Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
91e5dcc6d52c7ccdefd4bcf0eb90fc93_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91e5dcc6d52c7ccdefd4bcf0eb90fc93_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91e5dcc6d52c7ccdefd4bcf0eb90fc93_JaffaCakes118.html
-
Size
8KB
-
MD5
91e5dcc6d52c7ccdefd4bcf0eb90fc93
-
SHA1
561ef679fc463d426e221d88eb0bd68877381859
-
SHA256
a3a4ab3a76f37be2bdecbd8af047102b8fdba475b927ec424494a4b2a1a10287
-
SHA512
c7b81f0cd2f8330cd2c2a889e51afdf505b7c4e05d0ed5ad8227c8f95c0e7b806a66ed56e6911f8a2c8b2906d6b4cdceb743771bb37efad1cca467ea07a10cfe
-
SSDEEP
192:18mTq8H4QsKfKHSw0wIwGlwLwbw+FIqiSCvjikJkC9dG484XuiMY1:1Z28H4dOKHSw0wIwGlwLwbwWMjscG4hf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AF90601-21AA-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423582024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b4c418ecb6e9c0e60696a823ef71628497d949bd2f40807aefc75a67c621a9e8000000000e8000000002000020000000766a85f3a7002d95d5af6a9040321b40623851c781f1d65a0ceeb493c20396e820000000982bb73df820c4b82c2fbe1bec6650fe625a62eeda90dca21851c31a22993827400000007babdd4a060a287ab8ce7bb3249e76bebe6b7839fa5ba4c2283f9be150f83249c4d3d671f5c07d300f3b20a140bc51c172afe2846d3ab45f2600135574b9f22e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0296a53b7b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2340 2928 iexplore.exe 28 PID 2928 wrote to memory of 2340 2928 iexplore.exe 28 PID 2928 wrote to memory of 2340 2928 iexplore.exe 28 PID 2928 wrote to memory of 2340 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91e5dcc6d52c7ccdefd4bcf0eb90fc93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc1e2d1057ef7289517345f1c8e8663
SHA175703bc1c4dab06ca83bdd89702f67287cf24687
SHA256334dd057cec7748126bdbe47459db866802e897ab92d90ed84460c7e6234bbcd
SHA512cd7638ed27574431d5f073b7edbc5a690094ae26b5eaf16af53808cfe63472b9f5113943bb60b825d19a931f32653222bd4cadd65521bd13f9dd78720693a782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34a9caf133c7946a9ba61aa109d738e
SHA1bc77dcbd8ec43d4e2df0223da786a03b32fe7fe2
SHA256e0c19c4ddf80a43036bb10743666447e6c3ac666acecc40043ae2ac1eb5cebb8
SHA512be1f749b49f46e600bbbb84d4779802339c9b4c548d170214ae8000c9cd7839ce508eaae042372bdaf992fe27c2f7c35052116c70469a6c5be91f1d19970c13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502847fcf9376703b40af3c6e3513f607
SHA14678cf9b6fa06830f5f999505c4624c985cddbd8
SHA2561f967c777bce7b877b672addac69dfa1fdc53a7275a62bf86c05e34537c45ed1
SHA51280610dbf04ccb620fce5a37d6fd1e6e4063aaff7fbe1647a957edc54822bcaa64c9296595e49a6f01fc9004a9a54ac7bfa40b2025c321d7c9dc99321189a1f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720c905f2a463372b39384d4eaaddcb6
SHA143b47660a342bb7d9deabd02b0838557a662b421
SHA2564c6e27c38b37bcea484772568344bcbd4cdcbc306c61fa97e7160b5b2d364f42
SHA512f228b077281875a2bb32c22b68385807c9553e9ffb5961715230a2f314456ef3338126eefe605167197eac59b452a3d5f9c9e5281757a3a74c630da3de2220f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c9f68eb1504c737a0163b581a91a47
SHA157268eccc403a3967a1685f216967882c779a711
SHA256bfc94d48e6dd40126abc08828dd0e732a01cb68d83ab65f55573c83392073c5d
SHA5123b0587b1dc13bbd205c2e10a81ae43422808540186f0ca483bb173ed50e0a7bea0fd1df37889d703e3c7d03c1f3ceb80c2d24600368f4dd4997f06a61d111c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f982d58703f006ac17c60841c3204cb0
SHA1dcfc3c6f304ed6d4330eb629794a934a49b4e726
SHA2560ad0f8a52555c6f4b4b35cf484227486a618d04c39b7a3acb4b67166e67166c3
SHA512d166d5dd6107fbab89651585740e21b45362a586d965bc18fd1ed883acc99258e97b87922176c1c5644186fee01805ccbe9ce6c7032ac67dba4f195922c753b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f26202e14f0c82ee45de1eb8f9b587
SHA18b3d4589144850ee558d1a83719eab5c513c382d
SHA25605597afee6182a1a542760915f3ce573725c10a6b8f1f7cc324660bff88128a1
SHA5125ccefde0defa22bc7dd7f70d690ee8e41ee696842d1abb037ec36db9d5539c83b49adc0c873d83d6800e41ce4e928ed28e5a3679565f4b6278fbd3db3acb61e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b2ba2a9febd59070cca4dc2dbe0fd8
SHA128d082c2ae57b9d9363a9916507e4207173565b6
SHA25646f51dcadfbf1ba51b7dde704723c34b92ecf9737dda99e3edbcc90ad0b8beac
SHA51297b57687569f5ecc979b60c7418ce1c9ffdfc9ff4df3000d44a0955adde8b005d364f3eed1c0ebf18466087e80802ebb8dab55deb6f44aab75bb6866986d40cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd8943588612799489f92bd43d0872d
SHA1f2100d6c14899b80b57d34eef5e7513482170ad3
SHA2564a2b9cdb380708ebb980c8dcd71edb6a9cbe62399631305b51262411549da953
SHA5120385837406880c22febec303657dd876e9e0546dafd52e5b250c7fd556c649e760a553126992a7748ba0838014561a1400d9c64181d9811ccc730e0ef0be08ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd8449f4a02f6a4ca366f0faa35bb89
SHA1d0535b8d28fed85879c99616c61f6d29c5b0ca3b
SHA25637c3a9d6c6835ac16566ff1b961e5ad29f6a7e36758131af1e8a8cea8049fb9b
SHA51299e70c001732b7c24534275e731cefac9372d39fea955e36fab9dde77d5f7731164688f2f21edf084a632eeecf894234f8f6b8fb1a64be4fe58e33b7fd0b4ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9afb6833fd4726013aa029c20f64edf
SHA15c4bfa9d87f188e1cf431c92c997acb2dea64a35
SHA2563eaa2ad226a939cac5ecbf5eaa3ee7ee6a619894e00e83dbbee72481acbd9384
SHA512269d84e7b8d3908a2581481a5abd9bcc014f6bdb89e410063338941c1042c93532caf7977f102e1c7fe76eb02a19db37d35de2586c73e7775bd9997a96c10d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adeb3365d0d985a74374ee0f1c3bc2cc
SHA150e0805b0bcf1f86bff31fdb020ffd0832ae5949
SHA2562fbe1084243832c990ec7e6a74b147b52c5e6162f42f5130ecf34f70b78e8368
SHA512d8057e7986283f82602234a0c37fc3a6dfa0c2ac1a8707d777f304f8d02b308b393d4ad70fb9c33ff923812df58441190aa8161d7a5b3fcba085f74f9e3b5785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730629da7aa740927cbcb91efef0edae
SHA1b15ac8d59df3b9db5e95e9655b8434c7a0adad4a
SHA2567d390d1a68b957918b572dfd55f047575f6e374966fff1d42ccdc653b5284a6d
SHA512c74b56358be849893da320b344aefad87751c6c584ff8d5bb2931e53187543440074ddc94a622803081e59308d6c4ffb8693b4696fb7f823a7430c42777e29aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c8e4966b0ff4f011f206bb510874ac
SHA14d1568a4e563861b4ccbb5ac89c97c11e3dfb939
SHA256e6e8959be6f6ae38a7b9b9f7557099a616ce284d5f1737dea6263e1819350607
SHA51210549c9f48d952a4d0f32c7856e4b7da4300ad596c7c1c84678ee2d3aaa82786d8731fecabad58ba5fc56e637c866129a6790f5234e2551263b260633e5bcfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6373a8118fcef51841c0688dccc597f
SHA12a523cb498634f5e3c5e374685b0cbb95e94f558
SHA2569d45855c5c05007e32a0da5ff303f382719f36ab1823e93571f13fed18e589e5
SHA51275c958c85c9c8172ea287a3339427bd544340b39bccaa6ba444c106f77e17787ddce171cb9dfc9a64bfec1fb6d5d9191827cade95aea9955330f9795b78c4b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ba1091d355a515e9e4a2ee5fc07d43
SHA109294713c4490505abea3ef49383408bf90341b2
SHA2567b48bf2d0c36057ca4ccba6d9f9959ce96e6e604b52a3ab4fce87324525c7890
SHA5127ac9ac06115288401409dca949722156fcba886c63aaef8aca2598bd979cd84a020fb854e0fa7ead85faeabcf810efeba68f1b4d8404a040f87ac294f7b5c4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53113f236bf9f1858d195bc9089582f3e
SHA1f3ba8fb7dfdc89233a12523486ef328d72d8f133
SHA256265635d270cd771f0a59054eeca2bb260c0426e6b63bf2485758d73ee184ddc5
SHA51282e4e133eca0dba2cf74ad41cc2f90371e31a4d1440b5ab5b69c2b5c0764c6dbe0ed0294227227cfa49c01b7f3f80c5fe05a74e12fdc9cc6a954c03bf1e2909f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef829dc5a53befb2091534131df0e148
SHA1d5b81bc0308884f0285a4ca7b1fa0bed960b615b
SHA25660b6797c8148e729895b5ccdd29bcc23c6b9c8c27c2d1b29b89dae567b192fab
SHA512e685f4b527ce064a09c2fd9a7aec5f1577b99e305c2e091cbf941092f1cfdf240536cb5db9c51436c1f5f61ed72e4b1ff1119bddbe0a9aa03745ffb2c63109a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56196440800e345f96da0b4d09c8246db
SHA19674c22a99c1fa04f919124b2649e39fe03b2b6a
SHA25629bdc4c88fc23f0074c3fe182cc18d2bc0fdee77d034cc54d2434fc979d8143b
SHA512a4283e65fbd511ccc3e329a54272b5cc50108b64f3932b30f73ef214ce8d5e600c3bad1d7c541aff66488ec5ebc676671c166506a52ce43207218f1e3ba080b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293740cbde58fe05c4d506bdd301e8a8
SHA1195184569483390c96a42e9f539a4eca91e3f0b4
SHA256f30766f6d36a9556a1e190a0392760c9199c3a36fc5ee2d0a90f4a4136fc7155
SHA51218fbd85815a2541eee7ad879fe1c365a81b22ad7e312dd613c8c705d2bfe7ceef1a327895100ae9c0a3269141e44d223aa5b128c08c14e4a1fd0f2de445b3fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0a6c59b910dfa7f436ed4b435c0ccc
SHA1bd00f1a0e16b8f1d780928f2ba796088fec7cbc7
SHA256cf405efbc3f8a24f9e566366b7e6c90669d9499f0de075db9d243956ba42db65
SHA512a0ee106c648f1c9217547d0f2b81a7b82bc7380071da358ef8114d83a9171738d7250bbb5360c683adf86d3ded2094080b6ddf70ef7142e8f1842759af934b47
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b