Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
2cbb5dddd26f459b8701d42238953a79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2cbb5dddd26f459b8701d42238953a79_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2cbb5dddd26f459b8701d42238953a79_JaffaCakes118.html
-
Size
871B
-
MD5
2cbb5dddd26f459b8701d42238953a79
-
SHA1
e2da8f14748030cb0a38118b7c519c84731daada
-
SHA256
2f172bb554035a33849c6a3fa25421052dba0dbe3c9b4dbb027fe7940514a296
-
SHA512
7426f35172f2406a5680fe1b4026eb90959ff7dce16dd4c09f446ee4d5d5fce44f29e2fae8959fd2b7479218fe103b2f498557edf3090848a9185cc8d7633537
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04fc47f7ba2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000003680c3fb39d1431debaa3b7bd46882c0db9018cc1a5893bb5344917c2070800c000000000e8000000002000020000000af640791b5aa13e5cd476e3cee255468f691c53c53fe6cc277b74bd7677eef9a2000000047d7974c286313bb673a383bda913e2bf23201d68b04925d123e6d3dfff02206400000002e5c651fd92dbea5c9dcab6b4452aa90fc0e6ee58fa4950e8fe55f99ec62ebd55da7090de125ffc7c3297f483246c56e741941336136d1b9fc24d34df48d2ecf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBE88541-0E6E-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000085b5d598569999ce322e93f7e354556f58ed283478600fc302f2e5c8916f9a4d000000000e8000000002000020000000ffdd6b3799179415a0185b3351aec61e164fa05c79554bac1b4719d6155685cf90000000c105184d7ead919d0073439b50451ae228a0d17d447d476a1e8fcea4281bc6e7fbacfa37490569f36b46891acd94b2481402cf79c21a4152a0b3b8a51db694b30e8f1a6b407f4ce626e19b84cca6f8a853daf79b41d00e679f425d9be8686f7584051bf853d9684555ef4eeb219569e8ae8a723977c6e303ecafdabe8223551833de6133d273eb28c91ef3d30517ec1a400000009fe52b78aee96726152ffb72b6e1ed5fd4275c6ec2b0ffc507256e436cc69f997f0ce40567803b98f0ac294b903db59583fc984f2ea3391c022de7a5025a7123 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421467291" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cbb5dddd26f459b8701d42238953a79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8846e30f9b2385ca393ace6c1c87a2a
SHA10982ea5fa727a560f223c02dfa4fcc0d07d3b187
SHA256356d5524618bf08074db0fd6e115f4001a96ddec2214affb93b5a5e21af83191
SHA512b25801d80857d27919c9515f2a434db9637d875cbc8845d2b58a6325fb1f26399370cddbc557b6b7c0a59de656d44e80ee8b821df34d5f6587e254474c48a815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a84d001d49f3ae157e4a62426fa9d06f
SHA1af36e40d52cacc6702eda3f7f78beb0d2b16fa7b
SHA256cdff02d012871f384c9a0a0da5b340e6d5ce856ff23093eed6dd12b5a14e5660
SHA5124d3b26aad601edf64bdeff0323a367651a697db2140a28e8ee7433338fa69ec50e4b02d494f2b417973fe387323beb71481879b5c52964d59184610b76e23a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a9cb8cf26dbc95bb84f9cb8c20439a
SHA1f57414723c03b32f2b7f37187d0d7efa369b8636
SHA25688230626225e5963c4b667202d904d382f42ef5428c196125e1ca9e982476285
SHA51262998bd37735b0c3abe38a46184964d862b2fcd514d6e0724b40990b1848e02aed4b5e7344d43ea28cd2c12fe62b656f932b3af37e6706e39644da2133922ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dc6d4cf5f2e5ad3caece5d8c00d71f8
SHA1117a3a968b234ebbc242c5097ec96b403d167a4b
SHA2568508c78ceaca5964ed9ddfaf154a7a622633d104eb75a9eb65118444483c5e8c
SHA512cf82ae8dc32623e57cd2964741dcdda84218b72e86d2be55afd8307981ca3791f1fba2481be62fc26f89367d3c5c0116202d3d5d65647c642236c81fd1a419d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee67481dd64af4628fa410aefc8a4e0
SHA10ffa023055bdc6f7772b3c67a973dc22b911f55f
SHA256c9e2c49a4eb3ec1b57e48347ddaa0dfc4e43056fd8dc41a50f5231cba45abc25
SHA512ddf197fb7efef074ba26f4f8805f1aa03f6495fb55bbc9886fe5d7a4a41e70e2b6e3864c5f0575b547ce6c572f45bed924b6fc8927ef83aae62a1260b611f916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516864f4551c9d76fadf84ec9319e4430
SHA1c9addc1e84efeeece50ae92619967cbb408966b0
SHA25649253dc77876ee0ee3ace90c5600cb7a698c2794e68a60893a151635c02521e8
SHA512616061d004fb040818f4604ca207fa4b8bfd0d909e7b632d1d76abfc397f9380be536a59183a3b5758b0a8ee84803b86eda4919fc325e9f504b0d906ac71bd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5305dd20aebf640f32821942ee995656f
SHA14146f741b752cc7658b996e702cfa86b8555863c
SHA2567c04a81b4bb06da26acad0570c3fce9db24a51880eb10b7ca9a9f06239f585f7
SHA512c257c19f34737f0b90fb9fb9cfbcb84513112adc04eb38e5075fa68931b35822e2071f8b6e9ca46907d674e36c5f3cfe8571d76b7866eb9ea43bb17ec7563e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f281e56bea786809b8f23dcded3564b
SHA10cb0613310d7ff8e65e4b19a7a9cbe9d84ed9669
SHA256f7bc44cf3161e3c47c6c5ac21897ee9f7f28cf0efffc93008dc9470f4bc59d03
SHA512d98e54e7563f4ea608f63160fe5cbf5521a8514c557623a4eee65a7504ed38cdc36b2a67ee0b8412374a131c9d582b2e80ff8a59e93f889847bbae2e018477cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e4ebedf18e42e324b6c4f689f4679eb
SHA1c6eee942f7db4c3850ef8cd501b88e7ae37b74f3
SHA256050e95871ff3d31054ecbce308e6320a021eebd4a498acce4b85c8969365d9e8
SHA512ad95704d9ce6b16a66783fa40ffde06e90f72685bd11ec13de6c064115a8e690f5f43458a6d7f279aaa88063ae4e95a54de625ac6f6c5547a349336d10f7fbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526508eda721521f957e7e8e77c0fe194
SHA1439470e28b8c95240e133d0693dd67f0ed76a6c4
SHA256b4c33a8f257ef7ab782d0938c560b73d31fb9a54d634e4cc1b97fa6fb113c10e
SHA512cb21ffdb7ffe6cb82c793de68a9762ea5ef426315800409a5403999683057e26469c726e1fd24ddf20988bf144fe411ec5ed5d746d7e8cd7d2cde0ad6dc00c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c97f3c45f15eef9911ab1ab62255f424
SHA1ab9410d77e016338464a78919b760308baa8df26
SHA256a079c922015d4d71c8b7f997241ed42ec15c725de11f3a7d1bed74b60b3dab51
SHA512919e022c0da6228960eb0171e9a5ea9600de22c664311689ff856f467c148e716923b606583368861ff922ca6e7e8a2028a931137af5f853c31713744826fd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f847349f6648f0442afa5142b1a0e35f
SHA17f009e35de18d9fcef724aede63587146b4beae0
SHA256b295fd9582b1602bbee51cbd9cfbdb12df9867d7bdebef99f7f99e2ed0db5f4f
SHA512db145344cd801c5a57a3be8dd08dd431b631f6dbfd137720e0561207066e284e0ea96457aa9346d2f282d10864bf94153680d96c822d7b8490f5cb1b3f0d5186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e705b8aa96883b28bbc4349844ce3ae6
SHA171d16e9afec3c46aee28c6a12eb4c387dad05477
SHA2562e16e928fc85de0d55dcf6deaa4a812088d8520def1c5e4f35897768a248a316
SHA5124fe695afe256743f983c6a3befae7c0f0f23b21eb68cc663757f784410b10deb2b8964fa8375b080a77bb054df3ef507b39f8bcebaac6a5553a66ce3e393b14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e295863ff4e6fecd65aa6b35c5900754
SHA1f4743d21cea72f83da560f49692a017349bbcd67
SHA256bbdf7e54f74c3d37000b6c96623d68407f0a3fcc48415cd67b29baabdf07b1ff
SHA5120c51d14d89f1354d0530f7085d003d31837f51b3df923865489a42ecc4488f59c8d45ece8d0f7c14762628cae5e745ff84d8bb6651ed78d89927ac921ed07422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a6d3185ab2a6d1cca99970f1290d935
SHA10e786a44eaaca3e211b935c22496ba9b8c9ca356
SHA256ac45b4030d8b4fabf2eb1df7f956f7e05ed0581c32f979501452497d973d0980
SHA512fcefc3b879f1eb5d4c557e428825ac90c778cb38c41bdbbdc26de1a73c5cfb5e9310b813acdf702fd6e894b20a81b58c210cfa217d5773db54156eda87c11d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8174a1d47bf508c92924e04bb57c747
SHA1f28e14a9351fae24affdb23f307e2b16c9bb2a1d
SHA25600817bd59a281568f12f7c579533abf3d2550f2d292ed45a165d5140b47278df
SHA512f963c174f4ba162fda8068a14f22833a1e6907bf6a12b50d8bda5ec91edbd2fa88f9f9dd1b4f44ae9010c89780fd14cfafc839cc4bd40574576e485432af39e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5160157d15d3ed437587297c323eccc5f
SHA1812428c4fe3b9fc9d812324e7486789ce2889f7f
SHA256959d67f76b28e3a42a9e98b36296c2b791c720ed7810a10b4219ae3e16fe3070
SHA5129bf4b969cb096e3770ad6c52703278987d2d4745814a2d363675584fe40453f00dbe60ce6900f48b9654668d98d3ffbb6ef35b59407223bfdc5a36e0ea610f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c24f64addaed3e444d55e0d59b69e7
SHA1368335ba0efa6fd5b89a34eb9f20189b2fc2f06d
SHA256e4fd94b673a7b9c56957cc41bf17c1fe0b0bb0c1f82ea672f9d5e4426b5edd4a
SHA5121566af59ecd236be46c17f0f4e8d538a412203a2d90bbb9b42c03a07f811d2697c576a1c4b871dbdb3477a965e6fad0b3cf11cb0ef3c8ab10089be6ae2dc9205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bedbd5eb3544bccaafa396f6d04851
SHA150e008169fa97540d6f7f2a340c0bb365639262f
SHA256059476ceea9298f6fdd3dbde1791e7302622f8b36ce124c248f69fc9da14cc68
SHA51239812cdb3eace3111924d686dbf9b653f975fdda9f0dcfdb1ffce0721cb0efeefd96f3e78b5f633d6aec1d147076fea8f85b1951b1d18da6a7a8f9f4b0f16187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bea2f01a9b475967440a6e339a04683
SHA1f69f63901de9d82a4f6809eeac9a9254e9c552ad
SHA256b32530a28b2ee5ab4df67797fa02ff0b33ca6613dabbb4a813d42db6d2024218
SHA512f399e8720a7ed5951eedbb6d40299fec305cd80cc90f5bdc1ad73b5aedc0976299730267da451959bcd1782bed952f7ca94073e8ebb192e86245b62090dbfc45
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a