce51bd5e89600847d0f177281c078e6625ce8f9e0b99c841774fab0bc44473c280d0c673474037b9ece7d6a1f170a6a7ea5277f68cc5a8b093292125fdc133e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d2d71bdb4bba9de351f4eec246b937
SHA1ceb838fbf44d204e4ffcb1571f6fbd4cdbf6aa7b
SHA256f151a6929114eee83cfd6283c198105561f773e2fce1018c7b27d6c868e06ac0
SHA512f4cfdbb51ac1e739bd71d731bebf895e67a3e31cca53b465614cbd2a9dbbb89693e7bdb25e8fd260d6a9e65f538cb4623716c6b48281d3cf9333c93f39874176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca951a16f180a5b657b28c1af0090d23
SHA1e9e91e4d949ccf97c39961e413ee907fb46e99eb
SHA256a38440444ac876303390fd3ec444b9b1271b04b9af8455f9f486939f85f3cb28
SHA512fc154de7c87ec8defdeccbd88fd0a2404348dab477b3e4d4a24dda058e0f453b2a1546e2ee12d90beb038da59a2d9d2100cc5771ce73c48a20d23db3159d6670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354951aae2443b697336e6adb9667ee0
SHA1df8e322159b08933e022fbe24f0d57e92a1c4b94
SHA25692c0ec7906f5942448fb7c8eddb1c6f8db54ca04b194bedde582e39622c1b500
SHA512a9e776dcdd32e7b5b808c4a6312366fee4471de50394918fda589125be7c7bea92538cc1b07cb3b984ab70df71d8b4e95b4e7fe7f9afcf456e8a341f467d35ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bf4ce3a7febff469f2a17fa68d2a357
SHA151d11e25c4be880914a3dddf94c1f56d796b9726
SHA256d46b17cef840e014901f96c5fb205f01764bf54345133023ab92d16edfaa9c9e
SHA512099f4b6c15ed4bd4e325f0899026ef05090e010745cbd919cfbff9f39199a1aa9e1d055ccb6bedb38157433ed550117f51c7e4b1d65c3c8dd7ae5bce55727549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6408d292889568e68d7ac3d69de5778
SHA1cf0c65d71f77082d0011d19313e0048bf6b37c3a
SHA256e821e54b2052affd78ad446a205c0f0907a8ddca4554cad29fccc287789e5853
SHA5129159cd79a1092addbaccbf2ca25cbbc83b87635dbf062029bff9e7f993ec5608268bc98529b5b2aefe172d2d78ab4fb7f452540de2440da675201a3198075cdd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a