Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
65dd492544aa3033ff6e805a5c61cefe_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65dd492544aa3033ff6e805a5c61cefe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65dd492544aa3033ff6e805a5c61cefe_JaffaCakes118.html
-
Size
1KB
-
MD5
65dd492544aa3033ff6e805a5c61cefe
-
SHA1
5b31ddb597dd541c1fc6acd4ee8de8f8941ca027
-
SHA256
ff1b7a4cf1a1a19569c77c12b8deb8d76ed0e4f0bb72f61a9ed2f3fc0b84d161
-
SHA512
156a12cddca8fe60d360fd69e8f66d3cbee4a913f3ced4f61076b141be5799839a05cdb9bbab35a5ca19c4053974c30b3ab6fa443c21cde79c0e61be1ed09510
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000024a9064387a92e96a9359dd33d5303a718a5daac845fe50d786ce7548b1e959000000000e80000000020000200000000b4f16bcbacc4669b267d516b932c184b6330b716ddd096741375f138c5ed602200000005676bbae3f6cc9eaad14606c9690d53d59d32a7100cbd473f6b1963d3e236983400000000c88727d98f38519c8472a932321d828599f97db36f849b3145151b5e101fa8256b7989432582463e06875c630e418964a4f11dcbf44039df1470a9a64069f8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2025f8dcf8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08725CC1-17EC-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510666" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000015ad1ca2dfe59596d6f2dc95487007addbff5009b3b0131035db962ef3d83c29000000000e80000000020000200000007b8f75686cfbfeb4ddd725a196905cd3d1fc8916456bafbcce2b314cf0d57e33900000008ae48ec958451bcb8f2233ff6340192ad95f9943a5ca5f133ae49c7203f907061c20f1ca589201c9539a5bde2dd0aad6cbab62d7d137426a57828fad6893ac3912a2b5c4978f3de244397f36c37f3a5ffb2e67b8b3485d27acbe090e3855946a74019b9640f9c72357366721d16ee20c8f4d9f93249eca3277d160307aad13e81d0e628ac3019b58852f85b2baab76f6400000002435e2793b7117369a5c6697e6937466c9db75d0e5e5919083d34ccf41c41adb0102f803a5a39c1440036a4c46b9db9966df7df88a966fbd8f8ba2dad895e413 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 3008 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1736 iexplore.exe 1736 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1736 wrote to memory of 3008 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 3008 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 3008 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 3008 1736 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65dd492544aa3033ff6e805a5c61cefe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571cbb7dd0f38d85bee174c8d8e1ec6c6
SHA15bbe5c401e6dd7485a2fc4f728b44465d594bfb2
SHA256b517ca695f553b009c792a348571025e34a6ff7a022a6f7744cd4a99f13c831b
SHA5126eb33cbf2f24f6ec61ffb8aec346d00ef5546bcdc1bf62f8b6bdbc261380d6166258517a9335004449bac112415c5b7c362157fea69318b4c27abae2c99078e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe97635519848627c5000710b854e01
SHA1464edd89d95ac3dce606f037e1ef17e83556d442
SHA2563b2899b1b2241dfb0e9226855291228fb66e0829f3ebc3ee8e6d069aa70cf1b3
SHA51291ce3fb9652b1e0b0a9744ad14bcd6aa513337ce0f628a683ed438940181cb8e82c7ec2802e955c03f7f60ff4044e30a029564934a3bdcb637c63cae063e91a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df463f0c794f773eef7cf0950c2d1a71
SHA181490374ce3e4a5909e18b6c564b6d3a7633c150
SHA2565e55ea2028aa05d5c6383bd1a2412916be8afe33305dcbbb84c5ad9a5205cfc3
SHA512fe109ba4e2d71fbfb26ab65a2e6be0445769f4c107739ee4f241e2492678b55f62ae5f029bea2fe22b1c64615b9a7a1f28bbba0b60b126c1c44e68bda7710b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5797b15b3617d9afe4c4610933d108beb
SHA1f1d89f1073cf71e916032fcf51843eec44cd5b89
SHA2565dbb28b14a04de72733c1928e9e0f4e7ea6e96635faa77456b3ee92b9c28f2d9
SHA512e61c4026a4f88ad282fc3737071819a81ae1c902f074015845b98dbb78aa89909d8a058f70aaab05a100c03bad9495535e2d33d0c20094ed4b8f4da1daa4f2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50401f5d622c9715f6bce3c2976484566
SHA1157f7b244fda3262793d61b106c5dc201b640c5b
SHA256354bbf8ef20f9023ed5540f4df51e2b78e374d68e2751bb724c241c7d00ec373
SHA512e23bc47fcbb225ac6f2c28d26c9390279a47b76bfee76a96893b247e769fc7aa131c002bd4fa2bc5a8be10149c66f2f4f6254b7fd5aa006f44afc01e209d9632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ae768de1b8092a689da0b2dd2bbda1
SHA13b4ff184309e39d5cee0bb57b8d7f88ca7582c7e
SHA25605bd4b9f63eefdf0751cb3cae4a4ee87705d0611d07aa901d21a58a033d11877
SHA512a51a4aba0bdd0116c4801bf9664f1c280b274d6c581e4eb3198e66d2062ad9fb8aefdc55450641e51b263fca0667fa484c69fd9088f2eeddcc6df79bbc35d554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab2aa6c00d7b5ba643676874ac47248
SHA1a9228de2133f152a36d99f1d9ed33671d96e9a4f
SHA25615d96a01aaf7f73707efba40321b79411b7c038a50a77964eb715337bb28b3a9
SHA512ff1014184cba090e43f1e9530380997307acbb32729301b2593d5caddb9b828739e7ae1e9b612de10cdbb6dcf7907974e23b5009fcdf1e43a74a5b766b0110b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55561316e9613db36668a1f6324a54961
SHA1269416e7e1b01ab1c3ead7a13490ba68c6c7af61
SHA25627c1034047a8eb4d6b622aece724bac3a09415b0596d27978aa08c0048331bd3
SHA5126298e8c7f5524cde3fb350c0b5493921d1c0a9b9b33307465b05a003179df2bf5bbf0f9140cc0c6007ea42816a647a57d695b7e1e47821038399f3fd954ea25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1738e06f47dff4bda1464c52a276d67
SHA1dbb31411c38b536b71739b0a42395646d076c02c
SHA256e5591deee0ce5cc19d22dc30b9fc02ca605496c690546494adddb062bea1322c
SHA5129403cf5ec57152dd5c3dd98c84c8b8f5c9df6f0f77a475aac2b9d55857b2a4d5d5e0060de414247cbebf9bd64caf007f19cdfe0d62baa8e9eed7a44158c224cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48417a32441e9dac6b695ffc3c3221d
SHA10c91587b8e5930d7b104c601d9ee22a3eb84f117
SHA2567a4e34bb9c383c1bba064fa7cacb6562c4dfe3def49859fcba76437e30273e29
SHA5120cdba7488fe7e5f0f1cd1eff93129e67aa993080e89afa21e404ec1e758da76e63f466f561593c14027b7dda7d08680afdb573261a47b2b302a54d46d74c83d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc5e2c5f4cc705026e66b1c77bb7de5
SHA1014e9dd9fab0d459df712c5ddd72a03fc8bb8259
SHA256ec877fe8bfd0847e62d050edbc7b0326a968949397152dcff1a1dd5feb11ea21
SHA51284f210646f142e266819be746ef9d05680ecd3acfe4b84a4a964dafe233ae262dc4881a931a129951efb8a4cc8b32b0aeb9f59759dced8654eb9c25f3dd464fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f620fc31c2ce78fbf5b5569a29142d1c
SHA1207ffa9f8a6304c29f1bba62f93a90aafc20f6ce
SHA25605c10129266390b65047cfcf6f207dac87fceccb0da2aa7aeae5e7ba0c9dfdf9
SHA51219427fdaa87171d0fb028a73f9ffe25ea8ebf21bbf75742b3406922558408bee6dee0ac0e5e9c71388bbdc7de93ddec32a17683c7deb8db3d661e0c282f71535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d96c2c5793051fa4272977b28d005cd
SHA198beaff516dbf2dd075af5664558cc1a01ff7af8
SHA256e8e53446605aff2a40a6d2e63a2f253f1ef3d257cb3cb9b5aae4354177ec974c
SHA512e014ba698a163c2345636deb90ae5383bb5611e45c2b5c12e7b798bdf67f7c22403a47069e60e919f1212abec6d3e6690655f52e8096ac09530af72a160450fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf69f38eac2b1eddb902c0415023a75
SHA11cf43111b9bc448cf6328da7cd22e9e130475495
SHA256c000f1cf89f1866ace0eef529bb88614f496fd7a36995ffce0124fe7145f1382
SHA512f4fc7d8c6723a4a90d19fdf85cdb044a58f60c777fa6c88aa6101911919bd149dde9247014f8e2c3124d3092c4290302821fef2c85baf19bc4b06c9b5a17f05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59324b83dc9b62490c1c6a6b112cd0939
SHA1ca022a21bfcc79265bd15ab9eb678803c5a89c22
SHA25696a2dddd93f3b4c016ad4ecb8df45a465ea27f17eea89243c640d14981447087
SHA5122de9e5ee2f421644c49feca030495e7769a612b303d2e0eb2392bc451462804a6a253fdfbf40921c743c6f2470ff0cd2615e047fae520350d1abd184a45e43a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a944aedd07155fa456aecce1a6faab
SHA1f293bc6c3e157f048479cc6b6ccf2ef66736e4ef
SHA2568867180ace57623ac28718c7dc63c7a80023134a3a034a87e3d1b0e024b62389
SHA51215d5f5ea3b5c89e265467deafcc5a7f3ebf2414817d45d3e99747b52803a479d725e3d4dd060f8e4bc47a387ca8c2dd8232e0eb67b70c690bb11f3ff4b68557d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575b6ea14b37e09cda3fbde0fa8ea14d9
SHA12cac60c53ed2c25a1e6e23294a09fdd9909bc0e3
SHA2560b715a968b0d5324a71596e58b8501da03917ec87f93c340a3b96f823cf20a09
SHA512feb8579b2fa9aa259eb7d9388a930da21bf103a0acb45647946fce8cfe4f2c34e231e5c3615d28815c61d20923785a63c3e4ab64f5a90d6877cb4b443175f1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d94f479e22ee1b0c3157593fd911e3
SHA192ad6d991dd515ef5e1436cfe4772e81f3e98976
SHA25689c5e29ff2af94ba5455d576451d10e3a3d102ccdf8d2a805d2f6857907f8156
SHA512272d8f3f4a7efb52395d86482aec5dff7059c42d62427780fa0aeb7dc8d50b1654ace002c05901f9707607c2461e2b27e44c0c9531f35ecc6353f64dd3cfe8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f97f263b6decab56e4004023208d78
SHA16c1bcd202df908c668c789f378f56eccfe80bd02
SHA256d2806c3b272e232d798057be58b8b7c272bade14f73217eeaaf0456d561f9471
SHA5128e8c7c791a4d48f84a221237f4987efd4324ca7af5970ba770ec6a71e9d3bfd4770f4355d2f4812ca22ef099b26aef2f0f1dafe4091b5ac1f08637adccc6725c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823dda0d98da9f1733bf3f702abb36fc
SHA1c705211ffac6e5facc0df329c5af680e74636769
SHA256452f667e3c2b2e8fb07b6c4d9ee534229b42981c483bbdb392b8ff985ebed48d
SHA512f11840c9d9646e8d7c68d18ae6f0a60d34fab42d0148a8a53a86ec7cc29558354076ac31147b9f87862c6ee05e5c4ff29fd3ea7965bfdb78cb4bda37ee7f3cde
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a