Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
36e6954c4324ba0aebbe0f1f8426b4f3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36e6954c4324ba0aebbe0f1f8426b4f3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36e6954c4324ba0aebbe0f1f8426b4f3_JaffaCakes118.html
-
Size
116KB
-
MD5
36e6954c4324ba0aebbe0f1f8426b4f3
-
SHA1
29682952cb5db306b27ec193a2c82d466a86232b
-
SHA256
3427a96eeb698345c7d5374fe565cb3a00a935ad0d099647891a826d4641e8a2
-
SHA512
5c63f751109c0eedcc6aba60d71da284e8429595ef03b341810a1e6bf9eabb1be0cad0f659db57a5b92738fec103cffbf84b1a5c8a199126d889ea3fe5feb2ce
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcvnMHAm5nLxTn18cZCVNdTp:srvVLT8b
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c009f88c24d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F6C95D1-3F17-11EF-A8D0-7AEB201C29E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426817484" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000c1482f2ec8afe9df61cb5a0eaf2195089e0ef4ca241dcd5352336d037b3b40ec000000000e80000000020000200000008d2d8c5fa70516cf40e2d2da4762a2b8b9e04d68067c52fc370e085aaf86fb6d9000000013e1ad23203e8ce3844bb51ef7e23c7f6814c0141c7fa3d115a15a667f476e88026d02c4ccd3c74e8881916edcbc0e102b999cc65d9d601d3d261785b31433e2507d4306dc0475681cdbf49253f71cddd986d53dfb7a2be5a714dea209a17a08a126e7243dbb6b2820f3773dce1f4f0ae7ea9f8bc66a03c7dadd168c8444f42123054cae123fafc79691e3d3708f0be440000000a879d74e0ede03c2414446592d6e7402dbbd5789788ff6d11e62992f96daf85e199726034daf72c87ba3131526f56af0c1951abe443fad8b0a687ee81eaf4148 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000007498a3278489881e7c3d0e7bb81afcb310f5ca5cc56e5a5951518d06eb1b6b05000000000e8000000002000020000000f8a93b405f724daea21b12bd708f1b2cb558d2ac5b3d599060f7d38f3de391032000000089108b6c81eba242de17e02fa49647c31e62e913dfec1e8cf665ac0d6556daab40000000dadec091efd991f196cff05b8741e711867cf61a494dbe58080c6a9d141601d0b4f968911037655864bcf21d253d1bb6b1f9abe7f40b4c8a9e5293eb96985aaa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2996 2692 iexplore.exe 31 PID 2692 wrote to memory of 2996 2692 iexplore.exe 31 PID 2692 wrote to memory of 2996 2692 iexplore.exe 31 PID 2692 wrote to memory of 2996 2692 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36e6954c4324ba0aebbe0f1f8426b4f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61eefae0fffa91901f8d1c3b22e4329
SHA1b9a16c472e41c3027f3ad03745e73acbdbd78120
SHA2561ca586f7876b45c2bdf1d8f0ebc026678ddd70d5877065ec50d3db57574fa320
SHA5123a7c46c9bbe8b20af750c07bfb1ec721ceb15284ce6579e0bc8f88dbcfdee732a60ee908edd0b23e6dd6a4eef1a8a4da111f9d7cf2b965adcf51596510da7e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff57d1afc9002eeb9f105b37109c1161
SHA124de1b403888bb3cb1a83ed23e23192e5b2e2069
SHA256c743d07fba158c1e721bfaf68a92e9e7cd072c30c8a11477b39ccc16db8cef70
SHA51292df12c1e6a8cd61ee085e8bbfcba1a28c9b7c64d4e925ea06700dcb58069103e2bb299fdcc4f9935257c7976fd61396f8d451a8b5e7373bd0195c184430efa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54920869f65088fae913f1f78a45fc8f9
SHA1f699ddc8f1b7d41be6da2daa1e78cc9aa36e5c97
SHA256619102aff8e2f3237eaf63cee44fd77ae108232511bd087a873e4cca499257ab
SHA51280d101078c2897f5f1191723fc26652da6255f85e6de6121539b0e4556dd623089f69dd425f1e1f673d3ee83c83ca5eded2f38c56cf5c4f7ec98607a61d83354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d5f9fbe7228a531c59c3f8d146209e
SHA1d76daca543fa66dde42535987fe7cfb30b1fb47f
SHA256069e0ea602da32cf2a716aac55dfb0b517c0b46c74974ff72ff9cb65410d249f
SHA51272587e46606970e8139a105c35b020832fa642cc73f4acd5da82caedb8e01c720f2406cc9a4b0b1e0b678af4df426619d77101fa98fd593a653dd1a61533808d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51752fb5caa43ec58d3278fa20b9ebe4d
SHA1ceeb0e3c48d622f10e3d54459fdd5901c1026777
SHA25643e6c789ed01fb12158152029e91ee46efa483412e8042d9b8ca77e3ad0bc3ef
SHA5126bc1dde1947d12259cbd286a9359334aea11305a71018aad957e3b773b84f9eb2a0336ec00df26e99be3997deb4bbb8e01e0c7047c1e72168ce09a684ed5067f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f550c64244b2b548de9f96658f88142
SHA1b027f44e4151726b18a23992cff050d6eb61406e
SHA2567c5ff31480cee7f48c504870b190606329f88b893e806ecd8efefe7952de7b67
SHA5121e6b9da442a491dbeffcd9f1aed8b90e191c9c94f02f4c17967145ee2064484a8577e108e587d73a870881189506ac606f92fcb1520a44d50ed0ce17c912a24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65c22da9c234a5b610705d4916631a7
SHA18ef9b84aed26da0a5661cdd3d4436dc23a81c2ed
SHA2563c8132572462900e75c0c4d6c77fe3338f59e14b9a43bc1f42ff893afbc325e5
SHA51219f2cf5fad9ba67f5d6f9886009db7eb0e9e5e73a8083faf2b0e93d52882e0d725c9e52a1b08a490dd10a083ea43309ea2ce09e6061a4e2c51239f8c87f0bb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f9351699db9806fb29a1f6c38c32f8
SHA19883cd59fec219902a7302c5cddc599050192774
SHA2562a164a73d9992774be594eba194cbbd1c21dc261cf8b7a3735cee44fb8be4c61
SHA5122138ffb14df9301fcd7c91611d4d6d8c7314a0994fc9720cb8283ed832bfe5f00e110a6e2421a2ffdd343ba6c40fc01aecec047ec7e2904894b6568c51506970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5e0a91f5b270b7b8a8996441b61545
SHA1074df314c5bddcbccb62a9317fbc4e923785214c
SHA25657466283ce12ff321fde972ea4b82b4cf8bbbb8084ee983ff2cdbc5c4bf9d4f9
SHA51288c91f83e0fe083e91db663906b73417d22ec9556b5cf5c2e6873af98fb357f160b9ffd428481b43e6da48573aef835eeceeb714fb424551758ea7827bf4fc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a95cf6630b46f5b5dc965d6f8b76e1
SHA1353357dc59ed316b6fbaa07501309ee065746fa2
SHA25620ef40880e6167a2cd8d42af1b443ccb2cdfab18ed9537f9f314cd516539aa4e
SHA512b272b384f437b02154ca55f56d4340350b24f7cceeb41f3a1b84f84d0160d4d3bdd815eb1b0067a73ad6f356bb75f00683596a62709e102600f4a1ac6e922a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a067b66e631dd9bcdc70e507cb58ad7
SHA118e4e0395376c92c8a759ad68c5ed0b74caeb9a2
SHA25652faf52dc2375bae5a7788efae91897b4fbec2df5d919e7d08ba81ff5e2baa4c
SHA512220cb438c99a82fd7ecdd753518003c88645e3dff77be6fad588bc6de05eddea7fa51c05e3c6a5831b1ba21f0256c9f17359e5f8d2d638996079615c3753b69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365fb290abcd540be3da414bafc948e6
SHA182c87e19af522dc1cf7daefaa436fd3ec87900cf
SHA2562c4c92f6fdb03d7895c4550ec9427f21a627d0cbc146f4b715b2140d11c3bfea
SHA5129b315e7d33ab6222a3d37a59999c209dd1d92d7841af84960e9f2cd67d16b8de6ee36b917451b5f1bb5f146da69c074e5b3b8ba9448d42def4a65e01598f1323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119524e455ce6c2f790e6b267d040684
SHA1ef03574a189bcc896ab950a9c047634a439a423e
SHA2565d7c99a8afdda8e0b7e86c939d0373f67902679c65dd785e8cd0c67711b2026e
SHA5123f49ab63a48892aa454800517b8fed6eca05213c21411c4728d5d7d1746d1f53f4974796f5590ef08ffdd12fd53898fbcb7223a90800121e73327d7cc8e4a160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b40f2db96e3fd103dd9d57c0c6969ab
SHA1caaccd2807cc3c639bf70413865592ba1deca018
SHA25620ad69a95f5d310428864ce89ac202b34fbb7ec0c483112c491536027e08f052
SHA5124cea6add80a2c107978b6c261bc50e4a49c6c1203039f645bfa741100a9e31271940fea943b21d4fd1ae2203b7fba43dae774f25894c6dbc10577a8abd48e066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53680a40010f5829530e390daf08b2ef9
SHA1274710cf3203d49fed598a4b2e6b08ba4ebbf505
SHA2566fac149dfc36b868eb7b7e65e85464a41e241fbd11b4883d45efa203d635d8bb
SHA5123244ef2d3f4fba3f31422ceced0fd5e942955a34f2bf008e0ab383ad1bb8827fee151382569d36cae987455e4246ab1b59598e482ce280e8639b5b0c1eb7325c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac3cb330c11e2940b14437a8640b735
SHA1556bd1491978a86477fa24ed0d71628317bbb0ac
SHA256d855045d085f0234e2d3eca109dd3f4aa4513acef9c6f7ff637193ff17c5a9b9
SHA512426e1704738de9dc361d9b17df827c5fea9a9e21f5bff1888f5cb349bfadbd8cd4b351b5e41ef340c9323eda3f0cbc856364837c8f0cc96384695d50b998e1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602d0393c23724da4568f0ef44833e0f
SHA171e700d4f2b3a3edc2b0459c196744f0f96d94d2
SHA256ca1ba76a2b0e57156b6c78a47602512fe11eb79387e30dfde4a728746ca61e29
SHA512f951f9d5b9ef8361fff968ea33a2bd0d0d9438fc295e06ac3d6830468312c1b1c68b4ecbe1eba92b168ffa81d1c52bb9c27b81ad440f51abb2a31b928b1bef01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5435ddac5cb6ddf8a0bbd76e3184c6
SHA192aea253bbe747204cd1d8911e7d6df0d602af30
SHA25679ddd5faf5245e142a4b68635c510850fe08b8bf9a059e18c6043d342933f6f2
SHA51200a3bb0bb172795911d6084f8b9c0c8f8d76ddad5359adb257a8507e2dc4504adbc535fb7da2cef14550ce25bda1521e3a8c7bee24fe4ac066c4ea860191b5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072cb31553ac7eea6bc9c615dd362e1c
SHA1f04ecdc4cecf4f995c7b2e218a1211bedd23e894
SHA2561e6b4c329190cba85c7ea19d4f7bc1ab07dc287f0c1816c51004b9df6b395b8f
SHA5124b14d7b0d0fbe387c9ca7ff499fca86abe393cab8f65f6973ff1c26b7d0314ff31713d3853722631e9a9de58f6b870dad8c26b12bac1a9fc26e783fd482e8da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cbd99cbca577e710c8078139bb1d851
SHA1a8a167550a69641947da76f2e9d7606de0a85466
SHA256f2f571fddef8308ad6442d91dea3893d4a29eea637356fa6a7e811757781ac4e
SHA512348cb2304582269b2bd792bffa4df3d46eaef7313edcda50ad70f54fb139436cf20d87726a83ef81bd246b08898906235ffff9b8c139da11acea6df7f442bb40
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b