Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
694b39e61ab7dfbf9c0a09b80678851b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
694b39e61ab7dfbf9c0a09b80678851b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
694b39e61ab7dfbf9c0a09b80678851b_JaffaCakes118.html
-
Size
23KB
-
MD5
694b39e61ab7dfbf9c0a09b80678851b
-
SHA1
78cfb7a8701dbfe5430e0bae92ff95123f628754
-
SHA256
d89c4e0fd91d1fc1deaec6ba6d89259b5fb3331145f6e4fdadfb4f4ac2e9de97
-
SHA512
8ba1d1bb4a982a1d64193f4e8e8e3ee5f3bea000ab5bdf1706f4b3e051bd0e7cf2dbe729f5efc66acad48a5c344b4351446205d06e6984fbb582a59aac0a4e7b
-
SSDEEP
192:uWTcb5nIunQjxn5Q/7nQieiNnenQOkEnthdnQTbn5nQQCnQtowMBCqnYnQ7tnSYr:hQ/Ek68g
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0049f1efb0acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B4829C1-18A4-11EF-9DB4-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b051cc4c18b43009d88adc038f1753818e1fabed3e751f376fe134e25968c6f7000000000e800000000200002000000046353ee6690e9f4ed602984aaa76823175da7eeaef83f4d12e5e582e0b23f372200000000da3a936992eb791720bbc03a82057c093e1d2d3651e9a8ef7abc9a2b21e7b7d4000000091b502c4514f1ad77cd8ef3d124483cd2e4da5c92201284f90789bf3a4c9ba3789d25679fefa1e91ab7dd4d3695245f2883bddc5a0cfcec10ea1e24c0eca9066 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1192 iexplore.exe 1192 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1192 wrote to memory of 2912 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 2912 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 2912 1192 iexplore.exe IEXPLORE.EXE PID 1192 wrote to memory of 2912 1192 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\694b39e61ab7dfbf9c0a09b80678851b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f4789b1669c98384b2073984ced4c4d
SHA18d4d5513ed388745112557005093f0b91a1d086d
SHA2568e55ab9ffa95af70f1a43cc5bae323e55983402bfb8d5bd9c3dc1f6d522a5479
SHA512f7e56bcbab39f537b2b316b50549d1ae1300ff7c3449d9c0df78d77d0f6d6ad0b987f5fb6fa33a5acccf071d65e441428d53f448ca1a0c3253aa1094332da0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59483fdfbfe5680db9625c91b027da71b
SHA1b7e922b19d577c8af69a581225fd03215c46b033
SHA256ef7676247c3c280f8dd17baa5c76a8291470bfcc421a524647fc7266e89e59a9
SHA5122e530c8ab20eb3fe403c1ee43bceb5ec50bdf887e18ef7df71ffa492a404d33fa9dbfccc52fc1e58bbcd1bd909a55d03ac82198655467eea9c93531adbfd5e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565ad1c05fa61bea63771dc151627d428
SHA1ca0e0c88040e257bde12b422d100939f606a9b04
SHA256a673227bc5dc9582585e41020c7d981a721e47b62e60c319b8f1c1bda0a542a6
SHA512845209e99b3b2372d34662d36d1bba0d8fc1320f7988938dfa127783828fac1e3e3b0ec5cc74aae4546a82f27e0a326ae314405ebd5a305828fc63f87bce31e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2d96010bd93485d3e4d7c45d40865b7
SHA19a8e9b30ab90fa0f6c12b65d4ceb124cece1401c
SHA2563e7d8d7fe63fe2655393dc4162eb2578887d4220d4bc094771c2fc0754c8df57
SHA512a686e011c5a44c39eba14cd604f24f33b68e9d97710049d708282bfca6c4a5c147b64208bed9b95919e85469da067566181d28ae3c914b9b416a4f0778e96721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50932fd5ff990100615e39558263de690
SHA1c0a57d8892755cab8ef0cdaab8a9038bf3520f21
SHA25634e6723324b87fa95919e59b32a13f33c8cc3915268804916b4e36e9558b2eb4
SHA51278a26a255b64e38a650e1445e0ecfb98004c95289b52226e41c8fb20309556784b6677c98ebd85dbb8fc149eaea2cd6d6e0ea8e8895e13e43689d33d326b8e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53595238d2c1b8abb67a8a40ef1ffc783
SHA15a81c5e8bff14a62fd3bc3b8120a5b7d93481cfb
SHA2563d1f56d21158bfa80ccc9cf0dc8c4347fd98d0056dd7e33bc7c2b37bf84d5b16
SHA512b5dcb03a6363bc9e899a328b79f880b2e3ac81186c0a34252e4f8913b98c0acb8ed16ec1320fe03fb7fcc8c92f38583e43dcc99118bcca79e8c655fecfc1efe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d77adb564482c363d9c65f45baf3453
SHA1c0125becb5cd569c6c04a0c579f611bd049016c6
SHA256bd12c9609cecbd08dbc20bcefc4f7f066d9909b40f991f6d1122579ffa43630b
SHA512f37cba61ead05e8d6cbd636ebb19434455153cd7fcd032b2a52566b72c1c22a9816e6349e86d71102bd5bee02f386fcc631a8e4d43e0c4ed95bc332c1f4dad9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b7f6f84c5c1391f35ef2719f6ff945
SHA11b2c12de3f5eb27d130cfa0c696675413e8e6570
SHA25698e4ce18eb51779b154abf33c567e89039a9f818ca570270d53ab200935576ca
SHA512b8b5bc76bab68d0bde14e3fa0f0bb77b9abe451f448b445f6d3789bb082932e6d8a560bb76535502a220b5c8af4070f0795e3b6566760f649c2ddfd15c2cb41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb96d05a75a0e2be7a6a14134ce82f66
SHA1b89abfb62109a7ab5d9b3d8bca44fa917237f1f8
SHA256e92ee6f0254c7fde629258c0f509ecd4f376078ba0d493c7a1504ce83f565370
SHA512f50ab7692727d352e8020155ced1888d1a37494e4c711b930e6b7a2cb35ce9227ef24a6b11c55effe636060c6d49aa646cb9fdb906d118e102617f24ede131bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540aadee47fd75d0a5ed20344db35461d
SHA13f1b23a21496e3a0832556027a3d72e5c60c446c
SHA2560585af67ec558cca8d4805e47004951089e1a693ca161bd99a81578764e66c0f
SHA51200287060b7b9b5ee7b5673c1bd67d74be8de95fdde7710cd47aa67b4525e0f0149935e318c90232fc9643f9090eedb4ff62e95ca5f11adb4c99ff0bd060deb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b64e2435d08a708129e94f421797976a
SHA1000a0d52cdf877c017a7315c95e4464c43650a6a
SHA256be754d60b34676cd1f218bb12dbd775bd73c0847a69ceaba93385fb9ac45b9f3
SHA512b7f4cc3b9d2f4f8d22e7f88d972e7a32bd48e442b4d1b8a1f3c7740918563c3479b286ea88ea63e21849e1f0a93a6767c3cd4941f4a99c459b5030864308dfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c747708164121bb833745ee00adecf4
SHA1f662aeb1fd17fe0f96b91d2d657e5c8a638ab7c5
SHA2566f874d79d67b4e030470477bb992ab4558a714927e7a3c3c9d6c11d5ff8a10ed
SHA512b2a7c1ce352d6e66865ed01d4c307738b6e1740b98af588db561fefa3a596f8736d77494e9d22e87010ec970741b6e67cc3688af93e98974c813699866237d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1325ec2b392b1f917b441f66ac387bf
SHA1dd06f155a9bbb6460e5bd6697c6c01d1ee91554a
SHA2565fa9bcb6a1995de75562ee14a1cd0faf7e742f70deb6340342f0cf838fcffaac
SHA5121352632f352268842dc3d4315c543fafdc70abe77d53dd9164b08cbc8bc4aa69685f8f136164690b60b33bbad36bb0078618a4e8cbbc3fe1b086f69ed27e3a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c08d3ba5a747503bdb701a10216a05
SHA193de38529babff14d36e7834c555ca68f03b8839
SHA2569dd94174b40fef5407d2e43eab590e96efbf161e43b784794addf509e8814c61
SHA5123583116c5840d4e1c74700d563df68babf720dc7b64a8ff7b568c8bc50bd0f5ab7651c26c13a5229ae52a15fb9c08ce95e3390a07d25de82da89d44573e6b4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e1321a7ec3c56deab1ac88e7f720e1
SHA14f7dec91943173fb4fdbbde2738cdb20b8d24bf5
SHA256e92354fc2356c866d979782e0a96f4ac89324b29c83dc8a244f76a70ae5c2ebf
SHA51282ddeadc4d1620c42a619efc69d237cc7fd772fa666d78937aff136990b669e45094ca196e1f4af72d0a5e4716a750cc7fa23c6ea2fac4934a4cd76b6b36bc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312cdf2577a9531a4d22ee5ebb5c393d
SHA146412e42625c2ef3aa2f803f7b27892d5e260bac
SHA25624c96ed6021c3063cd7f9e026fee686c9883ebcbe0a073f481b80d8d561a45a3
SHA5128ab5cc939fd6360fc215012eddcf62215073d3713f8166460634781159a07e05dd610ee52e324c093793e2a98fe025186f981b38674f246f3cd17e95d754bb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d648085bd2dbeda87c9a576460a06850
SHA10a9854bfe2100c8f153dc0bf9dd4ec9fb9c2fbe4
SHA2564efd469f6b806cd7d241d9d508824fc1be366448df6fe94c872f86643a2ac664
SHA512cc1cf7c14cb72fd08f3cca0d3f729b9114409cf5ba774a9184d9cc5108ecd7f7e3d6f3cd49b989b5553d2cc071e0efbcdeab28d8acb05b5d1507e9ed17a6e83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba312243ce5d46a9eb502873a2234edf
SHA13c91615e82059caa24d8a12ef1f3959fd22a0c24
SHA256e6568ee26baca3a6a63577fc3514574f49850869aa600e3abc18d6c8f726d162
SHA512e75b269693ec3b55c30f0256ba860aab876364e8aab98e51820f89a5d87a3dc08a2946db646375fdcccea944b2dfee038c066b820fb8eef236bb86cf169fac19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cd7cfffbba4ade8b9f8242767946761
SHA1d8861af71bdf8e41ac2ab5b422ab29d4c5ffed4e
SHA256a2315cb8d0a25bbefae922e58b4c651e04268f00e5fe7c0b1e6030459b91e662
SHA51206bcc2ac889b15b6681febc94d8babd81c759c5df76de26db777947f7e1d82ace84fbfbe48bd09be8c57cd6210834012a53979e664ad1a7c1887a6c29944244a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a