Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
8c678410cd7c90a4ef893a9702ff555a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8c678410cd7c90a4ef893a9702ff555a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8c678410cd7c90a4ef893a9702ff555a_JaffaCakes118.html
-
Size
65KB
-
MD5
8c678410cd7c90a4ef893a9702ff555a
-
SHA1
f54076dbb59e99850e5f45b6346ebeda34844eef
-
SHA256
904c043e00c61bd32b7d93d0100e7856dbdac870f0b99e19e5c12830a7f6f779
-
SHA512
de4df8c8c24698d75370de796cb3e99975a413db289b7886f962fc3b4a0e8617b711702cdee7d01341d97db1daa6fde0c989281be773139734df2d493c81a81d
-
SSDEEP
768:JirgcM8St8tN99OIsDCqgG4Jhl+oTymhCZkoTnMdtbBnfBgN8/oyo8QFVG8sG/IV:JrCFvTNgec0tbrgae+NnzAC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023567436b477fe42bbed4deb7c64e08e00000000020000000000106600000001000020000000bb209c239df7cf1184a8bdac4047b6dca88c636b1ff09fe613d1d31e1c0945f5000000000e8000000002000020000000f241838a2decbea7af1c3f6c0030b34e09ea072a10e3f5f3f2e1b936a40b94129000000006336140cbd01efec1be9fc13d19018ae1c9395284f87a959e0e3938c554b41f42be760bb27e8e9d9b59fa5e1ab3da64ad0d57b39545bd1bb8905b856975f75ce57c17ef37a0488fe29d21fde21277e42bb7c946dfb011fa0050786278bdcd0df79ba7d4a0cec41705d27d694fa6dcdf2c77a689c222901e045b8e77df5a347016766a7041d4c17da94c0ab1d1f60b4740000000faea1e32853695a1a8166be0e842283b1f7e03f5f1d94910ecc8d004d57ce1caa705b4ef2e2d5abfc0bf3a560c6fdbf0f02c3c890d77535c42fb472fd4acc646 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023567436b477fe42bbed4deb7c64e08e000000000200000000001066000000010000200000001b1e1cd90fabdcb454e5e6a33a51a30f302df20b8ab3af086be259ee93bfff6a000000000e80000000020000200000009b786af64898cab09951884a55b13c029722278b9c2041492dcb8e5b3bdb949f20000000d92df4ab70285e3c0c39668f0b78db0b108670805ef06bbdf6187e274584a084400000007d6a15d4345dfd2724e3ed3f5ca288e7e9d6e5236220570dfbb4ff70b03221aa9d907c610da208f6035ab9d707412fe609c4889bcbea307c91e01d79915dfcbe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423452180" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{265263F1-207C-11EF-A4A3-CE86F81DDAFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0df81fd88b4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2884 1540 iexplore.exe 28 PID 1540 wrote to memory of 2884 1540 iexplore.exe 28 PID 1540 wrote to memory of 2884 1540 iexplore.exe 28 PID 1540 wrote to memory of 2884 1540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c678410cd7c90a4ef893a9702ff555a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b298208f54fd48b2945ff103df3d077c
SHA1fbb11e3ab5811f5d2dc0074c08a095b0cccc0237
SHA25650db086c47bcdc68f3e07795c77583e881252fc17e0f1ee8c3840ee8f43e472b
SHA5128a2e0b64cac4cd3f173847908d944703ad1858092318d8891ff7d3fdddf1961702302ae5d7c2ca9dc07c45e88d5008c77ccc559a992f26b09fb5920a975495a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2c4b3ebc1c1be1c02aae1dea5ef465
SHA1d08f20d74a4b85dea5106fd6d39c7e6cf4b95d0e
SHA25635b97772f85120f7390fe7d449cc5d7bf5875428c0c5ed8ea42c69d45380b2b9
SHA512bcdf34b8c5f9f2a408f37a01089e7b74fbe0b34e07c7b53ae6e880260f853bc066e131b8034cb91327976c4382951fcbbd7be1e1defb4dbeab3ef8615b420f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ebe41bdd687c8f99b98d65f1d10d5b
SHA1be7a9a9fca83330dd940ea42a9a2ef9ae8a0b2d5
SHA256f30392368dbf6d2a5f3e785fe60482423e9346e53c237c2748b5b1811aded85f
SHA5129a6fe5f0ade9f4fd1c29058053dbd9d5a25fb8075406c76fa9c56021c5d5bb73d5926b96147ca09f8169843f8c8105c0c42326d70bb6434b4a8cbd56955917e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0c765aabfd53b9ce3b1e5ba3396037
SHA1ee1139364f3b394c9bc5b8f8d52937392e077884
SHA256e687a41e932d17024ad2e7f7641ad277fb09a7724a9e5c54e91974d973b3742e
SHA51229b4244cecc97d642b77f5341103599c8169648a38e953cfcc1d82e0b576ecdd9e1e2f0a7364ef02246dc596fef1bff372de1e00f0793e0219c792d04f685fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d2f9435f0c22a04904eed193fb17b9
SHA18b4eff6345da70a5c5f083bc4d9d592fcf76c979
SHA256e67cf0478224da1f127cbe0d1e3b9a7589c293469059df7080296e519b7b2651
SHA512f0b32f8e4473cc2a8c582a593d1e78f282b64877b98113e219f1f382a9006bc5553ee8d6e1467c0d3bfa57603abe04ba8a0b20c711fd304bec534c3e3a0117b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b90a3299ba66cca7335bb7d1cb60eb6
SHA1d63cb593381b161394ab1f77209465d462110f07
SHA2563863bd42c3fa038b681549a9e362467a7e4656353f858ed210d3d07074b879f4
SHA512b4f4d8caac376a82aa1f8f5f9e547c2e2ce12eb741a66cfc0fd7dd47d84b1f6c847a1a0d6b8584df1fec11cc6bef151fc20c5e77aa880d6f4aff1290feec61bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db8778c49988cfc45a800fd63cbceb7
SHA19677358aa29cdf1038f7a68ba2abfcc4da80abe8
SHA256fd07fd2a42be95d4020d556921f21d107eae56862bd4f7a78a8b052d6f7397c2
SHA5127ed7720f32aa2ab8acd1e9ec8e04927a0ad77c8331e7964436dbef5f024b9a923eb260ccced15aacd8c904b020cff9bec8a9518690889daa37c78636589ce355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1087e747a0c1f6c5d197626c53d5b2
SHA139032c3db711c80f367b323e18f80456845cc346
SHA2566c1b25b72b37bac44f5e3379412a1eebdcf984e5779b3e04bed6b77438900777
SHA5128588b7c5a5e7294ee72876154689684f4082bed7bf6d14a40bcab1eb919b0a8d56186416c2395be296bc419a43fbdc349dc790eb2fb4bc0a98d0c10fa3378f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32a979095ac8876da14bbbf2a239c4b
SHA15c83a234646bee1cf8b48a80ab03cc144bef18dd
SHA256847c03f12ab6154404df516e3f9ce85f88904d5b02949f33d6ce5511366811aa
SHA512710c299de2c9c7c7dbe78e85a5c5f171f162fbdcab7d68ea902e6d1ca74525646bf62047f07c7e572febd0e8f743a0db6f2769874e665adfdf0deab3f9f5ea75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb9adf6f6571c5ed216a558d318d691
SHA1a5b7c378347e9524181824589bde1cfb82453f86
SHA2560fdf66ac2c173f390c14261c13be42bf020f833a0f28140b1960ec0f93ff1c40
SHA512b3d86bebaf7b2865a4e6ba9b35f21dcf29568bd4c0aea6f134f4db6aa8c2d75726c438acfe82120ca1efbf74cb71d583b95ec32f397a1c6692c0f43c3f79557e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400de09e6bdb2d84c434cbe3c89c1bff
SHA1d5f21f86000a96e91d402268776d19a610fe1856
SHA256265d22c1aafe01ee16f21f40f57de21e5b430af9f4548edc46463acd40ce9208
SHA512436264a1b2b85cfcda574fa6c76433d94b268df47342498d70d185a0c98a0dd53925b181a1cf721f0553b8878e7b1acd122e0c8156f411418e5a3d744a9b0dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534648f5840e8f83a0f75134c601f5966
SHA1567027bd0d733d05fa8e1b3d1ce6bcf12003c900
SHA256fc6e4e689d4a5605e98e46a71aca5f5d6df9d28b6f2f73ee32b292187dc794be
SHA512207b3275920f7085589e5130f1656d3fd752b385b71fc76858f6e2d069256c2c0dfaccb9f9db8efffa67d7b315c96dabd503c952b7d623cf12d3ab8821ac65b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc45668cfedddf38d306564431e942b1
SHA1fce1d47251504c03622ea15584531ac284b1e9e5
SHA2564cbcb8ae18c53e6184beda83be84d9709e718bc08808080eb695c413f4d97f7c
SHA512d69d86f09725667feca56942cf47c88da088ea4bfac6e00b5658ebf75764d8050fa681e12c5c42160f70722e67177834f20d09f346aa2530060c51b52ebdd61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fa4c45d95f9dcd7a49f898d8d0d612
SHA171718984f0e4e8bd38d31269d4a16af7a955c272
SHA2566a8281d912e2ed3a62980e8e2c5be69fbc7f2940c94df9f598486ad92d391f94
SHA512161f4c1f0a20b0d0c24b0ed313af6a749efb629d6cc6e6fb1274b6b2ac35d2464c131f9ab0fe1aca42af0ae0101ae8911efeb3ec62a49c6b9220172673f54397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310a3bfcbcc37f9fbf0aaef8ba881caa
SHA1c09ffec47042b25337940770ef421eebe27c26f6
SHA2569ced5635c12d8c69a593928b2eef757c2fb3af6c75a5765d4c6cff67f5550cfd
SHA5125234a257123b4981d7e2576bf37bd87f9880d7514492a443828c644dd6da1c2b609f35c1490d2f5ec2faddc319fe68b1cbfc499135a6e72eea2a75c54486b574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551cbf56a238f9ea182e6efc985fc6228
SHA1b43c00ae76b5644d25536635d5bb2feadd9cd9c2
SHA256b9ceae959a3e4593e0d3535f8c83ae43593f802d3c0ed2d147aa07ec5a442c5b
SHA512732aa17441b144055785ba9befcf471203be4c3aa1bc01739972ea25abc25ba8ac165fb4d2cfb444d3cee0bf1c4bcae29a45d1dba5f957eedd599c900c88d994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d00f6d002ae6851b12a9bb08d2776bf3
SHA118ec1d2b6ba14cd549afbd13425f84790104d4ce
SHA2566229e7bd6f2de261169828178f2710fb6f6a4d1df93d584249864d5f9c6336d5
SHA512cd3d5ac95f2c11e1c9842b0c4dc2fd84af3617d2d799022c9a2e96f5880e06c502e451ccd0ce99376f401788922081d501d0c2701234584151f2deaf3afd2727
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b