Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe
-
Size
155KB
-
MD5
25166793a050399faa770df0f06ca4fd
-
SHA1
d58b408f70f156d9aec0800cd6fc31de6180c1ad
-
SHA256
f36912a977c8061078b8717e88bb8a0bfedd3e3f8a94269b9856d8f70e354680
-
SHA512
09a24f7a28ff70436a6ab931cf828a9685ac39d214838d209a556e822762b98ec59fb7d7951d98dfae73cc7ddccac438a2ec9af47ee50e8299fb766031770480
-
SSDEEP
3072:CfLbXE3nGlwwfteu+yHhSbEkRBhZ0xZroqFfpZKF2Bq+0Inv/WQeqZER5:CfLg3GOOX+jSz0AX4+0InXzZa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 91120111148.exe -
Loads dropped DLL 2 IoCs
pid Process 2764 cmd.exe 2764 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\File = "C:\\Users\\Admin\\AppData\\Local\\Temp\\91120111148.exe" 91120111148.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C} 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C} 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} 91120111148.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} 91120111148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C} 91120111148.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C} 91120111148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe -
Launches sc.exe 22 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1452 SC.exe 3036 SC.exe 2608 SC.exe 3020 SC.exe 1664 SC.exe 620 SC.exe 608 SC.exe 2944 SC.exe 2628 SC.exe 1856 SC.exe 492 SC.exe 292 SC.exe 2216 SC.exe 1568 SC.exe 2320 SC.exe 2384 SC.exe 2796 SC.exe 2200 SC.exe 3040 SC.exe 1984 SC.exe 1496 SC.exe 1444 SC.exe -
Modifies registry class 12 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\InprocServer32 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\InprocServer32 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} 91120111148.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} 91120111148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\InprocServer32 91120111148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 91120111148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 91120111148.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\InprocServer32 91120111148.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2320 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2320 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2320 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2320 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2384 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2384 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2384 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 29 PID 1368 wrote to memory of 2384 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 29 PID 1368 wrote to memory of 3036 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 30 PID 1368 wrote to memory of 3036 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 30 PID 1368 wrote to memory of 3036 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 30 PID 1368 wrote to memory of 3036 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2944 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2944 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2944 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2944 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2796 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2796 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2796 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2796 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 32 PID 1368 wrote to memory of 2200 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 33 PID 1368 wrote to memory of 2200 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 33 PID 1368 wrote to memory of 2200 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 33 PID 1368 wrote to memory of 2200 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 33 PID 1368 wrote to memory of 3040 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 34 PID 1368 wrote to memory of 3040 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 34 PID 1368 wrote to memory of 3040 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 34 PID 1368 wrote to memory of 3040 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 34 PID 1368 wrote to memory of 1984 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 35 PID 1368 wrote to memory of 1984 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 35 PID 1368 wrote to memory of 1984 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 35 PID 1368 wrote to memory of 1984 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 35 PID 1368 wrote to memory of 2608 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 36 PID 1368 wrote to memory of 2608 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 36 PID 1368 wrote to memory of 2608 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 36 PID 1368 wrote to memory of 2608 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 36 PID 1368 wrote to memory of 3020 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 37 PID 1368 wrote to memory of 3020 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 37 PID 1368 wrote to memory of 3020 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 37 PID 1368 wrote to memory of 3020 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 37 PID 1368 wrote to memory of 2628 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 38 PID 1368 wrote to memory of 2628 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 38 PID 1368 wrote to memory of 2628 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 38 PID 1368 wrote to memory of 2628 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 38 PID 1368 wrote to memory of 2764 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 39 PID 1368 wrote to memory of 2764 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 39 PID 1368 wrote to memory of 2764 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 39 PID 1368 wrote to memory of 2764 1368 25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe 39 PID 2764 wrote to memory of 2152 2764 cmd.exe 52 PID 2764 wrote to memory of 2152 2764 cmd.exe 52 PID 2764 wrote to memory of 2152 2764 cmd.exe 52 PID 2764 wrote to memory of 2152 2764 cmd.exe 52 PID 2152 wrote to memory of 2216 2152 91120111148.exe 53 PID 2152 wrote to memory of 2216 2152 91120111148.exe 53 PID 2152 wrote to memory of 2216 2152 91120111148.exe 53 PID 2152 wrote to memory of 2216 2152 91120111148.exe 53 PID 2152 wrote to memory of 492 2152 91120111148.exe 54 PID 2152 wrote to memory of 492 2152 91120111148.exe 54 PID 2152 wrote to memory of 492 2152 91120111148.exe 54 PID 2152 wrote to memory of 492 2152 91120111148.exe 54 PID 2152 wrote to memory of 1664 2152 91120111148.exe 56 PID 2152 wrote to memory of 1664 2152 91120111148.exe 56 PID 2152 wrote to memory of 1664 2152 91120111148.exe 56 PID 2152 wrote to memory of 1664 2152 91120111148.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25166793a050399faa770df0f06ca4fd_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\SC.exeSC stop AVGIDSAgent2⤵
- Launches sc.exe
PID:2320
-
-
C:\Windows\SysWOW64\SC.exeSC stop AVGIDSAgent2⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\SysWOW64\SC.exeSC stop avg9wd2⤵
- Launches sc.exe
PID:3036
-
-
C:\Windows\SysWOW64\SC.exeSC stop AVGWD2⤵
- Launches sc.exe
PID:2944
-
-
C:\Windows\SysWOW64\SC.exeSC stop AVGIDSAgent2⤵
- Launches sc.exe
PID:2796
-
-
C:\Windows\SysWOW64\SC.exeSC DELETE AVGIDSAgent2⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\SysWOW64\SC.exeSC DELETE avg9wd2⤵
- Launches sc.exe
PID:3040
-
-
C:\Windows\SysWOW64\SC.exeSC DELETE AVGWD2⤵
- Launches sc.exe
PID:1984
-
-
C:\Windows\SysWOW64\SC.exeSC STOP "avast! Web Scanner"2⤵
- Launches sc.exe
PID:2608
-
-
C:\Windows\SysWOW64\SC.exeSC STOP "avast! Mail Scanner"2⤵
- Launches sc.exe
PID:3020
-
-
C:\Windows\SysWOW64\SC.exeSC STOP "aswUpdSv2⤵
- Launches sc.exe
PID:2628
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\25166793a050399faa770df0f06ca4fd_JaffaCakes118.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\91120111148.exeC:\Users\Admin\AppData\Local\Temp\91120111148.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\SC.exeSC stop AVGIDSAgent4⤵
- Launches sc.exe
PID:2216
-
-
C:\Windows\SysWOW64\SC.exeSC stop AVGIDSAgent4⤵
- Launches sc.exe
PID:492
-
-
C:\Windows\SysWOW64\SC.exeSC stop avg9wd4⤵
- Launches sc.exe
PID:1664
-
-
C:\Windows\SysWOW64\SC.exeSC stop AVGWD4⤵
- Launches sc.exe
PID:292
-
-
C:\Windows\SysWOW64\SC.exeSC stop AVGIDSAgent4⤵
- Launches sc.exe
PID:1444
-
-
C:\Windows\SysWOW64\SC.exeSC DELETE AVGIDSAgent4⤵
- Launches sc.exe
PID:1452
-
-
C:\Windows\SysWOW64\SC.exeSC DELETE avg9wd4⤵
- Launches sc.exe
PID:608
-
-
C:\Windows\SysWOW64\SC.exeSC DELETE AVGWD4⤵
- Launches sc.exe
PID:620
-
-
C:\Windows\SysWOW64\SC.exeSC STOP "avast! Web Scanner"4⤵
- Launches sc.exe
PID:1856
-
-
C:\Windows\SysWOW64\SC.exeSC STOP "avast! Mail Scanner"4⤵
- Launches sc.exe
PID:1568
-
-
C:\Windows\SysWOW64\SC.exeSC STOP "aswUpdSv4⤵
- Launches sc.exe
PID:1496
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347B
MD51dd6fcb348236f9d0ab41d76ca101cde
SHA1ff6ddfe1bfb44bab5fedc746760500009afc4f99
SHA2567479998e9be9d024a3ccdb31b8a8376bfa22d0816716a6938b92658c2e498c09
SHA5125bf915f125fbd47570c28b1a441237295d3e599e0d7e3b20ff009bb3f2e67a9d3ee5459ef8e7cd5afe873e17d05a8a21ac7788ebaae3b80c9b7c7bc9f486436f
-
Filesize
155KB
MD525166793a050399faa770df0f06ca4fd
SHA1d58b408f70f156d9aec0800cd6fc31de6180c1ad
SHA256f36912a977c8061078b8717e88bb8a0bfedd3e3f8a94269b9856d8f70e354680
SHA51209a24f7a28ff70436a6ab931cf828a9685ac39d214838d209a556e822762b98ec59fb7d7951d98dfae73cc7ddccac438a2ec9af47ee50e8299fb766031770480