Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
6936f99e2603d974d828c07b6b62925c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6936f99e2603d974d828c07b6b62925c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6936f99e2603d974d828c07b6b62925c_JaffaCakes118.html
-
Size
239KB
-
MD5
6936f99e2603d974d828c07b6b62925c
-
SHA1
d963407d15baf6d646ed9f1336ecd854fa4350d8
-
SHA256
e10daafe7fc1cfb3f479aea059a61d9e1ae68e2dd0c21fad1a971bdd464fa199
-
SHA512
9a92138610b6d9b8e3df0cae76ed10a7f7124fe4ae31ab05bf50e04d3bf08c889598c42fe1e56cb6568a41e0ac2292e03a6e9a1c02cd1c6f24697f3b31e8a271
-
SSDEEP
3072:SZZBUyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:SjsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77540361-189F-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006e30b409a2753498d8b56774a237206000000000200000000001066000000010000200000002fa405578f752d41991d3760fb81a1deaf24bf99a910803a5d3d303509a13101000000000e8000000002000020000000cd67a15c4d0ab01b01598fe7ed7f878cfd243ac5335ee306e05fb12a4dafbb8c2000000096c742278cb688fa5a08f4d1c214db4d4edc5bef30e31efb9a19f2e918dd41b640000000c8d6b34882e010303af1cb7709a6111d37991a3f1bd3cf163cbbcc0d6c257791319d451615aefa1cf1b1f16100db1c0d6f4cfe2b5e1705a3c850a819d1ed757d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422587734" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0afae4cacacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006e30b409a2753498d8b56774a23720600000000020000000000106600000001000020000000bb8b9c058619f6e6ce047dc24ad44ed7b47ac23137bd22226125073f5bc597c4000000000e8000000002000020000000ca5280b77f49eceb60c5581503bfe7c255067736cf4a187716c7fabbd77757d4900000002c67f7931cd5e9084386cf73e02838381dde4f02d95d2a468960b2221aad14db26de8af264b4f777d61911c014a1c924adc2c1b9e67e289f4d047098fc4b2ea46376724ae8a524ce5444537dfc12b42d01ba0f7917eaeb53608e9d08b856ef6d3fc6ae492add105f9f1a5345baeacbaa9ad3a89a3156a6fa264442db6c97131fc1031019315150ae1ac7d94e881daec940000000c2b47b2073cee9ff9fb0b433faf320e15b4f31b8299af827b8da0a4dbb66ca64e46f7be86805dedd7253695ef5ae89f20650ac159592d9ce660438353c36abf1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2696 iexplore.exe 2696 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2696 wrote to memory of 1404 2696 iexplore.exe IEXPLORE.EXE PID 2696 wrote to memory of 1404 2696 iexplore.exe IEXPLORE.EXE PID 2696 wrote to memory of 1404 2696 iexplore.exe IEXPLORE.EXE PID 2696 wrote to memory of 1404 2696 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6936f99e2603d974d828c07b6b62925c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75b2e2b66cf71d5502ade40b0944745
SHA14cf7f0420ec6086fef7b8e183dd599c234bc23fb
SHA2565f07d3ab9257681927f0da240ce698a6ffa8c07947aedad73a89609367eb071a
SHA51244f7c139546348e8a0b41d21e61edf6e723f017673196cfc63bc5e03e21ead68b83afb56f064e1752a0afc22d0a3a1c7243f5b124fb4756b88be2addc3fcbebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5869fb7c5f047c3cdb4936b70c1283ecf
SHA1661d28862bd7c35dc4f0bc190075392f2e9219d5
SHA256507d456ff502e116f8f54ce116535acb6292b57c16f3507acefd290a30d28790
SHA5124c4f94fb5ae0f95c5b8522274d8bcadaf922d8377097b912b34248c8e11804129f09b3801da342ca64aff899c11e6dbcaedcf0eadcd29eb7f634a1f27f8dd53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbfb7db67cf1092180a4610246125cb4
SHA1b1867f82ff8da5cea332d18f050b47058842a140
SHA256aadf457b9150b6dae5cde6004339f476036df51221e1716b60df769c8a84fd48
SHA512b827a6665d03a8aa5c46b3d8ce7aabd2c5103413f09b1c8652542e718571cd82c60432c59043da9b36e03961b282b672b6ddfe8886ada68395f6dd083177192f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd8d88a7d8f6c9b95b759324bae2a974
SHA18f381c35308710fa3a0492c58c12336a2350195d
SHA2563e0b91933c9cdef51caf8abdb2295677a17a507496c80fbe3b94fcc55184a79e
SHA51221b18daee72fd4f13f7f19460305cf7640c0efb5490fd29c6ea7a0e47c3cf23a6c2006ed2f1a1898f9a2285237de3eed15b9866d75c9d63fa4a97d979f2d25bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575ccf88c29dd7bca8f00b1021236365b
SHA13455c32dd43f4d5a1bd21175821f899bc9a4707c
SHA256b3769e7e6cbc97b2bff37daacb47c01a28a58309cda8730c3557fc4c73143643
SHA512207f0d332b52f567526883556b63899f20296a1a878a8388652bdc4aef8edb1298850b29448ee0fc7f3fe21cf66e4dcd05ac536c8ef037e4bd47be3087cefa8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597a7067423a3e31c77efc8bf98c61528
SHA1fde6d7bf6c70b49d7ba2978ba85d630c0d7dc712
SHA25645f13e401504692c43f25f0ebd4a136fcb842a93c3a4ad671c598a1b710b787b
SHA5120a1ec07e30a1889787d29902ac3cf465fef693266cf757c3b50ed9915f9f0ce3da892af11486c34a6364e29d3832087e918b8423fca6f1c1634e1345e0afac62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5773ff1976661ee83194b037d7876ed6b
SHA130ac4ed12f8221076de5a7ce4135ef2887297d96
SHA2562a1e00774a8ac14b80b722d666bb1966bdff3c3e3899f9a1e7fff3006392f829
SHA512d8078990799ccc41c4e3578b531f490292f70c0b2b987bfc421310ec7ca73f1e207729e96e45a9187de56284e04c2491979b419a655cc812d31f28caf81dd830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1339afc2bd9bc157eb1ba5cac432900
SHA12d278debdcd2403f8bbefaa97dc4432a4cf8256f
SHA256eab453225249ac0cc19a6b283da25eca3125feab5498aa27ef7f05be35c24c1f
SHA512bdb1b7b2047b5778159bbbc3bd554748b9d8e97aa160998befb623daca9df56914545017746a08355711f3e7ba59df3e3abc99cde15fb0d5262c971f24895e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a569a478d93e6096004286e5468ee19
SHA15395bd8bdc26b3f089d8ca7dca1279d33154e848
SHA256c2d45b92a80e072e691b3ae8ea43adf0e1d786d78fdd63b22bc58066c7d4e37e
SHA5128752d3fdf9cf86a263613cc5d8ad4dedc8f8093a90950b887dcaeb77af6f690f8c3569bd475fc24b112604c23ac1f5090cc026af9ee48ebc0193e07ca568d903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d7efb0a30094d5d6998295cd53b9440
SHA16d86d4193da734375928b0111ed99c4c09cb30b3
SHA256ddee6ab15037704e89d2b52f4b8fcbc0065390d8c938c82d5d83c637c9b6d7fe
SHA512cef596ae8a2415a17fd6104491f086a7470634e3104f816b083241ab80e057db9692784e59bf5b3087ee4db3373ad378c0774bfb8db1e36a2d36b22f38401230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd21c2f0ff849fb2a5a75eb52848da02
SHA115f7f0e1dac0c3432a8e10b802298358344af820
SHA25652abb3554840d4842ef96668b2dd7889d790d0ed0fadd968b89f89e5f2bb8c35
SHA512c149a377698d00aa1060ff89e9982ee5a5181b0d7d18e1b406a0889561a933b79954d23a81eac4e1880849521bcec5e3550ff0fa5463338285aef476a0cc91cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c60d3c99cab2ea237783052792a260ef
SHA1abb454f3c6c501a354dcacd6772c6111a6c5900d
SHA2569228b2952c6aeb70b9bbf670cd56aa338bccf58b9d9f343f8147035c47d751f5
SHA512f0b98fe4bd5a5b523a604c070ea135229297f5fe6da0c61ca77487bd1e2dbcc9d7397bd107abb56c584f5e84b6ffa318fc5cb29134d7e75ea020d2fd493d1446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e72cba16fd90ea72fdb04429551a161e
SHA18708dce343a232bb0df6bd6d83822eb75a65fb01
SHA25609215ba790789894268d90bc0519da94420477ed9ebe766846d83322318df51e
SHA512bf712595886bf8094ea7b26c588ad604c5bf01a35ee726ce4d2dffd06ec84ae23662d6ce009dc40ec7c933ac483e6b7aaf4cb2c18b627ee36e2ef7d4cd3dff56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563fc4c90dcc8278648759f83af214f20
SHA1c648d7a936d71e90aaaf3d863055e4a02ec3659d
SHA25623123afb8f082ac7651501592271e2e854f346988180d19a41c96ae613c88ebc
SHA512ca114c1d4f795129ba8712b14d178e688d303ad0dc3562bb89a05acea49c8833db3c7680a102fbef83df85e2b6cc1639baf1d330156f03a899ceb3b21a6d25d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527085ebfa7babdce7c9e4b8ac643274c
SHA1a175994afd73079995a6a3c07bb414d2b94c32e1
SHA256eb95c1f54dd4c6587b1e4f9abd4ce28f309e4f9852c74c797485d66450030318
SHA51250e9dfe4cbd3d77057689518f05a720859dde62d67a08f4cbde5671f3fd8fa17f0c97af8120094295adc4f310185c6dc75429f0cb4518e147f43c455be49e06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51412127620337315c972d5f8a8a19806
SHA16baa5d0a579badc6d56f09d469024a0dd6921024
SHA2562c3990e3d2f169db60224bb2d5b661c2483460658b555f1d40fd5a84273c5f7c
SHA512743da28567d1dd62d923472f4baa4b0625450644ffc4de10c6fc029200b160f45c6e7d99df0bdafbc8d2d66b130dd3eaf02e26c71598cb672f3fe9ddc24aca8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f63fb19a121466368451c4c1532f70
SHA1a94c5744d89407ae831ef44d391418d215557ef4
SHA256410fca3e805e835f9d99b63f71c57baa081e1da915f750cfc985de8e6019dca7
SHA5123fcd3f614f4103e99400401f45fd45b28f7f4bafaa6aa1922310cb8afda1f3500cd1764baa768a17e561ffabb9bd36c76fa1204926d8f6e28ecd9621dff1f99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5342076ef730d806da422398fdcb84624
SHA12a84160df64605f5da9b10099299b1cd01b2c2c9
SHA2563cf0c3e795a2ca18be780b7932f87f7ff4315d1124452e6358b83ea4896723d8
SHA512aed57f89b91b347afa83fce7dfb2bc09cf44d5ca9c041ebd9a8ab218d213f69072895b935d7a15467a24979cb0002bd5a14fa552386ac8618c101b8fa70e0aa8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a