Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
6965a18e6be97df528b5e790007cbb4c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6965a18e6be97df528b5e790007cbb4c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6965a18e6be97df528b5e790007cbb4c_JaffaCakes118.html
-
Size
53KB
-
MD5
6965a18e6be97df528b5e790007cbb4c
-
SHA1
f0f52984f2d1e9dfebaca76c0d0e32ed2c7164da
-
SHA256
09031a7be29d221376ecc91203661f3c3a466d2d2e482e7e864414d1b3f61ad4
-
SHA512
1d73ae686598b0fa29a00fc2d21e05c57964edfd5a890e5be930eeaac24c305d47e25abd3ab27e5251b978dc15811663f3cf31e1c9b980781132366bee0015b3
-
SSDEEP
768:z9RRkUpVPDTZ+9Sz8qjlewFH1RBGZERNeqze0S4eNT+eaI+Pjfsk:zR9DF+9SzTle+1LZXzeT4eNTTaI+Lfsk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e38f7fd7328a564ba1618528b10bd71300000000020000000000106600000001000020000000db3fb8576adce032649153ce3cf1f76377b89182625145d93d234e993de45ef9000000000e8000000002000020000000f31f87522c11bdb3882da6f77426dd3de0999e6e3a6473dcfaa85f6703f5ccb22000000069267597bef629c7ba8e79443e00f341fab7e613d9961fc777c3e7504fd42acb400000000f9808784659de3ded91220bef3368fec1be9d623cd521c856dcd5d926fcd939dbd0b67327178b3252adb5debc8a18ecb344a8e2749b285462a7327cb40ddaac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422591908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50089104b6acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FD13C61-18A9-11EF-9542-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e38f7fd7328a564ba1618528b10bd7130000000002000000000010660000000100002000000053c2c7068b330749f2a624d2af3cfa23325b4b7759435b677d6a07456a01a68b000000000e80000000020000200000009033906e6068d882ba27ea90314c8167549ea293bf8141b837a378e64dcd9cdb90000000cbd953084fe0499c02b96916a350d0da13b66add58bbf7d43d1093f2faf2552fb6a40ea1eaed00b64d5c7e708e82b81ff2232a85a79c1ae4ba6c3704202c3c92b58c5c2a8a77627291bb735bd544b5d71e3d68e9c808b6a16d64ddd4c0dc9ce3942ee981cd8497f52703112f11a136d182aa9300ad2f42b2506f92766d0a2d750d152c6a28b952e836fdf97b0cad232a40000000370a947d637bd0b1fd7cf3324a9dc93e42b5b701854928719bcab746fed74e4184dc56cc66ca397f5d48dcd6237a80ee867ebb4d5b4f446f8f0a3ecfbca1e276 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2380 iexplore.exe 2380 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2380 wrote to memory of 2012 2380 iexplore.exe IEXPLORE.EXE PID 2380 wrote to memory of 2012 2380 iexplore.exe IEXPLORE.EXE PID 2380 wrote to memory of 2012 2380 iexplore.exe IEXPLORE.EXE PID 2380 wrote to memory of 2012 2380 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6965a18e6be97df528b5e790007cbb4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356d7a1bd32991cb0a17ed0ebab09c70
SHA1a3b6f02cf414e094301f1b58934f20eda3d3f3fc
SHA256c24842f88d326b27ef0c8a33b874ace48db36a5c917db8477a8abb475cc294ae
SHA512e78c6ef8c0f329ef567bff4a4107f5724768649363ded32b0ef286bcafc2d8935207342179d876c847ed9ef243406e411b13f39ed45f4781d414832ec3344818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5803cca1cd8d4c9cddeb702431813fe83
SHA1fbab636518ba5c15df7d2979d22211a47d544e43
SHA256b829d775f136685397aae6d04862d31e0d52888ab1b8c642dd3155f3531b0eee
SHA512f4eec057cfcb0ce89ba404fe141cf5a76116d0ff046c30bfd632b85c5ec8c14701bcbc4c6a05d0b22cc23ff9e8c2140c20e031bbf216bae2386b9b1d3f8c12ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6848d15073e152da3a1240f466b1675
SHA186e5f44d38b2dec33add0289af0a4f6946ee0c93
SHA256bb72622b025532938f0da0d88cd6a97d4a3be0d0ad40f1232626c64f76ec6da5
SHA512103f7620530f36cfdcdb2e61b6b414d3f53200f8c2bdd94a704048d57d3fb159bc8bd68712bdca4e036cf1f00a360df77fbe9bdf3465aa28610a7e3c49ba8b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174f335d9b650cb3a923738e437d4a7b
SHA185308304b84da4ed98666c1dcf9182aebcb35480
SHA2560b04e3eda33d0e9c5b6c4b6376f16160927e3c5944e8a45c922a89391ded0309
SHA5122d64c9619781471c893b223dfd6a60b624fb58117334df188d1eae3d01c06c31cf0628ae95b825d3c45ef350f86c2488695a306b4e6bcb6b069f76630861035c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5574298f1c1610f69c81627b9a288d093
SHA10bc58968a09da5f62534b3fc2cf2e9c31e0977fc
SHA256fbda755dfabe3c69fe7dd4b268810166b265b0f640bde19a6b7d27db126d0f7e
SHA512ced6b416ece8ea2455a00f327a3e75a51fbe0821e8a0a43eb2ea3386be8823bfa40ffe3f9f13473d98335f11cb3d411e7b423b5d1654430f2e79d167865b23fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d75f9b38abeb4458aa6be0254dc9e2b
SHA1a41669ea9821d882ea5311ae6f4a453895e49cdf
SHA256c121f6c77b8e72ac2f1d98dc5563a8c7acb6c2521981b35a81e54c2ca2c0175d
SHA5120ab3d1fa0186de66a3478a75aa93f99937be7d589e221bea294d587f47b17500935051a7aa914a135c7ffe55ee90d009814f81274e77285075bd154ad62bdcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea52d76aa53c5b8fd6a5a45295a7a4d6
SHA1eea437537b3e775db38acdec1791b0a20b654a86
SHA256ffc326ea09867c326d69d71e8b6741c6ea313e4706d27ce83ae6b503480ac08a
SHA512ad498e265a78f25f33d0b75a10a8a6caa7bc84b17db764ffffd6a3d6dd4be80618b86672cce6d986a6609629397d25bc74fa9898fc19f9b782cace591cd5850a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce9c097d397dab63e757f042e97efd4
SHA160fef994251d5a71529395d09172b17cdf02c0e9
SHA2561f5c322854f91ede59fa4a165b004328a95dae3b653a1576a830f0d27de6ae32
SHA512dca455a08412be8d0c5ecaeaaa14a455f8fa23bf777087fd4f34ff7ddecfbf6003d3d1f945d4118109e465d25a7b4ffe45a854c1fbbd88cf863ddc5bca309a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859201f64c631a1705b0d99159b42c18
SHA11abd0437772c881ce8da70875766523f846ec957
SHA256cb75260b802721b4e990add9cb64467a7d54599b2b2f5d3a924fb34d8d1a1fa0
SHA51275d0c26f4d0a9c3d8fb00a964defcfdd15a991bbcd87a553dc14375015a5626b24b8a58b29519ce2c3aa13404ad3bef5a8d91b981bbeaf7b64a6c2639c544d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0c9b37c302816a0b27974896602eb2
SHA1e1e75ad1f0c3406f88d0d7ab9b76821db60c9486
SHA256f4e832d0eee803f311ebe9ecb740e51fbd3bdbaf56ff89ba63404b1f992738f0
SHA512b5ec9a030bb66a11eeb131bdacd86ba40ad5f95aed43e5d205743367c95c4207a7d06e9bd630d91237f0ffa5100947e8ea0c1590f713be152f1e8bc51329bef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a2aa984eb70fd1b5ffbc876acb211c
SHA1d75696b3659fabcf481c54d4c01e214c8a78a095
SHA2568375528d6390f9c252ecc9ab181b76af0e030d8aa5ceb23d1c3f85f5b63d492d
SHA5125b0d83ccaa938433c34b2d66bd8d68b2ec584dffe80cf59b85cab6a2fd8a82b3ab26fd7c08d5a96c67b19e0f9b61ee94cce5558151bc0ae0020da0f6c1bd1242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57065cfe490ffe0aa9f0bf3f09baaf149
SHA1b025c38a47604c7ebddb226aba7e92fe15ea24f6
SHA256663d8fe693eff29180c95162222c407aa096124598bae250346c77412f312f5f
SHA512d878cfa68c2e50f357ca70fb566a336668e7434c47cf0e2b27d496910e39ed04a75e6967db9d7a7fa5ec1d1142b6f27e0abdfe70977ed089871f734698bcf9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc19fd83c4e96c3d8b4d3f197c483c43
SHA1a91d6042316ba2ea48afba1aaf1298753b57892b
SHA2568183724ff00436c66519c44d73ea83faf3c7982094e282d3a73bfecc50317abd
SHA51292e612c09a4204f146782776d6b74cca88191e4830df6ff55707555cda4fa815988cd96444c6b32400953735992be53ff31b8249bb61d9a21558a803c8df1a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd720aa9408efbc18124a86fa76f3953
SHA1e5293638b7f0ec1ad9c2fb75b2c70f40f177c71c
SHA256e4000c7aab014745da3634b7f1972302a6d9a15acadbd70ebde204f25532adb4
SHA51211baa4e6fc8f713ba9c87f4ed248ee796a3a331c642b8e23d5e79c6d3914201ff8f894089f8a46755f2a4ea4c585e14b7eb716c7f729d389cc300a1550c8a682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5289b89250a736e4dc65f06fd26377b40
SHA15e7d73d306d8df8198c0c5d783c585cd7a494259
SHA256edf1a5bee8c49099aad086d1126bb688b43680d1b4b49db60ab98ef950e3003a
SHA5121dfc11647a134266bc9b50bd5e774cb973d90dd46222f1a09e1d546ca56ed2a1de1179444af03c9b5300aa7ef00ef99117a0da149d01e213b830c1297079975e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3114a522dce17745cf1c4caf7fe808
SHA16c4bedbfe8cb312443a987675022ef2bc63fbb5d
SHA256a3f723d8eab37ed3e7a162b6302e9c53f5b3199fc7c45812488013fb7a0da3e5
SHA51219f66f46aea9aff702aa6b6abd39683bf21668a8432f270c296bd3ba50951bdf361a6aa99fef79edc9983394c23c2f7486616f69906aadc5586fb356dc3b585c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518ad31dd864b51369b41b00c3a667468
SHA1174d016d1335664403661963f3f216ec42207203
SHA256b105f7873eece63e44fb404515aafab262cb16bd3f2e44b1f10cec9c60398731
SHA512dd7490da533707b6ed1b05fef4253e588a876a9aa830977cca080d8701448d0b5fc9742e56e644aa1eb98a55806494fd6895e5ffbea48136943751134a3b081e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d16a43069be4574cf6875ad58fd828
SHA18a901812cb3c9f6a92834f16fccdbd3d7607bdb8
SHA256e83cdb140a2538b692397ff9ec3596f3a840507f4d42bbcd1f4498ae7a85ddec
SHA512f925267604837aa00e2338306545b60956c409f2868c7a0488ef9a9f6d31ec3375951fdf809f2852fd3bce884b6d2d7b807e3c2bdbfb2c28547a4167d2b287b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5310e953d0543f1a188208134712b36ae
SHA13aa751efcbdabfe1b0f701d87fd729de8a12fd02
SHA2564e439ea495df93a0b236c6f559feff219d5c353ea325d91286ad8665dda61c2e
SHA5120d7fa65e6e5de08f9d85488279e599b029eb9a189551e66ae3d082875d819171e528d26f5ae1737545b570fae1d46eb63d5e2970893290693898a25b378ce521
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a