Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
70f807ba65e39585a85171473778f6d1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70f807ba65e39585a85171473778f6d1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70f807ba65e39585a85171473778f6d1_JaffaCakes118.html
-
Size
139KB
-
MD5
70f807ba65e39585a85171473778f6d1
-
SHA1
43c5d0a6649f89ad5a77441ddd7a71e16bc515bc
-
SHA256
b9c2635b4262303938e726902efd30088ad43ae2740d69e30cc11f485721ab83
-
SHA512
bbf3f4c324092ad28819c806671911106db127c313acb3b50778b2a41ac98f3771e61267ec7c4eb3c73ded68d7e6c9370724f96ea3709d54f19fa23bc04ebd6e
-
SSDEEP
1536:SANXRylq/frFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SAPrFyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009fc842a47d6ee14ebd988637c69351c200000000020000000000106600000001000020000000eb936590e3bdf7cccf708047613639e1a6d6370e96a4f1139d03ae274c1ba3b7000000000e80000000020000200000002b230931a0d002e49a980207fb398fc9e6b835e7ec52068f21ce1f26166b8ee120000000a2476f614fa6f79c780bafd9aa892000ee5c7825c2f968c460622e61601641024000000043e025ee0631f32163826fb0b90a24fd5ccbcb83b469e7de3e0353dabd16f98da5e2143f3b7f084dc643680da1658742be0d417837213fb4210f10fa93a950bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422776510" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d2421364aeda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF3FCE41-1A56-11EF-A30C-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2536 2168 iexplore.exe 28 PID 2168 wrote to memory of 2536 2168 iexplore.exe 28 PID 2168 wrote to memory of 2536 2168 iexplore.exe 28 PID 2168 wrote to memory of 2536 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70f807ba65e39585a85171473778f6d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41ee8226c8b23102267df8629a70adb
SHA1239577b72bdd67cc231c2e4b5421f69f4afda738
SHA2564d450a0ef7a2dcf491b33417e6456cfe93cba4a9cc00289ffa4b49bb6624de2d
SHA512cecd04282d822b2164675d0f21ca11add73360cd341f20218e10ca7faf1f57ff932c0a8311882a140f1e9f2fb4be6aad0bcb008a1e72c8dc0d51c71c07e82bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517b51cc15806cec735597509a4264ce3
SHA137ab321252ef65424ef7e0fcf557cd9a807a289d
SHA256f67caa0d9e9a67202fd2f9c264ca1a06ba595121558be4761d4ef2a3a563c278
SHA51246be482fa3f0419d665649344af01731e0edd2fedd5ebf583a7291defc5e1525f1a6f9d677616265a602e19024a94f701ff3bfb5b651990afb537cf80cca2d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0aae48c5d71152df684a33d66f0ea67
SHA10da1c4937cbdb65928773173f3d31b93a8565787
SHA25625709d038f6cee57fe856a55dd0e63ecf15a7ee5102b154bb392f300ff986f0d
SHA51247b5baad582e326c60312d221dc5eafa43dfad6cfbbc45eac4a95e8b9a06859e35fa501e14233012ae141b7cb4a803a7ca13051f8870a42da5ab067c9b191962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528c9632312444c82d7bf5c9a3e8d3738
SHA1e622a55702bbea37793b1508268cbf598f6c72f6
SHA256d8e2954c30c12a9ea73761b2aca7067c63adbe94670d1ec347f1d736793cc83b
SHA51261a734d419aea8e952fe28ba2df7a321eba6c7dd63b6f357c78418dba5a2f51ef1edecfc35afc38ed8abdbe12e05ec3f1006849528fc3c8ca9a772d06a6795bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d729c249c9254c32583084c9570da3
SHA13deff1e001bc46e31fc0b97800b3bd5c727ff748
SHA256ec06252bbf214c5be7bf6155da6b88aa16b6a26447156a1ec1c3d1f2ee6d88c4
SHA512c96d4ab51b67e90b790c8be2ca74e881df2d00452b510a071058345b0e2053d4beb5bfc0336fde0c92383c0985589c03325aff1cc25c6dc769a3345b84fa54e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531311712a604043241c3f9236ad2eb36
SHA17ae5a45bbe15f8b2bb16d1d9f8e64c54054e847a
SHA256996116bead0f9afe3a67c89e4e66569320d9ea45d85f28359ed2e63678006895
SHA512daf56d45a689bac8aece1ae2728a605d64acf9f9547fc18263f8e3928686be4b1836fa0958704e2f8b0de3aeb98f8d51f2b589094532c138a167139552037b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c546398926c5058825f7deb4e38e27bf
SHA139a922d3be447331a76580fd07d6e8e5919bc2ef
SHA2561ec7eb5f9882031d6f59251bb0c8b46f1457d0f68b4468f2a520a1ce0f1340ec
SHA512c17bb9553399c91700a0d8faf0f5638e5c9d9996f74bf215847899d39a9d977f912477c0d5d2e8d1bfd9a2b62a40a2d05722f5ccee8aeeddeb8c8aab2c3dfd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e193285fb01e581a104d5da699f8b1c1
SHA107094ee374aec42b81a21c33406e24b1f051ad5b
SHA2569bfed9775c5f023c9d12ced9ff56aa0a1475fe0b0078c90f4925f697b757f1fe
SHA512c124f5a2fb8917d2dbab3352b463a2b1ee5205b638aef23b07290911233fbf1bd2b09f97e0854b92211df4607f2ec457d65a799f9cdbc2a4b29017802ed40740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bcfbb460f881c2ce78b819faae0a852
SHA1e2f139bb14ad8bcbe1c2c2be179636d2d856dcb3
SHA256d3bf8916d5b8d427b663e48e6217a1d546527442945d701160ec8df8bdad1b9e
SHA512dd135ac39c38f6a52cafb7fb022c126cbb0fee24507da6fc13faac54b3d057a223b89d0b35af9cd1479f496e1e947ae25396ebdd89233e1464b86b457e3dda96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907e04aa3ba7bafcbd32f6873a846bbc
SHA1f5fb55469916c233f26139059644d6a27a0740be
SHA2560908afd37edd54652565647da23d98e879577a53627176f43006ef2aa6f215ce
SHA5124994fd4294eedf6ee75bbd93da9a1c33b4358124e2e71140b4dc88e64b97b225fdcaeec9a17b2cb67e9c8b7441695d889279d7f88096d2f88399229929fb67b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff06a691fcff073c5cfd59f08b7a666
SHA1535722bf9b83ae6c22cee614b269f098d786a4dd
SHA2561e57410aad27563dfcf46ca1af02c0ca5401ab05b6529923dad1bbedd5c79fc9
SHA51208c65717d4a195264d5baa01875bc0d2a7675160bdb2db93d6c3eff05a94bcf3f80103cffcdcc3ba657077a7c1d02c8e456b3d91e019338b0a7fe16dcca4ae78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f528910913182c8d9e5666ef7399b6f
SHA1fe534d5bd56255071c06ea7d4632433a69d5127f
SHA25628cd1353485d27063a5bea530837d27a75d6a7e72484368d1facf15d01838638
SHA51227ce22c0d387a9c6184a4b01cecff3a2edf4026d1177e9126faf51278e911934792033e049c4590e3e79df21a97409865b22c816d51782113ee2844bee65da85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd37ba2931536dfffa5b8b3e730b3772
SHA163afe4b9cefe62bda5a370bde64a259fc073f993
SHA256d126c81c9c49008c9ac81983524cf09bc497613512e5d44ef93351c98f4ad372
SHA5129d7a48e94e81d150f4de69e4c42816c52fe701f489f8d79c13d26a1dafc1d6c68f847efbbc885e1349e2898f79946913d09325b35a74ec05fa7f0c6777847a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606e61a761cb6b2d69b6f9abe65942ae
SHA188ab955bebba3e05ffd551089e0ee378712ee041
SHA25674858ca7fdd8ad3f317e44b3b831b7ce21241d357e0cbd4d6547907fdf959143
SHA512cf696c81959aa7bab4453d7c519277b89981ce4105b0a38b54583a67da88170265f9e6934da768b7f3343d9a2fbb3b9511bd948f84cb1526e4ee5e488ed862e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51132827acd3a834b74af92b606220375
SHA122ec71e7a63dbd658d1996e7287d003c2e883325
SHA2569aea222c37f5c8c037d7ef09aa6f0822891d19a1890b6fe1fdcdd64348083208
SHA512a8032b2e6828d1ca4e42e3599902ebcaa93373b751b6ea2d737e346b8e52f562e4145d15b50ae6c588baca6d7e64e8de577a658b762cedd60884074264f2cf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf1efc3053b35e919a3862de4796490
SHA1f89aabe15eda39cf24d3c8545d6bd4e017ef4478
SHA256fbf40302cbb57605617e22ea14a954cf133b2f45beff700ea5f257e0e379b05d
SHA51269eff10aed3f6e594fbde13256b1a09f858161bc73aae507e1b1218c3a436d073f041f456f53d89595fc263c390945a21d14ddf96960fd626660666b28da1bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fbf237039fd3324b44db139c92a433b
SHA18ecb0ba146ead69a22903caaa5b861c36f9ffbb9
SHA25682b437ea841ad81aa1fb1dfa07f15152c1748e400e3d0931f0a85fb114ed6160
SHA5124e6cd457c7a4cbd822e743c4de1a5e27d97c866ffcfd6b4174793e55e317c661fd19646baa6dc3b067706c8f37a0c7221af171d3b390f40c5b2e227c0786f1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57e327c1b291aec381b8f3f47afc3f6
SHA1ab29b2524c4b228149161b0944ce3aa4f17a1364
SHA256b4ab0bcb33cc1b8508bbfe2b16fb451cfcf10cdaae769ea7890c566fc6e1eab7
SHA512a09584c60e5eead419fa806290c52f0b7465215d5504edaf3c35c4a2c8a976be5d31fec89b78f511f67f4b916be447721b658f2a7b092222afc572c965350434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebe9056908fc9ca1d8a0a67ddbbd4d2d
SHA112c204b3669cc2b6dc6ae1fa1e9cfb4f760dcb93
SHA2569074015d90b7140195647287280f87cf80b8786f62b0e16332c042468783749e
SHA512541a1e8502353ba82de0f8d7e8d863afd0dcfe65961109863730383acfb5a111c4576a143fb5f5fe3427141108bf7874b1272ac8b448a43f7da350cb50687371
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a