Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
3f07fbfdf41fe3f998a52da8575f1c39_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f07fbfdf41fe3f998a52da8575f1c39_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3f07fbfdf41fe3f998a52da8575f1c39_JaffaCakes118.html
-
Size
53KB
-
MD5
3f07fbfdf41fe3f998a52da8575f1c39
-
SHA1
c80e357b18a86253e43463806c852239ad36e013
-
SHA256
59d90aac4989e0df781239961f888dca3673a9787cb227b85dda0a246461fbf5
-
SHA512
fe756365bc1832c3fb78ce04b7b1cfeda11f2eb3249ec4b4095260d4863fabc44efbe7606f0679b691f295a58907cfbc1600d7b102b480d80fc1eb8f1e80e449
-
SSDEEP
1536:CkgUiIakTqGivi+PyUhrunlYr63Nj+q5VyvR0w2AzTICbbXo4/t9M/dNwIUTDmDr:CkgUiIakTqGivi+PyUhrunlYr63Nj+qR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426983318" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000aab9015353388fd1cd0a274c5ba4b2fd33aedf16b0093a7812ee4250a7c51969000000000e800000000200002000000014ba2b29551dae66e19d904889dcbb428ffd9e0dc83db4464a61d2dfd8ea810b900000009846f456e0d57b107e738e8738d2d142df7e0521e02f3ea1141ad7755cbbceef5b140c066649eca4d1e753e6eb34216477226bd5e191f66964e3b788cec101e41314e95ccb7f55066eb5cce65966ed3fbf7db90a7b633baffdb12ba821bf2dd72e1fcba61c237147163a7c8e259e26c27d4c78a24ffe3c5b8bc5d24b29b4566e142b4ec947bf55f3033aa3aea0c5e1d7400000008fe14332a68e4e0dfcc177981335a4317568bb2b3aa21911cb5e245a6e804ac9e32b1b54dfc427e0bc697098d4d1fd98a61967d044564d559c4f57b3d5899dd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e0aa93a6d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCC1CC31-4099-11EF-8B31-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000039cb37a2e95da5ce1058834d80a0f3f2fa40f03144ee76f4d9c8eba3eeec0582000000000e80000000020000200000007447d480fca135369ea6b64f0eb241ed493ec004ea32a37e03814230a6d4ccc32000000047f3e86ea4a3d41be25ec6230689dd15a64801593a96c91d9c7926cd87385dbd4000000019eefbaaab1399100c41614a533261ddc4e887fb1a083ae6772ab24b281042d001e6ba83bbbb396b12348ff5359e3d2bfa476065d635b5154cc8e420a248d274 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2948 2156 iexplore.exe 30 PID 2156 wrote to memory of 2948 2156 iexplore.exe 30 PID 2156 wrote to memory of 2948 2156 iexplore.exe 30 PID 2156 wrote to memory of 2948 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f07fbfdf41fe3f998a52da8575f1c39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91e15f2dd53b55e4be8490250aba7dc
SHA10e413991a802252fd052f8294612d87de6892b95
SHA256e39271a37851069d80b0ccff31c1843dcb453681bedbf189919f2e32b5bef2a4
SHA51229b97a7120b5e9eba82cdf8fbd8ec6944ff1fc89cb2a196d3898dd25671f0097f44d58f96b0cbf0687828fdf46f0089c61ba3e4f86ca3d84e67f1eb5a8d3c1e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df78d51ad2e2a57a63fb37a8624bda70
SHA12537f1a4caa5b5b4405ec5c36711fb0da41be24b
SHA256147f7c35cac9e874476b5aa391f4fb51e74cd27f497f1573dc021542efda0f14
SHA51251c413fe0329804721c96bcc971b1c8a7f4ba6a2e5b6ad7cdc706271116bc272a702be60f6b9c8c33a877a5e96449dffc3a19bef33c3a1171b51acd0ac0f1697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801cbd3627768b341fa45ce081f67784
SHA160cf195cd096582d34c8e6c017a44b07ee55727d
SHA2567fad5e39f0c06cba8a94c90abc6d3e4516c698ea38d82c730c75b9c74406a47e
SHA5128b57a872c265480f26867933c544550c4d2a41b5181780e9e51eb1316ee396daa705321868874ddad3736a4c7f1fec783543b7311a65090bc3c3d8dbb26e8c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d971470352a1e5d23b8fe4bc9bc62d5
SHA1ce17ae45e34cc03acb8c75ff4658b7bc4a7bb1ad
SHA256802fba6ad6a5af92a914f011e1d560e82fc32d4a6ac9029babc81dbe539070a4
SHA512875d94f4ebee9a35a5b404d9803e44a016f9cdd34262ec2169298bb9d741978a9b5ff1dbb0bf6f5150ee8aba10b9b8ba34dbda8f4b321f6798e0cc1bd0191a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae924989243ade2aef50ad0ac9dc605
SHA1493634e4d83acc09010578c036d07df818d11065
SHA2567811e1f92cffdf340a9f012e333c8867ec7953f178643094225f19bd73330fc1
SHA51247ba036c4b247082f4e19205ddab88704346c7287cba446a6a6230cc085576ac3d57e1576f3aa60cdf5eb34015ab48cbaf26cdd17b7cb5a869771ca79245c8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b42f6388023e3d9c4f5686912a9325
SHA1c7a3f1ff4bb9b2532ca69bce7e1855021b33092c
SHA2565d04a2da12a070647b6c98910d68f93a196d3b3454ba38c2cd76eb07d90b1b53
SHA512f404e336c30adbaa0d944a88b527899de87351c0ec3eee336d950fcca8947125363d7d4067c30dec676bea7f598876c1e569654165b23423a2d4c1962b0483fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f8f5913ac320a79f2abec53bb9bc81
SHA13f55d69982a62cdc3318eb114bd292a21c1c39eb
SHA256f69bc7a40614fda4395c1f1bfffe0082be2d86fb7b8d70fa2b44438dcf49c25a
SHA51228ca31d5c054393d91547563f9d2acf8d8d6bc17c08020e39424fdec45aebd69dda19358223cdf70182d73af0601e30949c58e07a09f464da39240b5f7b20190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d53291487f07916441a10f409f9f06
SHA19741342ed758c9187cc95ce06e4d8f82f33ddc82
SHA25683764fbd6e5f3ab2971cdab442bc64b6de70e8b95d0fd83ccc52154c7da5561d
SHA512337e9f9996c39f513a32b051b9f2efc422457b49f821e4849869a7305bf9095f0a2229629c0bab7fb4de8f4740604dd00805eaa8e1f15d065da754e5ae0526bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a1aada3ac65bfbdf1e0a533e34e5bb
SHA1121b3321c64ae1cbe9713cdeb1835fa85ba9540d
SHA25676d32ddeda4b25aa6e6fa6eeee1b6ab94c12fc37ad3cbcfce8e0806993a84343
SHA512943dbd8f8ffdb313d0b8b694e356a19cd6c61744ba96dcc02afcc756b7bf98903f0de63c07bd66f03a0b861166289664f1975f79f4413ffd174407dd4c9e3e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539deb5587059e911a1e7dda589782a70
SHA1c3b1e1df168f670af7aa44d6dec96e93e6740a57
SHA2565c4a99b0569a28bd498ee0b093214c4b1208a2ebfd58733ed1380315ccffa52a
SHA5121c6803728a67b0ec503f8d5414548f9d8c16750153acde374ad75e382897f9f3ff793354343bed3c5d89b41927418ad2e0b5698093c91b795c19d27c2668959d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad56c94a45f8afff64620d778323b531
SHA1f8abb53063934d2ad56d577f10ac9a4fd711b713
SHA2560d0443a38f0a32a1a9d8d3f765aa81f00565b471ca228df8171226a6d787d735
SHA5120a83692baa78bf87397d6851a1927eca4ddd84fcbd2e0e1923e0c7e65137f450ecf3be3e91f177b4fc3b1706465a830163954270362109fcb9dce49931256594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f61ff7722d1d6776e9f8c3f6ece71c
SHA150a68e41fbb962d6f80d4246bb7cdcef19cb8e5d
SHA256fbe1c4f54dd1195c091425ba4e9c53ed44c2fab596cc568a06c7d5cbd7fd9fe3
SHA512cfd93739516afe068a027ab706e8178914006c7464f47300fd5bb264b60af4dfd14b899816877ee8973addb9adface9bb74ba040991dbc204d491f7a94836e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a546ad713cedf43d00590b9f81e74a03
SHA16c0d85baa31ee2763b3c37b245e84dd28ac658a5
SHA256e422eb1c82f7cd0c60c6900ce5ef8a101d0beb52b3aae005f30f530793c01c18
SHA512047a887721f76cea33c5069c786a2d5636b1267bcba2bec6989ec52424bfc41dcbd77c5c7aa42f950a6370ecfa165e111273ec50b3d5fcf3848e989e8fe8ba10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46b4f00da62f092f4c4ec32b0f0ccb7
SHA19b73a38b9b5480b91971c1817e2d6003fb2bf3c7
SHA256b7634400b28782f7884dbfaab177777e5976934faaee37ff82f9dba51acb9cb0
SHA512ae0bfd51cf255b669efd4cb3a641d85e7d4afdd7e4b9529b359dacd8d421c787e9ba81a6ab059184f39e9808f1d26604045239c2cb9c7ca706acc994d58a9365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d846cb0f2d79db3b907b5847de59d2
SHA1ecb454ac0c4395e1cb4a72b7c32ffc14f16f5a21
SHA256ea9c77b363edd5c6f6837b855682eb708d095a4eac045c1ab078c15c438441c6
SHA512d84cd983e6d476771827b3c73572b6d7f30a562fa45f1784fcef437ad32ce87e96ff63f2fe449b62ab788b83037aebe7fc7c30462439f4ac4853b69e79e3273c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce32a331871845481a51894c44edc0f
SHA151a7ecd9e776bd4ba40438b321bf29a3c5ef9507
SHA2568a00a09c62e62b9f3ffa2c2f173a60f22fc50454fbd40fdb48a999732df9bca3
SHA512a5cdc5b85861da21b29a2737fadd04d2a96c3ea849b72355611aa027b82100c2f93583325f7b8b8383c5049cff5dc2094344234914788687ad1788cb86fba689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563bd414faf26358a012c5d05f8ec569a
SHA1d10f339c459dfa31349141301a08012bd7b0b12c
SHA2565a85cf7f8c327d3be6b752d578cb7c8b769227fe921c0e2c0bb03e8fe840175b
SHA512d11eea3a78a30a7649fdeb3e453e978e608dcfc023a1b31e80b8ea25333389b914c97589a6e21bfdd26c49d65eef21f702f7d33eb07c32ae4b05c2e3a353398f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafc01077ed19babab23a50ef99f718f
SHA1ebdebbdc63a9b86fcb191474fb5f199ded2d321e
SHA256406674923f678ad2458048f938ff2cb2893bff5dba58cd36cd210fe86ad7c2e9
SHA51270f3f2fc2602170db362cbb21366e6ea4b201a823180ed2cd4d9cc628114337f778dd6b2bdde6edafbf85d3717370ba176cea4708a23db704431ff34da71c940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9635e3ff015367581ce3960050ae16
SHA1f2cf9f1bff3e2d148d53f40a2614d5bf685bebd9
SHA256dc53edcd448331e217e4dbebd699979eba1ec93ab1beda129354fe1736ed5256
SHA51224f8dea160164da146140c03d68b99abb9c4e11d0ade2908def02fa984745fb72500845a7866d6736cdd70d366c3cadc38ef61a3b8c4b20fc71400fde6ba87a1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b