Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
647bc30f892e3a85fa32333a021fe40b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
647bc30f892e3a85fa32333a021fe40b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
647bc30f892e3a85fa32333a021fe40b_JaffaCakes118.html
-
Size
6KB
-
MD5
647bc30f892e3a85fa32333a021fe40b
-
SHA1
72329ce7f2b17e233e5d318a41e2509b08b48681
-
SHA256
9ebdc5d484d1f3e66ca66a5ae90474a14e9c09ed489988682ecc6c634970d416
-
SHA512
8f722391afc4555de9c387c902f8ec5df3a71ede86061bbe64090f78dad9a89a7bf8a69bd441a600088b1bed4c738d7bae11a3e42211fc5a9352d4666c4cf071
-
SSDEEP
96:mhM3sHfa116MwkVcBre4XQomGTWhWJpvaj:mhM32Sz/0BrfX9mGTWos
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e0b61fb5abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422481572" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B1EE051-17A8-11EF-AB01-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000002ddd4a58ed6ac9fe4e45838cd2ecc571a6f9e73df24a00f3e4eb871ad8a4f767000000000e80000000020000200000009e501efa43ed8adc9828427a4c337358bbd55b3a8f58f928daa52d6950c9b4612000000010204f2fb12b88f621a5d44829a43cc090d2ef66000c8887838aae1a18a2504a40000000d78b8bcdcb9eab00ecdb9c998f16b4332ee62e350bad941b40badafe868ed417e3d724bfd792f8b47c0cdd89b4e00353d3d8743d5925a7397c93f6fa4e9e4359 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000a369e21281d1b898b92a3cc564977a6f9b60cd2d897d1022a1b0be4ef0cbd706000000000e800000000200002000000023abc27e96440a72b1f998f004e6a1482c2e4b924762aaa085d071f67184c1c290000000a2d7dd0ddd06d55b5339356f6cc77d5631bd6accac28ab995f8539b26d5f6036b1bb9e978bec669e28248e497c96bb73b3fb28a618d32534535f4de603c361cbb06ab86bad9c262f554480f74a9cdc7ffe97e0bbfc56980cb758cec4ddb8e635ed3e874ed8bb53280f1b3b9d5c9291eecd03b0ad97334449b8325dd85ce0e18920490d14871e755f7e7e86147cfd593d40000000fa7bb76e64b74f42667c65317fbdb84fec37ed2952ccef88128d6c5ca6df91c5b61669f02f26a52c60cd17777b91760e99c3d2bfce35e560ed15eabc4a099286 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2056 iexplore.exe 2056 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2056 wrote to memory of 2904 2056 iexplore.exe IEXPLORE.EXE PID 2056 wrote to memory of 2904 2056 iexplore.exe IEXPLORE.EXE PID 2056 wrote to memory of 2904 2056 iexplore.exe IEXPLORE.EXE PID 2056 wrote to memory of 2904 2056 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\647bc30f892e3a85fa32333a021fe40b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f191d21bd4c2aefdd386e95a080a29a
SHA1b945b4b32e4273e6c61cc1348626828bf1699961
SHA25651ab8ce7bc7c6b1304889edea9bb084d560954fa7f37d28f25fc89b9a954b834
SHA5127c909bb976a6e4f8d5ca2d6c27a72ba662db7170819cdffa288dff7f6677a6bc38aff66d7154bc144f06523d151666afe85963314ee7f76898bbab3e17972e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56845b6ebca25b0ec990c3b4a5adb5766
SHA1c1d2da1ef1d4c51a30fc08501c9e11792d0ca380
SHA2568214afd97490f39e577e675c58fccf09d7b95247013d6a9a7cf310cb3cf6a22b
SHA512d16b15e489ede6d5a9ed9fabbcb0a8532efa7b151959050d013285abe4cf21088b2a43628c0b13cf2461e536ca190f228a1d1d70a683f1a27df28b5b1b80cd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64874c83155830f9ebefa4583fcb8d5
SHA174be30fdc0fcc12e79effdd8057bfb3a19078afe
SHA256cfde914d59cf5be0758dfbb0bc64cb7f5bb70a59d03edbfdf4489e663d9c5bba
SHA512727ade2dc39819617c38a851341c5ee43b86b0edff7fe16fba7fd82fd81ad9d5d22dfe519016609997fa030c956a990e1f00f5674f508b82c55c890ee7c6a244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3fb11953c2e9ede40646fd72d6a4068
SHA1599bbd7b72df0e7f5a33563ea5456b63741c0347
SHA256d4a80d420cd95163deae8714d99f810be37f0a0498cf861127aa03ad9bb757cf
SHA512ea0620950eef14f3cf573a402bf1c8ef204c3db9fc6dc8823c3617a901502afa58953e9d9d9fe3dc56f08ffe144818f91962725dad1e6264e10f13c7d6dd19e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b798827d985eac59715452e800a46a0f
SHA13c3648be73bc1615f14f2c83f43a456e735089b2
SHA2569ba28be3cd3ab61f4f35b484c61c2fbb9476fe66eed42300ca6be1363b4c2349
SHA512077a68ce00e5f065a3362c3c81ac2ca8ad51ce0bc108bb5afa6999d8c31708946405f65874a5709a5af5fd626b2b52ea1d66e10d49eb07eda7c35f29a9c0e160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd99c48a2f3e97147495a3ba88fe5968
SHA1fc4e8a76a0f278fc78a3fd05c03263b4728a5b43
SHA2566dab36729ab8b3cc125e7df8d1c63ac1488db3bd6d59e45e0f9797bc7decaacd
SHA512175186da14e8b332cccef4c411af4bd0d750101d35b1a54dd23b0cb38b00b1cc9d91ac62b8f37c66e6e5faee8322ae0119e3a270c99b32eaf10e443fd5b4044e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faf717ef888aeae74cb1c73d22846fbb
SHA12d463cbe98eb624d7328de8435805b4b045324e8
SHA256a0423c6a8c9fcbb9e151f4ff49656c79b159dd75f51d70e03df6cc3e52d39e95
SHA512efd136e9a37d80e8d0017e11bbbdfa1707f161c7ebc702f15ee2c716818d6bd9c65bdf9ac60f8627bd03b0ca4e546c8f5d9fbd1d0e09a923a4f9793e7907770b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b57b63fc3d92bb6e23ff378d55d516a
SHA1ba2c16d984c52d38de5a8f7e9eb0c926de06b147
SHA25622fce09da5b7607f9915cd5f517ae6a4757f55c1806df985e7dbb63576269615
SHA5123da6f6e22c3dbfc84e42bbe99776ca844933c31aedfa4941d397d18860b8e1ebecef3d5acc7e4d63cf929eb7cc71b862ae62ae5258b8f40f29ed737845816c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51edae2332efb77723b21f6e74f65d113
SHA14090737107f656434176f2739f2d0374aa3319f4
SHA25602efc79844cdef64ce4199e03e9e698812e0863a92135d56985b89c139d13de0
SHA512dc76e1285e7aaf56f43292cc8f0c638c39fed2b1eb94c7af10c3726de565a62a591b35833129f6d11ac7eba34f34bde3182ce62e450d455c2071d8e6fc5f71ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9defa6f0ce166ef62878eba5c6213e7
SHA152d0d3d1245e33e4e8a5d7106ef0f807e53ba147
SHA256da976eccdb70a55e4822e84d5406565b5ec556e6fd7ac91385657187e1dc07e1
SHA5121c4634baa941424972defb4310e63acee49feccf390f431120db3a3f68f15da317f50736aa47bd74637e5d0d15020efb83f1c95e3da2172bdfc60a50609967cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5806bf1723a36e87761badb6b24cc2a2b
SHA10808f9b869be50dfd8179fee0f15f1c92b15fc68
SHA256f3c6422d505c3de5ca581a826ac3ef61081ed85e0a5d737bab110c503d659a11
SHA512a1e58c239f8fc5650db27fcddd86d56d4c611abce1fc3490cafae5d06895bf11cb160dcdee6e09839c467e6b53d8826a540ed944d28c667fed2a7b427cc2e993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5404b42ccceee7d5df67a32a0d6a3def5
SHA1034c801226498930e4ca669524d39ba1928e6fb1
SHA25698156f172bcabb7a7ee3435915c89f9e87b7435610ec6116b2f872dd0ec02520
SHA51202f780da1e1c187e150356ca13754318c7d2ab8fac99843c26802b707cd7d31afeacc4d102d566a6631841d1dd34587a5a8ec3270836e8aa65730e44719a09e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5965040786ee17f0dc720f78a41d86677
SHA1ec022e8baefc34c89bd6cb7ba52e0bcdf0280616
SHA256b04b6759d66a461510eab75ca711cf59c050a6b5e046211ba937e40e96d1830e
SHA5125ce33947f2610446648503663dbec9d60eb1fc9361384166529cc5b631f5636b5c14e519135b6cc03415ab701041b8ea6b5b543777434fa120fc23430c302670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e374542c0a915889a5c1ac28b4d23857
SHA10254a96874638e381e5329693a27a4c5d13c6a36
SHA256104ac1c5279623b3ad8fabc098898c1d2d8cc666c7cece6ba77b08df47d12dbb
SHA512cf9e8658a18c453c6e11ce49366c4966e9c03d7f3e2e12f1be526c428412184ceaaedaae2138a00c0843b149a4e0953599a8092fb15e2be315d2231653bf218a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581d34a120e0f9311e33703aae22df0ad
SHA199c44ca75227937200be3dce995deb2ee82089d6
SHA256c54db652df1a13bf27ca7ecc946a79f3b2bf2f71ee9a9b7d3a3eb49e86876219
SHA5120565ee77e7d5f5d98ff4c5a86fefa23214a2478e4c32250227357daae3ccc4b9ba8f0b9fa5ab31fdb8eaad3317ea391a8e3e45af2f58cc75d73e96546ca05293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b093edc84c86c37302d10e2694c3f6bd
SHA1759bacab1fb7fce6da68f7de4293ebe9c2a4e34d
SHA2568e636b0fcdd0a18b2e3e01bad8f986760c2a37e4a3b37309ce5ad7950ff143cd
SHA512527aa4cc8e0cd64a8fe7f36d8f5c1cecb4555827fa818a1bb4b3152a1f66645eb37375575d4fdc296c35bc7d00f30dc847721248b54d389830977da2b38d78cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1b13924f32537f7a4bb59258f4068a6
SHA128c0b230c4c6f4c0e5db5861d2a66e8dbb69ea19
SHA2561d491289184be2d08b9e343ad1034e76ee52e0788d819c0dc77f010a630074fa
SHA512c738bbe2728197d583c6316612a2059de86c40c2ccaf18ad4d0ff65498ef133d11b2acf64abce11629346a9a30368858d99f30f709c8adce839e3a332c2cfc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907de4bd7ab981ccb53b44b864ac3388
SHA15822a29865ffc410d78a677e1ec0f81e5d31f6d5
SHA25608fa5d1fb8f023697870dd2a7fe8c7a0a0a146a1a13c11299356a712b5a2ddda
SHA512fd4c6f23027ab2a889fe8fd61ca3cfd5239d2ca256b865451bbfefe805676fcd6f28a9a30b222d05aae0ff8b307000363e1a8bd53e69bfe9bda82c2e9e553a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f05c888466c377d7c95d66e2a668c3b5
SHA1ce2353a2cac1f4821ca22ee9f5e261f4e904b178
SHA2562805511cc34ea2f08d87d25d5464f40979ac9913a47afd64300a8e8e4a45457a
SHA512eb8aa1172fde5811e4402537e5bacabe739e5ca6d3a224e26584633517f4db55088e1533e0164271e21474aa959ac250aefb82b3b7770786be96183d9f12c5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5054652c26b7321c19de5e4063c22580f
SHA1999c65be8f81f7ce2dc7318b92975e615269ff25
SHA256fe05e824e0c74218282ce871d5938e534658966f3cdfe357d600cd6a8244a4cc
SHA512b313755793b92bd696c6fd07767cfd3bff8b686c5548e44b75d23c72979b395f2788fb8d47165f07cae7fa663b7a1cae8ebc585eaa6a3486b9e0e3b5657fc035
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a