Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
323fd3ba16f38724f68c4c2a7da3f347_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
323fd3ba16f38724f68c4c2a7da3f347_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
323fd3ba16f38724f68c4c2a7da3f347_JaffaCakes118.html
-
Size
53KB
-
MD5
323fd3ba16f38724f68c4c2a7da3f347
-
SHA1
90360f1a4a6d6931ebcd5993ec3477265c43cea8
-
SHA256
d79357cb8c1714c530d03a447784eff5497d35937ac3e700d55aa0610082e6cb
-
SHA512
46ed2e5c92e0ac19f68e1524163c7230e9f8a7f45334dc7a3cc2b3edff23872108546caa083e0317557b70af9fea81e048d67f37b856d306db8967aa7e6d8a1a
-
SSDEEP
1536:CkgUiIakTqGivi+PyU0runlYX63Nj+q5VyvR0w2AzTICbbqoQ/t9M/dNwIUEDmDt:CkgUiIakTqGivi+PyU0runlYX63Nj+qp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8094923655d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001622ab3bc3f14d87953d2043b6fea77f06b6ae4853f4edc8d39493eb57f2d7c1000000000e800000000200002000000008691e22324125524b458f3ab7c33a158c88f163bce06a7298270ef3129b774c900000002e8fe82bcb10c2b900291a79e811006980153a1404cca6a9e21453993dba0e131e2a10aacf46fcbb88ae587f23421dfbe029644a46d9656fa01460395fcd7acbf97835d0644f164a7967e79275a30fa7cc3843279b4dc57963e9a782c70ee63099ce0b2bb4ae22af10ccfa15b39af069f0dc76ef488156a4d693764fa59c37d82268d30e02aa8e947baf06f41a65f77940000000f76aafeecbd3d844950546bef4b29b037f6021ef92f1b8e5306f57e2b4838695037691d9f89a6ba6df1f09c387aab285a7a4165af5cbc25eaa9f87c53c63fe07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426728474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{609BEE71-3E48-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c7a9bcca8ea10f70a8bf090aa18cc3022a0a6ec29f75e8709889ff670aeafa98000000000e8000000002000020000000bfc20f8476cc8065c3043ab892cf56ddee59638f4b9b3a50bf0470f4357e1b8920000000338619019f52d43e6f11a09099ca1225312e5e88a361279bf84ea37b4fb592c240000000ac9728b5fe1a40e4d45ab1a93739dd426d44ea8acd2a4f4e535f409443833f4aaf8b8ea141d895c73373380c61de441d910336cbe5c72830ab116023865186c4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1620 2544 iexplore.exe 30 PID 2544 wrote to memory of 1620 2544 iexplore.exe 30 PID 2544 wrote to memory of 1620 2544 iexplore.exe 30 PID 2544 wrote to memory of 1620 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\323fd3ba16f38724f68c4c2a7da3f347_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add85dba98fdc4f8fe0af3a0333a075b
SHA1bcd57b2a43ffa3b43e91593c857cb5310a8afbcd
SHA256d06672e2d78814c4b5a292cbd85ad7f755201253c1c7bae2828ba99415dd5132
SHA512622a287905eaac75dc4e84b83a5c05454cee92192a91b29077b101288a039fa7bf127f0b4c41e1e83b7079863b448f53dc809399f1259690cf54c04e66f2e018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9dad7f61b870df21de0038bac589cc
SHA180b196cdf019454a79ecd67fef290dc41d369d02
SHA256610101a469795b2225566061effa01a4f4a80172d4cec0b28e7eba0acedbb892
SHA51235a533dfb45faa8c1b6c89696b08d777801f8a7a14ea400970190dcd3982362aa066e3c818fd9f6d2b647ce4ba64457d625b181a77a93c504dbfa848ead89251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821b920e9340d00ef2f1ebb933b21adc
SHA10b4f2fe66463a36ea3d832b33450aaea94f03010
SHA25639027288e32ee5394a4e22361dfbec3dcd6590571fb85c3cdbca13a6f206ac72
SHA512ea2809fa3390d6d3d4ff2579d02a2cccd1406b08b62499a7485d9a4eb53b16834c38e8fc1bbc91d1b6fb30ee784fd104a8e8a6f49649c958e54f089b29bf9d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd83cde1aa94e2bfa4a6b41ba15ea31
SHA1953b3736e1ac0095190938e26ba2d76a1d18bfa5
SHA256240dfcccbc0215486cb04ac07f8cc69edbf492d0d0f3e67b32f547e408b417bb
SHA51209fcdee4018bf7344f503b1a34edfb296b9af2e162fce1395d6053a002b1ed5869a0aa1b321fd5d314f42c5cb6a95e09278017a3d4abcb6edddd0c1546a0a30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97dd7d7a87a3a07259290bebfd0e49c
SHA13734d0be4c2fe1da39eb6525b4051c4c9d68adfd
SHA2560d27cd82b19eccb83ad38e1c0ec0587b91a90853299b8fc1ecbc23f2640fa1e7
SHA512635de79da26273ec450c39bb9f1f3f1377e67599d3565c57521bcec46a8d43da3b8df0c7a166b78ce20fd34713894cf29922c9df5a514f0aa70edc9af0103f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f47f503f70c65b71029ab9fe1885fd3
SHA142a966c6cbd54851b9a69cc83d2221287a1a9af5
SHA2562570643343d98bb8893e0b420fe41439a0b70c173d2d87995572daf852cd9896
SHA51280f1ac0dbf5ca06ffc76e6b47e28dab463d6b0208ee25f1bf7c7c76c2550004beb657046c3bed49f0626ff219c641fe2ef5d435b7e4b7a404fd5ad9699f6b7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553859d9a0b6dcb32cc3a164caf9cbcb8
SHA1487740c6aca9e6a838996f1c8e1ee45596b5cbf7
SHA256fd2c22356caa0407b234b66f2f03c503734358f76e385adaef484f2313bc830b
SHA512b89466a042fc43344bafe45edcc32d3f632cf367c18a8a0624e36253cd3f2b5e2962321a842a586dee0983d4bfe9a3035e1f5036d751dd53191439e2e198900d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5da88b449419b1953a797384fedb3e
SHA1723d8e28f238f248e11b52718e4fce370e32b557
SHA256e0821abca7710e2e9be42909cb02c9b7826cf97c2f53fa89cc25a653ac02a349
SHA51294a6f9dbad2121261562e22681de50a52ea4b2e4c63ddf9de5fa699d8c522f0f5f98fdccd1012ffc36d7fb32ff030c8427b885d511c7a7109f8ab08395f6ee4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c64cb3109bb331a47bcb237860f22a3
SHA1ef2d37f7d20d5289247c8744bd0c79e998c1448c
SHA2569681d0b696d6373adcce502cfc9c2a687596617eeaf25bd3d33138455e65398e
SHA512707b9e8009c8a46465f275078187e33bafdb3b9714c684964bc30a10d1f739b99a07b8209e739332f62738a0bee3a3061cd2823f4660aebe9dc30a70fd5ac74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c96b4707b7d54c0b13ed852ebce163
SHA18ff444b578e99a2142f614e2f8f3573e0a525005
SHA256e8f17280252e581f04667ba7b659ee1f9fe5d22955511e7690a4edcbc51345f7
SHA512a4c22e82fddecca30ffe05d8915e3eb5b78434617326c3732cdddbc0bca68101f62121b2143322853273e44cf1e299e1ad1a8c67309d55339e502e19247cd334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2fba85c09e9c721927d1dbb08a6266
SHA1c7c94d94d85613042a962ff96ebf18b3ee2e50a4
SHA2561efc2ed8a9f68bff13273b2fa98a045503ae6ce086ab0bfcdc7617959842266e
SHA5129137c0b4ae32fc28c349a7b9dfb45a4b932ea5cf1c3d259a928a9838cbbd1c66f58d0e74ad0784411156ec9cab3236774584e4991348d758c33f3166600eef15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5c3e4227fb413b989c2abfdc301a71
SHA1f40d959d8f5d8155cb014c3a1c578dbb920c91d0
SHA25659e77063bd6466e2cfa0fa439bc0cc9f062beda3c1693e20146829775f5d2442
SHA51267f68065b3509b6173d53f044ee5bb547cc8222582c53a7fd02d541756254c029fb576ec7a12deb685b808b5db8c726cbefc1c09e6ba28f0073e4086e946ac22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f966732737ff19fae3b9cdcac03106f
SHA1546db001183a8d2a876d3b7107f1394b047a2022
SHA256d87038b626b128e058990187fa80ba03e2ba99dc93f785fe5eb1fd460bb18a04
SHA512d5e267f3c9719042d076e999956dbec6cae3d16cec572baf452a983d7e2abe8f90b156f5061d6c8c4b2306f26110d416e4fd4d32b2c543c34c3bed9830df9fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8bd53fa71c35f7bc3f6b41c4b42ed12
SHA11092c76ff7171373e5075f511724312e8f413a0c
SHA25666b2367133bbb869107c4ad717d43130cd76660dfaab3d0005dffcb9970ef848
SHA5128bec5636c756d15db0809f7cb7c8f2c4ab207ca8c93fec30f9039af436e998c6bba6a0cfa356dcadda6c976c27cba29c374c3bc9bb2bb015378e000bf7703acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce409bcba6b4bf81e30c3020bafa685
SHA1816d8145a2b30de01faffcbe5ec5258e023ad4cc
SHA2569dc6f2c1beb9986c9d7b77208d72566e72069abd80843ff58965ade1153efea4
SHA512ef8eff239454f8bbbfda81bcc77b1ca7699d1f5e00ddda4a49ca6a52524a5abcc5dec0a4b1ae1b37f054c1c2f746b095bfade307c74ceb1100e500fa85aa616b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e11829193e8206f5ee8ea3b9db5a2a9
SHA10f95ee08bd80276b21da908517be1d89c77692e1
SHA25692d758f96d0bc1272e09d5dfd2e69a352fa1bd26d0ccdd410f29cacbdbe95868
SHA5128124d4b9e58d646eab2f76dc8ef71c60a113c9a8b73a689920a46f9fe2efd0ada4fab8ec04aefc7dbbc826ade794814fb1a23d27266cf5cf614dd924c952c4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b9c2e66610812ff0be5ceb1398cfde
SHA1921d1dae8b10ae511d0f766f287fb4159a063771
SHA2567dcf9f660a78a863ae5d1ecc5f617dfc3587cde0103598e75eec4fd8d914e21b
SHA512cce735fea59c37aea04ed1a5dd5cfa09943a74e888a6cd80010cafccba31b2660ef52d3f8cbaabd4d43c61a441388e23e19091e70198de392da1bf862890dbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56065b8b4616c8dd347e5701292c7cedc
SHA1547308ee07bc110ac0b5f89e8b27c079b15a807e
SHA256f2d3a8b88ea7fefe0e439be575cf0db0d26c975dc993e3dcd11189ffd862d172
SHA5127ea80b859ef5a0f7fb18338f5365fe55190232f5c3815cf8586b8023423a0ebdddf789a8f72c89446fd7295ae595d392aa19a6bbf5ad68aa9754a89247940be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f593fd4643c962dfaed56eb372555092
SHA1fd3026eee08880703014c1e2ddc4dfa7bf4e2cbb
SHA25636b58d266e563191297ef79a5b99c4357ccdf1ac1d2ec3694650f029d10f6fc9
SHA51208ea2c4f713dce08b2e88716fbe52273665892083389ada49a8f43d70423b340ba42d06abde60b001153afb291f419b5aac43ed6f27cc1289c8996f4e1c66bdf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b