Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
26473cd0dd032067b1b12ce6289477a2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
26473cd0dd032067b1b12ce6289477a2_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26473cd0dd032067b1b12ce6289477a2_JaffaCakes118.html
-
Size
250KB
-
MD5
26473cd0dd032067b1b12ce6289477a2
-
SHA1
1e84a6d3b752f36d65c4bdc7b2652fcb97771dbf
-
SHA256
dfc3e11b3d9acfe8cd05c649437f22d5338271925c540742d26002e8327fb875
-
SHA512
f3b45ac25ea63d8df12b0b832ca3269805f662d551cd4d796b68c35cefc663a1854035800d46e81c4a83a79dcf61d84c13c341f7c70231ee41d879ebe60e2253
-
SSDEEP
6144:Gq5NB22WnGlQqnZbAxVrlrQuyT5nZLrlKg3Ybyu/vRP/dNe:pNB22WnGlQqnZbAxVrlrQuyT5nZLrlK2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FB2AFE1-3A4C-11EF-AFF9-DA79F2D4D836} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000db0352967bb50d04e2d6b82051477b6f95ba3c2732d18b68379a84efc14ff2f2000000000e8000000002000020000000a6643f25607d55ca881b119e784c5152d96ad315bf7476875f274e4a6ecfa5752000000084472f316b35e8c1d7135c69e3bd80db7f469baba80aae85c159ef788781fc45400000003cb4474f54bbb0e6ff5d6c4951e9b8d2da4caaffae0913840e5d23023ed1e752b2c72240808b1e668dc6f47fc3ef7f38f13de8af962931c68eece76f8ccd4439 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000878dc1c6f7a13fcfae5a2ce34940fc30ecd516cf3bb34a8d7c8876757ee004da000000000e8000000002000020000000c35aa12949dbc7ee2989567dc374f0c4c36cd34053ced036ea9a7bab6ee822cc900000007675f3cfc1f092b1923a64e8912e27c4f813382253cdd8b2d0dfd2811b4b8d9f70bc9dd7631a4a2ca973075eac822041384b3f3028e076ede14dce433ed38eb96094b907870d7ca06c19fc17642ac28da435a1b1b134582ec86a07e94bead9d93f8a1f51a395ba377dc9c18f380592758476b88edc88795cc8145b73fa3730fe57aa7a3e7df7a78cbb1d0b10d33ccd6d40000000f81372801468913a64aada7479383c53740db805f9773e2d91d74a83fab9e6b1ec3fd0dd2e0f64c348036e401740c777cb15237c40afb666b2e4a34fb2dbcbb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426290492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e5757659ceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2056 2300 iexplore.exe 28 PID 2300 wrote to memory of 2056 2300 iexplore.exe 28 PID 2300 wrote to memory of 2056 2300 iexplore.exe 28 PID 2300 wrote to memory of 2056 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26473cd0dd032067b1b12ce6289477a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba185d2efbbf353c5077f608f516d471
SHA1d6f812a10d47ef6c1195dde017adac7fa4eb12be
SHA256d43d74ea77451f964273520b0e4cdc8922eab9b8e5522b093923e9c5211c1ac9
SHA512617e23b8510146ddb26a02778ca43276152b3ed99c1fb38b643ec873c688dc9b6097d1db580c1f92bbf56a8146ca6bef31852f41973b8abcfa88ca36722f2fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309abda81c7f2405562a0fb64b77f067
SHA1da9b2b22738eb9302c04d43426903569e728dd31
SHA25676778e1991ff289d4f37d13e13a24603b0c35e7d1000b56663ec4e6717ec8173
SHA512040b3adff0fff8353593a410cda30a2d45de133b79694a94033763e5cf48fad3e378ad111e38f345d6387800a11954489817488c020bebac35d9f2030e6efb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dfcdfc7a9f6c074444f5d381acfb7d2
SHA13f2f705557dd99e95a0b6317ab5c0910c8bfd65f
SHA256ef037f8c76c8d28d479432e14b2b440a9057a3a05a38f678f998a42d29ca5809
SHA512517ccdafae653ad3188379e9f2631b33422af26456d31897f6ee4afec7ae669639be6d36b7037ca4aed021ed3f2ddc6dd2e275e62e9f4e3a5909e0c2ff6d236a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55792e9755ff22bed6d0338e2ac21164c
SHA10f04a6221f45eb5f1ee5ee444856c658124de061
SHA2566d73d317cd85e7f65b6ea2a41bf45294b3bcc45c8a9126572fbfdb78c41db203
SHA51231e9b15c5b493b48ad7cd46074dd57b3f46c3e2482479c38bf5c90f44c1b490090fb5b425d2ec0902df793b128e03149b26344f35ce1039bf5c4ff19d634c7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52257646e6d7aa6acb9f4da6bdeb186b0
SHA1bac5adbaf50f6121e7fbdaa96f27406bddc65cdd
SHA256d51a66b50303cfb5e219951bedfc103342d8f7bf780cdf22e56ef4e3bd18933e
SHA512a5d795c7297f46cb992e0caae954b8153f8fd24832a6d5280e80e7a74cc42484e3081d261ddc58ec5de16f77a344b603313fa2ce45417de8bc669f03368ef761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a14bd3eb77823cf1a2ac61b4e992786
SHA1cc9ef5ebf1bc3e9b67c09122d798068b42bc1780
SHA256ae349d419fe6f4a1178e7a066fba60c048031d30b53bb957716f99edb062c020
SHA51203072c08363ec6737bb74d4d19c353162142f6618064c7ba16134c30a0699a4bca466a8276caf501885f8b5446886a7570568def4cdda7cc72890d8a5fcc3899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e834c9776cd8ad0efce1c53422d1e30a
SHA171b580eceb3df4c48e0e3a783aa8993afe2d050d
SHA256c8917b99fa912d700ae2133f570ac5063c68fa4abea55debd1887682d6e100b9
SHA5128262a64e7e7293c4f9de2272a52bfdba5a48c44c77be5265918effb9200f44eb38e61a8678239e1cfe40677f9548ebb04f056a43aae8b61daee6e0a53689a05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61e12330b41702a3e1e4743c5c9a261
SHA1317e4789180da8a54f5da08755925421ac7f2b23
SHA25629c8f4f7bb73157f657f7a4462971ae6e7b964fdc625cda4f6873e5ba8a17907
SHA512b070c18e5f60803e6321071165a0cff4adbab9f6aa9065fadc34ef133ce92e2a2aebb4c2baf8fed96f35ac026da1cd2eca13045642d0cfcb12fe9314f42067e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00c8e47c4d8dbf6909b29680e9c6651
SHA15d9586a0f2223966cd7ac4ec904552d5a3038813
SHA2563ee676ae1f4bf9f424efe68539dbb1ba7b2d58723a536e0aeb1248bba56a372f
SHA512a4c76c10c496313c5621262a8f72212dc7f52364010b661524cfc11c45a5b4eeec8fcd947ada724bce463898802bf87385c8eab294fd0fbc6feb5f0160ad3a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f3c1c8582a7b96bbf2f09eee198110
SHA18df731a197d975a6cd7c2bb2c537b13ee08d0b81
SHA256cbd2cfeb5d9f3ba341e3da5608229863a6a6ec263b967c537e27a33a558b04ef
SHA51231ceb5dd3cb71e7dd23af40003d49750158d81dcd4950f9a5f794d790e1a2851fde9a6fd55cdae24c7faadb894cbc2de9c0ee78d324bbfc16f77f289fc423eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22d021b5eaa14e2c7e907ec8dc6b2cd
SHA19eee250386a442d975100b9f843dccdf232c7abb
SHA256120145c176e1f2b2b24c1c51bc01f7f55362ba081ef7f07dec231ff74287a8fc
SHA512689d157ba8ee93320a48caac25a5cc2d050eb9b449fd453fa232a3637c330d55b775195a409d254920d1722fee2a4f4d3e86892e6eba2cf510c34be16e883e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f70b21edeacf8c0e8f8fb6665d6df7
SHA1af7014680e99da60535c0ccd708e487006a9d1f8
SHA25645aae88d1c944cbd795dd6bedfee709f50ec99dd9567ceab3c10624ff7903eea
SHA51212637eef9f1d33808e56a058bfed8f18a2359e6d6fce40c5e429a2fb565f3a87ff960863968423654c724c363db701f439ad0a6832ac0cee81e6a56a97de61ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d675d52110eb029b677a063c96df7b82
SHA1e9b6a79fe504720b1c0eb3ea14a958f4f40176e8
SHA256793d451cb344e870f95602062f5ca302699ccb4089823522c0b80cf1b933727a
SHA51261bffa540ec10d33cff496e7f5163814703735c0b3d94461762ae981c0fddb374360b7c869391cff9428421abb592cbe95c652d3aa8a33a92a82efefc8658cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f726444154eb1c18c9f951e7157c16
SHA17d18e1a30bea8949ba32bf53397a7f59a5df7001
SHA256c754e66e67f4c9b1394eb986abe1fe7af4ad9674f80623104dfcb20c8423bab8
SHA512c07514f69575e69646da247d8953d3d77f7da28d7a58f6c591397145071165e7d8d18d59ea746f625d591f748f5e61938e4df925230a70e1836f142955b1f5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5374a8962fe692741497262d3fc9080
SHA1ec5586ca278830fb9701114a99801cd7438ff0ba
SHA2567b897ae8d9c25fefa80c7145e47f2a07d85f687391c2e1acc9011cfd5161c434
SHA512c57e55e97564a65c0c62e08a4431a18132688ca059461568327806d2f2fcff52fb86292e871da816b89172ba6a05ef6db9dfd7a99bbadfb0bb243c717d1b6da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dff109f08243c9c1452401743a16c22
SHA11ea8fc1fc13e2f3e74596cc752ab431a18305c6d
SHA2560434882326ffba5588e4f5f077dfda0fc8f33169f2c4bea5dc87023d98e491c8
SHA5125ab1b99ef868a9e056be3d4b99288de7e3fc061a7cf27a51267fe6cfd0f11352a7844ff8009d899aaabf73ed3927d72db0bc30d0402a8e2ba03ecf3dfbd00078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503049fefe6740bd2eae6947e3f1cfae0
SHA1e478b24c5c843895fe3dbdfd5f30eae62bb89c81
SHA25654e4278c607d974110ebd7d52c8ea1197f6ebbff3daaf58ed3e629b308132dea
SHA512697c7162a17aae2845107675e69e14d7945f2d4dccbdce9c2a9c662b241f835daa3e004717b45694d6baa70c12f15c3343788b4e69b950e9cc4278aad4a5d3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50512844ff1d6bd8e52669e80fe4b058a
SHA1348dd5e7f28985e76f4fd8b02de35c00521b5c04
SHA256000dc702dcad26b728ff94ad2603c124cf3c261ea00148e1adca8d9788ce9115
SHA512f10cbae352de866825df89719b6c1124f20eff5274430813a009a821ac2a939161191d9831f4ac972e3cbf30e6d21562dba0a06cc608c71ef06f8f287c799559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43ce5f8b878f764b2a8feecbd815a45
SHA1cd5c4fe11ffc90b9694e9e650fb4b52c2acdbd54
SHA2568f0dd9ea53369077dda9a23d6b1498419a3fddce6e1532d21b41ebdc0cf3d159
SHA512654e4065591b1f41e86ff7d06598b1c4675c21c0b84c94491b2904d36272c701c97a82e3fa9a209919d27dc75600d9089863261ddcebe42a8f95235d2a004f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566995a03ada8cd2aba14ed78005a06b2
SHA1d55dd64110d5657cc2227e933d1ab48306b4c726
SHA25644c7336309eceed50f8166ec13efc5285e2afa948e0de0aaf21099ee14f88996
SHA512e7a9572fd9dbec3c9da945b049a3803874e62b0c282cc816169cefc806d0622eb574877dc4b76373069a042fc1360bfa44bc4631714ff26100fde37e9ab9b5be
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TNPG4FQ8\f[1].txt
Filesize40KB
MD5f336d57e71c3f29291c1c05d9cc3361e
SHA16dfbd68693ad587b196d0b0430286977816d3daa
SHA25688636dad883d7dfe16f63d26720719b599d720154dd27271d2817c95662fa3b7
SHA51265de2619a5c31a7b810f167f1b7ecf9ff732257017c3a608a3527df5e184a138d77145dc235d773d3aa19c8762961426b57a766b2c56cbb0ce28443073300148
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b