Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
63b7b292b26657cfd1dee3389ddd1cc3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63b7b292b26657cfd1dee3389ddd1cc3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63b7b292b26657cfd1dee3389ddd1cc3_JaffaCakes118.html
-
Size
460KB
-
MD5
63b7b292b26657cfd1dee3389ddd1cc3
-
SHA1
3aa0e8554a6682250fd6737885069054b155e96d
-
SHA256
21b1a28f8f68e511c0d3bdc97254d13a93a55f6567a5039e5aaa9d24f3aefda8
-
SHA512
ee28848678a864db3e2ee3bf32574cf87d50736e4784bb8910a1cc155b1f2f6256619f2fff1915e37114f0090d845fede25cfd010c0a4dc5168d7f025647db10
-
SSDEEP
6144:SRsMYod+X3oI+YhsMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3n5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422465662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F6234D1-1783-11EF-99B2-4A4123AE786E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000008ca083911d50fb7474df4f4419d3d833fa2b6d6701bd9a1ad92f1ddf37e674ac000000000e8000000002000020000000822c33aead97410d9050ad1940931318138499e408841c442fcb4b12ed59d25120000000bf293762cbeec972aad4b7240845c7d6692212bc441f507b702eb75cba204da4400000002a3616deb5062e44d39e4853018f0de9b41dc2aa177a74fdab120bc78e115c352ad6ea375768e2e49b4f708e61d4554d06f06d57ca8ff0c72f21e8a323a70d4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008de31790abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000018aa119febbee6da92369b61a8d605bf1d80a9acafc4e3747d4732b38aa593a0000000000e80000000020000200000006de9eb2b1f1fa847093ae6c01b274031528aa8544c74e64a057408000a2318f6900000009984a652808ed8d3ac46c9936e0bd58dd70e194cfab1287c7092aeb7e71648335b5113a67d5dbee9fa0a0892e700cb123461c0afb969d575a8751607b3bfb784ccc92cf27153e443487efdfad148f0a626b592ab28910033602c0119166de2e861ea2d02492e81a64dc47a03d2b2e9e69505bb051cdc51952cefb633fb48856e610c8270fbb8893c08527937f67504c0400000007dfa397a8a2af01fd047090d562fbdbe585ffde20cd6bdab3dacb7fc8f9e918b00bf16ae9d0c19cd78b11d1b35a5df44ff06f3865345edd5f6d2f20cb1da4a1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1704 iexplore.exe 1704 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1704 wrote to memory of 2448 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2448 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2448 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2448 1704 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63b7b292b26657cfd1dee3389ddd1cc3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000c3d167b40f4f095b1150bbe0d99ba
SHA1d528416b3c6b3df7aa1d055ebf0ad5c1834fcdf4
SHA256abae58bd007bc6fdfb5f9a83095c6005ed0b297a1569fbf83531500c00872d03
SHA512626ba336d4b27f28fd971597770887ea3a56181705b2a6d51cd6b22f58ceef7a7651ada1056089038135c5a8305b87a398210a3df2c7ec70cb537ba4d450f237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a9a15243e7d56bb5a2eaf55ab030adb
SHA1648d665994281bfbc58c86d1cbe39048417d4665
SHA25607a9483d73ee9f8bb753a661fb409564cf3aac57c60d9c88fc3ee55719fde465
SHA5126570376031cc1f2439b8db69fc4fad92c91477f25b849caa7a8592ef9d39870fb6c01550a71917e544f3e4663c9b2964a7768ce2462c8874cd8feb284cede3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582e63b94fab94fa2305b75aff35fc5b3
SHA1b0dc995c3cea3512f35fdf0397e76551999df42a
SHA2569a214520d66280785fa9174d056b129a05284a1fe4a36b9a2788f7538b08872b
SHA512c13af341a4d93e4f240a852b3e81a0531410c53b406bf2462aac6a48a47ef97e6767c6da5b1c438d2f88899fd4a4ddf3b5ff66de6bbae4df7e617bcdc53243e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd98b58e0f7832edf9a6bb8434b7b7ba
SHA11935e7fbd82767bf24524f4c25186f3a9ee4c512
SHA256c8a3454bb045ed0161e49ed9106be11dd9e90806422123048830ae40569cd79c
SHA51265f01870117502e3ad9605c0a088d38ad3f92acd6a1f728fecbc57cc62cc28bad06785aef82f706307e5f7848cfea54289dda9419933c6500075f474993d49bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da0841e09c5c409367fdf62fdb32238b
SHA12e6f7ee1df97b3996d09d3f433c660ecc9142948
SHA2569c5db17fad12a8596f5a893329c1ce3436d8b476e76c82eb87e6ab0bddb723e3
SHA512ad09353ed65a8f373cd1c78790e5d2420dba92ace1414a8b04f89f4480baacb86964e7fc8f6dc747fa881269a13f2914b4cd78e2507396e4e88d492570e2f6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde4d15c48cdc61a768cad2fd59dc5db
SHA11bcbd537028d1916fb94d7a5074c42968dde9e2d
SHA2564be1dc0516ca0dc6c7b102b700295ea3c1112139818585daa3d50e20beff56d9
SHA51291c835480ea36ca1951be0f43097ab052cb09b7fcb4c4bda8b80b4d99a27e910f2c7479f0bd9bffa3f1476ba7da25f5a8f22ac4b1eac01eb0cd9c5d1ecd2aed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5158a09b82724e8f01431c733f641d1dc
SHA1e7e76bc3c1fa8c3ea5747992efb05c24a2c93368
SHA2568fa4d331f76560f8916a2b5d42d7d56931040b42330576c7ff61b5bf129bc276
SHA51294edbe3720c46fe0ac4952160f4232872d770b049282ffecf6a79c2d461dff3876f3d12ab9b945745e606f44375fc9abd7c0444cea5a85f7c794fcc64e8b4f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa130e21d5aa3ea952f1d434860e6d27
SHA1cd7af5f7edec74721b4d5cc9991b759c919c1597
SHA256ab5612a26d6074b36b71d3058181fd3f53caad731d5383f48d97eef2474b454e
SHA512be917c3148e61272eba698a1329c06482bf0314f3d1ba5e9adf729da135d91094458bd7ac7a419a9cd0e4a47a078295e4b2a82b3bb4d0ff861d774bb03643eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d84fcd029db83ec7fa4cc3444a251f
SHA1c73222f9d33e4277de59051ae3ab7f381bdc0a7f
SHA25664ccd4902d94c7bfbd3f78b54fa2a956185bfd5229accf619f6e62bbc74a1c63
SHA5127a501ef9648dd44f94cc5e110fabce4696271f3cb2be357fdef6405b9b2dd83bdafc49b9245ba25287aa65ffab1201452b3923958d9e9b8f9a2dd9864109dffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe411e64f290df6982f76eb384d2fd1
SHA11ab24597fe0e6e4048a16e306e519daee4c68770
SHA256deade5126a98ee9382f2e4bbcfc2c9f3d4cbc92dd7d261b4f53911eb0e08e369
SHA5122af1f37ec916642c2a1a2780d911ba09f5a88b1b33961d515b974256d79a9eff80f2998b8287afbc4f6a2a9e44ecb9a0b090dd77db0f85029d43668255e0f0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53377b728046386b6272cb39a20907db5
SHA1ec0e5592dacb03c2636538a1e27949622df80233
SHA2568ca4ceb0d39578d8a0e632f975d39079c66006319a865ec8d646db36914e213c
SHA51209591efd9b89ced453f0da4580a7142002c861c65ebdba4eae4eb61ac5e43e64233a8d18f494aded3c43612eeb00b41d73b883b01d25b6b39fd26c87dde3ed08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff4782e3c882c78865c291ae1cc11289
SHA131a5bdbc7757e7654a709efdc926d967b933f5e5
SHA2560d5d948d2bdd1b93a7709bcd17ccbe69d3496a4baa7469ac40cd51617a827c80
SHA512429bdad733c46dc2f86981b6e3a1f0e334659a633c62d72106d895dc35f4e8329bde528b85140acf17cc0c4d27ce879e69e9d5908e0a3252008deffeb4a59da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567d5eb53075ae6691a2b625b60383ceb
SHA16c978685583fa5c3bf158a4f183d30d03a2a6eb6
SHA256e3c5b26e961d316a2d961655414438fa2f39ec9854b2b9d4f5960d73c82abad0
SHA512eb0ef0b1891f375cdbc8f21031837f7692799da26843cb9f7e4c7280f28c932da754e2f22fac598aefc2a751975dbf8b55e6b1e134abfffaccdb3b84b8bba93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b887a7ffbd8da350ff1615ceece30531
SHA10b60d34255c71b05fb965ecd048906db00712879
SHA256e7a144edb245b2e3239065703ef1e71900be94d2f385907630a7b5c410df8ae6
SHA512d7eebed4bd0fbc2a104a21826be78cc8f6763ba46ffdb587d570e5ca62a6ae28a538e8ecc85551b834b62d9b6cd61ae141632e12995dbbe1f1cdbdacbb1495e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8f82c0f50897e4b439328a33f35d0a
SHA1a41072b8a52da6e88a57934bb0b69147b09406d8
SHA2569a0111f953eee421278579a2bdabc46f0fbee66c873cd24b82a3a6215204e6d3
SHA51278b7f96b6138ddb374fde27c0eb7a4ebc7bfd22903b5594fc79d6035f48cfb581eb00a037c1664ee9ba4d1d02f14e5041d251425564d94fa104e4af5a921095e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a850c686665172445078828567efa0e
SHA13290fbea3ec4b086bfdbc23d31c3bed6b68bb202
SHA2562b3df56e36d4816b181fb6591aee0620e4f49b02d05d580c1b1dfaa1e89ccfc9
SHA512f7d0366f4bbd5a941d6b9bd8141e1a935fb9964d5f7dd3459fe312df4147b6722bee8d40bd80433ace85b6c464d1b0d92f51d049bbf6aade472d57bf3abac94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5807ab74d116bf03a8783c96b369085ec
SHA1bff0f03db3ea74b27cf041026fe44f18a6d39ac8
SHA25647fe835e43a7bc63721c73fea94c6dae5db5bc3ddf39a994c54ba3cb088b2f4f
SHA5128d0937d3accba61b640746f71f2a2ade90e4c7ac3849483a22913e93dee7d1940d839f5454df94bea491995ccf9500bf167a5cc5ee1f683837f17a312c97cb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ddea9edaa6ac78054064126e50d3ced
SHA158a9a2851f4773a5078760ebcbfb02b966ca3033
SHA256d1cd636895e302674462628d6376055d3dfb8424541cc780860f899696c93b39
SHA512525249256503515df100c42f63817719d996dd277114aca31859323cfab54eb1a495d462e0a26ecbcf7237be68cf4b7e9409f9eb6cda4e4332e3294af6355049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ab50fe17b7139f990062fbfe1745f5a
SHA17e719bc12ec8187d3e43390e3052c46be60e1a7e
SHA25652c7c111e39e6d21f0d2b3083be34f0901deaf375fc8a859cc69390a2b2bb47a
SHA5121eb4bded060eded06c3f7846def5d761eb2c7f10acb4ad6b512088ef4734fc8f0ea373eb4d90c3a8e50813d4e04e124542543c90850afcd14050c9555df58942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f9413fdcc56c97b3434a4e6fab44f5
SHA1d24d041dc1de3db976065294aea2e153de6a453f
SHA256ccdf8d833ea7c062a1c8118afbfb033b6c3b281c5a35a43b87e9e11dd037f18f
SHA5124ab65f8579b6dae90800aaebef8c5222b36f47e294d30440dd53d3c91cfad9270fe2c68802e679bb7e4e400f0a3eb3acd8a986c0648d3dea28b47630a1924ed8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a