Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe
-
Size
208KB
-
MD5
3e29839f458ead98f406b4a3ac96924c
-
SHA1
91bb2a7a796f0001e1e5803fa9e5719420d832d0
-
SHA256
2fe4fd385c01c93398f38139498e55d2c93d925852a56d345af00491bfc7b18f
-
SHA512
019f883e46f350b70679d44a12686f9aefe98f6b56e2cc00ea9bd335279bd5b034c58d6359fd108d8980fea56da62078d0dabca651433773db307ae9431f9620
-
SSDEEP
3072:lKmim1Nc0BjKT5PXnaPLJCLlSOHFxr1OqKAlTkLEtTQSXhOqRHyKJ55:wZmDBKTx6eHHPIBhcLhpRHj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2084 set thread context of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426965649" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98A51831-4070-11EF-9A38-5E92D6109A20} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe Token: SeDebugPrivilege 2780 IEXPLORE.EXE Token: SeDebugPrivilege 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 2084 wrote to memory of 3060 2084 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 29 PID 3060 wrote to memory of 2908 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2908 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2908 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2908 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2924 2908 iexplore.exe 31 PID 2908 wrote to memory of 2924 2908 iexplore.exe 31 PID 2908 wrote to memory of 2924 2908 iexplore.exe 31 PID 2908 wrote to memory of 2924 2908 iexplore.exe 31 PID 2924 wrote to memory of 2780 2924 IEXPLORE.EXE 32 PID 2924 wrote to memory of 2780 2924 IEXPLORE.EXE 32 PID 2924 wrote to memory of 2780 2924 IEXPLORE.EXE 32 PID 2924 wrote to memory of 2780 2924 IEXPLORE.EXE 32 PID 3060 wrote to memory of 2084 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2084 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2780 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 32 PID 3060 wrote to memory of 2780 3060 3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c2e71d8a761e110cc83afe9ae0d13e
SHA16c8cd2a2b69126f64d0d7d95157b57183ad5c9d9
SHA25616891dcc876b97c5d1c1a47527e9d0cfcf2eaa48369473d5ed6af6167f5dcd75
SHA51244653a3a4f453a0c86b895f2017ea7a1c7ab07ee3849042939f792cda40cf66c132fa5bf147578d26b9b091a08cc240a50cb810510e70fdbd1ac478deedc37b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58edcc3c36602f3e3b4eac188675d267f
SHA100648149290f306ee3ef5295f309b2b99f3c4efa
SHA256a41703adc8d1bbd9fd8de959522ff99187259f1df39ef475851f65c7f2d5312f
SHA51291d4ef58e7dccdc77d6ffaeb674f91cbf38ba8abf2d98de9e3575f93b278790be511dc037dc472791258bd01394fa5d979e6042cbcbcc47c1ccab34f2e575fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539be36f5232586fc80e97d7c06ee1ad7
SHA1fb390376403c4ff6c1065e3898e8e65d11140812
SHA2560d5fba3f15c8eef89fdab82e478f98876c9b6bc3bbce5e563a7d0e348ef1e19d
SHA51283d33787a0a3035ab5e16c1e73de3e1392fe234ea14500d6446707289ebe1bdf7de40fad076183aa3b4d0120915a53ea99ee1ffbac9b058448ce187541e274fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73a2a960d69a7b43081f7e757a6a456
SHA181c0830a55eb3c42cf6571112ae4042f315143ef
SHA25657d36abd1fc328fcfc3af69532c5df44801d862ae40c7a819a2d253ce3fa21f8
SHA51266518ad7924188433a40de85d334d2a158d5d0b706998eb71e0812c4a579908df3597026143a915789b53d94802b4fe8f24a8ee269792d6d25a0cec30a3aa209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c23a6781ef8d04010660bd62401250
SHA12b376805272ccd012e46b060f2a7288eb735d2e2
SHA25658d03758bd036082b8fc36ebed6e0fd40df6c95318a444d541e3c340c5a23334
SHA5121642d06d0196600d4e678f27cb351186ca64e3c5f22f45b155ec0846fb39a7be9ea594956bc03b0ffd5c40123bd564cdee8e42f628972b2dbf0c6fed5fc87e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8783d6ba1845d1b8f6b1bfc3f0ec5ca
SHA147b94a3951acd8ee885cd48d73cfded3edcafbb4
SHA256047bcf84437df918edaebb51f32229fc8d50cc24abb0d9e090f0391e0bcbd365
SHA512d7b929ff58d2afb06e5eb129f4741124320bcddeb6fb4fb9e568014b1477e6839b9355c0dc6c8cfb50fe09a4b4e947b067d976d1cfdfec78896e7de66586a2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51730cc0ea6f456cbc67d3d7e478f50b5
SHA19e5b8ea1fdf56a262f588b3a1355181146179187
SHA256e8399337ec53437d974f338d0d723f15b03b1a02e42d7e38dd85f81424b8148d
SHA512274e1cbb642797a78095bee3d14f1c8dad9086fa4f74da5be16040084b9cddb7dfa0a22ac5c08b9769c603bb077ce502678e5ff8bc2272725ff38934c48900f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8633f875f4f7b1be83cc61c000a549
SHA10fdcc1e6300a81709a5fec8127d7671d342821fc
SHA2564f8c4fd94873f117235396e2b42ab3a0fe417cee28d6698f8c2dab95a072488b
SHA5127391b22b0bff7728b1cfd3510d205f0139a49811077d286a0ba182c3640fc9199b2421fd8d2a31b4e78909454f31de7344f709b6d336e3f21930f5ee82e484d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53223231de3b7ea794041a474c344dea9
SHA1ac92f16fd1814e9a3619bf979f370d82f6e612f8
SHA256d6e682faa6faea405fa6d3ac471ec7938d7765aaf866fb33f63b8bd87d22a2a3
SHA51230904f43f8078e43df7e177adcc09f09a3ffafdf03b1f4296d02892ba71a4ad873341876199d9e59ec1aacca4887bdee85726b31e58091cf6db6db05688b4ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37be211ecf73caa9a27eb510923c912
SHA125b6726102f6a39c3d6ee26662f1396e27cec011
SHA25620f10300b4c7931f4cd12434b6ddc39463047631cda3deaa7903b34b37cd5c53
SHA51247f48d9e6418c871295683d07745211acd56ff0925a571dee9455439081fa2c69debefd1c18e07a94076fef9f13371f57ce8bda4aa783ab8933a807bc4b60dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc23cb0a1b2c20f933664a55b0c6b114
SHA12e9eaf13e91d384faa7e50ef81dd0b6c238d1d3c
SHA256ac78e32d2415cdd90635e01f4dcf3d4a46eff82ef66c3629ce5f8a94d5d88828
SHA51214047ac868056c138ca12f6c5b846f0a5ad879a911e7af385c79b65dfb65eb4727a662eabada18e909f8c8c61232b1d21fd62934eaccca465155cbc02dbb2c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c79d09813eb14194abb19e8190a0ced
SHA1fb3534b6fc3b7629974ca5778173751921019f1b
SHA2562f85c4521772bf7a08fa96dba5db7f1aea5c8c97fe4e7f05186023b666fb8148
SHA51221e85e693c7ebc7b36b365c7d95b0d203d7ba9cd3cd3bdb4c2fefd0beaa6acf400c0facd23f4a7be468f9880287da49d7b55c3bcb6bb381b46937e72b40e6708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd059f8f4b9c49a68d38f66e3b5d3a7
SHA117662e60e3ee767af375ef9ca9571a09e839aa0e
SHA25679b6b8f7905ac8b7fe3f617c5f5ab273657db710830e5e78e3e325d0c6a4ae33
SHA512ba34841ac100437bab1eefc62a65337853b6a9fa70c7345ffe43409d2923f3361151f67720239ff185cf5ab6fba45c0b9604fdfbe56de95be58e3d52eec7ec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58440236584f9d7c041c1fe4726d49473
SHA1d714f412b5b3a2a9879322fd41a2ee62aac238d5
SHA25687cb7493756a0d8c128e8808b8603b663c085d209fcd0b4e7c45d9cc42385fa2
SHA512500b82fb6c57d439977095dbd7ce1da0817ef743d368778de43cde252b4a297a1913159d5a014a06db43d53de0b962f49217f809031729d44951a146ee3a6814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56931d3860973ebebdb43ac87f5eec7f9
SHA10af4084256af71c38afbf95262c4fda589f2df1a
SHA2566e0da48bb55b45a9fb1899452bd024d70c1670c944b4c9c5cec29da72ab1d5a9
SHA512db019d67bd7cc484fc86252679bec69411610a953ceabb9edbb53e73e43f9bb6ad605e8319a400fcfedcfaf51f10544d77f70cffe4af3426cff247c3ad388c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f776b4bb0249058a2d5cad92bf3f8001
SHA15f2c4f18d9c45fcec2ee512c073fe035e77bd6a6
SHA2560c7108bb5568d31e40f0aa2dcddd278b80c2beb23ab0dfcb89deafbf37b1baab
SHA512cc940553c9e2903aefa3dd52e1fe5380c73ab94e1cedcba51b68b598c886898b99a26c91f2cdd75962ca70c6c6fdddf06af76e3b9f4f647fb6236034509838c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdac886991399239d82f92c296e7cad
SHA1d1322043d8fb15e16eb6ad2b357fb44b64aa2d6b
SHA25682cd0981f4c3fff5353db25b9f368e788b9a8660bfb075b8892ff8cdf69c4b65
SHA512f9136bf0d0a400998b2feaa64f3df5a4c146919ec3396a9776f1d72b9df0a8071a76a1f5cd452e51f8d6db70595a4b67815832784ab3316bf36e75d85627cbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed6f67a4c3e36551bf3b13ed47be014
SHA1f5b1abf1ec21960d6ba9bb6ca10864a719a904a8
SHA25652ddbaddefdc4a58cd059c7df990c59fef9dfe8f52b5eabe60353cd571ee8ad9
SHA51295522f8b17e89bcb82c9aa342995ff4bc6a864467fbadb4bf5135e0c532e28e2a7b3c4ee45103173e5801f433bec01028dc5f107ad8f030ca845dbd9ba5e3150
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b