Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
7101ec2a4ef0053acc61b1dfeb62f345_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7101ec2a4ef0053acc61b1dfeb62f345_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7101ec2a4ef0053acc61b1dfeb62f345_JaffaCakes118.html
-
Size
3KB
-
MD5
7101ec2a4ef0053acc61b1dfeb62f345
-
SHA1
e2a1cd1dc9eceafc7ecac7979a184ea6da99bd34
-
SHA256
73b2fd8d1216c19f1a1e02b0a304bf306edbb97ae6305181c05c996b9f266a3b
-
SHA512
7704e61714c20a4d5bfa56f002929adde43abaaaf1a83c684e673d3587c8b94afa260ffaec85bf8a709370f8de0b370b7d2d2c66bf44bbe2ecefadc6fed2386a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c66648465907cdc0c1f0e24a2c3a410ca9dff36a034bdf4f8b9aa711abcf1c1b000000000e80000000020000200000008fbbf089dc1082b0df84c62221e28353e5f280ac07b8ffa661dc4f93acde22c1900000008c138aefc7ecaffcecc138971b0f1cde39aed12f0234e7e59ae83f1e556157f236383dc17a441d5fb8b848a9044859c46451db396fe80dc556466a3c83c5b1420e1dda717fed17f20d77b251e5e720033f00b4c33fb6b50aed9f67443f42bfe81ceb229b0bc656566c447b87e3119b33cc7445cfc54c557339639eeda3b25ed7a9b87d25206d69171441c5bb673aed2a4000000017660eb5f67a2333d5e46d045b05985a28eb67c809897deed5738ce370b7102752dd9f063b37b71dcb68214e24146edbf7543a0d1e45a0a74383a1be31739383 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000095949d0fd07b63c5c1c7e012b29d2405f4851f2fba89e1f639f9658c59f67e93000000000e8000000002000020000000922bed094cbe8ecf6d4fda3ce668e8e1a70d9fda0270e4239c981699cdc32b4320000000ba1ffd02b50706349a1bf93733cacdf77b657aa4a1af1506b711b30f8b72f5af40000000c57869d228c4eb20da1cb7a7f619083f159e2c52d8e32ae0a6819fafdb655665f8c94c3122595a4a85a6a6d7c92d99a4f814134f24e11ff036f473c9491c0dc2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{517F6371-4AC0-11EF-A567-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428099401" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304f2a14cddeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2756 2200 iexplore.exe 30 PID 2200 wrote to memory of 2756 2200 iexplore.exe 30 PID 2200 wrote to memory of 2756 2200 iexplore.exe 30 PID 2200 wrote to memory of 2756 2200 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7101ec2a4ef0053acc61b1dfeb62f345_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520aa4fddc28031cd00d552f86cab6426
SHA1210c7480288752999efdf25416b6024182a7e539
SHA25629d7b322eb3d9790eb99928cb893d5f6d9fac1278d66c921ff7c829234a1b136
SHA5126660cf298d4a683fb2b38cb77dc9eecebf629ca4aa0c5d3765166c3c70e587024d3f3c16cb431b44c09b06fc11a45199c21c5685959626a4ebcf3abc809dc7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec0ed49b45fb16fdb73128934a8b532
SHA1ba41b1e70a5dcaf78e164dbe2a315d1c1c384fc8
SHA256c3936a99e1f68f5dfade28c211bb1acb959e983234ca31e5ce72f2e1c8f4621f
SHA512004e408988f62d0597369c1c7ef2e4b9711606fb5f08e99dd5ec6207b468a047add9c330c64122b464548c41927c3a7c26b128182025c32c35881e6fff142608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7b693e149018b1810e615368aade91
SHA1a15dbc4e7b3b0c63f843643e7677149336d2ff8a
SHA25611b6d83231051285e62e5f650185d23eaf86505d3d2c5980b2dcca4c02145a9c
SHA5121206e4d5c04ca91e7b7c355063c788eb500367dd42b71e7bc845d1a23eef3efef59ac8fea03bb869b631d82bfb45db1ea136205cf5a924c3d9a6b31416dc2023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65cff983714d5c70d3ffe892023e7e4
SHA19291350b7e2030b6c88c0f9c5f53c56b5bb33ee6
SHA25692bd4e2b6ce7e0021090dec36100b0f02c51938be2e3594c4f1f5307dfddff0f
SHA51272c498677f391fa625df763c36b39ea86f0ab12e00bbb9e3047b0f811d8a2facf994cb17792bd5b3ef49fcd93989a804f744d1fb4b410a86a6b479a077c571f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d80ac918be44dde98055323de5d34f
SHA1b8bfec0bdf213342019d53222169c825e049c0d0
SHA2566c0592ec9fa8a4a7857c1745d7c5bce67cf0e32721da0b555c22e825c6c4f614
SHA5124888f7a4982e090e4477fd2d73389cd9102700c79d15b1693c5b7ba39e734238e114c22fd2326bb6793046a25fc651ed00879556fa341acc7fdc98eae2d643bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58358eb7ca4336cfd7d86766754564afd
SHA12e1caf501f86711dd78b62a0e14c3a6fa226de87
SHA2562093af310dea9d7a368bbb008ab5d34b0454cccb81ae8005618a46b5abee3633
SHA51273c786e06e0554b6faa411161e91762760a6f4f9b3c419c5c7c307f74b674fe472d3d5cfe288ee33dc3ff4bea41390b548993225a0a40172ec3c47ac45ae9efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6b9e710a860468a6dc4dfb8be7d29e
SHA1b3d87e089fd65113f1861b3a495671308e173e19
SHA2566c3c2f14f84e7c1e9395ad51c264671291bffdb0a4d55a14fe8aabded1c77c4f
SHA51296867c216961f1f24cd2dbe5c522d1d58231c0f35264f270d265cfd78654fb9f25406de7ff9d32a73962c101fec3e4cae71a82264013355810fd6854decc9762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184502cb2f87dc6ff4883990fec1e6c7
SHA1e1b5ed0c4bde744f179c760e71ddbd40d790e8eb
SHA256d20bf523bddb973a7eb3eb2f1e0ef8206a4b054741085f56b825d938c069d8ee
SHA5123393bbc21ca2f0a89ca1dcbc10d1f7e218b0c5c369650a5a0d9b19e6d3d5d20249a9efcc941aa26b45ffb9e3bddd39e15136434f3fe4d5bd2181493fb202789b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b94e377fe99cc667b1d8bcc4097fcd3
SHA155a588c67ff9ca7c1bbfef64d0acdca4d2f3b2cb
SHA256f8defa75b44943ed1817d125cd992a0fc7b601d42c4ed367d4c81457542fe308
SHA5123ba60d44d156d193a184b027b2f5f5ceb453c4160271edfcb1fc0fb00c8157fb59dfb981a204c7d7af5bc049b5cecac34398e9ca986b239e936f68dea7aab725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ef3e7bf3ced02997e5841eef4cd808
SHA1cb53b3472eec00a0b91441bf05acc30f37594e5d
SHA25693e21f813aa4709cacae198e2588fa188aff35accf24e3e23c48a6e413fe51eb
SHA51225f1f6c896969cc8a632f2c617111b21319bc0bde80b1fcdb060c46942255bd8d896f0d87da4aa7ffc942e56589f621367a2da8d293b3e64f25390d61809d611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced413b5d3c6af94598e96c2cc8ee0cd
SHA1b2c5de0e199515a6b0567d7db6f52df772a86eda
SHA2562b9aec95946fc9440282021e7bbf3850637ef5b9f13d324c96f50faeadbdee39
SHA5120269bab2f682b2057ecabce80aeafc301f7f23666104180f6e2aa0d0ceee5b494e6adaa32385ac144b84b30c72ffd7540f0f412ad7da6453d6c4ce63388f8c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32268e845933e774f221e46713b6dbd
SHA1a7b51fca2267e9bf415c75c80da706c80aa012e1
SHA2563724fbd10a6c7aa24f3eebae95761a08ff3aaf6083a8ba7e54b3c6726a11dce0
SHA512991a2efaddf156c744916cfcc248be987acb867b7155ee10894dc8af853716b4fd26d7b9834bba20c3fc1b89b3254f6bce3e3ff3a6c6bc062c5895da06516ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4a2844bd607560ba6a4a893c5d7047
SHA1b11481602a829c113f6cbce8774251a7f9e5744d
SHA256fd7646baf5be2abde58ef77323262f81f1bea1cbda3aa2453155d6d151cdc640
SHA5129d6d5f10f1861522a55c30322a3ea656979889444d5d363834757413f31a1b27555beb778de85a1b51fe3eab0fa24cde34d8344295c2941425eff4cbf9615bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7a4f53e321ee46dfc52a774ede3d5d
SHA188a5196f78e07b622d882dff6b914a5234bfe52b
SHA256dd443d3154ca8eab22128dbba89cb37e99ace25e68e63a8d5ea965a05a135382
SHA51237e7d46d2f5b31ec18906fcd4208eb9af72e41a3f36218f3a4170ed6c31d0f3ea4546d3a7bcf2b71cea1d5cfc69df693af58de91f308541efe764c59c4e3be21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea72775c785ee4e9bd8738519157296d
SHA1816ed41baba130a088c586388989ae62e4e7e6bb
SHA256c49d8fd1a3213a23ffa35971757031d8ffaf01a259a10aa51b7cc20da23d6e0e
SHA5125ee30d2fbb814e746f6753a3102f0ecde1f85eaede160c133d0e8267e70dc52f374d7484f2235c73715fa4dffc10cd020ab16164ee235dfcb517d5538f05644e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582503b9da01faf8e2629598ff70643de
SHA1458c2d302d64de73193d75d2451574eb95a0faa1
SHA256c663fdc48052445565f39c34a312e6119521c698127d5d0dcb1475e1a0ba4445
SHA512cf77404c1649c160e7b5cb00b79b9094b607343da7ae62fed55c08b86029ed3a02f380e837efb095aae14096f954148f5e756af7521e03c53e62d40b4719737c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e1cee0d05d2d4ab9ec93be48137f47
SHA165754ccf6d46b91f62fd8e4bad6f82d469801347
SHA2563675f64075e1a91fa7f71ae85e178f6956c108840fe26b00c998f7a2e1a960ed
SHA512ca90e596ebb25c609edcbb02a9aa13a23d2ed788c09a467e58e62d13288523bb342adfd063d8c97bb7c16ca2b588ce6485b19e428a85f65746a33f20de699d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb83f4eed66338482b51c61bd93c003f
SHA112a9d7691826f7a47282aa153470d3a07e7bb655
SHA256760891e4dea8a45c4611ec389eb7c1e5c86f63576864f5905e946ddcfbbf3bba
SHA5122e98e6f1564c51819c8db7e2c71c9bf0b7158b9b6ef0d20afe09f14a8c6248dda2ebd0604d19ee01fe93e52a1b8d9d01d2afa71cb1505d3d10568aaf34f03b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34e8e521fed9c173dd67784f62454e4
SHA1b46507711ebce4718babf20b6f1e5b6d500c943c
SHA256a4d8461a563f66d5833bbbaa870b3e589be6825a9bd585ad0c07f50255a11de9
SHA512d8e3a5f00bc402eeaf00cb3e7e6ae48c803b3e6a7444f26cc801cce9c8b98a98b16d6d3dd79682de5bfd7a65d247463c2e11d340278eb2b09cff64c05d15953b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cb4f244bbf0936703b17b5a1cf3f93
SHA108e2e874049bd304484d1119f009475cdc2aa3a0
SHA2565334c64bda838280c0b089e39cbbeac7e49eb8848c857b545e696f47b69d9fa1
SHA512d71d1c2c032a275337b9de13fe03c72f02140a7cfa67d69ac01f17fc4f85affc1a86ae71e9617abce6e404fb768ceeaa5ebf8f6f82eb8eb7f23e0deae520f5cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b