Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
78c62f39edd908b70d22eb874027437a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
78c62f39edd908b70d22eb874027437a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78c62f39edd908b70d22eb874027437a_JaffaCakes118.html
-
Size
70KB
-
MD5
78c62f39edd908b70d22eb874027437a
-
SHA1
1bdb7ecdb6379e6b1323f5fd02858bc19403acf4
-
SHA256
5aa7811c3d203e31237788a1a57a14b7abc8a17be34507865416bfef7d0a7d8a
-
SHA512
47f875ae9d35aa26a284efdb7e95702413442f9aa89a1455b219379b637b37e506a58ff9258c7f51fc7eefef1b423b474480bc6531e44643e5482af0626d2b64
-
SSDEEP
768:JihgcMWR3sI2PDDnd0g6HITDpE0u0m0bnjoT2e1wCZkoTyMdtbBnfBgN8/lboiG1:JNz/qnra8TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422965961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000058d21d39ead54d4da430f7c659ac41b300000000020000000000106600000001000020000000cce2dde1438fc49fbd8a86f60bdc7fdb78de9917f06c502301c2d708b82c7d11000000000e8000000002000020000000f2c153a396e4f85bbf0a2a7b846afe3a94b53e50fa1e5833d6b83cafa4607e7920000000a968b30549ae1aa3737d39f5dc46808c58d68e9219cd3e45adb35be957adc2f6400000002207ea1b9354692fef48f1f84bb5f000c778710f528a34ed319f3765ce42f6db58649c3e3fbb9eae7edd8a577a141e4d0bb2c2a2ab3d4cb3fad8e9eaeba4d2d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000058d21d39ead54d4da430f7c659ac41b300000000020000000000106600000001000020000000ac3ed2ccca0432cf615ae6d3133468be7bc21932236ece793703106078406417000000000e80000000020000200000008e2ebc60b90f9bc3da70ce0b905df24d9b2bf30db4616a961e653e14c5a11d3f90000000e796133a872c6be21873a986a451939091ffd47192ad8db02ff82fbbc083e5945c6ef2a53d4caffe2bfb04e66363bfe62463240410ab1d6038b76b9b41227908a719a8e12cfa7d8cf91547a7615fdc723c544fa992cbbd30d97ebbacf36cf8a3d7a31f63c71a4659337c51f11b4f40774b795705515a5c9566cfcd0894a409ac1941353e4b07122441290eb92043b78c40000000ed3dfc7502455911b12b3581a01f284619ccc57b4af49781fc67ca9f444d400aa63fde4710cf84c6d49fea789f028b593f0a10ccb97ba6a6e553455afa35cf65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f925ee1cb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19629BD1-1C10-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2620 iexplore.exe 2620 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2248 2620 iexplore.exe 28 PID 2620 wrote to memory of 2248 2620 iexplore.exe 28 PID 2620 wrote to memory of 2248 2620 iexplore.exe 28 PID 2620 wrote to memory of 2248 2620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78c62f39edd908b70d22eb874027437a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554eaeeb9458c4e925ee653002807d521
SHA18ff6e28d108f1ce291cc795da89387db28e49611
SHA256e31f1a123a0e802fa37fcff5e86aa466cace04d83421c427482b626933b2d225
SHA512dcc1ee76ead7f53a2bc6e5e285427a7c2e8cdb7a7a08e2909f9a68b8eaa4888d7cf69b0ce6b52937498e93c84aea0f795ba0226d0d24f04b3d44ec497e636519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556f5d4acb6291bc99e2c7fae03947f5d
SHA149c0d6c0c831477f2f4abcc378873f471483287f
SHA256802176c46e2348aa1d93c94f088e7921d188bdd2cee3db4fe2d6fa99d40f9549
SHA512af21245b54c99f05eb82e941322979967cfedc14ae07265c0e23eb9f9360715ff3c905c4fcacc907ea7e67ef27aca09b96932bd9e29629992ecb8e86eba8fa6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55941701c1b6acea76f1bb75062a03ab9
SHA1619c60178d684bfafa1b1eabbe715bd9a874ccdb
SHA256bf0d29b78c25e6d654e97af706fc9606a8c69b09d63392ce9efef2f0153da620
SHA512953e314a590f4db54e4704027854fa6aa1cde32cdb070fe9a62eb749e1f63120a0e4fbf1698c63220c08b1d0b8bb5002223ad7d7f7651a5ba3cae3d41d57c9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9fac6fdf869595452feee18c2bd9a0
SHA1c81cd5e61dfa5f47d57a5497e04ee7d04324bfaf
SHA256ba15aecfac0f2cba07214abc57a6caec55a97006e42cf62fd8bf2725f30143a1
SHA51204a1c104b196a4d1ea3e689ca4d3d37f951a1658597fec4f7ac538e681d012b858d7c345caba3651841e7bfc158c8fc713180afb7e1cd8af9d7a7798646b3384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e66aedc7642f9f6745968a88ef3ec83f
SHA19d573c5fb487081bb99d200dc7486c061ecd7ec0
SHA256855342efe490100e71105b56056ab760107a135048e43e888dbad8fd66076cbc
SHA5121a8514fe9e6ef1d0c5a575a7559b739191799652cf43426d2302b1d16026150df843442e0c44bb7b64e74fedf8d0059f37e7187838a9f690b215f158bee4e9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f75fd603fd2175fac39dbe218c777c0
SHA1eca49946509be382c54066131eeea6d026a6ed5a
SHA2568ecacf9aeeb949b319523db12158bd3628f5c099986a6a299a05b30fc89088b0
SHA51279c20835db0a80dfeb1f82f441996f18e0fd23b87b9d2e5a9826dddf049b40d12f0184a9d4afe24dac4466efaf516b31feb0dd12ef7ae5b991c6f9a7ed082a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7835a2b89383e9b59901d263d2b9753
SHA1732266f3e7dc719d2dcf874448ecabbd3ff229d9
SHA2563ba720c4e58f11236b63f79e4329501f9b9688a846e5857e08a0401d2c51d2c9
SHA5123446fb8e8a6dbeff66abd6ec1dba78a381b026b9fb7401f43d2b51313df608be8da87f49f2d4030a24a17da0f6b56ece53a74a9025daeb562c8b1b12c68ee962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58364d8adf1677158e1e011073234d1cf
SHA15c01ce575112367b23553b2ffc66414d7a4bfda5
SHA25632531d3ad3df49bc325d062c1f9db657155f17e31f0cb7f9793e85851f59aa8d
SHA5124e395a37f4fac3de82b9eeb761f5e30f1b0b7fbeb3a9fc6433dad418359827180fe07a5ae30916b98c52bc45b7c43aee8fb7da9c454c90981b05498ca384d56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512cc25983388ab5b1ad7ca88a2867067
SHA1de83b5f78018b06cd25afb404070fd5cd0b8dddd
SHA2561a554435470627fc32ae9bfec2889437cf7c0db497ca8702b3a9aa0c347a4a53
SHA51291aafa5c13ca77959e10423f071f5b4c34bdbf188d6993efe49b15d20ddb84782904cf1c7daf02e2db0b21745e323b2e004e320629e970a3492deb937ac5f8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f75a78bb9e6ee3c0fe9a25eea90285
SHA159f6702e5b2a1fc37933ab74532a7d3ddae1d116
SHA256678dd4e6b3ff59fc8fc284d0255ec5fc61c60b05f7ae164c3bee5daf4bcfe248
SHA51281067fa6eefb02e4eb0957550c40e3cb2724902be425a0f925b6d050ec678060aa68f658a15dda3ceb845afd4dfb79554dd26ac1ab33743f2df8a9a976676c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19088185c2a1c419daaed5c36f2a3b1
SHA16385bdc73e72a9b5865342c3c4e173e42900129d
SHA256de7a08ed1fd44031c9642ceec71f8c01eb6385dac23a9f3572d366309b14417c
SHA512c6678a3b010f60ff061c048c19da14034273bd93d91e2bc4d85764cbacf0b937ac33a4581ca41e7972ae7412925b37ca3205c9f3d9acf31a34b1b80ee6137ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d73e26aea9e413c10f3671e20f90687
SHA128583c1b9737176e0460c3b1768ff7c11a4b8525
SHA2567dad13b9e9f7c8933808569e700effe48c9d0ce8fa8726ee9c9fc259cf162fd1
SHA512fdc9886d37b075ddb3a3dba0336a56bc3859684d3aab0a8fa95777983e6be3e03738faee75be5d504767d501df30f9af721b36d83d1e94a045907f9d2cd1bac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe9f1e9d3875efd2bf6d45ab11dfb2f6
SHA1c432190468c9c11a147e83e9b8b7c3768ebb981d
SHA25686a14db91fa3902abdbcd37f5f38bce1203c66f64f4efb31132d76fd43c31385
SHA5123821885e333c7651036c1d765501fbd431de2fd2f2a559af053ae950221757856da1143f3e081326a4ff5567aa05f588f3c10d9e9f8d8f600fbed4a08755a60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee1a7e836682bc8285256fbf041828dc
SHA19d9918498b018ac75faaf372c9d569b1f6d08222
SHA2564f1e1fbbb29de8009d097cd95e9cf72b723670d11346203fac389548d6d02b36
SHA5127baa16c6d8925f94904bfada7ed0b0427ef1bcdc6eaa69b1f0b8c43acbe52a15f58a25ac3d2e4378b8f1c99e728e0a2769c8484c78bf5533af98018292d7850d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb7611faa195c0e3fa75e6ce2b46749
SHA1f5b5e9db716a81605c791ae9139c0ce2ea975b32
SHA256d982fd41abfb36683380eaffa4d2b0c98f6b9fca1d951c75f8d87dffcbe2eae3
SHA512b49f53484fe8e5ffe4dac5cd8f599dad8c39d26602b4b5a2c293a5f96dba69d40fc05192ded4fbf2536631ea410e57677f4e43089e9d1dbb1d5fd4cde181d968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f919b64e3fd07aef9836c7862d0a194
SHA19ec03f84acb8f02e2241d12b47d2b3688414ce8e
SHA256cc8ecf12060db77545e0807007b937257f771d69be442d5f2e13523be6aa5125
SHA512106d8a2fb6300238ba54386daedd6bdf9b2ff501a9dff83facc73bb79bc78d1b2116aeca7ca72a57f704ef12ee723f67d8e86eb1547350bae19ecfcf5e428ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54903047ab9b957a713f6efc655d7a687
SHA18682b40bb7ab2df48448457075c956818280d982
SHA25674ee5578c6de755c49229eb1ecad5c3d9418474246c7d5c0b91ddc98adac107d
SHA5124d1aa8873be99c40b44475beed5050679b7683d0bc376d2e24880e560a7918c7288c0ae83e6c87de882e43965e3e29df986d642ac34b5657f45b5cb273a0da82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e38e848032d2adb13fd61174ce206604
SHA1bb73d4f5ce9b5f2580fb53a7b8a492225e433009
SHA256d01aca5bfd37c778abf2bfa8deea9564754c4b270c22415b504815c11aa015df
SHA51222ee8863d63356188e2303d0cd105b031b75c220fa597f6a7c21a52a344c119c5715d0861f709caaadf54a2df2325ab77e4221c52776fa9c70aaf2df79076023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10824adb6cb813ed5a45fcf13078916
SHA1da0cb1f0d7febfdb30163ae87d9d4c2e64eb84cf
SHA256852b2938058941d3e05c6533ffa43755048ec4888b553b57d14a05ea22e0cb3c
SHA5124d5be0276c0a3fb1b5f0eb6b44103b9cd6b039a5608cd4da4596a134d1d70a707e956a3ad070aa7109e13ef54917ce25adbb047ea03f4043c3b883267f1d4777
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a