Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
03c8d597363e33f4850b2718d4b32916_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
03c8d597363e33f4850b2718d4b32916_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03c8d597363e33f4850b2718d4b32916_JaffaCakes118.html
-
Size
463KB
-
MD5
03c8d597363e33f4850b2718d4b32916
-
SHA1
ba79b9e97e789ec835804ea87826cc1032e31dea
-
SHA256
60e73dffcc5d47ae5d4e562fd94bcb691c8eccbceebe47a5d5a93dfb9cff68a4
-
SHA512
1ab4517474a7e1a76b4f7a2febf4d3148e3fed0711614301970c3fed9995c687eb04552e723d14807d09d412f31c921ba2f2d09fb1f42be951c8be7148ba2e7c
-
SSDEEP
6144:S0sMYod+X3oI+YvsMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:P5d+X3R5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7B22F81-04E6-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000530cad4630103f6773eebb901ba75445b8b7ded2747f1d4bc913dd70b09ea99a000000000e8000000002000020000000de14a1b612890373548ca1f5df6e36f19c2672184e503ea34ff385b9b4ee6dd420000000fb04dd76cbc9c5cd31d5f35ac0c82013211e31ded28cbbe3e7ac016a136b218140000000df31dc66455a46b736e1591ec6e9f6947a9577a3f44b274ed83e30cd5e120aa8db9c74052728ea62804840fe0ff4e1cd4d79a36d8dbe9f671ae1c60be675e995 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420419312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a73c90f398da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000de9cabded96e0e1ffcaf4a80c11ec1c13c809262bba27ec8c8563c2e0acea974000000000e80000000020000200000000b620f7300a5b69f962db6428e31c7a16d9ddccd541f0ed9d713a15ff691ec6e900000009c2a1c3edaab132de202c5d30ae8ff9e41132a3c973e02839d8996b7a1f60eb5a34af3f4675f48a47897d4577ebe7e417afb08c0ae77170b66481d83b4bd22ac5ace5a02b80594cf6519c3a62f7fe13a9dc5c56dc5f55853e5529b9941c1bea006113d90edfae2226d258c543e7203045a22fb29fd73123d75394fef24da3714dc313c7bad966e0657b5c9041fa2a68040000000e93eb120aedab78272c6ce09663d5705ca3fdff6c64599ab92e984026f3cf1662c2501702b082ec29a2b4eec2d44dc442fa2add3e70a3180c0131d7f2f376a74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1620 iexplore.exe 1620 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1620 wrote to memory of 3052 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 3052 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 3052 1620 iexplore.exe IEXPLORE.EXE PID 1620 wrote to memory of 3052 1620 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03c8d597363e33f4850b2718d4b32916_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d35c00cf5ae065636d29816b4d8c16
SHA1da5d1c7ee133261ded3a7c21233206c5dc98f752
SHA25681c6bddfa9ff4df884bcdca57307e57ee86aec5ffb9f1de70dad90ec6eaee9ca
SHA51202ac4b2713cc0c0c1b0303b10fa56caf507a7c945ba2138970c99e53b8e10a84c94984169aeed599c14b9044ce543d74ccdc9041d22d878bac0c9e399e16337b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fe1d5e6872bee19bea38d1d19149134
SHA138daf01bc99cd38cc0a5093063e4d83d337070b0
SHA2565e358ed28a7df2bc5608fa4df4a0f353b3127ffc6296c9efe0901b8065032e1e
SHA512fe44373ae8fb2dba0b0a3c765ea8619e369cf07adf1e25bb75e6e3f82fc530079cefdc23e8e93affde2bef96917e13ac526e88564f8bd03c949df800e8fe1c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a5e31d51fa4adcee84700591c5b19d
SHA18061cef475ccb2845f63f3a214d17ec204867ba6
SHA256525fea430335a8d0f87e139867bff801bafe1d5e65bb8c22db2bc9a620ce9cdf
SHA51233de082ec9206a98071f6f292e40808bded14a4456eb0df9f70bc9c6ee862e6a5a69a3ff315935b3b7347d69e53adff422c639e229a06948721c9ae2096f9fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ed24fa7a3a467f190c9cc4661e14c9
SHA11e5a5d1df75d0578fcadfaaeb0053cfc748b6c22
SHA25640edb46d227dec8ddeac8cb0ef465e166f51bcf3d3471b204d61e2c5ed1c47be
SHA512b9b5a60618c95dcbbe2976a2975c1620be983523933a49a613deab6917c83bf6fbbd51c64c1f75f6c903ded51c51fc12ef8cf365b1c182efd8be1ee8febeaae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658b020dad7ea787ff9c17ace33d799d
SHA1050596ada7d45a10c625bd12fe933fab587f08f6
SHA256abde7cbd46e28a3d652c71a4e1bad76cfdb675122ff31ee63bceaa1803dd21eb
SHA5126225f2b68ae2793fd9e0e8c7f9804d0dc20e3d767e4b877ec091cd87b66d02ab2db2266f51ac6ced247bed824dc0931cf57e488353f9865f1064e7ac536ef989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574068f987cbd05a26434564f5341ff63
SHA1f44d73264dfd5a8f139f0c2545c8fcf8e2a3f581
SHA2566dbb8126602d2e9a849d89280266c21f835a1312becf3dcbd1d68f0dd662ecf3
SHA5123cf19cbdc426bd88b663374e925bef0cbc03c9afe193ccecc6e826433e405fd97c81701e65466d5b02c99eeba6d95b42ef498874eef26412e1a39e341e814f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b416e09a4f8c3de1a58dea42ac984822
SHA1a16255f547d52caca1ffd5a06be66b772fd02b74
SHA2565b359564215a42bed598b828a66b6afb5a9bd4d5b0b7397a0dcfb6808ea990e8
SHA5122f93d6af6ac7e242bcf60ef57423d571dc3e3bdc7f95bb48983d9d132a752edd66f479ab55823e5e01345b029e082d937e20ef22d01dfab830cc2d66006100ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fd4ad021233b90805ccafb1076c6b0
SHA13c0c5b92b26b5a0c783a9f0915b05fac20b88bf2
SHA256a23c0c409aac564981706bad81fe37a71fed420deb7accf1dbcc78f18ef4c7fe
SHA512299564097dfd00417c043e4fb2fa3fe0cc0a85130a63484803f7b9b300f49a8b9f4ffabc2acbb882eb43a5279dbe569c9ce11abbdd748454a8aec8aad6075746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814561b8c7e718a747d007c1e07d2299
SHA1ee6b2e123098f256c1127d4b1f03fb27c6727857
SHA2563a24347fc4a0a57e67ad3165c8d6c41ad5c0c4823e90416bcc3766f9e02283a1
SHA51213e354a34a769a44c4e353aa02308065de006d9363c051fa65463bb64877012621c8f03322f61e379fb6f7c97587ca2c17ff9b8b30341aab2b83ddf6d5e81717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53766c54086f986ba142308c3ca296279
SHA19b7ab4f2d4409b0ac9d057d71ec1295c3f0b26f1
SHA256672a83f1545e4f42a474e499437c34612b1baeeee1b71893692d91c4a62f58a0
SHA512c7ffa71fc03c78121678211b6f8fcef48e0978ab7a6f5b4f8fe980e5965ebe3efea6e68c89f8bb9b45cca7a712b81817fe5f1c9c30070ff37b07b64855ea60f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ff99447bb72566cab763250c980c61
SHA10ab192c020b7b22fc824abca8881097d2be2d848
SHA2562ddc9be3ebcc1df398e00571ae9a1d518038b8e67d8de8d01f0559ba4245ba36
SHA512f54727f1b342c2e2f6cd95d49a4dce19bcfb4cc894b50d7fb53609497b982cf4e18bd5352a0459e6f103e0899507789436d8029339a9a72324389e54ab435ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521fa3f3a933f53b0e1b230bd668f48f5
SHA147374d65858e1eb4326e4ad74a4c73eb4cfa32a7
SHA256aa9872c6430843c8d4a1b2909217e5fdd7297fa4bc6d3c36a907730289ad9efd
SHA512421bd2429f83099b3ae863e0316eb18f8a296bc0e4d22cffd1ffe76360c41c4ac383644b1df67222101918489601a5d9fdf745d1264045c296d76e78b5b189f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a50d8de0e8ac055c026a4914081cb015
SHA1deb0e326399300412161bab19c5c0d06d401806b
SHA25667a0197511e01fd8dcdd99a86f67220495458e34b62fdc6616792c150501c86e
SHA5120081030355f1ae938cfef9c343918b7f7d1eb05acd08000c8c84cd03a9e0d5ff390f38157587688953080a4112cc50f94bed0130d8308c09c20d0a93a598328d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546a657ad096ad714a1b511755e7b7ee6
SHA13458739bbf0c0505087ef118df85c9feb8cf0aca
SHA256623a5f3d8d2f39adfcf047d518e52b643dd51b3a3d9e49b712cd7f22664191e6
SHA5123ca8a2a5abaa8938221367a0a3e471953877854224981c310ea661d5912d4547a2dcf7d390895e7a2fb37ee2d330711a98d0af6f84ab872744d5cb7229c039a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a785ea7ca8089fc26a981049690f41
SHA177a8a6fec2bcb4481b77379f8e36c691ece55cbc
SHA2565005140f86b84c7179447fce10dc6f2e46ae3ccca9c401637d838a623effda16
SHA512e7bc1c6c436f3fde87a4a737cc20c87ced9e09f021b4564f65a19b394683b7666cc8d36c7bb94b0fe721464ec72e41ec895e76f48a3af55cf4baa1df7b327488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377a6b305f143ddcf0f7f00e033a5137
SHA1dbf0ddadf7fe2feb655a044b4cf30900269941e6
SHA25657e3a40b5245de45263365a82efbdcb797de6c185d9006576fe5724aac45192f
SHA5128417c9204f4aa41ecdb0035912b99604f600835ffac3e5fbcca53f15ff74102ba9dc111c8fbc03b524aa3ffbebaa879d9e89b57dc0fc3f51eb7e4c73f878c9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8611e8f696f971869e44e0ab5d8d2d
SHA1e90358fbaa25e94ef19dca4489ad1116ec683efe
SHA256f3b965a2886bd0d45e134fc3c06c6a64816d774f553527ecf75849c7704c7c73
SHA512901f2328322e19f00dd8ae7a58f9ee4c91dd35b1e6ce475d32e2f09e6c664294a1182e7c5ab5b469459582a25979d700d192d76468ef5e0c43ad1cf02cfe3a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac6518df16f9317268781230e80b4f66
SHA14b28c64a45e33f316253197dad05258f35dcb3fc
SHA2567b51651402d32e73542326ce95b4a9131976eedd01084598622bfc975d706738
SHA5124293375e59fd5202cde3e3524ce28cc7c450e54207d89300c85acea65eb8ea351afd716e954f71fad973ae47956808a60d8f61b9ccd47cc60028aba6ae682f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d156d88a0a230fc12c44e395fb374b0d
SHA1f0a8ce300456f7ea75bd5fe4a6c99366ee9ad41d
SHA256a7b8c0b5b882c1bd52da57b0691671261970f9493c828b1db5527b9681efd313
SHA5127f906cec9e5023f4809c231becb3cc9e2de477648cbb706c2cf51cfe8e83923f7b9657886e54e36c58560b3f5b830cb4c4aac9714af93e4db3162a0cd3c13949
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a