Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
28a55e3a90103f972700c46f1e163442_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28a55e3a90103f972700c46f1e163442_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
28a55e3a90103f972700c46f1e163442_JaffaCakes118.html
-
Size
10KB
-
MD5
28a55e3a90103f972700c46f1e163442
-
SHA1
2f4ec8c79937878c8ccc28f45e904263f2f02b85
-
SHA256
589707205a6d0ba2c9796cda36a8f0409cd9ded36399b8a776d76fc3c2ca316a
-
SHA512
1cb577e1b9636d4693bc1dffcf3164ee3065a366c8619e6079837ef3548687c8e2e3144f401789e68631b5c5de54ce57ef105b1837a1e57ea4d38bc72c2bec6f
-
SSDEEP
96:uzVs+ux7TfLLY1k9o84d12ef7CSTUpGT/klspO1usdBQSlVHcEZ7ru7f:csz7TfAYS/gIyN9PHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000005a26a0fd8b4d74a7d960c101ef0c55e5f29cee5eabcc54fd6cac471873b3d0e9000000000e800000000200002000000070e87cdc9818c22057f4dfe2824ccf21eb87ad342b63b7baad5cf10fd305a0b290000000a919f440ba853005772b085589bf2cea15f96d774c376fc2bc335ac3c0ba8670e9c38bf7dffd41d40d9e0ffeef21ca47e56d7d008ca5596a1fbd7f874476ed0d13bb1f37b5f17e9cfcbc8b7b849a120158d19ea115a173e998795a3510ad41eb94383c395429d470057cfb8274adbcd1b9e432ee2c3406ca7bdd4a4979fbb66728a62ec0121493a18fbecf04faa26b6e40000000d65f4f3fe8d6fc0e55114079a5dcbe5e246a8642db9b0a1714665cb6cec2890acee099b15a58fe1dada0ce669d5b0860d4c7d2077f4be8e04c3d1d69b6d6340c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000af2e5a95a1afb3d592509b27efb0d24ad13074cd677e4dfb75ddc5ff231b17a6000000000e8000000002000020000000ea5b43aecb8566c281f9e63d5350aaadb92602d432258d51b7dfec23de87f87c200000005b4aafa5c48eaa130a6407e0b8eddfcb6b9121e42d4ec20ac5d52979e530fed140000000b97db7d7f7cd7ed9c6e8b8720bb33fed38dde25dd29fe6dffd2049c88055c74ce40315b3a95462d34c0b21f5464324d7e1683e0a47842bf1de98ee06e785107f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D431241-3BBC-11EF-85EE-5AE8573B0ABD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a233f2c8cfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426448327" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2692 588 iexplore.exe 30 PID 588 wrote to memory of 2692 588 iexplore.exe 30 PID 588 wrote to memory of 2692 588 iexplore.exe 30 PID 588 wrote to memory of 2692 588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28a55e3a90103f972700c46f1e163442_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59167069c30ecb90cd44532c553fd201d
SHA1f27dce36698b1063dc6150adcea29316d2f482c4
SHA25683bc54eb2371bbd0d18a864b8c28bf444a2fa5fc363d1006851b1747871d955a
SHA512e0d67081dcbdc38de14ed3ac66f50456860c8267ca4fdc075484ea4ba888949d5e2fa12f8c0a04fb118d45c26d79ee93b1414fbef39fda5d4c20ccfef6f7ca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0224ba8903d1078287dc7ee8a9481a
SHA1cf6c86b391c10150c2109b37cc1d39a5baf42e33
SHA256c74389bd2581ce47b0d7a0f078ded913a68c342ede47e51fc99a9fb8573c5e29
SHA5120fa1756aa3e4bbd47e6187d30a4eb9ca5e4db0cf3a2fb7c5997dbda3b7a398208744d952594f94fad8899f172814901fbc367940a709d90c30709e95635cb65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eada7be33135386a73723643fa46537
SHA17fa92d3c961d13c741d3102dd76b76e954110e72
SHA256b28e028f0e6b38697b982586235170beeac74672c34057c0f06ad9e7c0230c1a
SHA512b373d714c29a5100ce7e5e9c7cf5c558c4c344bcff5cb5e8eac84b7e712ebcbd8a099a4546bddb5a9afda8bdf3c487daa906b725256248f982f7c4a6561688b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c5e6b8d32b124cb322e3b7173777d7
SHA11a0068f4084bd711cc195b6f21a65161be357d85
SHA256467a125f28d26643e8173054f30a48209a319b34950d3931a159ce7a3c4b7540
SHA512f324bddf2981fee46f05ea0dc28ebf346de671c96f9c6420e3b39ddee98070d2ee34075f0b951a506949bfe459b1512362291b8d5ddec389e40e9388f7c78d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbd1b5c40845cb21d6864e943541a5e
SHA11ff04e100e11eff3ae87d38f718dd50f5bafa91f
SHA2568c9f14a820c061ae54e444ae250449ad768acdf566a00112fc4a4c1111f9dbf3
SHA5124581741659cc90aa1cfb104c27f9e4624c20674c6fc79912aa3b2ce513bed1c69ce78613e1b2596ca5bdbd3fe88ae423d1e6646f90655f8024496b44661fd530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3bb57f7819495f8d911e951f74dbdb
SHA1399ff7d5243a6ca4772e1189f6354c3513b5f494
SHA256b1cc4e74ca83fbfe6934e3ddaeb572d750074e70ed64fe8e9877d87120d1827b
SHA512124c5d2bc59fa2a1a16606723b2d5e31e25e660ffbcdf5d45b56aafb2bda5cf423d3b8a9953b9c43cedb38a0d54a7372bb6bb49edac5ace46eade37afa8c38bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5262a2a6a4b6f90a3f696c98abb50d
SHA1e64719e7ea4c270f41a7666c9b3da20bb1381643
SHA256687fdd676ccb06cb58ffd0516a06172f6ed6acbd710230c17415fac1397b4ab2
SHA512ab29f883e9990403509d70e30841c9598294c3a7e0fe5362504a56cbc9d41a6b8a428f2eb7ca652b65b7f2ea21694ea54b74e60e56c3a292e25f8b1adcb8a626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5ced87d61206dbe6c0fcaf1d6a38e6
SHA1a25e2983496a726b5362bf0a1864fc56852b9e5a
SHA256266e001bc3152a47fc7a5188bf18ef6e31986348168ee8a1f6f56d7ac82f79cc
SHA512ef8382a1ddd01409efe6a86d2424e9588b5edc5e51b02500d2d865e935baab39e762dc4f4ab6a3cc2fe57ac8c4e021df076eac655f8084e94ec709fa4bdbcbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0f1515e41b0db44a482e7629a521fb
SHA16e58bc67202e5b1457161ce0349499d39157c95f
SHA256bad9aa6ebc930b47bc1ca3606b470782842f1cbc77cde357ad09be1939fae40e
SHA5126d1f59e875d82bc72159cfe391e81cd36b759119d2265884df20073d6fd843605451253eb11621b3cecd2e292b8013fa65a73a6ce0e592f4fe6dfeba23fd6558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57495753468672d953232cc6bcc1a068b
SHA1e6d4cc86d161bb71d13377ce8eb6885869d0b448
SHA256afcd10d360a62b8fae4060cb6ec5da6db4c1c107aeb5fa54881a63b1e5219df2
SHA512bc69cbb1126f228dc201895b7d25c149a9e8fc085ad3d7e2c50dae11be25a2e1ccb1d13433fe09c0a06281e859357a717f653281e1f8f733da8b771c1648e14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a34871b9e15c2ae4fb49ecc1ecabbc
SHA196706ebf3f97312d8cca37f419238e710f009364
SHA25643f5ff764a9920740f3aeb3e4d3f415c42cf88d785e3954720f03b71bfff66c5
SHA51277cf4ab2ce3521174d0f17180f38b467054973d5e33e654fd88ad8479b4e7cd947d3206de5a18baf0943521f87c3a585f59f611675accf3f583a53f984e07eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e801cc1dc1ca76efd8cd883baac02d9b
SHA12c06778ddb614b0d7e724a8b506f5a56c1373853
SHA25607e72c80ebd6caa07796eb75e645523e9ed9051028bfa37b18ac1f9274b0db87
SHA512656cbf74b51f6908389d8e6d05c7f7d9cd3b4a3957fca767b5432b9c5a0079f7100c3e1f792c9e07de81ab7b3a89bb33fa7bad903578fc7c17fae8e3da62e515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51132588faa071fbbe7ecc3b03fb1c1cd
SHA1f83493de4c61beac1f6727418b44b6d98fa8cec2
SHA2563505dee7d6c5ad60252202fb83cb7d1adbfe6e1573c16fdcff33269a5d9c0cd2
SHA512078bdcdbe97227adbec1d54cb6b9da62d3825f30086b3761ebb52b03b8e20d92c08fb5f1008d4bbfcb72e118dc9c9e9015c37411906c4fb0fb4f1074b5c151bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763e1a47b9e34eeceb16e701d24f40e4
SHA1875a0c1d66fc8ed156d3aeca1e018065f3a493a3
SHA256b804922b0f757329e332f8b18990f52c31596f69bd7a475beedcc481db0571b9
SHA512bf6ed9763b8a7578ee24d65c076aee8caf66cad3952c3974230f222e1966bf7a6868645017c32aec86ff3787d7db6e6df1d04ca472370a1f787883ffbf056963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be3880a35e33c59fb7e4f8b8bbc07ff
SHA136a1d2bedf131060e5b86e3e7e929914e1c40348
SHA256109b67aa894745866654f96c4a03bf81293c466c82857db1ac11dc4d37efa21a
SHA512907abbf9df175b471bcc60060ef4b7b2e41c64390e5e54ec004fedfd7eae0cdd0c389f3c4c1bbf8046ffdd789d2fbda1c0fa39677d0f1d2fcd647546d4de553d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1f3997d0e2ac4f2b34ef123dd3b5da
SHA196b8e7c85aa6da554a44c65d7c8de5c9f08d1215
SHA25660f5c6304a535837db2122574b71614e74ac271ed222111041c6b3baf0e413dc
SHA512cadd4f767f6634a5fcab3ff8b127fe5b29629f4028792d21b86908cbf46e357cca4eb2ba6acc54eddc98a028010652aab2c3f67bfc792694f4639627a43e408d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241cfb11cf275023e487509314133b13
SHA194896995acdc2c6e0ff970a0d8129aaea33444ec
SHA256428af87f15b30f35b8506fab04d6d10c57982b403ca1873bde015586f344d60c
SHA5126dae2618d2cc8f9147a3f804702ba918d782c37b9cc50a45e48403ecaf2679060ef171f91cdc928acea8d62bb2fc94c23d9070425527be6b909df0b470948117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa78e44565a930e0b88c95d58edc6849
SHA1d5005c1f2d0a1b21eee5f7407412ac40a6f8eb85
SHA256dc065511e33052e2e35f0b14f98651b9709f62e0fa992f7cfc5f76f54507d8fa
SHA5127a58505b42f65bffd83be3ef4e5f3ecf69a3fa6d9cdbf7b4c239a43b1c328726a4be7509b1aa85b793ca26c40d201e8511615d195998d0289564fee9a7335560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222c43f98a22d27f6a9e65615cb9d37a
SHA1cef3340fba23a93fa48de62b56627b84e55eb8dc
SHA2565b257a798a76beaed89d5e49bdb818222cb695ca4930d3829d8c34434d5f5484
SHA512a5be72c8dfca37bcffcac697b01dc0dca0dc2c56cb2b2dc5386870a5b7d9f4e2335444ed8ac1383021276635131a6a5d1f6b48618e4280e1b2f595e6456b622e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e567c2c430b2350579a6c248d0132f2c
SHA1bce119df8640b036b2abe4cf4c0f0fb41f40e9ed
SHA256c385ccdbca5b290b2265b1fe1329c855bdd1592ad25031b23240bc5b26a0fd2e
SHA512aca5baeb8390abb19b7188ef52c01f8f9c4d0880b9472c3ea951ad07087b5548d467435a8416056dbb6785906efa4411f85cc4b8c28c1d5e500f0ec20846fdae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b