Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
11047dd3fea5e60656f7484fb7d8d5c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11047dd3fea5e60656f7484fb7d8d5c0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11047dd3fea5e60656f7484fb7d8d5c0_JaffaCakes118.html
-
Size
461KB
-
MD5
11047dd3fea5e60656f7484fb7d8d5c0
-
SHA1
0bb9a6dbb16280b7fd2a68646248aa7671a79fa4
-
SHA256
38d873f19e7da9c64047f7c88dfecb9ebea708d42b306a2fd4f8d82b330f3d8c
-
SHA512
baacccc32045e662647525400161c1769ea8cdecb058aebec9c060319e38b03f8c9b2088328b864b08c0195d1f22e7902ee3f071d52a7a60c49b5a8806b476ef
-
SSDEEP
6144:SFsMYod+X3oI+YjsMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3N5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000da38c0fe05833c179ecb05ab3a19cca78eea56042461be0e22cc1ba9ad3bf86b000000000e8000000002000020000000e6a539164c93947d7e281c1cda550e151b50b30cf01167578a22509cea47a89e90000000f0262ef6ac587d3defcad9cc6b7f570ac4ab81cb5a1dd4a20cc0f28d3bc6f378dd41f9502aec30e22edca11b4164b1f06c349f68d41d30f6e66aaefbfb377518eb5efd80a697d539ae017a74b217e35f3f712174b935b5c4518aca2d4b19c007d4012166db8700169c2caf97e5c8a5197ee701f37770eb43c2be1a313a8e36be408dccaf3735f2eed1b6ec279b114f7a40000000cf386ef5a9573dbe2058dd4358294a954af49d70984172967a99339f88df2f9fb39e36bcb8a33ae7678b47c1af61fccab3837140ed61c4b10595f57037318861 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{730D3801-0970-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cbc04b7d9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420918271" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000a999ef30b006d31b497d5f4b685794af3c981869b67dee808f5959ef4229f70a000000000e8000000002000020000000acc165802857145dbeb80fa185cacf85ce3e4750282b60e0a12e01b337e3b0da20000000efb840ad1cf72c94766d7bf1fdb842ed785c17368c323686762df1346f3293a2400000008007f9a1f9ba2da4d9624042216e8c77992ee3c4a075aed96626ef35298ace0d777380c41a23387ec574bd9ec042e786011c70088b11543223e2bf992278f724 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1912 iexplore.exe 1912 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2504 1912 iexplore.exe 28 PID 1912 wrote to memory of 2504 1912 iexplore.exe 28 PID 1912 wrote to memory of 2504 1912 iexplore.exe 28 PID 1912 wrote to memory of 2504 1912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11047dd3fea5e60656f7484fb7d8d5c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a71aab78f6a0b6018d7fafd92726268
SHA11cad60f444cc8d28366020c281838b166351fbd6
SHA256d83ce7921476ce468eb5ffc20f39f660526afb1b2aac286146d1eab92060889f
SHA512b3fac68d7b23d2fd1c55d750627d68cc0f15d6458f161f24a139b661e6f086ab9e5dc6bb355c559e7574f4c7caded055a5c5e733dce156520d8ea9fc0e29e565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd4f4c1019f3760c191c40613a82ada0
SHA1ad6458914048f5a8a61043bca0238fe9ffbbdaef
SHA2569a4245928795e274ac191ca49830eb5fa9b3fe09a0af0c69ddb3fbfa2942e3e4
SHA5124284f40ce1c38b4736e61a3acf3bc6f1679a3ba5218735aa911ec90212525ad87ede02b81b61f0b73f3cd7ed6baf962079bdf408e25955caaa301412494d7daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b3436e162a32adee3495e6ec7fb00d7
SHA1e30abd0940d47b4e2711520de292c9921f2c7d61
SHA2564bb8abc017ca39124893663a44a8fd072efed8242a91faf6068ebaa1d12947bc
SHA51295a0ba160fbacf3c561c85406d8d203c839e6cfaabb4437728450a7f373519d568441ecb63af30288012f1512c5e9cc5ae3fb23907281302629e0ab0001f0811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a42f96ff252a1c9ac8bfac9cb038ad7c
SHA14bd85944a7a97b7c285ac843c548226dfacc107c
SHA2563e9561d3325570a6f7e558a09ff47645098c56b947afbb4ddb5168f574781f3a
SHA51264c5a5c4a7642d195c277910191300ec42eaaab81d931c58992a95ee84bb28e4eeb25a8123249d92c7ecf9ab86c477e02c3c4c054d560a2dc47d713b3bac7085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eae11a528377ef5ec64a0f35aa27c65
SHA156edf5801dea594c2647425c173ac22fb204306a
SHA256ec7d4f026a1324d3a8f14482d3160fe61071781f9935dcf1aa1bb48f7cb4ab74
SHA5129755ac3c66ef17e8f795965836589d354409f1a5419cc9db49dacd8253e0544156678cf6498f75e64e648c212afc4ee726c3492630fade6b3ee0230d480c72ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaae27806ae0a58c9ec552d553210f2b
SHA186635af8794c026dcd5200d635386386d0b56a7e
SHA2562cb54bc9f52d21bcc27a7551361fc8b1404bf9a342dfe8f51cd5819368d85ff7
SHA512f7f680041f050a79f2e2933e3fdf4eb5299cf43e8e4f97c3176fc29181cd72244f94c3d0b73b31aa9573e3a238c4e9307e35f9f835f7481a5299604ba6c46382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e1323009e47a6166d500bda39ba0b5b
SHA17ec778293ce2c60cbb7f2a6bea13d1cb4356bd3e
SHA25638b6786ff340fde0e772793d261b99c0a30c9c43a79b13bed0d32d3125042b32
SHA512a1858f80264a49e9f92fdb248b785fa9e0f72d92ba81234827876535c6286644d355b097a8f75c51312fe1ea414f81566e4b7270b3def267941a76f3f9691b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d3dcc453b8c05b0a892e397a235fbf
SHA110bbee3d55c68281dc11e05424d8dd92bcc60916
SHA2561ca9366a78c782a65126683c63c2e38e4a6ec20ca651ceef002a880f310aa757
SHA5126f5a98b326e3faea1504b3f5e8e4ce65de2e078cbc69f1bcc606dc08e728e5e4512aa711c2c83b86a7bc967ef99d30a9c8489af21d128a56fa2abca3f651327a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd44093eb37aa95c2f1524b4c5be76b
SHA185e25c5f3ebc0baf0469f146a3cea755a2f8d797
SHA256ee110bf7aa42bf65e7ca00ba0b430e3aa7189f2e77405bd733b15148c048a197
SHA512f031a6384ee3e3096c21788dd2b6ebe62563d326190250df689e4c8b20409677a181bd77e90cccb09d8cb491777adbc508ece8bb6c8d4fa05c4a381b24d52ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940ba8583a9c13b4c1e73052d3929cff
SHA13e08bc8d091bdca3a0776a7a32dba2c5af809da0
SHA2565a3463a88629b6150320c7f2302396bc80c56e3857669e91aa0f5e9cb2272fad
SHA51224757cb82bd7be132150cce5b6af36fc689afe80d4699a5e86ea8378dffd297818bc787fe1827e3c5b9e8c1b917b595f2ce7d002aa15272ad6c9f1dd607c7463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f5a56d773ec387201e85a32386bb12
SHA15fad9348c4f2703a9a27304130321cb73472a439
SHA256ff4a6a9a6125376c4f180643d2c139f85104a55a25bd2c00ab548379023b83fd
SHA512f993e7d5225b0a0ecef2ab325f07a14dd4fba0622d04141a5a2f9c69e56f8dd8a2ba09c7ebd22e477281f2220a2511c1a0068f92278e0d97406787a4bb3b2362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2a7ef133fd88f0b1fff13bb9ba7bf68
SHA19368cec9d1287d3361a46d198140803adf968df5
SHA256a0560923c444cf1cb5a1599eca74456436438abd4d883ca01da1d47ebe632435
SHA512062c2b7a5314f667edcfd74db426bfb7551650a7d410d15be84b1c9713201a120be6c6b641a0c58881f618b41dee0d25ca61e45a6e15780ab2b2d6dc411f549e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb1033d42d942dde27f829da727d0d3
SHA116082ba3558b218658ea77c6e6ba96aab5d6c0c9
SHA2563eae39c30cd1f1921e6c8048dbf541da1b68a7f61773246a8d2646a8d523a804
SHA512c79bbc2d736b950c4cd22ac9fb341a1aba8a044c577acf023e5e7543e879c100671fa378dda2b3c899cbab927a15d9d0cfe81d60973486cb587c9dfb556583e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c91efa109f3bb431490089b2f11907
SHA19602fed8a2bf611122f901b56d3b71b07d52e630
SHA256a00b159be2714ca2ff335c0d82eef6229cc68c4d45aa43f16e76024b9c0afa3f
SHA512c05b1f8644b62802c7f34ab55ab08165fe6e7837afee0af6fcb03a350a8755d87ce423ff27791e0094631536119e393728192ca6b276a06e9317beb926a92fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b91e4c9834b8f8a467edac49e994df0
SHA1971f00c1eeee4799d3ea287dd2e23e1f231a6255
SHA2562147f52378debbe8004abf6152839fa7fdd891464fdbc0171394851c01dd019e
SHA5128499e227407d52baaa64afbd11951cfe119e927f6951426ca2c9076c84fcc247334be0c0ef26c728a1bfab6b7b1e7bca2a5a7e71dae28e6e03919c0b3de66eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52114b4d71270b54b480a692f338e6f25
SHA1ba737940d9cb955cf84baf33c270b9f983757b20
SHA256c889590e05978af42021eec14ec10dbbdced28058cb5da4cc7b3fcfcb3d808ad
SHA512f84dccc1e4b533589e0aeea7b2743183fe0e2fff37929fdf7e54737c612d88bb3a25c54330284b3c6ca5210a4d557a86d9ab118486a404742096f5c3f162a673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b966c10c2fb7bb6b43de97b97cf837e
SHA108dde33fd63cb68e816bccb1a8bf56bdea6bd847
SHA256e24635d63559a2705cd7f36abcb1d7e6740be3193c16d2bf044a48b87d901c14
SHA5123db7b066c17dbf1c97aef4cd83c4573f12d877eb2d63ba5210e4a1936c1a16028c5366cbb93be3aaf698e5aefebd72a5a481bf3500a962070e5ba240bd4c5d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548badcecafb7a6b238747089bb517883
SHA1674fed5fa06e8140998f912f156d197a32d91a5c
SHA256e11606fbcea96093d39bdc8623790448349e0931886641757a45d009a9c183ec
SHA512f76052ed27077badb06ff72ee51854f6ebea583d0a795cdb55a754fa59747e3d875bb36df63352b28907bad48b2a612aa741296a110dca4d79e8a28f626461ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540d0090cc23dd7a6a1b58cda349ac24c
SHA1bff92a667fbdab0b281a020cdd58b59e9a3c6e55
SHA2560ecc8337eeeebabe6193e59fcd66a7f1610d8bd325895a9774ab7708534e9c3c
SHA51295bbd9243267c2e205d187e3c31f26296301450f00cf8a44aedf8bbb1931fac82f2dabb4866209d9c8cc9ef1ec8fe21679e4f6f9edc17a02ce7496d2d21a9e85
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a