Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
4bc6e99587dd2ce0caf04040d9766724_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4bc6e99587dd2ce0caf04040d9766724_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4bc6e99587dd2ce0caf04040d9766724_JaffaCakes118.html
-
Size
4KB
-
MD5
4bc6e99587dd2ce0caf04040d9766724
-
SHA1
3183451961fdcac705d78a30fd37e49adfdee2b0
-
SHA256
7b555536a57018c9159103617fb78bee872222b23b73b3c41f193739ddf4309f
-
SHA512
5d3f8355fc2c75d03dad6347d53ec8f660a4300712f3dd3e36c94397c56c170573c6c0c22c3a0d6dc9b5d97508106afeb12fd1ddbbd78bd852a4034d3aa0a16b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oXl0Vd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0442729a6a7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007840ccbb539ce7b9d4417d2306cf0bd9fb6d4f54808ae07b9000cbce6236c54f000000000e8000000002000020000000f2e884275e8abfaebdb6300101ba9655cd38f376fcb754f07d64c97842f631b6900000002b315430c04e5299344e7dd418a12e0167bf6533c9efa960e3715127dc95d56bcbf1bf681a6be9ff34582c15b1d01ba3868008adee8305d42a32b024015253600cf36268daf24569c189730a1b115aa510aefdf0eaad513d85fe29c4999c42ddc86c628305f66cafc465d9605aab233b6328ee57d74a0004c71f3715b8260ac3d6e66b0905ed522c3ba18e704f5a0f7740000000bb35c4ac127d341dc36faddc695bad622f14310684fba22abb42d0b201efc683fd1afe6f9b9665bac79b6f12d5ddcdadc110ea58f71915fda7e375fa7f3f46d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54AEA371-1399-11EF-BB01-66D147C423DC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000dfbf365fbf0c370681d7c130feb9f7265fd52ef2e4b14baba4fb00558f19ec14000000000e8000000002000020000000b138d4b94c844b0e306efacecb7537c0e0dfeed8edbb237a61e34315ff04ff5820000000b64d715b2308ab82d5dbe309da59a0c7ff20607f4210ffbbb0c4720b824ff861400000007738693518ceb70109e116bc36725193adedda64abd6c238dd6026c3df8256587513df4bba213cc7b3fe97c87a80a4622965293525345eca257f8ed20f0fc125 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422035342" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2212 1688 iexplore.exe 28 PID 1688 wrote to memory of 2212 1688 iexplore.exe 28 PID 1688 wrote to memory of 2212 1688 iexplore.exe 28 PID 1688 wrote to memory of 2212 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4bc6e99587dd2ce0caf04040d9766724_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294f5f8a7a22ee3fd152faf7a19ef62d
SHA1ce89a11ffc6a5b99d52e107a19fa51df5e188888
SHA256c5346dd04a437b29789f875318256f6a11039b8897f48b3c5e6bde954b94004b
SHA512fd8eedbceeaca4e07c696218b1e24138616e503defa556cc3a24bf5449660cc14a2b2391ab5e038aacd2d081b89149504f6c87ddaa7bb994bab845a59c2d19f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff3fef8e3282173f325aacf7d9a5ff9c
SHA13c825dafbb7528b6c20e32842b61b03a71d79daa
SHA256aa73ed21a86dad0b03c95112838e2efa1a6411408ff6e861a5d5d0a197d04c59
SHA51260a0b12853fc0eae5b9766b1b5b79441682b327cee3acf1d74c37133212f863f13841dd55d25fd27f8909cf360940fa7a85ae42d1902574c0d4c5010628140a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f72e3949c9f4e289e3f4a9dcd9d415f
SHA1ad50791540bf5a239ec568cddfe6b885fee79dde
SHA256a7594b4eb6298ed4abe82ac5059c574cc8983b858ca45a4a17d7de7de45c1254
SHA5128e63229de2be5628fd59f2835ede009339cced03818a92ea3c6543db1ed7d2c960d93a62948f77bc02b6f3d61efd35133a39460a24f976a1f7a08a3703928799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b166e28ec3861cc0e76f4bf92809fbb
SHA105928245e925be5b0304112858dbd237a7884bce
SHA2566f8471b81201602799ac5e6371cc89c17a14b9ec6e9b24d8905722706e081177
SHA5123d57a531dd84acc74bf689b52fa0ec703184d244c493318a6e6ad0490a941fc872522587e77fb60e3dd78dc7d6ed3472b656f4cd2dae2ddcc59025540bd33cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550084114828d90ee81dc93bf7eec68ba
SHA10f8804f8ec772b2ce6758967dd653332e5401086
SHA25693f108e1eb01d58cc5f3afb875b9d42be9044cf379d50cc497de6fdfdec67a81
SHA5120890397103315d430f447f639c1570438b07a2b462afbc4a7386f5246a655e68de8f28eb834a4d3437eebecf0ad98d5ae782e6801d34a03979fe40507671fee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38534be37b7d5b9fba694e563403384
SHA164a41b5b8458f75de45fa10209260ca899c3ef93
SHA256e9d0ab20274872ef93768d1b7d76083ee75413d99462c3e8eae46378c6212910
SHA51200a1a95ecb3cdda5f1ab4b1d658485fc8eb395dcad982621d89d43ad12354bf9d0deb8f2490ff27cfacedc6b0cc38aa44405939e52ef28cabf30945ef51143cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be71c1511f3a51fb0cf854269de804b
SHA1854b11f260fe6c3d252754e871dea04488444669
SHA256ae0f92fc4b73ba6578b0e1a7c2f475eea6318a791d1e3f68189e1cebeb01740a
SHA512d775d67ed1088a9ef6ea6bf805ab5bc5e843d09728937691017707f58679c648e526d837ff7b4b432a1f19a80257f9ac69b0e3acea122eede894cd675dd32381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e00dceb5c8e1b6e6391dbc790f52f91
SHA1c3f023a55f5b4b729acb543f1cd054e119f374f4
SHA256cfbe1671f38cb3b588b841f6f9ad0b0a0a20e5b6eed1852ee4f1597b8e61ef46
SHA512d36d8cce66a830d79a84911b26ce39c210aa3fa95b10db4684f96a2e3145d4031b522f69a96b0f1ce056faa65b0c69c8c7a181908fd805166f76f84ab79ef74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba8a14f12bec00080459dffc6e77e96
SHA1e4f9a0936185973bebee82d1c6d68b54dfa0dba7
SHA256d23a0e7e86484857378bc4ca4e0e3858ec0ef1c9cbe367dc9857a92de88d7aa7
SHA512f51ad278fde2ca10abd520af5909a1381ac30618d31deaf45e4f05c7bebfc13947fb408aacceca64d39873b1a4c95a38e0f27cb9c8815202acb96f5f366fa93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b957efea002c65c9f3089c788e0e36d
SHA1b4a60d0a096877e2d0ff7a166c05982ad3acbfb1
SHA2560033a65eecfa70db52047994e62b0609a67f10f60bdad649c49026e0eb9fed2b
SHA5122e2474692f3ca7774443be708d756070c7ce9af08e1324cd561d62abcbb73ce82af183948dcb0d591d9a5f1daefd66646b414163683cd5be618dad0987f40d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f5e3fddf958b48d4bc99bdaa8a1b0b7
SHA1089794db457794c551bcafab9b5f64b6b997e458
SHA256f9d484ae3152fde9293a345deea306bad50c614e2deb713b349bcda4251d5f4b
SHA5123f8190656c54e6fc2548e02948559d4b812e969c97ed806b791bfb80949edb6442fad77275fca80434a52f1fec42f896fd7c604534b7ed57490c9ff531a325a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f04b3e753b9f3f5524b0e5d8aaf19a
SHA11dffbbb3497287bc72ba5bc51e73270db8195158
SHA2563a3566cfa30489b7b8c316b47ca9b0dd29dca2a21ba353982b06175a5c559122
SHA512d8bdd4a7a9b95afaecd933b9dfd9af20ca7c19bfd23cb6bc1938306a9057e1c7d302b40929760dc284444f47e0e910f897bb8a68909451d46361b5b48fce7386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ddef5827ba70cdeb3891487ed6d9cfb
SHA1209a499452086b8c8d659e430a18edbc93ae86fe
SHA25694d6f9482e840fa443336c5638983bdb946aa7e197c7f80b22d1acf6778b84da
SHA512caa354c971efce71a14b3adba0ec22fcfc586b9b820b74629c48d0804d0a49a6ee7ebcb7a5e7721594842812a0efd0933b2c74a11c8e06ce10f2b78ea92f738d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2db6b37a5026ad60f905b91011419c
SHA17864867c24d8c55228f0c9c9df3370fcb1b01a5d
SHA2566d926f2e7cf9ce2a543bd81d978993c4dc2396db7f5e6dd7000a87bd1d5f9f6f
SHA512a61cf7a61db054d5b18422f396f5821bb40022e5b7cfeee02a6b1e5491c2e9cdf13b975039d7a1677f6384c37a3c3a86f981f4afc7f114498ddf9e4e59e91d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85ab350f7d832fdca06f02f54166877
SHA1b7db25b9fb5d3bd357e229a20fbec20eaeb7da5c
SHA2569d42bd1a3f01ba8cebe6e0a5f52977a6c26ebfd1ccbdf7e61a1aae8d2fe59fb0
SHA512a2750d308910cc1032e26ab517e3982a49b21220af47e2a474d656b2093f455d9ea2f85a21a129d7b9b707672dbba30c118b7bb38895882598e0a284b6d7b620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7110acbb68dcb2d603a7dadbde134f
SHA13cb2cde4c6c6b30dc37fba5f078e3f7785a76e63
SHA256023d78a56df0f3e8687d0ace810da92261976b54e5f71f0932656a48bbd2ede7
SHA512124ff1ec4e6f6ea6e3b3d5b7db8f3327d10b7dea8305daa8e34a7205442d2ad5c6410649e374340ca278cdb4b45f40ca904445cd46d774144a47208e546f8a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6f85f2fcd0a5c1d31487e1dc748d3bb
SHA13f8a4187dc45939fc5fbf817f48a2c2ab554b220
SHA256d65ac8f3c8ca964247f939ab215fb5e244f9b8cde41b902c27066c80d0cca894
SHA5128fff4d55a3125837eedc3834862ab37b9ae5117aa6e99fff045597ec0e7b11493b21b76871d6fa3384d0b0530f3c114559ff2a55d51be5f207de7ae59db4deca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52426bcb36fb7ab6781184858779b0b34
SHA19d65af38e9fa6727cf6e782e0eca5963389c6250
SHA256045554571524de7e4eb4841f576e91514312de74e402100f860badf99f33e086
SHA5122a381b66614ed53fefdc25486e6d8fc40afcdec834ba42253160482693c1c0853a628d328ebe5bf3fe7be0ae72fbbf334945396eedd000cc6881558a43c00f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c7c36b196b8d1a702b7cdf85ef005c
SHA10045a261b709c041dce222be4e3418081792b75f
SHA256716e914649fa088ba2893e514e3de701f0e5b03a398d6cd29fff82ae6b1a5b0c
SHA512d8e85d6cfce6a7fd5fdd4c589edc1a3805b72aee7b2506061374c4e5d8966ba430918c834a80c7ca58eaaaafae14d67052e801151cdb2a1e25b734d18f9b1d17
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a