Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html
-
Size
34KB
-
MD5
5cffc92b40a1f7ba14328860a3c2bfe0
-
SHA1
bf47f58e040c0002f1deaf3d9441a97216cabf93
-
SHA256
3be616ba240af9a9ca4bdbddc7f8421d07f689f83bbda6415ffdb6474d416045
-
SHA512
9cc02ea1a2b471c12ae8eda0f29e1408a2462527c2128df0b1e1139d34d3d40ad400839f421894cadc6ff769f1dcada2f66777fb0bfaea4eec8cee88948e8a91
-
SSDEEP
768:2yThijIT7aq05vz1f75LkHy1zvExAHNab:2gijIT75OvLkHy1zvExAHNab
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422338346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1BF3EB1-165A-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604969ae67aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000dc7884e4b35e795554b8053df64b15f88dda43ee365e598df3cba758f7f572ea000000000e800000000200002000000081915d8f12d6d5b8450d64973dfa6af63a1c27a5f62ad48bd19bfd134f948d09200000002497adb50a466fbaaf494fa383e849c15c148d31014d6f68dea1596d6be1c7a840000000ce51d9f5f004f79b83f13250d89504df5fbe25027676f35d5015512947a552ad1bc7751b96fbe5db3fe5282ca510d8e8176b3314bca2f0068e319a473ac8002e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1272 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1272 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1272 3068 iexplore.exe 28 PID 3068 wrote to memory of 1272 3068 iexplore.exe 28 PID 3068 wrote to memory of 1272 3068 iexplore.exe 28 PID 3068 wrote to memory of 1272 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cffc92b40a1f7ba14328860a3c2bfe0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5317e395bf7163b07e95e8f32f3bd7bd0
SHA18d235d1fe8ce1b1242dd95a4029e79e12c52c24b
SHA256a5c9e7b6c10939c741e612327e0f34ebfe7d4f164ed4c778500e4cc4384d10ef
SHA51254acc1376d8e8ae867a4ad2cfc69d089a71d49a183ea1ecf7bd659f04189697476e91cf96843fa6b7e342ca2ab599a4ecda80b6d55c244e33c2659f666f85e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53340c6071ce6bd6c0c13450707a62a21
SHA10b63a62433fbfadd92ae10a8155f74aeccbe5c58
SHA256628bc68f6ef9a6399f61379eb5460eb2161d86e75b9ab678f65454861aa19c65
SHA512c93a68820be258c5a4a3d2eddcb0fcfba0f5cd0423b5b6c54277b9cd61eb5e0c3b14162ef357265f6cbbe4904a223c153dfe3b119519e2f54964935b44618df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c61eb52897011222c549cf76fd0800d
SHA1aa0d65bc124fd07626598175c7758a4ff43863f2
SHA2566ff346aacd21047c3047b6824d1ef69d0d5f5acae1a2fbca7f40e98b81f6dd6f
SHA512be8c02e2eb1c896cb0bfc4821c3d3a509508ffeaf09355ec4b1e78c0e0e6ece7038a324b9d56cb616b1d3f6433142f8c625e59cb83948d276762700b7ccd13b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b25bbfeb290921d0e9c31536673de6f
SHA1833b6844679ec53adc60f7fb090cfd094e70b8cc
SHA256e691ae67d29ce9de4daef536c47f4e6e76e440874f3fa226cfa9c4e85ed58b40
SHA512cf0f95fb1b812320777d96506a1f6e49eb1b40bc287d90dfa1eff9e49dc3c0cf05284c0e5787b91b65dc49499bf70be37dc338e0e684e93a30036098d653e1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ec46dadb65ccc8eea2ea86bbc8940a7
SHA14b0937ff3a7bc444a3147aba90890c5057e66a8f
SHA256c4ff2ab8ec43e250cd0a4a75d0e2d19b4ae7169a279832309bf11c8bc0ce7a25
SHA5120b31ff3907a7a394899195c71533ad243ecf57ae1d84e6b14ba196e8390d342014f6724e51e90d8105a09e88342aeab2e9d59482bd0c773e0d40ec50e4617053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f65fe78da735a43b874a6d214bda5b8
SHA10f93135ab77f49f8c72165c52c25f835d5c23b0f
SHA25660f9b9fca4317b2aa535624c33541becf535fb949a1d5feb81d943f5d73e93fd
SHA512369b102d2c925e4fea7566f9af84264e6d04102614f8a177e280b92417ecce16d9013874d2649b3c8f1fefaf306cdc739a51375f08cc7bd9392e3e5c123167e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd0d5f6b678dc6f39bb659d8ad86b2b
SHA1188aa65f198b2cbaf1878fec7b68cb011998168b
SHA256a105707398fe7339fe3474d0fd7bc812bf9775bce78e1986d28712f71b029923
SHA512b7b6833f4a42bec4c4507e1ae1606a3a8d3e2e1f347f8a694e0861dcd425bbeb0ddc4d50a41e1ec96b2f35a7c06d560a45bd35821446032bf314dc46ec533e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f342c6ba4fab69002182ba1c2cec1e46
SHA12234f418bae4488a7e01b7709730ca3a5d63067c
SHA256daa3e8b6677e9b9c921e55583102b428443bfc77ef29f3e1e514692c52784ba8
SHA5123b7fb9cdbd421f6e5506e5c97a3830ed5b676d3c6d1562fbbd6c7d101053050fade87df7e2f45fbf263718d924f2118bc25d943c880450fa4183d99665fe5008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170096f6f4600c892c470596fc6b69dd
SHA127a9922056c248aa1fc81a674a4def719a5e9bc6
SHA2564cabfd3aadb23b7377c651fcc28f06b8cc7958c0f106a521ca32e5211fbcb029
SHA512c7ed70ad712b0d6639e97cf0382f8d9fccb98558fd8da87a8eb57fd9b9d5b4cc1a72f8652ea21624376165c64636b152ac935af2924b2e7c74a9faa4388c22dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b8a0aab07db5ce9388381fd614ac70b
SHA1eb6751cae671f75726ecbd1966de096b22c86995
SHA256cb126cb4c1d4919b8ee7338b4d9befc1671a75fd3366a501465e5b6899787bec
SHA51299b4592f9a8749b82b2798783cd1309a5f28e0c10829598174c5c8903b86485a75aa1e4c30eaf8a3c661dd8a4baaab2967c2659ea15310584381152f1f7ef806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e33675458adb58dfeb0136d993904e21
SHA16bf8f1591b103e7cbd47ca597a05442ede2c3b66
SHA256862c1854f0a77742a53e96acdc507014cc1c8fed0cfc159668fdfd1f073a57db
SHA5120927a88586df455e5483a5e6ff60c2bbcabb98a5ed3bc60ff67ced3598b87639dc423a7d863edc698b08ccd8ac5388289699db8b4bfe489fb49dedb2cc9d2651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af2d1f8d4b8e82fe98a5cb4d43663844
SHA1d3c2eb3232b56ed00d326b9cd471555730fc2787
SHA256c38cecfa67fba56d585a5be3840cc31db889ab0e4312fed4d6aecfb50b84c038
SHA51245035daab77e81fe8a5f1a80fa9acec544ce25030bb1ca83590a27318ad0fce1e003a8a7ec304dc5810579962643b4520acc980b0eab8cb9a0313ce3cc99aa7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501677c8afa4590e32a3ebc37579689b2
SHA1bc3fc550022e30c9dc758cfbb63ae95a76812c7a
SHA256c4170fc5d4c7f947f37a82ecce7b502320ee5a71f3a0d9b23dd022e5e9abeb61
SHA5128820aa79c0ef4ab091e8545e4c289b26d0823d6d65225e43148c7b33f55f37d68e60f9ba6b75837322c972fa1d795e482d41c11cab77d7cf54d1403a3497ad38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262af05b7f86f43e4d40ecd19feddf07
SHA147a1a7e43d13999f7c3253f23a859aa3f6e59efd
SHA256bb2c41e8d9c474c1b49e6fcb93843b8e9ed651809b14aaeb9967bf0df98844d3
SHA5121852cbf804e3e2af1b74544d4a71102135efbee31c67a671d33e2bcebf19b262ff935690aa5dc09da8b464b28355c45d1c4f65f00773679d7c901811194c3889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59afaa929ce3f17a9dd05b3a1c4ac7448
SHA133d0dfba83c7afa23ebb0cbb66e95e4deea83983
SHA256d02559e9fda155682e6e67bac66c51e00fb6113011204836c7b37a75f313d2c6
SHA51275ed4f784201b16ec1fe59f6fbfeee514945354f0a48a16614951e16034215826cdc04edad21f7603d737d071c6e4cfe90d41c27b9c6daab66b3075f457cbb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5220d4b8cca8f4891c828677c169abc9c
SHA10a42efced4b3fc97a598f4a9de78873333ef6cca
SHA256338b633d056c3f82eaf68fe204e5916faac58c5b81b305587edaaaa2ab46ab3f
SHA512e0c44b3bde6e9d8df5dbf93de1d11acd418e05484d0ab59c417be46109733bb23c312ec5dde8bb939fdf03ab4fd2448f7081e97e6e9a20d4dd0a32afd0f0ada2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52043e688aba5ec9f99582df9351ea5b1
SHA1a420a7373520a8708c87019aadd3dbd53ef09764
SHA256779c71020ae0f6d64582cbdff596d9f36aaa60905214b3df7bcc027e73240cb3
SHA5122a4a7ed61986c548880322bc79b2776c0ee93db69524c7d3aa76d15d3d3ddd7a53fee206a1636f7308e7e61f3e2fc300976a50db4e747d48117c8bff4de45a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df432f96e9d1b7fb6a5c0ee474d5fc74
SHA1ba24060a6269862b6b00d303ecbbb9dbca683e98
SHA256edd95a637f2407b34473cb4b3085edb52d1352d2fe3c181bf3ccb38fd5f00aea
SHA512698d6572ad9e7cbc5698e9e587f22d2c8a6d5f6ffd585b4b35f3c5ae17cf7809552d926cdbda0185da0e0ae922221810ef5baa120ff895d18fc1bd1c5bc2ef1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52acfbf9c5cdecb814aae295a2ecaa9e5
SHA146511eb82e9782010be854f7541ac18ecd6368ad
SHA25656a0da54166303657c54a623f68efbf3a72a7bf10abc230746c23aa0437ea259
SHA5127aa54efc549bc0d347235a09385d9751dcec0c782a15a6316fbbd3c07ce4d3f6606bcd8c6abd76aabe46cedd84858fbcc8f3fffa6cfb02ef4b7a998e6ff5cd20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5624dc5b5674804d16b0cc9e608100500
SHA106ac8a2341ade78d3111cc7cbc958de26893ec1a
SHA256b40628a05d799ea5a90b755f7526417595d61497b72c06ea9392813c709f9383
SHA512cb9cd962df0395df68df1d30f4508d3243b30fb53a122ee0e9c4302af753ebf0af837cc9c68199cd3228bfaf494be397e7913cd4890f4a51b2a04a77e499779f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a