Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
a6aa38cd44301686f749f6722303af5a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6aa38cd44301686f749f6722303af5a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a6aa38cd44301686f749f6722303af5a_JaffaCakes118.html
-
Size
2KB
-
MD5
a6aa38cd44301686f749f6722303af5a
-
SHA1
937d4d281fe8e5b8b05805f3b49cdfb0b4e34c26
-
SHA256
215874e2ed024d67d60f3d238d08a7d429122303cef96762f1146ad39bdec923
-
SHA512
2ac3318fe39d7a9e89fe1e61ef9f6aae859ae375abe05e99a85930f9ed8304d4dd021ad600e4395083d564a0315d669193ce5f1fdb203ad3d1d7915b6db15c88
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f6f255d9bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F838E51-29CC-11EF-AB87-5E4DB530A215} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000ef810083ae7b40b8a8e51d68b64fdb35edf0edf830eac2f9567c71444b0dad0f000000000e80000000020000200000003d60dc0f9eca4fec586f7f5e751626e262fe23fd975809e61b0a7792ff10241e20000000e0a451e5131264b437d80efc771a139ec4ee4fcb5ce2b4ff802b06889d93aec1400000009af1ea6cf01550e58384ce7a1274bb5155b944702a0c81e3f44e1b44f6f5ab770add25d9c683367be5bc0883b82512d15d12c9ab59a2c3072ffe619cfdf1b7b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000058c73bfe58e316b7741762a5c67aa1a82a8aeb1e053959ab795e0537e66c23f3000000000e8000000002000020000000ce96f61303b9f7adc381540bfd92bf29dd08fe36a8bf4fcac13ef29ab1ae539390000000d05e66f2b450b0237609e2706853846eec61c384c7b02add3c75531ada5d156274a12cbbd18bddcb399c02b493449f9418fcd36cb5d8cff507b9f7730a25f5c4a7b48295bee6153183b09feb3232768582ba50b69ca04123bcb29fc94dbf689c51ddf7f1d921f3082efe48ee36321aac7fc066355b9e0356893e28896d15ed3b7f173c51639d63ec493eab480dbf115240000000fba543d6a784679b6f5a0f89d5161b9306ae2d287c1cd2ee6b3a92b1d9d2ef2e7fee4f3fa266163192d682363b8082bb7c67d2de12ee2786fc3b611d4184cd47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424476246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2980 iexplore.exe 2980 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2980 wrote to memory of 3068 2980 iexplore.exe IEXPLORE.EXE PID 2980 wrote to memory of 3068 2980 iexplore.exe IEXPLORE.EXE PID 2980 wrote to memory of 3068 2980 iexplore.exe IEXPLORE.EXE PID 2980 wrote to memory of 3068 2980 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6aa38cd44301686f749f6722303af5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3322e43f7c71838792abb3b99acfcae
SHA19f109e21511c51bafab6e7e908d0ccf1b91d7817
SHA256352cae9a8f46bef1bf0938b79cb104374e8f783e3547eca967cda678a20b92d8
SHA512b51884ecddb9ddca589e33480d9b9c0db7911202cd08f776b2c2833de253051bdfda03af11cfdc75fba2fc5ca66f7e100cabfcd941a6c13fa8eb97fe1f3e12ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a921c622f00a1a7609c4d6f79d4f97
SHA1eb77647a77aba5a0626881e18b177431291b74f9
SHA2565fad56c72993daf03fbff17acef634644a1cfbe24ef2a5bb3176d3a4817c0e57
SHA51293f6f334e52f90bf3beb8a669f9617e6d7c2224f1a5022baad7e97008de93bdfc4a77e0f96465b46e8b699a9eba7e9a42fc8b4745ce1fe26da62b4461613c059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2caea15e913316207138c1cd961e5e4
SHA1e50bcac0f41caa3aafbd022260deca6ff1d99881
SHA2563606eb1df64ea7e7e05ec7f82edbf930bc7f19020e74e12dda85652fc66f438f
SHA512ace5fb1aeb40b16e1d30eda44f0d314be8148bd4dc8179303adb3468e78ebb1051446d8105c2a609c82be778ae9dfb51b8179b12437b4fdad25e4a18cb357012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55081b3151f16f76264ea9fb083d5cf6f
SHA19df0c4a9db5a7ae8df5f2d05acac58098d9f4526
SHA256d23d73a8c55bf1befe5e2d7819ede6e6c309dbf4c07f426167ca42f03fe3c4b4
SHA51299e5f5bf7480a60573df1fb5a5c5d9639552d9aef817e85e5b873d15429e0ee8703f856b1625f3e9b8026dec92d68347eb2d2d16bbc1cd92dcd5d833f03c2d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a5db42ced386367fdd483517df2acf
SHA1170213687d5d9fc9e2f357cf70611422dfff3c6b
SHA2562d3e23c89806b4b87190b30209fbff90fe32de3ff320ab49d393fc1b789dd906
SHA51265d6d098a2617bb82f404898fad99e2c821409089d1f7020a6c45fa971d4d1d64d752375194c829afdffc5bb49afa9a308eb7df4d906936014057f57b82e9582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cf604c3cbae0bfa759c418865d19dc
SHA115c92d33d099d3e15b1c2635ea92ee4d3f75fdb6
SHA256f644cdcfe63929a5d0f5933aae1a25b90fffd5cd47412a533887e8de2067eff7
SHA5126297f74c34d186113197e9f5255bdb1368c35e9eef5204c02e4fc1a76f275680d9a25183c0d43fe1ceac2ee4bf2e5ca7c956827cdb31f0785c5ad3897d8e2403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b092ff3453f6e47a18d2aac2f3b4009
SHA18aadd0a1083c125388f57e80cb2daa076c4dcc78
SHA2563dbffb7bc84d3fea94aa360cc4836f645f61d3585182d682c4e3d9b7f5583e06
SHA5126c77c802bd951f929bfc0a9e2008df0942a7b66d1c423afe31dcb15d9cd47499c1fae01170f8e48ff28742f5ed33384fbca235ab1fc3fc38d2314ee59a4fc155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ef02d561d7077553e66d829c02be32
SHA1b2f2b6b6ba17f0813337de068e11026e6b32cc66
SHA256aa3d15d0711a4b7dbb5de7a5ce1ac0265762be268928de23c1585e1f2d2dcfe6
SHA512773ff54a7f83e4b1e4503ead02069a6a9a2c7bd470194d003a2d51bda3a0ee3724000c1a3b8bc6375b5db4076ebd11527c08284d433c0bef8405a74d3fdfcdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d07cd7d6d769f5bcede3cdd57ebecc
SHA15fdd6c587cd62419ae2f894685c48ecd3d6a688c
SHA256ad649374951835699f2cbabc606c4418076dc805d041f59d5e167a358eb1b354
SHA512ce4e3e3d41dfd392a12493dfce1a21fd1520fa8c523f13c37943fc8712e6533c340d01751466976fee2f8a6dd514cab18f6eadd90a17d4fc453432754d015c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f23ffe91bd4326b53087129b2caceb
SHA18f206c77e09b19340e723161138fa1f3bd6ede88
SHA2568f3807a48010113d71c9c5865958d9a348f0ada092a7768eb2b760978b25dcf0
SHA512129ae24fe58da48bf484b2a16e164d3b715b49acdd3e2a2cff4c85fb16dbc147165e9ba4a9618ce97311373127cf6fc46fc15c805dc44a894bc7ed92e55cc6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f9d31de13f3ef89033d252df4e8e8b
SHA17cb933954c671938ad0487bd7d7bbe6cb16085eb
SHA2564e38ace729ca15be569192da96662c01e7837717854662561b2de6bc2746316a
SHA5121a10395e7220cc366787b5e628b89966261e8f9ba65186d2e89ddf9a737c28b842bea7a1f2e3247baa2dc303d0890ed9ebb2f91c2bbc10beb53f7a4342566250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2431065cb9cce3e98de9b413206503e
SHA152307f7e4b799b4bc251df317435ac06db34d04c
SHA2569c64deb8511c8e438b8983e03842c6e53228b22c753b04e06e86b07522415e65
SHA5121a64a85911ec443e013fdaa8ef9230b548aecfdf0c8bdac9a8cffbd598f8234f5225c82191a75594b52f30f300ef2030561b3b5a3b510a54e2bc8521378a52d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c03587388b81690a988f0ee794c89f
SHA164a068f1b15392ed9cbc01cc29fa5f51caa97391
SHA256df4787e468bf37c181cd2ea412bc9c0fc9b3b83ef81d6fac23dda685522dcee4
SHA5129d43817194e96fd08dd0c60eac6ddabc46909020dea916ea501876f84ff1e7a68b83ea36fb7f53913931da87770800974664e4868519d49589a7b59bc9d834b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5a158d38c577edae16f29fa86348e4
SHA15b43b57ff4522dec123d6e61daf7c8cb1cb1dab6
SHA256e3526bc2a5fad29d17093c80ad3973e743fea16f7fbf3aaeb10770479899ff48
SHA51290c9379e9e4853717d71cc0de04f596d83d4494dc2c5db948099185c9c0fea461995d5c8662c6a0c258eef39227f8c933338e77373578b1de01433655b4b363b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a93240973d78296c01df5814c3025e
SHA1b5ac3d16365f022d819ed5d42a1fd2ae19ba403d
SHA2561e9c42d6773d3c93ac2e605d193af4750bb426130d2fdd28a18b84b03e06bdb2
SHA5129ef73a15695565741ae5b5114c0b10f4ebaa3839cdb0269b25114ef894a527f26dca2bb6da53be984e07eea06f3afde609e4e413da90fe605bb24557e1f322b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7f5fd5421cdd5c1eeb72b8dbe766a0
SHA1a110cc4d8f62e1c6da1b6e1b35a0ea241b5236ed
SHA2566cc2a2aaa543c2dba0bdcd62f276f5fb9e222c1e03f4989e6e4d97ac8fb96f01
SHA5124958926ef9daab7dd567980aeb060243c158c21f908cfbbebb0853e1e58fa1f9d564c813fdd13ab4f1a34006a47323ecb93d20ad246c1e39b961b20e13abb104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f35bf4dced23261e96105ef427c102
SHA1d68600ac5581a68fbfc5b3ad8b6a2d09c9e28669
SHA256d06e1d0e68170139d237e2d9deca19ec8682cd01c74dbd7a949d91199ff7f703
SHA51210ec8d193002009dfa0cb3e303a96c4222c1a4bf8003bce699a40ce96c1734d647bed7a60d225bcbb3b860bd6e2d7ebcee7742314ee954c230695bdf43e66130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4f71c91605f4bb2d4632f82a0e6380
SHA1ebcfca46157f5d10144080a3d6e9d33b23393da2
SHA2562697da80cb0858f68d35aec655ac50103bc87327a9194c64406a9f40dce95806
SHA512d9b7ce1b07215d29c8f50d458846ed3c1c8870fca86961b37fb9be5fc0a101ef4a0c6dfadf39091706446f98aa778581659f9e73c5a8c5abfa93f6d7cf5d4efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be720d762f9f300ca800cf1ada94c634
SHA1020299b21c180d09e6670ee6a0df45be3e8d557c
SHA256c451df7d90a99f8cf6e7d43b518fe302e50bd71a25d73934839c24548a332440
SHA512961e683220c44532737d85bb9a8c15b93d023a8ade5780f8ea10fc0456e365b276814f4cf10c7cc1a04226c59d109602195902818d578904c39edaa7ec38512f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507659942c71639cef949db0ac10fc170
SHA1ada557cef7cf521ede495f11334e0a455f7e61b7
SHA2564785d2ae0b1558f49563cb1d66024dd81555db2796d3599ff13679a50987158f
SHA512eba3e0290beb35597a9121690288118cc87e017e5eb97630cf9ceece940ba2f2bea38969d7fd77d8078c5a36eb2fcbd8656f50b65b1ff99d9bf39993ef1b23af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6aa5e5aa992fb78aca38df15c9f3f6
SHA11cf21266629e5c43ea19ac0e60fbd578dec7c928
SHA25602fbd6167c4b019e99c21dbfbcc7614ffe8c86cd1fc3b2b5a8d7f624a3b90555
SHA5123bf5f8de6a5bae50b3b286d7300383cf0fb1057336cd1b1568fe20cfc63e1d3045e7417c93f30f11ff212b592be32491ca3e456a4e463ba6bbbb4520adfa0307
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b