Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
77529aff16af391368556bc6baa88c59_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77529aff16af391368556bc6baa88c59_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77529aff16af391368556bc6baa88c59_JaffaCakes118.html
-
Size
40KB
-
MD5
77529aff16af391368556bc6baa88c59
-
SHA1
ac06eda088238a04bbe53ea711ba1f01d9fa5019
-
SHA256
37ce9283e2a0f5305700e8213d207447224ed074d19366f93ae84ef27ef570b7
-
SHA512
e77f5d31abfc78d02559c928be36ec8adcf1fa8a7f8b7b88e5832fb25c36c0ac4d19e62e9106918f143c04b080d00aa39ca49049fdecb68d4ba6dc8c4a156e38
-
SSDEEP
768:aEijZeqLkAEijZeqLZNLoex2z25Oqnc+2w/Hvn1qoZK1R2Skqb:aEijZeqLVEijZeqLrfx2KOac+NHHZK17
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c43d8a8b6102567cde4bad73eeafea04d88775d0aac30be5cf52bb297148d79b000000000e800000000200002000000060e66b8783591e14eb7b101a326a79bd335736fbdf606c06fea2680e45e0f87120000000abe8441f3d965667bc24d30b5e6968f6bad5e4c0cfa804db68815a72de46708e40000000b459364ff5ac60c673d342f0d2b7ff7b402187f548329a41e0343b92bd7276ab33c3236872d036df5f93db4c444fe24164640eabb5dd95b80a872a132eaeb131 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428484755" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ff76d1874821c92e539b3174517764057c1756d852b455adb48de8668e4cecc3000000000e80000000020000200000006aeb5ed7ec70cdeed211171488f6a88f4445d52a506b3bebf33e6d0aee3f62699000000097019cda1c3bda306c5965fdef686441651d02f9b79792703d57baaf9865fe54bf0e9df1d39a24a299ca7807dde3346b48215ba929fcb6a32747032159d2cc9ecce5d4a42caaadea4b49696aef067349759dc7915f24f04124c65dd37339f2c77ffe9743e33766e74daa68f342a4aca94bb5e156eafd5809336ab55f77fffce247c8635711b70d7b1b311af806eb237140000000b2e488b1e92cee7b4bd77b96ccda9c167239bba7beefe765cc2b4bfc6f85c14defc840116510a22a1ae6df867fa7c1964e41e1274fb04f1ac3d9953fe68076ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{899CB4E1-4E41-11EF-AEC5-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90aab6884ee2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 3060 2284 iexplore.exe 31 PID 2284 wrote to memory of 3060 2284 iexplore.exe 31 PID 2284 wrote to memory of 3060 2284 iexplore.exe 31 PID 2284 wrote to memory of 3060 2284 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77529aff16af391368556bc6baa88c59_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2a941f3ed4c6854454b2ddaecf21dd
SHA11cdee332d8cf5c7f742c63867c690aab8bf7a1e7
SHA256168e4071a4bb5e45843df4b55de48b03ec32f17288600f6498e14b7b863da100
SHA512829fa60905d1c540e1b1aec2a4ded3c32ed3e50ae00b8cdc79f52a0e09aeaed3323818a9e20314ed3aca744e93b0d82607e877ba2a7aca153840161322a52d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9ad7e12b040409144314afd1fe5c52
SHA1214bb9b6e3c02545fc10eef6efe7a4e5e07d39d1
SHA2569083b6cd43d915ae9dc87908f03512470f7b3e01b3e2bac87e39770d6c2ed347
SHA512ef5494b78d5e3e60c18238a73a16d446bc9573072f711090dc54b98beaa5b79fd1dd6dd27d389f6262c5e13dcb855f33d4dbe0d3b5cb58b595b5fb386b7756cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f07ff94ccf7442a97ad339478339afa
SHA1102e121f385d0f6dbc28fabf50296c0ea38a81ad
SHA256fccee73b8af62a748c3de02d09314f48b6d07a7a6671ce93bbf6bd0b333e95ef
SHA51217efa32ce50d7796e6c1933e21b267bd0eb7a3e07d8915f776875f15e853056ee9edb06d13f6d496d1bc184824a8c42118e82e320e2c84db4d6a0f14a43a9e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b362afc017e244a739ac2db94b0313
SHA180d702c5559854c9c008a75e81a052906402f5c0
SHA2561bda054e1eedc308183f8458ece3e29b5dccf8bd781af4ab3bf1d4c3cac0b930
SHA5122ff50667ecae38ee16461670d29e86ddb98da765dde773c6839c44bc21435a89ff9a17b56ade6d01e552507bdf53655bb499fafad74826d936709d2b4c648ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310957601881cc250dd6c8931d137657
SHA132c4de0d4552b9f7b3b6229f463d18ef0c488b11
SHA256d471ed12f80132de0ea94c9564f4fe5ea691b1353e0bf18a2f9273e146252c68
SHA51230f17da0a3057c5b7356a798e84704e142eeccb7ada3dde947130c6e21637a332dabede1ded8bc92a0564853cb513fd99a5d4969b27dc1384150f3b19c707852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518854b2597c3f573d04c47ee120cd7b2
SHA16d525fdea4e3dbcc410ce853709bdd8b5c8612bf
SHA25641c1b8f73487e6f165c7061a7af031e602d2f0930837b10896893a0f3ebd5227
SHA512557289e1cca745bf11aab846097f7801a88a94029cd1d06b54e1afa58196002dc44138ae52dce77e92b810c9d68930d42568dd1349184465415b1cc455d12fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2d56426f6f18bcd593f71a0b1421df
SHA1cf696acf2603c164cdf6a79c42c4743fb9fb16c2
SHA256db16c28b901969f66abcf54d8311821071ab86d5dde1e5db2355965fb33c7741
SHA512eb696ef4fd426c11177da90dc606a84791d6221e906dee6984712870abd48ea7243c9ebda2f2b3d7427fc300c6f204fa176ae38abc1f41eb1a97a6af070be2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f922bf1d11c93023a57e301cdbae9dea
SHA10b6c117bc3b13806fcc853c9fbaf24799e99a55a
SHA256fa6b35ddc3d8fc9cc32d3dac341eaaab4b80ed28fa545cd8384d7f34a101319c
SHA51244d63a88a71b4f49f9c6a66983702bff9a0d7291626253610e70502c47ec5c5fc2ac90bc99441c0e249d23394b04e23f7f8c2e5a9aa2216366d252dc9be2ada2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4ca6503891db18c5e9c3c259a518d2
SHA1aaeb54cba9071659e557a47c61ee97aa64131dac
SHA256e1f46abba9f4ce9335230ec84755698434fb1963300dbb48b320d0d963f9b418
SHA512b13aaab6ea0cc329e7b2576728ff4b103cb27682b0c1efda014195f79f0793a35628703a0c0ae9746ce849ea6c7cdf8dfc79737d48719e2923ce3cee810f23de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55423d75666da99be9f9ccda396471fa9
SHA13bd95bcf4acab7baa56bbaa4e327ff68a29175cf
SHA256991b51134a814196554155011a68f163fb57a4de2768911cea9e4d0b4e34cb0e
SHA512f893b1bb4abb528733538aba54488d39382882e19f338ee36a33a2196bf961c3bf72f3c4ba3f7cdf4018f2585078f5c59f69ad73aeb89bf9d2b34fffd411a2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de16b7347d5a9ac3c5f6b07626c3e1ab
SHA1a9d004d93182d6eda83d29fbc8451d4b760e70e2
SHA256b3b6158f8776e3485c1ee4ae409001e143c238bec61d92877f87decc2e028158
SHA51246bbdeaebe6b71697e20e47d24623204739885d782b22261d56443697e6fd066995817497f7390de69df937be3ebae67db3ac3dfdcb622b7cd8ed9b118db75c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5953211bb10c82deeaf6faa0668560702
SHA19282ea04fe5201ce3f1b87fe5262153e424f7cbd
SHA2564d312bddd157d102d95a413f4c53f501d7ec4861b73154a1d51e96f326e62a4f
SHA512f4edb5b1cc5cef9fe5c99fb194f8a515fd58e04121ef51d1f05cf9bccb430c0263b13e9ea81fccf436166c7a85c3be40d6802993537f9dce600dc40a3f0a80af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a15f9a7b5da53b034e21c96dc9f2ecd
SHA14d622dce2064528ce117bb444eb5228df49320ad
SHA2565ca89ef1ff3d90075425584629c99436654c3903843baf6b75d43efe1b9f5be4
SHA512752f74b64339d9195c20d1f36e3ae9e4144dc6f0d8131020221f491cd44ffb640e5da45e1a17e3615d37d9b53b3620a4aecfabc22654c7b8a5b60839a58bfe7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693947e772cd2f2b7247ac726d71c994
SHA1fa5dd2f8b1c6eeb04337a5b8920e50059a79735c
SHA25675ef31cfd2ab3824e2b6d596eb5bcf8da88c2e180f7b97b9e9a800abb8fe65d1
SHA5122a1707356dd81007197c75a9c6b674ada2f5cbe7bdec54169f4c2545835088cfa8892de2dcf4140fe642b47f4f9d990caa54389668229c45bea99b25c13a325f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d2c5e583660def9f7ea053fa6be567
SHA10056c06b43231f14d7ea13c7eb692d3a0a7a73a9
SHA256da6b8d550024bfa6cd8be30a63c8a0fd22fb676f661a03f4887eb2454e87884f
SHA512085596c2cf6f35c2f84c9cfefc75ccffe697ae0614e8849a3aab32d5cd319abb425b5cffddcc857db61223b0241b83d85fa7b1f470a9fd015ee377a8fe568463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e0d538602f9dc087c92f727ff3baf6
SHA1961c08fb0d34e989656e308806df17f16d4cad56
SHA2569c5274712d643cae6afdfdeec1de9ca5abdebe760acea0c667b42a185a2ea80f
SHA512c40e1dbe9a6299380a8bf83e324caa4b4872a94c99b22269ce26f17689fb302f8ae3859d87dd5596828f73182c6e7b8d0400d1c4b82b235ca6fa3fa063e4fd53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c44ef59a28163f824d4165b23107e6
SHA103984877adad6f6bed8027a60acc190590f6d8ce
SHA256bbefe207eee2342a7765eb35c561053dd7122744f7595dd9c49f0b3a5d88db1a
SHA512e05aac2809f4ccf5e1f84f057919c3362c4fa71f3ae33f02dc49fb07abaa9ad20cc35c5f80b74ee49c7da1c0359c7566b3b24348f8e0b0e6a0efb6a05c0d8e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f19de7f8ae85b62295a311485e3cd5
SHA1ae036d7731d54c2facd020ca07ae956fc2abf0f7
SHA256dd77d0075b8c40c855095b48d9088c554be8f14372c4cddb0c822fb510d2cbef
SHA512c40d571d6883fd7f4ca1e7746e4f02d5aa71feb1fd6eb641aae8cf18551e767338ce1d10d3fd916ed47652c7ce83117a102ec480d93e74e8a95b775160ca889b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e422b95d60868a0b7f22d5848f585c9
SHA11e249155fa2f53b05073ab9c9b795ab8f090f815
SHA2562778e53993f29e790c15fa7d3948976d8bb75af70b0a9ddbe1b2724a5c1e123b
SHA512192aeb602eec112849e42070b98a1bafed7731e6cd8da54eedd78707a0259ff7a786c661c162323ec7a098a94e38e3ece4c161c341db1ff1443449c977cc3772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca0825557d0abcb98f1bdf402f390a6
SHA1fcb98a02a0d7d018f995e2af5cd9ac79722ff2d1
SHA2560a46df633512cd063127ed8acb4536c7fbe0656d5aee5f17b9b24c82287205d8
SHA512e6686dfe3c144c0dd0a4e71a773d6c14adf137b07b588f29dfcf8f10e9e76c5f2957de0a2b77f539de15801c929baabe3bc71d49c25788477c06b977d6a610d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b