Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
69321e70c8d7bd9f0fd960a94fcf8766_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69321e70c8d7bd9f0fd960a94fcf8766_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69321e70c8d7bd9f0fd960a94fcf8766_JaffaCakes118.html
-
Size
460KB
-
MD5
69321e70c8d7bd9f0fd960a94fcf8766
-
SHA1
fdb9ea3462e5624afe78bcbcc254e3e8ad5c8a74
-
SHA256
48711258361958f2149dcf06d0a0e50fd663d14100ae7d602679a9b9ca7993ae
-
SHA512
e1ee2eb3dfb7d256f0491c3a3c748396d54c08938afcf8b771222c3ae3bced9229878e43d8e0808138707327c0346b8742f2c381595188521efd7719d8b028cd
-
SSDEEP
6144:S0sMYod+X3oI+YGsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X325d+X3i5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000230b3b0267207842b2d525ea3260122e00000000020000000000106600000001000020000000ad0e90c90f9aa9a4b9ac8b69571cbc7664c759c5dc38a6191e13093339f8d211000000000e8000000002000020000000a70563b83d288029d663c83a6a047513f76078a9766730d59fc2dff5fa80323f90000000c135e55f07d03ea0c2fef14278831904b46970576b9f61da0f16c67b35e292989f50d50c2faf7e3840ad74508c93601c58fe61e24b3bcb4e1056025ef0eb8872583d897a598533e22b9783e0bf77221011453c8d2a25da7ff1af7aa4391ad27f80e494fa126512790e61ef8654b88e782a6c0587720dcb126e8ad0db33988adeee58ffee49f0dc4ddc8c67b06b95b0664000000001bc300981a3823ec480943f04c57b3e91913c1ef3daee70dc939c2558deaffe626f1b2d8056c215f94dd8c85c809790f49ac9b798a7cfd5debc8658c318902e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67052AD1-189E-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000230b3b0267207842b2d525ea3260122e0000000002000000000010660000000100002000000029ce24ba5e5c7871f1e0e625fe3a657819ee158fbd4f86bcc998e2789013e061000000000e80000000020000200000009682ca0127ccd6a9e0a7be23382a62d2cd7ba9c7e18f176326a5a7d1277dd75520000000e81edc6669d16bdd8f4160542b100c36e964bebd4a6d0d6ee21c52a9abf8955140000000c30cd983368f1ddfd76bbe2461b5e9edb66230976c305217264ec799ab85ba9960e070627294bfbaa827f766061518ad913c4a460b54d7993d9fea12fd813f33 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d053a43fabacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587277" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 756 iexplore.exe 756 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 756 wrote to memory of 2620 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2620 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2620 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 2620 756 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69321e70c8d7bd9f0fd960a94fcf8766_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5565325e2303004ab35e726fa7ae6b6db
SHA1662bd291adec9253873a52c855945180f0eb6138
SHA25657118e5c5d67d638f391bdb3ac534593429b872ed1d1dc12b38b4048761dee5e
SHA51257830c3c60e795f38661c0f9ecdfa15ea52ec4e6e51c3d198fc95ad943d29d6e04728c99607e35199a1df939e585b080fff8abd655442a60be18448f423f3e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516476defe276769897e6a370857545cb
SHA1c8171d28ee1d1fd7e32d35f5df822a8063aac97c
SHA256600d2454bc17d0af17d4974b989caafa5e65361a18d85fa9fed2b8d35266c65b
SHA512240cf475ef49c20b3ec796e332fa2044f6c59f20abf0a1657e96b8b99f3efb2902eae53b908ed85b789de2a9de80c99c014406b66c0874ae507f77e8f7161dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e8a91751b438f038326790c61e551c
SHA1010cb4ef484c1003d0657c4f478971948078b598
SHA2562f86cc687e4a6783055d9df9cc6582b506fbfb073c2e25d605defb62f29033b8
SHA512da00e0eca15e09713b60401bd3e6fd29c8800672d94f996da74c80e441431c6f6e3fa149049f2d9b35a8efa4b95827c5e0ad05805c180d5c7a9c876102e32c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53076e111710d621ebd8428d0f10e2614
SHA187fa716504cde6a2760753acea50e0f845b3434a
SHA256253e57e71dd49880ecebbf5681881f629b26677c87a19a3aa53241520a963622
SHA51266083636875b1d9488dc00f324c09428b13ab81cb22a993694991c7ad0f5a05f8ab8785c9ee3de3b725da3ff2bd8015a6a85d461e0d28c07a23ba993549e9e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545a6a98c0983a8b794cc8cfaa81543ce
SHA1c0cf54df72c79ea9730f32130f7243ea6a05ec5e
SHA256e0a0079c141cd74242de03ac4982cea2877be90ce689575cf4070355b135aa18
SHA5128ff988ce9f0e299123577b750113a3fa6d7659e324144fbd05ebf5b6964274e392dae48c60e9dd581d12163d948b0b45b977bdddc84a5b061d7f3e415fbb841c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed40a2272133e556e63918ba04ca4d63
SHA134e18c0353fdc6b6ba9eff90c6de31ce680cb240
SHA2560b60c5e2932d27f9d32f2e95778feb34013440d9184e30b7ab493019efae420b
SHA5124c125d8ab69e9bd611fbc423f2ab6924d0dcfe1c9f1e43ad0e985b083d274d139c1ad58a7921057b58843efa93f25a139cd01187c37ff600d6f39c45a0b413cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59db0ac4795cd70f5b55bff8e4f52746a
SHA16e2ee8658eaf85d4d3414759c73323d286ad9bfd
SHA25652ce737d365ffbda4f705faf943044badb3eb5f47fee0bdec1c8c2cefcadb247
SHA51210eb897781e6a9d7cbe297ba8ef2334129ee10802ce742b4790260b9f7ca1b0579f66a29bdfb7ad49033e0d407dcc3f6b5003f426e3ff2f7804a5b57f210bff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e290cae37ef65f4fb9c059510ec0bd41
SHA102425d4b78d518378e36d3b3235aefd0af1cf6b1
SHA2564c0e235bcb0e23f4bb2453bdf0460c0ebacf6a39b575016d6c9d2269c3f92efb
SHA5129a2628590135da47f2df89208313ebb8a5ae3ddabf83d8f8d4a9af87446fb087df3da5e7b43ca04d8adb2a2c4adbd3946e972238fa75a537f6342314511570fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c92c1375399a9f8e1dd70090fb828cd6
SHA1c1f72f0397c8867bd8a8563f5b7a13f3ac2acd71
SHA2565afa74efde26058ee5ac9b65bf6c6e3ff0a20dca24e40a41870a79d72cd7fdf5
SHA51239fe278d7a6b4a0e2b7f7938c920eaf79f9520ae3bf2a80cfd52c79a15d28d8b1ad3640e4ae16daa86bf49c123d60882c11a72b68343b54be84cd8ac75bdb372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ac641ef8c907524903fb74867dfe14
SHA1833a9565beccb87938b87c3ca38cfcd039b01382
SHA256671923816610ef73cba996669cd6caa1930ebf8a5e605259f02ab2e736f21a32
SHA51291e84fb00e57a16f3e81d3565e5f7df084b939371bd40df6b76d83a2a5d2bd5b2860bfea04d1660442ed283b366bea54e1154b8b5a4c601eaa2ea66d9f59a3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8c84fe559fea3ed71eeb2e61ef8f207
SHA16cee972b7bd1384e437655aecf01799b14d5f0a6
SHA256fa557eda1817b29545f2fdc456b4277baffdafb7aea97fc7884a5b7689398f83
SHA5128b26da6334e037cf1612ce385056eb037cb32453add32fdc57d554283199779dae1498ce153cc8e494bd2c7bc96ee3051f7fcf7cb42d7f9877c3b255cc8e5145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516a527f3a7cf1d0467d1e67304967049
SHA199fa657ddcb246aefe7adfa3a7181f99ecd6bdf8
SHA256710b9cd9f20201588b5e76a1886dd71ddd98ef2b04bc4625899d6bc0bcb5ac44
SHA512a89385bcc316c525a455124c12eb72b94f59e34362a46b83f9f010301713d8279d78219d80c348c5081ce551b6a62f2e58070746bf9a554dc7526f65e32494ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523de5e1ef449d543b2b96faa164fe2ae
SHA1402d1402fb176264ed24eda5d2b6cd79e58758f2
SHA256da25ffbfa6c25a778347d35eb7d15c46a90dbb8dd398b05aa50ea9feb395c4df
SHA512424d4ed9ad5e755b5e3a59f961050142d244440a24acf15fe9cbc13f9675768eed9f3d1c49a3cc8596d4fcb56ff6aaa29cfb02f4d320730ce8940e0b41e1fd64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501881dce8f33ffc6d3dfe401d5a43685
SHA1f0cea208f9a9d09d4891a3e0690630b5246f6fbd
SHA256c94a059b51f0239de843e63252178e47dfa812fc70f0c859f480c9b8d5cbce51
SHA51282452fcbb652278778c32fcc78f87621de2b7cd7f9e0535e0e9fa49399f95c620d5ac7ed6ffa0d5fea933289b4a6f30cdadf3de83704eaadb7a877db3c3b469b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5635d2ade75cf18f661e3fc81ee85d941
SHA1cbd1bcbb354940c81082f0a2069e53bc0abe1ec7
SHA256282b8f389f78be5e67bef061794bde45a72d7745351a9ace85d2cf8bd15e2676
SHA5127ca613cf9dfd1daf39895f1ec911a7b2b73ca83a9953ac927929231256272684c1481790970ca3259e391cf9b65f3830e0813ae93c3b4288875358505cf08c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af6d1e76d9c0b7ea80c35feefee3ebd
SHA11b3f85e3b278bd1795769f48a8716e67223e392d
SHA25648540dda029590d5c96596c479c7b2b2a66447171312e4e389f6de8c9bf8ce5e
SHA51203c859e1c29740b66c247568cd7d5e8fe43448755faf2adb09e1be0e76f0c83dbc3d9c524ba41843f652f560f99f8d2785cc4bd1917f9334c71555d11dc8a1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b34eb9c64201f81027fe4c2cca5830e8
SHA12d9a75c040b2377f534550875be4ae36ffe9a59b
SHA2561920ca2366080cd92643376c34fc39ce8dc80df12aa7b1575d60cff3326758fb
SHA5126ba8c01c34978ff7e03dd5115b452253941de080ac3641e89d218e837e1e95aebb4cc861c6a1aeb24da913a41af8a9d4d111894e38ec245943cad757e2d104d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838855e6db50e14c7487542943534967
SHA1483bca11f55848004605c40f8a625f3446fa9d08
SHA2560d84c01cb3eb8dfe24d1893d8b4df12b9deb58b3db613f222e342a83d4568bfe
SHA5121f979ec6cc8bda47c59f4efac44b3afe9f5869754e1d51e5a40bd02a8970ff3c1ab0b4bdd95cee54534054c47ad65c7f926da82e5acb1be828c5658b65ec68ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb4fb12931925fb42aa92b32095ea70
SHA185ca0f7699bfeaa986df6cc8e10ba69b2105f421
SHA25652658b2621008fedf4edb4b09662459a575ebea47d1fa11238f661c5d7b312b5
SHA5126c7fbaa0e2424aba78e2bbd6b690af2f07b2c64161a69791c23192d5a4d2a6e5bdf2cd21c8060d53e9fdc2510e43dca6f308f510c95b35d8219a2c93a8247f1a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a