Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
63d3407e002ed94c00e082905764fa57_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d3407e002ed94c00e082905764fa57_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d3407e002ed94c00e082905764fa57_JaffaCakes118.html
-
Size
22KB
-
MD5
63d3407e002ed94c00e082905764fa57
-
SHA1
0f12f5112c75ed7fce10ba0f1eeadcf089c58891
-
SHA256
2bc1d89f51e06f4353c945b241d64e00c9f5b0cbcc94b6cc7e770ffed7395e65
-
SHA512
957de28dea562f3fdf089b7bcfa7be7680fd2a06813d217a674577cea9e8f750706b4600979ca7b6b67696dbc855ca2a764ca8f821f94a1573eae8030c2e3b0b
-
SSDEEP
384:itpULzw5BVszWXDP35MXIDfj/3htC8Rujx25PmaT7eB:QpUs9zPbf/xttRu85Pmy7eB
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0091846395abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E253181-1788-11EF-9511-66DD11CD6629} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000400d33bfdae2c344a6e4d8611def7d37000000000200000000001066000000010000200000006f77930286b150031fee23803f14b35ed8eee57825504edf91bb2e420530f742000000000e8000000002000020000000ae2701522406024a4a418ef5f63b23ac0a76a01f46eb0530aaf665850229f52420000000e6d4cbfdf0cf6cadad9ab695d0c77921c5bb38e307506c90d3c8657c63b7a5784000000084b2a021f266373cc01e375880df060a75224871a95b8d20d646dbf588958a2e4893e86a19cacbd7fca124a558ebca85295bdc9a78d4dd1577bc8660f01d0c1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422467943" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2008 iexplore.exe 2008 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2008 wrote to memory of 2236 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2236 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2236 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2236 2008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63d3407e002ed94c00e082905764fa57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d717a46c8b58fd04dbccc7a4dfee00
SHA1a6e1d2d52bf776df66a18bfbe4c563c47d7bc89f
SHA256d549a6961706d37ee152c03778715d270a8aaf146d19a0a4dcc77f3577c74680
SHA5120dfe14898000dd96b1d845468899277a1af01ffdb82b72486914a7730f85199dbbc6407acbb376afea5b72007e15aea836f3fcb7e54d41baecfa2cf52a003a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521bda38e1cb9475814bb423213b9c5c5
SHA1b1d11a0bcfa1a20330b8640f397a371e2fa1f6e2
SHA2564d86af437dcfff18ab8b0bce0e3646f2657f072f697e0ce9cad11b2beecd338b
SHA512223acb71ab9571768c0b487c4f5b3bff8aba9b368c42cd6ffdfbbcefaef83b97bde6d06a68905481c2915bb714bf9b028318f093b25e627fd926f8057b7d39d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537ab5fb974d4f8028ef3e3e894ecf0e6
SHA1f09c3f6f0db8b89328989d342d91f6e6c47116c6
SHA256264063a6cfebb19eda93792f994326a3735faad5408b0b1e9d2e5daa8a6ea1ba
SHA5123a59c0ab606da7bc8e80eb5a0552c145f6542f9ba898b138e082de20aa435f5f64b5cc318a5e53cacca53be53ae6f3846e1a5933b4f804e61605e363f3b4b478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520813e939dba7b63f13c539e9ea3d407
SHA1d513de8f87062aae57c88c4820f3dc7b4fed7585
SHA2569451270363120d55b4734c9c37cd3f9acbdf39bf7f05b2bbce5b5afdd8f8f0ea
SHA512cbc6d9530ae1bc09e23351080b9cd9922ebaa16db1d93073059d1f2c60ad09ba7b006a1878298e8b3f9ddf0a7a66bcc29e82d333b56f252282b847df818a59ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5713c1ba335eaa1f868f0d51676add5eb
SHA15fd12db02e8da1efcd0a5c88da3aa6cbd53c4766
SHA2567dce702c6b57218f7144d67e54381cb7f4f2994793cd19810fc4efc393dd7116
SHA512f142c677153e3fae6f8dd875b785d35f8303a1e75485c668e99441ad2ee9eff23faa169de44bd2e3df6da25a14261e2c535f1e6b3e0161aa53da7128819ef13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb72c0f27089341a0ab4ceb1ceb2e5e
SHA1403d38cf4c10d47e45e2330db5a8fed6698acb5e
SHA25642e1ed55a8ebbb10edfbdde55db6edaa57cab94ab959757843cf2c4d4f00b8b7
SHA51238c54bc9c77637a484e57c59fb480826910625f7e13cc0beaa39ee54c623e625a41303141754ce0ba67eb447606a5a3767837f6822aca4316f00e90d0814cfa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528322a0f75e1fd05bd996d54d2693832
SHA1551c11672bad1ce1c558197ebe9880bf1d571a3f
SHA2564e73139e93bfb1cbd73a0c545ec0bf339bcd0f50c73d1b79ab04c37c22f533a8
SHA512ae8b0e5ef6282bc973af8228a71afd91d4164ea293b4aeefc182e1bd83957f9eb559358cfc8d411db3e99ac29b21f79cfc5d42e17328beb3ea0775c07a8536d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c37d66859bc07a6d388b1b474398bc3
SHA13a25738f76368acef4b80ed2d72a5c0c9a56e3c1
SHA256802ea2c8308ed3ec7e19fa907355d61aa20e41b5f71a95f55c4eaa5b50a702bc
SHA512067e481832a851d0abcd4b05073867ee933000146b0cddd04515e57847464e415f790324cb9731195f0e68ba43758bf04a748b340355973f88662ea16159fbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d26c78bb8f46fdea9bda3175212f91
SHA1d9c34089dcc7a012d85166707a385964455005fa
SHA256e740d1c66d57aa03a6d897c9df185f2b440a20b2e5736c3a64c584a0dabcfda7
SHA5121c07b860fcd994c7096bb2c885f88e0f422ed76f183758f3d2a14fcd6ad0cf4a7e5f697c97f450d9a2fbb4e1e06f4950296bd9fb5b5902b88d87e7593e3d9f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a9e96780841392cf98dcf7824ae08e8
SHA11e4ecf2e76edfb6c302bf72d21ff3158bfe03e08
SHA2565c52a6a1d7be9df5b0fa649b84d745536011ca4ccdfeef7ee6bd60859fee8272
SHA5125fd50843bd6b03c46a12dd5fcc78cf589907131b0af795b7116da241acb248d22362fd35fa6a4a3d3b9a720a654db3e108b8adcb6cd20d43f640a305f6038639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d263ffd613de1167630adf0a78c80c
SHA119c545ea182202f1274a07702df10c5bef5325cd
SHA256a5d4eb79c6a45487f245415edfb8a2b0724f3f87cccbd3521edb2e5dbe159b63
SHA5121b5da4272f2f14750ca682308707fde259230c0774d16a08b033d89673274f197f64b0fd1e88ae795fbb1249dabbb098dfc2cd0de381c30d49bbc119bbcded86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595d88ebeef7b20651808e3b194964209
SHA12c56fafe0f0a9ac196a357a5c8c9b1257dd62a15
SHA2564cbe44c8b880cb9d67104b1c328ede389985fface5dffed0f9efe2e27d5da289
SHA5128d5e2b72ef218dfc77597b0d9709966673395b87c9be93c9d819c742323816873ca4de7f31420af796d8026ab4da5d705f6c78d41bf1eee4347a2729c0845931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5345c4be8d4bfdce26f7a98c1f558d156
SHA103aa4108c09bc1c439c0bc0742fb8588dca613ac
SHA2562d6d5203b835e2e7f39dd52879b8f5ab1f72c86ca0eb32a92dbe82debd4b480e
SHA5126eec9c8ce7082847327baa31e3f5a96d14fb6df9f704e3c644b86a66578df2168531e96e14302b8077a4f5910113407cfbba31155b2db5d8e9284ea493d4f3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52123bccbe36d1a567c86f58a03851122
SHA1e4e8d276249016959c2b83000a7012da01903dc6
SHA256cbe033dd6e8e42c82aabbee8e99f2c8315b732a43340630d0af92f856ec09e0f
SHA5125aca54dcb5f395567f214bfd19a9680f3eb1195575ebafb61eb2a70a9787534473a26167f2d6c95ee1df4a107c850f9489933fd02c8ef90b25884a98bae3b28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13f2089ed8d2b25f1cb5a521196fa93
SHA14a667f39c2b835fa95e9c246b09cfd32da02c6a0
SHA2562863e33332f35349c5b1323e45402c516c269934c04f64a99b4e2b471ecfeff5
SHA51239e6183456d4f2158a5979c34d81291af63c73b0b093954890dc806e341688f7d8d668a5dd0bb0e51f389f925b3a5c38cddb0e7759956fb41f732a4e8d4820c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cafd7a18249134f3d05a535b2cfb9404
SHA1fb87cd4aa6dfc3aa48b650490d1cae84783b8209
SHA2560b9c85d87be84159be4d4fd7eb5c3c1cd2d54cff1074e0f296d2b536c3b2f280
SHA5123e145ad870cdaef13e6d1e3641f707c87bf463e037df44fda1f336df4c42795d3dc62807448e2c87970b1e4b9f4d3477f766d24b395c0ccc76a532588e7559cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee9f6db181cba515699f3fac3edc0669
SHA17e71092804071b8d7c9e6e1ff91e5d7f1ebecc9d
SHA256a91e15d1a0a2e1bcd1c0cbd47a75c6923720b4b398f92c6533b8f03e1254ef50
SHA512c486783f7b99eec88324316ef55743a168c3d29765c083e39f3de8eab711654c5b9ecea37b6734a34931249da6986f08480ed7a6e0519601e5d827012593edd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58865e2a50e340a8e8616d42837ec449a
SHA163defbed290061a7c4433c66e7774eb03ca33005
SHA256b39d00ed523a6fb392c483c0e1583655e6b3762925194210c7b330c0340bd6d8
SHA512f3ffe5802be06f899728f0d5dd62c5edb9cb0429996ac5326b96c2c1c13e2dfd25881a3e408a9a3e1b1f1825d8560796011c7bd7fc698a2c4de728cdccb0224c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf959e2162c9e389707bdc3e19428d4
SHA170972f191ad2b45e9ec1758cde0e7cb3df9c1581
SHA256142a6f64d5f41a7ad11809e903e11325cf5e7956e2c3394488a36bd237e52f8d
SHA512639ee30da38973239402cb54a355b0c83bc763e4e1ee378d727512774a57da50a1a9755093ce88e1c46bfb895234aed474e4fb787385ac20aee2ee662173475f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1cb54a9b3415ce7edb335dd3b740822
SHA1c5e93d16dd90ee9a005590830eadad30da54284a
SHA256f7ace727c743a39c79681bfcca548cd13df5af2490b0d498b377644651ee4c46
SHA5127f5df0b36096b04ce3fa226be341c09caa7b840934e2e821e3f6b640404acc53d8cde4d9df8241fa2b9d3dd7d80c28eb70e57fa0f7d4e2a2c1729c67ead59b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5027dbb513562ff76e0f7b9b70aaedd2d
SHA1b6c1bf6db870bba84ea22529786a8a512bb27607
SHA256ad6fec2e09622d047031865cb32172a58efa396d6ea6887817d7703178e392db
SHA51294c9a485ffe28226ca238872c64fbd9ed014fd4f7b4fb8729dc0dc84c2841e8960797f2728959ba6d7531638edafa97b21dd1d186bdc7ccbb27f3fb8d04524fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a