Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
55734e2992aba56d903e4b3977649eb1_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
55734e2992aba56d903e4b3977649eb1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55734e2992aba56d903e4b3977649eb1_JaffaCakes118.html
-
Size
15KB
-
MD5
55734e2992aba56d903e4b3977649eb1
-
SHA1
046100f0d6c87db06620bd3a3fd5418ec3b67a3f
-
SHA256
a6043a7e4fd9a1ba784d6108068c03e375110dcd5397c2741a1dba7c187aeb80
-
SHA512
5996f3723166978b9884f4246ff1d3cbe3e760eca45aedd1ff245a3d9da4958672367c26821f661cf96e36f13789cf7a91ba97d01abaa145f844a2802f1ff4da
-
SSDEEP
384:ln8uqnGDnW0qPtFWQXOhf3kG4GG9DU5Pa/svHJKeETxzS4ZCOYdnWjYM/EXtT3+A:ln8vGDnoYvIVGTxLJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60B01531-8D08-11EF-BD8C-6252F262FB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000c175296dd018d0e57eb9732bbcfec0339ec420ed3c26e01ced1c8ce7bac4bc3b000000000e80000000020000200000002e7d8302e73a410b42e20262fcb31c28a6b98692be1fd3c6be33eb7115d1662820000000181c2606993eaf7de649395a9393d9fb0cdac2ac1b4243050e89656ab82d07bb400000005ba33fde3a685cd819425de20d88b01289c21a35181cff3a3039329945244fd9cc698c96e998bc7bba6ae28f494b0b695b8953cb9ed1fe35ebbeb131090a5474 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f610371521db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000aeb16ea9e54992ae0b2028588d7afae1847d937e52bf5f9b3d62e210a7dde3a2000000000e800000000200002000000008bcc5d3071118b847b93c1d1d45bb4d1af8a221f5bbf1a63b81345d2e527923900000002f9e6eff19245e3dfcb12ef049606cf3c071b84b2aa76141ede02058da02d525fc5ea60fc1c00f4f0860481e67e58fab40374ecb26c06f88f47d762c7384b1a78053d48dfa682cb0ed130f7e22b567875551cbacf31a6a8f7b15e605a3e1c7599c71c04180f4cbd3a601cd4cd80a1c9b895346bb5816526f1883f6d99c34a48a3b7fcad478984691909a839b2580af6240000000a71216c4f5f2b3b65a4cb6849a6c95eda152ffecbee2a301fa8552637efe9a43bca8c7e0bd93d8cfb471b82d885899dc719e2bea1aeb94ec048a9256cdce052c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435387129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2780 1644 iexplore.exe 30 PID 1644 wrote to memory of 2780 1644 iexplore.exe 30 PID 1644 wrote to memory of 2780 1644 iexplore.exe 30 PID 1644 wrote to memory of 2780 1644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55734e2992aba56d903e4b3977649eb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9850612ff02a1bf2120aeaa0371b80
SHA137db581cedac16c7591d8e97aaa75553bd6e91b2
SHA2567950840b96a526c71fa57a26bd8cf545117a616a115b8218d0acb9cf6f2c6a74
SHA512393c881ae766b7594f6ba39d6de2b761cdf1805b8545d4bfb51ef0c086d1311efc19168159809b5dfb365b88fffd0723c7fbe7017223318735dda4cd1dcaa5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99e2c09f10b587dc47f5e628773bd98
SHA14e2a0bc0f322425ec80431d5e68a0c0010ee78b7
SHA256e7cbe66428ba350b8cb64a0f71675da53f3b3ec6f7b0f527afc3a76152164908
SHA512d07e13b76cc4110cc29baed2c0063b4ec7268f0ed1df17eb6bf024871c077751f0100c072e31bc0fa0e2b9cc5661c8711368776c2db933f140f12864fd1c3a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539acf301b043632a31992753d1bc1e91
SHA12e0112f1fa0302b403df469cde55d5e033fedf18
SHA2560c9922ab39eb3ae35fc0250e467e95368fedc92047b35c94655ec3cd3311ed9d
SHA51215b4389b71d51522b635ead46325dedfdb3d4d21feac3c657d6dbe3850559d3ead7ba23e4b1628173e813f27c33dc72cd1c47e668e7f70bdc83eb54c02aba2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52784ee91dd0135f1d1f5dc7de0521b8c
SHA15e847b4f7364695079097de7692a3ca1ab63236b
SHA2561d28dfa9d2a83069483c1501fb6eae8c960192c39ee5daace747b9641a86f4c4
SHA512fbb3a777454db7cc76dd6ab08c66e4edca056f1786693839ae51461754ffd05176e2092b6b2ff1b5b5c4789bc9bb53ac83d52f18ad9ce03926316d996c8533d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd0f8c874f0b1debf604f61be05752c
SHA16b4417d64063cd13e9526b98fb12522608198a1a
SHA256fc9bee3ed9f0a72bc1934deafe96afcb2c75fd29e1da7b32fcd31e8103d8f680
SHA5124645847faa73ff09b67fbf17c002a3384cb86d08a877aacdacdaa5c7b8fb7244aefed98aadb7aa15921b3c282748d247cabdb57984a7d693406c88d946df19b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593dc4d49b9af75fb86873e4408ed432
SHA11f14d67513b2a4fa543450d361cbdfa4d9229dcb
SHA256538b8bd1e8d40725b9518142f7d73ee56ce2c0f7f38cfedc55f9b718be18745a
SHA5125bdd33dd09e42f32520ec7b21994c36e06dc809d935a37b3db0050db188619dd77a854d81451bcf418099f5f8c47cc951b12c815471ad155472e28d71ffd0612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554dcc76e1687349256a70aa95b980a3d
SHA1fcc6c7129c0026b165dafd3132e3f0f955925ac6
SHA2563a83594544845b25a684510d9e3aac70d9f6bba949f3c9528ec15aa590d44c6f
SHA512f9014786221deee765b7929fb9cf759d810bbdd136d97882a6b092fb1e1a9b816bef4f333ed3cd789c5015776e0a4c000adb6fa8a4fb76b78baabae2d39285f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810f8c62df5439d8c052958d58ea0729
SHA147deccf4488cd7395edefac52e41e99243476ec1
SHA256873c5694161b25eb3b68b1047dbe2637209c5e147add611a38f80a1c57c8f554
SHA512825cf2f07467082548fee20223890bf91a4cc54c4b1bd2597e0c09983522b2aba821fec90438c3d91bde5def0564e59647da968f8fd1f1209f9f118a8f9ca5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565045503cccd3b729e2a310213a3f20d
SHA1b4a1e5457d7b9310cc3a64dc2a5374c36e8f6190
SHA25650dc29c63bb13f493c55d0ffc5609e52fe37c216701953fce2165d0386e7df9b
SHA512c26e61417fc2d0ab14448b517a9567e6afaabf787ad904f97216638ca23997dd8aeed52e92135a8f42385c6cd288c4289594225244c416d1f3f5dea8a37604b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af1849283e8e29a3aa6e6d379fc2a04
SHA12f1a7c628caee76e3e43cba1e26f03a3a8e76c38
SHA2567054aac8fe263f1ea65156625ffd250e8afad6dda770e74182f3a1a5080582da
SHA51259d95471627c1f7bda581797a62eb08526dd9fb92f5fd8322d093c5dcb7955e032c1bf0d3f8b7505f2b9e03ac851e9f50621b9509521ae71a2d8097f2ed29881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55474fe377dc0b9ba5f3fd5c9d1548945
SHA1eeb2af23edce2af614cf9c9e555855d2cc8fa134
SHA256963de5f3f3267026d23a34115fe4ed08e441b20fd3fb7b270d66ca7456abedd5
SHA512d6312c7fae9dc5d0405bd3d0dc42dd64d523baca84e233746396b81095e0539411cdcd82240c80d732f226f3ec82763173b4f19c410c4501cab3ecd7abf827c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba95ae87be1951c48d0d105146dd93b
SHA1b7fe1386fe135801e32ba081e42ccfe54724044b
SHA256cb0545084cef26ad2e8a91ff5f8f10a8d90797135984413e9293e17c966f0196
SHA512c936cd82eae84bf3b0995e7545eb6965adc427c84699287df38bf098c3dc51b275a9de9f502dc1536284920b05f80794fb7fae97dd2b3825744854933a7a7f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a64737c7f779d5634380727178ff6e6
SHA106e69978448b9ea9ada77689b9a3316acda25cd8
SHA2560a1010998953d415ecc9b2bd2567486fc936d90695e1659a3017425e17004516
SHA512df681a531650d92b253420483fe328a5bbd23dca46aab1d4c4d74f096769253145024d50ca65f8379a74b598fdcc025d040055916d4b0de7068c1ab205a5b2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56104f5607683fd0c99ae49b598e9eb87
SHA112a25d023e69adbacc9125dc982e4babe611e3c6
SHA256f92824db00edf9080e7f4324c7ca84e3c6b616ef1cb710a76957b9fb611f0e3c
SHA512d0273c5f37d9f39fc84f9a790a770af5b06e3346680eb38904ba3b5aebf8064431deb53f4f85a9a2f8e0c6a4d2b5f584500f9d3158aa5f69d88271949e0d69d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51191af53db976571ed9c8a4b82ad51f4
SHA1fca0258129a78d0e4b04e542d390e61d775a3b92
SHA256401475247d3e96f0d5bae707fbbc22bc39ddd099c6de4f8e0647f1e2984839b2
SHA5126b1a91338700a4e35f74d4212234a8e7a8cf0709fd50d13712edf02ba4d322997b9a83e16a189811775695fe52103dea1126d7b91da8da74c611a22cf5ddc4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abfde309ab081f3b88a301c67f84bcd1
SHA19b8f4975b9e08b5b4774c8825ea5001722b52378
SHA2566ac021426a172488d43dc7681056d8d31c6693b6a6892ca5da5a5ec2148bce76
SHA512010e51778f895ee73cef1e0ccf01bbfb5f4bf187e77d786ca5ced2047c618e17111740c5c1c1461e98193f7e24968c71a602f227af7ca2c79969155a886090f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669d63e421b18b08289874b50cae5ac6
SHA1f8399816596efb7743404b1e2f592b38c118463b
SHA256acdd6b09597839836836f0990d07d8fe5e08e936f291e1826b0d683f61d09afc
SHA51293170458ada8e827fa86cc1cdb04c2bcf9f794e76af009bb9c4de51bb7582a627ba5f6bfc1d5d8426aadcee0368bc49cbf46c62f1870e7c1198cc45ea6815085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e87c69c0854c217313b44a51ff0280b
SHA13a2031a582cbb826a59b944828da963535b62ad4
SHA256107b34c38e583fce7b21a6b8b870593221a3d786ca656c093c9eb45ea1e19981
SHA5129b8c402a743fcb465d7c96185e2e34c5f7b012c220f64081f7df3dca6fa847ce25f3256792c8a6f4104ba3e028e477e17ac0737fd888a980ef84e18988fa932d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68a32af1d1f9da0cc4a44740877669f
SHA19c2bad73ca047ca52b1985f140970abf722da1de
SHA256db04de2947bb0cb74159a138458c92d08bef0fe126774557937fb4d10ff738d6
SHA5123708a8e14a3b7904a024f7472c42ce4583b62e15de60bcacd0f133253bee33332c078e1b92e9d2ebb4bbf47f886aeb6f79753ca48777430c8a58a17b0c0d9036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e6d6b302c981489fbb1c7a375b76cb
SHA1c634c1ae2b9eec692973876210d3668489ab6165
SHA256b7166f0e5a234eb958f7caa3e09454e1551db1f47659d66cebc773e6edc0edb2
SHA5125370234117426f93c8d3aab7c5b371d4e77e3aed37a1f7c71585da8c8935722728dbcd421bdd302df101692fa9b2e42d04d342d6d65d5ab5b46645f2285902b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b