Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
7e050c3839b54768e7778a6d18b20006_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e050c3839b54768e7778a6d18b20006_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e050c3839b54768e7778a6d18b20006_JaffaCakes118.html
-
Size
7KB
-
MD5
7e050c3839b54768e7778a6d18b20006
-
SHA1
3ee5aa0fe44dcaaf5e15ee65c7028b4a2ee152b0
-
SHA256
5700036623c5ebad8b8f162b4050a7153c8503ac5d8b5babdaede4726960bd37
-
SHA512
ef8dc27a87f2b123c59a6290003b3c6fdec859496073797dbcb8290c752d3b598ccd3a9d1e548ff78d82961301331a39b890bc6a19281c01378ae3b7fd6a655f
-
SSDEEP
96:LBaL9TOTMTVgGzT2M6JMersHUJJAAQC38dSlndOSdVQdclzdzmdVp6dtyldLd+5z:1aLS+VgGzKaersHUMD/k1+HH0adSx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000094165633519dd9177ac0e74a19a76fae431ad83e9651095d0be409434d6a5602000000000e80000000020000200000006420c30620fe276622805193f99292f45a37aa47de60b5bfb31bf5d121944e39200000004874972146d3fb10cc8bc3ba852225e2e0f0e46e23842cb71abca6c946161ffe400000000444c9f9f34aacb3d09ebf1dd844afce23392f69f1547b5e64c7e86c8aa01081a86b599fe55bfa3a565d5d2c3fceb0d55c1f3b2d135b0ad967d434b83b75176e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6EA6231-1D23-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ff16b4ad27a1437b4f2d75569d383638db06aa039201cce89fec14cbe17c267f000000000e8000000002000020000000abefde74dff17e98c661db5a6f5b85dbb3a9c841174e1581ea5a9f11c01574ed900000003ce8e9937f9297ed9069ae9845225293c82d475a792aca45d14f504d9d5edd9fbc8bd854758b2819e116ecd699d45a782b51a563c9c0d313626ab89c8a1981caeba109599f5b3b04ee221a91192ac7026ae5bc9f96fd77668e5b09f53a8d22c8584a87e6b1fdb3c6a1f5308f0bd77316d39d96233df24c204ed5f6140cf72b905bd8df242c837be47327c51b1528877040000000b839d3a9624717e461e830d56eafedf3b8b0e0bf44eeb832e64bff02e1333bdea9c661398b22da74e7967921b9f4678f26030743f76f38536bb671db78afe5ab iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423084311" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b2779430b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2216 1264 iexplore.exe 28 PID 1264 wrote to memory of 2216 1264 iexplore.exe 28 PID 1264 wrote to memory of 2216 1264 iexplore.exe 28 PID 1264 wrote to memory of 2216 1264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e050c3839b54768e7778a6d18b20006_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd5cb812b6de9d7593a4b4436f5f25a
SHA1c74fa6e4aafb34d671ec6334208095145e7ed241
SHA256733ae392043e1500fde7dfeec9b54d6350fe782e0e675441ad98bc7fce3510c6
SHA512d8ea845f1e03f5807aaec134e44901df45a2e553405b9d8400b384160900e4c2fb4c140f6d2aff189db247189ad2e1828b8df1a337a49a977df50307676b1766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0035ced1a3f730f584131f3995f75b8
SHA15c5dc1e663ed4975e6e2e6ea85dc5f8b9037c0ae
SHA2565eb7e6d1b7d600455f81dfad354e2333cdafb1c218b2075d7c2031b5f896b409
SHA512025a272dd3bac99bb422dd71996df909d371339e435a13a5cadc94a6589aa607cde59bc1087229acdc07c36377a6fa51bc9534135c1d125c4de4e7becf24812a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097aed5e1acc31a9ab7be0301dfad1eb
SHA1d30cadd4fce7d2db0a3222c53439db8b596611f8
SHA256d1fb573802a06184b5a57e658b1a09b1eeb6f936d8926a4d9d5e4053e1942f02
SHA512db09f411e47b5b6c8b339dbdfc8cf6752f76498d924d2f5905d7ce4ebbe67ff1df62638565122b28958a7ec70adb8f2b3e1510d4e91273b1de7ba7a607c27c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf48e57e14626322d88ecd78430d834
SHA100fef5d7af7e369df055af27eb06a0e65f0177e9
SHA256e056dbb7ae6bab8463cc6aaea3c77bdeec61c21bb706e6987bdcff11c0d4d592
SHA512c359ae464d7aba6058bc416defa86e932d00d32e023496fcd47276f8e5bbb1bed83884074567a6a9fbb974fc10b0d236c5e99f7e4372439f738e12927549473e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2cde7586e217693fba1daef066f778
SHA15772bf49c8520c11cdeb12ea663c0302fb3dc481
SHA25682b5a45912fd35bb0f8ae790eb6fdfffb542850a4920778431648189c2a921e5
SHA51281f52dab269dfa3c225d873c797eaaee9244251c8815b8c34dc160aa1fb4bb6791f699f0dfbbe47b750f1d0cdf196a87db6a949eaec4a1a81c8514d44f10642d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50584abfdac97d11cbc2649f931633f9d
SHA1c0d088d8564400f3b99fb83b12499ad870375b27
SHA2568df7dbe7035a3ec72c4519b89eb6f43991b03a39555cb050e0ae1e57e29ddd02
SHA5124bba9d167757cea34f40b4790b655cb61814badb0e46113492f419c580d2cf74fe35dbc61d0e619a9f099c720a0f9601812fe6ae27293214c7ac74b987a70476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b11bba9cd725f85f059cc0ffadfbe0f
SHA131cb43f270511e409fcda213e09afa87eafbb957
SHA256d27831dfc3ebc8627c28adf0b56377fe9438bcdb10d9e3a97044c8220cd1d8c7
SHA51225349c243dee78d1a8471dce2d507f42bf27cfd5d8808a48dfe229d5db8f1da5d7af6d10b526febc3cdd4bd3fb5ff34459fddae211179033ed9e644dcd5521bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56182a52707929c345e69e6cd40cc0a0c
SHA1eb67db1e3593b6bffd29775d200699a20b005491
SHA256ba9c8c1777d23489a6611e1dc0f2c0a5c11f7eab591f09c3978f32dda01a085a
SHA512302db0e70d540082349b2527e75b07c74d7eb6c830c0b6a93ef4ac18d0a2946c9dc1b6fe211987c094d38edd2765a1446923a05dd8880d0bf5f38dfaa2f6e79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd46902f126521dcac8064f75e420a14
SHA1eb2fe235d2c9ec874c598a54c9bdd01ea1ac429b
SHA256e546d63487ae006805965d3b72a66a6fa0bd94ddf52d3d8b27a10f178fa66af3
SHA51226984438fbbc4c55137f0fc5af2b63cfe7a5d8b8624846ef0b2cadb9b8766534121b30fa3e7f7ab501378cd76cd439ced7d3fb57680d2f545f608e2fd35177c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5607b70762b2ceb74f5ee54004c830fa3
SHA1870bcdcce8411911d6de1eedf99e29d3ac924a0f
SHA256bcc611f560a7a5cc767bf09a1b1a8fa7d669ada9742f9fda0d6e6d7b1c69d113
SHA51208801c36fb2a62ff5cf65136a218dbcfb4204c9e8228794c3542dd1c6c5dbdd08d7e06eca6447c8096373b7baded46fd3c83aa6a1640a2e7f1dd06e6f392a7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4065976285b47160aa31c3a6fa0e554
SHA1d345f9923c6eb4b2b18611ed93c879a6ce3d1658
SHA256dfafb5bb55ca1e2f5e92d900e01f38cd2e16cb963606b2abb270ae6d97f72dcc
SHA512be86db8a1caffd0a963eda25e37420269a32217d6b5e293ae307ea0c082dce63e6a300ececed2dc9bd87c6752e7118bfa2da31780eaadc8470826a16b181f308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5808f20ffa7ba951ad0145e057b45dd62
SHA1577c57dfbeddf0528b7d76f58428afd412de22f7
SHA2564efb706265470ec80ee1a85a8bf2ee3db64c021ebc7eabe44ceea4bef7580148
SHA512a13a56bbcd2c908fa8f31f186a346d7321b02db22250e34b3ecae4b303f8e5dd41567c96ada1c40c9d430538b5f69dbf97c7a4e8adce823cb138d9e879095f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e227b7bae3a8ebf2342cb8ab0b162f2
SHA1c56ce7b23273144db23d70e287a6ff501d17713f
SHA25613ffc58f7963a965eeb7721ecfca8ce972915d3c9de269a0aa30dec0d017a40c
SHA51245d853c546d26f3494c20b686353dd33db86aa1a455293af4d26c7eb9129686aeff7077b502b130d9e6a5e9038779df47569b5f4104997bd016f78799b682f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57586d46365150cce93e0c450d7cd1b99
SHA1f3b9344dcefd6dfd20478f0a191d46a57040d698
SHA256d7b57c6445bba3611f8bf99c476e80ddfa9ad8d42d1f1cb5c5e24e90fecaa910
SHA51260c8fc81913be79813a83aee310a09d852822378c4308ef899397228a0ae3cb0753a0804460853d0c4898eccde2d685d825352c339cb046e5526b8ed3caa4877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8007701948981d0c7e07206d59f71f
SHA14a809b7d510ae5d40ed7311539d3106e1e2b01c9
SHA25663825c3b0129497a49ee296b6a962db19c7acc3c2c033586ea8c25210557b96e
SHA512e14587d76c25feceb844c2013a912edd3f907775f9763b91f8bbe116abd2de6a291d3a0fe30057a4fda5b57502692f6ecf73b8ce33bd7f838a774ff8b9fd2ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5238c1949fa58d4984b0ee4379062fd33
SHA1c95b2182dce30db16e17a78ba40388ac15e39506
SHA2564dda67cf91c7c146550d217d2050d8b3ecec9de71fc9d38e7476939d8167fade
SHA512baff9bd6025731a35a0cd8829b5b1dae0eadf917f4721c4289231cc0d50589503848358b729da222046946bd65d8e3a10c5b63e09ac4b92ab64c7ee3f7bda26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d2caff26692d462acdcaca56468145
SHA1ad67ce7192e1a0fc4f8abe84ceed903c6ac6e426
SHA25633dfcdc9df63f82b37459d109337743ab0c9754529c502386e6d66eadcc60c90
SHA51213d99df9c22f2729b654c224b7b679a41aa703da3c1efdf14b106d496f0969d8e5a7e75690af2e518650eccb5d99add6aeda2d8bef28bd69740308fc4121d8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0626e376e2ed294c4b9745c910a9800
SHA10e7bc5deed183b34c231119eb8b4d4bf4d6ebd5a
SHA256eb51621648321015fd7e0937a521a3a64f1e38fb9eb19f10c1f7b36476266777
SHA5127a5b07d3778b17fbdb376e029c814b22f769bc9fcd3ead7e75d5fe23dd8b627a5d683d18331c6446ee37412d713379b3d72c1365196aa060c9fc32e49d9f9d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758d11074c011c41150d881050d4e937
SHA11eb387b0ff8a446bf8bf7941ee9a5333bf087b15
SHA25657d319139e9f9229225f2b3cbae34999d8b1ea6d82698ca19f0d21f5a499aa14
SHA5129fe6d2d30b92983021ae88934152dc8ea8970fff7e7e4bc082a97bc1fb6ab73e5bcfe43cf9be8808bd0a550208d7bc32213f5f7b239376f02b61acf0ab02d553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d21fb399848ae8b57ae77fc2c42b019
SHA1f6ec8231c63026b8e574b953400605293ecf22d0
SHA2568bb6137a7ccc8fad52779b79e2cc3d0daf9a86b42e5fa12a11c8333779dacadb
SHA512c157e91355eba85449dc16160096728b1f6735c52ed4d83d163a46589c357f0df6df1706ca4d4b653ae33c03214658c2d9a88c8ec1adfb4b7e67a76b73c11ad8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a