Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 11:48
Behavioral task
behavioral1
Sample
2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe
-
Size
192KB
-
MD5
2c39bec8c8e722f3fd88f4399c57c33d
-
SHA1
f63a2961cb9e30fc563c4b4c787e1ae999e4f385
-
SHA256
4911fafab6f812ba73c1241f21334357d6c517cf8371929ff6d65f852c1fd190
-
SHA512
447f79562ea01021697a978c8f3ffd66659fff2fff3bce43420245031a10ff48cb4218b7811698da5bc19ff48e999808f9a11919b60e3dadfdd2b1316acfbae2
-
SSDEEP
6144:C9c/rU37danXPaanCVu9CuU67++8M6/vyp:siidTiCVu9tU67eM4vyp
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1944-0-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1944-2-0x0000000000400000-0x0000000000485000-memory.dmp upx behavioral1/memory/1944-436-0x0000000000400000-0x0000000000485000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90621bda69d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426627377" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE821C01-3D5C-11EF-B0F5-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000043dd8b416560cee6ccb8b91d1b6238b1dc650e33dbebb812c7666913e5cfdad4000000000e800000000200002000000077483fa44ff7bff7b75c8c5f00ac2f000e1b4cdc0696115e6579e9a1ab83239020000000910caef136b02d1b73365381e9ffbc14605ef1f127b248532aaf6151e516fe8940000000f760a24c3c9919d96a37ccf1b15a9447fb0211b64d9a965d44a0789e0dac8893e8e386019e5133bc0117193e6ceb827b9f76aa36720655ebee2aeec64271ca54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000db9c1f082c33e0b2cfa1793f849ca28ee4434e9f7b7916c8a019c22267a943ea000000000e8000000002000020000000a5cd05dd6a03b72e3ebbc1d450c5f39fbd188c267a56c3857147e621338a5bb690000000c32581317abf61b317c6841c5a665916634d035c02b2f305e2b29e4cfa9abb957cf1045443ccbe3232cb5dfdfb0c8418bf5fe7ef25d464b073a5710d4b8150d91a5f3ec50396dea63fc74f6f1a9b0ce9a9b807b6e6e3b5d9e176175916dc5dde87a28a335b6a3560a88c8f3d9d197e74b35161ec53f852e9b7f14b1f6b7bbad9ba45322fc25d5e2c3f49889fdb45c9ff4000000014797710c54bed752f73339c3b730eeae9d2f82139e015640c3ea30c46d2e02dc797a8386ad36439297e56333bfdb11c5fb7ae96180f74c16fb23eec05f0e341 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2144 1944 2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe 31 PID 1944 wrote to memory of 2144 1944 2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe 31 PID 1944 wrote to memory of 2144 1944 2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe 31 PID 1944 wrote to memory of 2144 1944 2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe 31 PID 2144 wrote to memory of 2640 2144 iexplore.exe 32 PID 2144 wrote to memory of 2640 2144 iexplore.exe 32 PID 2144 wrote to memory of 2640 2144 iexplore.exe 32 PID 2144 wrote to memory of 2640 2144 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c39bec8c8e722f3fd88f4399c57c33d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dogguie.com/2007/08/30/fotos-fuertes-de-un-accidente/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f3fea2eac5da4a3991c4b9928f0e0ea
SHA148c525422786399e31bcef2590475ec3bb49cbf1
SHA2569f8a3a9aaf808412d46a9a251987c304aed08863c54b363aa326a30f502890f2
SHA51297a1eb2d4456b08ead8ca9e2d7a8e97a558d3a4942b30748ada7389d1305a075b0de8a96df6d4908c68f2fddd26c8288df7be2d9fcf7a6ad784618776b3a98ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e793a20ee1bcdeaec47d8891d924b0b
SHA1bd62d2c8b381f74e42e4ac7e306970245d70ef5d
SHA256333b3821ad368f73af09d6df2a83a25a2260f762c42878fd2c4b50faca54e50f
SHA512e1b2d6b54b7444881811a8682a2a8f16ab9a864f974935b72b64e7126166e1545c3bb43e4603ef7f3774e5e5c340388c390642423bbc8eb1cec78d33631a4704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fab9538f19b0726d21c8ea6912606a44
SHA1a9ff38a9d24c04dfcba9cc9a89f8ee6f61b6be03
SHA2563c90c2d353905c42680fa2aaad5a70673f6b91929cf32629ef76b51ebeeeaa83
SHA512b71be94bde9517a178c0409ab290e0126d1be757056bd2e9705f21cd3ef161c21f5ed0fd5fa4da0233dcdf52cbe4ec19373f57cbe228ad185adf622e90c4f334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5504197b1aaf54a20b6c3e361014ec436
SHA1a94f5626e017858643a5d20b2395d75d77593a66
SHA25645c5eef21c1119fb8d321cba82e88dbab3eed0b157adc9f89bc1d3a6d5bedde8
SHA51268635aa2c94fd44a32c74551ece5584ed0af86ffb95b3cbf5736611a0424aedc81bc3ec0c9ee5bedbb7b55b78bba0d2e5aceefea1365fd1d6745a3cb8278ef1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e17b21d4a9932a3f05401613f907137f
SHA19c94695ed346e5bf44b7526d7f82c9af7d1661b4
SHA25696d8d6240a78c28a7b7462682f7257e33d59fa37ad7f23f98481d0e6a9f0e42a
SHA5126649d14073f3e692a95a33795ffbf18b0b909904cb699494f587fe79cd9bba5b6c44c54e118ad2857e775dba0590b933d5241587407c023addacc72dfa376c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e1c8a529b1bffbc7af599e33314bbef
SHA168795abc03e553f44259d51d31cc689b7004a176
SHA2567ed3bf4bdeb2afeda77867d4eace22ac3dc59b244262bd99c51941bc3e302d60
SHA512d2ca3249aa783f76dd3a0b5c22e0fe82cc4d953ea9e8296d4dd9d078a3835a66f62e2415895b906ffd5db33ebabd07ad496322c323fb73ab0f26a322359f5c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8d79e15416cd1fa7a1f3945be943040
SHA127f2e5fbc41d01666097b092e2a048e7eaf0ea6e
SHA25645db5147d48315a9a686d733d885dd30b67d666763ebe7292c6fc37e938a6173
SHA51204fd9621a77d28df84178485c3438cb939cfafe729bdcc2a63edd1627bd44225bc3900e445afef0e9f4dd02a3490f2e5cc497165739e1f66c78fb05f3b37de1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5338fb93861df25f87e1cfc23c75d4c3c
SHA196f25be9c528581d445111e9181072530362bc9e
SHA256a2dcf48d5fcf450aed61b9ebd643ac0947a96aadc1df2b152fad6d13a2325834
SHA5124f955bca389137fee2c5b59e84d0ee519d9f53d6a91036160e5725c181db4b6b1c5acfbb080b898898f9814ef6fb1cc53af6edbdc961017912b8403d70f6c743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a12f8f4f093ff1926480889004d2c33e
SHA1395bc89344260f44400f101a37d0e3ca9b13c519
SHA256610a0e3192b682734112975ce8af95dffdcbe70aa66f6eeeca54374dfd71b506
SHA512461821850ca0304740781f9f433ce8e2320c0dbab26d3ca68371c97feaa3ff7ac12bb01af3f8d77b6a9dcf2189899a022d8191c52a36e701c2b8505ce3ccc105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c011ffe414571d81ac5ec7ec3620f983
SHA1181402124166c11fe41597678198ddffc30dd59d
SHA256d1b9a5ff8ad6f2debf0d2ccbb269eba93f43317325905df158c08aff723dd504
SHA512204f8f03d508acb45efcf3a4834b0210f07c69944acfb8330cec02a666c0b9f2f4f34421351a02810fcb90836ef0c6561717ebfc978c460d0daeef05e05467c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD574c43d6b0bc9284f1a2b003762b710be
SHA143644b78c63dd683c371a3ec160e862ab0ccc7c0
SHA256f8b51b6dc5ec98fd0c1b6e7a07f7121e2abee1238be79ebfb4e79b7cb83409b0
SHA512169bddab5c2266988eb7e2c3a3987083b953e31a2136ff37c978ba5e4a71197f0980764fdd2613ca1a6c9a3837495303bb0753c3b728218192463969f28fb985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a5d1a0569d4822e8c673677e880918e
SHA15b6254d0e318ec7c1f9960a9bd60880a9165d1cd
SHA256b78131ec3331283c61f476f0244038140dfc7284467cd0c535152192509fd915
SHA512e6f966a8282900de20df14e4f4b6a0bc0ab3e7dfc99a16c1cd6f8ef42592fb717351ec6b272ac1272ec5a71243e26b1718062cee32a227937a63042504abfd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b35dc37a8c1f2602366bb30a121d91b
SHA1c278403b75e022cf1fb09b5b6e9a8492a1aed726
SHA256d7dbf470ca1126b1e8e2d8fa4da281d7db1edc53e2aa60afcdc86bebcbd671d8
SHA5124693cd94614826e7957fe8f99cd43760d98eefae5ccf38cb7fd337f420e647a3a27cc6c00c7343a1405c2f00eb40cb08a25ae91f07ac420567617f7d7256ea71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de9ffdbcfccc01f4418cfdf337e0fada
SHA1789831c936d160ea42f2f1578cd337a7017945d9
SHA256734c2e3ea37b50c01f9945f54e8cc11756246a71a0755e939663149323aadb8d
SHA512292d5a0ccd2f56b30699dc6226cd45f0f9f8d43ad311c0cec2be354428e1ff3e944a2a557d0f5285e4d0e4655e570b6d71115941488bf11c9a98bdcd5668f115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510bd50848ceac9fd3dd78cb1999bb390
SHA1ea7b0ee27c80c871fd9c466e2782647e72ce117c
SHA256c796908578026fd94780e21a9b743394a93f5900cc059fddae886ce9fba0578e
SHA5126aa50c061ddd3075c47ce2da0b9134dfcd06130ca4f3b80cc0d1cc99846a3b866b5c0a224b9bde74863304d3bd01371a17ece01e38ba6e9d183fdce565d72495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531686efa028daee367b7cfab66d15e4c
SHA1cf4e33e00f36310bab607cee30c579af8c1463f2
SHA256f1b7ce64f7dc8420b561b4041881f10665539644e943d90f238deea787272ae4
SHA51245e940cfb1bc7ebcd0b179b1035ee3ced02bec3ab84de467341dd9f95adb2ecc96eda2ba9aca8154e7c53031b2b6c09ab7e357f6841cb14db431cfcbb6bace09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f0ac9b8a875558c10e0e320deaca971
SHA1713029d97e4163fdbea5ef93043f103be6640d4c
SHA2561e6a610098231a52877e0725f480e619904a8dc5b2bffff26f86ab82f7eaf846
SHA512b1e9caa210d52eea37f982894b624b9c60742df73fab15e114ff904a1d7c4d9ff835f29b374411ff171b244c2d824c159e8e9cddd22bf213a39ca58ab72b1439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD537137328b81a2820e49c3bbe7c4317f1
SHA172113ac6fea3c44c410ad566c497209c23b7cd01
SHA25633e4fbcaac5397c3d3c89ee9893e817e52837a023b76aab1d3df611d12dab9b3
SHA51293c62f9596c2410397b448bec6a7b6cd762fcb6c58c819258f2d922adb51d6dfdb6f7bff9f488b51dccf9744272b8e7f02ab70c627561c95ab03bc45d26400d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53da6fbf517617642df3d65037729b900
SHA1a62c1a2a1b39cf49af1895248bbacfb68c8290fd
SHA256c7bfdf25938f3b993a12f060cda35f1aaddbcf926d077595a5336e7bab1bb3d6
SHA51202c2fe11b7a26b6d6a015c6106f4f08cbb288438221348806073d3eb50ad9d71eef8d2a639cdd2074e2a1084fd0177ff0d031c57778669d2ec25891f4f284f74
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b