Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
c92e47cb19bb7ec47d4770afd4fb0777_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c92e47cb19bb7ec47d4770afd4fb0777_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c92e47cb19bb7ec47d4770afd4fb0777_JaffaCakes118.html
-
Size
42KB
-
MD5
c92e47cb19bb7ec47d4770afd4fb0777
-
SHA1
fbb2e34c3a9d22c6d3fcfea283651af3aaa260c9
-
SHA256
d8366b5a6059b745cbf9511c2b430cae008f6c599f3c1d7c4c576cc43b5bd598
-
SHA512
b12607119b07c2683355ed73d24b21b25d883f13846f626aca6d5c90b728d57e4b360b631d0627f204ac861503384baccadd2472b8eb244132c97386b67fa114
-
SSDEEP
768:Zcd9QZBC7mOdM4RpC5I9nC4D/pD5swBwowSDd/Pd:gQZBCCOdB0IxCG/ptswBwowmd/Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000007221abcc00499130e410584db58f4637f1dbf1b9a1dd85b1cac28d3229eb18c9000000000e80000000020000200000006cfce8c7b1a6b944981dd7b9af9d95ba943a8cd966e14253036323267d2962532000000027d4e70b888b3ffea0f6cc57cc4e47426470577dde37ebcd0044c521c7a5efa440000000d04b510bcb3e4eddb95314d91a90f5d57f16d9a0b89fbaf4a9a534f5caf14ceb1f3a6d727fd1194ef673afc03d3c5800d903fd6f2e001f13d3f0e8a81fad24ae iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05969f52ffada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000007e54053f7b4d7e6682ec21348b1150dd4a662a745c02e9d024068ac391cdb2a000000000e800000000200002000000080af8943c085b1754c7e6f41c1906ea7c24d5ca2330eaaf5f812d6e5378b9be790000000a82a926e5b9570d02a10733eabb3685e3efa43245a15fe4eaa5ef5dfa87c49c3c1b6bb6f6846223187aa30f5d4f96c8522d717ec2e8b4af6bfb19cd7429ee79e2ca427b7118e9199a862833549a3b40168b4ef8ec72de691a8058dacf65dbd18c2ee884f527a061481906d6a6d4641b7bb921ba92312f88ef14e43bae435cdeb4cc04acc739284c1313388d67f66887f4000000020b3310812ac804d0afb0e9d2f598bd82bd6b02c832af8d56c37ddc50366c8d9007276146d853355f3a900916d004375d1b05413fefe102a045cab461f282359 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB46C0B1-6622-11EF-A432-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431110463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3048 1752 iexplore.exe 29 PID 1752 wrote to memory of 3048 1752 iexplore.exe 29 PID 1752 wrote to memory of 3048 1752 iexplore.exe 29 PID 1752 wrote to memory of 3048 1752 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c92e47cb19bb7ec47d4770afd4fb0777_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5570aca9ee84b4e4b213346aa15d569cd
SHA1dd9e124eda93ec300126b5a5466e4c33da1adfc8
SHA2565d5f360acd057940f6975c8dd8360836f7d1886a1078847ea127a15339fc2eff
SHA5129f2f8ec61fff7c0e9f5a7678052b83f007535e29539dc3c45a500bb50f3827cf69d3a503508eeda42a40273002e7ff9933b1d791e86023967dfa4199fbe5eb89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5badd7f8bfa2c5fbaed42a695cf885afd
SHA124f60f85bebf04242ada694254638365104545ea
SHA256f117d4748e1c64592c3677d4ae82623d268a2d9e4813e90c73a15daef02227c9
SHA5128702a67bbd3b30382f461537e93d502583d0ca83c0a421764595b626f30cc8b960f0696400e05c02a23b117d3f42f05fab2c7445be48e7e9c1fc8bce60c4497c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0015698945acd8fc3ea498fe9f0459
SHA12f3ad3c117749ccec92b66740734cd3839f69573
SHA256ac49384a87a5f9fd2465262d509ef9f06d6f627e4b2a87a407cba6e0925b69d8
SHA512d16e4e5a5dc36268e38cb6f45353d4abc5a6dc6a9f0c5f6bba096d3ee97c8c469ea7b57d6a472272b98c1a9fc8a24f61d70c8e4f286ab95a8d140fe1aac4f0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7af76d5722737abe799b783cac9b441
SHA1845de3fb423f539ebe1d0ee9737879fbb051d36d
SHA25690a987799ddb08efba9dec4cde2eaf148a42d3402e6a4f6aebb155be5a551c94
SHA512c88a3b6d1aac30f7fec6ace03b2e0f397007bdc9f615343789fcf04edaa6c9d99a4111826787b850e74a1d2eff8d76c3b2bca4131a26c148fa7093034e612f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2938d704653fd7b3ffea32919c8a5c
SHA1d21cd807636071b5fcc65085da7000290dc40bd0
SHA2561709a4e00ff9565c9c97b1f9265292b52cca3afb2763e47d95bb7fecdd89fa2b
SHA51217cbb251a5a6e16c8fe0860add8043f56cf5eb474ffce2acf712aa89b5a3e33a6db8fe2fd31071c37ebc929f678e0d39f31e1b41d3b51bcc11c2f705a4d59d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585257dc013840b40adf150865b46a9d
SHA109c96c695560140e29460bb3fcd8cc195b4329fc
SHA25661d5f48b692e3c0a3af8f7467cc6492c37f7adf5bd06b5b2650ad5077cdcc2a1
SHA512e44106467eb6f99e997633053dae57ca62d6b851b333dfb3a97d6f3e76f8df4bec8d9bed99ba42f07ec21b51ea06c3fe913e178bd24475969de6621619779343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449c65459b2d4147f98574cdf47a77d0
SHA1b8f4bbb434f1b106f5fa3568c074c20ebb3571a4
SHA25640c511ef7fedf82352d3b84b8f4f7c4cb6c1b7c6489d8d6205f46ebe83f747b5
SHA512030e79d2eb8836ff5a3b745b31e09f8fc9ab1087c2c9351a934f22aa98c8dfffc3d2ac6dece309cf239e36a1ea7ae1722f6cd5bade00d4a96c6b43c6633d5237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e889739de171096154e35b611e27c34
SHA12a1c87ee19ded4b9d2e5f56dd54e4b5a5c9035d7
SHA2569b58940950d5b7b8a67b976506ca3a37d3d12e018203b775719f2e83378a46d6
SHA5128830b705ed18f595a23e240578f8af4e9e55eafb3554f92217f29207b539c5b85ef9a177ccf96df6538e02ecfb3278ed6bc23ae1a4fdbbffc63232a6388ec2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d84d2dc33e9826cbfea51a4b3899e5c
SHA1c8ca173415dfd351bb92ac4262258e48b9394a3d
SHA2560c982da744f7df1fa907a07ea6d227494ed1865db707b0adf91fac91ffd6d6ef
SHA512172ec448188d95c78e1dccffab764c2f07377a17ec067ef2407c585add9f8e8eef4cfcc3493a382a085beb1b6eb389f114aabf49b453a38f307eee0fda9de656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790350e025ca8b7b0f8426c5c2081066
SHA1ec6c44d252018b2d2ba0d3ef797d56004504e4a5
SHA256b7e886b76948a2658241bd84e98e377d4b5c6b5bea19bc8e7db9f9a6e4d73d27
SHA512df5ffdb5a9608da54a8c26e8e4310ee85f64bd1b909a10bce51e285c6a0d0d7289a6ee5e3e6e40a06d6c246b5f93c70dc9ac576348d27ef35d5f8d1bb49f7ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127408e57b80d57b36ad1ae16aad4eb9
SHA1bb4311261621db6a7194edf747adb0bb05ccecc8
SHA256027d84867e2b1d14b7d48edb89f1541134bdcac701cbb261a42a7e7a2bd80a0e
SHA512fd168c8a05ed85ddecbf2ae9774463825e0636a0a4788ef5186cb715b491e9a1b66027b642d5164b140b7b12ba1246347d58c2697454cfb848a46f03874948ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57539e1edbaeacc4afe1a6a55490c739e
SHA1a285fc0740dcf79eb8b5593e1c06ccaadbc38c74
SHA2560ff4012f74f882ff9221522db6b5a2c7b467f748620e4787f80a0a67695ff096
SHA512014d3c3e0af6bbf4f86aaea186159cb87ad91957376dd3209e3da55ed32333efa1c83bd3535cce1ab33418b4f72977be098c5e3dbac0cb545899bc7981a5500d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90ec3089584fccea7db5181536b499e
SHA121cd7d2619edb745f506bcb337344d1d7c701545
SHA2568acd4709ad6cbcb569eef24d3b4abe7345a04664c2b7ce92cfecf7eb0c41bf26
SHA512daeeb4ac5a0a9e896c347d31ed3c9c12e341c054e015d7716a7d44682879906ec053f41ff40489287fc5c30a940479de0b6d60af99d1b4e489d10635ac2f7766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fdd59bb11854258caf1ed4cadd1abfa
SHA1993777ddffc7d27df748f5b1addeea6555e78f42
SHA2566a33c1a9c37e1246cdd93da3e7ad21e1839599db5970bc201599abe3f9781717
SHA512e3e9cf7b33d21a55330281707f3656d9fb080c7bcc2ef0643a00dcc5a65009300510e43a1ac27b242b6ed30c9f7362ea12ef03632e1adf62fb5676542994c74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4342693dd10ef1fb037d0253f5d4003
SHA1a886ca37565421107bef5591c6766d9adbce05b9
SHA25618819ee13b5d67a11c6899fbd73045e7768f1f0f3fcc9c1ab3194ee11d33f3b1
SHA512fd28743c801f0cc6a71e23dfcf391ea2899f458934df19325727acfb2f3c8b4eee5c053c2f79fa48baa335865f7d59b71a22f36899ef151e19c88e56eeb4f538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e009e3118b372a6fd01c59656da849cb
SHA1dc72e372b33e1f0e6d904d597fe62a9d9298fec3
SHA256d5f3863310b34a71363f0fabe5b3c2af1631fde4f08a14ddf3b0e279e073f620
SHA512a18957c3e05643fc9f5379cab9c242f49e8ce22556c980973bbb5558bb4f5378fc0c9874eb8843a1f04e3439a44105ff35250cc51b2cb1aa0941d7efc937d8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d15e1660a4fd1c6821f29f555b106223
SHA1cac418978fb11728c597e48bdb4e78710d2ded39
SHA256b25380d3602ef5aa316defc610ffa101ca8bc0e39fba8413aa79bdcf0891da86
SHA51237123fc68527c6f63289974d8677bcb4d8ad057f96259d316bfb37d0a50403404526fab2734dd3ba62869780ba473fd27a421153bb76f672e1d2f45f4c71eda2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5accf51943149f858ad42c21b9dc00f79
SHA1d01c0a96a460e5c1110b87ecdf09026f9d997417
SHA2561fcf6108ec558472d697d5f7857192c0e022157738184d756a9868110451b51b
SHA5125c21166786b9dea36abcb4a109b4150b09a6f6e420a154b2fdcf69c5580c54ff95f3bf82ba4f1e45203776df4004c5e1826e4151deaebd69d80148ac04121a0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b