Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
3a7bc6f933c21b9ed4ee822ee5dee009_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a7bc6f933c21b9ed4ee822ee5dee009_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a7bc6f933c21b9ed4ee822ee5dee009_JaffaCakes118.html
-
Size
11KB
-
MD5
3a7bc6f933c21b9ed4ee822ee5dee009
-
SHA1
a8ccf06fb53b7719c8a1b828d40860bd63028854
-
SHA256
4368cb8d4a06b717d8f0979f1bf6000ad6f69b73c599509ebd363438c410a620
-
SHA512
f9ecd3be4221ee0a282cc22d5ab956424c2dac8cb63bb87c88bb2a8d04417b255f9ca8e5186120781309f5ce67c609b8c7950cc7398b281c2e6f1404f84cf5b2
-
SSDEEP
192:2ValIsr0r57MCxhT8a/w1wvqa18LOXuBuLbdU8d:salIcIQCxv/gg8LOXguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d6b4cb008863cf7d0a92b6d91eb1e5cf98d930eaf1c3337dc7a0ab2e67a5bbef000000000e80000000020000200000007d6ae2b794ef184fb82c9b43cff330c0a228c7767d0c840173c34be5701b1a4b9000000010dbfd803bc343cee00bdf80b84e8da3b8245df72f7c35231b146891a90b9bfbb9bfc94e4d191eae16591591ab412085bc0d57130b8027161db25d023c9cfe86c915ad142b1414c66110c725113d1ee33186ed2373b7bfc8f1256caea1c0603bf6265d3c2f3550f83d02c82e3f12d2a75cc9f5a92fa53dd1f1089b1320bdf4fcadc2fefdee70dd9ecda5ac1a8db4e5c340000000feddc88c1edbea6c6103a46b12bcf6591d894973c2018b0c5e9b829727338013213efd5bbafb07ce7ddee46472e467463ab9cd7199bb62a2e51080a7ea44d88e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07951b9cad3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000751f0163a26dbb0aafddd55f4ff9299952549210090bc95f809576e3238f9eb8000000000e800000000200002000000032f5fd29c9f1423cf481ea421fd4a9e11915ae386a9773c83fa7d039833bf93b20000000c33fa07f85f497e75181b9dd1d6402f246e5c5efc1744a143237a79cd0169136400000003bdc3766ec0b34727083af940d704ae68cdb4e3cdd30fb7032db4cebb7fb46cca2382132fa5082e945e06ec81f36161bf3ab0c19935a23c522822510371c1fef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426888816" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B498EAC1-3FBD-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2360 2548 iexplore.exe 30 PID 2548 wrote to memory of 2360 2548 iexplore.exe 30 PID 2548 wrote to memory of 2360 2548 iexplore.exe 30 PID 2548 wrote to memory of 2360 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a7bc6f933c21b9ed4ee822ee5dee009_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d4dfc829841d1890f086339255c452
SHA12ecd2b8bf536e8973269d6ecae55f4ec22d5a880
SHA25675caf21ae0f98ff6c12940786cc9ef1a481c168a9140683e265aec8505c70b97
SHA512b826e0dd217c476642fb3fbdf3691abc097bd714b25c842859c309e809fcbf08cd192ae6db8644d7e0bba705e65a81d53b54eb62a9eaab5723a2fa838abfbc46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd15536ac27cc9a73db7a902b97d7967
SHA169e0956e1eded13872b290f4f3a40155ac9b7211
SHA25683423b43d40ef5a9bcb21364969d1d540b1139b8cecb7b586ee5d2ece615ddcc
SHA5120bc9219ad02a0c4b1ffe70678237316da99f1751200b5e30756feca5e07c9bd289dcdc3cb381e3833d14a789a442c71102fc0e2fb87a767bc079bf744dffc470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224046eea10cbbaa838e4e9ee9565764
SHA1960efdad8d749d3a6c2d605857a52e96f89ff565
SHA256b2bbfcd771cbe5020ff58abbc29c2855c8bc6ab35f58d860542b4085bcf931ac
SHA5124fc3ecf9fb809ad068613e54ddfe33309352c180c6271b13cf127f5f7c6b03ea941d7278a22401dfed989482972b1a8cecbc0c791f7729639e48b0fe2c1ac930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522522427a014d4c90b09d544fb6f96f9
SHA1b5251b4d8c00df0282a23f7edd4bf538be4c6234
SHA2569e106717f48ccb78057c2a4295bf1324424d6f8c947ed173f2059ec1b730ff1f
SHA512a606dfa5abc1c7ad5fce9aba56fc6a88e459e7c17ca8d737547c1e767ca848eeff4f8b338dc0f8bdeeceacd94898a7843cb22727c230f4bbf1cf6a0bb9830468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b474ff79111e0f2744d30fc70ac463
SHA1c2b2acd4bbbaa2c52d1ad38176b88a1f5da540a5
SHA256ecbb82fbeee183e35958da454b9a3653113a019768e504e6461c21047dff15d4
SHA5128396de96f77045112751149a8c12f0f11ae8d57c4e696ec706584feeaa7eb1fd266fd4e974353e643751882bc29fe84a6182e4c45e2589fccfa1f1ca0b93c6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718a0468f116b25455c1f7f36124274b
SHA1826bbc3e8eedba2819719182bcf61d7b3e8b5a61
SHA256d9e291dea3c7edbd9a785d07651f0d5c05e035910ff28dcb50b8e60370c38b27
SHA512a5961c9c82715a464b2693422d72fad41d87cbdfadf315d11847ae53bbebf27c3f26ea8bd750f103943e83da08e04702a3c668c5a5315824d8d92618decc8802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90d82a675fb1535182f0dc79a0d510a
SHA1d22be86631b8a11b3929be0c48ae12cade62fb6f
SHA2562ef7db1b7c329657653bdebf9446bcf45d4c64c8a45b45e2b1f8345e15e3cb06
SHA5126b2a24f2f662ab0846efe77b53a0cd645dd61a8a725bedeac2ec5ff000d2546ef6f3361a9fbc3b34fc9679b9557adba8a418cc6b0f8411cce3c79190c31891cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594dac16455ec855eec2eebbf855c6a9b
SHA11b69cad1a57bb6ec17f49d9a53694791aea3ecaa
SHA25694709a3fa4e42a6b027b45da9e61bb9667952dd515dcde2dfe1e0e63db1de477
SHA512387d5e065845b44f971c41b994a09db41baa3b6e31df7553909bd8e639e83ae5eb2e691ebf6922e8088fa50b9d0ef81a82770106bb65132c339513aee4db452d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643b9f6ec6e90bd3c6955097495834ed
SHA10cd54d60bdc194cd7aa5c6ebc3d051fc5cbacf2f
SHA2560e1b409a0e604ec6667fd6cc63d3ec8561c50c6bd414a39772015353d0266e61
SHA5123b18c701eca6e9c5c3bc0eeec43b1a9e07b03b527d283bfc61bac18001708b1168e4f5084a9cf35e26b8caa45b4b10e6051a729efb82864b7eeb012d7ebfdc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8771a42395435e17e39e42a6caa57e
SHA1ca80e5cb5c117c4e3ba6a84dc47c8b976f705068
SHA256fe5e7f582d83a06660ced91503a354be30c7901ee3be6e7033386c2b7b6a3c02
SHA512ed1a781757028abd55db3325e9427e41981087bb319e8391bf303eee385637bfe6db220405044b0fdac4473bc0d58b25c05848f50e263f3a8700505daafd1fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a4b08758b69e946519bacce6131b0e
SHA1cb5daaaf5e5d90d8870633ff2f2e9427bd80465a
SHA25605c867cd3a4318f5e2ed50cc2785e8a5d24135705eb52541ed49baa1f17fa2f0
SHA512fd0c9dbc1a8d4815900945783e6afe7df34b5ff7711e42200fc5c52cd26db270e9276be144ba8bdb199a7cfbcfdf6591ee68268283f5f7a02e0d803f888e1c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656d76bafbb1772b6004a524ab9722f0
SHA1812e94622e81462f40b133cba3d202ad029507c9
SHA256ed2aa06c03720740757885084d7d259e16c80b7af6f8045dfe25cc8d3602313f
SHA512a97b07e0a27b4c31a6b4658bfbb71053a065e79e7281461406b02588f09d34f91b9bbc9e6c177941f7fc9c9f793b15f1b99ac2a3f2a9d8e578ce9af8f7e7c27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f37237d09325959ddce482a2b2343c
SHA157be2bf0e574ac9fbfee41f5ca2b04ae8e0b2ead
SHA2563070f26fc1325659e43eb669330217331f19edc80647e462bdb686caec941dda
SHA512677db91ceb7d85870c052e65436224202e7f0ca73eb5bfa0fcd2267eff195cc13115359d4a167989d0bdcd55f235a18dc2bb89e03737f0d9ea9d0eb2491c0c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523767227adaf837c9b01c22f5355b738
SHA1af5dcc0c93d9b6ca34a8b0a9dbbcc3f045ed0368
SHA2565be2fc723e992d24deb6102a76844912a836a5e172d52ac757597cb5901943a7
SHA51270679a0f231f120762f3e6cafd692c698b11df531d031160b3bee09c165f96bb370de58a6ed81cb60a091bb097a6dc871bac96af7a2f91b0f5f74b1bcfeb2bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfff27fb6a9854f0664ec57d3bef1bb8
SHA15d5832c6da31ae4a172321aaffc3cd6c6413510b
SHA2560e88b74a5601774255176e3941e031420fbc51d0e5fc8bd0c797122e44aa62c3
SHA5125e7822688bc494f834caa11589217df084d4022721f315f8232cab86c6751d924fc8aaeced4f67cd3a54f523506b9f5a8cb384dfafe13eb059c9b18937c9c039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4598bd960f96e829086f388c75e920
SHA1a70347e3d1f0ea6ac457f4db95290adc0eed2fed
SHA256f3a11d09a8a25b27fad67fa10cbbabe957b69f9a3dc23356ffca48aee81c6d95
SHA512dff52eefb9ce07fb9ee5df1bbb0509a4c90a3f8e9dd9c2cb0dabf436fb1884814a519da03cb647b0ab737e1b5d3a5fd9bebf215777d3df423fc3773c60225622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc59361bc77efc8619d4f05d0e359cb
SHA1f0338ef97b92e088376a07bc6dd35c59bc8852b4
SHA2566fd654950aade1db429af7fa8c83227bcc2591f9955a3f30c8bca7b80542d39c
SHA512eff143becc408ee1005044632f59f41e7003bd1e3eb9803ab7b9c73221865c20f52b2433499d4b7bebce1a0f90ab82cacc7194fa14866f5914195f50d1c38e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877ffe61e8c578c51810289a184544b3
SHA1879a40e55e04a03040146f4ffc3efc1d1be264cb
SHA2564f5786f7a30e7496799b8274d15993ec1c4edb378bad0881ba73eb2b8b2300c7
SHA512f65f896cc95d927ed836b4906d95e8eb82ad80897808cc755b7e4c09b9350c3971d5473010c94a73d38cb7c744c34311cbc3d37f94d9e879d9289f00e2ed5f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba246ecfda919ebd7d064c7a99fb53e
SHA1b7d05d59f6f8af2489d81922565182df32612314
SHA2561987567fe0eccd61184dabcf7ba67208b301b1e6fd6e06e15cbd7d62b3ca6590
SHA51226a67312e3e9dd851ed5e8c238fa4089707c0414b8316a5e53d5a07f9d77eec9d6be12c16d271a71335dbf2e1d707beb7de1a0aefd35caaa8f34cb5d9eac2bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c5e0a19136689309d58c9bdf6e9d9d
SHA13e97157710a0ac1350290833d0b224edd5fe173c
SHA256872c6d810770a32fe5e5c1bd2a79cb3536028dc92336d0be81198cd632b7093a
SHA512e0bca5156bd671be027cf7b35a912cb03c0e30b279c9b86477108e29d53edd9829c5807448a729ab30af976a622c3fced6083382813dfd2e0032b01412f67d8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b