Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
2d86b36ee91751ebcc265fcc76f3abb2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d86b36ee91751ebcc265fcc76f3abb2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d86b36ee91751ebcc265fcc76f3abb2_JaffaCakes118.html
-
Size
185KB
-
MD5
2d86b36ee91751ebcc265fcc76f3abb2
-
SHA1
ebb666fb462c9483890325ac121a9c51a9f78b5a
-
SHA256
0e21aa4bafb8b626cf98a554d259180c337296442e337f34d2de7eaedffaa13e
-
SHA512
0b5a98cc46f7f6760a545cf495c6fdb229e5833c9c9ecb077783699c52a36a658fc14094047a3350eb00b5f09b029a8c7a94cda85cd8022a47636ad000ebbdee
-
SSDEEP
3072:8bWiF4OpBIpOuml9aj7cUWwmJYhiKuvoQFcSKC82/clLUtaU:8bWA4OpBCmnajOB+hiKuQQcz+/a0
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46875011-0E8C-11EF-AF3D-DA219DA76A91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421479979" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2348 1684 iexplore.exe 28 PID 1684 wrote to memory of 2348 1684 iexplore.exe 28 PID 1684 wrote to memory of 2348 1684 iexplore.exe 28 PID 1684 wrote to memory of 2348 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d86b36ee91751ebcc265fcc76f3abb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b6e71adf7324685d8f60c97bdb99f892
SHA1ac45dd58c3dfb5d68ffdbc27817f1e5ad5720830
SHA25640a181e9a8b85b862afc89a604eb290be3b5cd68937feb9ccfc467d3589e8e5c
SHA512f864a712e300632059c0678ff5f54412fc7f7a1db02e469bcdc77be452886b55cd3d08ff51076278d1a21b091b2fc459e30c53b0d8e8855dbfefa59f0ee4cea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5afe9410ba5bd674c17e521952145500a
SHA191b2f193356ddd76a500558aa7a23937d97e1e9b
SHA256e40cee9bee8d32c272f1ed278f5a4b9b395ab14e036f0d4d949185b58b9ae7d0
SHA512b43a0e97c41ee5e7ae83aed6c3f4f70d4088e7a5a512bf21d65f7f794e906cf79011a8066978c255154b14955c17f93e2b7088c93d286f1d309de3d4658783ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5bac498d39168740ae860c137b09d3a40
SHA11a543e1acad85dcc1bae192800cc6efeed8f79cc
SHA2563d3d430871a8e08f3d74218a02c7f78f1c6fc266cce83ad853a2d5de639a12ed
SHA5129205b9a4d2980f801f13278bdbdfdcc2468a52fbc359f4174215a9d715079e7a0f494200d0fd898535f485056388d4ffea8e81efe29c12a1409c5755e32ce540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ce03b60d32381d33c3147064fc72157
SHA16eb0d4d7fcfdc2afb4933110e6cc3995feed77a3
SHA256cf99eff4f5a8d31ee28811905ee7ff872e422c7783e8dd5e1be9c87d53acb109
SHA512f6d28a94c89e3f8adca47740a23625dbc11890992bd4cd989064bffca2922112b64d84447b9e65edae166ee73f684d9ef74dbd2e389392a9dbf80b5b5eebc262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d1bbba17139c1fbafe7c5437e3a1f7
SHA1a654ab89aefdd0ab25d4633fd99426e81fe98263
SHA2562bfb65119fa6272352b7436d83ae8b63d5ad9713e85dc7bd2cf760f6ece7e142
SHA512665dbe4cff31e28d2d52295dea32a4f23d91331e145c9b602ca678a7493fb1b6287c09498b7ca59c2ad41187931e2d710d75e10ac9a26540dd5db3376547098e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5076e6176306751f6d5de31bffb084bee
SHA1a29c27c0aa5980c255983755219fd21c69c0aac4
SHA25620cd3b81888e6bafca833ba0803993071babfbf713491dcbfc8aafcd939e8308
SHA5129cc8d1a68943d023e0b3b4eda3c6cfb6b8f00ca396a99f81795af5be1f3263656d7c3b3c972fad654f6d5a0607fc14a666aa986d9c80700702291b6854b09ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eb59e773ea202cf17ae23ced39c9a10
SHA141cb979e787bd018b96248ed73836512862fb9b3
SHA2569c2728c003d971957157057eb0168bbc5fdeb3e552ef60042ce988fd5413f8c4
SHA5124cfbd21cfaad2fc4f0e08f141b86caf9922ca9c0b5aced9c0180cb337b6017392f0ec18bc6e03ef3e319a0a8509a84a38712e496f593495ebfa5813431228d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5550f4ca485f6994256150b913cb55185
SHA1fe2b22346aadaf50945768ae82296ef1c4ec9512
SHA256f1c68548a781c60cdb247ed666be3f0507d30b8f768d842aad1f8dd9b06f9b45
SHA512a38d5f5cb1788390fa8fcee57a3450f6ec950bb94201d0149d958b7c39b74ca9e78692f624d5d3a96b58cdbd32d45305f10d936fc55bd9aba7d38f44c5811240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0db6dc4185e78a06f0b1c05d04e3395
SHA168fc1b5326f47253d173dd45acb52c3ada33267b
SHA256da1f2fd589059c1f3ebc2def780a49a989715444c420660389aa1047a4b1bc92
SHA512ff29a0701a3547cd9558f5a29ed29e11693ac362a7a410b1c747320e0bf4b7d3810247b6b5072a028269673aa3a7cec94655a4a3ba915deaa412793dee2e3eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bf7b96ed3952c98940bb3c2feddab9f
SHA1184d47b8be235f619e186fce8abd9fd840105e0f
SHA2561515ecc9163ee7ff1a720a85aba7de30c586848d152810670239b3114fbff478
SHA512b577bb3783c34f8fec12c023791c6c39840f9b209cbc9c1a0c2f37a6288f57d16a1753ba5b6041db8632555144cad1d5f10cff33c203f8f1de80638cd5dc2aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5853125e70c74b120e3593c777bc15df9
SHA11eb6b388c90202da8dd4acacdf8a8f824b2cc95c
SHA256ce71352bbd3b979389cbebb706356c79e497d2b839b3fbdb56efbdac283967e6
SHA512f63317c57cfaefe2fc4896f511fc0b5a1a97349849842d515424b3c3d1dac3fb500900c3b140f469b8972b32292d1058a94b637a3c60b67612d68ffe21d641f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de3c90416ac6d963f6d48a9803f08cb
SHA1902f3a047eb9d3d932957dfee4513f772ce6534c
SHA256e0e46a95a7bd46084fc883772e99987eb21c05c262c87c82c11d717f116bfeea
SHA512cd74c927683a9e3659c88ea70a3fce117321de4216272ad9b0e616ddfb4652ebeaf784591af6eeb766907fc75c15d434c17785662996b60f5009487580a6390f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b1f1eb2f98987bef3c56827ac21526e
SHA1b3012e53f732fa233f63903bbfc0bd701a38ea65
SHA256903b1468847c45ff4926dad7f9ce965d1afb96b8058bd34547159063a7a3bf9b
SHA51245683707a4cc2523f6d71c59b1e8deb78cb9f4b96f91f7d232cf5c9444664938f1f8a5284c83234d13762b6ed14253855c00b4bd9e0822ca697ebe31281b2bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6af9f2e81532292e05379a5b7e7a9be
SHA1cfd53363ddb5110a0fdd96b5906c9469ab14cba2
SHA25646fd720ec2c6ebb075e6225de0b21e8bb30298990a9fe8759bfaa1581c334ba8
SHA512c78e91f6065559b073842b16c76b11024db36c853d1a967cad653a46f02c9975feb6e34f68ed829710303483583ad4f74ca19d52a0a26b92e5500841698fd15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b15a04947dff9828da756ec60e205b10
SHA1e73a31fe293d7d1de785246e4b17d38ff37871bf
SHA256d89f6de53266c08a48b82f882f1e4a2c41b2c24263c3599fb398ed18a1b48d29
SHA5124e8f2361591f5d39e8970723634d7590897589f87647d7f9a1eb41c5d04496ca49f4dea3ba6469c87d5161503361a6ca1b58931958f140916b782051a02dfd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f58a7acd309485cc36b87335c34b970d
SHA10e87217e973e6269d7b37f83e37159906dad7b14
SHA256b3207d3000c470a13320a6855026f2405d43b9a88027771a2ab36c5f41d9c2a8
SHA51236567362d96f6d49f72a7bea944b2eea494cd697119640bdbf1001a2cdf876341b819b8160d2c988edb69d420d6e95f58908d2375b886b94b47a939d4dbe9938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD56105152ede42fa15fb5a742ca1fdb92c
SHA16f262a11452a4900c9d489b38aa7cb31278d40af
SHA2560aa8deda1846e316d274b29e393f71ebe05b0ba650d0eebf0e87c7441f2907ec
SHA512402eecc0144492dbf9863d3b37a2ed9c7e730fb9a531bbb9b6c497f4fd433b53bad0bf0bd33f20bdaaa01686ad3eb2934c60633e3e716fc7aaa791266194a13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5f4ea87dedf704f3115e58e3a70759f48
SHA120decb11faed5875ee00dcc6c7a3fd54341a2089
SHA256904af27854bf9e95b2bdc1e225daec130961dfa51c2679b1690c8832590db3b7
SHA512402838d3fb3426f58a48879e8b622a22f757c0e2fcd24f66f3ffe091ed0355911fbf2efd976a2c5f12b8d896015057a0cec7d2b6aa2ec7b0abcee3599ecb86c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\4290687098-widgets[1].js
Filesize140KB
MD530490c5bf1c9a62c3f7aaf45de530b69
SHA189fdf91f40944a3babf7d9f485cbfbcc32454d50
SHA256b7c68fe77654ca4d42928e0a0ea49c642de2887b1ef65e5123105f5359390d49
SHA512ade075fce5921fc27c36b1c21efd5bbb8a1d08699329621015a18a75b69ab25f5bd3d3014cbe853109c304bdf5d5421b30ac3a3e8b4b0119f9509feda4c97229
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\e[1].htm
Filesize428B
MD558a96e152f4cfcc7d90b15e893ca759d
SHA16fb4786aa8447b17f5dc2e3fc790f85988daa1dd
SHA256ba0a65af401f0839f5575e3e4f7508b7995de275fccbfa5577f0137cc77c602d
SHA5123483c5f5e087cbfd585abbb60b0de2cb68608e0ab95c1ad8349b9bbceb286e4adb92d892cb01755cc9b29f1f2660ea67511d7b1c9b55584ede7dedc8ebc916a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\cookienotice[2].js
Filesize6KB
MD5a705132a2174f88e196ec3610d68faa8
SHA13bad57a48d973a678fec600d45933010f6edc659
SHA256068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568
SHA512e947d33e0e9c5e6516f05e0ea696406e4e09b458f85021bc3a217071ae14879b2251e65aec5d1935ca9af2433d023356298321564e1a41119d41be7c2b2d36d5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\plusone[1].js
Filesize54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\cb=gapi[3].js
Filesize133KB
MD54d1bd282f5a3799d4e2880cf69af9269
SHA12ede61be138a7beaa7d6214aa278479dce258adb
SHA2565e075152b65966c0c6fcd3ee7d9f62550981a7bb4ed47611f4286c16e0d79693
SHA512615556b06959aae4229b228cd023f15526256311b5e06dc3c1b122dcbe1ff2f01863e09f5b86f600bcee885f180b5148e7813fde76d877b3e4a114a73169c349
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\js[2].js
Filesize290KB
MD57d77b1a4115e6f7dbd909f1f3f7d7bb1
SHA1c26551e4442e585c9560fb942d191bf762232304
SHA25696a7f290bd9bc6f7be93e567f542a281d4019eddff033b5be39af613ffcbae6e
SHA512fa106b9ebfc86bc2dcfd5a05303a80aefa543b14302fd72855b35532abdb711faa186d680c54b1a171ccec561c28e7cde932dfe61f3bf923db0bda735ba66d40
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a