Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
65a8dc22ed4a891fbc3b9e5868597e12_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65a8dc22ed4a891fbc3b9e5868597e12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65a8dc22ed4a891fbc3b9e5868597e12_JaffaCakes118.html
-
Size
349KB
-
MD5
65a8dc22ed4a891fbc3b9e5868597e12
-
SHA1
c55ae130cafcb80c755605b1cd4258c70bb47c16
-
SHA256
377f74841f535899c60c110fcbbf85b67491af5e48df17679ef164001685757d
-
SHA512
caf5b4343a46e17be267e5b4be2683cf047205e382683c71042394fb10cf788e61cefe0e6e5f86953f8081038681c4e651322c2057c7851e1b60f8f157bcf785
-
SSDEEP
6144:SAsMYod+X3oI+Y9hWsMYod+X3oI+YAsMYod+X3oI+YQ:D5d+X3+5d+X3Y5d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304c554eeeabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005c6ecb353247bf44a4f7bfd0cc74316e0000000002000000000010660000000100002000000057c0744780975bf317e209834e94a0712476e7c433c1c4734e48a6e182bae0f8000000000e800000000200002000000017acac373f188111fef06b939870a00a701934341b1c69f680ad1b8b7a2329ae90000000a6f0924bac987e7a18dcc02f071241ffe662bdae9d87651d4606499da76c31928aa02735d2543bc2193652aeda7ce0524cff9aee9992d9f2d9fde252c87cd57847658e36424ef40390654d39da2db724222f15a2ab977d50a50301d750ae0f60678a74bf6a38ada2a7ca23b771db52ea7c59bc8c63b2e01bd33b3061a5ed4670fc1eca7e8780b622c0807db1e3d587a640000000d873daf7d497819c6ddb5a15a09d7e2103a1ba11b674b1fcb49a2f3192215e4a0acb1881621fab36dad7ab9eeeff84733f0de5da4f3dd09e37c7685c25568712 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005c6ecb353247bf44a4f7bfd0cc74316e000000000200000000001066000000010000200000008ce01cb46e06204b8e86171a68c2822ac93b9bf80f12757c34481362c129ae37000000000e8000000002000020000000e36c9d860b9b467ec27a3fd59d9fe52cded716391d133755ab47a972633a61b520000000ee0ff3b22666e14e4cae09263a26687e1fad4b71a37ff777cb803a61c77cdbea4000000051e87a8dade720962275fa7bce9cd64d710f23f4c2ec263db073bce26558bf37248bc8d1fb0fbe90df04506d48bef21c78f01cf7c2f03ab440dd1028a2448b1a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38D81B31-17E1-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506025" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2140 iexplore.exe 2140 iexplore.exe 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2140 wrote to memory of 604 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 604 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 604 2140 iexplore.exe IEXPLORE.EXE PID 2140 wrote to memory of 604 2140 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a8dc22ed4a891fbc3b9e5868597e12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c72743c7236ce373d3c3e089bcb80ff1
SHA18773180bd2008b7828a719db80325fe1c79cf7f2
SHA256152fd7ed9a10519401a3d6d1b1e25d1b6749a250c7bb9db584cc6b217d1bccff
SHA51213aeb98f30a27950746d6ccfc5129f3843b5c4cd51519ce49f40ca6ca6b3175b0d2b1a1404451de993bed60f18cb3ad6e3504da2e4519dc9c6dddbb419dfdbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d6ebed4915b210435e33f85084c5b9
SHA145d56c26f410577ddc6494c8552430f722dd5cb5
SHA2560a9d9cad978d824e5c6f3fcbb591183b65b9ef9d16982377c7d3433eab1b81e3
SHA5120071df51bf5962d5b3f870300d8ec5345177f0097ad4c7d22c6e6c31639dff8567cc0a174d7f64a7bb2e9fd23e82398412964da1898c05490317c364603beeb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2141a0ed21e69d4978d987f1724168
SHA15bb2c761a63108db491d6652e3e6adb7d3b5d61e
SHA256ee27ef115c93d6fd1130b00419c77aaeec5364f58d3d73441759eff356b7b096
SHA5127cb34d96415b3236e28a9dc1cccdf2b5d67b67e9cde7e2fda752d26a5c358a25b58cf82e1428937e8584fc19471bf8351cc80a094e4ea4773e15e916ae66f0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55900756eb2bb5fe76181eba4713efe55
SHA165b632d951ea6d334a4830ebc61b7473abbd9f3b
SHA256c3d3760a4f20008e4c08ba3ad368fcaee3bc4a9bb9c75b064f9cca2ff5e1669b
SHA5129bd533e1c79aa9558fdba9f5cf81b4a56470de1448e43221877c1a44ce915526cb06fd24fa418c58e5e22c4be2f7dfe92aeb354286e3eacbc3c603633299f58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c0744eda868e043d5386315204744b
SHA1fdc02cadd2b0edbdf8b614dbacec2ade97fa165c
SHA256c33543a667e4e57eb002f9e7fcc1555059bb2f3cecac11c4e63a890afbd50641
SHA512de8c8c4ed0192538d549b95401b65d844ae667d1ebe36d411cbe9bf99fd51d706415c50521cb783dae602223e49931cde6c4d4ee6a15aa9c8fc1e9c0e9e1c09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b6cf11d5a48512ba512ed0234b472c
SHA1cd423791598805a694a8feffac5b165d2f9ec6a5
SHA256e922f53fa5b20ae60563979cbc5af590bd8f7972f99c2dc31e91ab7b80f106d7
SHA512261bb7ac4b5d706d8f03ec93c43ca7c90f26b3769ce592e01e150de089869d583666234a7e9954b92f1118a93a0f7da899db34f07b4719f98977eb33cae006a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f25fcc548d02093cb56d700404031fc8
SHA1be037dd60fe869728c32edb82203948c5a9d4618
SHA25612aaf925ba7350a28488cd4516588d1e3a13590ee119b9106ada9da235e661ea
SHA5128cd7243ba488666f8ca6f8fec2f6b76babdf36199b260a9740af24a5095cd8a16f369689b87d86cbebf75533f46b9d4ed0049050576d94dcd8b728c10bc31cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0a590c7f4dc210301fc46331e9c799
SHA1fdb993107d09b265b65b27e0d82dce45fced892f
SHA256c67d5fb1885775f4f76158193a62d92c073ae370c9c74fd7e8ad1be48ed01825
SHA5125c4a21404870aa89305b9ac83603d5d45266ccf8166d58f6247b7f477361883bbe6dbbd6f034f75f032d98b660be8c9ca69f526a0fd7825812b8e2102d76b4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50c18417994838abb77df185ec025d2
SHA15c0ed9cf72350fa5d6c807bb2831974ea1379a92
SHA256b497cc0404fcacfbf5e458ab58f8dab93a2178bb80250f20f953231228165665
SHA5122573d2b27721b87490c3d4c8187d657626387b6910dc8d4b08c1a6dd686c5d6e5b99f4400588ca0c4b318ca3ab05fb3d117dbff9182a920ee0b20f7dbb264142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e4e14cd4256d168490caa38b05cc1c
SHA16ff26fa80961fc04de2a68a799bb0a6ca1d80ad9
SHA25651149f936de779fab9f1f2aab57e8a7800a6ad2929628c2dc6e5c7b7d6b51eb8
SHA5124bf08d0f9b0f3cb66161455a6570be23a12fdb135264f0b8b67820590a851f4180ebe799551142e02d9b8f048af7e5f3c5ebab98f95b2989e0d5653cf6121a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc23b9cafac31db5e3b0a7baf791a29a
SHA115d53022fe937c5a80626485e03142c1710efde7
SHA256c9aa751a802c6025d8c36a75720a6443de901f8cd08c6941adbcb8741f58f7a5
SHA512351eb25ddeb08218bdf5484f39e4512f7b5b4145e2f22cb4aac949d865c345c3600b0dfecdec844d8c2cb39f2aef8a64d80720bc996236add5ddda63cffefd94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94518d6a2b4905fe4c8c42bceff2757
SHA1e840e112dd3ca073b52e07e7a9618d1fa32a9d61
SHA25681ec1fb6ccce9fa48e90ef0b1f63775eac99246341587aa21474f489efa5b684
SHA512321fcd1b2392c7347d32ff1753e3239e113a187608e0df4c9216e701a4712aa0410c3abc52a97368a0b498cd8acd3f347b75bc94263125049f571fdb95ef5a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b573f661c1806561e1c0c75324938f82
SHA16cd7a35bc059f11eaeb4ff56ade55ee616ff630a
SHA2560713a11b8e839ba49260cb99410cc3220fec0aaddaaf01ba27128215d36e1d0d
SHA51276ef629b6529aff6c71fb7fac91a0bd8b5ae4d345f90d7f066d127cb8ff8f415e8b1df2dda3f06c576166439365ec6ccf6bbff92a1b62723df84d365af5c8994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d451879689ca828aa81df27a9c76bc2
SHA1e8904f92c8c6ad8f656b00481258c78f3c87ac21
SHA256eb2336d6d713fff424d122201ba1fde7c9c0da5d3951eb32547ee458c61c8706
SHA512d40abbd55f97b8575b660e5119f162e179f561bf4a60ee1e8f85f738a54d8170c34c10f7de7a24a8e400c963bcb296b3ce67adfd7db92ecfcbadda720643711a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5a06bd6fdf8445dc2c574ad0d2fb0e6
SHA159e7eb1c5b0d9aa0a4627531fc1802c02aa85d15
SHA256420d4c1089a3b7a11b19c8b136361f44cd8411c6f8cf7adfbd6c490895d78452
SHA512f624bfb446b945872bc47d24b5aef23631dd3eb4f66296aad931c89d9fb95101d2c2478a62ef80ad807783c82e1280aa230a7435aac916294aeb35d98bab0f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584414c5ce2f9869a3470b94f59358dc5
SHA1f4b65ddd4ca559334ce08580bda11194b6783bff
SHA256eedc8efa153fc06017aac48104d2a74c6fae4dbd88c31de2fed8e649d1f158f6
SHA51290c763cf67107347d248464a7cf313637805919defa76a3fd45f0ecc102b18ead9b864612593f00bc651d873d56744225c90b6be1343a7d12d209c8c19910c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507a4e7b682477843247bcb94da72f4d0
SHA1c65e0205911ddf794a7a55a828d4943afb7f2874
SHA2561ee51e55cff4daf22643662285d709257904fb330c7b355313df992cb6d7edc7
SHA512de7aa179426d64661db1f7281abee4ea1d8b0c8fbd76235a857ccfe75b4715990bfe1e27064cd5586da4dd8b4c59273b97a92faaca7d48cf2786268773c46f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ad64e561833fa6c19a01d840cefec7
SHA1e95aea30eedf9cdcae7de12d543cfeb86956c0b2
SHA256686c7b74da9dc91cfc6d28f9223f6f007d166e5a801b2b0931629ddb1524c7b9
SHA5126b26cf4f06d813cf7227a26d85f6a6a02cac1e7971e54ce5608ff7f5ccaf86094635773c524c340d6a1c1a503828b812a882d728966cc42e91f88c9db25e7903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b67f9dced881ad74ce126884e255d325
SHA19df841951f92897a7165a83c9eb1fbd522a10db7
SHA2564717fd0b2a49ea9e5119ca18a25c71a25eb88a558f96f67a871778851faa2867
SHA512a6756b480a778f93faeaa6552d50558c3f28a068b6d03ad15bd8c915aed1333f55333bf8c13415571f569629b289e9efaedefba0790df7486a7c03c6428548dc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a