Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
0d462e057383ed7d0a02af7fa9543451_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d462e057383ed7d0a02af7fa9543451_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d462e057383ed7d0a02af7fa9543451_JaffaCakes118.html
-
Size
461KB
-
MD5
0d462e057383ed7d0a02af7fa9543451
-
SHA1
dd7f61f34cbf580ec6d537c497c0d77337ea10ad
-
SHA256
ecd2923f4ef63803bed516f4abbcea37cad58176b1d4a0d05c7037ea57f12258
-
SHA512
f927a786555969f7957b8943b558bb88b8c2ceb273fcdea019248a39c68577d7a5c51b668edb3812c9b7b5920388915909cc788c3d9641cb88500706e5407f06
-
SSDEEP
6144:SKsMYod+X3oI+YaqsMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3J5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420779863" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31709BA1-082E-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0063f3093b9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000fc020317a663c3cf2e9a71610bcbfd51ed3fab03dc61f70f739cddbc10bfed6000000000e80000000020000200000004761a0fe523d04cfb353462fb41509347e415a1bdac1b43b5e8242f5be603de82000000020aec231290372e0467ed18ce6dca63b73e0d6e36c654bd5de47348b9dfd51a74000000037edd832384aebf4f0696c24e6ca6755c04137af9bff53b840a4222606f12fe4f42f2a5c5391d621e493cd0753fc70e6be185a39ca211f5cc4b5b545b90fa787 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000668491a38b48e102be5490489842801e3ec427928ae889abc6e7fc45efbb2d40000000000e8000000002000020000000f16c8c8be6cf1d4632277d8b02f4344ee1455ff7e7430a1c2753173e3c459f809000000091d8180c069be0d997eb6e646544126094940dc05f950366474ef57eabb02070e6dcf067e0e56e6ce8defa055c947fa347e22f782e9380e221ad4236739fd2c3b2473f356e562ff532acd2b83c1ad12e490bcfc0b5d22430f28362385fcdef6dea830c8da63b07861ded54ec77f63ec82aad893d0d902655f3c3adc83b3f807826061b75d37508430b44e3af09d0ce29400000004127ca6641e9186842b4fa8d233b899cdbeaf91b853489d858a424e8090c6b53160e4c36f2508fc7ce6452ca4ad765e392096f3c656330eda1db342c6f57942b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2756 1244 iexplore.exe 28 PID 1244 wrote to memory of 2756 1244 iexplore.exe 28 PID 1244 wrote to memory of 2756 1244 iexplore.exe 28 PID 1244 wrote to memory of 2756 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d462e057383ed7d0a02af7fa9543451_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3010243aba42a54a200e087fb3d851
SHA1399036a609b4938d26d0c4e0abac947a3b896823
SHA256f6e7189ae0ed38575b1df36a02a495405acd6a9521870195c931cb35d0fe64b7
SHA51213cbd555279cbdbb22765bf1f2c15ba3815d67c1618ac40d285088e0ea549fdfc10a8f0cc5f85585f54391fd2ee8055d796c8de1382fab69c9233bae62355ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc263acdd4c75a0d09cda1cd81c0a8f
SHA1bbfda466a98d1d0178c4fa68849bf6753185e5dc
SHA256ae374b2ed2cb8b041ecb9155464aa3268d6678e946bf16523d5ad631d66ed52a
SHA5121747b6dde1c2e2e1f45f48018f53e5356ebf391ad005eba710c55fef123263b9039e043fb70e33217ba9c30a9c88d66a0f9bf690701bb57052ec32abbc6e47b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7b97131bfcbcda232aa6b41fb76213
SHA13ad502e022d606f0df36ed5267488992930340fd
SHA256cd7da25c64a49eaa37ca4851750751f3577cc1d6340b6b8f7ce5fdb053c0eef8
SHA5121c89aef6d33aaa7c7416178a86d5dc50b64ecb33c876d5871d22559330d4df15b75bdd8254c6b40a53a46a4129b50e0798da2526a73387237553bf19bbf6bb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55beb5b0ce8dffd4b93cd3668a3263415
SHA1c0a7fc634d362b83502825b6ebda942cd549f538
SHA2567550c490ee3c892ec3aa9658317e2e2868036a09972cfd707f34ef7096f61e4e
SHA5120c75ad942589b3b22b94f6490aea7746c989696a1a0dd6eb2388cefda9acca172117a5adf2573bd2b3b3e95473fa60df921e6b395daea54c711b0deb190040ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56552e08f5fc95e94fee2df1d14d66fbb
SHA1b73e89c107c8fc6a2e723a7858a0affbef98cbdb
SHA25644a045a05052d79a9330e415ed21a120b7360730c42a4d401314d57558175192
SHA5123a9309a679cfb4fb02ae3bbcff957b16439d9b618fbf02d9b65ceeb72eb6ceda8e2433bab9a16b158c85050b9aee78fe88407dc7d483febb3be406bdf3e491c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f44daec7c17bd9f3bf36e107c2dce2f
SHA1d9258bf8e58a3845d049ac080a646803b9e0a420
SHA2564cf8f480680aedd03c7cfe5fbadeb9bf0078b565fa6292355e9f4478e28b31e8
SHA5122e2129ffc1e99ecebff2845caf0380010637a17925aecb6cbb29f6514aefa61bc4c450b4961fd2504824bc60b7c3050b421ebc0959bf15464b9afe0756efb496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5409d6387ce0553e0c757b597d692985f
SHA17d1dc5a3b02fee59afc227c4ee6aca12bf790b89
SHA256f8d168a045b5edef876bad7f4339d24a7390c7b4049b1d4715a551fb43d2cf98
SHA5127a1d5bb23c0336b9ab0108b42b7644a57aae56c92781a426b42f733e33eaf0a5740cb9a333aaf5d9b02ad5ae2ee0d72b2259a8d8c4274b4c4c7d5171da194cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594400d226857026dae8edae61f7f72bd
SHA11b1a77e97c7d9bbcd647dcad553eb8d069a29334
SHA2565f583aa9f488146b651757819810f9af16344dd4f3f886dcccc83aa2e1914187
SHA51210ca3989a3b027f5616728840dc3ac2e5ca84c5916fbdd0e7efc567ccb87f894f8a5cd2f5a928510ca54c4f41c4ce811675d1c50b2950af6ede502f258f8ce27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51853aba7eb73d33e0294219251904584
SHA1c1957de3a38367016dfb2630412c72f19078d2e9
SHA256df1ea13c0bcd322541705fc1e8f335bf0562d881f3079494af9fed1a1f889b78
SHA512521909da77f9e8e782d74908e7803d32bfa9f82eb8316e2e39e229725268f6a2dff5afd6e2cf1283bd302ffea9ec7cfb652f865611ec7b45fdf4c4054fd393f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5279603dcb65dac2c0638fd8d5df2d919
SHA1d6f4225bf73252f74ac1295ae8c3401bfa7a1821
SHA25677c592f86abce87ff87be769dc081fc7cc507b4b2159df9b1a562296d1a1245b
SHA5120eb4bd6ebf938a2532918e64cc51babd09d957a64b060f8dc0b5cebbacdda19d43b51705a5ce51d2ca0bfcc6d522ac507f2d51d4435f61a8293606b19c850ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512d0f8ec9a3c79602778dc5608a76ba4
SHA159cad10a042179d25e34c1327d40290259410477
SHA256b70875d4eea9bd1223636c2a9701056eee850d42dd47c202d4ea13fda280319a
SHA512f253e8f1691e8fbb8888803f368ab194934dc862e5bee60d2679753d2d4479c81053f1efea6d3cb4a7500684a8bfcb8e1232c3632d0d7500efe864e04b89313e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b8e5b7e5440987a9c0e8f02be1114f9
SHA1256cf8ca5c5bfec0e8b58b2ab76496a47541eab5
SHA25613f3ee60abdcfa65e57a6902231af6214226402e6ac041ebb2564dd1ed6a9efa
SHA512b71363ba7596f809c9bede88961ea007c58fd87a421371d4c6b756e212285f03d726c546694ce374a8a371ef94139d92b51aa4e8cd1871158e14c79c61115c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116e2c5cfe3aa36be2ab9868ef358410
SHA19c3b743789909c1d8afbc457c0e88f71549a8e12
SHA256cdebf63cc8fa2a2b9e1febfd8285492a1f4acff1ff0ca0b21183a23474e4092d
SHA5125166194ef995e5be43304369bc4f92a49ffae1a1ae4ce59774c17daad5d593b61fed840c9a8203eeb580dc141b837f1396f72d961311489796dabdcfcf0f765c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d8142f1059292e46fe0337c5e5872a
SHA143832d36a525f02a427c85cad9e1d23dfab7a067
SHA25608b596fc9e984e8aad74b45547274cb5091cdec42c90bdee84bf6cf3ffe8175f
SHA51214cadcd72dd314d6cb90274009585c1522528f4ebca1fa9dae1366a5591f676fd6214ef314afe9c266d5608d95de965f22f5545cd1808db4f49069850cd51c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0bad05602acd6e74ffeaf7fd3b33e7c
SHA1671de8b51e0db636f883755a88e3c263b44fe66a
SHA256e75b9e8dd044ab36c6c7f7b7c67b0ab94ee5c100e43a2c15e51254417a729838
SHA512897325fb3e1207759692ad990cb4257905f83e1d1f5c1d096c3fb8c27716c27920c490dba240131287dce36da9d9c965f46b78f4bb20bb6e24b33d4de2c308ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc97f7c41d1e4ebdc8c2ab6db8b3ced
SHA150e746f50b3b0149f5646f693eec9c03e33da40c
SHA256054be0f3852010343d5e6949b14dd71fcf055733e505ecb90c01ad34e25a67fa
SHA51223853e4b5763a14f38f38e08b8d6df4918c4564cd86ef9af216691dc7f7e21dc8bae88f1a3b576d6761e3eaf9de44bab2f5fd926794fe62d41e5eb7080105d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d92b28d156e43cdd6834e7296365d1
SHA1ae5c493d5927ca2c6f34daf68ae3d2c116b67fce
SHA256c5b884662ebf2227eaa2407d6e60cb6cb2612a21e0506a0eccfbc2e2164a66d5
SHA512f4124a0b64334a14a13843b1a4994369a27673938181ec1fe5aa716b7e4921f83fc83b98db68ea5ad7b456b89cb314363274f08272bcb1c4645911c1439bd887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52343dce900419fc9c8ec6f4531ab264c
SHA1b78030ffcf8981f1c72c8e73e4e1c6785c756cb0
SHA256e2d87e0c2f29b2d2f19ec7971158aaaefb452592a761e87896105787b0e543ea
SHA512b95bdb284e4c0cc166af773ceab0923efbf2914a724c6a5583b3f5594b58a0f3552c5c763f1d6f2ed17c54783cdba378f357ac30f7dc0c9e1137ad79f0acbd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3aef8c7fdf514b9272668ba0be034f2
SHA19aa44e9910e1edf35ef44b1424ceb6902d4897aa
SHA2567530280835b65a33c01ef925301ac3192d3bc41e1dd7b6054682f04373a4b620
SHA5127dbd4a4479bece9859ee1547d950fea1f347138debafe0aa33535c4eb46ced43b7cfcab14b0f6af0f0b582e0d53b72ab6aa457ae4b404a742225a4154189bda8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a