Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
922444d72a1d8c7024be4b72ef4a7ded_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
922444d72a1d8c7024be4b72ef4a7ded_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
922444d72a1d8c7024be4b72ef4a7ded_JaffaCakes118.html
-
Size
461KB
-
MD5
922444d72a1d8c7024be4b72ef4a7ded
-
SHA1
9d163f4fb27e21913c9d87b0c48461bb280a8061
-
SHA256
bd612cfb108ba49c7e7a0a7f68e4e4b83943e4881be2c63ff2b1b4dd50943c0e
-
SHA512
508a8ba7bf60383dc52e99e705980b652428c601dcb12e114ec87a7e38b7facad51fbf9d2e56ebac9434eac08bec01032256b8932195bccac9d68e0988c7ec26
-
SSDEEP
6144:S5sMYod+X3oI+YpsMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3j5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DD1D9D1-21B7-11EF-805B-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423587477" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000002a1185be649085db5dc403d0ec781838962e41d002d14982dec5d09d61c36a51000000000e80000000020000200000004d66cff817974b586ab6395ab8b2bf84087a074f5c47f59118a6e18891429c8b2000000027116af6edd67386d67865b9695dc3ebb945f6cd099600fdcc806b4cc859e3b1400000003c2cde73a73ad6a989ea6b6b9e1dd7e3f25556c714b686b444323b0be6b7b5af77fa73ffcb904df81abf89c663bb7fd3e39d9e8e8fe48a83d30fd407cc8d85fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bf9406c4b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2348 2436 iexplore.exe 28 PID 2436 wrote to memory of 2348 2436 iexplore.exe 28 PID 2436 wrote to memory of 2348 2436 iexplore.exe 28 PID 2436 wrote to memory of 2348 2436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\922444d72a1d8c7024be4b72ef4a7ded_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528db9327cce36aca71eed8d2ec1a8c6a
SHA172b67448aff7f4f0aef42cae0a0c55a4b243b98c
SHA256b34e97351520ebeb4deb058be05fd200248f475ba7524076703ee7211b2db452
SHA51251a21666672bec005daf7757ad6bb882250c515f67c3d6a22c777d4ab9db9bb4d03569307f9416f569f13b6852406db07bd2f00c4f58611642234ff764c124e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cec18be1a1d1af76f775d6ba96c918
SHA183961498eeb9ae84267a63ae391bbfaea074ed61
SHA25655942b0198e0e0f6ce9a76cf0e836268fe0dbfacfe06156182396975ea467f7f
SHA51234540f113b17a885083bcb675d64f76f4368b8ca4cfdde597ff27418c3b9f485fc2d3b7afe2ca6ec5f3965548c1b7afa6d039873cb1272d731d3b100c23984d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54301ef51005eba8fde745b4ffe0dc729
SHA13fac2d577b8793b0093b86a9b4677ef8f5759f48
SHA256361cebd3b22ecdc4eb9dde2d92ce2b3f0537dbb2deced3af18a9a7dfe92014f3
SHA5123d702daf3dbcb73280bee4df2f8a4905f534f313ced64a2e79ed7daa6820d4b54e8a4cb07946f4729020a491322b64e603f600a29c562a23fc57be3f9eb9f76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0eef5367eb788ee8277bec1a8d96d18
SHA190e581c87d250b7a44f70eaeb8224ae4c048a7c2
SHA256d9ac427f003d14d66c524468e1135120550fefe267db813743a5f164d862cb88
SHA512a19b9961e5a258d4cab0fcf250db0064e83e43a29da20e0df7084153f6e6860d1e72af4375420978cfbf64739950131498112603d366814f6d09a36dc0c101e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6e180eaa74f7b5691e1ac5cd0279e1
SHA19fd4060c2ffe2eb0a9a728a604b90d2ea64638be
SHA256dff5b765d4135bcecb49c8ca26a858610240806fdda03e355ab4be8c957e5830
SHA51298899e39b88c215a78ce2fe68f91e0658854e07d6f92833929dd501769f2bb341c77636e5ed397c065163f95b6e0d4466b32075805b3c62a9e791b99944219f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57814df3cf5888a7c548972017cfea351
SHA19dda5ab32349fbc88d3eaf037831afc909a76439
SHA2566fa375a9a53a0e5486d1b035081704dfe866b36a8cc2fcf4d833c31684247329
SHA512bc0cc455d9ebe7fd8fc2fdc9fbf073025c76e6117293152a763d12f42a252ccce579c45e899c838f28ced1c68e146430ac4f829ea01efc25f40eb286395bdabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3eeeca8b44d84bd8e1249376eede33d
SHA14d14791fc618ff0f8e54881963716fa7ea82553d
SHA25657e429aad380f28e7f4dd0005fc55717df33b8ee3734768a28f8fae910e67bf8
SHA5127b699ace7a6eaede7679cc61bf4ca106fad19f98787047722db44fc68127d66c5df5e4d97e86ac379b6c30874f39948734aa3f15f589997f86c37d9e33a7eb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d143f4da9135add694cd97e50a67572f
SHA1b012e4f17bcdc043abb5fa16c7718bf6b1e0db47
SHA256b2e9f996deeee3b4abce4cc65e24a906fef08efb61ba6f52da1255eb246f0a93
SHA512c5b53d2ad24cd55709ceac2e11da15e3241292e238ab2ec3b70db7f101bec606ee8ca055111edac14408fef7cd17b4b8bd434b06fb989dec23a1229de594b326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561608b96a340fb10f01e07756a32b60e
SHA1ad16ba0322203248b19e7638c6453e3ee2650cb5
SHA256d8a09907d2dce8b683e50a4a7616b27978cbb9b7eaac8f25133de48a8d4abb93
SHA51233af28a76736d4febdeff3109239540a140d8d40cc20d0337abf845542769b048720637fc4e80d4917138c75ad72d90cb201ce7fcc806210a03092c5c53f1f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504436b9f2b45251b9bead881db999d7a
SHA12e6da075691bbdc3d1fad43b166cdd9118ff2e2d
SHA256d2483fdf5aae8ae383d482cccec2b05f81bd320551d45ca83c60db4311339ef2
SHA512f5fb1ca903e722f4c72fea40a3e5563499a9e3fd36cdb18a5b9da6ef36fad1ec60b71bb2f2b185b7608179ebe8c61655dbf06d2caf96aab48a00ebbadfca0983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d25d4cad24d091110a257f1b6b868e
SHA118fbf4fa31e0b3363c5a1942f8d6cd9d397219bd
SHA2566b9360a6651a61acb0fb5ff5a3aa4c17ac092d20c085d8a215c03f2e4953f662
SHA5124c9171d5bc2b964b294cbe666e4912e7262636f369d04e6521a02d774b27955d1f1226f31a88b55801fc6758b43d7f2bc38a183fc675e86098ffe375ea66fa40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339f4233deca2889edb04acd35cc98d0
SHA1dc68e71226bf028e49eea7a3cb00add0bf30ac6a
SHA25608ffe43b6e0e2e3ccb35d52e50173bfab86b8f1bf36209e14442bb8e3962e572
SHA5128f0b24c0b7a8debffc3ddbf5036675e4e23cb33f12730fdd311b7e094f22a6ff8286ee0a7f7abc5ad3e6653bfbfda0680d7abbcf88e35bdab4c6fea0ac2a8619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59214ed5367265352f45fe1b81352f490
SHA1e86f684f64e3a44594890ee661543c4f197a15ac
SHA256839abcd2b42113cd8640201de395ae2beb568a0f8ae792b783f71cebd35f388a
SHA51254a7cbd6c8cb9b6dfff8aaf0c5e7cf0ca7f2644d0ae5e93a195bdeeba8b458ad6ee657ae374f264f5a8a9091d430f2098fc9b979cfe991b97bb81af6f834420c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50195d13e8c13224726522dc7056cc692
SHA1bbb658f55198f4f96d00baa36385bced5346acd1
SHA2561e645f0c7ed33a39778ec0966779f658dd320a374a1cb402d28a3afc578640d3
SHA512246fe34d027a81e616ea91aac1d27360937f3a1f1fb007365e06f4db21e9243805747617fce462b28ee6a827c33d62dba4af347019fa7cf89e1da1268c7945b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c96c1c713c06d02fbc80fb1ce8ef2d
SHA19e71468f7ce42adaa7c6f6a71bb06fe0d48cb22d
SHA2568b416fc1802fcca2582ad3e711ae07897b7155343888230a41486b6676385ee5
SHA5128476f8c5494c0f30b35b5f666eaf4ec6d1b3c749080c547ac6002521f010bac7a3885bed8ff0dbd5cb1b2f742a272d8e9b8cadc10674e37133e7d8347af571b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5872c2d21947a66ac0944bac427b355
SHA14673b502b45960a3ae1d3a355c229a85ebfba5e0
SHA2560613f110a2a92b6c8773e06425c6b50334a7449f512325abd4504d16540ab6ed
SHA5123a986e9365d24515ae65e62809370d35bdbf699414111f04835fe6ca55bbc185d899da720e6fe62f6921ad3ee1d7c9ba4097bbeb08f2fa81f0152b457409f52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096f9be592f12e2e564f7fc95266ebc9
SHA1018a2b66a06f629fd721b786edb604a4b687daf1
SHA256f330fc4d3f930f2190dc32e7af80cfea31c153297f33648274a18c67f1e0dbbf
SHA512ae053a65b4c4813c8af9260c671b22f5f5b9a7b5c953517190e86f3bbdece66027584f94aaba011469becc74fc79409b41e8b4b847060ef9d66b8918d64557ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0e3cba541b01c1c8cf5801a048a458
SHA123f0be5047b6871cf04d23569b3bf988cf100cb3
SHA256a411b1d6b320691291324bb35450db9676a2c75c45dc67bb9289ea676144f89c
SHA51209e41cbc82756564a301135d31088f9e2f7adfb76bd638c1a8370c20fbd2a6fcc5bdcd4f35751aed5f4fa687702f3e46375548904108d497a8c8e83b3d7483b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e97182df32f0848db90bfb2ab18af4
SHA10c4e1b28d90482b5c6e4077c5ee3d6b443185175
SHA25685e487c6e6c788fba8df8f2329fe7a2d6dd9c049f155393f442de7208591fd48
SHA512365079de80afdb09b1c241412c6e69dd32e139f56c8b8a94d9a11279a5853faba34e17aa418953c7d6fb67de504132f9726e6632f8d01816e3bee6ce13ca17a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ddd3a07b70c112dcc488cc6ef5cf43
SHA1ad32d2e38ac12f022196092f2d9e1c12e79f53b8
SHA256a423f17eb010b539c87e8f66250beea2ce9430673db46d8693c7656f225cc406
SHA512c157d9542391bd6dc832ef49ea6e67e518d60510aff403b1d0da99a0ff72cea562fb5950c8d510e6cc84c7e97e7ad5610c83681037575ed002e5e4349379d92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ebfbef08f484c2d94bf3c3c86e9ba7
SHA19fbd05fc6482f3c25a8e906351945106d7d96bc2
SHA25646a4f1968eb9cb85d4b4fbdafd01f7750251302a0bffe5e79a37814d5fe236fa
SHA51289b9c542dc4913d139602342604f4d3f3aa445d4aa46d58b742614c6bf1c92012de4a5efd997881a9bf8256994785382b153e054ba8e15f6ffaa34a0da84c3f2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b