Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
06dff65175ed049895fbe12d3d6986b4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06dff65175ed049895fbe12d3d6986b4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06dff65175ed049895fbe12d3d6986b4_JaffaCakes118.html
-
Size
6KB
-
MD5
06dff65175ed049895fbe12d3d6986b4
-
SHA1
03b969eeddf9065ec8bef19af39adf756633295b
-
SHA256
37ad647e58c3884ba4484f4ac91703c73a85f34f05405c0b5a8bf6458ecca568
-
SHA512
3e349e0ecafa736b294d5095fb7716ac8ed2666408faa17a57ef2f6a9977b3be484aa726254283d9f0024c67a191a9dc85e05367d79b8927b3b6b1006e8d001f
-
SSDEEP
96:rhM3sHfp+mP7zV7gFVMOihHGPWhWJIYx7:rhM32Z7ZkiOQGPWoh
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA614261-05E5-11EF-9034-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000002ee33c9faf9bc90c80165b272580183ba8670ab4c436881726fae302f5612a73000000000e80000000020000200000008aa4a5d77c6c20a6a8771df9d3b476cf811a84941591848c60200084e837db9d20000000edf0104f9c9abaf80f00ef565ef0d7d1da3e0fc474e8db3e8256094a58bfa14b400000009ffdb7941013555096f0ce6f670c82186b670d3d16d56638cd054db1289ef70e42a731562e59c1561b92bd4b93e1059e7abee5c2b3d7aea1fa1070aa0f895314 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000071c99f323372645d18780e36a859efb01543aecace0c2acfcc7f7d873d932487000000000e80000000020000200000001f46a92ec93bd51e3edee078cf59dcf2fd6b31e4be0d40f58beca23208f28ba690000000e1624910a2cc43ef6db5a36e555e5d60f4fb06831fe71440b0999cb3ebb606b5aa77e82f73d3b2588737db3b1fdbe61c9cc276f77fa8aa66a19d827c6a0648f6688d949ce2de84a5c055d05b34511b727e3dc86b8d578cc2942860177c4ffc05f461af459b445e9b7b23cc0c55b275dce8b1fc0d945b32f5fbedbf77f739fdb676b1e6efc12151e704483a7f4972f2314000000050d6d53ed84bee325c0cb8a307425eb6d304214fb2d7ac7b2404220a2541c31291a91f5d580eaffe28bed425a4192e7a95124d0025b2c413a9f81df2ef9df594 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04fef9ef299da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420528865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1788 2420 iexplore.exe 28 PID 2420 wrote to memory of 1788 2420 iexplore.exe 28 PID 2420 wrote to memory of 1788 2420 iexplore.exe 28 PID 2420 wrote to memory of 1788 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06dff65175ed049895fbe12d3d6986b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53913f32d852c1365d3b2964f105aab61
SHA13726c957cc85b0c22617d46e2cd6954897420378
SHA25641db7f915d0dc7a25452968dab3bef8a4c7d05b5c9eb98c3c14ec111650a915c
SHA512a74424339f2df347ecfa5dae21ea81d66f845fd5e9a67eb8ab051c9b89f07d8ab8e876afcc8ae2c9a6a50d3a2184a9a0514e557ebe39a4650d17bd3f890b8923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592fe79974a92d488f8130c88eb25b4df
SHA165660624e2ed6c2e43cf1c4083e95509b1c41a8a
SHA256bc35afc6f676b86a35218367218939d4084ca215c54369004af65a603870e320
SHA512b65d554f7da5cd4334d211fe447b8b76459802e0525731d169c96c2ec90bd5a0c896271bb6afe48ab63a2a4d02a9a46dfdea538fd2dba03454a95e7e3f81ba8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a982f677257d4c4b042e237ee40914
SHA123c1e3ccc78630b78d5592008b906bfccd334ef6
SHA25649eeb9c10c7354d83f091ab9b2ac19dea9d0f85dfab774f0a3fa1a3eddd7ea09
SHA512b9f91c32d5ceac88fdb10b1e8b6e0d26a3b33ec8465b9c438f149c55e093c54a7d1a6d218f74ffaec01a8bd3d55b6ad885ac6e31b44fdbb6f380f2d5c08af5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52660ef7a518bc2e98eb064fe6828fb90
SHA1ec1fb248ad8b5c9ba9d8adaa0496f45b47d4849d
SHA256d9bbe0cd7ad2245050f9474affb7260eac8c43fbf1abff75312b2f62e6f6f18c
SHA512286ec43dfa889f0161fffbf238a801839ea5c725b52879d36a618d37f7f6f414977b3d97d1ca6d32a52dfdbe4fd06631a866b33cf07d2b77206010ed2956cd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427dc9bbc11523228fffe3c4ecfabebe
SHA1e12b9b52d22804247df1ac510fa923e8a62529f3
SHA256bb1ce396eddeb4b601c46d582e7a5a28597312ec1e9da883853a1796944f2854
SHA512de6813f86a0e55ef3467f74e0d64b7713d73d4e7cf096f6275708adc463cfc10de0976ca5331f0fd3f967bece81772fa791d2f57c0ccf0ceb61d9d6f65df15a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7ce652c2f78dba09bb1ede13ef63310
SHA12c50f8a81721cd7f23f9d1dfa0810ec53d2c7fcf
SHA256734027dd97dd759210553f9adc129734758619f8d92163ab8794fd983ea12714
SHA512938a696205d7c849c9ad350478fd8e586959fa31e853ca5da620a5013aca8b78d96a3c12608a376daf8d06609986773848e8821ce714e5ca0b6c64914028b503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5688c562b187e6136a00521651f2bcc09
SHA19e5e5992e3388407f50946c59aec542d9ae7d101
SHA256b11005ffcb67f1c94a920310991b4a487d717b3ed76471cd94d48402461145b7
SHA51261e8b38829a418a53effe3c5a2e8603962a9a4184bb88e2a22a846ba3436c15c642eb18953d17cb372f911d60b13b0026c437b1a96389c615ec52f446b8eddfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1d862730944a6f2cb55b8ea8cdb3517
SHA13ccfabe3751ec0d91d315f7902e3526f8f378e2f
SHA2563209caf945a5613a5ae4974742a4d7e45b328072f02371c588dc56cd36560b1d
SHA512a795f651da4fbe1dc5c0b023db02e8b91d68cb76a42978fb41efec7ebe67502e871a0677e9d75b6e79fb0afa77fec9c7deaae9e0e9dcffe71d066bdaf04875f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57591488722e0f75444a51525b11bab80
SHA12ab3cfdd43e5b15800e866fe477e47b693126e11
SHA2563ae50eb646644086017a1b421348a7965a32422de3148fcc08e374b1fe50756a
SHA5126f880117e9fb2ef42510fe003f2301160582cd2fd05e017ae7d530e34440f95c0c81aba8191f11b8065d1c593539711cd1536715703d13cd6a88ef5e9bd941ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cd9b96b254390ed5df37e14502eb5d1
SHA1d649db5cc35ca8b424308e77d7f1a1ce4e2d1e51
SHA256f0da1210607e828f6c862f3e69221ca6d9d976f62a1ad4e81afef812cdef63f1
SHA512574055cf5aac3858c7257fa935d588429cbe4bceefea80546e846906a8e5b4e24109241a8630a6821036d1e6415e798cccd228c666af57fec66fc09423064fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e457b9b07b065933642aef2636f1360
SHA1c52a99b8ff5836068eedea344395cc25a66725dd
SHA256d5ed164601285d02c9345d1621c72b79d937bca6e7554a7fb7d0b9b16d699cbf
SHA51229123a0b938a53e5496275f9a5f8b24c8c5e3898d082b5266e154691ce91bb73360f2370e0e94548a82d221c0aaa826a15d3afe0d93ac6132e8dbf78b966d01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58075825491c4bc32d1df7fd6c594aa86
SHA17f758cdd1e4bbbce78a5fe81668cb0f7dfde8715
SHA2566918cee2e19a28c9ecf1be2f3f074049614cffcd67cd29050b1dcfd2f6fccb1c
SHA512ff63bd1fe8581e9933b39c9c2e24e808cf3ad49e5c531d5b2fcbcc0bea40b73b2386662f5da0f8111a614ab8d286d29d17ff31ff6bc5692ed6045fc6edb7a035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531c7fc869b4a494218d4b2650dd67ec0
SHA19377f0cab9259b8d5f2d399d4aa9de4344e23fc8
SHA2565c3bdafc9d681dad97241059e7aef4c27cf65a6d89480a8b58afe162e7876494
SHA5126899c7bacc156f8714b085822d03ec9e854c23a413ca3e582fc58a159273f17f2af82457a8af6ba9b913b1858ab9aa179926efb0bcbf5a84226b6b7fec0b99d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ce5e2a52240b2694e8fc8e2fbb18239
SHA1fd015cd5b71ecc668ab5f46575294d40eddefb73
SHA256ed5269f0cea4c443caa43bf19aa4ca137af2c6387e18874eef94747199702f99
SHA5124962ad661bdf2d648fdab01e3acae3499176a295b5cd71257164e8e9cbe4ddc2c179f180c5525939575f89e253864fa7a7aa13b2a4dd8b36874e5c2f9dc5c4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af64cafbac50d9f4cfebdd8f49c7fc14
SHA1f74192002766e27b42388eea24049a6bdec01fc7
SHA2562272aac89221b97ece96c105ae7ea64894a9def5e8eaa3f615ce819eee103df8
SHA5123f2747d07a06cf5abd79db997b19bc8dbd95484729b5500ce4b3c84efabbe1c2edd94be9dceeef1758f195455843b0a618635411e2e69f3b69dff4eb33d47a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d6d9843a9f5a368d72f13cbabd2a55b
SHA1f3f83018c9664d6c420b74f46e9662ccf4361e1f
SHA2562dfe23ebf4d802642b94b3f3dc756fa7a35ec8b453c074463af1874ef175a170
SHA512ba0cb656bd4e09a728a6d5562a91de52ea23f20a4e51520d2a8cd887d29a494146b59c224e767876323325bd897bca4213883f5975b5d52e78ece06e633e883c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50257af8fdfaf6a71f29909f943c233c5
SHA18357aba96144db50f69a71e549fb2151d3a90d71
SHA256c41533b8a0ab818f7c4790001721b70194b2b245c7b56f9d8f7c245b04d6c8a5
SHA5120bbf7fa9f58929f14bd5f40c8db34717589195633cb6033940b73eb7db9b76f03f2c41ee122b2f20f270b72f03f0cbb7fc68f2e06c5d086f435dd93bd734abf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555a755956f67c56dd6a4e28cae6b0160
SHA14554da22e1e4bc1a7594fa1d4334e5016ddfbf35
SHA256e35fbc130ac17bc935df9418468a2040132b53e65146f00447f35e475f2592cd
SHA51263990a50ea4bfb3f1436e357ddb69552101eb95338d683c7173d9cc5df0cb0cab06014fbc9cc75f596c6d0b798e7ece52989531fc00ceb481fc02b3a90bf7c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070aa46b236cc7466bcc544f61ee3526
SHA17ff92f06b21ff6298893a7fd7de50a7d4537a24f
SHA256edca06d5f52f5b9165264aca9f2abee4be41e0b2aff573aec23d194f69f17278
SHA51244607a4b7e4629621ef94a9466389fca31968d289bb46da6bcbb082809a3ef82ebfbffd96f5a1dc4e310d51c22c936826b7b773b6a7e0abf90933804042c3898
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a