Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
638bbbac479355bc3927b5a08ce93456_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
638bbbac479355bc3927b5a08ce93456_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
638bbbac479355bc3927b5a08ce93456_JaffaCakes118.html
-
Size
16KB
-
MD5
638bbbac479355bc3927b5a08ce93456
-
SHA1
7c806da06b999fe6c9c0b1bf4e68edecaa0f9f91
-
SHA256
66b67253409eebcff6512af2f390f74184be09cc5fe21218329f89cdfb74eb01
-
SHA512
930749d47d852cf7e58a588c571345cb6d3ff4f3a7b6d73dfabad749d970899927240c8abd6019745e400c08b335084572aaeaae8ee99abc5f46798be57c9a55
-
SSDEEP
384:SQuNq0EBMxZR5R3D7OsxkVL6xbLICtPi3v0w4klQWgkcxaBiOzV:SQurECxZRb3/1bUCywKzrh
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9F7C551-177A-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d0bddd87abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008bb6b7f169852d41aca2fa67a260cb7400000000020000000000106600000001000020000000943fbadee9556e9ae156a4218a811b433a87cab096ddf6bb642a729b2488a7bf000000000e8000000002000020000000c4802b3726b5bdf73e84b31d43d2576933590f27ee10362d5b5b94480d2e62959000000073ea7cf03f84984d18239adfc4704b9ebe72b63af632d99ce917fe6b63e49d5ac13cc50a64b5e1dcae22677ec281e815914c1c1d5651a7876dda7eaac34f941d466097fcde4fdf7cc25d3d532418ee00d52c5ea41b127be2570811b3e9cec1056193b87dcc95a60db20b959dab5a569dfe78fa1947dc7be0bf8b989e2162197e29a8c43c214d50ebe3147edf09076c9840000000e4eb9eb6c55a9979519e6df2a0a9f0e82ffb98d3c282af73a8a2f3430dd184bbdfdffd672785d84fbbac11c680053354aaa1ef806be1cd7c0b385c8a6ea420e5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462029" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008bb6b7f169852d41aca2fa67a260cb74000000000200000000001066000000010000200000008b4db605ee4b891385886a700b94f54a9c3e5c938106f1ac3a080b5522d7ba32000000000e80000000020000200000009a3d0ee770c9e977a0995f2e39361f0a1bf4024d766dadd23c856e3f5084073820000000ddf1d989b480defe9175edf796589a81c41d929b75c5284c94829efe85a5ff9040000000f59fbbef8b2aea25eae6c0fe85a750d90ddb6bea9743dd9b2713822f6819b2e1dbc75ff0d861c2306e13fca5c570c647a456278503900d7f11f59385a924c99a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2588 iexplore.exe 2588 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2588 wrote to memory of 2556 2588 iexplore.exe IEXPLORE.EXE PID 2588 wrote to memory of 2556 2588 iexplore.exe IEXPLORE.EXE PID 2588 wrote to memory of 2556 2588 iexplore.exe IEXPLORE.EXE PID 2588 wrote to memory of 2556 2588 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\638bbbac479355bc3927b5a08ce93456_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a44cf87865d896a3109557206df11131
SHA12c70e4abf9e5158d92313cd721f23f5597da6221
SHA256a96359052b2668422098a5266a7a9444e6eeeac1f142da83f12d64829fda3da4
SHA512f714f5a19449d7890e99affb6fd8a514f1e2f9e4a1da9cd9799650f8325b67eb9a90e684241a0b85d64c64c55e7e5c08fa79818a5136e080a71863e73cd36d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfd3212aa6df3e40174dd30652f8841d
SHA15b363abbebb2c534498e21c9f777bc783ef95c29
SHA256e282c3a6a1077174307eb2a190959060299e3ae9e60a77b6bb7810400caa1f30
SHA512e6b51485ea57f5c6c9d1b8bd59075267cb7c34c8c2ba16028268ba543457553f018978aefdd84561aac462db7dc220c458b015ec19d9b0f58bb141c145ad4342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cecd6ac3d3981cb6f264b23c4c266cec
SHA159eec92778ede4e5cbdedcb191a267180b138af0
SHA25693daf0731d59e182ad7466be2566800e1464f55b679156224807179b327f746f
SHA5121419be5e46c2ae364d203ccc68e7830191003d13eb5e3c94f894d3ce8e919256128f1e22a597b889ed30f61bc54f5b2b1d69d27e2fea0578b1a5fd4c818a1d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf2fffd1e5f21a07af1e5e7d3944804
SHA15a2b84c11cf3e6433f8f411cf06291fd0a6ef4ed
SHA256e781ca124fe8c31e157b60bc6dd2b66e8f847481258e2e7ef14ac6bbd407a521
SHA5123ab43985be4df4811e9c7e408b77b5a620c959b89938840977a792b3469e0be9b461df197f7ff4bd31ad59c6ed56884e738d478b1798349880b54b0bb582779d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e1fe612e7c005fe5fb070cc8e5f5b5
SHA18fa8aef009d48a65fdaa524733b67e8f461e5a4f
SHA2560ed7a2b7ec1bcb3e5007696845f61bb053a2a9c9e25d8a99af6cf8a3897dc2f3
SHA512905f88665d881460aa1897a6afe8c996f6269c5751c66ada223bbd57791d7b4a8e167eeb385877018b4f365eea6953e6773284f6daea7ae416d2fe759fef5c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd918101922265fc08e0625bf1c25a3e
SHA1373e16e3430a78d05ae30492a094ae70fbcc65b2
SHA256ff68ea8ae04f7eaffbc7d62ed54dcf9a35efd58285cf7f6d498e983cbabe14fa
SHA51282c3608b84440c0e974d7b7e800ea6dda4afb29a086448c314f2b8d7f86d784fc7144f4f10c05dffcdd3c2f6f4643ee55f6595ed5ab314e3dfd4138067b12600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b14f8a189a33d2abe32685a4479e8f1
SHA1a6dea2b74be111be3e1bb505e8c6ab76b0ebb29a
SHA25639b58e582af333b4f282b17e1841e723f6648a9bd421e0f1503bce1130846429
SHA51229e4bdc8028a808edd306b0e14e1c6d7c74da45e6bccaabd78086be37bbf35466053362a4ca52042d6d7fe442b9990fbef0dd65d5a4fa4629c8f7c48994c0ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59267d71ce6b5824f62940b50bfb03e6e
SHA17414c68d69bf16ad32d49e43036caea3fa8e3137
SHA25674162825c925c425a5c8d46bff249cd900effc7fc941c8d16764f3b949dac7b1
SHA512ad316e971ac1835d06d5a602cb8d68b3a83d97e7f437492824633248b2406e01e2a0b9f682a261323e3d2ac5f7d94275d634744f573aa79e3ef6915e28a79dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb53f5c59b6c483c1641265471e5fe9
SHA1279de7e7db0f4fab84472a56c7c2763457d4b0b4
SHA256db9eb9f9e5b1c323d2840bb6546c67b67c344c86da82a054a94bd765f2c28883
SHA51277dbb2f24064dedfe9c4d2943299bea39d7dfbb2339b25572c12cad222dfc79bbc001fb633df2a26ed91c454a62aba131c9a0d707f64dc8e035db563dacf5f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fbe8d6f85628cfa8a142c788c170126
SHA1426a300e0a04762cb70c28c5d0febac0e4ed45d3
SHA2565f594ec2fe845efbe106a300c8e64ea479d2a828e837b03bc05cc28604d9d416
SHA5129095b38eb15d6a57cd44c36f3a2f87316ee3c19c0d29fb3ccaac81dc45c48db28f662a36c84b0c0f8eb2c69f475cefafce4e6e14c5556cf64a3a5f389e977c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda8958a1c1a81ed9480b181abbc6607
SHA14639e9c0f48decd46cd7017431bbbab0edc9311e
SHA256cad155480f8df4bb3ca586baefad0f9f6577566a712284f62e11f8517e2ba405
SHA512a267cd54468ca2d78cd1b708f16c5a9e1ab52ac76084eab500d2888d19749e462597252a72414f61f82fc921dec38fdd7b9d48ee30bf5dff072a0f2a8f037b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef76d50f63426192e0ef76cfc4f428e3
SHA15aadab7b3d9301c2760fa419b62352a05760b9ce
SHA256df871905cfeca7099207bf5fca63adbd0b261f7babb973fc1a17fbe51ddc56f8
SHA5125231745511655945ea066d58512f605bb1a250398efcfe2e165c17d488cb1524cb94870b89a34c35aa7554637bde373cefbf0c0d63e128fc5847f36fa1decbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530bc84e91dbc93ef222b07f5df019dd6
SHA11421f2ba680511bcff6b957bb6c82a4c98e05cda
SHA256f67a47af725548b02b36b51c898de2fef7b2f2679b63e1031130c03d65aaaf02
SHA5123c884b5daa5ba4a5fcd644e6b3250e4b414261c044c91b4d1c0726ce66d9c09e4af907c8fbb8e3fd140a2b82b9719e5a9bb64e6f854a1811e80c36fee456e4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2a861617e78489b1dd76fd9596210c9
SHA15dca89de4932c0866dda1f25819e39eec544b825
SHA256fa20e8f889fd86a61bc061c6dcb565b7e081f53f668575a75775c1a1c7071270
SHA5124cc54a03a0d049e5cb2c089895e7aa2ad07f95f2875b051b53260ec6cfd627ec548d6582801fd283847c7c6d464fa796550b487e67399b8d52c896244fd32fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892718522ea4cee1c384b1136faf9054
SHA13bc4876834c989dea4fcfeb910798d715886f59d
SHA2561100e39f8cc5530128df41e8c3e3a8cfd7dfb3e6b670ee7891e5fab08bfb7ba9
SHA512039ebb678e0436d5d932f82b3e026c5d9717766219569bf407c35f75bde2072de487323391d8124e838677664072c1aff014d2f08af2b5586065ba9c7dc51b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6fd69ca59e9f5bed1d036e84d58816e
SHA1a4f361a3f8378f5d7f203fa513d862f89df89b17
SHA25696edaf7ddc2a3e0190dd7a1ae239be2d92643b98d0ab7aba455a6224f93a1540
SHA512113ebe9d034f04f7e30a60fa4ce269212d494103eb76819aa5f2f4225499a87e6adb066a82ee1eb9ed89b53e41020dc56930b1a61f75b5e86580deb0e9bede5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532560f89bdcf5cbb213c7685e4f58193
SHA1455988d277da7c2326c4b3066e3a785c0016257d
SHA25645c0ad0997f5ead4f8f0ca2cfe5f145dcaca1e8f9f5dd48d8558806bd0a60814
SHA5120a76b667c6f2b21950ac34631db168ea21258a0af7c5343970a3ce57a03b228dd0213b35b07f6fcde4db97d0016f2994b831489d156414e274ce51f93cd1554e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9bddeed50c4f4d7766cacc6df065c0a
SHA1820e3b82f46546877e6560639f070d6d5802add6
SHA256a8afd8f2f7d77a23e92cc69b01a4ee298b81469947f2924d63b806fe988b5302
SHA512aa63683ef78cdf02b90529208ae1a8907b935ea590945dc2431d1bebfa81b2084a0f63ccc0785c74918d76af79ef3995cd87108332ff8ed691647297b4729454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb1bd7332479189b107a722b49aee7b7
SHA1dd710f1c74939abf8c2c23a3503e19358c21a607
SHA25670433d47fbfa17ac7ab83aef4efddbc075c209595b04b3089a4e40af7d129a28
SHA51299d4113f5b2fca0b0e6c0816f462d0c19760ddb53f8e787cecac3447e5d9ecc9d56feb7da5832fd01b590450e892306d4d89dbac72aca98ba52aacb6dea5c363
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a