Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
657bfc81e70d589ec149e3e908a55a76_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
657bfc81e70d589ec149e3e908a55a76_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
657bfc81e70d589ec149e3e908a55a76_JaffaCakes118.html
-
Size
21KB
-
MD5
657bfc81e70d589ec149e3e908a55a76
-
SHA1
59c58b0294f86fcaaaae990c2b73f63a7fc02abd
-
SHA256
793d34b279cd949505c687a89f8006e0b4360fdbbe2775464f57421fc17cb8b5
-
SHA512
6cef5bccb42a50dad916971ea8285b6a5b74ad71daee30da004823ec6bb57d10fb078862f15e8424b6d64bbc38c602e833644d0167f3ee2ce364667f5d77a63b
-
SSDEEP
384:4su7sQ8AKAq1GNKgKP77s48wWAEZuQbETeN1H3cX8lt19S4eR0Z74vZQdsk1:4y5DR1GZE7cE6N2nar
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009d95d55b4babbcc8002cd75f5a1db26086395dfb369a6fd790c9bcec20472567000000000e80000000020000200000001c0b3d1a476d8cd17c09454d44566cfa2c227590b55c50566e357b4e5ce74d93900000000527ad4ce647f811eeb0f72d7a6ee722eaf0bfaec3410a2b945c2b5b4e4c1cb5b822445e2aa6312a943e33d479b9a51ef15c618e81c645fbe7cc92a10af2771b732266b9a4a1601654b54a688cd69bf0b82f87e5c491e39975988828fcb559799a05fbde67d94793613308b07fb5dfb884b1dcb450f823133a3b83b21030852148f57b4cefef91395461140e302a576e400000008c23ff214ff8af3009ba42b96509d8ddafb12fd8bfc6c82d125d6ccb88f8895384886c57b73feb211fce244162a1cc86d1427e91831187acdda63aee09777c7f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000641acd1c10b415c3957d6f4ee8844e67876acf6c1b2e893aa3b18e8223063a4000000000e800000000200002000000087c17d63ffee89acea79698dbf2d891c128327b065df20963f8c1b0c5cd7e60d20000000e4968a07f11428978423a00657e14a7b3209c42a900ed4a9afa7ab54cd4967cf4000000091f53a42c39337dd7b29397a69f557d4ec1366dd628c35308e46a1fcdf303252c0965e67e9504e0d829c3829d0c2555299a79158880cc82715e3ecfdda17ca77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422502390" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3992881-17D8-11EF-A759-F637117826CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80712198e5abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2028 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1700 iexplore.exe 1700 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1700 wrote to memory of 2028 1700 iexplore.exe IEXPLORE.EXE PID 1700 wrote to memory of 2028 1700 iexplore.exe IEXPLORE.EXE PID 1700 wrote to memory of 2028 1700 iexplore.exe IEXPLORE.EXE PID 1700 wrote to memory of 2028 1700 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\657bfc81e70d589ec149e3e908a55a76_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1b2992b99ea41383436e3001c1f62a0
SHA178701f290f292ce62ae729e71f88702e600a4eb2
SHA256a1268454600244f5083b904fe1d1f0981ec3e363dd1aa72f3e26c1a40a97583d
SHA512b4f9b9b12e6c2549c4f9839de0d04209105d98daac9dd038b70069961c56b14d6b09e8570d4caa3582549bcbaa47cfa9e54bb9f9dc274dcf5e10579a76fc1074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aaeb7ba62aeab95a52b2d5aed8e9191
SHA1959b4e4cc127170f9101dfddd9b20d177ca82092
SHA2567f118081e93292d8ea54ffa2ffacdd07badb98bb37947f5bc4b2d1679bf2b8ab
SHA512f155a8280ca25d231d74e34df7aac87fdf41f1c69164c54db4f337915b06bf18abeec00bba26b40fad990eb7732b962e2d20a7dc03228b77e90b784222c75e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6f8bb6f8c7ef7dbe75270f3c254451
SHA1d328271d4bc97b39171496e9aefcc8b0e258a0e0
SHA256a4da5edf6e9961390f78ed6d52300add44c101c3fc63ff7fbce859ad33034c7f
SHA512b367b1610a91c7e49d57eaaa71a6c3c4f10367602e13dcb99b8cd696f381e66e0ba2b6ad0c512ff920627ec3de992ecad44d76ded70f2e59cb3848971a828072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5666f3350dcd03d45e16a7822a3981ff0
SHA1418bf1d40be85e6da726923775ed5d7543da7b70
SHA256de535cfaae1135d33e67e5dd25b8399eeee9e863b0b79d626d3d90c117c139c8
SHA512fce9c11770b566b35616b2a203524331e605a7726e12e3456999b3e880ffdaab4e07d7c3693fafca3e6cce59d975b74991716a7b2a7d99da7c975389acb86d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc5efd8d59af53f4346cd64aa83bfbe
SHA114f00702a638fb9d87116a8cb2f9b848651757d4
SHA25614b6d1fcd0f583657238bb7d1f07181d2beb51cb6b3cc02cae33c506747b4f4d
SHA512ace318ffe6e559c59f4fe21cf2c095feac27c322ceae072312760941100b10ce2b163eb69e644b76cadd8d5e072cdccaed36a40cef4268da741c6787d431da2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d43749e9e6bdf1b3606b96c1a021f2a6
SHA1785511e14f84299d7e8fa6c0c500f160c6e0c7eb
SHA256083a1d3d0a54ff70ffc9c06c6a66dae9ff83c68f508562682d65eb4a6109642f
SHA512db56ab3e4cdc1c6f3c7eea998de6dbed77c6d88601f45eb661624ffd401d72cfe441d15f66de15cb932de96999983102de4f4f93787162c0382224daf64d3248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fd21fb054f460325031a73680983153
SHA1ac923797ebd22109aa78865b86a6920b84e437b2
SHA256684a919be2d6a9c83e3143b31a26c123dcd5fb29cdf4f95d1f85a38346ad4d09
SHA5126b1dca904c2abdca72dac0645e6182d941925aeb8b7a4f51527c253a64b1bed21f249c2fa844775e9896d57bfe65a868d41615409330d2091d26ab7e342de12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f5d26d538678c8f22ea64bf11a429e
SHA1f4e1e96e3ca51df24d6ec717481505e4f8a48115
SHA256c65251b5254c8b7cb54e1c64408ba4c23359622d6b672f297c37af25ae680d1f
SHA5124b2d93d814310baf9279a8487c297ff3042a2862aa2c759cfaa3c59e7745eb32b659462b857655465ef67a1f02bbbcc66f4dde08efceaf43798c8f0c1b0adcd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4621700c1aa6c2d1bc1fcb332a899cc
SHA1c6ee1ac966f6958c782904509accb1f7f13b752d
SHA25656c482b100805749d23e5026e181d6b4c715d322158c49f44a7859b8e8fabee7
SHA512caf3a9d79c96055466cc4236140e2c77dfe6517cf614a701cc9d52f6dce313523dab59d1fd70bc2e4898f491f3885d475c790db1595245c37be4ff4ca7dc99be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc07f97202fe3a47a9bf6cef25688ff
SHA12dbf7a0f926680602298f4f596d066c3f585a31c
SHA256cde8052177eb0129eff57b78af5856d904f29dd748f576f683d8c7955aa529ac
SHA512dc9f1026a2ab1e69902e4aea270c75aed9e7091985baa67f6a84062ebb995f6077fdd097b87b6635732b59ab9013360f9af5f0cc8ee256ca813d8fc1fcbb7c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574612da86d930dad6ca4c3127c9287cc
SHA18a5212f132d496e4d9a9cd5351d1cbf2e9c204e3
SHA256c9c2cc27e41e6308c6e79b7559147c6c0e8c9f9c2a25a275e00210e43495b25f
SHA5123079fe3b2b47ed841fe3e0edce3d59487719a4b7af0e2faa2a9af488366f9a08706b49c1f25d4e05551ea4afb59f807465487380fda8df80dbf8295c84cf47be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55272a30f90f65ce6917cea1795b48402
SHA12a6c8eeed6346630adef66e9b9d31a70582e3767
SHA256af452edae8ca92cb2f6e97618ac3d8eef274942d3c51f6c433022ed9dde27512
SHA5121448582c6c7281efe72f1c8f60017e9b1a9098444d66fa7e6d2b2aaa8a077c2721d2ba3b7a07e4d1a08ff82d72b7655d90d8ffa95aa9239c999ee932a89934c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6f303d12b9947ec30c744b1c1c80dee
SHA12bb29aa1e975d2b87e94cac8e94a100246b379b8
SHA256aad22148dbaca0e03f092ecb2dbc9f236dbdb86678a31f3d7ea80c8c625c7053
SHA512eaa8f7bdf3777be5875e1259c3b75b2ac7dd88f783de710705a096f86d8b823173c358ff335edde63e8ce953225a5550a725b8caa555336dee2a322752ab58cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb48604c247e60af163af55b1ca6d232
SHA16b5da73e380731d28acfed0ea9d5c5d11a573c39
SHA2561b049be5adef70842a20a63d52288559111c411faf3ba3956c0833f219b012b8
SHA51266d58890fbcb384c82c9ca9669ee981ef4cfb9ee9bfb086d78b52712ed3875018a9b1b04d1da6acef03887c49c8d6a12a8b0733360da1e6cddea09d2e8befacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a2d0599659ea9f6a15f6b21238a306
SHA172bcc18e6f786cb4fecb167a9957c650cea3dd69
SHA256c62a8d943497d3dc8df01cae5e19155d3c86a39b6a98bd0842fee41de5c45acf
SHA512b35552952c47a3527a8da245e88a3a425e7efa477ed05ebcb61c81266c30a814087eb68f7268f1f7eefe0944213738381fd71d325776c1425b2e7bcf6913d0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58725f531d9f31b8f86c1b1aeda7fc128
SHA1efee5e030a014e47dd4bd05cedade0f58f1862cb
SHA25641e972ba39accc6eba83285a0536928e83c1d523c2ca98039eb21f54b4bd4ec9
SHA512477586a2593c8e85f025e29e9a449b21d8b91a7f61a4399ef39cab3522c57ae7ef5a1ab424038a7b6fc231f488bbc4f6b78a89ff4a3ec0288cab849fb5de8f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda3f2f037b938df77274cde60f33a69
SHA1f3bc55096f63955ff8922c6a36d32c416aac2758
SHA256175a682a815c220bd123a16e7122467cd0976e5064cbda5eab55e58a0665df28
SHA5127a0d750087e6a0fa4670f80e636c87a52e920762c47056dd0c4de0f207b3ef838fad472e2e0099f162eb806457e1345574f5303bf40f13769e94f7b279c3259d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeca3ad6f7a9613d22d59cb42f975028
SHA1d2f6ebe408511b8c297475da89d076e32ef31ca9
SHA256d928eff4d716039e66afe922d48a1ad0d7cfc6ce713263a03f1e04bda9be6985
SHA51263af50db2fb200c4806940a4d212f0ad59934510e5ba8fc331694d13de0cc24b3a6fffed384a493dad8821959c3b58518a6c1b0ca0468784b9bd1bf5b57b3ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53af0365de32450395b80875a4260dbcf
SHA1f90450de438db5bebb97a7bb18eb9525ee36c7c9
SHA2562828ac4e2d01597466401f7fddd5e8c65f115aaad5fb324a5c5098f8bd6e2aa7
SHA512e24e18b7c8398076deb0de2e5bd17ce3e4a3f518a16d379663a3565e4c574aa59c30bf96718ce271a4db3dda3c9ca3425ce5b6371ec95b9ba460e325d3b8f09d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a