Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
68adee33eb284c3fb2b669dca1444a3a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68adee33eb284c3fb2b669dca1444a3a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68adee33eb284c3fb2b669dca1444a3a_JaffaCakes118.html
-
Size
461KB
-
MD5
68adee33eb284c3fb2b669dca1444a3a
-
SHA1
3a3aeb2f9669b8cd7b2c70cd52e971d442ef5f8d
-
SHA256
8ac2b81f5291208aefd64ed3323836d445d2780467957e70e53a695e979aaeba
-
SHA512
2ac91c1c19c38c78a65cfe5e1fd58a84dddccc09269fd377cc76996d15b2d56ebafbd1d1e683a9b92945d4f91295374debbb24b261f6f3e043fb773b00511ec2
-
SSDEEP
6144:SYsMYod+X3oI+Y7sMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3h5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e500358fa548e4f996cb54447264a4d0000000002000000000010660000000100002000000026de4474d09faf3b96f565e9b062e4f825ea20c68c9e695ecae0cb1477bfe1b5000000000e8000000002000020000000144f4e202a0069ab65def9c1080b9f470a956f9b6ac9597607f173f9c7ddce1a20000000f3eb6e8fc3beef51dd0df8716b6c1e469a01564140539d003a0dc2d5d2f64242400000005660c2ac82b9469b8d692278b12253e81549effa507f9a53692770af52f6a2a5d52cb2432ad3adc085aa198af4ba1b10733e2daa0eb65233314bb44ba9490383 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422574823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68731111-1881-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307615418eacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e500358fa548e4f996cb54447264a4d00000000020000000000106600000001000020000000a2697205d8c75e6934af966c5a0aed9e99ef9d26e1bc148499bc7d6e0875472e000000000e8000000002000020000000418924a3cd5c24d55db8728916e46951f102abde991b6c6e11178edcd1ad748e90000000d45cee866cd3e1a2ac52f62eb70cf1efa0b647077bbacd9e7c0e870b34317e1f9d75456c7be2be0526a32ba273c8cddc331a0eef398bf1337015bc4d87f9a8b618e53c783c6eb809dc5af6b7b877302318c892d7de713a3d18b546f3aeb8f24834804f85a4d40f40cb4ec9bca25b719a6887921da59d2aa5a2b926dd90eaf076eab376b20c09eda369d1127507121b6140000000f45a1f5beee37e869d59885e31db07b5f3fbaf18395086ada9fa5eccb140a270b28879caecf26c7775af2f6e0760d8dafe86d94dd34a11edfd1f2678e918d357 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2204 iexplore.exe 2204 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2204 wrote to memory of 1636 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 1636 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 1636 2204 iexplore.exe IEXPLORE.EXE PID 2204 wrote to memory of 1636 2204 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68adee33eb284c3fb2b669dca1444a3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0101bac487fda937ab64f8c741b5d7
SHA19089bcb5e750662af61d3bbe32419ca8d3d2f564
SHA256b181076c5a81596eb67a655dd113d5db772ac88fe57d09fbe7403dcb799e11b0
SHA512023e23b3e138e66807f63e8ed7a8e88bf35a41ed8977680e0140c245dc22e33416c00440e938864a1958f0665a954fc0c71efbe4e766ff9e55a9bcbeef4cee59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1a61fce5d0ecb80755e008266fb46e
SHA1807c79e24fa433425d2e99ab89aa96f1dae84520
SHA256111123fd0226996fa19a319750db148cb049126a60c60baa57bfdb71c03623d9
SHA5128b48a0b02831db8f494da2c1abc49d2e731211c4c42ce16a1061fd3871e6fab9f5acac7916de85c1f981b6d1a6d5781677cdc310cd8f27c2473460a97463aefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511320039a552ba5c5421a68460eb7a39
SHA14f2a22bef86292e9ab0facf9e2d4e119fa52e856
SHA2563a61ee14180aa0ae6f68245dffcbc64b624747c803242ca2304c49bef8007edd
SHA512a8dab122837db9296dbe98d0d43192a158d9966d5a1e8dafc1c4dd000e75951f8694cb8f1d69f1e0112af629481931a810f379b5ffb57e1ace7e0e866cba1aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfdc91243e991e0554fa6ede124c3a17
SHA1e6679d33b9dcc386fca0cc38db6e6a9147c7ac22
SHA256149ad595434ab1764e91628a25812972e9aca82b276a695b59c0ba31cbccd2cb
SHA512749d183ee144087bd00faffc8353969cb593f025974f3e7f3e4d75466b659849c6887a37864ccaff50483c9ad7a3c5c7b3fd5006f21ec4263671644870b5e217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ecf00b9b3cc5475c554b7532d27ba93
SHA1ffc213152cf55a8572d02d6e62edfd81f09421f9
SHA2564ac99e8fb9856df911783af5386fce878801cf4d390137794634c01f1b2a22be
SHA51255b3105b4e5023f53b14ca2b5419398e4890938e773522069fd0a782db47913aa75dda65ec0108c166a2ce176da9bfd5e299858dace1d34fe7cbaa143b307f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ef168065d08dd276169f617fdd900f3
SHA1c056a891116d3117aa9355dd0551e4cd13d5f8c3
SHA256d3dcbb444125ec2a7af292dba0f43c8cb6b22f797d5b74e3d22d5201fa694326
SHA512ea3ad05e1d3bc6e5d3d7a0fa565021e4137b17d7e4605ef6e190ac0552c4ef2b8f8d0e90ced525cef2cf2bcf4003a10e87f5a99867e642295d621acb3ece6e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51306a19b84afd2b26a787903e34b788d
SHA187856d9f271f54c4aa953f5522f8540b21c37106
SHA256ff90d0ec1b24806b9d95617e3a9a06b0a5ef3e80bf86252d35fb4ff9b1e61d9e
SHA5125bb8de792257d2073805e138cccd6f98d08f46ab0562ce9285fccca533e10eeb40b88af6ad9a82f7011fbe818809bec59360b959e5c08f8f8f7ff24654bbd663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59447e7605e3a644fe8ddf175f56aa253
SHA1e253beb3eb3bc9ba2173bda473ec97acb8cbf744
SHA256d28c7c367b7a06ee73c049b95047bdb7e36e3c74c2401f4bf5c12c845f6fc87f
SHA5123778b3a74452cdbdf2e18514e902545af3953b6a8bb6dd916d625aae85ac8e36bece7d078683415953fe4bb8d557b7d6626de8c6a84d3653f14897b309ddb66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a449a82335f7b0a4c51485df2f59dbb
SHA1d6d90b721caf67f986e12fa4d82e31071397c7a2
SHA256f9022cc60b8bba8509a1cdde912dc37e39e0e60d3af4ab6696056c73677f0f95
SHA5120c4dbff656135d8f5f131acc1fc13efade42124f749a7f4476f39d6d6f1ea4e0da7f56a905f83105972b32c32b6b29dc717bd718bbc1641fcb8279973113b5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f26a04114eec8d755793bde89da179
SHA19778ddc6cb2680f3eed495fd4ea2f82476457daa
SHA25690b5bc42b80314bf2080b48736f9d9253570b5741bcfe5793eb883d4b871ee52
SHA51291c5ee11ea0cdf702d54f56836a3a41dcd07570413d5f01eb64b53bb65c01400cb0df76fa8a403a7be06eeb79b0daef7be896019423b94f281ae5898b1d28aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139795b9014377801f0f90c3cd6fe15b
SHA1b14af65c836e00218545631b7893d393663448ef
SHA25615b97af917da44430acb77af37824c62148f3d11afcd6f44610d8a00b853a450
SHA5128e65db71c970601ca152036333789abb66497e5c9c84675feec3c102679bf492fc4a113913936608cad5fea2fe2c82b7b0209d27f7680317d000df878a46b8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ff7b81ffd2d2b653a789fb31288869
SHA13ce4338253e8ed84da5f5385ed5e94c53ef9602d
SHA2561ba3cd6fc3ce118847c57aa0922edb7d3dac050a34b21ee7b9a979dc84dff19c
SHA5121cb1b7bbe06c55ae8291650a3dd3cd18f0372d36d0554a4287c18339aaeb9a8e3eff4dc246ce4d0e4ce3a8afa89d5645aec20499f40ef8574d3ec3c70b5d6d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d55c68d3f4e562dbf8b78e0c920eea06
SHA1621108c53d59fea75c563c3748ff478797d87268
SHA256033374be749d42e1b363cd62489fda342970234839fb25e362747c119bd7efd1
SHA512f8516466b96f12456ecd55de6f9f3e6d17496142d86572d07815b2acf84c425df84873b8d74672c0b417aca4d69e8c3e460b46eb8647f5cf558dfccf1d235a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6656c653d7bb4287c0cf6149a6b89d
SHA17325afe6a9bd861e056c4d96c8607ac2a332d43c
SHA256e107857548d8213578e8e5ca4eef0d10d9a0e2c81781be35fcd7c09977eaa30a
SHA51295dd0b21b56c6e2f0a3ab6cda18dbe66a93e660958df657407a6962d3d28c00d2cba45e56d592510ac2a0693da75fa3e39a15a3fcd30ddbd86f1cc249952443b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c82578d23802b372a5dd811acb369f24
SHA12095f90aa7ec04d34ff4d9b08a5d61f352bc6988
SHA2564b6e68527327094adf4fd5133d43584c7520eb2bf157921bf05c91693ede4b9c
SHA51209e50908ecd594ffff9d0fd8a7605179146598a31e5b4fd12bb803197671eaed0b49274530d31766ee5a702ccefcceddc8560dfb2c8337ee47dc0549da1cad94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb34c0c3b38c620896925c48cd2164e6
SHA14776ef7f84b52ff8e481fb11d7f16659c279a944
SHA256d84d0c32187102fd18c88c944b1cbdc7d0269bdac453a85b193886f5429f6c43
SHA512673c7695a1b9f2f770cda9b5f5ca7ad81f16cb3e4869262e963373b0605411dfaa757386911965a16b26a067fc963bf483d56f0e47dcb9a95850c0db12765265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a444349c22a1bd7e1b6c4dcb3720894
SHA191615235b1af1d26f75b3bb3fe2a9dcde4e0ecaf
SHA256d3e8e896bc9203f8934736a4281e6c23c941b071a03e15f6fdb336e9b2dffd8e
SHA5124482f2a3fe413bca9c3ae63718afee674ca66fb8234e71cf893c4b8ac975a3605dd4c0179bf306bb0a09b2bec61ef38455a00bb0d27847b6fd6c4a5eb089fc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761d13826cd37b91c12f26e776a38974
SHA192797dd7f4ec9f1d6e10c72bf4287b9b04992ddf
SHA256b1c1cbacc52872ffafee5fa9765a0e81427ed94718ea29f67d8ccc45ed4f6525
SHA512270ebaafc6add8aa145aafca96c19495db2d268a97414df7ee82efcbc5deab6b9bbebbd66cd2c4f15b290bcb1b70dc85e21e9a376d313b69e1b59886e2cd55b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9b10196b6798c8b0977deaed659544b
SHA1afe06bf1d0bc360b1afc148ccb572b23d5806a1b
SHA256bbf1ef124149554f28bcec77c0291b094668e72f5f01c8822d57dbe569c6b457
SHA512656a2cb3c4f0628b6c246b04a3630e4304689872c189d4b76e80b04b24c2b11c959c1edaff094b9e0c09ef34604b7e0401010c73d5a9ba5e0929330273b73354
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a