Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
ff80181892d11ca278219adbe966b78d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff80181892d11ca278219adbe966b78d_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ff80181892d11ca278219adbe966b78d_JaffaCakes118.html
-
Size
44KB
-
MD5
ff80181892d11ca278219adbe966b78d
-
SHA1
9e89af903574c7635f3a9aafcfc7cd5cf2efae5d
-
SHA256
5b0adee846bde2beff57257d86fa134657bc81c7c4b26387a1f8a7f807147265
-
SHA512
ce6c4cc36c9b67ef92acc71ac82dee05bcc7aa33ced22ec7675a8dddd03c7f46d1ec21379d3359479f571ab5fbc97aa40c5facfc96d0f13a3abb8c22511d8233
-
SSDEEP
768:jiDk93p4KtLz27Upag7Pc640qLd1HhyVAuD80tJkA:j2k5p4KtLz27UpaIcH0Wd1Hh2AuD80t5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA782791-7EBA-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433814568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dda8c2c712db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003ac5dcb70cc85ddd82f3bf4202c3cbf00905bcd5bb4e31806391ba92f48c90b9000000000e80000000020000200000003d31cd35a90f04c31a8c3b1069486d7120f0f3375c4e6471a141d7ff823ece3190000000120f81462e5fa4f8de5c732a2ff1e33d4b1e13353fafdeb92edf7ced39ba8ef4f1751035941e067f63dea524566a4719585092882005ebd82898391f54d5a1739b668cdcf0f1aebf80cea48d75cfb007d8ac8f72737be70bb19b403e26b2728d9edd2558a3fad9d30cc46f7de535fcccd7b7c1ce7ad9fcaa587b7ea75d7f61d57e2bef01ac04cb3e76d9fb152b9651d140000000062a3a5ed4ba644b8d68746581b1487c898acec928f841a28b11fcfc4d434b968caac4a6865da49200a2c854495447d4bc8ae4e16c3e7706164dc3911f6f6c74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e6bd6709cf9a430e877eb90d6e3e261c4597e2a320bd46ee83eafd2ce3a1a774000000000e80000000020000200000000096c583bb237c285586fe7d70d0620ebf12e6ebaeae1a40d4725195827c400c20000000e9a5cc7739877eb83f3270397606f399a35fdb39c075a9bfbc316913c238093540000000e8f5cff6c2970b8cb3131717d9f6032033c7581d0357784d327ab06d2df48c30aa64da5a5da46c519700232a519b6677b346afc525ff48f6020274073b662e1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1884 1504 iexplore.exe 31 PID 1504 wrote to memory of 1884 1504 iexplore.exe 31 PID 1504 wrote to memory of 1884 1504 iexplore.exe 31 PID 1504 wrote to memory of 1884 1504 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff80181892d11ca278219adbe966b78d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2aac71a178c2a671675b235469e42d
SHA192e5bcefb4f0a5cad84bc094d57c6b0c2425dfc9
SHA256fa20dcaef60354410e29351ec33bb7300b457982b3517b6e63c18e951df7d4c4
SHA512864299a4191a312de5d4a9f02546ffd601fc7ff86f44f6570e66f177fb5bbe659071f3d524afde463f16f3ca58cb4b79261e2b3444915a7f8a309362382482c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658ff5e235edc7d4fa7ac996b83f729b
SHA13341691fdcee2853146d708b777ed0fd3504480b
SHA2561fb1f13bfa3d2ff302fdbbb5a0c7dd08162113ca5488a18eb44826ac8a7dd318
SHA512d57680610c1df034be7eac75ac78285c8ff1395080ec8e46f49991a52ff75346b696e32700a18390c08a8cbec861c783556771bdeeef8d9880030fd74359db24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76de719792c7ff911548bf9b5aac598
SHA15ec932d5f6685583f9fadb98b3ab6097ed45749e
SHA2564c6c49986333fc618f3406e627ae70215aedd8519f8519c9a31d37b47cd5c589
SHA512907b5d1ab46c076826f8d2bba5698076041641137d14f5a4236bdfa6230b508627c33d3db6cface7abefd3ab56399f07619c5fe729250033f5b5f53bedc8d196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef09059ddd0ffd7020430bfcdf9d5514
SHA1429161b031a2b2175ff61c7e25f4752944d1a919
SHA256888a770d5217676bc49d9798bab55797952b0e404adcdd330a7277ad4bfda0cf
SHA512a1aa7904326cbd9f25685332f9d7fd3644a9e78531e656268090e9a1e6d884d66516d93384ba93abe3e17af90be79e9bf7a89b2ab61e0c1172ba9fc25feeb13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547087d251d38515d724d8006a4e1266d
SHA1e83835a0185cc55096b8d0549753cf5738cc77c8
SHA25639fb73b958db136ec35c29819c1e98d58b9ac1520f1047c0f68de29100b75178
SHA5120c113e5b6a3db22cb7708be8249120c811bdd72b6a487f967c9dc00d5022bc38d239743a68556302199a1401f3af62a71331d2434f723ffe52f16b2717087fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceecd88a01e51af3566ad0eaf3f9663e
SHA163fce596cefac894020ea71ec6816e040521d675
SHA25652a415ffb95cbee3744a685505cd9fca0ba254a77b0405a31130e2f5ea36517c
SHA512896cd3defdd2f4a3856a3e63a3a3d9866b6ae64d24c4746ebafcc5e5242e9a28ea5e5941fb3e0889bfe1268add59acadecdf73b690715f0148486bfce349c45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df04d2826c3a215d21bf554d8bfa36d4
SHA109475f30b7363b340a192999a637fe6a24020dcf
SHA256f500064b0abecc488d710e69c7f076dc53264ef40b377ab47ae1af2bc98c9863
SHA51280e5db6501bd05b39447a719c931b99d2a5672529293ccc6b8c2e1a61bcf7c36799ae2ac45c58a43cf957d8a4387dcef92e55149c0c56b99e32ca78dbd0bb58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5e961c0b191052b9c2d4a9090ca39c
SHA1530f85c0828b01d6607a33e8ff25b5eeebe6a9ca
SHA256e04805ad0e7134b764a9b864b98f07451c6c66326eb42d873fbae99dbd1bd30b
SHA51231519887700613161b843c24459b35eadcd35fc77b2ad11025a3d89ce7aea6a208a212c77e2ad8bbead8804bb840f0e848ad41d37a60f345a15af07fc4ce4289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb7fd3ee11b9a55c3204a6f5bd682ee
SHA156b90c67e7c8b9a5068155bb4c821f451ac46d7a
SHA256256168304ba92b97a5ae40975d245ac0d6a79ea68e19d83b81da5bbbee26733e
SHA5128d4cfad4709db7d7463163acf5de9e736b9d0e5b2675e9cb0b54c40de4ce6cf42fbeeaf306e9ec9b853355fbc76d30fee885f3464332fca15a8a7ef19cfeca66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597bd3a19ed1712af5a16fda95857789
SHA1b7fdfa7f5503cf602e30b297cc9948944bc2f021
SHA25616c2ff49ccaff3ef7d1d3255336b5989477aa8ca0a62f035363560100aea0402
SHA51232de82f2626b645bcb7ceb7fc8a84e767b874a07a37dbcd1d842199b9dc38a06e56cbc286b9d10a339e3c10980f90ea1c58ea8537d6edae1b6f6b4fb269ddab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53500011b49b33dac49db1e5a75d98a83
SHA13905196b2a49d911d19098c663fcca42056f8b30
SHA256a7cd307e0cb7383eb9e1a96acb40367fc56db638f5b3753c0daf39680fc55369
SHA512edc1c35f78681627283dfba29df9d80bda2ab0e9ddc2b22d5ffd090395d1c53639da17fd83de9165b88c83e950e9709c94e6b747688f8ff2913179bdf6c6884e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca667a4430ed085ac7f0e336725f69d
SHA18ea9e7242881ad32b665df518884aebef3d909f5
SHA2562a0f017bfa04b2480186373ac58a12ba90eb05f5cb34771bc5c019b929398e9b
SHA512acd0fbf4d32caea940b7dd59929fcd545d8dd3638f967fce747b2a86f76bce70154e556d45c3f1188dd09952f556dc0ec8682735356de13f945baba349e3a020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c37451f49bc9974ac4485f43ffb652e
SHA13192e1c7ed260d0a136a92bc4ab3b811dc249218
SHA256172f862692e46d522a0d34a207488009fd4bcf3ff3ecb4fe8da10e1873c00350
SHA51272951eb5b24ec2e85168232df6087fa8f2140fd2e7685d36fc621081dd544116879b759c627800602c44541d68af031ca438aab23a6006b64e328e41302947a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52501ea61ae84afb633a9e617fc0cf8d5
SHA1a46d9e866ae48f63dbd3ebd44528441f4eecac17
SHA256dab500ba92bc02a584c1b94f38402b5e3ecc1dc26eac4dfd497836806a27f031
SHA51279976ffbb014edb8a00ad6137e3cbd019de28e726fe560a67dc04835720fab8a86312dcb4a9a6bccde6f7e33bd580901f22524fa982185dad5e75f1d4c33943b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4d44421784f8e1389069bdc97f50d8
SHA1dddd0cc1627d64da1662c14298065a5c98b556c7
SHA2566628f61b1225013eba2e3ba8542c0d0be753a4c58bdeaffe5bafffdbabe381eb
SHA512063c8b75bb856f5046151e5cc105259c9bac3bf1b589b4082beaf4e063eff40d5b3c468f5d4c1cf35f5969e061d403a5be27c7df0313d957a04df1d2e97b29bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5907d23e030719526c3ebe064329f4
SHA1e085eff387d7b632c6dfc1e447a8c5609092e25f
SHA2567ebd352d2a66503d464901c8fd56ecc12fec372eaed73247c70c6f35e19fdd74
SHA5123a986783edcac650bbc94079fc125d494e6be5289667ec2e0ab477e762452c5fa72882018f38c81b1496ea66076491c5726b3a6fdcbb155742089816d95ec42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68147e7f3a749cfd8e77be5b24953b7
SHA1fb9148d4a83a1e19145ec5c0b4e3da5fe3de1292
SHA2568bca6408737ec16773591d5b2b5f5f17091bc9a916449bde28d555ed72beae57
SHA51219fe95a07757621ca048f6c3621592907e0d8b6366ee974637340c6f95fae717ede8031a0102b0985eac0fb2ccba7580bc5d2ee3ac6b923ce1099248470d3da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811a01a2d49f995191066cbd84d3de2c
SHA1c569def1edac90f7bb235a01c5a632895780fc5e
SHA256ecac9a2c2037e2a9c69eb3771ee36e2195b73cb0a6bd5159ec7eb92123a1e19c
SHA512b6d255ed201eb86fdf1ed20b139dc28f4dfac0f9ce5f76b21ffe0e15fc96a1089368b76041d96fd119b5a7054ea7c17889ff92421dc8703c8f0cdc90baf1b01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7badbf0a8731cd0f067b6ce61a578ac
SHA14ff137e80e2651fb308c295d210037540abfa303
SHA256433436cdbc900d7755323445c56a8e1242e53171d3d7ad987ad278347d085c4b
SHA512bda7088c6ec1e63787a0ebf7c306c7688cb7ed3f0065ef4e7b8eedfd5606aa50d0075f3d34198d96770a8c4ebc9a52b4bec2ff1d7f4fad11e6c2d6ca3051778f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03c02c472d218fa78ff68569a3878ec
SHA1e5ec61cbdf951886f201186f8fd5ea832c49e2fd
SHA2561e52cf53b3d0c1273ad4e69255b58bd6275626c5f7e9d9f78b80a6f54da20b5d
SHA512582b14bc0c7602c1619ff8ec0096f1d21d62b54f35e7b44464b25f62f278362a6cd0c407f8d908d827f1581a0b4cb335dc9c635434f4b726463deffc5854cd63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b