Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
0f41fdd1e1189dc68f15abb48986d56d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0f41fdd1e1189dc68f15abb48986d56d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0f41fdd1e1189dc68f15abb48986d56d_JaffaCakes118.html
-
Size
22KB
-
MD5
0f41fdd1e1189dc68f15abb48986d56d
-
SHA1
4f55efc4d1ce4d45217c31626e6172514cf28709
-
SHA256
a33e1909fb340b3c12bfd3a107121a7cb1401aba72f5b24ad5ecc34cba33ffa1
-
SHA512
1d65a9895e0638fc1751a75d8c15b2d8a1825b8ae9695e5d472c787351ea019f87420d36e4ee247c03e570dd6328d9f90de22090f431ebcb11c413e1baafbc53
-
SSDEEP
384:0zXZ0wX9uOBxZ3h58+J4JBJtiGVkYe3L6Xx5Z+aXQyR65c/yzFPHR:SXZgOBxZ3DifkT3e8aXfR65tZ5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1434411-8197-11EF-8B64-E6B33176B75A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000957f3bb259e9fcd94a84de533ddfbd9437c0a7b2d029588a32cfc0db892dba3a000000000e800000000200002000000028fed11f39fd78ae0c17e95f384d95f1cee44a0aa2497f42089cccca548a026c9000000010f723010796401164d4982cc04c06d8bf6f15139325f276bfd45765c2959295d72ecb8576d1f2b89b086a159077e1e912053a37e68bf2276a9b650d1468e7f38c9feeac14101bffb348a3e79dea96ed0958947a584075e32e4d2c898ea07a1bbb835ed3c6b7580b862ca859dc60febcec4ee553959bee1802c75abb41bc571f3ab5f7893827bbbdbf02e0716ca310e140000000435241a10486cb8ffe267374bd2b62d8964ee0cd29904818103ba883246f1ae70b5ecd82cf15f39d679e39efb7d545ef599c169c90a0a260ab077c71b6e65565 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07ccfa5a415db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434129319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000770ce9d610c6b3870a067d8c773093f85fb83a8873fc3531d3a66a7676a3dd11000000000e8000000002000020000000e02b3443d8070357b29b4fcb59cf90fc73d5f26befe581b22122440a7bc40f3a20000000baf1585e12dccd33149752f40ee01d81022a5235849d9ec9373f223b8c37d6044000000048d149b387a818cc5ee093e27926a6b5396b33a2eb400cb5fef31c56cfff4ba6d524aba7228bcba9d097a6a78191b9ff31008d105968206d1978c013b035da9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2152 2744 iexplore.exe 30 PID 2744 wrote to memory of 2152 2744 iexplore.exe 30 PID 2744 wrote to memory of 2152 2744 iexplore.exe 30 PID 2744 wrote to memory of 2152 2744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f41fdd1e1189dc68f15abb48986d56d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c5010544f21bff245b71a55549c0da
SHA1bf77c0e44750e5741f8835f6808f9cf556c3670f
SHA256d59638ac9c6284e1291209aa4baa288be3dd745890d76778c935c2f94e51aef1
SHA512c801ac23b34c97bdd3e6d822bfcc4df1a35c6ef6751c1a963763da861db023b4958cbb5a2640d3640a5c01c9d23254e88736ab37d6c9dfda6185e593eecc1bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c900174f46681ebd375b6e92fa21a5
SHA14d915fed19e5944df7bbb5a9e2367ab9b7950287
SHA256ef108392198d50fa12fd983ff5d2da47011008e06e7bd8f140fbf2c1a6864b99
SHA512a357cecba09d8ea7fe31e517c55697e0db189864d6830e43126775b719d0e01064e269d1d302ab618278dd1470adbb511da914242d5a8fbbb6650c29b53580a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322714a260576b8da8bb184f5e9b9c5d
SHA192f11e7f652b6f864ab5787697ce21a40383f876
SHA256fb71db4b9b5290ed780ac4d7867eb5bd5c766900cbbb895e38f93b7f6ecbca4b
SHA512c832f2c66804b897fe99d80759876a9a370e2e4efc096d3f67c40d678bc183b74258d97ecb934e350e959667d5abccf8114bdb69399708a1a248ece1ace3f396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e0836d336cb798fc351f3dadcf2d47
SHA19a78fc49d71857902ae1306f781df4eba5cff6c2
SHA25698c01ab147e0fd69c444211eff7d4daf731294ba9f4b04cac9b6c4374cd9474a
SHA5123edd62c13b235b00a075870078108f2cd81809aaa2c29ecd1f4ee0083a687804abe76003931552921e9aeb700f9299b43b240c4f9a3cc47dce41442a28c8a860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9ac9e2884e8d3a3175af68c8b71fad
SHA18cdd996d1e61bdf6b165e836c7e49d8ec89fb5b9
SHA256fea69ee07c5b4cbb95671da972f11d4993f3bd73b571120fae2013d7483938ff
SHA5126a51bd19164100e0346db15d0fab0dfb15ef618e011b93d3ced5a2a358853e80794651f1386db914996f7f3d4a7d8dfda8cd74ea7667447194f1057633308e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed41a22d724b360ea161c023aaed5497
SHA15eecdc6d06fd9ab1f47b4ad3441ceb5e84bddf4c
SHA256e9a376ae239aa36b416cff4b0d2555444bebb17c6225c11b5e062c3450bbb1f7
SHA512958cb9c96442858994af91f7724a36e9005d3a2904c8b5999978b2a46244a8316dbdb154d7c4976c8aedf17d3d88bee7db7a586098d39699f2a29db4d57e360f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57766b29fbb26a0d0ce856b11e5c6ab76
SHA1401c318f23fa16e0e719f02365ef09fd3369e135
SHA2561077ab22e5efa1433735bcf297f365f879a06cc55d6b55094b46e4d8aec6b21c
SHA51220147110a0dd160a1401f1c08ff95dbe956efa14c0dd7c71cd805c23340e00c60f9dc514bd66edd41f0ad3ab93edc11f8778692471abacf35828baef0390abae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542cd5e2b441e8afff3c117afe48cb850
SHA1394fb459ddb72c80e83794b74feafe47b643f90b
SHA256bca9f3c4119dabc0a0944028446ecd5d0928e1d71b5f8609256a1526ed1d3389
SHA5125791d211ecaa6af6b409abb9268fa0c6ced7e41fff2b1de419729211d87c1d6bfcb4a987233e55d67a0b6f666bb642e16a4a8ca8ea75117f5eae556c23a01bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595db41ef7555c05c8e9e0767a5bd1917
SHA18f76849d7c37c84a365c82a0b1300803e08829a5
SHA2564a4bd13eb581260480d01e9ec1037c3117a06ac44ef1fbc77fa26fcb638c1acf
SHA512c89cfbc97c98a952ed8adc881f69f42a73bf7a8a06273dc1416e9f059ceead155eba45a702af816802894e7ee162eaaebba5774e364e50275c6d40c5ee566874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285989d5e672dbc1ca51067bc9505447
SHA1dc9fad3e88855a1311351807509465fb58928df4
SHA25641f6e218e4a70abefaf9831e3763671a6742f937fc45b44498d3689b66c6728e
SHA51273c9dc9bee85558d3ec5e582840a77b7a86305d2262e95493b4227a4f5db48723b71a16c34a211c8a1a09f336bc13351764444038c4a650ea4918c4493332f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a3fdb105f4b03a15032701eff4a80e
SHA12e2056161bf0104e284c5d207965aebf039e1893
SHA256595d5f9c215e5c4c9ea134571c97fa5cc01710bd2ac2017a4cea22f0b34adbe2
SHA512fdc788a444db48c4ff9b172344f8d9e54f38cdb15c5afedab893b6ebd71305fbaf1e428dba42cad22c7a3c97ab6a18bc91fcf115d61b1a400bf55bc17e7686f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd5da210b9575c1de211b00a38a08c8
SHA1d95e6fe94d1d3e3ee2ee5ac7c3e562dc4d224ea6
SHA256ffd413313a31933501ac64a24f0b1f3a70107f025bc5fb8ea2cdb66fb8125e58
SHA5123d2d1e739c82745a0b864b0e1f02bb55b3912d09790fd641978fff25a853b8fa65b89edc49788b7c14fcf8af04c89ca8c2cdbef5664db0fdbbd2c4fb3d8d9148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e9b71b8407127753be09fa21b07144
SHA101952415bfb2bc9a4cb980fe11bc555194932c60
SHA256cbf89bbdae8af1b76f3c007faf53a4f417795aa2073c268adc2a52c73f2e0dc3
SHA512095fe5a215eba8b2c7075bea3645df251445a5199b0e22d7962f56e4e7748054d90bfba0527f23d937f148dd696651e434a2cfea0a9a9d223f20000de65427ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552fb01a6989c07093eafb07b60f5b6c
SHA110f0161e124b544bd3da1709199f4bbc32b697ef
SHA2562af134e4951bc0549ee85a005e7cb0007971149e32b26b0a62dd779cfb237315
SHA512b876af323329a59a7ca60b3630a1813c002dc6fd98e947e15355e35703d4a7d70667e20c4153abf46d32bcdf211af771a4508eb309a698a6a0e52d1d0db44f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516ae5f8dbf1cec2b91a9ab2787ff09f
SHA10248363ddef780376adee19dc84a71c3984d7316
SHA2562a55c7e1c384ffe651b899fdc7f789fd2442e60f58d7a09bd81792c2da09f0d2
SHA512d4234bf19cca653d2e468c90ff19abba619ed043c8b9f97d1aa2441372545e71ceb77f6e0f328617b5dcb0e5822ba0fee610606dbb8e58b43a5acce0a4ee53c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84e216c0321009d9775f7c6209955f6
SHA1a2736de57c06465a09190d2f3b344f8717469ed7
SHA256ad4c71272d7f85caae2e2f4767aef1d35bf0a93c03ea1048e1ff790aa993cadc
SHA5120a639f50ce6f933361c073cae316e8217596ee5d603799aceff96cd4272f4c1c74a97e29e5684dae254c22b6ec95df58549dacf31baa1028f889945119fc2d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdca7ac063ba601b2684198975c04d1f
SHA18b9393443d151a6370875aff29d1db44ccb58ae5
SHA25657372d241e17a82513b5971cb9c28d81eede745d8e9aca32043cdbeabafa45eb
SHA512a154b31c4a6a498de250eef4348eb869c2342d94a0de902fcf55aa78361f3dd228e7ab5dff642926711b850fc33e5b9bff5eaea49ec5596df0c0a549c665d3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516184f7e6526d41867bd4f613e574b60
SHA150c8257b6645154f0b8fd3776bcf721431db98ac
SHA256a6b3c123fadbad711e4715c9431502a189c75860b2943f40c11f5b06444f4c35
SHA5121afb251d97b34bb25365a98c41eb97b2202819ea59fda77112b098610b540a6c1f56293f8a89537cab01316bd8022fa8ef03580dce2c2ece5ce0e2d0e607c725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305d56d0dab1c329c89aa0e44f0af62e
SHA1bdcae0e94e2f5e7204ab103a25f8cf23c0876c71
SHA256877b057e51969758a5085ba94db6d2980dc60567535093343a4061418ee7921f
SHA512f42f08a3add278a5c253327a57ca1a8537c92de99d017584da5112bf43b163123c28ea854f35a7dfa394c8ffffad7ba8568f27b1a2a05105184b5c0474a150b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc6006259c17984aa87a03054dcf2b6
SHA1bd5484d81d056116d7b9dfaa2c5d9395bc72117f
SHA256d97170bc5b0c2c31b4ced1e987006a9383f8354399eec09a083bd886019624c3
SHA51228640c510097f539c6d1e07284ab440fa6a7c8ec387a76e60aedb496899765cf675f06b2ec492e32d1078297bcd0ea6a2e91b62d960b07bd1c7b3dbabbe2cff1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b