Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
3f4bff70582a844cff8f81eef22d5029_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f4bff70582a844cff8f81eef22d5029_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f4bff70582a844cff8f81eef22d5029_JaffaCakes118.html
-
Size
117KB
-
MD5
3f4bff70582a844cff8f81eef22d5029
-
SHA1
1a24111cc9f928cc56ed6cbaa3b7348ba98738ea
-
SHA256
5f51955460011db872d09c261616e85dbc24162b1fea6ff4e5128122f2d56579
-
SHA512
4f076df44ed3bc4524af310bc013d1b8c2e3c618645dbfe3d760fa4734c602b7b53401003c72c89093283612f682231aa32cf61ad97aca57acfe51ecdeb5d5f7
-
SSDEEP
1536:S3KSyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:SxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{435F75A1-111D-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b148a8a4609881b253e50b750211a8d175553925d0a8649fafef3d004ccbf457000000000e800000000200002000000016020f62cdc144c4095fd863df29e10f0899489e8c35e7363df659cb2b946b9620000000a3731684ba7ac781a6399a48b71b4d0b8b76805f058ab12385f43d8c6698f10240000000163cec78a53544cef56c446ce6abf117ba17af7d225e9a8826c414d756719400e3a3d7d0294ea24d8ffd537458d727b22da182e095c299eb83c340e03096e35c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900268182aa5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421762153" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003da9585c872ac3cbea5ce9eb56cad30128627f2271a1d43d23adf9d7a71c4e0b000000000e8000000002000020000000a4191ce41ee3d728fdeb908398d156de27d1609aa63be8473fc99bf34599a996900000007fefc52ce66e8556e60a38a3c0e0cf298dc58c5c78301e5506c68c836d7d45a0dd53205b1fdb89dca48f47e7632bfe8aef711742cc3e606a9a35870f4a87da3dcbe16f4c3369ab6cdad874e9b5db43a9abc85aeeb7bef7c41b0849d7b13d91c49b3c88516ab82a191cdf67b02ee435c83332b83b8d24c21c546d76cbe379b15c9284b44e7c7332ffb43d28725c73bfd44000000032f3b76bd80f86c001adb53646ec0d4cc5f76465fe1107707dcfdcc3fc170c615f993f4e60199582018e39534cb39a857acd62d10392a7bc697ff44d5e8c0229 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2540 1812 iexplore.exe 28 PID 1812 wrote to memory of 2540 1812 iexplore.exe 28 PID 1812 wrote to memory of 2540 1812 iexplore.exe 28 PID 1812 wrote to memory of 2540 1812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f4bff70582a844cff8f81eef22d5029_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e3230643c7f7ac0b4c79c34e855183
SHA1b22da4aa724223d2b3c46fdb18802159ef005b03
SHA256a38e1f7f4abef48b7fd6d7c0b226c16f3c9098ed737027429e7e870aaecfe8c0
SHA5120b497084a2c34e1ec944ea08fba85e1524f806992427f53d3524718f49cbb1c9c6f87afeecc4bda3db55bf0241c91512d5c163ab761d45dce4b48794c6580eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d4489eb2852d9866fe70970658cc4e9
SHA1a680661b6086594a927d81a62309b3a623ab13c0
SHA256c96a4b8559147dce4d8a9c56c2123b95a8473a7dcf6533300f0e50375d34a343
SHA512ae71292f73815a9d0f319b502182d634f9e1b5aa1c72a07b04d8697aa3a9405b34d1c3919f4e7312f7e2cbc06fe72bb8fb40b19dff40f5ed813a9dcd68633b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59176060bb5acdb196acdc4aceb206573
SHA13878256663b7d348ffa7d8469aeff3948c3031eb
SHA25663530941add1ca69ff53a3034eaef56bca279923723db981d6732597c231f760
SHA512f513545a90a006c97e16af86dacb365aac622d992fedc67c205e33f2194937fbe10a4bb7dee591a92c652a9a790a544480823d473a860a5ae4b68debeabcdfb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a7acebca43070a2125e921f62005efd
SHA163dc905536c4415af54b61d33096839e0ee6d78a
SHA25644041e56458345daaf3acc5cd5e568ef86e2556f132611293ba1b12760d27753
SHA512c133535ad7fc9c294dfa7bacf7b910f93ba0efc8e046a1c9583a8f16b57be803d0861fcc7fcf6de775ce435f9a21c0402086e88e37e194eeced4a271628b8115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c62671d91bb44f64f68bc6f0e94acfe9
SHA161e30826ce2d8c20e44f2fde00169b37c17afccc
SHA256171520511bb58cf04a1eb4ab64862f9008bae380108ee42aa8f5805ebf42cf0f
SHA512e6dd98b69d44e599942bec16c89de83283bca6652de200515941909469e04c001ede1da91bb49dcfb68f715abbc5cfe944d14fe42b5826a36a2a408d8700144e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9d5519ddf8291295ed6afb7283c8d0f
SHA1678fbb1b1510dd13bb072664dc3cae20446cd08e
SHA256ec3283712e77c10b1384e3c85163ea06f41f03f879eef91acfe8dec3f9406232
SHA512ad933ea4b88e1e09daf8b0613e45aac78b132f3a50c1391c597de6d451cc460c8535f0df87eb4b7b13b8e1c0c765e6772df8cc7f385f9c11670b380115805585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bba53a59e8a7533847733ed14428c19
SHA139be2b3bf92c5f235d21ae9a69c1ac452a9c6a55
SHA256208424d7f637a3376639a6f6881a751db9d48e8f84b46cb6a7b0793b1569cfd3
SHA512727a7e1b46ed4a823b1743a5ea7b656b17141f8c23b485a72c1a8447c40ffa64a058d8efa7b0c5ae4dbe50d020db1a42b43a447aafd29565aa07c4d2779dbd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c62b639942a801dcc448f3f77d9a86f0
SHA103b7556299f184a0fa5c0731eed2498d4954e1d4
SHA256da733b8a4101974426995b5c768193ec2b534bb375d356643d34d6ea2318794a
SHA51226a7c405cb5148797e3c6535e7f4d01535f3942c4a65239ea320098baa41e51bde89542a74bdaf5917ac69bc4f363230956b783835ca0832dbae7685e5f87e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a53e9227c791ab6478d0924519e2aeb6
SHA15a3b129c7cb220a1ba49eebcfba846adc8c7bc7b
SHA256c1a6efc58d39fa5dbce0bd17bb13beb600d1b13b97a6271b8436571b32f5d0db
SHA512a5c47cf9057afebb5f00529d0d7cbe9c4ece4b51fc6ffee027c5c1af8eeb66b5ccfe7776687b82398f3ef8ee0507e360fd835741acfe566f67cf2715526a2743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014adeb003a50c516b510c129d3cc5bc
SHA1fe959d4b9059d58b58c7432882c0cf06de0d3abc
SHA2564262ad08fbe21fde7ef0986a8de8a368fc6d2c2f296738aaac97a03d76703404
SHA512c123059d4d225cb819b3f9994dbb87ab72c7356c910a61c8383d8072d01d25ec4e0efc875f2fe8b9549368986520c229eaeafa16c1a8e85993a5129c7519e837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c2d6a7f7588f0fcdeb60b5d4c1a96b9
SHA1bea02121ab09ac470f3cab2507b7f147deaf1bbc
SHA256f868ac5ff30382707e2b10e029f221bf474a1e573e9dd3cf8e01e52e89845747
SHA5126156d0d559aaacdd67c4be1f74075b90b19c2bdb48c3339110efc8ed6b14eaacf0af15f5515ce71fbea690636169df4bc400b95041dbadf924da612e7f7f0e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5310bba0140bdedf094c58541ffb2477d
SHA196b47283cf02101608af592483f8d4a308143dcb
SHA256f31658109cbd453a7ef2cf3c972fa0179ab14f9153590c814601cb63674447ca
SHA512cd1cc16be468e8d73dddba1ea66dfdebeb4b6105e5b66dcb2123b60c83d0b267da3929d0df62a1a656f67dc40d33bf75398984d5413de91c99ab5042ca58e916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffc2f98469c52163fad65e9dbaa7fcd
SHA118951a2d310971d076d810656d586eae37807635
SHA256bcd802d02aacf3fdb98180a21f80bd335a53fe5b7e14ec6b3e7ebfb96f46b307
SHA512c5ce5e94051ebe77fa0becbb3d3e0c9f11398996583350a8b8aea9f6aedd0a5a4a06307c2c46e911c009bdbcf633c98c135fb5440d573f126330adef07c1f2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53c65b2f3ec3ed9d40d97c4ceb7e74e
SHA1b8df69838858913cd5a2d7bf808146482cef2f68
SHA2561f5807cbc7d81189930c473a70795f51b7b3854a0b8da122800c670e0481df2c
SHA5122cbc4441656a04d7d42a372160686ce3db4f3e650b1252c85640420ab4ca030b1ffb87017d7b1bb4aac5121d59056fe89c9760bfa254fa73d0d1d2701a433f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502fda6486e1c63f6b270da3b8a8d4d2e
SHA110f54bd6652d0a1d8b36ac0078acac6ce83fc619
SHA2567b992192877086df479155f7d8b4d9e66b8d4e6356348bc0eacc1dcf9b6b5fe3
SHA512b98f5435ce6320edb4faf345d257f7ae5b88372f3499818102aee429c1f933dd316f0cdbedf1a1119c4acf74a5410010cf6aaa01814d12bde17e030ff007ddc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ceea6a5538390a1f8d512bb5823d721
SHA1466f32734570b7d7822b7cd64ed92c43b8fe115b
SHA25641f3effa4ef5a0cb2ab9208d37cdc60178e1f5cf5da09146e651f1dc2d2c3882
SHA5123a588e855e2a2a17f089e075e518828f4375f07ed3b6549962081e65b4f958362c680f53cba49dfc75a0aef8c8d127a42f2d0cbe55456371250a8f97d3e008a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed3f16c108946142807e85aaa782668
SHA192fa43cb13a9fdb9ae32f7cc31bd4a635e6eac93
SHA25643f1c388c2aafe95ce4d05399a91f8596f7e014f1e815efa33608701b0b0704b
SHA51242479988d2261ee821bcac8ae797ad6e2e49b9916a6cc432167850cc3a8c2d01948a618090f1aabe7dc8a1288741cfa3fdc97a8184e6fc079566c79d3d997eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50247604670f4dcbc5beb9cb2e4ec3f1e
SHA1f85f7aa528ac22867910a3321b2b5b26dabe60e7
SHA2562df59d12eb9db047387bb990bb85c1181d9e590b5d8d9fd77c03b54f59e7ce64
SHA512dbd052d65d132b7f4c73471b15c05394f108bdf1ba1766691b281aa4d8c300326266591b86c290c585c385d2edffa13afe23fb14518a093831e484709df70583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d70c82d8d2ac03a4e70ed20b1609156
SHA1f170da81597edbb9c8439d426d5a5a57f51ef294
SHA2568ad85926091337e7c7214fc44d1c3e1eac8ed4fd93c59a943e454bb0490c51ee
SHA51250a5a9cd77bf8808505755108f8bff24f188570a03b4b2e59d36162628a4c7eaa5baa6e7daf377d281716c3b5b9743dfc7cb96cc35af828e38bc95933b09014c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a