Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
990150a0bfa5d2fe74794444257909ed_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
990150a0bfa5d2fe74794444257909ed_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
990150a0bfa5d2fe74794444257909ed_JaffaCakes118.html
-
Size
460KB
-
MD5
990150a0bfa5d2fe74794444257909ed
-
SHA1
f8618a1cd4115e5392d9ee23d7087dc6a71d4435
-
SHA256
a8d5264d9079f4511eedb56e6acf6e2f16bb23c2e384b09fbfc5f149bea678f3
-
SHA512
251c19c8c1fc925c586f50ac48e4944c8bd8bf3322f3761c101b52cf103e836ded89f4ec3916c981782345b89d27d43fde1e569de44634e26af1550adc472193
-
SSDEEP
6144:SLsMYod+X3oI+Y8ksMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X36y5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423776610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308172627cb7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89DD2401-236F-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000025babef3da20a504ac1be9198b4624d4992991ef7b2d1c5b24666646504fecb1000000000e8000000002000020000000c859efd979c47027c2690904064c769d03fbd373aa426dcb13fe13896c37494b200000001392426b2d54a971ccbc83eab6ca6506e4e7ecf26dcc5a7e5ef80d3cb816120740000000a01700d929cd062905245de2fa3eafcfa018d4b1ad1375ef512a92a4ed83bb240e855c000d7e92078e9d438034d71d9c375ea29ec90c11abed694395a9640b4d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000000b553f785a05d9d1a1a82074b742a3df3de38e6ca9e76588fd7544911894be69000000000e800000000200002000000016f533eed238959122d1579f3f6f48ed3125c627bd2461986ec289f42efd8b9b9000000029ade147bb60d744eebb39313060b591e729c2253d91898fbdd9c6ac8e947b0ebbaf637432a0b5a849e4869d86d663d2aa862f5a29d0a45b793171b93da1803e33ffe992b1ef57360a11636d389ff44180efb630479ed9cb3501dd88c4beb34bd4cdba03b85e7214c1150a88520357e457e761bb430ee91d3167fe755357bbb0d2a1aab382aa3b64201c733d4292523040000000545bf72fdacf7185d12f1dd428a73f3883fdd1875103f98bc7857c5ec52f40e88a5bc581b5a1577ef5b0162ae04dbec2be825d0971b12df208ce2f64983bc24b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2612 1680 iexplore.exe 28 PID 1680 wrote to memory of 2612 1680 iexplore.exe 28 PID 1680 wrote to memory of 2612 1680 iexplore.exe 28 PID 1680 wrote to memory of 2612 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\990150a0bfa5d2fe74794444257909ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc800c696d1d16969db9f1e4b844833
SHA1125b5c3c30f708b087b0e7825d15e8f09aa11e72
SHA2562414ba6f2dbc5de54d2d830e3e180dd57b7a9c70600250a0a446f63e8e1047a2
SHA5128896f15eb793f106ab2782a69360419120babfbc0931c5a0bc874774b489b23b2c5c4d5c068d1d2b492bd21f8b1c3032637c0a2a2eeeffe0103fe876b81bb669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea76d6e23ad8ba3e9e476c34c8b28f91
SHA154b473033d06b8add284eb8b789f2a63e2fbe26a
SHA2562b2d7b559035a1db17a5af63e16a221dbd4fcc619eab89dd811c10fede2eb50b
SHA51219ade27eaa633d5cbd0fe30d1c82d52caa0a1b6a4b4da9e696acb7b7a974296cf1bf59cb74ee7abc12737311dbc8f073a25a603d613e56034add8af2d80ce677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ffc19d7fb85209e5cd4cc8aa4ea699
SHA105434cb27fa65e506f4799719a7c996d602d348e
SHA256f7533dc6f22c84dceb52b7f443ad6d57708d3a5fc2c5db871f826a1f21af14d8
SHA512d49d683eb9ff31bd8ac3f372421392678c582ade19658462e473869f300f0f75952fcb9f1171390f63d8c0d9561146b8e17b7c4bcaad38f94f187999f1b4aee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e971d473a92bcd85c1c158930865e90
SHA17ed783475c3ab3d35d8ee18e9514ab4f99c720c6
SHA256cb4b19170bbf80151583855937fd4dda362c6c6f25532df4ed98189238def319
SHA5127854a3c9611b0735cc93d2ab61cc52f5e0a7eb5a0294494493a89d1335d7d8fecdd10145ed00e8b9221167ca25b94278bb1d15e12e57ac0190cc40862a9f4827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122264533eea605f0b32859b21e120b0
SHA1a07f511dd32257fcbdebe3849d170f718a6745d2
SHA256101d74fd7eac9941bd7e9be7984027996cbd530689533c218fbdd89be60fd0af
SHA512a5e12bba8d8d29b5f437282dc6145c2b08ec43de85ca8790670af7b4248eb76866db789ea486e3d6ac1a7ca8382772b3211d681395857f5280ee05087cb90e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502593021d2536c51f626240bb79e29a1
SHA18bf03bd15d6a91e2263d63389ee7445f72502a6f
SHA25629f6dd1abfc2bdf65e44e088bd73c2a1e0603f9abd59add118b2fd3b0c66018b
SHA5126467e4a56bc260eb61787f22b1a09ef7baa481915713b024c910bc09295e374e51f599a098b1f0c37a1a16ad9b24fa30b46769298ae1439bf01f39061c2a788f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6a38070e0ef2f6bf231820a97023af
SHA1b1151ce4babdc37b13df035da86462fe56b3bc4d
SHA2560a8774b9c6cdf5da0e111dcd00ac4acd73b3975845534d6db0637c06d170bdbf
SHA512ee570b07b46a61be7716ce35d5c09fab493bcccebfed323f391bb69516737bb893eea26dd8fae445f7f544be3437ffa61c3894a7ab572afa07398b408d846e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ea6116c2e51ed3f8fe51241801bcf1
SHA10dc8937fb45ed9148d1c0e06bf592d068024592c
SHA256f9ad6807c8354b427295a510ff68010e04a14e615f2c96864506adbac610e866
SHA51248d49a105c44bf63bd95ddeb6c04b4d74c727c727801e64bf8c9d933e574cde61f6e83af773f180b6c2d24fb65a0b2ab3a4c5434162e0a5845613acfafc3b7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548999a21da9a707ad2adfffc75aa4224
SHA19a4811b1ce96dcbf26845eac5c7772be4dd82f3f
SHA256d28c63a1befb638905a16b56a79634a3b90897bc382770a940c509aec0f9f590
SHA512f7088199b35aa5218c8a2888492311e6b91fab17480c5c39fa1a13344aa88c2fd9c82eef28ae944eb697d424c04f145e8d0845f2deb138fc8026a6c00fd2885d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4eafec048c8616a79b71fdcd9b561e4
SHA1c32c1030aa410e24cbf770bc12cf462f1bd1a8fb
SHA256d7bacfa196be00796e92c4a898c172af3144a6880a5acf7f4c5acebace731fcb
SHA5125832a78e48338c98fbc9858aa6712332de33e685fd8519a3a11b3fb59560b40c0f21499032555b1cd5ec9bf48082b39eadc4ee2ed4488de34be48a9de30df45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147d89c81e70f045a3c2c619b911ad40
SHA17b298dfd7a6753f8f5027f5bd0556e667f6b7e65
SHA2561516973030a782ab87279ca2af63912ca5a2c2f513b7937ed6d7a3de3dec341c
SHA512c7ef3b213fc73c87d300672161d393654203ed0429bf9b54b538a501ebad49c5235bb3528fc3024ea000503728dd7f8592bab54e524323910121d692331bdc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d3346f4208063766d66198b7a78af2
SHA1bbfa6a4fbb0a6d49ededdb0cdd5dccdcece085e7
SHA256d639154865fa5652ca5b0fb37d2dc377034414799a0a3662f73a6f3967b8af1d
SHA5127f9e2ce4765f0fe0fc0952729ed6fc1c083b4d82e56cc7680ebff00c4dd295fb5201527cb3490338b97db69425251e5675cc4b19114da0c27d1ff80f5f68c703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cb5b3446f5cd2b799662e340c7323c
SHA109755fafeef2b7e7175619b94b6c16cec9adc527
SHA2568ac50af83db4d7b26cd079831766a8ecd3301fb2d49bac45a0d132e4ba1f2c22
SHA51267c6785b20cc7a0e3904b9dc8705b58249e34750ff16a19a63af688844bce560054301ef09f8f44a5be8f00168ceb9647c5aaa733f6e825d4cfec8593a8c47ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0623478d9ca0bb7329e1aaa224baab
SHA1198354b598a99c20ab490e7955cc02f0ed9eb589
SHA2564a8c818e4b5d695b244b2f00f841a8f25899c9f2b0614e10f8882985c79638b8
SHA512004bc017bbe0201398443c7595a674e77d38352526df7c286eb14a0f7fb6304c61d22ffd543ecd343a1d223dd4d3870203702dba2a304d24deba43bbd7ead0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5ac871d9120f22fd8741da26b05566
SHA1fc4d84400b6c0b7d24084822f444a58db21361cf
SHA2567ac0ebfafc74e9f385538cfdf9033b36832c66772b757eabfebb98cd047980ea
SHA51298c94957ca3c49725c6e164eb46f80176b63d29591020114b7df311540ed2cf7d3d823cf1fed2c7f129468d02841ec20dd245aa2579fd3b1ed70e516491c4ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf9564cd2e9168fba1db0081dc70857
SHA18b89cf0b97e6d7673ec9825643a9e00a21ec836c
SHA256a1fc9601c604aa9c29cf5c51923c12159633167024994fe4a7b506d1868c0fe5
SHA51210df1cf097ee42baebcbc527440025b94aa77d272805fc897263be228edf7ace3d128f9cc0e4e9d3200628263b2db2c646d53638b914d5396133afdc6c62e9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51346abcdb2946a4791875aa8201ccf62
SHA1e8b7835650b4c414d89054400abda69282801e1e
SHA2564137d1b4f2b1c5728801f8b619dd908958ffdfe534ddaebc8360fb3707717f63
SHA512b40629d7fdfeec7105d1de0d59e4d87f1615fa63926cfa0d68bba6305062f7bbd1fd78a0c5b1476421e937e31994b39b98d0ced7560a11f27c60586ba685ec30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba6163ffe8c3f1680cf9bb25b84c50b
SHA126ffe9281dc34c6b6731247b7169ffb4677b5fd8
SHA256184137c4388678f21ccbc75cdde8ef5c0eef2acbf4603528f857b30657fe4de1
SHA5124a9304b814f39621ce284ab8cd87842abdf32903f4a72ff2c75480be46f437bbf6c7a913f62d561221003ae22e53934719ba55a63b663214461cbfba0ea95d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881b7f78e5a7b0936b641c069438288f
SHA119e90f7c4325dad27d31e1573cba9be5474ad012
SHA256be979ee01d8812ea26429e7bfff6a208c159214981ac84ce5fe71be6e1864b11
SHA51298aef1659ad81146d46103689a9c534d6cb0a5da8b74e4a047c213f229e990b1c6df08ccf17e85a0842718486ebe9c294898d856ade42a28d0113d3a5b9efd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa828f04ae0e1f7dca99fd9709e3865
SHA11bf3a4b3aa37dcdaff7f10ef8b76d03c506c9654
SHA256ba67010776b08653277f29edab4e68ba4566ff1c6b799c7cc45eacd8cea755c2
SHA512f58ff3579dc1df2cc0b1ec8da2be2d751ba1cc880d988f9aa79853710eb93af4a580129a844cfab391883589836ce6772bacbd4f3dcd8a7a17b4c148d29e5f0a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b