Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
65a97514663ceadcc9bbe8b3f7305429_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65a97514663ceadcc9bbe8b3f7305429_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65a97514663ceadcc9bbe8b3f7305429_JaffaCakes118.html
-
Size
2KB
-
MD5
65a97514663ceadcc9bbe8b3f7305429
-
SHA1
3486c92cf6fc213ec96813b994617ab725b72eed
-
SHA256
38d7256c46057096de8fa7a5047bedc986f55cc75591b869ed2e273a5cf9ed4e
-
SHA512
4ec5fac81bd58ad41be4fff91f3d41f2aa20114ca4d3a8b4040be1c98e381720c285af36a08f2a29ba663c3a0a0d8e51cb04e328bf82708f92d3dd15bf24b12c
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F392841-17E1-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422506114" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0036944eeabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bdc8fe76ffd7574eab721e729b73046100000000020000000000106600000001000020000000630409ae07a1c4e8810129d651c017c4dfc52e8e511774d98d268efb1dcde730000000000e8000000002000020000000cb899e2e684d3ba5dc8a0ebd802ca654177bcfc0e822b66298cb227a2204062120000000737a7e6b9b8d85a83344551d6d4df2e21c585e9420beadd67e78073cc7097afb40000000abe32e549b28a30a1549f42b706d2f1ff0ac2b0d84315f371e82a375d62061269de8689c664a9d8a48b366a814edfc6f4e4132f6ee8b7141642c62fc42be7d7f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2868 iexplore.exe 2868 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2868 wrote to memory of 2740 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2740 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2740 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 2740 2868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65a97514663ceadcc9bbe8b3f7305429_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554648cdef388ea2ed621134fbbe1c858
SHA12648742e77526488016b301e6cc1048966f65594
SHA2566427bf9c27144d11a0723751ceb8ebb54833bb05ed274451ba6ecb77bf5df7d4
SHA5125975680577f3ebf11b972b382a7e0f72b101909ee39001606334aff41b9ace3f3c61405fddf62731f08776150d5afab23d85fe2073e356479254fafc989b316f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d1c95286a1cf7711354bd0f2acd570a
SHA1403229f93b6e7b6690ea1eed99b2e2d3ae20a4cc
SHA256405fc0dfa066cb8951c29be1abdf2f4eea630553fb547e54ef4ab52f245ecf87
SHA5122a2ef716425ac6fbf45f29302a2985b925dbdcb78129d1e1fff4e93f2bad7d99f7f8bf6b45177cbda54f6698e00304427205e8f483b922e5aa5d471f35c51c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574abccfbaed8018743726748ab5151f2
SHA11184fe3b051a7acdced47c9c74a0e81b6a6d78d6
SHA25603f45f75b36b66ab0fc7b8f4010bf47fde3fcffce6474504ef8de249ed1fe16f
SHA512faed45718a53b7526564ac8fe223c5be0864e7e4f72b29834030292198d02d265c7e4a10963181500eaadfd84278ed60de69b8421bb1cc68291544ec819b4372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae6e92b378aec5eaef490b5daadcf23
SHA13d6d8488c1070f72789362d1fd77bbb292c90ccc
SHA25637a6e2c8a01c614a6d4e6d7c66221c80b99b281aa8f18f43718b832e5ac7f6da
SHA512a849d46e3f6b0c292f6b63d5886fa6b59414b6384ff6a101d84c01455ef0d737f5976668bf37274bfdb14db742bedbb719c2d044089143e9ecbcee5911a40168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ad6b20d50b3e87cccf27a622018ae4
SHA17ec824b02c4fef830415c970c2eda86488c266e9
SHA25635b0020a27d216f915e203c8f262fc94f2b5058bf7e69ef93d79a46a8425bbee
SHA512f13bf6230c4d6ccb3922f3dafad7ce15620d8869eb3e6f60dd95714bb806c5818a1d5a992959ff10759df52dd7c2fabbeae6e30c8ae61ec2bb73700a587242b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2ae3c5ad0250001da9c304cf0540b6
SHA16b3d3bdf5249899bd64fe1d742100f63dfdd2e9f
SHA256726e2032642d9a9bae7722b74e9065f982b5f8b98bf13a2828460b4378358d4a
SHA51277cdb5d76f35851db39f83660718cd724e5b8366f01caf2629c35cc562c9bce98619950af9905ac5887ef4d5f2c7432318279ed9facd99d03618f00a5cadcc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263bace092a83856aa7d49294d327dc4
SHA11ae11310bc1abdc65346e8d69472d17815356e30
SHA256732b7de1b9eaaca5db1ef5f9d68dfe9589e9a2e4f55b401d9b9cbcffc99d5d47
SHA512078c4276af7fc78489abb2b18d7285c2589b9dec69fd34ad654e028628103ae63f8371b803a6c536efb75e8c1b39c8167da3e9ecfdd300bfd9b3c92eb0e4b464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f079e1c81bce89d6dadcfcca781d86
SHA18be0f607bc3e59043b8f7a6096ca86b002061cdd
SHA2566b9a9063db7974a84dbfb9f49e63e300677fbc164843b5a3e393fd7ca00a8c8e
SHA5122fb0cf9971178f705161fbf5dc7d5ba83bfb14ab3a7a4848ff0111ebceb902c820dc529b677f18cbc9cc8a45dc0580889494d8900ee487b6f7c9e9b51866e89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2176fdc51471f5eb839b67b76956600
SHA12c06a1092b7d240be7e6dd521297fa3e6666d7a5
SHA256185c33f7666e7de2b43109cbdf45076fe16d4b63ee96c69f89192b5c6ae9efb2
SHA512f6f6e88e3aca22a9d52df1482fa88af82fdbc925057f70ef552f7fc18ee733eea7e29ad5e5c2508f205b7395fde0a1332b63fa57f93663fe63993c37a52f4be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b00a9758b30604bb6878edfacc5b5e
SHA11c8bf80eb1a634ca07a15f4043e7e1a97a446ce7
SHA25658b8c2cd29d6cd34bf2f1e814723cdad9ed4cd8894500b051332cdcdb0efaace
SHA5120f676ee761c2fb6082fa1cb01bad515604d6066115d4d058dfe4bb176a3f3219dad0706096777f973b52ed726d17aa0e5b65b7f93ba8455d80443d66c7794762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59462570e2645b93554cf1793b6dbd3ce
SHA1b9661107ad296f1e09764b855f706201d2cafe2d
SHA2563bb4c1631340cef566c3896d7f75a0fafde7ca0c1389dfdadf8a7abf9e9abe73
SHA512f15da826330120fe2e84059942e5b37af12c74a10c5760c80213ba6ce5abe1808ed6bcd0d7bdb3041b5b48bb60b1e1328f440b26650b608de166e92221e13307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518005321ff1bef141575ed71fcf014ca
SHA155d523d17fb99e60aa05e57b6f9bb8ac943eea27
SHA25648508b82e762c0076e8be5d0f687cf8c44c5cad0ab3cfc0e41db9955a9876a5c
SHA512ac111a9d274a9cfc1c95a23b487a292165014f6e79b20033815bdc4c6135b37f792675c34592d4d3b3b1ab7c4df9f9e13bf9502b2f04ef69dc0b8752e51447c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599803a0db83757ea2fa29c73a9357000
SHA14a7b9ef08df1e41e0d4d6bba3f86cfc8b6f8eeda
SHA256adf66e66ce3b91f8dced9b74a1ba1417ed6a571d4d0aff3493431aeb3e4b5d3b
SHA512cdb0b3b53cddb13e0308a4f977efeb9a6eb0581ac20e8f9d49cccc06ff07688e4eb61c321cd1a47db80640eaade7decb88d871625c97e6c32feaa96dfe336396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0175345fff52dddeb05729a848bc732
SHA1652b36f20956a7f3951d78bca806657e586dfe2d
SHA25697101d7a3d27ef5c91c0029e5f337b0ec1e6370240b933129fac5e1c0fd4ee6b
SHA512b03fde02edbf43ba4abfa27a1cdfd6ff26156c1a8bc791d7828770ce03375ab1c956ab6f1df9d6325c36088865adfc52066ff65546bc717f57db4a9701df882b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c22fc88d63c3996ac465b808a5f16ef4
SHA10651181ad1d5720f5654f3af2da9099be1b6439c
SHA256f4193688c0c12fabe5afbbf45b97c6a31dbcbe1f8251424fb929c2b776219d82
SHA512cacbf1ce4ffb23e7345e0eebb919082b7182e48a35916f76784d694a6b3cece3161635df186554b82c96ef888f664a1d6359a2326f9bb12d98dbb3bb92b513c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f5e30e43b76d0af27bcd513e757207
SHA168f6396398bf6ea912270e832c08cc77c78e958b
SHA25628878da4ec5c82ce61e2ed38aa8c63f16ede0a63d0b7bb24c99664dc66b943b9
SHA51257892a0d6f77582bb4735115121e69c3c97f9b7190db82420112282e6fba0dce2e59665f3e2a0899596a3405581712aed350c1091870c758feb26c961c1a1f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a1690ef088ba1c2194a1d2c19e01fef
SHA184b3a90e5f68b655fb620543deddb7050ef0ce1c
SHA25624c841d47924e76018d5bad86c3d2390f3c7fa3f344d619d5bcf70459f4e2262
SHA512bafee9a9261fa120a2c833ac9d62d537d0c9a205702fdd0e9bda9acecf8b569a8b7e43ca2dc92a79ee6b632d1b3238b7265f2921c4f3bdd6f3936772e8023605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d26b5447b08f0ea0a4f272116985be39
SHA117305fd4e9ffafd1180790b62f9b4847226db879
SHA256f99846dc326610eb4afdc0298074a7617883dd71f9703887f1b0abda9c9b4ea9
SHA512c4a3bad632796366a51bd30864a9bce1901e725b3de65ef223aa6d8cb9670c79bd02ce82b486d30414d0fc36f85525ece4e26887a6a391f8e7fef7a288f7a94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291834e05f2c055c0a274558aa4a7dba
SHA1c8e2db8b724bd670ca32f399104e36e6fc9cc4b3
SHA256c9f4e58c02a166a527d80b14934caa16ccd42ccf3a279ad92c9ac5368714f64f
SHA512f1887c31cfc9c997c0a73716cc050134b2ba925aa4043ff96fd1bafd63f66cf1cb4b4b40ca5d5b29a829b7cf1a8d7792ad535f5cae1bd43e2d1b74a44a8fb293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee4c6908a1a07c485666cd61ad3ee2a
SHA16a205c928ecd2b06d144b101c63e2a678a07d62e
SHA256e6757982a0c1728189695bce1c2172a1be6264b51b9e9f2dc76bc48a373666c5
SHA51224f93b7c402be66dcaef7966392c97e9071c43ed0c5ed565a745e4d4581f92477749f1a7a298a11190a1dfa5676ca4ee99bd11fe1bd86ee98acbb4745c31c0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d5762e36845d2326541bbea81d8c11a
SHA1b7ba27b305bcb82380a1f570df3f6d73471f9f80
SHA256b9991fee1fa0c2b2e4125b646ff80ae8841e1ccb685b2190eec31c20a8f4ee7d
SHA5125895d652f15cb0bc7c0db4891c442b5e08e0f0c71119d240c426af53cd68c5ed95c921f4a926d7180e6d5bb37e27d14de139ef10d6401afa6428725c56dcb836
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a