Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
467162ef55e53ae2c4676cb191cf54c9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
467162ef55e53ae2c4676cb191cf54c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
467162ef55e53ae2c4676cb191cf54c9_JaffaCakes118.html
-
Size
36KB
-
MD5
467162ef55e53ae2c4676cb191cf54c9
-
SHA1
c1f59038ca90ade3f97b7293292a368bf368aa64
-
SHA256
c03cb194d6c0ef577d7af505cd63884d3a87203e4de9c96530674ba731d8f9d3
-
SHA512
3478710fe0a1c009d092a679afb1a568951ddf447883c4f2db841c1c7ba6ef2c4cec4ad710599cc34098f8903aec40e832075a215831c18134d5c156dc4f5937
-
SSDEEP
768:zwx/MDTH/H88hARrZPX2E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRY:Q/PbJxNVNufSM/P8hK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3005e3a0cda6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000074554771bcc6b7a5099df21dfa8d19f9d574eb0007963565a70696745e3aecc8000000000e80000000020000200000003a1466ee7e9fa560f7d440152f3309429af64ec6c4f5cd87651b0c010943320e90000000b905092d946d7c03faea39244dfcfd83b7c3d6802525ebb5bdc89a8210641a8d50b34fe7c8d2579c3280d4b8fd3c6748cbc0a0c4ce6ed679fde147cc7cb032fa182b5e5a57729c7896532a6b70a2b4813cf2c14b0c834c856bbc61c974691c527d2467b16846282c01e5c9bec3ca2b2f4fb7726bc8cb4cbbb898bfab0acd29d7bf9395856954e83cb32aa9620bacf8bc40000000390b50e9e30a69a9b5118ff01fd202d06fd7167099783b896f15773861b8b27403ab2b1387ff933f6e4f0f1bd6bfcc540e96785525dd3a05a50606369fff7f52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001b150c9ca9d4f6a30da4168dfd11416db38a95219a773425c6e372141641485c000000000e8000000002000020000000d673e2bd1c467e3fc36defa5aa112e684979c1f3ecf3c3cb268aea1ee5b7ac1d200000007d2802e1b8471f43f2dbcded45c5d4d0a2e1d0d858bd36108e95d3349659a080400000008a81fa812674b70ec1d33dd96cb3eac2167e53bd51834ed2ed9a6db4933e0745d60ddf4f64fd1362c924d1e9658cba07f84adf5d9d875400c8b0eff41dd32ad5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8CB34A1-12C0-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421942335" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2136 1284 iexplore.exe 28 PID 1284 wrote to memory of 2136 1284 iexplore.exe 28 PID 1284 wrote to memory of 2136 1284 iexplore.exe 28 PID 1284 wrote to memory of 2136 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\467162ef55e53ae2c4676cb191cf54c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd37592aaac885bdd62a2787ab17344
SHA10830c0d975587e01c4e8f0c5a2fbc7ba33760b5e
SHA256b48896b816cb32b1a6366ad73885d9350aaeb11553b75ddfa18a8b6f1e11dfe4
SHA51286e9bd57294c6253b1367494eccd5d1a259cd5d4b3965a06298267b00603456bb4bba439c6b87511e497ea9ef8ad7b4ae8343b881e6c94b47dbc8e7b86ef986f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6c10d4c4ce0ea39000fd9979c8d0d29
SHA1872dc02b946db9835889a306875419e028f96a3f
SHA256d3c0429cf2e8b5ce8f31f62814f589ac770956c0f652a0a5c3d1f576986687af
SHA5124a958775c1d7f674a92f9389ed62e424b58749c6942434023687755b61b4dfb44195e5fdf3656bf7865ed98dceb01fab2fe9b3bf1d4b3293659ee314dd4a90d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b00553e170654cdfdfdaf9948b8284e
SHA10422645d0d16a53838e4d8173fac476b063cf328
SHA256e8ec166eeb22492570b1daee1750b4cfeb2255b076a2c2f0f8cadb3963429599
SHA5127bf64b1ece197ad9db21bd5a60a5539f50c40abbefaf37b8ac41a1b063a272e970d28ad2e0331c5a1aba2440a1c06db202a3f9fd369656ca0da090e9ba26b190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597255e39ca54ff4351be3e4fdf7351dd
SHA1d8b160b3e84515d5f4fdb8dd9d49feb6bdfcd41d
SHA2565b8a5f1330b553b5993989263a928e8e7a67e3f4b1db23a56d5ebacfcfb6c95e
SHA51283e98a618ddb93825ab931defdcdac07f6d97b9ad89b8b57934076129b29044b8c7707e607c5d5c9b20366bde79b2a4f9779e0cb22929541f20a31a79641c724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d9cdf2724d8d7bd13a502db627dc993
SHA149ecc95644c29f10dc99cc3d6f79d78b2a032433
SHA256bed4b1e9ad470a98a877ce57dcef4e990303f8206ea6e527bc3eb53f43411adb
SHA5124af23ff25934baf326b12bbecb9af5cc7d8956d42ee6f621b2cc63f9332d13ab00f36a4bed3f12b7046911ac0a1e8750d5506ac85282f9c1315f281843750c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5362502aba455834692987c6e0f14cddc
SHA140099fdc6732feaebd12bcf6dec17ffc8a87dc38
SHA2567f5997f10d58c1c777bd3968ddf7ac2fc77917a637ca041a584ea21dda1ad178
SHA512c9a7dabb6fe05c9341b032c653d53051877babcba7b9c6c3ab0fe5bcb1badc03932e1b07aab795f6c6b05d1a84565f6112c3771f473f6ba0c3b9b5557a5b580e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559fe27f53cd61a6db24d1e48adf5017c
SHA134a538e5b19571af29f61dafa5915ab86b6b4a55
SHA2561362cfed2a08ea04b24b6053a3831e72b56e9f7e5cd341f29db92e3b6528dded
SHA512f93f7c75afd22ae3e266c784931056d8b9de3ee3c666ddb22b5df82c66359467c681734003cc41f8e054018296366190d89e026e84f5eacfcd3143cb2b1d563f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503fcf197b98dacc3ba85cf0afc971423
SHA18cd8145304eccd49243b71a0c6109b0f4e8b42cd
SHA256419d5821107c12d3a8ec300c61ae7a256dcd6a46f71d6837915a55ab8417a4a8
SHA512005bcf849f1d54521ce28b7cfccd9cb4a3aae728a61819e260a631d23cdf36fbf064b0c424e1a58a49e9451803fedee21702e0fe9b7543034b9d6cb74dc1b97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c563b29840de5ddfec0a735ef1717b5
SHA1bd1beeeb6df63fab16d2ac026b53c22a32f4408b
SHA256aac30c4d7bf5a2b2898276add7c07325ca1f03a28e722e69f4111c2c77a08f01
SHA5126fb3d4f4c1917c2727bd01d48b14e540bf9d51b5ee8167428fd560ccbef7cf3c7b994629b3b0cf370451c3d1c40133f734a3b8b2ba6d569f4109c12005ce5451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f57e591bd06f3f6a3e29ba93af9ecec5
SHA198a42b1929b4397078310548a0021c9c776b0fd3
SHA2560b24a8d07624b7632bf06695c5cde838032b8329e870464da617f6777dc5bc49
SHA512ff48c74cc4dc8dee8c27844b43f150ca65b541b3cc00c393cfb72bf54b57341f73b93b2ad1a9ba896a5a03a8cfd1c1a4638700c520ae19a8e2a553daea24937f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a8d565c64caf39d2a3da079a04ddfc
SHA11bc4bc40aabe169512abd25429e0e82a26ad864d
SHA25683b980fc533197a07429a557f3e61f9e430b5da34a5e531d8dbb80bd504c9936
SHA5125f5ab79bba4b09bdf32182e6f2a3138c686400cea5b1e4f850b92e1de0066b6a499b3654a8894ca8ddae253c3465ce70cece481476b41763b7a50906b0fb1385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7585b00224ead2b4d4e53b3771dc30
SHA10f25f36088cc35dbfb8dcfe73be1dc5dc1625d9a
SHA256353edcd757ffb2ba10ac4c1b99756afc88c7dc699691ca04f82267323b6802bd
SHA512b022b4d520fb8a6d9c51e3e1cf12ccd4b7e11bdb1919a465bcaa767262d099e864a9f3202f84e2a6c661c08f1d0065ecb092ce15ca6a6f300265970ede9ae003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f61c507bb946d52a83f5e8fe05c6415
SHA119577bc0cffb47980ec95601ebfde59523d828bb
SHA256a24374a6fb068451d1c508d2509169f4bd95086f5a3e48406b36efb602423ebb
SHA512501d93c8c2d5949705f3749e4a5f18332b310b4f6e8517a93a934bc46735dcd8a9c37e42b8ecd8f8d18d08faaf9ce6725f1308bba5bacff40f145cb7f4e26564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2df907d3eefb06aec276441054eeb8e
SHA1c614029a0d134f1f33659135ad943f26c4ec4e39
SHA2563e861bed5e2dd3ea626091659505935742314b9993757491ec13e17fe5dacc33
SHA5120fc91a1b993f4dffc23b217aacad03e684291f10d82008c077995d619d7e9617988c27c4e549d06a706251b0a1c7d5777630fe209de7d2c6f4015f1b55c42d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6f11adb465aaee1965cff28c7258f9
SHA1d07a50dbbed977e1e9433a7e8cbdfd3a00b36df6
SHA256483becdd2255bfccfd39cf2d97e40c3bb7c547ccb1be1a251732c4472f862cbd
SHA512607249b37b0c89ffa69190c8207ef9e4c4fb467bbedb066219100c0511a4deb9150be17941c6d57b3b1c347ed74abc5df152e3059673ebaf83073cc771e8a87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abcddae4930022e2a7f27f8d38630037
SHA1fdfa1a9ead9b5facd5308a06e1d67392ce11b54d
SHA2565ccc245f92bfed3b7edcc6cdbdb58787c45616d0419e5d545bd532af0d645b23
SHA512cc01dab5367c69b4dbfc0957174306691698b2489e0ef0fb8f173960980258edb6bf203ac5feb7defcccfeed865f4bf57b7c3168d6b093919a8c95fe4749c9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5361703b74bee1e398ef17988d7f89522
SHA1413c523d5b4896365d189aabf0a16351330aae21
SHA256466343a469aab1ab3c30b938dca1d72dc60c0fc082164d07832cb4867ab25fcf
SHA5123452673fcad2183e6bdf4e46daec0796f3ada770e581ed3d2ef527b910bf870377a3485bce3b7d03fc9ad80a11f8aed522da328d0a47e71e5d82d205ac31cc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f479165f68f7115302c0821225f74c3b
SHA1e5496a46104e7443f9a73d46dcc4f33b0d0e5131
SHA256df9add463d41a285caf7793120561be7374fe3d1cbbbfa3d883b6426baeb26a4
SHA5121267f693d75cf901ea14cf81db5e32a1970d0ad3acf8982c4efb7d88fc26b14a1f1e2e359770be88948eaf65e317b16cb24776e553240fca84da494ebcbba58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf4cb09cc3e34ab6d85e8c6cbb1cf30
SHA1dd62ae70a8ff52a3787a976c5c2d8280df81936d
SHA256dd6b3512a2647e70d8291468d311dddc6cc22040991b35bec6e2b5f06e7303be
SHA512fac02a741c6fa036aaa2c24fa856a6004e46655846fba2b7d2f56909f28adf6b261429077c1e05cafb74ea387fa04dd1602c0fcfe83fe9d2f76a003d83cde9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a45d9ce9565bbe159b1d70bcb84ad4b
SHA166a3029e2339fef6a2e2abc94c33f345994dff97
SHA2563cb1fb288d6a41ae868b0340ffbe1c58bc5637da335204a646faf057891f5b27
SHA512ae6376fa0909d106270add21c14a92e12b1f03231a4a2d099013eb379f3a478b345334ceff80bf27ae841af14ebdc96eb2d36676ec9fed7f209f1c5775004578
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a