Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
65ccc289a062074b02d4b4d19d6cc414_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65ccc289a062074b02d4b4d19d6cc414_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65ccc289a062074b02d4b4d19d6cc414_JaffaCakes118.html
-
Size
8KB
-
MD5
65ccc289a062074b02d4b4d19d6cc414
-
SHA1
aa318fd98b2abe45ebb9208fcc812f29d352f1a0
-
SHA256
7c45f27e7b3d8f8133a140e97a995b24f7a41c68cf7ed57ab4e1fcf37afcc132
-
SHA512
ec36a6e104be32bb9a469f1a235f82bb3f60b5d8c20c07d6bdbd793fda04c6465ccb86d83e6d9e6be0c4293ad94ea6e8c254848285ea1dbf9ee65b93b416ccb5
-
SSDEEP
96:+3fvu1E3cfvheoZT8ziFH3XuuUQin6IZb3npHsPbinJa3kXeWRfu18++jyPDVABu:JOcfvooZT8OHuu6ZfLyPDVsu
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f6ef19cdbc7ef641625cf396ed8312376827a816131588f93f04c1946f829924000000000e80000000020000200000003f858f876b4cc0d82f42ed12fd7352e53f729ced5e95b0ec617f27a592d1c22a20000000b501500ea344a1616e2b8dc45138a58f2b679d3316e18ec684ed0aa67235ebff400000004e2caf4189b119189b8a61e63b7fe83d63b1d6cd20d6ff87cdbde96768eb13a30dea12d95da62c8bda86a9edc3dbd9d01f57af663866ffb62bd802d63cc497c6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d7443df5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{686ACD01-17E8-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1580 iexplore.exe 1580 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1580 wrote to memory of 2580 1580 iexplore.exe IEXPLORE.EXE PID 1580 wrote to memory of 2580 1580 iexplore.exe IEXPLORE.EXE PID 1580 wrote to memory of 2580 1580 iexplore.exe IEXPLORE.EXE PID 1580 wrote to memory of 2580 1580 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65ccc289a062074b02d4b4d19d6cc414_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c2c645625adf7d4a5c10575ddc06ee
SHA16ab91fd255e7053d84fc820a2c55118ef5b3353f
SHA256b84b72a58ec0af125d9e1593fc463ba021414d10ec039795f647a93b0b5f3fca
SHA512d3a5b08bb76ec1a8db20f0277be32e4b85a6544ed38590bf42158d790a062be49d251e41e449e33403e97f38a92ecc98da87ac0c44c4fe2425f35d4358c4f9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5870a3c726f63ed479b78698f6b5e2240
SHA11a8471f3e04e402777b86673b6792e1fb99ba9fc
SHA256d9d71a1ccce2fcc8ef56a04dfe406c3505972dc3634c9d12a55a3266f124af84
SHA5123f2a3ac78955cbfe162932dade012cc57ca83b70f8645f93fdbf1787cb4910bd267f10c811a7c4f35bd731993d5c01df364f8c3cc7b7626e6708ada9b391d49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5802330a47dcf53c65645adfb0da62fc4
SHA16d34eb7951e74fba90f1a0c8070d1822bd2bb94c
SHA256764415d35cc6af4135e275b84c98ed2a5fc467be3072da11905650a8cb067c49
SHA512752f0bcba9185342d60cd0406070de43c43a2fa957acebebbcb55adfa25f5af50151152f79e9ffee6bdbf4aae06ca1610d182f90e44a8e1edd4bd828f972140a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51930d7a77865694573abfcb42d4fae38
SHA1ce9f4daeba53495491e7e6205def5b52d0f2af1c
SHA256bb40d32928aa570c061f9df536a2b692f98d38f9ed1b1edce96a76b800d590e6
SHA51215821f223c67c01ce514b94b0703795953dc750d046f07dd1527093875bf8e718939762f1d1bd71f91a1cca1d30c3a59b4f6d3ede72b930e2ba2c076cce42c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb54e1f630f30d06cf1d0c6eacf366b
SHA1099b204e7b8963e48f3347cebf8437da4d2f4c6c
SHA256ed599129939b5ea0c0a0dcfaa9dc6537b34092b331976809d5c0767673ec19fd
SHA512497ee320bba378b54e0fe3e6e8dc923cdbd30586f53e399804e7249fd3a43f88bf5f9487523a6aea59b88202c8092fea67669e2375091e29be3afe7798b3abb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589296d4317425a60007a929d7b50b636
SHA120859bbec502df2ad194de36cf89293b2d72b3a7
SHA256d996af55e077ba3aa5bc01e28607eec0e35802001d48b02126a3c0916b7e710c
SHA5127eaaf5ed2c0f088f38a11792a2478b74a717abfff10d272d026c243020668fe1275ef184ba2e8cb8e46e0a3ffd290efa43ab70799b92c91371b7e9648cddaff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5725ea2782a289850ba270dad95b02a
SHA18448d3b7f76339a3a19b43c366790a770be7d72e
SHA256f5781cebe984f6bf880b0e8b8a04a4ddeb843294e3226fd6f53d6e2b8c004040
SHA512b81b4cafb9559b2b629619dae4cb44771e10397b72703011e8a643fdbb6740e792c4e28dc3b648a78926edd8a8b573db533aeccd7e73170962131eb26b17861e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5105f4c21d0d613bc15221b72dd8deeab
SHA1aeca150d9969430bab36611573a29097ef8208cf
SHA256ac293adbb680459d6422c11c433d096739433f3b5482d42c84a0f18c35473cac
SHA51299ed95d6a67c2981b7da20c4af8fbdeb46525b97c67358d966eff047bcbd57f3efeb8a74b1fb488d7fbd958df5664675d1b842fa9d4fe1009ae6c27044a24667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f8e9d049b41eb041d6942a9b4130858
SHA1fd3b0e1f056f65f956575492bdd386acf6dceb4f
SHA256b801472545bd9f8496aa7e9cffea9887f8347df25791ffc2c6a98c9e07815cb5
SHA51222941eba8ca8e4da24cd209fdb12aedf6fa952557bed656dea4165b26887f17a3d43b371ce4c02ad0c8c0396f79a151c617a954835b52f997ab2bd3b2d1d542d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a09d5bb645f3c63096b9d045b014d524
SHA154e60b2354fad853e0746dd3296405f4d40de67b
SHA2567a3a148aadcd2310d81cb4033d43d6e000117424004cbf0ef41fd120f42b012f
SHA5129c02c6e5507de578770a108f1172e01e9b29bc3cc8a53ed8a5f2fea10f0991a8bf025dc2a90dc0956433c94f9a9daa9f40ae5ce2484450ae5a7c4c36d3186174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c7d4ff0ea0634ebf5b15eed7e0e5597
SHA1725e2581b711f48a77dc0d0b668fd6b98de40152
SHA2560150832a293c3841c18e4bcee073ba5ef9bbc91b503172b75308910e55ea6939
SHA512270fd68d92d0046efb1d00fc389757ab94d9350eaa10f54cc1dd60219f1d4a7ef92ea8f5a0fe0e2cf8426c72451b3d9f9779f576453d9f220ab6aa0b77bac816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590134ab2ab68e5e4b62736b9d77d18df
SHA15bec0aa8f2dcb39f98155de661d098862d255e3d
SHA256f17001bf40623dc1cfa9fe191d23a12087ba48f9bbfa1da3630f1f82e1fa7c06
SHA5120e109303d6b5fa67e89f9ee6e9db5008d55824c22c8b05d153be72f129f51493d175bc707368af551a9057984b24f5c72e32019750ab5f67c077b9309dde86e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526236bff7d0edf95d361bea09a705b3e
SHA1da1dfef292c256b979e37b8fe8debbc2541cdeec
SHA256f3dbc3bbfddcefe209e2bfc0b94b96b257ef81ba00785de2c0787d946f393db6
SHA512a27c8cf75fcc21ea8b3c2524b0aa152b0341f2dcb225d2f4b5c57ae00ca4d131be264a87be4195d45e4287a2fd1f0265755f605cd5215b0e53d2621e87f0fcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ab78bb8876c9703fc43454da77539cb
SHA1f227a2a534062ae7a5b6e81f0913e8e4f118f5ed
SHA256106478375f39c26fcf82f5ac75cb790d0c3f726d9dd437e416b6593fb10c3576
SHA512413255045248c37d8fde436d093ae7e52342e44a1674575ada0022588276f3c005ba29aaff8582c4070d7a80ee6ae9cd8d0393a2ad769617821b71ac15950d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775211ca492c9e07a7d21a23277f08b0
SHA19d02c755ba2d9204c9cf4ecd9e7ced77676e71d5
SHA256ccf15e3568bddb48c7a979335cd8f5b251cc5c2ce44b456883c567b0f4df59ef
SHA512961dc1875b5c81e3b66c343d2fa2cd86c51e41841af86684d3f1dbec1625987df53a3e17ed6e39f7c2c923eda5fab939cf568ad5eb8696b6747687ac67fce88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d0ba1bfb98d9c864cdad8d61c919e41
SHA11f5c08f7d2367cc8c863a41a9234ded828f0f090
SHA25613c4fadc5a9bbc7363b414c81f84d00d43e3379229b2e88a2504d65bdb8f437f
SHA512072d144e65785641c03f9672c877a571c068f623e432df184ea68ad238b18565c966cb936a046d060dc3abb1a3d495301bd622fb445fe3f6e017a04422efe738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571b0fcad1a045e17be00d80f8d4af277
SHA1a322ac6d1ae0438c3f2033e77f67da08d79c09d2
SHA256d937070b9012a8b502852139001c9b6c51a1cab99bc027c715bb8b2ca3135305
SHA5122bbf5e0d9c899b79ff793a723ddb49200c87732abe47da51fb1cc01b1edc10acfe7e3ac4c9e631c4e290f43f8feb0586058bd602cd2afa56737ef4ca3bd6e81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf89009228bb3452eddff7b8fa52cb0
SHA1fffd83fa1369230a3436d13a8a876b1ece3fe755
SHA256f7ed702d41462ee25d15a23843a0249f6ff1dd6a05148e39dbd7906851442b06
SHA5122af11a3b5cf6654148a8c7805ad2ca19ecb859e1d9b7883ff268a2470da01162e2881d13510c4980e1a4226c91f12032352fcef9b0f508f1232e17e6567dc418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54380f74b9db2041e5a315cce78def685
SHA13998c3fea20fa7b6aa3de45682f392dcbe37ecce
SHA256561a26a0b1ce2cca578853746e8b8ccb7b93b038625969efc0a54bc7e3dbc89b
SHA512fde26a473469f2055fe09233389ec5831a065808e8bd92f597359e5656c7f7fd2710fa15bfef47f1a56cf19da9a957ca4262b791ce17f7d17aba8857dd81cfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508a1fe264f5ed6f08134acc20780402e
SHA1bad8f29fb180bb9df66751d1baa91b1a2a1434b8
SHA2562ec956932d83865b27b8d42b1a8a33d39105414bc05125cd30a73186363cb48e
SHA512558d1a64089091237df0c747648f398e1452791beced2aa2e6b095a5f1ac0ea22eb9d545444decf50774b739ca0d42c40b98fa26198ebe5a04ab1c67024f8b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b550a950ef736b8864f2cce8e8f2ade6
SHA1770e20eb89c1e1efdbe4a6c4e908f5de0a2fab3a
SHA256d38d2e7ca65157b2713864d86dd04915d834d7922bb38c1e88898080dedda5d9
SHA512a04196cc8325567916c9db4236a910a3d8db20219a737b601505bc1769e3f03ee90188584d3fc23ec8460ea7a165afd182aa6109d5155abf3ceae2e8ed322b17
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a