Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
10038dc496aba1053ecfcd8d239f2f29_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
10038dc496aba1053ecfcd8d239f2f29_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
10038dc496aba1053ecfcd8d239f2f29_JaffaCakes118.html
-
Size
462KB
-
MD5
10038dc496aba1053ecfcd8d239f2f29
-
SHA1
19bbff2b0f1bb3067da1dec37181699171a8562d
-
SHA256
cc1ff493ae9300510cdc3d3c9a605d737f2a7841b550304634c4f6c6efab00c5
-
SHA512
38b41ca2441a159ec9514a74ed9208e2747fec0b8b3022988f07a2252a2addb61eaac70fed6913c51df3799a64d30ab583a5cfe6f1c85a28cfd7a99131473072
-
SSDEEP
6144:SJsMYod+X3oI+YN2sMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:c5d+X3I5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50917f472e9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420884334" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EFB2BE1-0921-11EF-A4A3-CE86F81DDAFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000033544509d79e2d72641eb32dfd556f9fd19a71acaf6b95534b03c7676aa832f8000000000e8000000002000020000000482bbc810d320f21ad7b45f0adae2210d7fd2f9ed9ce8b8886f209094a3f083f200000003e7d54fc2e06c823789951698aaa0238cd949d6c18e511a5f46a2c88211fae1a4000000010398073bd991ec920e78659df5f3cead9fc00156f7cd6113b6f9e4d25b2941c6b7eb1e01c553e37a32f4605506d2eac751078746ec1abf63fba161f556c213b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006c7f7eb5bc9ec3e4d120eaaebe9216a962eeec20838806d536d98c343d72bc38000000000e8000000002000020000000f402d9f3e8ac0a3ccfce1016fc7f9adb3494c884eb601e62412044557bdf7d21900000005e88eaff8db5542838f8e47dff48aed560ca7fdc728e879c60bfcc702b4d7d3b1b94547953ae380f5b4c73b37ca9ec859bbe8290dc9f4535a062ba0ac3b857f0200726811244b80f132463f2a1276218c0437e82e85220379458e06ea0f10eafe82155ab60c0f5b16404696d7b5bb59d6e4c65c52226ab6929bfc8f19b0910b99a74784f3410c4e708a2d41bb3eef074400000003602a88e2a3d916b1d72aed9bb540cb2cf1d88c039e70945138403087f6c44fdd5a4cb801a6e47a9a1b1d2f9938037af9cbc2a14bafd2e1d867b1fc920652606 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2832 1540 iexplore.exe 28 PID 1540 wrote to memory of 2832 1540 iexplore.exe 28 PID 1540 wrote to memory of 2832 1540 iexplore.exe 28 PID 1540 wrote to memory of 2832 1540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10038dc496aba1053ecfcd8d239f2f29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a59847eef1ee2cd5b7f02f8ba13d662
SHA11d81edaed8d04052507a86763fab1e1e1de7ab45
SHA2560ad896d6f236b132aa0dab409d53e9a1ac1acbbc319d45de2acf7eaaf5308701
SHA512e36d97bf0c8f10285da7aa6b8f0e0ff2d3afe7d673805479a8bb342b04426f99b74d736b5bef162eb21272a619ea5c510dd4e59a1981cfca186b71b4d2a4e9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50153184f39a2d9c46482151afb44f85f
SHA1a859ee931d75ebc727ca6f2398d28b5c5dfcef98
SHA25604a1ebd5e0762db6650d6d9bef2bb2892693a7f70a608e084580674685d5de37
SHA51265667f235cf9103ccf5a3cc57f5ff2903b050acecad1b5e83baf177549724b660bc0fce33966e9a92dd742089cbf8c5e42df3bf1bd4577c5a233a4a39123a1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c284c185c1be13f63e40e4db5c86351e
SHA1a3384cb956cfbda2c03369f549e38395dfd19c14
SHA2566e91b9931c8b32d697310ddbb413c2d3f3bb8f7a92c87afce3817e8027980539
SHA512897cebd95b29aa144571ad4e3c5995dd947dfebaacab4691a02e374336c9957e8bbd3f1ccd3d3cdd7ac647aba4513fe16e28e30200eedf8f5ea5b5e62e14447c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6ba602fea1273e881e59adbead3c9c7
SHA19d4c4caa8aa442e0e8f6af3238be1b5df43eadc3
SHA25608931e46531e27260e94db5dd1014a243005cf7a0272f8ede829cbf327ea5979
SHA512b3fd9220926550a1e402308a99a55ce67816a7dfffffe12fa7503c0e4547b37e0ea938752a990cd9e7a8ee2d1c5408a0ac6aa68f9d73666cfd96878becfad2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e593d2dc7e4eeab58dd15a759f7cf4cb
SHA1f6d980d1fffd3902965ae21428adefd473505b67
SHA25616a34b4a6bf2c140522ff0fa574c82a110fc317405445b9dc80218fcacef7fb6
SHA51207c2885c1ad81859429c7f9a0c96d201ed292d4d991869808a3634268599d7b2c0232b2aa205daa24ecdb5f2dd7d10875bc8f7f077f3625d3bc8907a1f1ab1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e884af55bc3011f3a63e55f258df6806
SHA1eb474451a73fc1c5e25aabe8c6e85685144a6aab
SHA256dc081497d4e083dbda300fd4dee19819b5c8061dd23e96afdd5054b6a5ae81fb
SHA512d3148aede81d2908fca2d57848051f001be55137fad9cc85f35253bbaea8a66cbad725d9e8026a06510b9c43c29d131487b73931fe4f7a11009ae8296a2d7fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f04174dba6d751c5532e11a4acef5760
SHA16c5dab541d4b154ca185f994fff9507fd603c14d
SHA2560a5a8cf58ce29e4abc049efeef45761d8fda8ea107c7c3e976d13413c5bc3874
SHA51251660ede8528bf34cc1e59e12e951dfecd687453431f47cc6f4245a05d85291bb4a917dba89d693b220c227af7bb02c329a0c0034c70adbd937439d0cbf587f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e02f6faee324e41cfd2763acea74d762
SHA16a1e5a4ac547fe8c85efa630e767b3fd2e1e56a9
SHA256acc85f178818b8d64d81d046f394c92dcca91066b9a5f3f0f8b02ddaafea8f80
SHA512451954662ccc297b275ee34dfba8d53012b52c64d880c798f91274fe3e68b7385a0a43cd1fe54e3a37aaecfac3dc878e34cf08f0f361429dcbd76ff239aa1016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c53a9d1e52e4b286471addae159df1fc
SHA1a97754b6f4087e10b916c53b44a28f2297c6f8a4
SHA2563c312fd9962ced8bf5a813cb82b538e72b38cd68afa7b0a8ad43be754f731b03
SHA5122eb51c15492effe2b1ea600ec2630eda229ee2188d842e851828155eff88f2058acb77e38ae3ef7f2b5662bbceb2a3905f714bb2fffcda31e971f5357c662610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ae454e620e520b14ddbca70c47b4573
SHA1c0f4928c060fd7bbda98f4eedb2f1b391105d0f1
SHA256416064fc6b7882665d8a4d7f1945cee549982df397a9df64d2f294dd6e52821f
SHA5128041792e72c167146742faba1706556f1a8c619d08b0af33f8a10fd318f469fc8f26577db30359115325f7bd42237f2cd30abfe362245e9a817fc6a741167c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589e5c249b168f4b4cef807aecfc5bc66
SHA18812782dd24874145335129c12563c7cc34e7601
SHA256214d0334eb5fb0978a4346afc25c074e74dce4e72904742aa00d7826ed976425
SHA5123ee3b60e160688aa53cdfff5cc32d953002bd651e0df1707c98183f1f3735644af19cc94ecfb7b1113a26050303e0ce01971e211b441d1691865db1251445907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d3b38c14bb5ce093522cdb92ef20d2c0
SHA156f4b6d317e04ff1aa80e50cfcef0e6369861e70
SHA25625e58b2e8c08f39e45328b8b5e253d16de4c80cd34fc6d95d248df1e8d7fed02
SHA51269899736419634750aaa27ee260ff57786f41a7277e972383a73b39cff5409a25eddd45aeb706d53f59297df0e7e5b94a19ede063c5a7a5e17e6777d43fb7667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d457d84c91ba8b175806eebfc8d6472
SHA13c83a79b165ea87cdf6001f24e90310611d10e62
SHA25698fe61258f60b23d2da4bdf8959a5d893958dfea180e8bfc9416cbb940bb5cc1
SHA5127b15b36bc331320a031d671d03d23e2f5ab18d554cfeb58a31a2bbf61fce0edd8d2d81a8d3f0bf33477f98fdec372e813429c352225fd7c8584f29f9154e4993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bbd91fc1085d5c3dc191c0ff6f0777a
SHA19d1020d026a2256a9c53554366aeeec4148412eb
SHA256a4836b0bf420161bc3534d306dd597dbb5b8d9b349d8fef7876234df7b139c47
SHA5127501d502a9699ba8cfe22fd4898bf30a925f260cba251b9ff801596b0aaa5b0d3f286663f5be97a08cedd50f14740b2ea052d9e627de4087a8082f782cd3ca55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d1b5648b6460a679d97f03ca3c831ddd
SHA1f9298d8d8357e555e36f909339ec08edcce74c37
SHA256175318a5286f1375c7ac4bd741467beb6225e217d6fd035cb501ba4797e48053
SHA5120a309541f8793acd1544f265bffc8efdef6fdfb463889ef0eac7b3eedd5f83e184cfc3d0d861e8bc92ee70a45663a90b96cddda4884e8c371d656fe3e33ac588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd5610f979cd9738fe9ae8185d3022b8
SHA11cb627e0f1e3e287daefcc5fe7977c68fe1f9367
SHA2569a81bcb0f0092563f791af356f2b0c217b03e0bc3d8c5c4475dfd7a9ce303eb4
SHA51227ca11af57f6dbef90cf1355282810d5cee352dc982e63beff50ce8c8d8db4ccd0e8476f251389b83dadae5856f149bde83b9879ac7b8f41f23ab10ba8ddb55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57febbb51de299c4831cb8b30b3e07cee
SHA19c3f3a9434e9494ec89936a9660f832a82cb2d09
SHA256897ee1c2365b0e0b9855b81324e7e7f59031215423b5c94255ced930ad24b388
SHA51232a11b921dba11c3fb782031d2fd54349171549a289343e1fcc424ece53f8ea904a266d1086fd73c36ae60fe6448bda3ec9327551276d111dd123e4ca45d2394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52861e7022ec20421d2ac795f79116c72
SHA127681bc70dfaf505f9b927667c24bc56ba42635f
SHA256f2b5ee1f4890e03b77007b8e59c6a5a5ca5b5dcdbbdaf71fc40dfb6d7f0e065f
SHA512fcf2c98de6780c732bacec2a082b0fce86d6da4463fb14a211006d6d3b08fc9b6928f5c02c75789f4b47161722884ac93f14bf0fbdfd861b06b3d90118490218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5984ddb6cb206e26340f1b7e9c60d3822
SHA1de8f2fa05188fb7b8e5c6fda9f501f063f57944d
SHA256a6d2940d838f11825b6e725446b1ebb8cc5636ae8d9bba5aec1b8954d8e00c03
SHA512afb0175bc4b80967578f9696db93cac7b59601d0f9ba68706ae361ccd035abb1192ab9166b49e19d93883768c1f8025c7dd313467478341b7913f539f6e055fa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a