Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
898f8cad84429d1a76b31a1c557b8c23_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
898f8cad84429d1a76b31a1c557b8c23_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
898f8cad84429d1a76b31a1c557b8c23_JaffaCakes118.html
-
Size
68KB
-
MD5
898f8cad84429d1a76b31a1c557b8c23
-
SHA1
1f200d0908d0eea79335d65b1b868c643d47662a
-
SHA256
ad8944a9e69808c022a4b7923094d4c3bd39d816bb21c63c036d0657d98ab02a
-
SHA512
85b9fa5359056d657d82320723f113498731ecbbbc018ab3b808d8e3f429fb46d6fa6b79d7961ce6c77902611cbef22a1e9e72b52544c59545b8e5d9e550938c
-
SSDEEP
768:JikgcMiR3sI2PDDnX0g6kcxGe/m4mr5oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J8OE1xrOTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000003f89797d3bd7dff2011b5e0418852cf1ba4c9d0cc5b528bb06e45e5ab5e226e0000000000e8000000002000020000000f9d057b2ff8092c3228666f26f53b6dae28400b2d7c982033087331d5b5b26ed2000000034794233168312521a3b9571218f5eff084e05902b5e4f8e242d88016e285a2340000000b6cc5aa1893531127fed28f7450bbad1029a9831ddd70f004bb603e6c5a28db570f680338624850c14540c0c3462207b0619528e801cde6b5bee87fc7f9e4513 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423383779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c6b1bce9b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7C1A321-1FDC-11EF-AE43-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000076202267acb98aba86cd386fade5a38c98a5a2c45089ae58a0032ec3cebd3de8000000000e80000000020000200000001fc31c4d246b79c1889bf35920dc0f5d54be9d783d479642ba37579920505fd590000000b5090ed272ed2452a7dcb4be59d84b916f501c179d01c1214305dd94718f733497f3e8c8c9c26aea6d1ad3d5da2bd5189ab78b071ecf571406333a54fcf71b45aa2b0fcde8faeefdcd870139730e7862f149298df71a157b5149e42413912bbcb9898d24ae635dd2c107cd4dbd153c2c142187b3589ecc25ef0b503e3bd7ee506708b179f5f00989fda45e6a26ec087e400000009cb5d5ca7aa8f742593f5556f575d28f665e5c01d27a02949ad8ddb890b0d06aa115f6b2751e881771034c85f30d38ba795ef5ffd85cd403161d61ffff138e66 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2760 2072 iexplore.exe 28 PID 2072 wrote to memory of 2760 2072 iexplore.exe 28 PID 2072 wrote to memory of 2760 2072 iexplore.exe 28 PID 2072 wrote to memory of 2760 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\898f8cad84429d1a76b31a1c557b8c23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332858a4e1123b5bd89a319ebd51a19d
SHA1a7e6168bbd3a43fe0936d1d6730be3c81c3ab703
SHA256b5a62a823386cadcb7f4b5c2c0f4076ef26dc2ecc22c30aa131762e91aa7bf2e
SHA5123931a9949022c8b93f61fef7d6de1839e86474f239e638b55c64a6981a810eb4f8ab1dc780cb3aec2dd9eca3b7e0b2e05d17bdf861e8eb84c9aad2ee69e38c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abe028fe7deee20938084e3ad762cbd
SHA122d3ce8d35e213cce33d49c52224cc7f9f7cac43
SHA256e428ecfea4b09d3c582bbefb8839c4a7f4fd37099df646c824fae50d12e5b6db
SHA5123bfb95b761f9574b1d1bcf92e464e0917d5b0b4e4cf4785fdbd08dbd83875d8cf8b53b59231e6c9dbb4e03e099937796219db18332bbb00d46658788800b36ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e501d34f29ada5e63f3d8fd4b189ef
SHA18b44ec748a1ed66b4823700bd8162e488c806eb4
SHA256a054f223cd97dc251e779b4311087a6ac0c7db41bbf40ea4517acc0ec71ef9b1
SHA5124c02280deaf152def92da0c8a67a11d04bdf51fa83af06bd6dee1edf834fd5ded5c1a3f0da4cc47ea62067c9fa7ebe042631f38f54bfad47823d1cae5f10abf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff96aa188aff4cdbc3def5380870bda1
SHA1cc23a7c1cff197eb4c5b49adbce3de8b1411ba0d
SHA25688860100c78383ee6f620c14ce87c9695bec0a523f6ae2cbaeb95cc6726868a1
SHA5123e5719cce1c37d3d2f30472920cee14f9317fc6e9225c4bf3bd0626657c41f745ceaaef7ea78a4e268ac30a9453afc3637dc3744a7cb3818086b19e82ae9ed09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383ab08bc4b6905f5c058c60ea0a5a68
SHA164aa65e4a3449f455cebe7a9725e5fbacd3404ef
SHA2560a97ab5971827665c5e01f00a8136b2ca2e9ae4bedd74a54207b7979112336b6
SHA5127809629d5015ae820c3a1670d02553de3cf1aa0b249f712e5998b5d9d977656d0e8309340c826ddedfce1fb4d2247df6473e299010e0d64506890e9a8d9b6736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996f4e7a618806c788a8a4c83d28352b
SHA17c02c0476f9f4f359253b974ee6a46c2098d11d6
SHA256331fae0ddf29ab67df71ef1a9e6f5ac97d9880b323ad692d17eea8a6282077ed
SHA512f8afee01ec2552c55c74fba9e9cef4fee4bfece317de703d881fa23e5645b03d4cbaed4e17724daa0f55a7112cbc4937a70512c7c703ecc8864e5fe9c2da82ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc48c9c64a03b4c6dc40ee5772e4bfbb
SHA1a8da0760026d849ceee375533fa95bac6515645f
SHA256f3bfd6f23eb9ad2f46f9820de331c4b0c009bd0f410912e18c9a93687758577d
SHA512a2ecc9dda11560646436af5fd7433f2c6ab67403989985f5dc386e848c233783ee8af3160b615d37b281cc442677657c77de4d1153af5c0eddec6e311e1e1694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d1d29d2f469f30964a03192a0bfda8
SHA188e24cf5f11662ec09ef7839be3d45183390de5e
SHA256aa6e2369953c8497a0cb5ae897cf4dd4d4f3a769fe12e82d38257d16e4973a62
SHA5129691b77db7729740d01a78bbd3e0694ba258a19d28adbc9147f9deb69196744791ab3626bfabdbc65c0eeca4aa51603014cf2898bdef95b1ec7bda22c9733f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a434c56d018a3a63e9a9bc3f80a811d
SHA19199e1590c708f816b709c37a8752402353df9f0
SHA25642544dfa37e9f216707ab7343b593f948cce220eb6f399993534b84d8adddf4a
SHA51281f0d4fbdd8f7893f34f6a1e1dcf9b5d0ae8d59bb79c7b5cc7b3758db7d744fac3c3ccfd9e7d8dd8425e6cb9c7324932d69d5b7aa4a962b4ba8d660471a2478e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf386ed282150bd582831b1aceaf198
SHA1a9c4f123ee3afa7fc8539deb9bf3c6066931a766
SHA256642d7d726da413ee95a63c54ccca65503e4076fe3eb6110b438f989cfbefeb93
SHA512fd21fa05a165e93ca7e4404285411f27ca1ed4b1e371f3340b4615f0b0db1eb78de59a996c204bda27a691e639f411815d9a74d95c6f7294534c293011683cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764014b3b91172e01becadab57f18656
SHA14c0311381b5b379160f925563b8eff70c4a5f660
SHA2566989983713c7026dab9e43b1fcba62034cccce8ba85fbce141a58e9027d51afd
SHA5128cfe8757de4c259d58e86146a0b7a44ff0a75187cf2b2a5968bb73e6be3c4113fa61f1433c19368ef90894fa9cbec5775a43c40211d7360115818f1bc31f9110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883b5aabccceab4735c5c1bfa5cfce24
SHA16379763a6c729d318f57245013c738a5b9fbec8a
SHA256a8f921f38041a0058a784ae78931ed0d654c7e9ad1ff9088efb383504ec1560d
SHA512918036b0ab2345fef861388b7ff89004173145270bc4e96ed51758299231773b5335964e50906519ca57a3586c34cf99e9536374a1925c278ef9ff08e35ffab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1dc1b930b36739beaaa0868128b45e
SHA1066eab674278101d104cedb6350404cf9af416ab
SHA2564b863c18e386ff3c7a43e5d827dcec4563b633156bde02abccd34dd952d2f240
SHA512df4bfdf2f2a199166606b53a715b07b33da83b77d0235630fea3291d22d249140428c3487e5e1baead57e5aa7d865fa6bef6e36b0c287c5c54ee376d024238cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded3017089fa82462c26cad192681a6a
SHA1f101d1d8498aac8fd84f5e26f490d39509ad4058
SHA256d9697051d3c96d378f89611e98ebbc065b68eebf5828cada56614dd272a94aac
SHA512a598e561028847bff1e41983103f8c2f37a77052a6eb00dea563ac5dde998609c8653930ca1037a174e8779537b1680eb1a92b62cf38f32f1521125080aae437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf21cba7458d07726f1da01b49980b6
SHA16c860eb01b1aeb02cf72297cfd4b4417b409b353
SHA25610edd718a7569dd70b47d1b2bb263754d720c650e0462bb270175a84901a6d4a
SHA5121b39149802238da9840462e4b4be0c85b6a92619c701009a0cecc50001706642490437195e09865a70ca4302fc501187fdd3f769904ad8bc095ce8aa1a18989d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f6afdf51503c016feaa5ff559564eb
SHA11f056d13cde61cb6f6b029a96ef23330f0010483
SHA2566235655e091113adf548b1319a074e6ee37e412ca4a9a539f364402b6bc91c09
SHA51202c6184902bad97add735496f87ca6fba7a1e7e36e1e483a277596cff12136fc43281134f9070e56be845c5a883fa123649282d0e8af4861cd1a4c4b739ef437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0d8dd4c2f65bb35694909f84cf60c4
SHA19056079b945060efbc2ee070f0104fe1e0d0b5f4
SHA25607272868bc838b7bc62011234fce634ae7b84071b665efcec0dff3c8731bf7e9
SHA512ea92db6887f4a2b7822a55405088fe83a8fc8f242f0798ac4c6d635c8a17f039fd32a20ed76deec334be8fa131cadd254d5a7c19c76dcfbde8575b070940fdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cc5a7ad8ed5d8a4c9d2a587df5971da
SHA1bd6cfe478850d4712d6c078027e37ee21966c043
SHA2567f685ce4e5672b8391de085d107fd0d50a6172c4b93553c08cef7c574257d4d6
SHA512b0b62489bc78c4ad7173ead7656369767ec698734f2b82e981b1f8910e1cd8885ffcfab86e8f3c66f01ef62f4cacf9d0f09e6fe2e6699dd62893f725f73ffdd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c974b2ce74e4ec70dbe65b6e211a51
SHA1414600771e91995e4dd6f03f6010d237ee1c9579
SHA2563886b0da647ed3758337d147cad79f574ff7b4506feb56ca01b00ea5d483217e
SHA5125b2d385d63a05c48be8fde69c58c89fada16d958e066d90b146801b5f54d669f66a57ff0c8b8c24979bb9fce3e93fd5002186d3120a8dca1c56e9abe0aa3b22d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b