Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
6ea9145ecc33eeeb12ee9046e5054fb6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ea9145ecc33eeeb12ee9046e5054fb6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6ea9145ecc33eeeb12ee9046e5054fb6_JaffaCakes118.html
-
Size
68KB
-
MD5
6ea9145ecc33eeeb12ee9046e5054fb6
-
SHA1
6f8a0897e04a72e2b152f132bdc258fc10de7577
-
SHA256
bb060000c1ac671579b7f210066f44580a58b2218e5f8adb858fdae19336f638
-
SHA512
d91963b82ebe94e34fe5b971b383e818613d2376f206b3e2c770c652a33f0f1e32b40e73d6cee369d7e23322d691c0639247c8b689b9f25f8ca603f86fec23b4
-
SSDEEP
768:Ji8XgcMiR3sI2PDDnX0g6JTsq4lyt9SoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JHwAVQyt9bTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082cfc7b99f45ab4dbf96d851be760808000000000200000000001066000000010000200000007f5572a8ca44affefcb2037ec59782cf07e60d154149875ac428cfe9bc11e59b000000000e8000000002000020000000eba994f632194822c2f79558f1a1f781334ce0245f499cb30f20bb121698a4569000000083f0d3cebae7cda6afaf8159ae9c9ce042d404ac9005687796cd65ba111c6b46ebfed833b832270447dee05a96c4493e75fc78d01d61748c1e24bb2f0b6652e731aa27e8dff73328c03543c4856fba1b8440043973e26f40990159d5a67daf2ef32ca522925c9c51ee75977e851c0433e58f64532180ba870eae170ecc8a09d9c2560a79f45e511f3f5184c85c1482cb40000000b97c1863eead73a32448ca2b1d0792460a3dc45c79ccedb3f6f9d66d25fc4d8bdf811da13621239dc2342ed1cb4a7dbc42abba3532c3df08b28d8125fcb8402e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082cfc7b99f45ab4dbf96d851be76080800000000020000000000106600000001000020000000ba302f555335576c808eaea9b0ed4a6956da73f4738884524eeafde6bd07a205000000000e80000000020000200000008c0379e9a3f1c1c58a1855afbc3de14a62fae25d35132f072d358ea2abeb6582200000009912b0798ba81c3e2a0856f0dfec4d871d7d165b755404e57139eaa07844876b400000005ee171212f52399e93360181c21b0cabc728161480692f0cdb272e86e193ef3bfa48147a86c2a346efc0ca38c61c3efba0bd81c0c2f8edc32c855383df901598 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409f42e4ddadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422718985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FBD2501-19D1-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2128 2176 iexplore.exe 28 PID 2176 wrote to memory of 2128 2176 iexplore.exe 28 PID 2176 wrote to memory of 2128 2176 iexplore.exe 28 PID 2176 wrote to memory of 2128 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ea9145ecc33eeeb12ee9046e5054fb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e63c5040c562eb938c35d0a9b38604
SHA154bd8eb2ee0e05356348238a40746538ce7d96a2
SHA2560e96784f393dbf03ceced160f823519ff2c4527f6976b19a1cf6b783ea52d5fa
SHA5124e83083a97f4d93e5bd9023ec19ccdd848b8e200399648901ab86f764db7ae1819cbe8655b7a0fbcb11f80ce7a7974c7893d1e20b11255e3f7e631f242b75e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3bdb4a305c6bcea2be59f988653f24
SHA18da68b1e5cadccd3f3707fc4c0819a943596bccd
SHA25661317c4b302815290bb4bdc215a4321f74eec44e5796a0c6c1f6b10ae475adaf
SHA512db7abddace4c80809275862908cf3bca93f1fa64ad4a147e009c56aaa15573d0cf89e2f28724146182c9818424c5092b9b0f211ce4beeabdf3d282869ede2664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ad192fde682c869e0f676a3dad37ba
SHA1fb248815e444531deb8595572c78d39a76f065c9
SHA25638e40bc756887c0419ab4a4a3542531f3b2f418f31e16173d27ded604886ef77
SHA512752bad92cf3462495ab8351077d818b76687f74047d3a1b802e165a6939ba4b208822d51cd2b89a7496e22ccb33cd768b78d5975115ba89c03fefdeec8b6a650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7b9337bcb207fad805543b8c1dfb4f
SHA15b7df02ca4e2a6cfa95fcc6957127e02daad6f3a
SHA256d86e4cfaf05641c6a17f9b737e162a3b77d09d84be1e355358ef2f9f83a0c857
SHA51294a79f97cfd38561eebc8aebad8e6309ad29c2ca1cea1f26daa2225bfbce24d3a60f8d8468404350dd2b0d8ea7990a98e43add8bcca2c1b2a41b53ab8ab1eb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574862e3e17f1246fab819393b6e892f7
SHA1ce834a6f193dfe1c22fbd9ab6b5d5086d854ec07
SHA256a04e39d2998aad0c04156b401819a5e5cb710cf3111e54108c38130d5dc7f5b4
SHA512febef2f8286881a5d8ef470a0452f33af94c1d719b7dbfe93fd74ff145472cf0139048ddd1b3885abb5cab0ba58b3ddb0b4b6f1d4749d690d0b1356768ea120d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1287df6296aee755d4afde01d5840c8
SHA1f3ecf5e0ae7c26cf4eb8ed7073c8ce8ba66b0979
SHA2569e13df9b26f2e26d1e422f3a33cceeb831a225e1b5b88ee139b25270f34cd032
SHA512634c7ab322b052426df78904ac3625d2a80b8979801f5ec74395e7336a9190de8a169488f8c02af38685691a2028e8bb18b016c3ab77cc6951155bc7b03d3ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436f8fdf7d9173a6b09131f174d43b44
SHA1a6aca03f846dc2db9b2d985ecbb8846cc07dae0b
SHA256bafd9b7a8f9f55dce4bd1df28c2d399d84fd2f811c1d932c3963061431e13dc8
SHA5122ba0ef063a70fb6cdf24aedfb7a8d8b08d76b5828a3f4e6f2d91306c2564a1bfed1d4734d436072f284746f19a28687c4bb1844d7538bda58b9cfd2e1f11e1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb7941208565dcde7cd306eae744b04
SHA17aa0d47a4eb10a0f4a10cabc88d5bf404b521816
SHA2562d0399b0a4d206163cadaff3971589987b7c4e9e8eafa7f40501a9a8d42ef9a5
SHA512d3ae36e13dd214cfab7a8303a3009eb0a2334c8a718f41a08aa920b488c96bdec7c1bd77d2f0630b5de5b626c124d62dd01a1fd148d7cdbe9df2d8d62827d47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de7aa62fe2e988d7d11747b61adceb99
SHA133aed57203e9c94634684b782fb8d5eae2f3ae84
SHA256ad80d4076aa893c657054c2463d7f7b6b08be0621afa3b2010fef6039c5f6264
SHA512c1321f968adc9c7ba3ac0fb9586a5dc33f4356c4f8ed410dda3ae4e0bd3e765c0ab0fbb7edcecae57923983cd4e75b084ba858822c433ac19841bcd9042ca8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb108327a437ebd0c1aaac197548fb65
SHA13c77419d36de2c8bf221fd8fefe25d49fbc48268
SHA25600db777ccd6dc8cdc7a624adb66a6ec07ecac05a227cc8cc767525424fd66fc8
SHA512e039d2fa39258956109811e091c8b6efa2630d4e208886ef9e16412dc6c04495b1fd65581a901c9c2e88b2af31ff5103e82eb931e562242e8e470d8b1a66c33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593cef2fdc3724fa5ccb2918cf66fe1af
SHA1eac413579d33bd969a1e6d3cb84fdd4f845df28d
SHA256099ea61df83b84dd618fb74e521c1161af6ac6156bd9445b14b9634d21ad5a29
SHA5128c28ac105c8ded574a9113f86a7e55ebd9964ac7aa35d77e26268f2e5d89c90732e6339ce4c2723074ac5c6620b8fadd89cee06a6dc8543f5d2f5288c32e6bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeab8c5407f4fff6eb2a43416acd5ffd
SHA121aa1eb7408704f4b97f33cf8f5d6a2d6659fc4f
SHA256e764eaf402e94d7ccf6b4ca615663677dfdcb04b84d9da07eb90cc1556a7189d
SHA512f477e6860eb879d8c4b33203e6a6c5c0004ecdad83d9801fe1ccdfa450bfa058df99c8a019ad7491e7d80dc0a6b7c573d57523a87987af452acf5cd59c7552e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a8dc2d4a911d2e0eb6f6b0468c5e659
SHA15dfabd25f83ce6c4e589d2f20bc12f961cd15a81
SHA256a4b76b9f1bf6c8bbfe2175f468b3a962046a2eaf09616f129bd2e423e448546a
SHA512f8cd1ec3b86902849f34cb6599b93890d7fb16b96248d0c1c8ab6cd1d1d3048df2c18f782ee0ad84fc00e8d686116b987298b31cf359c1929cf6b4d423f4d032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568bafd64b7d24455a5b4933585adb444
SHA1ebf61ba428498b5a63a60bfc2aa9ffa44f6afd82
SHA2565738eead6348a5f93962f9dedba888e03bbffb17d4516bfbaae58e62217b8d58
SHA512fb953a6bdaa364e2a9d1c7e9fdd9ed531696cdd2b85ee6c23d00bb1cb80d49a8544526b8aa7f8bba0b7f1457cd852c95cbf39371e4357270dbf0c5022cd0b28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52173528e16777fd91a8271e5929ef43a
SHA15a9367b4ba2901c53fce63d60d68ba27ef1d4c39
SHA256e70f069ffc8abe1c4a606acc7fd90b1fe0ed3a1fc9df1cab624bdf94f4d86e67
SHA512cf6cbe4e4a7c4549a067d1f36d7e2c154c7e50b7e668f40688b8c55764f53e43bd0dc8fc62126730d8198e996ead8c0632de80947657b1994090dae421213637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f3c711dd9511f32ac4b8958833bc7af
SHA1751a9a7f66b7cecfcdc1c9872c91119ed50abac5
SHA25618c1b56c04a0fb93ca73e620d5c1f17e89120b12e35c73398752beb97aec6722
SHA5126da4c6b2b950f3098087f076d77e2f2f7259d09069e3adc213ada539b4a8575819e3b12b6b6a1a93521d04340a985120b7341f6f643983c8142f3d21a73cbf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5149a2e04bdf7797a0355d40eafd2f5
SHA13e6585505b3a12ff4ba7396c7d44431c49d0ae54
SHA25630c520b35ead23ccedca0471c9dca7c610cd06135c00e55cee257efe7314b76d
SHA51236b915de7275718a317aa41713d93f3647e13cc462c59e23526b24a418699ea969c63d4f61f9e3ee9715fe437d33194a99b45071d2696a2d67e6e716ec16f7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aece7128324c89fa9b0cf379899972cf
SHA1531b475c8ec85e2b311c3057c39238112cb5d7a1
SHA2566b8e5af3be7ef94fce6da7174ebd1f80c66779281ea9ecab2811ced9d1a2bae3
SHA51229c623a74613f54d9744409469556beb0f21218abfdc9c0620a5db5fba0114448480dba74c993871ff4b11df6b530092807e140c3be691b9ad89535485abc48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508663592e11ed906909babc82bda6ecd
SHA16ea6d3ad9cbb48c0345883f0b1a96dc2c235703f
SHA256995f4bd2487e993ab679c404fb2188ca7208586aee38719666e84132e2aa00e4
SHA512e8c66768e35dfd50b971fa60d35a4f64caaa1665b9c721f7185103ffc5c6edf0ff91a5726a204b87d125963353d1fecd78025f1ff851a4df80d7b340ec46e633
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a