Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
9607c66dfea9076562fc4c4c35885721_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9607c66dfea9076562fc4c4c35885721_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9607c66dfea9076562fc4c4c35885721_JaffaCakes118.html
-
Size
67KB
-
MD5
9607c66dfea9076562fc4c4c35885721
-
SHA1
9932c9bdbec2b5b0aa712ef634453b31e72eb078
-
SHA256
0da3b288109f7f48585515fb4db35e6408a91fe2f4d618ae9acbf0966a6758bc
-
SHA512
485f3529ed280b745a985c81bd458b7e270d14990e9de78d9a1a8b5c6bd01307a5cf6271654fd737eed7a4f04e88467111368f33a615295a9e60ae072a9f880d
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g67X696oTyUZwCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:Jd3TbZen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000db830dfe90b6fe25ef5a67c7fd47955fd3d304fda97cb43660d0f13ca609b336000000000e8000000002000020000000251b2e0df44f001b42be8a8ad01c289d4fd2804c09359312e802cb6f8682aef32000000000c4977f65e69526636ec84d2f6c8369a5c195addff75fa4ca8bab0854cadfb34000000002f0a77515e96f60f47aa32a8019cf517a6f5dc201d99e7272562e16783d877a21bd3722faea1ebbde88f43e545617d1ffb558db5157db5dd8587875efdfb23c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01a5f29b7b6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423691911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54BBB861-22AA-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2168 1548 iexplore.exe 28 PID 1548 wrote to memory of 2168 1548 iexplore.exe 28 PID 1548 wrote to memory of 2168 1548 iexplore.exe 28 PID 1548 wrote to memory of 2168 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9607c66dfea9076562fc4c4c35885721_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820affff03a48949b7eb49209215dfe6
SHA1d7936621c41dc5be193e72baf92cfa109d2ccfec
SHA2563fc1db0b16c07721db611b7a49897720fa3e051a88a664b5f9513d0f1efec28d
SHA512e808f4fb03aa801fce1cd4e35f3b2ca1ae91c74bc154d1f253827461d0fae2fbca978230f6ee940854e88011554ccff1a47dee12fb80c5e034c4859cd78135dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542aa6b21268c9b0355ea04a9cb0d4550
SHA15829f29386fdc0d1eab73570d21ab97494f3f1c5
SHA256deb33fb81a1423e86b6084137d4dcaa8a937b67614ad6db3e8f3f7c5b6c377cd
SHA51270d59f2e947d4a918c2252a30fd47724dcd06348a7f68118eb73da3716ead5e8eb653198c57d4cca4f58517dac88446f5012463727fb8f3feecd34325936491e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53841c1bafe12c27967e6f0367e196b1a
SHA12291905231ae62e07a66ac6770c0fde85a17be6d
SHA25685b5d9f569e5a50060a0b8d9c3e5a1815a4331150050e686820a4ae88511ad57
SHA51272ac4ccac058e168efdab12c26e1c9984265895291ca1056a5b4d60d4e226b497c321625323b6e65ce5bb4d14646f61a659ca43ac631f5c55448250cb55cae75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140f49e41ed535dc90a7f7a5c1a0a36f
SHA1ab08c882ccfbe87cc3968aa03c441773a53a3fcb
SHA256715a56a8335da4308c80fb5cd17c4bfd36a1d6fd4f902cbf27b50e9605b59997
SHA512ff3c384a8375e105e9e49c152dbe5c9394b251f4c8980ac4c3cfb70cf330a43a616a67be673984a052553e629e939f6114ac5f7bb2a3e6c3820d816928e064f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbd6eabb15c9b339aa6bc336e70354f
SHA1db12bcca7c2e5d807dbdf6538e657bff521363bd
SHA256cbdff208fe8b403e99af4f554b9ac9c090b518869a16dd188e6e59c22400e311
SHA5125c79bc81cef96d5c525e3ce363531e2e5af89e028f999f6ab1d756fb924c36a0400c46d6b86bc9d073d3284001f540597b99648299724516f6e9985e79ef1b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa38aa3796f09e7f67710768445f2fa
SHA154a82f241cdcf10f2e1dd5c7fc341ef9fbdeed07
SHA256af90273be1dbf3743045b8cacf3f16608921d8cec890898519247c91cd57a3ab
SHA51284908b0a1eec4ec651514fd46e15d8735c7404c7d789bd717f56b0e6cee0ffc9ed09f0f362afc5fe6f7fa7287821b1d38bdfea5611c97e922a50b59730b66615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561afb0f8ab0f00c4ce09bd1bd5151ee2
SHA1df0d4645d2bd050fd5fc764c54c5cb1c5159e927
SHA256ee09f8b34c15e285ea3abf84c07358f373357342d8975cd7c01506cf29ac9dab
SHA512d97678a14da14282f9f030c650e056c9ed1a54c909325c15c4f3d20f8f86106bf849fb06578d346053d29b566b0f2004e80447ee1b80a7cb25d67e90918a0097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd31887ba3d6110a0f70c15ee2ed19c
SHA1739389c921892cd29df79ee646bd81cfc2399bac
SHA2566123a85074f393832d5e6b7b444330546c85f56b07bc75834f8846467171f846
SHA512f393e2ad2c1373087f741292673e197eb5b6cc3ea0d0a2632f421ccd5f8ede69d83d16a2c450f083c2117090524f84bb68294b2b6df8cb34ea0a4dd948dbed4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53049a1578510409a5e5f3b32b3e01330
SHA178997a3660a6ed03037f6b29c31297dfefe6f0ee
SHA256e953fca1e5a63d802997f4923b8a541bcbf29a8052cab0e84a7b1c882510dee8
SHA5122c8eb8cad8209007cf04a8900d3ed5b36650fc07e4179dd3cc81ed48c8c71f558ad3af00fb67b812f4cf162f2745cbfc7fa06591eb2c332b8c6b54f27278ec83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a9e516f62d497bd670e58b6004209d
SHA12a0b75b521fd23deec22f3cef3136dffa66d03b5
SHA256aaff893966770b3a45425ebdb12ae6a93d0f6958c2c8eb9a10e0d94e0545acb5
SHA5123839916d9b16944cf81a76cf735a3dc9fb9f92a9ee1fcd2327c2d515d0555fef5f4d5fb4fea22830bcd896619566468d200fcdce013c40a25cc971a5bf201ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a676b7d0694d52b61ea12db4bcdd3380
SHA1ed95d8b13aa02588c6668832144f650a14d7f21c
SHA256119b5ca624954b7da7db923eee3d0ee32d2d018619180503b0e5a535dad2763c
SHA512d6745b80e18f7b7fec5618fa98730502d37f381e6ddea33a7dd08abd2dac3813af1ab8286ae4d1f535271a88ccb649778e474335d1a8d8da5f3c1d3910f254d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412ed1acdc390560786da0ef5cae1ebe
SHA1829450a1dad5ea9a8f6b0c89146d0e8331855efd
SHA256acc374ef70ece08c3e815f8cad15769d4a78dd586d6cccaa34a828961012cc99
SHA512ea82b9169c0e4d56e185309912d8c826beda694b09be11101fa24ce028cf53b589717cea679b55cb742b1c1d68336e4a423f624dfe91794123f7d61c9f7b0448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e4d9823e5ea295d5effd60e6672442
SHA1bdd1395afe70813fbd54abb9229e358b42f59240
SHA256761cb2dcb40e6d240e33d12beb205246efc24e2cbfb4e1149cc3c67ceb62d358
SHA51269af72c1a129d066bc4db92039c25c44ac94610d2b20d5c6d12b4af9f87acf2b010a6f16fc8e7745126257c681062483f4df0efc1f7dd3a77d38e9aaf7bc407d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54052620e4b506cc460dba5ccfb51d709
SHA124b7fb73788277a5ee98f2f6242c146f724c2a3b
SHA2566e3c764aac1807d042fe2e14fd92de46c83ba1d5259bfc3c5c8d32a47d778e94
SHA5123c9c15a26599a631e035dda1646ddbca2f2090764742008196a0e75035af460cc3b0006e9530f05fa8d4bf1047aee1088ffb8d835d214cdffddd8107b0964936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d53ecc3a588f86afd5e70a212209d9
SHA1e5fa19d6947d9a519d9c75e033bce353d548bbdf
SHA256ad5b2153a74802508dd69dfc2df3e4644d07e5108f5102c40a059b2a04412f27
SHA512e94f7afcf77984195720fb1111c98ab8afb24b5c4d3c45b70131cc08378ae33c90a7835f49f4472a7281f37d8669b842c90ee0d2e37609f4cccfc48d9a6ffe7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a951d434a4e865519a617248c328c3
SHA1faef35a28efa8b5bf7102c5d1b7c8106acc5eb71
SHA25619513d89f34b5e9d4948c71c3a2a06a8621e6475cafd5e5c42f8f5a2a233846b
SHA51230f986acbf2d3d69b30e43cb4a5c211f748efcb67c08c37beed8929a6441a07936eb13b9ac74e0bbc0523a885b7450d2abd9e124aea0b9f928231ee1d5897d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53302188be3c86766a6c795ce224831af
SHA122437bf5843467d1228ca9dc91f79491d0a7b0ce
SHA256688806eca0ebe7cf930b28c72a86181febe768c9084def52bf181fd7656881bf
SHA5122c92d941f81443285eedbeeacd60b951ffa309247935201fd2619eac693fc9d83de0a7b78f9ea5c8743a6ac70bc77a9758e6552fe23be86e4c47d83072c9fced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603efcc3a0d848a71411197d85565320
SHA11cbb388115eeee73fdf26c8a7b3ae2fcab7eb5f0
SHA256ea5071e1864ad9a476f40c92f451a5e08e2c07ee6e4cfc34c91b4e844d4db337
SHA512dfd194f0f4b426461af4f6e64ae45268f8292b4566848e7a847f67b5518df73fb1c1bb3987cca1e0caa2e113f1bba8c13c53f77f040230f62e6c9a80f5500499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28f77ad7eeed7651a764165d7035c8e
SHA1bbdd629a43c07a835a574990aead51044cd9b076
SHA25688e00e76ead03db70b2f6e6056a60b87f6913fb862183b4588ec0310721e5c99
SHA512eba01d453ad3f08b42163c9433c2119cc85195d644b55e33125021d4e6c1a7ae759f3ec5e83df6d9b98045052dfa35e85aa384dca1d2161a19b3b82baf35f1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45a59739a0ee5bde45ad544d51f4372
SHA12515205f8319e017f979d24248c34025d4a459fa
SHA2560ff1c609c93f61f2604ef6aa8925bc382d9dff0161e7d6fe75e7e4b674f3a509
SHA512dab5d6414f4aeab6d27c0726313f502692642171c2216614a0987ed33568f935d91385f290583f6934c26b66459ce785704f3cf616c255931bbebd3f12834ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4468a003606a32d6d93f9ae97fb556f
SHA198722771989587bda9e9d6e823ed9941e00e7899
SHA2561a3af15495876b1c93461131b072b844c8a8b086c1622f0dcc144e71855756dd
SHA51290453de62a16bbfa88bbf814bbaa73d7413be777bfa3b7f4487aa8f511cdd25da6042ad67bf1b4c6712256f8aa8faadda7bdaaa550114ced8289c9a2ac1def2f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b