Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
65cdd416843ac8eaf3337d04a5b62c0d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65cdd416843ac8eaf3337d04a5b62c0d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65cdd416843ac8eaf3337d04a5b62c0d_JaffaCakes118.html
-
Size
4KB
-
MD5
65cdd416843ac8eaf3337d04a5b62c0d
-
SHA1
4df1ff333879c4293a8a51fa828a2c5da90f1bfd
-
SHA256
e4b08959515b558c3fda23d52f176abbec9f55812e13f42a4e98f64f7882ea2c
-
SHA512
31ab2ef53634adfb1e45d13b36b20819a9da7e219adebdd9e7b55bcad63ee4d46d6e2912c091ef5149bcb0b96a74153fb37d8aa6d4a6fd76a06377bccf548d45
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oW13pd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDj
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906cd276f5abda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509206" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000098f264cf99953d41b1f4df6b167975120000000002000000000010660000000100002000000044d4ba7e1fc463c55fa77c1751e20a682d2522143535035ee46dafb1bf51f8a0000000000e80000000020000200000001e8687cbdc38218f565b3ffcd517bfe491ad69f4fcace97ed2ec85397a20aaa6200000009abb03f010ef403f7179fafc36b7973d068fa18b884164977906e28b73420ffc40000000e5875fa981b06e3112ca3a53944041d77eda29d9bf01098d3524e59cdd399441fe15c65a83e02bb355088d3e10350085770d8a5d520ebb30a17b624c6b656c27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000098f264cf99953d41b1f4df6b1679751200000000020000000000106600000001000020000000fb2af76633b47768cbe7128798ac3f2b13280e5860379aa9c83a9d9f21b44dd6000000000e800000000200002000000069aae13e009b3b02a6f0a8a635b9336e4dd95f5d76d88eabf17cb357a048a41090000000ac13fbfb5c0161b5a7b28e5ead83f27945fec9c01073bf14db1384dd9f640403a3414140d8ba36cbd20e49c1c66a3e8e64a5c1cf1f9f02e2252f47657225d54c9e18e6cba4839728a533acdb648cdedccecbbad998e781fc4e0a2947cd221204d43573f3f276055b78e300d2d64015db9c0746902f3c88f3c6c77eb3d1d1dedc2a8a01e3fec299364fa4ab797af8151e40000000c1186813238f8c4761517e1a7acb009e136958d6cddf1c4d68369b7f9e95c081d0b93f7ef71977d68c01cc81bb376542a4d36162db9528405841158d3dbe2dac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2352491-17E8-11EF-A339-D22A4FF6EED8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2488 iexplore.exe 2488 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2488 wrote to memory of 3000 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 3000 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 3000 2488 iexplore.exe IEXPLORE.EXE PID 2488 wrote to memory of 3000 2488 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65cdd416843ac8eaf3337d04a5b62c0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ec618ce2301f77351cb8d04deff15a0
SHA1b10d2baae6cf1e81fdbe6dda3dc6bcd709697034
SHA2564be364b4c2bf80f209843e6d90db1aeb1fcb080c7f69ca5fd077a42d221f68e3
SHA512d71f795f7b28a5daa580d83a628b2af968532167a2236d5553f71cc2998bc5f6ae182e35c285b0801f2063508e5269f54399c1c965fc4d1debd8f85eea1e27e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce8ecf95f31c401787629cb9c175ca7
SHA13670df74d1b7a4a9a171bf777f0befd80c5771ba
SHA256b1f12f771ab06214253710156e9335edf61b5cdec4d333ec5135211f0c37013e
SHA512fbee25b1f42dd33326cb6cb319c4c6c082bffa132658e9fa2aecd8fdcf2c8df6dee2dbbce07d28079f4d417e58a86d108fe0dad5b69fcfb53c04e0b0d95861d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590cab6f541f43472f102478064d56002
SHA1e24393ea4689d60df0d7201da5354a0ec8283d57
SHA256e46477e9c207df2837248d24733920f1020469ea06515903d86cfe2d93045605
SHA5128610c2e6dcc456c1fd34b4c7f152018ef1e56b7158eb01cbeb77ca7e4c32b9e6db564273272679b450312a156c1194a367617b4af6845f3a539f82b72c971277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9cfd29aee7e80dbad376f3fad59691
SHA1ee517f3e08954f06eb4c9a161b4812db8283bc7c
SHA256ef76e5813d1e3f201806253acecd7b63ea0264066d65f40875e42b7f1000115f
SHA512fac3a638740981b21c80fb2273b50d014cf6a7a71f1d699da05e97a310efde7f3880470287131cd096826bdcf7fd56ddd6a38119e0e8804ab57bb251a2cfe530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db8d8783310d3cf32fb98e8e28fb8a3
SHA17c31000084fef14b11f9294215949241ae3be2c5
SHA2562f4d4e5c46df16d5cc3192acb977aef5f73c57207c133bf43b23accb00761063
SHA5124f8e16fdf396d13f9852adcea247120521f52bbf6434714d20f28007318c15ed688621d8cc076b234e1f1ade22e81c821554f86f8a20222cda1bc23386e10ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590b5928b1b899b161cc654dda97b6aa8
SHA18c3924c264b009ab9d260a56111381249f93e30e
SHA256d750814a7d8556b45951a5035be91cf0dc9c7b4c441110343f789264437a7285
SHA51203234fa60b21021d66fdd26490d4a98f22d044f9bdbf95144cbcaf7b6660c6a0b85e3838711275d1e707a57671c39c02008a609efa7cbdca23d874aa9cd7330f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dcfcc62e6693d61a58336d2f9fcc38a
SHA1b5a3d5a1519abe8dbeb56097dc5a433122a32adc
SHA256aeaedbd88652988c44713e76920a6159417abb4e9312c23bde4955afdcbd6160
SHA5128701bbfc1abb213a5ac31b2d7117b232941d68abffe2abd07ec01b814a6aad7301fea4c4107c6a3606c86d877767361a53a1703a29724ce0c4feb35c62c28170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bbb062cd6415a3e5bb0eaa617f80459
SHA156f31ed3f03d95cf8c665d9e49a841d8d4d4c96b
SHA2566a24de257a17bb06916f4cc8da4ace1fcab3af5999f8ff184b4e5ebef9498a06
SHA512a6f3385f4710e09c30f774d29df051a71f2542902cdf1d253d00e00c6e669bcfff671a1676bb4d598e4e87a8d74d869d7c88af71e6cb04b61a2d73666f24e753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526bffa1a44f6d565659ea8c0068a3ca2
SHA1f64a8755b2e96676033313abe394fc8563bf46e5
SHA256885d7280b43d999c7e4472092caa7677cbfcb100bb527823ad5cc57bec1165e3
SHA512c3cabd40d3b01be59d654d684e3778794c3c3fec0009f96b635333cfe5846b10a57981f00ef623a19994fcaedcbfde80c46fd335a45c5790418e8e6b16165ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb15b16f0ba1e2727e94c74805653b3
SHA11965527044561f559e0ddedb154cd730c7995387
SHA25603bd1f4c817e465b1c2a94a941970534e6d542e626d69766a41c621b98715ac8
SHA512df743dda2bd43a39f049612fc90d9af076177dca3a9651423b38a380544b2d5e26b33c502e47428e9a11a701a18a4e7e0e83359396609358623d3d93bddb872e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b5b63929c8628d193a6f31d3e5faafe
SHA1db06356d6f6c83ecfb0fcfb738b20e942081087a
SHA256f9579c0e0b11f22b792f9c6cb90d2ae81aa91b3c7105982563ddec95f6bc20a4
SHA5128bcb8020d5b87478a51caa974d3cc1a655de3157601a4d088e246b3ddd9e11c5468cf404a67f1b093142ac29ce0f8bfd1a8bc765dd8c7bbad2034f05ef871810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0b31c501e4074566695d04f0338500
SHA13196ff7eec45fcabbb521f889876ee47ed95376b
SHA256ec989c41d75bee4db17121bc5ae4c5a084f726d4a936d3a0dfce065235a466d7
SHA51294b406b2b2e1ab5535f35e74b964a3252900e4acb5764153932bb00fa39626ea7eba435c62e552082cd0ed92df94cc7e571da67097f7235770b456ebaa5ec279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586fd4772128c26904355581884c20820
SHA1797d934f811ef3da867ebde1e4427a77553fd83e
SHA25674266f6787651fcb7db98b6eaf0f79a1a091593645e7482694cb2f29aa27b4a0
SHA512eb53a056f6661a63be2549fd3d93b5d70bf5b505ab1d0ec133bdaa74f613f467eb3e64a02086505caf6ff18f81a336535085c57b1db953011460ba5d1165a5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e38a21aba8941f8f41973d6ea7cf745
SHA1921af7f8390aff11052781657c0de139bd906ac0
SHA25666de449f5176f0deceb1400fc368ddbd82035b2bca9694cc754490f178e5a633
SHA5124fa2b9ac90c4209f41fc704a394dd00c8ecd3d4c16c4e64704400f1bc2cd7370433c8fd9138265fabcd027a9fd140b979ba82ceb575fd00a635ad298d71c1dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74e37adcf63f4a57b0e744989a09783
SHA16906e8abe9df728403beb6cb976d114d39854887
SHA2569372aa80c9ac0788f657a9f178863b50278d4d37061282efdedf1247f743fb5c
SHA51240a04a2cc423c8fd60b03249e401f6bf80a3ab333c4ce904a6586e05fd5a82a41fd89753b35ffd2457ee917aacd694b50e41202f9d53b11da13aed38612cd44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53795485274652f754d1441cef6f47822
SHA1b527cdd60e63b3d23960c40e2e970669e6d5ae60
SHA2566d953245584c807872bafaac830af5275948f519c6a1dc258ecea55e49e288d8
SHA512332fdf10dc51931fb56d65bde97c8a38d0d9fe5c9fdd1e66b4ecd82d6e8719a9ab984ce0be6dfa01a7d2253894c7390819b3afb11325f8d3f11d4ac2a4b026da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f4d5fb6725f2ff1c147b00de5ada2af
SHA130aa742719bcfd88da0adadf9ea5c710f0b1e516
SHA2562c8f28f0599f94621df0893b95d290a3e18c3867daa9e5d7af788a5b214d72b2
SHA5128fd225f84a6e6b729db8983040970f96aa43881bea6f955f7d802637375c393f9f672e904ae95f5840686aef3b2565a6d07527d04c3e2c18dbb2c50819104142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f37bb8ea840034b8a36d7c45e8c7a72
SHA126f19f5886bc71a3091f1eac77003eb5f24b2b7d
SHA256d21b4a44d12138415348204d01e2795b7119cd8bba86fb938c7e52e3f5ea8502
SHA51266ed51890f5e275abf249880b6b85db3112e5d604af714cb6133662f6dde646cf97dd77ae4dedd843bdb95b018c69b0a52d517884dd5d1e96c75a6978305ac13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc4f2b5ac4a95d17f46513c5541d0d44
SHA13fd0330b936b8a642ae267ccb71058b32cfa364c
SHA2568f4ce6f1023d2cb0fc9f96479024c4ea159ac329caa571c3b9c3cb0b4e08843b
SHA512b3bd67da87403e18aa4e5518bf8c6955616df2b80d8c21dcfe73097bdc4ad882cfbfe069118091b6c54fd829bab11f5aff9511d5830d3d911da955bf581f877b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a