Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
89eb364a60db75439be3c6b5eed3392a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89eb364a60db75439be3c6b5eed3392a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
89eb364a60db75439be3c6b5eed3392a_JaffaCakes118.html
-
Size
26KB
-
MD5
89eb364a60db75439be3c6b5eed3392a
-
SHA1
31f8a99ead8f32666616821850fef2d763f61ad6
-
SHA256
6b01051042e47b1c6921970c425f47dc166b5bed540234b12dc81b18e9a00c75
-
SHA512
d6f7922461480d89a95b321715b83deb2f175de4365b87a4da6b668d73bdd6230f0246d70de1362fbfab04b54fcdbbb2359f26daacb3ec17c9e9681365f11da5
-
SSDEEP
384:SF8dZwJ8VqeT+UyFw/aVZNRxER6pGh/2FU2P7PuBOm+vQPW:SFwZV+UyFwAZNRxEqGh/2FXP7PuH9u
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000134afcdc098f8af2548eb881017690b0448180586916974f430ab75f83a64381000000000e8000000002000020000000a7e1a7d10a653b35bc5f72d682b82438b39271a64330efc341ce5ca42013b65f2000000048ded9a2687d0ea8ad533fb62395eaa909edb6f96abc11dd8c25593514561e7440000000ee930e3a8c63a8814d4a1efbda46d777eff224480e976b3b5cdc279cfe8160eb387fa8b412740608334cc1c30bc2083790240e043fa5d8bb7537b55c348ec7a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50328b2500b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423393399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E54F7C1-1FF3-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2852 2116 iexplore.exe 28 PID 2116 wrote to memory of 2852 2116 iexplore.exe 28 PID 2116 wrote to memory of 2852 2116 iexplore.exe 28 PID 2116 wrote to memory of 2852 2116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89eb364a60db75439be3c6b5eed3392a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745e080c1b0d6ce78821ad7f3013ebaa
SHA1db0efad2c85ee960b8d61bc7dd4a8cc48643e649
SHA25610c54b4fd58cb2eae161f1665e5abb6896bb07d3e17a0dddd36eb708cfcc732c
SHA5125455bfa58d445150f46a6aea9f45ec2410a5ec117f2d5329ddfd3f2d6daeb017bf62d39d8d8317a5ed73ef289ae9e386fff2834be616ffc59f27917eb4a903cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b836ff1b719e3befd56a1b8217dffd
SHA1642ecd2866cd6d6ec6810e5f0bbf144a8497b961
SHA256a4ab1a6d9986dc26f5895912ee5b49b198f3064b84624a636aaa1eac9799a055
SHA512e1fc881543096c76a715d5f6e74f967ddad6683bf335ee8b0d5927ef2c417dfb0295eb7f285d93f99aa3e43e6ee91187054888a8d5f60a6481f841a9b826f346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f08878e50eab4fe80b342cbe5bd978
SHA13e7b84b7153c040550d32bc613f7e3339b5cf6eb
SHA25694dd8ee0d9f1a1c44d03b2fc7810117119845fa146c88261c5809a980ccea567
SHA5127efe3c151fd9b218b9b51818e124077b7ab4f8a24717e6aa0286535c5391356b3605d1cdebb55e089c7c3b4c4a7455ab25db58f725a50c2fa5c5b48794c7abe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59970c857615c236d670e7f7ea7b16cc5
SHA136eb8fe988637c5cf4251e482d0691ba151cf6c4
SHA2560591ebdd3fa28054da9ee75e7ee9d67b63d2b4a566d45ff08ce21a1d40cb85eb
SHA5124eceb1d5440d9b45c84aa1a281c9a8b80c4dc21dbaf674fe2c69ffbf9fb0b754eb57c5fd05e1223f6734e41e10a043ad08f2c3b9af19fb3e2e6e23f0589f4df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983a54160ef7e32ac2987d642c4cb61d
SHA1bc4e6f940c36495dcc33d831ae2e921e669ed27c
SHA25693c91dd5afe337b148f12507d903599b96fff2126deff01bc646aa93dd38893e
SHA512bf76e042ea3691470656d2254012d016773733fac3770c12f2a7156361ba3af31dac70bec26e6010dd5e94faaa0f4177b5bb361dbd50138065f4ceebb2a017bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16dae88b0c2739c3b5635118bf111e3
SHA1e76c552c55617b5f5a00ac2fd9eca5647ae99ecb
SHA256cfd7becffb517e6451b59c622dbe74f83c245489988965f389f26b8b1d591eb3
SHA51214f15b7eacf5b941e7f6e4c712593cfcc0978f30e6fe1247343f4cc1ab19226a62494141ab87d45cc143784e00dc55ff32f3bc119fdb5b2dfb51f09f396a9457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99d5e4cf5b63173964b0d3caa542fc0
SHA18f786a4e253b8ad2ac3572d4fe768e4e49a7e774
SHA2566e0f32b8d5d93a78f0ad8170dcbb8b2f7407f397cf53074488c6a3c17afd8b2d
SHA51237ae4774992b16fe358cf0de863c1a9f587999b6fc261bbcc04d66004a5fcc6dc155ec06c525978b458a2532d6fa11f92d125399f6d5e24c6d2ef91a897be8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0782fdb92aa4fc63d4af44171e8fa76
SHA15a41d1e4cee1fdfa6c5d09dcf6d35d62e29f739c
SHA25626c89b469611fdb317a4f4b5946a984b94dec378860f806291351579397c44ec
SHA512d9744d7a7e8902c2fcc56cc74469069af301b58f3e3bd325576b0c2e57572e6943e9a2c07aef8d8f28373fbf077633d87708d33c34f285e81e64e641f054da67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b74c089ede4264ffac068bcf236531
SHA118833ef2f81fc9ed86b7296643fb9038e7f0c427
SHA256316bfe68b8ae8839a99fa3bffd9598094415987a7fd784492d0eff45436a5ac4
SHA512ea652012441b0ceccd9e0f51aea54a998f72b439845b4f1ed89ad0a3e799b45bbf42197e916970a16440883c4b2a981637ca99f1c0f6bd86e8b9ed9f717b7e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac12d7d0da22450ff293b3adb15e3cd8
SHA132868b674e1fad500236b6c03898b5dca09e74ba
SHA2564b06234044e03c9ac045d6e81633bfff0fa0050ad9788aca8fb61dd89c5c1da9
SHA51272d1ad8d623ec03614df1f1cb3591754237a2fa282d3d3ae3e87ecf55f8207a8399e5e38108fe5722419d1f1320ce656d5be4e3a080670959720caa4784b6cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d4548f94d83faf3c0066682fe54e3d
SHA1e3f4026302b9ce8e6cf804160a8bd175fca5f9b8
SHA256461c2d8ae5214cc46e62c153786025dc8bc2542d0376f3de85b703c6e4a72d71
SHA51204d46688b4768bb082e0d7568d732d10d9f960f2db156a264a1208654371d0e0b2063be4f267ea8697c2ef1d7959cf4e63e724ad1195200c0cb17fb650e1fafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe1478ffbc29f41d2baebdd965a45da
SHA19479356d4b7c2440402ede4c3926f07ca936f293
SHA256cd2a4d85c5ca823095da51d19fa939628119ad5f4a678f29f12e80462e4e7f61
SHA512cbb644f96bf7be545b0bc34dfcbe0ff8f6786c70f12726a176327d21b86a386f1f4fd3b32b5c5685dd4d44c9f8010529dafef8627412a5f7ddf53ecdff54c35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52685b7f0026354b15c5732e8e1e9f3b0
SHA114cefd6dc3c66b9ab9190a579523144c29ecd397
SHA25606a4a0624953c1c75bd272e340dbaa40d0c9d3a6a0ee7ab07fdf44de8833dbda
SHA512c03e15542f6cc8b60ec2267d418640c52cfe9f8117e9b764d5c3f89061106d86900d16dae5614365da409bc65092f8a2f0a7bf65d007d3f6fc8b49ce454ccaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4acce6d6b5ee5df20806baf74ae1a1f
SHA1d9a07e0c44ee2ad9000f1f3b925b037f6ed1a923
SHA2569a492b44255a0d3f1ef0d6975c51dabe1f4c31aa22bc4f758a884eacd97cd075
SHA51253eabc42c00a0398aed355f61a7fd9565d92a070424ae5948481a9ee70a5c8faf92ff4a9e8fd1938d82b1ba20016558e46753ae638effc1d65e4f76b306a9a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356727459b61eda90825cca9260fa924
SHA17a7530bfc7405b09863d2bf1d331e1a8488901b2
SHA256f3aee093a8721e3167c028517d2e46f68e877d22099fb9c7b14841aebeeb40f7
SHA512ba544f623af429a9552c9276559bc11e729abd3750464dd6249e862a9acf8c46237b56ff17393fa42748f1679e4690d590ca60f82807c73bf370f9ecc63ff13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04956de90ea27c66e2b096b140afd7c
SHA111827b3e16cdc295ebd06ac5eaddcdd6a0f0d27f
SHA256a0cae19f068a9d4f272c7a5d8161307517534fc863c7fba1071cd2d3fe44a032
SHA512205916f9621deaffe248bc6ad526187063d2969ee3b058421b56b4d55a0f881d5d9f427f1f28e87fa02230eba9f64419c1a9446af21110fad1e6c4214d404d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c19824fd7799781aace26eee6022ceb
SHA15f618b457361267bcda3ae27b02377b7597ec691
SHA256d694f9a7a3a60f457c5c6af1f83e6eea002b9d2900f02c20470787c83f6ab0ab
SHA5120c0d276d1580203589dde63dceddfd1353253cb4740614e8d51ceb1660b051ed413f13b5303ea8f6a5469be26a754b49c15f13bcfab627f4351f72c20739004f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578290c516901c828e31e5531a47d0ec8
SHA1167ce61e521575d5aefdfc36526f4fbac1974d40
SHA256c21ce8b0af7b05088bb7f75cf8bf0b5787314932bdf0cc6f5b2ad08732438173
SHA5127441b8e72fac948f6e279b457253ff6ae264b244db602d2522d64f0f5bd9813a7f5e70fbe91f7e21ff784e64137c8d6fb9c8052e2f113a8dac8e816ee1872b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c297dfe00b936e1546a6fac2b0c7fb19
SHA169ee118014cd48495cbbb5453774f599fd75e273
SHA256e61cb8f57de57143d2369621f84f4c8b1a3dae11fe1ee5217198d9416fab4a7a
SHA51213b43809225cdc32193873ecdd4fbcd62086c64aed8ba1bda4a292d9065bb6e2a3cd4b3b466446b71fe8735523ecf23dd7474c02eb973adcae156a84a7993002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2fa693310e95ec80031089c964a978
SHA1c9d5609ff9dd3af3156a8610ef458c67a8b991df
SHA2569e95f3e1681e3efa9f81bfb94d355a67ece824576251fcee3d01844559d2962f
SHA512c4c9ab534b76e5ad5bf66e88f58e316cb72f9ae64366c54261ba583c99c8425bbc8628ed168067b47011b6a8a9d0fbb593883a2e6609d622f19a787fda8f2215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8862ad38649927ef79ddc493adf5b56
SHA1d80cb12c5e0dd41976bf0ba32872b89705c3ba86
SHA256709956d9ea7ed0598dcd08d237ff66bf7693f0e2e8ba82aef84bedfe3c1263ec
SHA5128d839fc6667f51e3c408a1fcba71cebab426eb5725c40a5f22c8907e1508d01881c80d8011cd78f0f7f15aa9b058908e160c427b840f997aa8814e7fd306fa0a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b