Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
fb96f8a029f14738404fb5e37ab9bbf6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb96f8a029f14738404fb5e37ab9bbf6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb96f8a029f14738404fb5e37ab9bbf6_JaffaCakes118.html
-
Size
2KB
-
MD5
fb96f8a029f14738404fb5e37ab9bbf6
-
SHA1
5d570c581ccd44193f2d128f9a817b52ab4e2ca8
-
SHA256
6fc8eb9701fa20f66228bd50491c404fe29ae7c3fa06d0e9924b349d467b40ec
-
SHA512
04a1be0a8fcf061a4b69f71a43aba8762f71a74906ad65fb5d9fb2318ab33d9754b298df73b7a5f7134fd33dd7e6932723f3f3bfd1d36e975b80986262b45a97
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0671f5c6611db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87A57E51-7D59-11EF-B939-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003fd143da33625fcb5c9e2bc77f68481b1954436dc034e68e40e8bcde06d5187d000000000e800000000200002000000025e1ac2c4b8f8fe780d1d7b0b5bde035e48823baffa45c0c0bf8317d0c7d0898200000002c230c2a7a9bb8b6751d64c7d18d9137f5a910ce0987c09c43bbbbf790a756fd400000009e62fd4565898e35308f508b4a5f88988bac9d5ca70cbde37f171baeaca77c611589224f2aadb15efdc116d8d735e99f331af75e936996f1bb63e71e5ade2c77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d1579a7471b61cb9f66ea47d9f1671bdf0b2eb0b85ceff237610ac7824eed92a000000000e80000000020000200000002204c072a7652e9d5bc482cff9355bc89bb876193938097ad6ca3ab5aef06cc7900000003cbb176bfa5023b65877d1387605f27a73ded4d242c4ca22d930492b89d72cb321119985bb78fb7b272b5906891f281fe172227f0600e3bc69f2dbf8e720a4078756228e3813347b7d8ded18470409999c86e7ca6fc9c4b93e3f95aa00e75014770824858395390a1f42a7ed642276fead1bb2dd0173a1a36709af0626acb9a593b828b7af48c1ef8a1e2bc419f82f7f400000007195398cfcec96bebf516891a75013881ce52d3806c6048aa281d58c991b6a1cd92b3e7d4e35fa0587f661c6fffa4b28268716270d60fb1604db8c76aa894388 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433662762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2692 2264 iexplore.exe 31 PID 2264 wrote to memory of 2692 2264 iexplore.exe 31 PID 2264 wrote to memory of 2692 2264 iexplore.exe 31 PID 2264 wrote to memory of 2692 2264 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb96f8a029f14738404fb5e37ab9bbf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f34a7dc6b22fe3a1804811842c0165
SHA196ff664462b424d98630362d3e7b9d52a1323531
SHA2561cd36c409482ff55560a54253fcbb2490103544705d4288dded1a05d20de02ff
SHA512445c251036f57fc1b31367c86433ea098f8ff4e2e07691ab809cc6383232a4491c1c1c9f7700ad32e39b4591e19e966b64fbd72894c061fd4f6fe27877aace47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e02e0c72b90b70526af01daa5a231e0
SHA180b61aa022aaebf1bd6a0dde09a011f3eef57ff8
SHA2565e9cd5d70712ad385facc48965936077512bf4a8fd80015cfe1abacea22c0466
SHA512523bbd195f7a39ab41a621164b4649458dc026b359c7897fc3a75c2f11a437fe1d6f37a65f1491564ca83c3bcb9d36442f0c3e991991e5d55d0ab3b22e2b66a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c437a4e361264170abf383aa0b8a3d
SHA102b184a2316609756757f929e63c4e3ffdc1aea0
SHA256a052d7ea6b5dfde7536a27755d6f4c11f48b05519d7644b41ee0223895451daa
SHA5122a1e967228ed10ce699c21330c45c61b16730ad6effca8a16a84cee193e3cb299a4b31aa2533d923b4f565d1bc38f0df535eb871c79a989b653bcd714fa281ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e979929365d50c64dcb14f3c614058
SHA1a045ed4fe5efaaef33a387db39049b0e6342d74c
SHA25678f4b9c3a0ea9daa7406b82adaf97895d95704f5d24138a82479b3fda9ed791e
SHA512b6180e2fbf010e75783ce7116bd65c8fd31fcc21dc004f2fd098c7e1880fc8364b67dd2f3b2b5488d4d136c39dabf7c752ffa3f4b77a7f66cab8cd66b51dd69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb49a12cddf78c4d4c51e394c2e9e866
SHA10a525ccb3f2de928b8c5d5d00444e5296cf028e4
SHA2569f6d73c1c2d555c3e025cfa0ba20d44e1c6b85e9efb20d4f4a120a4233f9b967
SHA5120fb16994bc6b67efce4ef25b2fed4bcc517846ea3992a7bc3d2374cc2d560c56167ad100d1e57ae331d8ac6261afca6bcf940402d6e8be373db6bbc31f2ba3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f382ecf32a0ce732c0d3af60a71bbe
SHA12a2e641f2a5fbc4e0b428c1a15f145a7af4268ee
SHA256effdc33b9a92f321f1361fb9dc681bc360be251788fdefa4bd6e31c5b114483e
SHA512a07689bcbb675959ad068c8f1e3a90c01e243e017c781cbcc832dc6b52c105bd388d74c525e75c8e88d1170970c73001dece320341abebd938d9a61c712e7f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcecd8c8f20301457406d7f992d14e56
SHA13ca3f09afe3ebeda6fd34b478bf368dfae04ae57
SHA2566c72db2f10801b5708aa0f98a5631db66bb91713b5bffc194a895ad7e76ce093
SHA512c92a6e3bc7ccb7915558b4ed19deaa85b5347c64cd432a4e14cdacd3064968e23c1a91c652d5d637dcca3057c33f421cbc58152026d7eaa3e9a48ed76f8de767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ebde968f83905d3d2c9279f8627ef5
SHA14c672afe2f4031ebbc5c8272ed272f03dce45bec
SHA256aee491da850ee0b931cfe26e9a8aaf97efeda0cfcda95dd77868dd0e79601d59
SHA512b0c2b852f2d4fa3e00cd9cbfef2e6c4569dd132f8ca0752a0db16fe3d751b107b8c4d7a0d6d43fa39d800c00b3264e640a33d2870a660d2002f0e88ddf47770c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e461d9a58f78bfa89eb782fa25bb19
SHA1b7179ad48c9ba543812315046bfcecddee53add8
SHA256df1c4a5f7c8f2fbd9ceaab5fff71128f6f7cd795579023389b72d0fbad3b00bf
SHA512f87c22a62a45922b87a8ef38b6c1c3cc7c3bc812b20ff6c6f567e595125356943fb13401f5cc629a605fc319abf1ecd11248f9dd69b5671e80a2331f9f52100e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0aaae358198491d23806de0a6b10ce
SHA1e878c00011627afaa2ea0c8def740ec6f23871a3
SHA25642e405cc08f7e625daaf9c05d2cae5cf4620727b542859eff76e0fc26c684c0b
SHA512416a9a5d28d1c8c16c376db8772e5775bc269509cdcc9caa1e8db8b011b4a406a7e09934ab2d4414a778d8f34d2de03dc4792941523b61042ed78be4637da44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92a851f9d252e4ed3f7650a8712b72e
SHA14b5248f80eea31c538fcfff9e0775b38bda093f8
SHA256161f6342b79cc883cabf4c5cdb85141f9366e298f49630d9817d3d257f9419a3
SHA512e463f253c449cb993228427c3d94e9a873d6aaaca13f331ab190e6cd6f227ce36cf3dd9c8412e9e41952244bdce1b43785b59c1a6d3beac30ea119cf9f2a4570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597934a0f56777758ac7eb2eb58836abe
SHA1e7792da24649aedc66174508cd97997e0c35bc3b
SHA256b4a324cadfe00900c480c22a9eef18f9f2b3aaba21e158bf2acb6046e2c48155
SHA512fa8cd83f85e3d12656f9c850e4642b2f096dde07454906b974cd30b807c2ba78c5ea8bf193f9f55458925a267bce56c2056d497181bbd42f69c83985cda94731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54951bea58dd07248879219cf299b63bf
SHA1e5feb8189cb98ba4babdf8d43fb7845dc84abe43
SHA256e823b82e560aa1b4789c4da1d9a248816db89b3402deabdb682a8eecf730c601
SHA512d60d7c23c0626bba621c45abd124a464111a3f3297bd1a13318d63ddb7851f04bd3703f26b997ba24c78631737fc5ac608f7d4d4251463f3186b04fcdea52240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdca67b8cef19c906392399a0427b3ad
SHA10469730643c036be4996ddfbce37ba1eb71839d5
SHA256b0fdd9148f1759f81d4d9a8a23ebe1a5093e0e3912773225356bdf3376d0d572
SHA5126ad5b602406b0992aa9967ac7d339790be102e8704a8e1282a2cf7a7daea53c30c1e6c55eab43d0a0c72c978295979e9ee15be4683876c60e3d888bba69cf62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548dd20b5bdc3e56b746976de2ef9e7eb
SHA1a9abf30f5ed1434a02b65a3036baed764c71f4fa
SHA256b4831351cb8760bcc5c261718b1243bb615d729a0e1db253f2cd5592dddccd8d
SHA512010c994883a109d66780f09d20fd443b7fcf06b4b278c20889f688f3ca4cb7756f3d95d71049eead5b9c964fedcd0107313a189880ccfb7563c35f42f97811c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebc73db44ad56df3af474eed559f3f6
SHA16498c33b642476be3f81da2d13c098eaad12e345
SHA25614870f17b90bbdc5b0c46cc867c8f817f7a59351258f80eb10c023a00bcf863a
SHA5129c20becb1f0f0f1ada37e9083560e51778486bb539107b05538dc4a582649397cdff93a6b1e03583ab94721085b1ec93382e2a7e7fcba824424a57c8c3dd36df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57665fba66be9f72a8b436ee0d6fb0e58
SHA108cd1e2f90da631775cda4dc10c1cddf4bce9a8b
SHA256e42ba8d710a2ed577b1baa7d4150eb7b8c84b54e86e4568077b3607e35f3c547
SHA5124aba1727930dfb9a2bb208637a87a128058f8d862c558e569f88649b688def666ed2778eeba53a7ff179c92456b70a5d12fb222137b8a20f0584d9d169657cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68dba7d5bf1e02630b612f658986f4d
SHA1b6f60c04ab61d0d667247cc8478da11816d8cd08
SHA256058210bfad81c9c6f581778bbc36fb2c972adc835bde431f91fd1d7408a2a867
SHA51293240c5705888b6560d8010e4163c7a6101d04e607d40714a3c9212eaf6a3cbd228a5affcfe1010874bffed7b0b0433aaf74b7b169091ba69a33f819bf52434e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56343722ff46ecf7d4bc8c6083fe9096d
SHA1c35f0d199ad01b066240162dfefb63e886f2a7f9
SHA25654c88edce5062588ebecb1218bbf7654a13dc8ee56677cdce5368547f2f7eb31
SHA5125e1d3967eb87628c526118d72705ed38e2d45f94c779d333d001851729bd49d3c4dbf00a0b20fef8394955ee5416bf67e3c6aad9d8f27f91a118371df4e66198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7c95891c18265a8ae8f4acacd5c3f7
SHA18876a7996bcd5cb02a88ec7614f50ff524e3e017
SHA25611a4c6ad8c4d0bdde2201b2e2ba3d086c6cd17d613f762469f3b0a62e8fab2f7
SHA512e23ee970f79d54dd158433ef69f8e7cba96a12c2a0739a8b97815589a11ea46ddf9f0ace1ea5d42c358ccffee4b11c44290d88c6766c249c1f692a716744d6b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b