Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:40
Static task
static1
Behavioral task
behavioral1
Sample
64850d465993a22d80ec14a543646ebe_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
64850d465993a22d80ec14a543646ebe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64850d465993a22d80ec14a543646ebe_JaffaCakes118.html
-
Size
157KB
-
MD5
64850d465993a22d80ec14a543646ebe
-
SHA1
42ba7a80fd1b85454f224a59d399c0ee03832ffe
-
SHA256
b3b6b27cdfd54791554e3aa08e1739fd5bafe76d22bec0a9645a850ecf72c7c5
-
SHA512
8d1c310386d7a4ba1042945f8e6cf70299b6524dfe90f0d449ca4b2e0daa576b37f1047785c891c127b16b863cde0025c42136081cc1852f8ddf8dffd4ed2b9b
-
SSDEEP
3072:SV6h3vzcvnyfkMY+BES09JXAnyrZalI+YQ:SVkrc6sMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90def916b7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eaa6b86533880445a485479188526aee0000000002000000000010660000000100002000000006b11a4bd2c7e18389f91f303c5fe1a9a9c10baa7b58beb36c9a794ed054c6a0000000000e800000000200002000000078ca6f368cdcf5c0815b4420b3794766b21628e45bfe40a59bb1b57772e679f290000000424671bed45e31a1d2ea10733e67456a9ade8b1c0fa56323ed6df18c65d05f40718f5d5fa2914c8b69c69b96c6585675143b28148cdc66857da43f120d268b3c876176f0a1c9f76b031ed90546fad5fbd2bd6bb974bfa2d4b84f00c0fd305e65ced3e505b43dc14692a9821fcd7868516269667bd4d8509323114fee0b5feb5362aa9bea320157da1b5a793b569f95d34000000084a00188740192cf7cd1e697ebe9145f096be8f7b6cd7d1f511c4898c4b007ab54d50590f1eb957eec9f0677a43ae43069aa7b913d665b0d2cd44448b57757ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03843591-17AA-11EF-A4A3-CE86F81DDAFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eaa6b86533880445a485479188526aee00000000020000000000106600000001000020000000221c35464bf07052616339554cd03ff62d26a84afb4175ffbd1e9f116689943d000000000e800000000200002000000097912420658f63a2b4049fc19eea3f417bd4173fd9991c548c6ebfb1c66052d0200000002294500d4ab1cf2516961ee3f88b224190b2d977c9aebb3b18f3497848c14ce940000000cbb9508a6e392ca0d11fdb6e708e9e8b595112bcfd9aaf6f6f9fc14fd3c8fa45f8510a04070ae699d471d7f9b9a4ee613eb131ac1636bb8544b5670836faaf2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1624 iexplore.exe 1624 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1624 wrote to memory of 2832 1624 iexplore.exe IEXPLORE.EXE PID 1624 wrote to memory of 2832 1624 iexplore.exe IEXPLORE.EXE PID 1624 wrote to memory of 2832 1624 iexplore.exe IEXPLORE.EXE PID 1624 wrote to memory of 2832 1624 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64850d465993a22d80ec14a543646ebe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7dc87d09de4f1109301255ebc1bfda7
SHA10da703f206256ffdefd0ecf078c1da9dd8565484
SHA256b0e353f8abac6ef5d60b2afa46656d4fae5056f7f8eaadc7f82bcdaa2ca78b48
SHA512a93a73ba5458e3640f514216cb8fc531d4586fc5d3f89c3be3e09ba5ed2444a1579f0febf6f773055931d62dc86cf56e337528b51e4b63bc526cf88992472a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda5ed17bcd16caf282e2d891d226bc2
SHA1952b74718b9e69e7ed1ae5f0fecf92f5e20bc5eb
SHA256b8cab889a4db77e44c44edb5f81ea1f917d93cba97f84f2d211587ee5da1ff41
SHA512827c31cc0870f2b28068ec2ecb6708faa92f1dacdd57b99c55870f56049f32f81df66b53a3dabdcd35e54ebb521d37ae579d09eb59147d474ea5cc902d832148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eb49a0609b26842c6cb20b7224cadad
SHA114fdd7ca97809586db6fbdd9fb07d2cf98216492
SHA256c7e50e4cc48bdd22f5341523afd10b8d03355d0962267842f99a0eba9ae9ee59
SHA5126001c1bc0d16fd510e5055e44312dad092534221f6c453465867bbdb955ecc460d2abfe70cb44775608846f2e6679e3fdf424af5bb88203a00bcf41a719288d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94b238eb2d5232b9f50b626ed826117
SHA1f50f36d1d04b286f9d28b249ee77adf3aa7e086d
SHA2567c13791f5c7dd39258eedd97678feb848185aa58ba6c35f1077f91a108c1c714
SHA5127eca3f78af08e9073f2451b72a700b46f1031f219c74ef775e2d43e0c38d5d3e348eca56259bf2dfee481dc3d3c6704e7cce1946c42f2e0e6d1faf789b3c73fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c130bb6bf443c954aff9e7e50c274880
SHA14871bc750673dea8607687554d08d4ca0edae3d1
SHA25666db9a80ee690f9ef8df6cd0ca208244a9f417a5c08c1a272ab845a4418a5c11
SHA512aa9d48d0fb195cc1f63fdc59af194185653bb28bf8d1dfc092e9cc91017f5c12e0dce76a07cde4875918b206ad2cc36d3a37c2649a9edd4bd6d4fa4850114850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573782c9a53667499294413aa1e36509c
SHA1509bc1ea6e93356c23271b5e72d0e686958392b2
SHA25682ced6c3c34652b05f7008e4bf85a1cd4adf77cf45b536c27f960462aa430560
SHA512ef9d33ee7ca3886b112ac5e061627fd38164d3f2654c904096e698427be472e3ac17e31c1f7ca97560b8c41915227adde522de221d2183173f710dcf6605445b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212faa2708c36578a2e61cb58e5602f5
SHA14a65cf644694385c4de56d115649e5e846974a99
SHA2562ccea580436466d1aea08d09444f5ae317b63e20674f4db34fd070fa36d02044
SHA5129258008015cec656751dd46f7f85e685300209b142b9ca44ceca6c61c117fdfcd54b089f3d390ec78d4f0b204eaea777baae3a16abaa3b14bcfac8f3ba2366c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ed386839d48c7ac3baf9d9381d29bb
SHA1460684bb75138939f482ad3dcca30b5496819e9c
SHA256dde1f79052fb9134a9622bfad4e872ad6482832642d122db05cf0d204d89ec40
SHA512b0a8d037476a0664203eae02670d30da2d08a5f8787a6adcea52e67f262be3fc9647c779f739a6adbb2b9be683519fb60819b4034e3e48cb15be10373840ee1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6fc2d456a8c90d43a60db5c5015ad87
SHA1827c2cf6fcdffc4e0fab8a6a21ef6e37552a3ffa
SHA25682f85695fc08b848f16ab82ed72639feda49483a7801401d126fd21aebb29a39
SHA5122ae7ebcdfc10a2e2fe25caf205819463bb19b934019eb4181563f9349004fe7bcc6113004ad8741153a3bbea83d7ba4b58870339ae911249ac44b9d064728101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554205542981095869ebfff3f936c9b04
SHA1a342962b6b700673593d601c96e12064678fffd2
SHA256e2f49a417327d7455cdc9a7533d433b89ea2e9ffa7857e3f6f858e413c6bdc58
SHA512ecb88a59907bcff5d3bd4298a10eaab6378bda12ba74e7b966e0f2def8bf5bca12494bb427e5bb7ce004ed9769496ab814eb7253e0ad62850899a972a98e9c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8394ed325bc635e65e628815a07c475
SHA12b5ab370d5d74e34aabebf9dc5fb157695b4b4d7
SHA256bb1ae52104c4be5baad28628dc046b55e5bb4bcd84ae24e5d4611dc564bda730
SHA512a3f25f88aaf8b143d65babb842260d58c4c9a2431076129c8c9c06f922a3cfb8f29ad4a601bd837c5944df65a74dbc11cff224b0a6bab5d034749a14a94ea6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d248a56501f9ab10f2278aeedd462f
SHA1c61e4861da2fddafc7113bfed62864db7c205e24
SHA256c0c1231da59859a3f5fef0f651a275543ba43fca515e592b721f495e166e968f
SHA5125a1c09419a0e4f9af9fba048251b236e0786c067a99f14a1fba6b3dd2a624aaa9c668c94e347b8fdbe5768e70d47cf268979a523ccc40158cfe1d5c383c4a15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e3c3d2011accce6218eaa884327b00
SHA17a98a330e58d4bbca44c0d441161f69d33abcf04
SHA25680db34f53e2cfc5766dec889051d4e1414170bb8d5b1c4806f022ed714246fc9
SHA51265766530bee31124d9476e8a9444589111a9c1ed56b49dac604b4e3fe1e76c8ad45cf54998129f4f1f7a555cb7d26fe1efcd0e84a5f2ecbe81c32624cd94c0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a25f2f9fae183499d27885f6d57ed8
SHA12781235d4232ff4ea003864a49a9397f1761f0b9
SHA2567f33f407ac67961e170c39d74de80336402b6fa022184184654c9477aedb7fcb
SHA512d10b61e56a99c8bd1562b841bc544a00c5ce0f69221aaf508847194a2e764bbf6a45f006cb426f255e50d813c4e8dcf684c59b2c2ba8401fa5278e37e8ac6a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4f1343b646d5ce9ec59d135f4d50890
SHA13f5de637267e165c56d4ceffa9351b57c41ff82b
SHA25627aeac1e90e152570b6fd7b9e1d91d32008af72bd224be5388d2e91ff9f14a0c
SHA51252365d55a16b5d3d4b645d8a8797eb45c7a898124af3f522694fa389ea3ac73e2b8edb030ac98c21a3b952198c90c94978341c1dcdd6d8a572d8fe4bd4a46e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d1483238b383a576ce6ecd5287a185
SHA1c2f66c8a136d901e6d5da740a53055d4d1df9064
SHA256fa439a4931cabf7ae478b6c6757e1bafb9f057f56f76ec99b0d88aec5a1da237
SHA51264cd341fcfe31632edf0d4f6e2658cb3ca153fa776cf912232a138f69f2654004789b57f5b17eb795780303e8677f3ed1d16c04fac91c3acfd65ea980ab4f912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521db868c3b2e2415338ce304af071cbd
SHA17b7835ae98bab83687babd804be6e57d4e02512d
SHA2564da2937482632653fcdac5f97a3bdc7729f42bdee34d566682d148266c7af3fa
SHA512044000aa3d7f1cb124a4fa51bcdbbe9c2a8616e7970a8a14916d45f925f72daf6218ea0dc7476e6c31e4e3e62c7523689cbd24997b750cebaeeca671081657f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1819d10d5ee6c86733045962c73daf
SHA1d13f1818351275e360e81a6feaedda7078855759
SHA256725bdb1ceb0319e40715473498356f4268020ff7b3711205b92de9c0793b0c21
SHA5127c34963e97ddf3007c2dacb5e3f1e6add51547e48f2e72b06c31b61686badd431e85b62c4ab2ee825c524d6f64ebf881be0ff089509937826e72c69972f7f631
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a