Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html
-
Size
53KB
-
MD5
3e36d2b7aa777d8c1d5c96ece4acc717
-
SHA1
d56b78d40c5821ea5380f2cac27bf2563ac998d5
-
SHA256
c33e39f036b99857bb0fbbea7f7befa9da634c0b1f94a2dcee90b2e101181f09
-
SHA512
c1753d51e15e7d8101d10e8a9a527efcbaacfb57f10f0c0f26010f238dae48278b198538a7f7e80396bb97a018b3355550d46fa70034da36ca144a332880310c
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlYd63Nj+q5VyvR0w2AzTICbb5oS/t9M/dNwIUTDmDe:CkgUiIakTqGivi+PyURrunlYd63Nj+qA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A42FEC1-4073-11EF-B913-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6053902180d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008312fa304b53a657d920b96cebbc0d9a34845f59c00461ab9d27a4ec7ed3966c000000000e800000000200002000000066acc49482d09b72de06105c0034a371c25301427d0267b0221a83940ee9c1b9900000009c546060d84263ed94e5b5edae2a3c2b7b5cf1737e417648baf953426a3141b3cb077d07020515ded642dcdb052a97b9a0b71b5212294b06343d5278b8ac762496039d8d4f1b1506f316fb69ef12b8d5bd944d8e1bc0d086d96357e20de825eba0a71d1baea0f5e2c0bd46d58e63858571c2d8350e9654112f08815ea3154127fb05402bb05b8dfe2aceb3784e44b9d64000000051ce753395becbcd75d5208c2dea3f0bca74356914da9c4cfaf472d8f2f15872fee0c8d365ad6d66f040b5d4a9f6353b1d1d417781cfa0ac4ff3e5e6e579cd3e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426966806" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007aa754f708fa3a3af777f6a931592c796a8f6d9247a5e26ad1bd4d25748ce5b1000000000e80000000020000200000007f2872f681c03e028b200548132b09bdf038871fd9713ca7e6015c3cdff5772120000000bb0f866fe29512a7f3207b987d734449589a1d48d6729fee8d3f5dea0c76a69e4000000083549a6505e4a0fd8f65e425f5c5f8964ce031a28347a1477d84ccb2f2b2907d6453740ec4cf0f06b8fa7887ece07b631a841e3620490029b527df300756b232 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2480 1620 iexplore.exe 30 PID 1620 wrote to memory of 2480 1620 iexplore.exe 30 PID 1620 wrote to memory of 2480 1620 iexplore.exe 30 PID 1620 wrote to memory of 2480 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ba1a801db2ed4e9a7410b70952bf1c
SHA1215dd9f91a0a974bb3bcb2b47eee46ed29a2faa6
SHA256a4ad92cc03f8c5d39903c72fcf83e9d133dc52ae4c019d38a2fafcaf233d61ca
SHA512c4daefb73aa2d6b84ea3a1d0b44fc0b07622bd0d4936c2eac92e51c4c39b5c4a6e6ef82f404319996ff06facdbc8815d8d5c21d12dc4d4607c7967e479e4608c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3fa06af2a2b9749b2570b2f369833d
SHA1cb08643ecb84d4b4301d5a1e4d6a9cd1c4a0640a
SHA25603e87150dcba07295d166386a6dce08767a16e4a9dededfe0d4d74a55ab770a1
SHA51276782b5876308089b2163113858d0de4ca5f3bf6349a5a69e1367c86468f1c7a33df6120c1bdd54540d5fc7ecff75dfcf34f3b4735758be386930bfc3724e562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2a7b647984f776208ddeeebc3a390d
SHA1a56b19dd98a86d2c90b3c8650229411b8a616be2
SHA2566761571b4e4fafacbd5b4be1e78b048c197b4491c5738cbd01417a6dc696f314
SHA5123999ffc4088d95a19988be2595b974e5c726a19d7eeed4b08b277996b606b4efc5d0efc747d9077590347bdd36bb0daa75939a4ce63865d5e32816e7828edaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8b482af368e4aa3960794d3cffaedc
SHA1132367a2b6d2b768ac7e2c3c0c3271c49e7541f4
SHA2566f40e9ea49e55f57b2fda7e7840d4095eb8e0b43020eba990b7da6039f4593c4
SHA512ca204004c39721b6fe151585bf06d9f604bf1dfce825566465da8a5881b8afdcd760dbb29687e8d355b332773e87bbd39680d51f02a2a2a2ec674ca0eb80d29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6e2e7395650f5dc18fc6243d1708c6
SHA16725c613703d74a5b7cd4791a14d59e9e2dbab0b
SHA2563c28a7244a04c97e4e0df2b85225c13ea5de6e07ca9fa4c5298b804706d6f188
SHA512a59c6a3e81d90daa98d349db60c876de2cdef737cc2c8a9132e9e6d85e1b57357adbea9598959f7a191ba92be7be0c80a9c0bdf03c741148345078c43fb7fb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bace3c05f9ac69db3ca92c49235599
SHA1f8470979c34608f056cc42acc5f6b745ef08b8b7
SHA2565b5ace366c69229e13661f1cd9751c8f27831897dbcb7aa8973f548c67348a2b
SHA512e9c0fed1119064048835d623cb625dfabd3553a6a5934f77c98cf1fa23fb450d5cb2d3de34570ef5a3c325a994084b041ef0d7819ebc6989ff9f340de47bdb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba53af79a223a12f5e5a3406fcaec36
SHA1e47aee42df989abab2ef5d0d90e36d5374d58db5
SHA256194b3d0418a0bef8cfd7a2e264dd94d80b70979fde387031d88ef1fc30718299
SHA5120f9c3c1d261eeb1bf179867b1df4840a538254b0fc65298320a74397f3310ff957581d48e70acc364a90471e01d166c2b34a53bc3c33b7e0c893bf962f51d22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78ec6a22b48a654fb324ac6d17087b5
SHA1453c63241afced9ab9d4aeeb9b761a1ab3fc1ca6
SHA256ef3068c355caee82373586c6a5850f207b89d0a398a32a484991bdb2b1773540
SHA5122047b3e97c5ea4944319ba2e73527ba6bf8f2e4a9a29b2528c7b75309469f6a67a58dea4f27037fd7c4b786a796eebe01627b116197c9379a1ae69f3d3531225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3c34591f520bef35994c56ede36645
SHA1d9249a630a3cba7aa7a37ff5428993d7da5128ba
SHA25608f616eaaa130267130d9d44ccbe8f19a69b660dbaead29573bd8f649041904c
SHA512c5735af511ce43a36850eb4e20f32159bae54446c6539fc7acb123ba4a4a5e07de0013313a41de49253b80b6963eeb1c39f409efe5efe316803042d973bc38bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63e79bc21ee29f3f90fbae6bab55395
SHA12fb46e597042fe2aba8368c2d93374f630fdfd6f
SHA256c93b148b6c2f1c2fac5bbf0767db9a4169dabb03a47f00f535bfdc6f863a159d
SHA512ad0f7d996214de74f4fb161f814bcdbe47d4dd541bcab2f27131b8e2c9e88ddc6a4845c976aa03efe67605aa5272c90610c1d49fb2790d098f96dd8fdcf77871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011deb8451f6be630ad74b18345ff936
SHA1ffd47a72bf3bb1eb2689642b1a11c87762315701
SHA2560a923f0b4191554ee3546828570b5d1a80c1f2cb4fa38bfb0900ba61b3abd0a8
SHA51268bfc1252735046f81f70ec451e3ec85eb98a97c78dcaf5216ac3b14939ee7f4fbc85ddbb134f5ae9c3c1bbd506bad93be4d843aa0f8114b48a4271e685eb87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a533271187062a39ec4c8e986d15afb
SHA1ea8e10c6a39aee20ced001c7a72d71a2a0430188
SHA2566e9acb62275e23c17a94bc9864005766345164960ace640317ee92e20aafef04
SHA51204878d3ad4e29283b37c9360b0dd353ecaad2cc92a7171a19e981d9baa3e11ee8f01f12d252b65d53eefd25ed3d79658a8fef2b6ae958f4877533db0a200b597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23653a6ebfdd35f90a644ff5b59bbb7
SHA1c04fa106d312e4310e2af2d1c17d8a35dca2d18e
SHA256e824ebb7005c61c0010833452445c8243dbfe9ea60f9d034fcd389c40d256ae6
SHA512bda46ad6f027fcc387ec3d70947b2f7faf30d4139e709308ca9f7395c745087e2ce39e5a368bd34e1a4fb36b9be3557a5970c730f1e311d6164baeeb43fe2a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545254a3d634468ed684dbb6d746e5352
SHA1d9b3e2724eb1dd3789fba384f16cbac854de46fd
SHA256ba5ad9187130dd8b1c03d51c657fefeb0217fb4f609a960db9a97f5cccbfaa06
SHA5121d62fd74094aebd3893e821db2080b545b71acd3dac5c86201c0f8e99d5605263cd35d872489adbfc9ca816da23e3bddc36a13ea7f887afe71634692a62b1407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557dbd87004f0969136987b892d5dc4ad
SHA11bc0c5e86474c443a1d3407ca352db021a0a4f7c
SHA2565a15e8fba02fb054e2c58f4f2adf00f0e23439973ae9fcb9ad4a7d7d6090603b
SHA512fdc4f41ec80d3ad7c3444b186ce97337727120788477f103e358dc26bbe71b0b0731553407628bbb543d8789bb08170d534e6e2e167879e1578fe64fd2e01a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e217eeeee00e55e5b20b78629ff1c9a
SHA1540fa245d66c8b9ca8484b3a4ad247b3fc189884
SHA2560e1fd4ab6294771d5fd9c6f8b6fd7b6ed01c97d9d3d1658d24cf8ca5e3f1b1a1
SHA51259882c4aaac9938657d77ac25f022c79df83d13c9b1e0a5f16c4e6e50d4e234e9b085e1799c592a535dc44b75ea31f3d8883bbe9c2d31dad267c062f3ecade26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b88b520e0d1ceef980fc98131b920d
SHA10dd73718718036fdbad8ae8555e8991071837434
SHA25657859874f33cb44356729d944d0983664da8e582ab600fee212030200414ced5
SHA5123b4e615f37ee331fea72f6d49822452872ba25ebe4abfba81be231cb174d5c35c15e6dc86c1362976cb325b497d83964831ecca3cf1ed1019988e559d7fcdc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529648572763c2f7132bf1bf3dfd1bbb2
SHA131b660c5b93f7e37328d04cf9b71d09a20991628
SHA256404ba8b4341c56b0914f3f21b7be5770b48c77afb36309e1fa281ec68e95ccb3
SHA512710a4621e23fde9bb150efda201d82a006043d15e10ce9550b21a655a2c3b3048f065322e32f5e41fb94623270305b4aa239fd5dfa78e84780b30a5e6220df1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5922b9380577a234f3677d3c378eb5
SHA190001b17a88d668a55ca29d24391bfaf573664a1
SHA256402c1b90674e303e200bbbb2bf57b021516352f7b4dc4a37d3b0f903bf3e15ff
SHA5126e8b133091584eb49ccb69305c42282bcfe2e4ef523ca83f7b924aa50ef054d25a8c550aaa524d387f8bfcf592831ec662454ba901be8dae4a6e51efb5e07718
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b