Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
63ca0d3f822a8c8cbd68bc7c839768d8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63ca0d3f822a8c8cbd68bc7c839768d8_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
63ca0d3f822a8c8cbd68bc7c839768d8_JaffaCakes118.html
-
Size
4KB
-
MD5
63ca0d3f822a8c8cbd68bc7c839768d8
-
SHA1
41a184b96a0cf986c70e67b76588618d0e7fd1c5
-
SHA256
464d073f17819ebf91fdce37bf9954f2f636fff19615a956e26c80af41ccfb20
-
SHA512
1679578d0401083bca7f5741b530c36322b4e91e9c04c2fac20debc12576fbb4cfab58f6f0c49f8457e5ac4933d847f351cc6f99cc5ac2d55dbe76eb4a7e97b4
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o12SKKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDK
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b4a9463603696b42bf802bcfa703397d000000000200000000001066000000010000200000005f63f5879ae1e59965e0d088adadb05b2adcb583c4f77a568f13465c5d97e00d000000000e8000000002000020000000e62d3394bb019111696b1768e1702cfa1e2c7707e5d91e00da7f745ded1e0eae20000000a28fc08eb13698b9c0923f63380e8691e5193929b3c98bdd185766448e29a76d400000002a3797f4793492ad43cbe3ee8aa2dda60df5c14211cefd456ec6d02f0c311bcfd8418d800cd482a235dec7a96bda0306777d091ba689b9d43d619289da056d91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0048bfbe93abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA275F01-1786-11EF-9D76-F65846C0010F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422467237" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b4a9463603696b42bf802bcfa703397d00000000020000000000106600000001000020000000042782080c52da462dc1c8473337eb9d7f847239817dd0801d35831c58659040000000000e8000000002000020000000f96dc96509f1838992c33396075a789f4be60c57868f654fbeab3e1c977a8ea2900000005e7afea63b124441ebc83b68fddfbf419f7816c48e8b658c74fa671282e4af6ccbedd7bd58c2c76a9d72d58467df8eebc9d7ce7bc4e68c2d4f591165933c6288e57fc92f4dfc3cf5f3cea080b28f064d865918f7bc3c3e987ec6b27587603adf5f40ac8c51d346784c5217e3251527fee7d698fb168837846fac647ad0cf7ae64e1bb3db9bd75c9002c8d06372d3f6b04000000096e698c191ca58f90d4620d65f646566643ad331ade88e0b36448a32e25d4d6437f71a358e78d282ded77a3ab795a75b1e5f2d9f48cf5d03e65bcaf8d3e2140e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2348 iexplore.exe 2348 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2348 wrote to memory of 3060 2348 iexplore.exe IEXPLORE.EXE PID 2348 wrote to memory of 3060 2348 iexplore.exe IEXPLORE.EXE PID 2348 wrote to memory of 3060 2348 iexplore.exe IEXPLORE.EXE PID 2348 wrote to memory of 3060 2348 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ca0d3f822a8c8cbd68bc7c839768d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f59d47955f949eba41f4028ce83a3fa
SHA1055d9fd94f1208ab7eb9e544d034c25c73ab6d67
SHA256ef7fd3d2ba93dbec54b448215bb8cd0726b02c975c982708f8b3f6cf57da64b0
SHA51200eb4329b256934782686a6599241da11c966c2e0cca7404e7a7b911beb388c93a5f051b360a54bdab8b32660c13918c1cf2d84e0fd2a4adae4986ff76f96151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d74b11b1e1fe591d24b7e6a8a24ef4
SHA1c4c2a1375a7ba08443f668d98e567c0df0d66a39
SHA256a323abec10d12f430de709dca24ff390ac3c0036459d1b5dffcf0b80b7660eed
SHA51280f3015933e3bc87b8eb85cbed740840bb5ff548c6d14bc301e10e0ceb6fefb4f52d71bf1d2aa335798fda5dba8fcc819d5d828197708ab641617cacf3a3f06e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f98daaa35273ec8b8813a5f59ef16d
SHA1acc14df8230552bd8d455bbb8eecfddcd73aba68
SHA2564d1b386859c1ad02d75d9bc2bf50c91a81596207e3fff098982381d604801948
SHA5128b9f245e0aafec3525b71fbf1af985c2ae4ea038e9f674dff0d0557f01d5b4dec437903603742a7b303c12243d79c383c2cb1fbf359b43e622344ce0c3819694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddece9e15af6a02607fe4bffb9a501e0
SHA1614388365658a90eb3ef70ecf6fbd5c8c63c5ad6
SHA256068b57b387fef024963187793a53026f5507a9074bfd70c8d3bf629cb59b270d
SHA512aecfb2641b2d38a6b658511d048a50775a89b19218e1222041c0e3270a6602b2631f4101b9409555a21ce20b36fbc561ae84097dc88fe429afda6d9c38180d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf323f37999e769b925b7b59ef8bddb
SHA1c234a4400beec93361d24cb87d2d848e8c1a99c0
SHA2562bdafbbbb10e44aaa40cb604247c246d8d49f190e5e9b0284c4a18be765a66ba
SHA512aa7616ffdd783265d86691cde4b5b7bf62d0c6d8eaceaa25b61f660a598e109896f995941335e5de67f52b59634e4db6f0676a4a1dba202a93b83557c240d784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3797b73e4ef73ef7bb31e7bbafcbfac
SHA1e8d5115e4330fe6eacdb5d8751fdfdd1dfc93c40
SHA25657bc5151fb59adc348010784955164ff3f68a84a98e31dadc1354655b3211aec
SHA512a22f9a151796a74de554bf7bf79522c8168595eb9b6cbc9a765cfe070daf958c4394b5a0e23f954575a7bd56b468eb81f20235df40e8e758f9952d787504a090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c35566b825ac3a88cc00ace7e560098
SHA179c505acafd51518338d7fb1a0d8e365733d59be
SHA25688c8506fd0630e9565e6fdc0b4348c15ed753936566fbe47de87d6026d6c5719
SHA5123748d007d25b0ef466d512601a439711a24f6f94aef8131f85bcbd2369ba21013e7d3bcecda5031205dbd030eb7543aeefc9d657854a656aed492e95edcb7766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e67e51c39b8aa449e0f0056f4a4346a3
SHA1ff35f199cad20370c5993498cdb809363788d408
SHA256ffee012f7db1267625e35387f9b0361d965547e00a2f6f54f4945005b7ac0fbb
SHA512c35b41e2ceada1e50d7656507e40f877ec4111b59f0acdcee32c3d7ca06e61ead3ef7d9d28982847b4bbe6ecf22cc476ef04d538356dc9e919bb78fe592e3fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff291404c60f52180ab86958549ad89
SHA1599e6de3bf5b5ef174a50f78f0d17f224c9fb6d1
SHA256a409651b5d120a6b86cf1a6edd0c564aa8185c389b333057886ca0819294a130
SHA512065fc04cbb2e384c9000f50798d4b36d8778c7b95d0985516e7065dfee23649ef713b45db35c6e5d4b92362c9b52753f45cd370fff5997e763511a7f7d26cdd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565461b6c0edbee65f0ca155d45cf62d8
SHA1db71bf0767ad5b364cb8967e2787d2d28abcb214
SHA256bee59ff5e1bd4001e4af00d2765a341a9ed16a0bcc2194ccc7becc34edf6fdaf
SHA512db3f29825e8b93a506b6ba29458672d025cf6d424852c2f78232bf4db593f4115d332ffffb80a13eefa5ef43af7a9c69df003af27bf4ffa64d266ad02ae330e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e1ff20b145bb367998a3d225f697d4f
SHA1713e1a08c03e379ed2404fb939859286123c1c53
SHA2566a619af050994bbdcbf725cec10de496aa95fd35ceabf2f4947a34891d7c4163
SHA5121c56fe994a265aa0666e5bdc8a37aa8f70da0cd0e5c73ea47449536c6caa91e40e305e708f48ff429642e6fb18a3b149b0c22930de9f13778fbbf5d1a9e72f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5331767cc1b8529d0fe536ad6cc4d0a7c
SHA1f5a5b5bdc514d76ec4db2c56e13dae3ff86dd535
SHA256f8f2fdbd6817696d3a5364497fef9bca0e53cc91198bbb19dda9b1b221ea4c4c
SHA512f30ef9d3154371dfb7cc93b3707d0f118061f7403fcdcdd386c2698c85e4cfe2497ca3f14af12bdad160535fb93f647b817945f81ce385a7880315e748e42221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6fa6ea540d1379d01f93fe3eb74f43
SHA1b48bb5ea19372bffe7591fd5dff3490e4d6395e6
SHA256abadb9f00d933b8abdcdb42255b64e08798eba33ff54c2d21e9f69b17054c541
SHA51265423715971b3cee9fe6e94c19d27d3228533635a99158ac9f34e5ae48221c99437dee131a7072f2ed3d824c9f1dd01c14f113a4e029c0e1e75619a0fe18e356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fdf3505f9168056ee51ebbd5331ee7e
SHA1f22d21c854aac247b0c39ddd3c9b272c449ec0aa
SHA2564bac705455d26c69a884426f47ba8c9cfafcaa6f6281099347625912c128b05d
SHA512ef32335daa003cdb3b42d2ca43cb4b31b9fe7f56d18100076154bec8de222294be4a5377a4f452e619df089d8019d100cf734d8d44d48d32511c6e19fc5078a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ce8631be399126bbda0c246b66eee5
SHA160f7c65993c791f6e5d5ec902a4c439e83fc8f8f
SHA256dc07709e403678e0b87a50eb8d4e94f323af15ee80b4cec45ed3d35d15fd52c9
SHA512349b0416a9d1a8c28f5f4b99017bf34f7e080c7829cbbcb41ed03484179536971fe22b15a671211308c829063240471b65bf2b90941dd06f30a82c2280af71cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5351cbba82a9e4f684bfa18618cb24be7
SHA1fa74d16c220dae112a00cfbd871e8b40bdd936fc
SHA256da6dd4289822a62e91b509eea9d22239ffd075535671693f128e99da77d314ba
SHA512468bd13d442b369dd6fd5e0d80fe4faca982bb77d1b4e830f20da83c0cb1c6e03a106757359ffd1f642ccafba566d42db0cb20af78b5c3022791e02ae54e7556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533ed907961b424eeaf5e7a57ed2bb8ee
SHA122862669c54a04268b176c7e0a1a1cdd067c98d4
SHA256db70207baca576aca9f915586fa93dd6574f2f6e0a774ad56a5ffead89f7c639
SHA512fb6772c1a4932f6000cec9c24ef7eb4143b5cd8a80da9d4830ae35f2b6798cb109f19e11e94029c5bc4b88638cc5090a55cfd1061b3c672224697b8f94041f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766dd17b4ee6e5d2a6c2d0cb295177bf
SHA147bae2298ada271b5ee3b415c598e61c16c197c8
SHA2564dd7bd515cd7c512820daba04b469eee16ad53280958563fa8997ae6d961b2d7
SHA512a078a031394ceed49de750dea82d42eecce5fc81b82d2f02caeec50e907677c3c895af1b5afff3fcaebb497bea67594f9e1fbeaefbcee8e9ea16804850d5309d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5808898feb08a58ac86c8b609be4b9
SHA1cfa82dcae8c0083c2a2473950b94d76ab9fa32c5
SHA256db52bcf1b112b8f1670c32d3fe105c456025f8bfaaeb8e2c5e78b947e4b35a92
SHA512ff2cde48b89cbd6a8193d608588ba8bac51d8baac560f7e300fe096105f2f0773da44f833efff0daf8e6b60652b823b455c30dbc2bd6f4873aafb1004ce02c62
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a