Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
6f7b8fdb0de8b418abefd0814d017210_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f7b8fdb0de8b418abefd0814d017210_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f7b8fdb0de8b418abefd0814d017210_JaffaCakes118.html
-
Size
82KB
-
MD5
6f7b8fdb0de8b418abefd0814d017210
-
SHA1
a121fecfc8ead58efe8a64a5a05d9d56b9433af8
-
SHA256
1a3d145a5e8a0b684b6292ce5722ca6f793f6db23440b7e0a8c1c92196f24bcf
-
SHA512
bfba23a4858009a9168fe6744b15ca1474662d0cdbac527fa6eac71627df426cf02149415943f941a751211de7cfc6cbf6b49cc682dbd958e9fc43907f3e99ff
-
SSDEEP
1536:gQZBCCOdj0IxCZ9hxpdOhNLCRwb6EH49xAQs/HZpoSItdL7FkXjy2h6BcfuiyBD1:gk2B0IxUpdOhNLCRwb6EH49xAQs/HZpI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b3fe6e8adeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000d6d438c7bbbb4ac8a20436107c2f50c093d2711a651a4c0e5967852a19e6eb76000000000e8000000002000020000000162a358b640644d6128fecb825e22597fe04c67f832fa6b1d18cca8d7e1ae92390000000edbe086d3e85ec6aeeff47ab8c67f23cf6191929d5ce87510de107a4ed4ae38447026f138d1200d4bd5622e19f3767fa6c0e1e211776b37f930d1efbe607d2f19368dfc572919b7e25f262ffa186ba653d65218acc95d8a5dfec91aa5b8e6d9c99df10a90101cbb90e6aea0486ff0b25fcdc43575a012d89104185f4e71e75892ae9c981265b002afe0e587d6741fd12400000001461c062bedc12c06302e90c269023c3196a25aa3454d888bccdee8bc5ba9a2581ff6ea05de4b76475ec07a73b5d1d000c5969a12347b252e6515dad8d32f41a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f4b1a3101e0ce121b35d08fa1dd330aa145e90ec206924de44b257ecdfd9743b000000000e80000000020000200000000983d4b7e4f6b0ad0bf31c5fcb92be35e16645b563cecaab8099fc77180ffd88200000001663e15faf0524d7bc01533b550108d48f7881e0e77e5ed62bf117c8adfd0a35400000005fa8dbd6c407dc9af0fb318f9c28e72052c33a27f73262f6832f95e89730a1ef314af5cfd8b0730f2a5cc7dc59f36398db1551d49caf9d5f74de56cd7a0b064a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428070731" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E7D1C11-4A7D-11EF-BDFF-5E6560CBCC6E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1772 1292 iexplore.exe 31 PID 1292 wrote to memory of 1772 1292 iexplore.exe 31 PID 1292 wrote to memory of 1772 1292 iexplore.exe 31 PID 1292 wrote to memory of 1772 1292 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f7b8fdb0de8b418abefd0814d017210_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e5a6fecf7cfbd5418ce0eacb2752c6
SHA1e0db5275250079dcab380c73bc71708a162c0ae6
SHA256c2bce3dc0f3c46590ef208f84d9a2b41dcdd8818aea1b2b26b5b90917a21af3a
SHA512f19932389462aab0fbf0c98932e22612cbe7e906088033ba86464019b6bdcb20c98fba65cc0680ee96f81cf3dad1bd6abeb47121d8b82993e5784bbe4f818f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af83ea967191dd39985fc1c9af19190
SHA16a496ee245bcccd5972d78df3c3d464ae014aa52
SHA2564d0745fd34723db7fc042a516bedb3092363d364172f1c7cd737ebe58fbec376
SHA512055522744ca6111012399ca1b605d4874e2026415fc37675bb50071fd6368e9347737dbf2fdce6b631539265ec63bf75ee2175146998feae9f1559e0ebe98cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06ad1fe499ba77717be55e9c0e1c5d8
SHA123f999ac1db7f7917a5fb6e1a230f47d6e22f115
SHA256fa5e6f39ec77332fe7201d9f4cefc55f55e403e93f839c52a4c3f1b553c37af4
SHA51220a8b07252eb10395e2856d9b3f3fc28cc972f9ba3fe6888840c42bc217586e0aa2f3ac2be99f33d88cc5047ee005681179e9d05489fe89275932050cc43e520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9083d01cc51fe2f1a35cf859e91ea84
SHA107d8ad83be73c7ff31a2bef8ef5d5a878c49d0b3
SHA256b16f148f71b4eeb6182cb0587f2c5f265e189d87e1ed6d76e4662be0932abd66
SHA512894ca2f774e41e17ea71b60a7b6131a9abd7725a5b702b540414c46e5848c84e97d3e7914f9fe0b63f967cad4c8070445e0cd9ce2b52b36b7dc20935f4763483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8e60de0620ea5d8f1a41aafad5ade1
SHA15e650cbabf2f415a38a99eb37b55983740b35504
SHA256637d984ea990f5c54af97f8c58b654644960a4f3521869b64a45246afcae8342
SHA512c054588c731cbb66dc5ccb95eda81943b62cf07885b3442c533a85a815017db6374ba56ba1ba5d5a5252f500400b40bc7b07d028fb3d7ed41630680e47062fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537e7fc5e0d9cecbabbb2f9c9d7247e5
SHA1f138e7050ea108e93d1db7b9f05fbcb63b481c6b
SHA2561791ab7f3d1e6f22b6e19a20d0054e46540f9da069eae2fce44ded8b4f3850e9
SHA512b41f856321ef82097696c340bd03ecedabaf55be4cf85318c108bf9c90567c8d277a76ab15854c0c319ddfac8e1c7cc66a3d195ebd1d07d91f3554443c27d67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364acc4faf7341bf449f468e0fbcd0db
SHA1d3c8108699e7ee794c4a589e6542e15b5eaed24f
SHA25676f4441f080670af212a048133da2847c14d1c3a1a6655340a0e5a06f479827b
SHA51254b93ffa27b32c51195962c8f74cc03ad183e73db48096afb217c2fa29a27c13aeb675e8626817908399355aac7f8ca13c5b2a688e6c4c4da4086e5d57f24fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138028a353139317704765cca8bb6457
SHA179735e8a453ae2bcf1d629c990dbf297042f0d10
SHA25615508587b61bc23000ec6f4cfdb53c32d942c1519ee7c337dbe276a65e135452
SHA51277e5cf03e8eaa58f6baff49e684f60f8714f9d005f1507696f5d5f87eacc6629de303a6af498aee618ab693dab5d7505c2fb6d2436b86597615d5cb5f8121568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53314e2b0b83bec7a4acaa41e7bd09062
SHA12edb650a87ae39325664f7d7f9752a521fa6dc03
SHA256938c3f9eb22cb93b15bd390ac03edd0aacb1b35d53e6a0d8bd94d03f65648113
SHA512ef8e7ca2b32d32ad73a0d2a7620628a3297331b139ad5af44f8ae8cb477e7f3df338206a3b0794d5e7d231f70539e4923608f825723a13b3642d223976928131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa0d4543c82725a2119ba7a1dd97383
SHA1fa6b0725faf472625ffa69f6c77242e27b13d60b
SHA256ce823c8b78bd2bf71255c444eb25ef56c58ba5f1503d721130cf3830f047a8f5
SHA51244c960d604b0a4e16432c4289114bc8626823380df8160682fdd84f237e9702c0565a6377941212f858a42de9d5c7e6b78927d67459251060f6ed5f5aef38953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd5ba3b9b70629d28179b52b456639e
SHA199727cb6d22f5478ee67b7ed05a4fb1c3e563ac4
SHA256e955585778339cec51e80f4c442b1edda67bab84757a34009ebeeda1896cef11
SHA512820a8780924690c01976000e12b913c1379e569bb6709be554ac909e659315d921d64cb61bec8535ff90774b5cd3ab55fb47c2f818e4d4cc79254fbe8bdc6cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549602488a77c571c2484c2578de42308
SHA1d11095a3ce01a72c625aec2bacdf24bc5b1a39ab
SHA25607873c06a0ec41ea98a9a6e502ab255f78a336fe1daa45fc45d076e792fa2abd
SHA512abb37b9a98c30d9a22bda682857363dcf9e75cc08471a4c638a7447ef695112e34aa62939567ca2194bf1cf98576fb89b5e90624f087b285e61ea84405f17f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb2ad0f7e217b8cd426a9ebe2cfe13f
SHA19a22063e108a5d416d102b68ac786cf12f3b7071
SHA2561a0e57cb78eaef4c981a5ae915b02534642924033e7c424363388ff4b6c21a1d
SHA51245c284b3cdd237da69383e7e7152f139db8cdc3bbc15ddff49903d708b69cb4b97277c8cc2399f31cccab1a05219595182bbc6496f5837f2430e60d23b1daf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5dd806965cd0520cdec3ab74b49accb
SHA1f64512374591d36580d30dd5e2ce18b53cc5d41c
SHA256c92b7f13b90b9b62c8b485435d53b6bba9c6b04f8aae338c3159d53d8716d248
SHA5124966568de3ebc0878ee32210ebdcc6b64b5ce41b261460675d11116d66e1a21e04dcaefc001ca2fa2fe68366dbc87154aa836565f41e5d456db9e792944e3246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482be73c840f868660c88ba9d2cd4c2b
SHA1aa20e20e96545461a083979cb6d18a9b0e14c069
SHA2565db3d38b95a7e3656677f4996073390f2d429e589e5e1785538fe1cfb36f6a6e
SHA5123bf90f44076998d776a200918eaf49f952e88708304fb3345bbd49e5b8274037e98186a5bb5bfd7c39c64d297662b343d7b417f834e0a617897443b4d238311c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94f34cd8dd321952e85f6244376feb2
SHA1df4747201516c91f37162d65d4e346314c255d23
SHA256053d10a771a3a012aff75ee97ed6161b49bf953dae565642641bc0044aa8efa4
SHA512eb2847aadb45a01825c730d88926ecac9c3a0f6c1d881aabd261b90a3677add5bdfe92a55ae96cabc33c468090be07da7972ba4c29e3a42080961d7dc5d82005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e465c36d49608c74829c95a26a0520b
SHA162ec7399c57f23a96ab4bc2c000c4c406095bbe0
SHA2561638be28516a6e6f7475547f8a28a5f2ad07baf2bc86b0196c8ea35b0eb683f6
SHA512f99d27fad6e19d441f57b810e6d5ba179b28f2fd3b0ee04ded4fd7007a2da97f9885b6bf44e9462ceb5f49457eabe42531ea201e02b0ff7029397d9d71c9e6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1106c7a3c9a2213cba8fff226bf1030
SHA1cd337b5f9d031b295208c4248104b7448377d93e
SHA2560fd633eb4de8885e91fae9aa12cfc6c1493aed146d81bd2f68f5cf6586a9e06e
SHA512c1f66e188fbabeac6d77864ad5eb99b1dfc52d9974488494818be23fdb9e70db47f131fa63c520a8db00a992a1a157b6fd9cf45f18c1fcf00f60d3df1c97db76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603089e7d62da6bef95f433f76b875f8
SHA1e346b85b158b734df8fd18dffde8393901cd0e4b
SHA2564446e5f465225c1dc69ad76d58339f65c77d98fffd3107d2c38b42617df46843
SHA512958e774e5ccb1d2af9a2f765f6fa0fab4473a3d09c6a22875e2690fae096e38f23303cb4be0e3364842978aa07f63bd132729597e8be5a5e6cbd883d261e7cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ca823d1eb1c9790ef21d4cd3262b94
SHA17ad0ffc6a3136a70439df9eec9b0d61480c31a0e
SHA2566e7c5a492153487ec2f9a7dc6ae9a1a7acd0792419428839ef88378a4cf34d72
SHA5125fcd129deff5fcbae4de41df0817d8a6e24e703511153ffc9ce9b93875079d3116976efd4a399c5dd2523703f762c3a9558311ec65a832c22592b830abcfff4a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b