Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
e257fb97efb938a287fa337c4df31749_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e257fb97efb938a287fa337c4df31749_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e257fb97efb938a287fa337c4df31749_JaffaCakes118.html
-
Size
21KB
-
MD5
e257fb97efb938a287fa337c4df31749
-
SHA1
32d17770d1e85dbf05a44e9670bd4ce2045d7205
-
SHA256
fe3d6674903ee00fc01bedb9bc2d9f5e1d7b376bab7151228ad80d34c5535800
-
SHA512
2e1e3423ccc0aab4f2281329c5fc041f1d3bced496708668ec796dff98f808e42e59af40cfc893e5b746a56238122ad451cd0ce2c30ce780aad50f17bf155bb0
-
SSDEEP
384:VBUh0s3fbR/ulKsqqTZ0/exCQPmNKHYezzkANPAWn4WHKZyoFD+jwE/eRxLnk6PN:q3fbR/xlw02ZLLq3+j+uX2HBqbYyygw7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9F010A1-7352-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432560383" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2692 2556 iexplore.exe 30 PID 2556 wrote to memory of 2692 2556 iexplore.exe 30 PID 2556 wrote to memory of 2692 2556 iexplore.exe 30 PID 2556 wrote to memory of 2692 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e257fb97efb938a287fa337c4df31749_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598470d0a2a5e44f72d4a442b8461cb21
SHA1c1a298d3e4a749f323b125b869b74aa2342e6bfb
SHA2563cc204300733f396f5fdb8e5cb9d50bee64262ce587f0e9dcab8f115231ed4b9
SHA512ef608d9665de366ef5f0f4353693d4592307a191133daa94b89acb6f681ad212d6c10b15ae8a525c98a3436df274b31f68266fe55728279a9bb5377ad4e3b007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8274db4dbd328e045a1a7ead053a2c
SHA1004b74bece4d9233c2bf3eb00df3241e0b2250db
SHA256c744056261b18c50370611597765d0f8268d60006df5d771c2e7adc63f0bf0ae
SHA512c29c98eb40683c3eef7cb30213a9cdb013304f87d062177ea012f20c0c7a7344aa09b598f47f981ac597b818df4cf9434236534247506d9b4dda7d87cedf44b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34cec9ff11f9ed0ce0a58271cbe7334
SHA16ff9eddeec7e0274b8de25cfe6721ae6a05b9309
SHA256ce5da4da72b941ec724498dbf4d463f6e97d825a9a1c74da57e2ea54a4395acc
SHA51238944bc69aca307627ae20cd1d9ab2dbfb995e5b6e4e380139074a1a38e5fd2d1d632d5102b4e2581f6004e0d1a3b90246f5b8e9aa8bc9451a8e5bb8e84f6ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f44b991b3de913470b46ea4cfbcc80
SHA18b3c05e3edf38bd67d986e42f48a4b1c2fc966b3
SHA256a217391c73f3b720d756385fd6c1841a09f39434cd7702ce40600972fe510ad0
SHA51267eadb189b6a95a4f0b0e21464c6f2997b6341ebc3b157feb5da3b83e190cfe1f07b8a2a6e6fdb153857fc4defeaaad2036d14189d36e6f07d67c1121664df2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c070868687048331b0be4edc500668
SHA10410763db39dca68494f2e385a90f49c3d4573b3
SHA25610fe48235781a41209b202313e5fd3bbbcb7210e764ebe7b02210f5b54033e02
SHA51269b442b19bef6515a68b5bcfc1ba84156ccc4152e7efc6643ed4f8ed6b8b8612dce941fef7a3e6a1045d735f64b7dba6129e2d57342103e830a00cdde7f10eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597713339a6d4e6bdc95fe28d108c5a1f
SHA145de1e4d338bc79f276778244dcb9f48b0732cc3
SHA256251702d0a715cc5bf123a664e1a7333f33a0be912bc6e21b79ba8787b6ae81ed
SHA5126e980ce4f5f42f87b7095157a878988929c0cf35400ab468e8bc513f07fcabd3e58904d57c9440489d376dea48314c45f05a3d09df21f7a826e9d45dd3ca52fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0ccb4a489fd4011861a58d271ac972
SHA1c22e31b872dc65495eb3be8cb72b870ed71404bc
SHA256c31026c7d0f506a37f1111da13f6b41a1a2b849e7b404641ab6adc3f7cfc3f29
SHA512fc0036f6481c5cce212807e24a1f06a382251fc528037f598795938e17b3d42394d27838944f0abd5d8e2668b53634ca50d2816cd8f973471976813cb3de9c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307e34c5cead3fd5a3af4efa6321d1b2
SHA1d1fb9ef211691171442b7a7d48ae1d9d68e9a763
SHA25683809c83522acfa2d5ae9c045456b3627292dc2025b9379b5c5886c8553daddd
SHA512cf84c1f02f293c98697c4e60cdcc4dd7d426fd46c34bb30059ff2a85b07851f6490a82b728213dd5c7f70e8a8427ecec7f2b1558cffe6f1555728302a5dbcd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25ddfe5697bdb4d7f1a6c6b370e17da
SHA1acbd4d9f224af92f6d36738d3099fbf37af89161
SHA256366932158310d6de2466d7c1f6834b563fba518ffa679b659925b5ade8b7562d
SHA512ff92e0996e89be50d060a6cf90def54474a5ef548d612e07df8b7c9b45030d24903ab656f8e823581d396a8cf7467fdd7b096ada12af2e0ea1efb7f76ce87697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34eae48d57340934ee183282b5b3ca8
SHA12f0fd3c087454521120c9af115615c7765fc0c22
SHA256a3388a427c27d7d9eaa9a553a85422d8101d0d9155931bdecc8ccf51e1bf50a9
SHA51229f6f957dfb94a7443323dd5a9cc3ab8a671fd2e98183343bb2ff52cacd99e892594aed02c371df4bdf54954485a700970b682fdc9995b9c034c4807beb66b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dfdd24755b40463b8b9a2da71343905
SHA127c2c77b2384c4e31f6de6c6947f706f374f633f
SHA2564013ef26b3543028d3e0134a67e141a2c027f0155d312a5d8d5d85c5108360ee
SHA512806beae8ed850e52af6773f04de1f7afdcc48511f694fbe1553b1562ec3c85384d3536081aa0b45b15e1f9be4f48c5e6237edb4eb4637e4c17723915328475dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528df3d1da8c9a60a43c4630be598e23a
SHA113d60b9d48a541e9e34e1854650204b1a01ec2a9
SHA25673711a20a44e5e25588884fc64ddc0074386d4c7e126ed4a31a02fc06ef3d3c6
SHA51276e581f102b0dd793f7e23b26241b4b9334a9db8920340005f6812c936273e582cf157e568ab4da8ddac69cbd2e627718e38e2fd193c0b8ec4a8acf9d3dca3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b44e9de5557c3003e054f57cbf34389
SHA11b9a09a2d98a6af4aef6bab007b5bc411e8357ad
SHA256588c2fb69b5788b47984e7b993c075f1436d51ea20d8696a8098be46d7e7948f
SHA5122d3a8453a59e8e1f769aeff5477d73b2b6a5064370dcabf04637d14697884daa11b721fb8a2d33d59041fe95b0ec10c5acf223d6865a024d317c13d71b93cf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c26078962968bd2e40bc803637f30e
SHA142701eef675c6aff159fb85ea4df85139a7b9a92
SHA2566d863b995c37d232c7aefdd4d3f710d981762b9095fee6d0d9aaa11bd39e9e92
SHA5122b12af8e05076e57e361f719cad0d5c2095e0dcd9f721c72d164c3ace2f941d585a66c19b7a3a119481b38ff517efe9f3dec29580f87103595fb4b0103fb5d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf62a68b25b8247b84136b0c8595bde1
SHA1629ef7d256cd3946aa890d046e762521ddb2dcff
SHA25687c8ef1d35b031e18450be0c763c894f1cdcaecd74188f2b4242ee20fdc35f81
SHA51218d7042d96b5ee301fabd352296493bdee836976c25643582824398a61844656a793292102ec54ec2c3612843986cd9430cd8a5f538de22d52ca2eb034919b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cd33ca26a2d8ac5f7dd138c39a2eee
SHA1fbc33b6ebda908a498958f3de87ad598aa20482e
SHA2568c103549a44304bc32b1f727219498c51f5dd05c0c412b3c5672cf548d1edae5
SHA5121195cabd20dc0603d78ebc6a016f4f8ef2d98951634380243d439c24a5e4eadcb46bf9f3ea879c78579226279fa015658d6dcdf97b1e4998559fe55fbb8538e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b24ca879cff7fbef8a704795763ddc6
SHA150d63b16e929f15ad57fa828a27e7562a63d1c0a
SHA25686e98b9f5df123a2020204f05cbceeb4c9057d7e900f32cc73ac0ff361a7e14f
SHA51293332d49a082c079c4c96c42bb1941b132e81091639ff8140d4397ad75a3df7688868007298c8f71f3b5adca98b7cdeba18fc0f38f1ed94ebbfbd9106121e564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ccfed2becbabb85b39a426b8e99cd62
SHA1335a43c0ab41c6152324ab94bcda518f891e9bfe
SHA256bb828fcfdb18eab45f07ee6811e511f5f2a208f2330722205cd0a6cac240ac91
SHA5126196ba16eb60ddf6ecbf0689200c1ef4776387b3aba73beb457d393889a1b296ccc199a8dae6cd46241f68c3d9ef89c068d846b63ae140e0fd30e9d7b58ddce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4b05221e180be65f79840a81277b08
SHA130b99260f9ec9194bf2e58780649172504b4fda7
SHA256e796f831552dc9e4caf225e4177b839b5e10c33c8d585e8a919917fea39a40cf
SHA512a6b67da0e84b5cedd3426b89c3c7b9a40109a7ba82983ae4cca26204f8bfff511c9f4dee78da971105553db3bc544049a4379757afd237cd1daa69a58e43c20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ae61527fb0ad2d43124131fdf62dea
SHA1af911c982b05b43d1d63f02648987949f7c63e63
SHA256e070fce5c685f695757c9f051ed184849eac54e75b695218b7249d39a83849af
SHA5124de72b59db5f41e150de50b9d5a7d64d6eb8bb532ddddf6852547338d307a64975703a67bce116f45d549b33cc9a5463036c14c70e0d8f6485ea093d45545cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7ecfb5823071c80f0d7c79f973f2c6
SHA10c09ed0bee46c49fa66836e78bf8d03a9439e5d6
SHA256974990ab7d4133114ebb0496cfaf64e0512db3913f5358909ae4cca1741e6775
SHA512bb207bb5008998c9d77a5b6c0e33b573f1615cde247f7ab3b823be0f2fe7c3be98ad3bd525a98c1c8159749673098bca3395e308068f6975c0958a17da9a22b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99c67ed9155d42666b069aae14a82e0
SHA150a4050261eb45ac342b4dc8d0edcd2f4c709891
SHA256cdb57a69fd47ac747940647d5b37cf4efaa59e356c01b9fbd6f155fd4c87f0b3
SHA512c5d3b209410a32c5952f858706de14bd85292dc27413b15b055292f39ef0b670d511f156f61f92c58e2f9b164af303fc73b898a70628b9071c93212e368e16f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0e4f81c7e4389ba7120b72ce6e7731
SHA1630e73a361721bcb65f66b5f426abcf5c40a80db
SHA256264138284526ee2d92e101b47f0c286f5f825dd0ef7e27b9b866b826116bc660
SHA512b05e761f7a60e5073e3cda4e927921f56616f7e2c039e1e42bdd2fba25c7144fec4aeb1acd1547494bb77856adbc2fb2eadaba7bee00c5bde5ac1232d7cbd873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ffd6fd150cbc069d819273a712bdbe
SHA1d9aee25b9b25e75124e14a855938229c94a81037
SHA2566291c3757cc6b8f1754e1f3c63a9d302e85ade71f852925213ba52d547c5db1d
SHA512984b9f93c7b88b5806efe33379b1edafc6a822d89301046b6445907da6a45790cd350b786157db1f0777d2ea72ebd1a0996f89453195fd4873b5d0bf7e89f499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745e23dcb7d3df7100b52895fd48e987
SHA1a899c452d15140b2f458440d3117598de616d088
SHA256a097ac092f82df1c0428775bc75bb8ce8aadb872ebdbd290a4a83213a291eea3
SHA51230d7350004d663e0c096d253e8dedd9d0f0721794a04494043e6367866ff35328cb3b80e970308096bd643d03439fbd440b892ad066e22de869e2ac17b79ac4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d99467d7353c4d91f561c24577b8ad
SHA1c2834c041a917efd165802b5ee06e1bfc686289a
SHA256b09f0db20c8fa38a0107c4025f2015b7ddba82e2811c09771f2518783f044ff0
SHA5126c4d108b83e64844b78d2552d8fd3dec959fcae5c54358ddd4edf1f7720183f176e6c9c63bd44e092352fadc48d9ec17d05966e222dd1337d07471d45314b8a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b