Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
65ca945a4e1023ea4cbea0a63141a8cd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65ca945a4e1023ea4cbea0a63141a8cd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65ca945a4e1023ea4cbea0a63141a8cd_JaffaCakes118.html
-
Size
50KB
-
MD5
65ca945a4e1023ea4cbea0a63141a8cd
-
SHA1
ef0b09659bb77bf956f3927e1abbedac8307682f
-
SHA256
d1df53ec765a55ce2595299870871b8004882fc6993338ad3b19df3fd09aa49c
-
SHA512
742f0e28e059076e72093e2e7c8f4bff5556106937b9c32cd458dc3452afd002818a9d550ff2659b170c60fb0de45150d503c6a45021afef7c9210f876177f4d
-
SSDEEP
1536:OIIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZQO:MQA1M2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422508949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09089681-17E8-11EF-A7E9-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000024ac458b26240e82043a9a424342bb8bfe96305bfeca7ab5adc02e368f2f7d7e000000000e80000000020000200000001804e02d4a537387e2624ff96c0851194ab24d7e88938ef47c49f07112f8c6e320000000befeec2f944a30ca9618d60fe463f1c2645a88d42c2a7bfd992816e3ffa5b1a140000000b989c6cff6fec48ec37c8b99fb237283f7ee82b0ef6f54c71e0df12f9db31cda5a39d36bace6e4d2fa8ae1e61e23efbe93e303d77c3423983c5260ca5d9302f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504014def4abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000082088bfbf666ef812a3cc1a25facd9e55a78116b03256ad825c193f6adcf1871000000000e80000000020000200000009019f88ad6e7231c4c3b22f1df33ac1db36d0fb5c9b85050826109869ac6fe5d900000009531fa8a4c224ebf559a1c66d74f35e4506a133a7e10c69fe270f52a4da2a753658272c6d7ffb7123ca98dedb3a033e565a5ea924a35ecf56ca5d18fc4d06484376c518b963510096d0997b758786484694bd484c4008745335d4172ef4a95b6d74701b1d646c3a09da4e994561bf195c553e08bfb5a9ffbcfa5e3890491a1046a57d33c0fdef99755ba5cbb40fac1164000000037d6d8f8138b19b1ce466850c183d982e13c883bbee5379716520f3d401e5d3568504659362e582056f11b179c1bd78275117a53c2ea74115f9d3c5014533f6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1596 iexplore.exe 1596 iexplore.exe 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1596 wrote to memory of 820 1596 iexplore.exe IEXPLORE.EXE PID 1596 wrote to memory of 820 1596 iexplore.exe IEXPLORE.EXE PID 1596 wrote to memory of 820 1596 iexplore.exe IEXPLORE.EXE PID 1596 wrote to memory of 820 1596 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65ca945a4e1023ea4cbea0a63141a8cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD50ba755f72c28f7fe6f315d84fae5116a
SHA1f7838a7b7475224a5cea56f1ca674731c6a135cb
SHA2561761439e2a63277be3b2509bed880275d7469a47e34bb81623fb6e945bf4ab45
SHA5127837700619d44853f72f507b7da7f461876c8766e9bb419f1aec5d474ece65a507d0e45b1bd04dddfb9765bd73be16d89f48b542eb6271aafdd8d3b677849d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf21764601806b917ed7f4de928944a9
SHA14dde3c39d2c1ad9f0ccdb7562023d8af388f7c6c
SHA256962302f8bb585ad62b2568fa95f725c8b1ee3a9ef157ff880fc3418df2f4aa22
SHA5129c7a72f5d2b8db5dc811cbdf49f71990fa656e13bf967773fdbfdb4cda0af723a8e9717261a910a81b9a01cf9b27c07b5e9616ba4d4e984a6d16d024d52f80c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cfc930af561b67c0a46028b2da06a8b
SHA1d71dc734fcdfa5bc3ddfeca980843bc0fe2dd1f1
SHA256e6e60152eb5c99e2c4812c6daa995e1e552a46b3b2f40f12928e22b0d0ca4210
SHA512898ad6d010ac0512553e35a0a168cfd93b9112eab2babb9d8527cdcac042b8be2b33e3d24b49d5a8e116368e7de4ad34a9f3986e30cd055cf11780edb3495ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3c68d1432a09eb8c321ff0bbeb4208
SHA14b66476d312226bb265ed681e4b42041acfdba9e
SHA256a9c8377c035c93d21fde4daabc0c2e66c449f275b74180ebd9f9f5828c638244
SHA512bfd326bbf13fda3c9b0f3aa7fb02def5df4259c72c71366f16c199102b186e6b397c4d989685938dc2deda1bb43f5ace9ef5e804faf63b7b6fac55680245f21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb738b41ea217988e5e7743ca49b96b7
SHA1638d3511557f8fbdc20414324abbeb50665f87bf
SHA256e470c2b9d5afe1f254d1bfaf2fb53df6069f8ad6e9e09d223cec2e1a1467239f
SHA51201cd6ff00bdf6f9284d6de4b3a9ba3dc18acac27aa9688659e150c46f26fad56d831cd109d23746d785d272138b0733b06037816eb6c215c316baad89d599dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a893d03bccfed6e12104bc4ef95e5d1
SHA179e363dc418b1d33604ee2f8c768c966c1fcbc6e
SHA256c696804053f75dc687bb8520badce4e5485cbe8823ed2df379e28032d205c936
SHA5122f453b63b1e5ec9069fa908781a6ac8a5980fb82fa2042432525efa12737ca6bc827efb20c0e8a66c0d5018831b82a42e032c80bdbe4c4eca16bab854e114f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94b6aa911c7e52232e54343b3734612
SHA1ac75fced76a91eed19cc2cf8b518285d6e20eb14
SHA256b9c180fa616ed73749f4c2bc555508b365e70bfddb1abcd18fbbd6a8d562784c
SHA5122a943e90e5b0b07547bb8b4596b8678b2988fdc1aa129c667ac0f9857d82dbf6187b26175df6c547dfd52ea8f8e8307920897ea0ce8576067b064b361148ca6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562655934d1d72d1bae11e9e0f63a59dd
SHA1c936db12a956b2b11a41a77380ae8f483afc5f0f
SHA25642aad6d09bb27fd2a1d48c5b7f5a4a779cabc2743c772549424acaf0ccbfee90
SHA512d86299d4c8ae55ee80f502047d295dbdf7b51dadce59ab651c05ca8c957b0356a5356211846e87b733daf977b4880847b1e1b8a30c2a116f8b141043759f423a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51801dd1dc5910f2edc8a53b9cc8daa2a
SHA184186ae0c528b17ad9a408bbd7de3c1c6be4ff27
SHA256e3ed790408cf7a23c781f0580e43b5491cff21731f07ae76a76daaf9f712f931
SHA512377b90ab22eead3f804afeab09d180ba89392beae96fff702acd1336b00f2bf51811420ba4761254232d39722a81d9e471ddae5c865fb713eaf5d03d4dd40505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5541dbab453e983be1ef868919ddec385
SHA16f0427f51eabe1c1bc6d5144f8512088ea413e7b
SHA256118494ff5cceba61bc97efeca96235e76b6b505d2a8ebadb6beb5efe07924668
SHA512d5c1d99e54b945ac0dfcffe8cf44ad0c775da1f2c068f1a42a07d355528bd4e175e1be5dd110ed771e715076314bbd750ee8f235ccf14a00f9316ab36c3c6d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85fecbcf6e7e1a783ce9ca67ddaaf82
SHA1dd5b15a795a7defb0ffff570f26e794df77dadbe
SHA256a58cd844c9f85de955799c34ec60cc2ec9cd88abfd61b9d89b2207b7ac187cc7
SHA5128ebf8065fa6de6422537df921aa9d1ced0356c0cb14ab69019d5fe35d49a6ff54b2051b4b8aed4d6baa64138f6245aef95da0bf1a3d5f0f25be472a54edaf1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b0e2eb0468fec7b59da027bb02a2fc9
SHA1e2ceff08a8e2856c1d8927fe1d6d26ab229f037a
SHA256695fa87f7878e7fb3ba448cf497fa0d99ffd2e352e9e240f8fd6e0f441dc939e
SHA512f187ee6cf12176835480f4a066dbb90a4b1bbbdeb7ad4ebc50c039310a9ce8994bfa745a438dce07cbaf977dfadf79448a43d3e1271b01b1eb7cd2aa1e511304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d60a76c384b788a0886593d9f70322a
SHA1bc5ad27ddd04f3999ca593e8a01216c8d379e3a9
SHA25683edd34d9c28705839abe2c349dd6c70e737a279e6981ee678dde5e7a631e41e
SHA512c38c1340bfde8a09d3c0fed5a66cb5632b069d0cd17ce917ae2e5a6a57e7fc34c5a58438db8867fd9f7623d5e8eae3437713da8b3162a56841e8d51d9586b125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e35c3c2a0f1194b025909d253c7376
SHA1f4b89bc8f71abb733da32106477718b200c6f53f
SHA2565e5a923491538b7dec0a95262de850fd3c70ae85bdb4b116b6d35dda7b02be3a
SHA512037bdcbfde068d414dfb543f09673e91b00a17aa34cd3ede75a56f0d6fa29a06f9c08ed8563a622c850a1a11b10d18a166e7984ec09a9a510935672a896c84b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52924cf4c55b877c47d1a8ab3835fd439
SHA10c31f07bfe5328bba086291b7429897a84ac7cc1
SHA2561b2fbd7f6ca901eaf6948641567db3014990ecf17ab520b1681d895ada629276
SHA512ab51383374a4100ba7dec6c0e11ae5ca669fc712e082f388dd492c80b9a251a309ff4b54c62ba9626f14db283241fa517f31079ed6974d29c1c51340cd4185cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f354d489b056d2e562c2a3c41d1e022
SHA19e4a019537f315eb07a0392f4012fff579d66c2a
SHA256463d47f85e7edea4a88b47c27d130093a154042205bada01bedd27d1e6abcf4b
SHA512529c9edc5bc52bebac284fd59ffdb9f0be95de420f6c062bd6cd0c8949e74d0db468688f8853335101c9a3bd4f211c1db00966ef3d9724ab2a5975d9f1817d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb316095d4336597d6222b186e9a75f
SHA168f326a16b16b2fc1435fc8fe0cd6377f27ba8e2
SHA2560519346062ebca85d66d1ca27b8a4e51281d0bd36916f5d8e1155547e1c3d289
SHA5129c58f192aee9c0c5ced74bb7ed1b97ff4dd4a603a5231d9d633f29a348eda3a80d94c604a84d82cfe2e0d3d1726388f0482efaea424b11e891693630aafb5257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca7ac2d170ef690370043f6680e922d7
SHA1709c5fe4a8ea6f2254ac4712ab04553fcdc2794f
SHA256affee8d63351ea5d275c25669d703c56cc5310d1f2004fa5f2e67c6374c357c8
SHA512a1551495b9e22cc1e6b36c9c4edb32878150921d00948628a9c65e2bc5124db0d7ba8585221b18e593b1f57d0fbeec74690075046dd213babb204f613d5d8bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5430759109c35c46f4790029153902c35
SHA194e8fbbca96eedd68f2ab8e84d658fe6afb7cd15
SHA25620843afcc4afdf1c747adbe95ded70d33c78e61b61b6b829544fddc4efe4b14d
SHA512c2d816710eee41baa3849a301cc11d33967bb6dfec4e8d316b08c864a03bd0833715cbf5570b47110cfc5038a7e314812c56001df6e55ce35cbfd55b8e73c041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53149f9ae8d985d25bb6c14ed231c163a
SHA1fcc3fabb699f4d596c5dc14bfa6209c98d2d2519
SHA256d0f540bf2b67b27076d8f27c65161eb4885412391d264650d8c0a79245d868b9
SHA512082c3f0aa9adfb359120f13248e5d2a91dc9ea71997413dd196a8e6df9e7ebe8a252477132e724896e30cf5d1d790c981c4f8645c99e0e32d03a1c9ca2c282be
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a