Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
65d7a909c047d846f9745fa536cb8d4f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d7a909c047d846f9745fa536cb8d4f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65d7a909c047d846f9745fa536cb8d4f_JaffaCakes118.html
-
Size
461KB
-
MD5
65d7a909c047d846f9745fa536cb8d4f
-
SHA1
c55a2c7809ca837273e9ebd4a06a07253a39e34f
-
SHA256
dfce66e777a4cb4bcd3140d91339cb8f648a6357a6a97f8e69df90dcb251ef10
-
SHA512
3d7e5b5f4f4891c9fc19f076ec92f2df693af110b8fc1033809a3aca19b6e5ed82556c2d520ccb0ce5d1e5b71c49d71368ffc24b509cc87ff0ea21ff94da0d07
-
SSDEEP
6144:SYsMYod+X3oI+YYsMYod+X3oI+YdsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3A5d+X375d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e7deaa93d81f6a96834433a1eb8ba6bd9c065a45e22c51b5cd737a60a36dd43e000000000e80000000020000200000009df2208eb9c7d7d0e8d2f72e25655589e516302f3dd1d6158739b92c12e097b9900000001f07066a0bc31ae88158371e9cb1e7cad68fa2433225ee8918ffbc0d4ed9156ad6106cf4b4f08d9aee04d177a2b05cb9d2a1782c8bf040adcd4848f86f3102584dd558ca34f284534b0d11e8e6ee343edcaa9b81551d412fd38aba0101a06d90b7cba791dd9571b7298e6d7666d28d564ef78317b73435320ae44745f2d5ec0b2fe67a67cef53c7b6a3ce102551f462040000000d695ba7e43d2739d71ac62dc07ef774502dbe9e21eee6c74abdfe38b404c48a05bed60379fae70521d35a1da9bf14306aa887a6a4d655ddd54d83e1293ccf625 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000065418e20736169b3217aa362e219911e414bdadc81019e2a74479dfad7189a12000000000e80000000020000200000001ae7978aa85f49a852d81ae3c43bbcd4d3502bd728e719e2f32f802a32c79801200000004e414c792b3363383435a320b99a8ea4c03bb62a16c32082becc1a919ef87d3a400000002dca45d95116cb8c3073a54fcb7eeb0c3ecd81b87cb34b3dd3f9c74c4f5fc422eabe57eb477d91d909d52c9e27075b6eb0c78065eba81d795c1b02c90fecdb92 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510156" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bafbb0f7abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D872A1C1-17EA-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1708 iexplore.exe 1708 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 1748 1708 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65d7a909c047d846f9745fa536cb8d4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572eb95e6124dda6bafd22aeb39a2ac01
SHA1e111fac1e1b558934c8de8730408b4904ae62e51
SHA2560e6f84e6ab32841c8aedc770f68278059579b3df6c224353c575381dce53fb5a
SHA5121b8f06a735fe9baa71c04f132634a36f48a0742a617e4cf063d17371a9421d0987683941e468edbc5e43302a84e9e23b3eedfa5e66f7f85e7cf1e59ebcf646bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f44c4f8cda85dd4df92ce208f4eb7970
SHA1d99484b9b3a859309aad37212e66e3d1ce9163c2
SHA256fd79c7dddbc2456eee9e38c05d5283ea4219c233f9886b50ebb826e28ea5656d
SHA512db97d4b30bfe018110cb99352eaadef70a71d1f9c2b674d2c7811190904e6bf6104b5c88e32c1bb1f132a847967353fde2f83ba7dca89fefc754e804dda35308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5898f67869395dc243a0d17b08f3dc2d9
SHA118dc74e727859d5a45069ae6dc621eaddcc983f7
SHA25632d55622738df3bafd76fae6c5507fe379a92ac6dcdf55d7affa39ac98086b9e
SHA5127c38a6de5611d3c200a68d5aa6d0fb599ef68f76530a906e3b33ef0e5adac01c873b72e74a33dd10fa5315bc42f443acc19c1fa251984a88e3c50586b1e9647a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50789b62b143624106a2100951a7e720c
SHA1bb7f7a2f55feb6c151e36df962642269416a7cad
SHA256be36f98a838ecab6be78f0ea7de1319ba06ee0b7c518ed7c814d5d6b8517c980
SHA512224f125856c4b52589129a3deac925ae9e0b3f80bea4121ac5e65b58c4ef3c5c12d27749c96288d704119dcf5fb30264fcb4a91996f5803debe5bb6b95dc6662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b33f19f021270ed015bc611f3111de9
SHA126ad92faf090ef1d8f87894bf83d193178b442aa
SHA2563f140ac72bef23c22603b2b9f363dc19235e0f14ed306d37e0a99152153cadbe
SHA512601f62a0950d070ea23da564c361c8583eca6b7adfd2aea4558be94b34c42efae7082f7d6a1225fb1cb3a1e8d7a66792a534cc0e86f254c8721ac5d051b0a1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e32862d46f46d133f33793c2b6e7cd10
SHA1ed346bb87d85425c5d70796bcc8383f0fbbad7bb
SHA256d62c58ec2270fdba1b85b0f2550fe6793010c37991f4b0381dbba8d66d9638af
SHA512486088127e40db2c17d5b7b59d281972a200d675c09180e449ab4d9d24434b4c714ac4bfb721564e124f66c222006bfd15b5a8234fa9ff070b8c601023a59e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d91df94d2fef4e8d1e2456a8a532285b
SHA192926d314d3e0f1a9375acd381eb7483c41188a5
SHA256ea4f31b47920e7e7adcb967c63d242d09ea4dd04cff07ae12b35c3565b81cb20
SHA512ee4759e2320359c941929bbf8c6927bd2eaac6719988c6ada30cd3b076370024db2b26220c8c6420211bcd779b8befa6ea5009a278d62f1bceb8e4cc6cbc2cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca887f5b95ed43e2cac36419e584c0f7
SHA19b164863293b3765de031817f98d7e2a044c6914
SHA256ea73a9aab9643482e35527f4fe61a930f03a969bdcdb9ac672752ad69858809f
SHA51257279467c9aade943844ba34a8ee72324988b221b141d733b400e4a60ad50978761b7baf072915bd86145e98fe269a03431373c97c6c6242a6ff4c6b930ffdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d1c38611e19a832d94d1c60d9f8ad4
SHA17412a1788c18dbe5ff0fc10cf02ba36c6f7a95af
SHA25656ec586c1e1a4f24e61b2a83dfb27986f89407c3ece421c71afe562b97e28894
SHA512e357010ebe98394f088e99fc3d75a30cb2ba70b8e92e89446bd41fbff0f9a02a7a91fd069b8ec439cf37f233749515f5e4092ac0227b332f9171223dbf4f5c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0fcc0ce51d3bd6e2b813676039e1084
SHA18748c1606c1c6dc2cd6b6f8d609a43c0f51479c4
SHA256f71248cde77b88548b91db71b141830f8357952e9aaf30389ccc54f8cc38d79d
SHA512d2fea25c30db086739b379549e50e67bb214cb196985b18228cc913b1e7f028c1d01618226e1ede29ecd82a73019e6220195bcd25a72b85c2b0fa666ec300901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8523696f452300a0792cdfd15d11017
SHA19eaf081106617043ab6ac12ca82ed79394e32fd6
SHA25681e58633154b1bef65a44a15aa495e0a791c8b534a01df85b8ac818164c0fee0
SHA5128b7b8116a55d9d0250a4da590f433b515acde7f779b1dbeb9655f5b0968a9a8561169b40f1459d99757e6cf6f9e0a34a8e6b52bfc0e10f94689f2ea55f77a828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc113916cad8430b4fdadbc064ad463
SHA109b89a1f54c57b4908b21dcef365f84e1df43e82
SHA256302d5048f8f016f53078874cf0b749c30c11d354390a5d04b8d5d2ddeb0d5aad
SHA512a42b28af5667e4076a06aba909156139d8f2baa9b9e4f306ddd46ee60d556d1fec13b1ecfcab482c953f48b3759e68fb08557eb1c9338166a1bc7293c0e08a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc806e307db5bde81eb5e472663754fd
SHA1d89ceef730a0ca9f688a6a1fb60ac126b54d9545
SHA256969ecb2ba879d5d66608f0354eeb9649e34a2b8b82be144cdc3859649e342463
SHA512d3ab3ff8367a41efd6cdb70255ef567caa616341bb96edb0a6e5b2835a5e9381f89b9ce985c27a4c0fd8026da10e1fbd8aab03873c2109b0bd58c108b5026f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e723a1e87cc8615ea3cae30ed8b1f61
SHA1c7dcd3222e012e6e40ae2f0ae6cda5ffb6238d67
SHA256073efda26853b4c96d914d972199ee2e244d75443212267e4d82b5e51e109080
SHA512a434e1e497161684f610d85ba6a5b7492ea685b6f5e7fd4021da0f265bbc26ab660fa99567e62aeef5557cac63c3ae7688af07c99f7fe51e0b22f8294701acd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a06d1832cec527d4ccf18ea09a3da57
SHA1e2d948c52d786bba98bfc29e2547274371fd950d
SHA2563cf9b6480c81c9bcfb668409c9e6b00241036fa7866c10649dc385cc1a6a41de
SHA51225092d2eb8443d9964352016b6acfabf6bc2000e8bcd0440684fdb14aa784e17311cce296eb951642fbf4f38c5ec49536e03c9197d8344990ceb8a973656730f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c2342e1124e02d8d4cfdd6e2882670
SHA1bf7086fd3695ba8488e296e07163f6ddbab86103
SHA25678efd49c77bee7c9429afb4b31164ae63777ccb97db94f6a6bf393a2d2bfdb96
SHA5129e1f712e021e98068842b503c24388f3d4f71f468c1b8901ee0a99217e3e79589ffb3de3918d70f17ca1ebb566cba19050569ba3ab04fc86a11da6374b769100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cadce86496ff94b6ee41ac33a6a594e5
SHA1bf7f4d0ecd04d3b2c1717c58ebff270db00346c8
SHA256981ec4174e18acc96d273562c12f084fd961afb9e3ec327f27a88165f91953a3
SHA5124e31be9300f383bdf5e077a6b1e3c88b7a4ee35da9afc507b13fc567096c07adfe5e8761d267759f9a5ba007d396f151b2b039171e36d27defc492ad595b6d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a12628e55ba221244ce4515c3c46a4d8
SHA1a9b6df7c9862d1ac1149e3a7017e0c530eb882d7
SHA256860db807c2318dc7e189da268d76cc3aab3f06609af18951c52f5f42e0d8997b
SHA5126548eac3956691e0daac89a7d76511490c3caac860d3f269a6edebb131ed5a3544743eb8f77400fce00a32b128d301142a467074ce77b667ff5a459eb5bcb849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5603a95acbb06659c643b16dc8b7896d0
SHA1add1f27f04d62253a51d001467ca60469d773aa0
SHA256d29f1eaf9185085dcf588b6235df37dc81b7b88eaddbcdebb72089e6fe958527
SHA5121bf6444367c065985fb78a5b4b30673316bfdcde4f6b3f4bf319c6e7f8b885097c43cf34d842a6bb32e00f78b4df9d029fcf4992e5f02e5e611d0171e4bc020b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deed667ab2c7588f6cb7f8c7528cf30b
SHA11fe527266511f94220998de3a85c0b91bc0324b2
SHA256859be88a7e00e0fd656811785d560b1451ce2489fc4c48a95af3476e438a1836
SHA512441eb175cdb061e8d1e3e47f0e1fa8cc86efd1113ed620837cc41423992920c3c3e3b5201711ff83f83e523cb611273d2f10074bb435a7b12e6fd606976026d6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a