Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
640227e0ff312b94ce27d9bb53c8b7f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
640227e0ff312b94ce27d9bb53c8b7f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
640227e0ff312b94ce27d9bb53c8b7f5_JaffaCakes118.html
-
Size
50KB
-
MD5
640227e0ff312b94ce27d9bb53c8b7f5
-
SHA1
7cae2b9b60b99ca5066c6030f71e77ddb2ed23f0
-
SHA256
606485b05fef4b6beb92a89978bb1f97f68658f53ee52a26914c3b77e841e05e
-
SHA512
c12888c69bffa19d108e8d039a95328d96ca0766f3cb5288689519f9c53a25b3d892cf1cd133374f05f92eee47c0b0caa3c8494081139751495909feac1edb1b
-
SSDEEP
768:v2M4ROXvqDKbqoAtknPa1zuRSe4ZEUUekzsI5JortiPq7/DI+oRA2RlN/:2DD6PPRSe95w78zL
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c8a2d4a7ce79d8ad0e3f59447c41bad4404e33e178f36e452d75905c884a0e3b000000000e80000000020000200000005fccec484e29432e3f165b735635b3d7e63e02c5188957756ca02e47521012f720000000ed4b2a828b76abbda886483c02288f1d17b7091c0fdd39e98fbaa9e71814c48040000000cf150c85fae2f23ed7bbdc1593a050264315a4385fe78b63d85ceac2165cc78d1b9568c013bc0dbfa7a2e0c12902124393f7fa3db41a45f4beeb1e732dc54d76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50B36E81-1791-11EF-BA3C-D684AC6A5058} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ce49edbe4274cfcd179031d198979c2faafa1137f1be2b074cea1f307ae7ad94000000000e8000000002000020000000f50171a52ae2e956342ff4c2d5978ac99e3d35026b412f0d5e89e5ae051a186390000000a2931261a683e13a3fd6d8728648c79919347276cdf13a241108719b3686a11f743de7625d325ecf20c5f9f3366c5f0b39648bbe4ddffc125b150c4e858eb5dc07eb2c529fbcc6be447b523097ce28d486f91e3c1610a8b8a69e36823d85d42531b7c9f9d7bb7b9e823786ad9df3e10fd555a3efafa42f7ee144a42c5a37829daaba1a6372963a1ca5eb9b7cd46c76e140000000221d87bf0b77546718f49d413706d7095c2ce2669633f8bd415cc69ca785772c36e190e4bd4ffacd59906e008bbcff7238be617cbd7f2fc9632ba6e272889ad2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471703" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70963a259eabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2880 iexplore.exe 2880 iexplore.exe 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE 1380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2880 wrote to memory of 1380 2880 iexplore.exe IEXPLORE.EXE PID 2880 wrote to memory of 1380 2880 iexplore.exe IEXPLORE.EXE PID 2880 wrote to memory of 1380 2880 iexplore.exe IEXPLORE.EXE PID 2880 wrote to memory of 1380 2880 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\640227e0ff312b94ce27d9bb53c8b7f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efab77b22a4fd1d9eb53db4586e90765
SHA18f44276f7ec7e7ad67db6e66cecda6fc1ac33ad7
SHA2563dbf4845e670701da648488b29ab0a9ca69c6ad601bc25922a5cb77771032b06
SHA512b6d5488494d10a4c8cc224c12ac72ae7803feb01978cc4a301ef2e09cf89cdebb784bcda5cbbe06ebc9e010c40230fee3dad6834e81ac90b1052ad1178c4c010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c4fbcbcc4a1b306a3b5ed3b2c3e0ca
SHA149fa7f56c07d7f8af1a7ab4194a1231e03f04102
SHA256833adfe3c3d302801300c24d916ab6115b15571ae476aed124bb652a5e698241
SHA512f86663829e7f2f02fd279c850be15657e09b93f597dbf9220c44fc6e4124fcca2e4124273b20e6b3e9dd70deea356917ca353d616ddd7821ef545ae2a7704b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ceb0959d86d7c1676518757ca9079ed
SHA1e322fec58ef211ea8fde60dffaef73974d935877
SHA2563fa8935517b17b33c64ec9f159f5913907bef3dfc7739da2adcbf5379d41a47b
SHA5122437cf071cc0e60df4a804eaa05c37b885f63824debab1230fa9bf7a9716e1a12d8e922993178a488dbf4e95c95ec705a38f31df8a79fb54d01c827211ca138e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7ea64546aeecdba723f1aeb98db021
SHA1e22ab3c27c2d2fdb79c5fda2f0e7ac40074249b8
SHA25656b1ff0365fc4a6304a0ef5a954f2d117bd3694c6466b64c4487c782f55904d2
SHA5129d2e7ba3aeffaa30132d752506fafa047d6725b23c3f2cab43526b11322c1430beb01653b853cad037e011f6b3e05f2d6c2d1f8a6fc52b11bc15ce6b903def22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d10595ada879dc93d13ac0c32fc552
SHA14a3819242ea72b9365c7167885b61608d195cae2
SHA256f2f8d11fe447450559abf57fe20571061911797b5f564408d378217d466d0ffa
SHA5128926adffc3859d53cceac75d393832eae6dc181b9f66a574e8a4e82c94bd9692c0fc15fa6c8153e46181356fc117a31916dd2fd8db3cf75fd675f1438d6dfb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e98cbdf8ac854497e425e63c1fcda1f
SHA19b330d2953694eee8aa7bb3fb98146890f343ae3
SHA256b8a6ee81f5672db79ede24ef5554e0d597057ebc3b7d2121d6917964ee62147d
SHA51212a3be8cce059f8d4aa688dd2f90e740b19ee6f455876b5f65648fb6b26e9893b8fde9fdb84d024297c74944cf2876db4f4821bfa3f431901ec3e0d20c19edbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5ea074382fa7c8f1c6ba2d661641ed7
SHA10d2d52d93ae6e3de15f4b000a5b75359913028ee
SHA2568f7bc855af6aadcf0043c4562562df6c3b69f6030e48de0ed65bd5e58c67aade
SHA512b564bdf2740cf997746d079dc7961446bef82debfadc88c1eb3711025898213bb37ae5edbdb7eff622a3471617b2896ceeed331d68010c96b3442337863d5bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903e0882c9ccbf924d1acc71eafa8a24
SHA165f629e3b67e8b77bdcac21d07890eb11b59a8ee
SHA256d35d0d4e83cf54aab0c9f67553dcae709285128c2f660b5fb589e7067a632945
SHA512a2b21bdf6f40abbc5f1a8838f9cea5f7ec465fe988dbe524a436336aef256aea2c332614e55f7ec7d97eef2d00c0556febc977bdfeebe5caf4b6197f74cebf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c6e182c3354f6202df71beac81e3da
SHA10666854daf03a087fca4e74d7cc55f3d08c4f59c
SHA256938b2848909ac279099b71ad842a197b169aad1bcf3b49eb62bfc7f37bbd461f
SHA512de1ad95236b4869d88d371d6c9ad03cacafc4a31bf22725fe950d6b4a26938a05c48bc96b4f5c4f69b8d9be0be9bcf38a0b0ba60b9522733ac4301f860c5e38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a776e5b35f4471091d18613bf85c5e8
SHA117970efee8346b5ff34ed54852885afde8332c37
SHA2567848f236e46aef3dbd58b014ab74d85e9a2f2137d9b94e2d5c200a4449249a2f
SHA5128a3e112733cb04354cbac0a24a1f8137b0ce763543208cfd688f1c57a56f0c38592cdc08b601990914f5d8d17a100677feb1a3f625086acc8af284cd53537759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b1df1cabb589b43797ecd664e45574
SHA1cd8253deab24b6412c65d03b917ed5c6cf3e0186
SHA256960317a47f68772b20eb968f6db6e46b059b09218995c238ab0ee758fc548311
SHA512a201effccc18f36181c6c5b06b966cad9712707ea26e2f608f42885e9d2323bc1732eba573c6afd7ce5c34866e5bb68b0a41346962f18f5b730ddf08a29a0352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5420009e2d24f10664b68f332694cd501
SHA10a816da1b4653cfca84d42fcf4987e2433baa57d
SHA256ca4f3870e8e7f49ba0539678629eaf8f83e1459b19d4d8bb450e05edd5477bd6
SHA51227a006502c22c886976fdb69c15b84ad29c271bd1d5b5c5a759c76d590bb18411bc23a9ad256186462b418e0c53b536fbd7fdbcf63e7545c8203cb2a3561c645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f506c832a1484ffd39da9575dbc3d100
SHA1aebca50f13ee5ed2977fcf12765d3b0da1e2e6de
SHA256918cd193c360de9b4026e60cf1c142745688ad567723e2b4b3c832a3ca4a5c17
SHA5125b7da4f731ce3bcff5a594d6c0a9f797e58f5a894775e105b46266ec7df929a140a08aac8b680a81f9344700e85917b69c012b8fbaa0a46aa0d7f97d61de4e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538731a479ab9b94210c086d5e2dc4e3d
SHA169d42edacee00ed65ab675b75000acb4655738c8
SHA2568cdb3bca4d718b3051044189c5edd08689159ae4162f5c09b93edd48b4a4628e
SHA512354fb896229348a4da49619fce4ed1a0b307134c2d9fced4319ab13dd7e73a7bae166e9a0512148009d4fb55c72b3333fa6511c3effe30d99aba824eb72c2a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5373cf9741bd5898fa5f39fc4c1528552
SHA1e4ec786fe532146c38f0626b984b46b7c0be8494
SHA25653898f6c717109ca54fc564614ca0af169d96dd9f54732abedace59476bf25f6
SHA512c4d909d66b74b5cfe791b0527ac3764b2dde76a5ac82ecc8f7f842742cc6d83eb9bd0326fb7253f2009e4ef0d76591ddb07b6a540b74e731576514b3952af84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59613112178398733faa4503eec3a89e2
SHA11e5879421207d20cc5a242a637c015fc3b6cac2a
SHA2567d49d050e38d86119e31ec357f2a6fcaf3ea03512374102334b421e2c685f2bd
SHA512816c987e14155ed5469c994e85deec14f88dcb0110967d1cd5194f2df1d0f7d9a69e23648a0b6ec5a040e464ed2feac3e9fd780b5dbf28851039b937171341b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb26a99ee8ed3484d674df482abc0b28
SHA1715acfcb05de4e5fff520221703967cd354dcf43
SHA256b68f2fac38418584daaafe730f3ecf693352164a6f17eecdbf72f736878920c1
SHA5124a606a0313132e4a5b3d42509c1c4aa9334b44743ea7fd023bf7a10e8c3b7c6bf0391823327f9002d85e451488629fba649d978d0b161c5ae31d633a2d8d4859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5013c9af536758a15660f7f0f364f4451
SHA1bf264af61c2b18cfbb2e2876269051022ce6ec6d
SHA256be228120cb203ec36d4176882b37f10c2bbc777b028db24e6e053287c9177dbb
SHA512549b01fb5865168668d14efdc0de8a20d83c8e5a1080af04406371713f47b15cebfdacebce8962692d5d9b1c8a3073ecf7295677db0dfe3c40c95b0bfaca8796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a54f36abb2bac5e1cf343d6c9282286d
SHA116b455abaebafe672c183f1187b723dedf298f68
SHA256819d0758c399c6510a8cb6640eaeca41f1e21b394966baad94839135da39a54f
SHA5127e73b671aa768479414086c892c8188d581157cf0c63a787107a1079b6d420f4f93c1d622f9e6bc923f45a2e9f7845cb828deb7eb5f5e42a033e835afb34bddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cc8455d0cbe9b16e0068e0c58bce497
SHA1e5a2e11e02f655445198d51c2efd6d8bcee50625
SHA2567a4c71a18d8789979ea73221b0ea52df65046f49d117901c212225687f6d8a0d
SHA51228fac60d8fa912e29b182b5ef7e0db1ca9ddca9a4747d47c1279b67ba102c965c3f665acee35e86ec69005a44689a21c037b6673c91a09b2ed79fbaaa5021b43
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a