Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
2a151eac1e351e9704f4d884c6475aea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a151eac1e351e9704f4d884c6475aea_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a151eac1e351e9704f4d884c6475aea_JaffaCakes118.html
-
Size
21KB
-
MD5
2a151eac1e351e9704f4d884c6475aea
-
SHA1
e20de2f65480afb8d059e43670dd0561ff9ca1c7
-
SHA256
1df4f0a100977a8ad2536ed1f0c76a78e9ac282f164f038b7994886a1124604c
-
SHA512
9ae5ad87d5a6028984a041e78d67620e9baed8831d8406f9bc621ec358a005d111688cb08181b973141d8c32a8b299fa5e5ab588a444d4e7202756c3aea8a948
-
SSDEEP
384:S9wBhSCDOWH0xn9oiqWPHzycHwAfR9nxiYkoJMkj6FMryBNyCQwYwSfWO8GkG8cn:SMzDRH0xSZWPHnHwAffsT+rsVSeO8PG7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434638412" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23C29011-8639-11EF-8320-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d071bbfc451adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008c7afdcc8e619d2d92b5d7082e9de9b4f2a3e8cce3326697c8339ad480545e48000000000e8000000002000020000000fa454a425064e3e684c6ae00701a57fa18459a5aa18e7160a36e1e6afcf71e4c90000000e12bb8e04b35654402a591a06b05abd7c7f6fc5b2e0e7da12654a67fb40187c902fb595ec2123be3eccb6238438c4d27555be28324e28c220a2cb558f6f9c3319b4d1ab33579a7991934fb97b23d686a3774628131727de3dbf01d90cde8cb99b444a26dc0db4aae1256ab572727625b8c608e23f72516b3ba1fd603e44c23becf85587bde306c9a7c81de5db8bff6b840000000e2a701a6aa5170a7d05534b54d19c5e2fad5e972e2c69dcabd57834b6f5ae01c697fdd55fd2663015c31be4cfadd0ffda30f493d90b7d8661b8ad59c4d84741d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000055bbac3de8c2d3854ad63132e118c4e9134ed62af8b58398a3105343bc2c1f43000000000e8000000002000020000000c162c937e6d38f6efd7c31ada885d5d098433d390604659abc7d6b10b39a8b1020000000e98cf8d236121372add6b328a0170fd535792ea75fb1448f9502c5bacaed43d040000000788334859d016e52788847acd3113c976d8a9dfdb8846d90c89efaf55cbf2b2c034bde6d87b5e74b84d4dc04429ee69b140fdf5c5a1c100e6bc6bae07e438219 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2092 2404 iexplore.exe 30 PID 2404 wrote to memory of 2092 2404 iexplore.exe 30 PID 2404 wrote to memory of 2092 2404 iexplore.exe 30 PID 2404 wrote to memory of 2092 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a151eac1e351e9704f4d884c6475aea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56a360717c0bd795f7954a2de289533e6
SHA1c3b38354fa962b6471b14f411559e264b3459ac5
SHA2560c6a026483900f87360d94579e09b5e411092cc4b7eb50027fd2fb466d05116c
SHA51216740d8255f55c86ff23deba9fb092b44e6ca6337791b2179d2f4a14e65cb6c2e2a1a04f6aaa88901d8ff618c381d5663baddb7b1b68d16d9549fbfc14919721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e27399c4409945f28ea87b0672a7c67
SHA12e33a80056831299412da30bc47aee3cc542c36c
SHA256119ebd88ecf5ece67c72e5ec130381d477782ca43d7fe1d4b5936918be8281b5
SHA5123dc990701b5a2d5aab0625a7e9f02c2473a8ac00d2abcd6dc5e647180c50e1753c563549b5a63b83838fb2128492093c4bc87dab66051913b77ea8568e866f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8bf41ab37dc462c835ccb71521f07b0
SHA189b9a5b95ed286c6cf0fdaddc87f9bb439a742f1
SHA2567b5ea653a26837491883a0e15a95ab624227f241a476612a948e2485fd6e86c3
SHA5127c3d85dd747320192e31d3ac87e75cf025b98e1bbd2db4a15c3cb44be3037da7385752429d9d4e00286cc324711c8c2cdc2f46e9f6b688887c63ec60b0cb9b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af4f5fb5a174867e865a89929da1fb7
SHA14be7cbba5ed2dcb06aa63aff69a8865f17867e80
SHA2562f8c4a6a0913e3240086989e9b3d1d88707ff11bbd8d9cfe1e6c12573a1e846d
SHA51212802e841d4e50e912c2d526c27e5360f346219fffdc005f71ab9d121e65167a64a5cb3f50cc67cd1a1b105ecc7b4deb7757a1172fe7303266ac52fc31dfb66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea56027251038443047cc09d9a4ffed0
SHA12e6a66072db0ae7c72eedd5350b57236cdda67da
SHA25619083271b662d2fcfb93a0bdc4a46b0fef8db62a81b765027df264636747bc74
SHA512d7d45ad05d11fa03a5c9db08b012b2d1955f831ad4ef9f2a75a21e51de086f5ec4ae685e073e67eaa5b565fddfda35db5dd8f0f0d1977c3b8e642dbdfe0888ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598393a674173f371b223474d462fe8e0
SHA18450c28517f865af463001e6a43e4ed68dab4885
SHA256d777c370dc6f96f5cff194aa33cb4408e045aac6dc59bc55b710d40401b0d5e3
SHA5127d5162d67f2eceb284631f8c864269aba6740b774221e068527ce61876db396d105365ce18e857bd1df360a0e9515317ddd5d0676cb55fac9b462b683fba65a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596dba4ab5b73ee6087f185c99d13cb96
SHA11ba9ab8d40c3d3f7d9fbe3ae437ad65aed46985e
SHA256a5305f8907ea498e2dcafa72b8715bb81c87e1c5623ccca12a858cfc496d6e07
SHA5126aadc2ff29fbe8358454a87d23d52c1b01179a1d604b21692335796c05298ab66219c157c88c2a93a8e1adcddefa59eed3de2f029f52ea063ad71cd8795a6a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce34939fd9c85929c5ced3256515d401
SHA1332c52cce1a9c050557b38427ed62e0b64414ca5
SHA25623d5f786c5e675469bc23474930ed488b535b25738f076eea0a48d98804db800
SHA512db675c8a91ac16c47efa3a05fda48b46284d82ca4c4baf3fec0fa686853154ac3f567f98a81bdd7f5067017ee0badac1aed7f65e2b40ea741c30ccc4d876fe06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70fe8a1006721915e56116e9ee4441d
SHA138d4baa7953576d0d809269d2ed1d0fc71089a33
SHA256e5161da3391e97b290b374a488454ad5585af1bb6afa68e64818d4e1da042482
SHA51260ace2ce3913d154c9924fe20b37858842f481e0638d914df0eed0e60400c3097516e6b684dfa4f00630c00fc061e2313606c14815329fcf4d22e3891453646d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0b088afa395bf8edbd4a7f1e01870f
SHA1e43997b88dbb5d14111a05d8204ae551211ed01e
SHA256d0c29789622761f720930a7a6bb818d9a1ef33ae864ace7657053d3a8cf82554
SHA512d7a47c2daafe5b17bfe277a5902dd30c30402be6e4bdf67e00f0bcad0659f0853ac9ede29671e32276bc8b803672a55a304dd6fd0ebff3da0e793dc4c654ca7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f0bacc1f86cf6bca4039c762e7bdc0
SHA14d4f73f7c48e43b0ed3cf5988d89e46de481c5aa
SHA25691c4ea3ed304aec51ba46129adeadbe596bce001d7a686d72cf32e30bc3a99fb
SHA51264281d71ed9919a48f2b1c2fcdeb621447c1459ef5a6de74b47fafaa3caf579c58d06c617758b5b90936eb8a55653014b4b01eea0c774888c7ed21bf0af352a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d84ff45398e06b62c1edc13f256095
SHA1dcd6c10cda3eb897300e0d704528750effae7aad
SHA2565effc52ae7742bd3bcaea9af725bea8cd83e714944011cebf78bae64f83ec61c
SHA512c13a3538bdbbeae3476ae288311c8e0c197313c874cb27e64bfb6aa494d8c35492f05c6efc086eea33ae27aa8661e0ef529a3bfc1521b7599c08b58af846504c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e62e3b92db69e047ffb79af6cf158a9
SHA1472d7b9f9f70385960c628417543e779376093f7
SHA25650c4d649f769322424da6232efbd2855de57722cc3d7a07e38b61793f4f97ca7
SHA51292795f154c8f5b512c6fa85457e3ae6aec36574ce8c94a7003cededbc85b4f019ff8bb8d0ea95047c38559a5e3659d663bc617c93bfbf2d47c265a71c8e76a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa000ee80c0aed6721c85d745481a630
SHA129a02c2f12310714bfa66aa7475670576a444f08
SHA256374b5ee68a55ffa3d42fecfed599e542152bfc856da9d61d6af3b43b356ad317
SHA5122ba5a5b7a978491055dacaa5a31f6a4c62c85ed7fa2bb7236d42c1be9c7dbfc55d77b871c3441f6cefd028bf0b5d1b5c04503f2688b967e2a96502718d155966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ddf7a43acd9780639bf7286fb1f3058
SHA13cec2a7a5245ead9b4dd05af64a068ba3ccab98b
SHA256a1c934020fae578129943347eaa64d55e19e90dadc8a51068d83f7d1568d8d6d
SHA5127698cf127d7d09a36cb845d39db9d51ec7c6dca26ffa059f9be471154c7b4e0865a2c2647d8bf493ce1cbecb09014068de286efaebb4ff9670f1a68d637a390f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec696cdb1422dda06d61ea5dd50d97e
SHA15217cc3b65845c0a235d6889340764954d5801b9
SHA256c7fb6054db10fc3c27b5479681f7bf107c0bdeb56f53751c6dfef10f1da3dee7
SHA5128df83fbedcccd6de43192b8dd9871e0df3534c8034d1ff40129f696fbf6befeeca4b8d781cabe236a527bc45a2f544b0262990d0ec904d5430940e8f68a97e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8297f00662c71df6929aed7c6bb4f59
SHA19afea476d7d0eb9f6101c2f6be33e10c5fba1891
SHA256674786e77029d66017223cca4a43dc000580e0471b1930b6d2cf6b572b61f285
SHA512d682b816b98298d52c4ff93519bedb61a468e96367f837111dd57a08a6d6080102309abada61f621f927d4227ceac1e694b61dc503e78a661c648ad5682efe45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305f8644a21d62e810c2773f3a784392
SHA13566ca296b8b15e8ae4fcc6d898c31a114a060da
SHA256f89ca0f91fa085b51158b2ebf05254a67b7a54bcd26d7ec32cec5055a02450ea
SHA5124debd254261e9c7a10c07ed824b7634e3a316cd7f25071cfaf0e1f18d37e8f5cbcdd567344e5d6b73f70f0e81c54540413f1cb9bb32a39a8f302312ae674ebda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51ca85a44fd90f3d0dc015a3f5d06f390
SHA1d6ba5a9351e2066223bb10d06785c7c7acb61d80
SHA25635b1ad3bf44dbb5c869bf4e337ecefb77ca06d3eef19aa7d1c882547a763e3cb
SHA512349365075f62f45552d38916e8aa8bf2e02492cc4ccf88691dad26b995be164f32caec019a512ad1493f27a246099982544871b57269ffffba50291f0d366a7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b