Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
38ed92d13320008519f8163bb86611ca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38ed92d13320008519f8163bb86611ca_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
38ed92d13320008519f8163bb86611ca_JaffaCakes118.html
-
Size
94KB
-
MD5
38ed92d13320008519f8163bb86611ca
-
SHA1
18786b0b080d2c6caf955d629a975845e77e5a6e
-
SHA256
afa74c1319a64ef552be1c09be4be163b6c70c5d2cd17f7a3eb67f2988cb150a
-
SHA512
e62c7533da2354ea28c854cef28d2e356f54514e2032b110d3cd634b9e52c72b896b8df6dd9221a66f74bfa60ccb22f4db4acca013c5baf4e282a5a865d538b7
-
SSDEEP
1536:WMLiNaUZwvVeFLt9o7T9fB47Lljsf/X2niyRZ9YBdkrY8mgHC+qpEyW:WAi42uBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421660502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96A057E1-1030-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000060088d53c3436dc4ec4a225c5e440c3acffdf2491145a80dd263385d0c314b29000000000e800000000200002000000001c1805e0577b184d78cd5d6b284449213cdde2b2dcf2389370c5add54479b2020000000799dac973c3db624baa77f1d51bb59b23229a9db8cdbae7f15d723e45a38e3dd4000000037a894d28b43658f1514ffd146b666d471e830919345b71ea99d33e10c646ce9d0cee5d59575689c0cd107015fbf5947fc813189efd05419fc6cff691ce358c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f6f56c3da4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2508 2168 iexplore.exe 28 PID 2168 wrote to memory of 2508 2168 iexplore.exe 28 PID 2168 wrote to memory of 2508 2168 iexplore.exe 28 PID 2168 wrote to memory of 2508 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38ed92d13320008519f8163bb86611ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d017e7a3185ed306c5de4a04750d03
SHA1c5a913ec79eb3bb9439c712e55e1489db8f16c8d
SHA2565efed2e52fa687ed3b232dcd1614f87e08edd2e170f1c3758f8c5be2f4501e3d
SHA512d496985ec3a1c56c2e3f4599b479252601cd01a2d0df80786c8cad48ceaf1dddb9f1b8642d3076a786ae7bacc8389c25f62796f346bca67179d3e7e61a3c0498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509b1e14b6ad812394ef21f46951a62d8
SHA177bf384c2cd8c9babf0fa51ebd06d49aaf45a9e8
SHA25688a1c0ae667f267c6ae44a4d5a1a4ce2ae344e38895a6393587edb17d69a1bdf
SHA512e11b6b0afd957448c35f3b89c93c1aad3635f8ab48153bf1605409395928f610a51e7416862041add2ea880bf2dd556f2a37c77074d168648ba29a33b4e95b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159b6cc3d1aa3fe4f9add4682b2aa937
SHA15b7499cbd6bf115c7c9e4cacc0d9e4b9a3652a0a
SHA2565aab6f52904b10026edf8ed7addb38f3c6861e507704de6b9516661003f7d6c3
SHA512a746c32054cdf70d7b8fa1b2a615d7e2a29894235d5dcfb499988900318949d5ae54afb1ee032d68d134f27e9498e9fee085f17aa60659442d16b8fc2d258fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51baec8a8e4aaee2248d77f33ae790839
SHA13218cfe15071cbd687f1f6017d104ee42784b704
SHA256ad9f01ab915e4e503bc0cb682e10c8bca66cfcc7db3a94367e9a480b0188cf4b
SHA5121b2eb41eba83f77d09ad79d76cb842b89604e1858dda2230fb439bfdef514afdf8bb994d8303c2c1a6815898222388e3e439e26d3929d3ea8ec8699536430eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3b0c766c460c80d90c1fa960e2c63f0
SHA10048a416f055c3298506b6a45af9e11e11c3b9f6
SHA25633aef386af4bfd0c853dab75a323b75ae1446580405a77dc11ace0ca602ac8bf
SHA5126068e4876bae66059974c0a1ebcca46dfdc7ce30bcf400371aef7ff54a7831c5c2f5254ac97ab76afd9d905373ba48af3354cdc2b2b5a05532b4f50b081b5a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d21712201118c28f89467e3a7722aa5b
SHA16fc946fc8e519680f63726007c65667fbc6ee7d3
SHA2561964bd1df7a12f3b5f2f2be4451d23e17b924465ad9ffb6ead314a31612f49c5
SHA512a40e3185e50ae9ed8b8aab06dfae2c92cd16397116b3edef8cd1a042a725e925321bb24fd5ce354d7674bf3b38f3dd8ada864ef2549cb9258a2f4f653ea0f013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b6add89ad234a3b1a6f37ea98c943ca
SHA11dfa8769ee5eeda735953253ae312bcf1585cefe
SHA256165712a2216be5f915fb0fd269b0660439327eb5b4316177ecc0233c71706393
SHA5128401da0ed2eb945fe4f0f80bc30187510b9db37b57901decedd64cea09ead450a712942b7c36dcd581baffcdbc00bd67e1cdbeac17d0bd216a44ad7bbebffded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5210470e2cded021fd7935e8bcfe8705e
SHA14ad2cbdb9b415c7797bbf5a2efcc2d9fe88aa4b6
SHA256e6a96c1cc270a273e03c424ab91c0df6132f9e24d5a0164c26480bd41f569b27
SHA5120c95ccd960eee87939c1eac5cdc826cac466d4eaf9a4957e009f30a79f4bf0ff021494d3ff22d15f5ba2de3e5ea3be3fb110bbae0526d217312ecaef2458866c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ecd25e4155161a5fabd7f0c338d839
SHA1714af54590c4f6881d039ae2e27f266fb9ddf306
SHA256523281481de44e0fddb02f0cd139251b3b85355f4115293e47bfc8e30801e6f6
SHA512f5dbfa4942701bb8a3fe20b0b338e413459832918bdbb88a1c67171349d31d2ab759ccd6c82111b1d684e012c84e09e3513e4287ef5bf589241d587ec3ce8d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd2d16b3a355a0eb58cdf35fd9cd46a
SHA116979c4253c52e1a76463c92ce8d42d06e04da4e
SHA256b12d49c95de1f48d1e197766378e6043486edb8f8006cccccccef049076f0f8b
SHA512a7d9fa4451ad9d2733066db8ba279121a4fe8584e7ac4a3811d7ce569b545f6d7ccfffca13d81ce0a1505a586576e87a4e92ff3b671d8eb816a61f5b04f2d463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca37c889f37a84b7eff1371d5f0604f5
SHA12a9b59856d6e76436ecefbd287f7120ff9cf7134
SHA256918612dd180a04ddad0695f7fbb8bac3d9173b7600c8109b37ea056387c7f4a4
SHA5126a23114a4e84e5ca9531cc86a8f249151b6d62f29e599ed258d878f60eb8679bb77e918cfe50a63a4de95514c53310ffea31decef22ab4f65281a749d79b3dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec1fe94c1e53bbc36b561dab9dfc76ca
SHA1e8ba0751004ed2ca0d504faa5ae76c9a58685c98
SHA256e7b6386b3fcbe6e42678227d98b5f6e2ebb613ce31ee88fdc423e65b0f99a842
SHA5123602b0c96988aa3aef65f630bc21e9642b0b8764bde285653c3adffcf6b9b611070ad20dd04dab467760b90fe6306d802c8397f86ccc3f42c063ef527837951c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b54307a4bad220772981601d1efd1cca
SHA17c24ec6b7f30d6e5cbbdc22feba5e51512432511
SHA256898fef4641d0f4637ab2c13f29d1ab99f6558a0ad58ab8ee3b0a0e7c99ebe4d1
SHA512b88f5ae4d4614430551de4ff834fd4a584bdfef2c74c079fe19cac68f613da45a4cb900282c13b8ea3c38a188b253eec3f8d766935e5a0967b8378a9fae7a1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512cea55bebf2b460d4fbc29efdd7a178
SHA12d799f8cf6bba1c427239b173de350667e35e956
SHA25649ea82ef87a2828a265df2ad33eb16da28135cc24613d3353eb41edd4584c75c
SHA512b5575bb9ab30d60dc26cc5c9e93e2b597c0377f62c040f21fd48c3ddbc1e20ae23f30e41700c3291f07112bcfb9d98e3c7b67f863188b6fe4dfb94258fc72555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5278947718c3f000e5fa4965702c885b5
SHA15cb522ee1715df10e8d3e4383886c4da1d7a42db
SHA256b1b855f413e5d26b19fdf456dea1dd1349425789c9576ae0b2d6d4fc5ed7f6be
SHA512d4bad9bc891846c6514a1694b950e202f88aa312a3bd3c0f34fcbcd845153eb5469c9dddf7f8c4b99944b9c74bddf3f15365ce9986d66ba96341ae10e5dacd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3fcc72077f2f872cf7c8ab20acb0b14
SHA1f08a35b3c888372f24323d6f9e3d06952de65d44
SHA256cb5dddc12bf5f64ba9b683590c13b62bc9938e57d385a0daa72042bf25ac748e
SHA5128b66634a7fef942259182114255a43e1e86bc5ddcaf90209caf274a0e06ea714e6d4332194b031e0d9f0fc67ed8c28f82a546edcae4ff8631eaec38b5a7ce98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38e1210ab12568e8faf167b344163ee
SHA13cd307c9e72548c03ac039564bd61cddfafffd0c
SHA2564a885de6cecba43f7c8dd63b8b289655ba96322e8470945d958eaa78bfd09813
SHA5126736319ccf6df4132d8c0b2544a1c887b25a0c7a1754e45c16b263be9f9032612a5edb20a83be24fcaf0fa798befaea0f43d0dd5fc0743e7f5d492088c932ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f31d7e177efe85bf95a1eb74900432
SHA1ab55871d9fd972349c1554338eaaf493014c099b
SHA256a322b8069f53c94be45df2f794b27454b3c87df6883ebf00a834f16d4a7e12a3
SHA5122ba11f14d465449ac97bc58e3c0def9ce05f2995291f9124985c8135484058a04f5cb4cf7f2aab7338e17d2f6124a3c157e51f995c8ea74d2aed7189cb6b991d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b626aee97f1959f5c9f787ade24a1856
SHA1953d1eb3223c7e81248c1c3118a123b408d4d6be
SHA256a790dbd2f352a84abdad36c6adf7145cbddccfb24da088d6fe9ce68e02e93ced
SHA512b1ff46fb98dd09a2b524ed5d96bd21d61a832263a69162b965d9bbf86efd9db11f0875e1a9572fb9a8426dc4d43b8b14077e25c38e1e84f2b591a79212ec9770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b945342b4decd1fefed8a92bf0c3c1fc
SHA1b5f536b1c0fc136a92d07d99f829fd1a1af50d2f
SHA256354a01c8d534e5e531304ff8f2e5deb30fc497427be127c175dbe20f9f19f3b6
SHA51270cb1cce97bf375bd38105b97e8abaaa24d1976732ac401402c64a25b67fa5dae297b75798bd86f417ea10ddd05f860f141538f85270689fc24818b5affe2944
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\style[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a