Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
84128c93933dba11485c257b39a01f65_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84128c93933dba11485c257b39a01f65_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
84128c93933dba11485c257b39a01f65_JaffaCakes118.html
-
Size
79KB
-
MD5
84128c93933dba11485c257b39a01f65
-
SHA1
8dc89381399bff4b63c3fc0181d75af2c5d35626
-
SHA256
fe25c6db5da12f80ffd3c4933cda2e6436617008491797a28c643a87be8277f5
-
SHA512
8c2de85ca82148eab26914541f4d8acc7e8e7d2f44b17797fad3db00db13d52b2bffb5e611f98f983ac9592d2507ba4820acaefd106ca365a438ccfa65b12304
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6su6RURFFRqcbueIexuCQqy1UJoTyS1wCZkoTyMdtbBn0:J3g9qUlCTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03748a284b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000deab5e1f648399bfbc050a1e88404731a32d80dc8d66de4138ba0cd8e1e3d49000000000e800000000200002000000072b4a34876cada3edd4c7802299b7ac767ee37cbd2083b591977d52626f6504f200000006c46e7df2b63760f34d02022f456c3bfc3d626b82fab0d2995847b12598ec47840000000de1f6ec59228e672347a382bd6e8d314a64c19d62197a7efd6c32b4e395699689eabfd328be977a18eb97d9e22c09f060c6e7e99dc03c302b89c2ff52a2856ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDB45DD1-1E77-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423230404" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2568 1608 iexplore.exe 28 PID 1608 wrote to memory of 2568 1608 iexplore.exe 28 PID 1608 wrote to memory of 2568 1608 iexplore.exe 28 PID 1608 wrote to memory of 2568 1608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84128c93933dba11485c257b39a01f65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548566d57191f80084d6ee23427baff53
SHA11dde24e585d53af8ff7ce9d354fc50134621c7cb
SHA256b18399dad284ad2d298bc5469d42ca487864ec4cd58f6c5cbfb19f115cc4121f
SHA5122d8f7022f694e367e8ddc625c7508b80dfc1e4965de6137dc23a5ab160bc5f882b99e027e9d416a98b1b78aaa75448129ace5c1e01fe579c2852904cbfbab8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073d32be770607c69ab52a18ec6af029
SHA1dd1241073bb6f1a9c7acb45be8a14f9505a3335b
SHA25659ae11e3979795b80ce5d9cc3631e50318074112e582d6151b27eb7ceb8c019c
SHA512f1f788462d36f7febe1cec05bbc2676dae34814ff3ea3e9e14b68c423dff9ec50e810da4495d26936061682f6950926330ebd87abc4ac95ff9f72412e5966f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed91482cd558b542f96625bb4ce57e3e
SHA14d40e1f2e9093625221feff19c426d14b42e948e
SHA256ea988a3cff0a6cb9e3e97f71c096951f827a818a2176af2c134de54a325ed355
SHA51234327b3db09905e8fc1aa33500fdbdd195702bfc472784fed245bb30212167e7139859a75c9ac8bbd90f579c2b7daf13fa24b6fb99745549026681a056838abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56768a2266751d8608332b2bd112e404c
SHA18d65f8742df1a5ec6587bace1a1e25530527d742
SHA256ce02d42151cc16b337aae6c3ee06627076edfee83140b9155d209da15832e417
SHA512b7bd4054565265bdf690b20cb4cac9e43ba146faa1eea90985e1fcbec99568685ad13f3ff08ab7529abe3ad4aa9f1c5a4d731a7ef47696ba50b47c2ea1deb698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9484871167761f8c6669c58d94a9551
SHA104d8370ac0e4f25c8957a96dd0183810d5403b55
SHA256f9d5e5af984ec759e0f6ca4e2609de25eb35e043bcc6d58c21e1cc48b8e1d825
SHA512ca40da8310692c09e04a84f0d8c5306b1d7284dfb5b0b65b02321e8ad4c6ab1854000bfffd7ba5ed6b2675c39aa70e66a6994bee67d5cd26735387f656a62eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ae5d79b8b20b019c1875783baa57c0
SHA130c60bb97b74f9fc676d5ce8fbb0ccb53c9c5788
SHA256e7215d68c93a257fb5d3db407d66db5d5ab9e6ede846b55a3c1c8c245d8f2204
SHA51278014adde7cacd0ab4ed0eadb574177bb4e8f7c0252f89d4f2c25eae8810dfb5e26044ff74507e54bef00e1ad002dee9e9eaf66e3bc27a68f8b71ac1920438e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cfb35b0dc823cb9bea71d1725fc284
SHA194a2ea985b01af7c5ae20aa164852404433927dd
SHA256b1fa2a5a7b9b02f9e74aeccf18497ee548fd479f936c0b78f36455c6f155d57a
SHA5126286ce4126190fb906b4e320f0701e1d026752107006cb9e006e5ac8a2ae16c4563ef614f2930293437ed60b5adbd8af757c41ac3594d462e5b898eefc9ceb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593013c50036287c886fbf16385001674
SHA10a5a34440337dab9b84c341f2286d64bb38bef4c
SHA256ded18bcc89855c4628a83340bb5861896e0b56e5f1b09791abce26a7bf46e24d
SHA512f859b4748978ae0715230903525c2a5d8b0d66786a8023bdeb24d06229173fa3fe7df5fd1634ea7e76ab8cd3cf2beb6b973bf54d95e112c726b1a655f3bcaf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dea4398fa5ef0c8c1fa0a12e22a9e51
SHA1700ed6ffeb771c3f30fa98cdd8b91cb48ef38855
SHA2565af040864fe6880e8667f8620481a5bcb42a23283a929d7b4ce0b0105fe5078d
SHA512dd8b8be159927810dcbf57d465d100ca8cdca45f68bb1c706436ae58592360929de073ab705c8f384cae83342eb82b47fd3f924f8e3d3451f562fc2d9508d725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a89b923cccbca9ab5cec327b10b163
SHA1528260613c6b7b51fe6680be1790718bfffede2a
SHA256e70939ba8c036c51d062784ac34d400190ebd2f495982444df0d3c552a18c823
SHA512ca4eb6513f9f62fb4e3f9bd1d74143bbfdff38480fa7c38b7b11648417add81d57dddf609c2c5ed6ccde8a68bfe40319a0c336a20e25f7ddc1d23eb169ed1896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453ba727e9644d7f59cbc3b9416803f7
SHA1eb3ef39b41fb1d318857bec1e022ff9405b7dfab
SHA256d7a9597500b1360307c4635eaf961d34065d77afb40410ec080d271e3a5feded
SHA512c37f1c040149fe2088a94644f883bbf20d246e60dc9111772f36839d98cc6027b687a0629c2c7ffb175aefd3e120b564bb2bef13f4c912b3f2ce071ec2c07f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52526de59529b6a24d51ff8226a0c3a19
SHA1403ae0e85a673eb276d58c25a4c74a2c9e12b5ac
SHA2563448e09faa7afc4d586dc8371bdd0250d11173520b1637512d80485db16e3b80
SHA512802f3c17c2acec129ff90222abbd8aedbc518811aecf94d72939bc5c78a5e4126c38f6dfcaf0183ac38f5373c7bdf2803fc2f9a2ea1cb64f30895fc2b943699e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527993d2e3a3e79e75a94b4bb4dc70a4a
SHA1428a38b74f0c2a8cd64be9d5f4ea09a0449a93d9
SHA256678ccd01010e717eea90e0f2427901338f7cc2d049d1b6ac845f4728de2ca4ef
SHA51280973a2197380bf193324dcd064ba354e59976896176771ddc52548049abef6f2fe3d8ac609daf8b9c51a66f5e5e2acaa4ed5202cf2c27908315e1eae643d09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b9d6d3542bec6ea4eb6a1b07d0800b
SHA10e84f2bbf73992af7e8f9e0ac6fae29392253876
SHA2568425cde1e177894dee1bcdff3bb3bf5800af8bb232492d68ebca151399ebe117
SHA5124e94fc15c8e2fc2ad6b634baba55727bb2cae603dcebef4dece0a614dd2f2f77db7811efc46b7a8a058990a59148edc74df7f7eaf069eee0d5527cb04f2141ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a21961301316670f253abdd703a1129
SHA1c9d52f998ae198906e3abb698c2e4810422ced5b
SHA2560f0620a08e05a191d7dd7115a09136b6e6ad856bb60eb54bb9d54012fbeca38d
SHA512c96927b73a1f4c4073290ac61dfe1f2635bc941f98542f56a6d9155ece606ac5dfd392e3c99e4207eb8142576638cc9583f3f9556617a2a1afb990ee84c7562c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66fe14f6f0f0674af6efa5a93373683
SHA1929c863355b52e72f08f1e8a22cd107297cbc055
SHA25647db8a2750d4a77161b30192899e2011bfac1fef1cb16d640eaf53e9f9642ca0
SHA512a7f73269c11a4fcf3603ae58fef8e82e7313cc72cd292aa4c3dd276bf01992ae8f20ac55e95d52b44a9fb196fb0113bd6364ca0324781c279d5b1cdb9daa7dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534a5ff274e0ef75f671ab163aec968f
SHA19b9adea9b37a69e938cd5a4f45869670e4f1f5bf
SHA25652761909576685a479ae2e57587b84d103e5ac02c51e9d418df760c222183d46
SHA5122f991729ba5932f7d94f5f3b4d9a9e62c12c17de31deb4e0148e763917f7b8a218b956c686eef3af500ab3637c952868569cb4ea4b77d0e7009a133b16008bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0328848a1b8090a4a6103a0b9e7bb8a
SHA13cf2a5c9bf15badb55a3a4ad9e76cb9d5ddefe87
SHA256d38296c9cd8bca42a4213f2a8ec30771a5362ef34b4ac627f7414cf7b5140566
SHA512437e6d71d28b248b9520d8e8a93e35a8974387c6287961c96c5fe3f2f2f91dd9d86aeb5e51f1e82944b934868961c94d1556b532bb0a4f8b9fec248736990965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8311835ff0d64f792ca1a4ea3bd102
SHA1009d6c50e0daf5cb377f878a75b1776bde820521
SHA25641eb459eee70a2f1e0f3fe2603eefa690b6d632d6d50d7e3df81711a753340af
SHA512fcda9b722ae87548ade88e66dbb2b166bb6ad7cdcbc6fb90995624e55b3fbf3b55bd329ba2f994338bd6f87f767b61bad5a3b909cca84f16d96803d7f320a17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547cff54d1402379bd3f73e745c41c5b
SHA1e4d98032fc2d8b488553bd53755256f23ca38f61
SHA256a898ae6450451b044c07b035634cd92baac7d55035c26c28e19ffbffd5440a83
SHA512213da7aa0e1358af835fa2274eca432ff77d3c5299e168e03ba260ad372cff2f6325525e4aa528a134b48ae68b17dfd3d59673d6f76bd9197aaa51e9e86237a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df699fa143e93147bb85b9c65688d1d1
SHA1385983049577a5035bd1f171dcddff6bb874a25a
SHA256c6c98f0e7c4d0f68db8948fda9a017f13dfd93f4303ac3edcb157de831f5e265
SHA5121a76d298064e5db63b0d79d281344b8e64ff7543315203b7d9359ba5a2de83c5120143c0238f785f96a6780a519bfa8a1f53574194976df7286ba45f2aa3304e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b