Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html
-
Size
32KB
-
MD5
8d24556fe434a8c276a9c6f1859d468c
-
SHA1
e632aaa263f6f7ff3bdf0fccbff3946cd844f43b
-
SHA256
ca706cfc01d71cce2a81f27c3540d0abd7c4b336d2980516588032fbcc00bbe2
-
SHA512
c65df1c69a0f216eb2650a06f52caa13e78473d535bfdff5f1185b819322c46a1725ba85ff9521a02907b3d1ee23c4449e45e8f7f4309dd5a539174897d1b6a4
-
SSDEEP
768:Zcd9QZBC7mOdMUjpC5I9nC41VGJw3wkwfgkIPd:gQZBCCOdL0IxCKVmw3wkwIkIPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000042be85b70f6bdb232d22165ea0fee4a9c5c7b1a39a49d70e5b00ff795cc63011000000000e8000000002000020000000bae161a4a098f8cba34bc0ac94fd5553fdedba6a5b8f203663a865a0b211880320000000880ec3d02dc3fe227a3bcfe26b67c113c8cab8b71576c38ced0a1579aa78e91840000000c7934c45fc5a7582db7b7f5ea8bb559fb5fe9717e093064fc8827da2c8d6a07eb54ec0c50428e07fd0f7743429163e4ca618a92b35b7e57f3342540afbca68c5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000001252f3733f54ca6b86e2385f760c1266c04adf1ed757177f3ba51547fd6d0692000000000e8000000002000020000000352875b8e63394824eac74ce9a296a0510960e2b6a6141d49042bb851fb29d2c900000006c6bb810c0ff3960e74e491283669c862e0a24dccb02c60e77614d654f8de1417d4e2cc97d38ef1c12bd122f84b4b4f1c2637ea781d5c1ef1817bc38b16374b7bf320dabf8fc1b49f8dd2b630201267ff7926197969dc8af978207db44f904969fd8abedb2bf0153217f66af6ed97fb0bda4b3c34bb6517a0b96241914b9a447b8ad9366249edb76e5561e3b160c435e40000000256a4ce22cc030136b83e903740fff759995300fd44b25f4ee6215af2ba5e9e244401165e886781dec90ba1544fa235d97046afaae5a991a70ffeec5a6af99f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A7D7DA1-585B-11EF-8340-72D30ED4C808} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c1244268ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429595380" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 852 iexplore.exe 852 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d24556fe434a8c276a9c6f1859d468c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e8f325e62398a30750a857dc9fb25f83
SHA112528b89ec82b5a399ca192d89c6e10c1f82fb04
SHA256caaa128a7e798b2c94fac9b9e076533155c4800c1f97693c8a02ff181f4be67c
SHA51259a82571c981273be3ac2ef95b1dad6d16a6753dd534f79a93e81e59200e0c5df1eb0f5cdfb8e203d5aacb61304244d2bcfb0686b1df539eaa7173891b59e5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a907cf6ddbec4bdab0c6b373ac9ed3f
SHA1322209a37398ee38cd7d14db778518490d1f618d
SHA2569c39692bf76d8ec62e0c16b642f67bcbeaf1fbda0520a7f8ed888633bc5ea3c6
SHA512f8397b81220c831bfe2ba24a00dd55245c7402d99b11919be4bb15422997b992d1b51218b4fe6073c18c26300b281ba6a0231da6f802305f79a3b07ce2cb1db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174abda177569c51ad40b0a570df4e67
SHA195d0daf227c186b77bb65bc408f0e51dfeb2251b
SHA256505c74ece57b06d8f7b2649f1e444b243129085d36793209c006d5dce2305f02
SHA51290d4abcb0d4411c0c9b72acb73531e4cd953c64cf5444f8ace04d2c71a0e87bdf72e570eddb04db1dd963a2ea14544a91fd2ae71979ddc09f8cbc927b02b2310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c03a85d265a7c6ba7ee362df22aa7a
SHA10bbc2973c1db5377e15f78c569d4c7268d2f90f4
SHA25637f7bd6e3a06dd771cd2a076d7b2e1e63022866e0f8deb968240014d233f2c2c
SHA51262d8bc32c1a8cb7dc0ecc0d0312683c2f4eab1f1e838375013756526424514ff45ee35cba688c6a34c293275b0d0a8d15b9fed10ef80d2207779c3d9b61a255e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93b99323ad54e99bc71c709fa7e6ee4
SHA1b68ef6b1c5d7df6e772ab2c93aaa9ddf4ef20e26
SHA256e9e5b4a2b6544de8852c11df7b7aa05d9f252fbf4976e2c9446cf7662f9e7409
SHA512ded206805b2526f6bb621d392ef98dd7a33830e9b497658f4940f5c5f14544ce6bb944aa69cb115a7a01d63fc55a72af88072918ff7ee8d3d8a31ee45fff8c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4c7835f9fed8063497de0a9b2ebe05
SHA1a82cec61c74f45d505146f76fbe864086c3eec0c
SHA2569af82f44371ccc2725118fab95bfe50edebd56a065a4e7f29f19a54dc73f5efa
SHA5126b6ce3f2f8014124ee8ccce7d9188f4dd22254f4f16c02ef6eaa32bbae0aa0e4fe9e95be8fdfdc9af3e10cdcc817c1661566799cd4b4f6a944c3747a77034231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551500e9bbb835edfc384eb0eef7b53d8
SHA183cf156aa4667a14ee537ff43c15a6bd3010ec37
SHA256513277978d73e0285cfdac0f73d7b4e65528e051382cf2497f66073ace181dab
SHA512deb48e998ec2addfad4c5a1b8a3368696e1a57f75380ecbd0628f42ecfd710626e67f010f194ca720494205c25e3da7c3a7709118fbe5b678f22dc1f5f9166dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22408438e83fd893f89be1a3dcff51e
SHA1c05c447ed70d07c076f124e2c2e9ba9d8297594f
SHA256d7b9e05b64372ea6e62a32b27a300cba51afade47210059eecafd2efdd62e0c7
SHA512a46a2af9cb027f7cd4c62735a5b82bd313a1c50ded379f3d0e900500e4e80d41df920717b979eab785c624b927c3ea024dad1b2a68a807273f1fc664a07e896f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342674f082a90231f5708cac6990b629
SHA1445dd58252db848195ad5933379b2ade6819f1a8
SHA256e3f7b63cd725387f28b4055e571efc3c861f35f4fb75d486c647bdc52cd72d80
SHA512a4b83b8ead5b5b3d257712f4a93e7d8a2f0a1ba75559e81580ef9ac003d3adad18c7d79f407e1d6f1c658bf24d4ad5d06a909443f69a81d8713e1ec01ebd9c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539179c1e423dafc26ef442315889a872
SHA164f2e9938485a7f85fc262673a570c39c1f96c25
SHA2564c363118dd95a57196c2ab6aa640127c0bfa3f9d593e826ddbdd7bfcad7b1989
SHA512f06a7ed97ac4a8b48fc546cb95e67ef1034a2782fc81a4da5fdf71924cae9c6a8fdf7ba671db319f6f0a39d80e00c7b0de611863ac3ed7fb246813f695ec6d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50436ae14f9a873bf710b1e59b2c2a562
SHA15789049c30afff045bc42bab5513b026f959609e
SHA256aae8c3c9c9b68a407372f496a974a5a024b7e4828bd2e603d3b88aec37f6d649
SHA512dbfbb041cf95c16da9f50e8e967634ffd31c0c71df52b4ebfd08c487a00563ed57e1776c46e8d69947d796c4da41cf4b3f09d7ff1ef7d977e061b72a31717803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f7dcca863f489f62aa111518d507c5
SHA1348aff870713619e9cb474195199ffa5dd428a4c
SHA25623eed09cca1aec684570fb3dc7d187b4334bc7558cd8a3875cfece0cd83a7923
SHA5120812dd82921c97985f2f3b245d8567b7bbd4f1fd74c70eaafc2229c69e536592e7d8c75fb46eea95a16bcaf8dad86dae5398aec3a867c65fb975f3a01dc58d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655ee8c68d7199b24a1c28864a712ab4
SHA1036762d38aaca7d795c9f2fc69cffde938c4bcc4
SHA25632516aeba28d946b00b844d12aa6aa51dd7a8af2affa450c06fe00f60ecbe813
SHA512751ad755299beb42730892524ad5ae6b5d4659e7600df4a8c2ce12d19e3ad17988c76fb798d43521140f728cf7a3d2c95f21f5821c4c156b821943c390f03dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9688b2d8aec35b8e1dc5058fd20f27
SHA12352e3a820cd243edd7008cce60674a859e6ce5b
SHA2566c519d71f132c8e0f39b5dc4d516dda835a52891ef3579d46676a9ab824bcfd2
SHA512c3ffcfbad6f9cec3c5fbc03b905cca51473248193a393cc49cbd26654e3ea11c195749464dd0f05a0fe14243137ef63339d92bdec6ba390a564719f04fd0b244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65945a190510393ba1b35514d822ea0
SHA13e5c8fe17fb6d6fc8be485618d9d32c08748827f
SHA2568f7ecb91c8d3d7ecca15b0cb180170edb4cfa2fe5467356bd055c7492b646f14
SHA512443f40a30342379be12ef919a952ff00b159f11531e698b783bb6fab8ecbdcca60e261705c5e6fb61135a3b95bf21e1ec659e0af0c5bc4bccb85096a9a68866e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769439511df410ea0c054489209b4bcd
SHA1f40b7772e08ba265ad3071b1b5bd8797bedae74d
SHA256e71bdd850aa67fd44bd937ce783fd5361fc24acf358360e3b95dab2c4ef45754
SHA512755edd19c94a4ac06288f30791c09e90a9ca6b6f779cfa3bfa4eeb9eb7e4211c5a9dd771b57dd9ef0dfb28c797db8f62161eb586e92ef31f593e1e1deab51e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14237dd16b6b939d5f556bdbe62f3bb
SHA1ccf813bc1cfa4040f33abcf902e63b9f2f8350ef
SHA2569f19d196bdfd1bee02d697a9563a569d97f5dd210d885d961aabc85cd82008d4
SHA512277d1ccba040405e30ee30a62c193fda21276ea09ea0a5dc5cbdc9515d0a7cd7f0386494b9c1f49175d4efb92ea99b7e0a6540506d591b773f6629a6ec9a26f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD584520cbcd83846a5ab698ba68ac97571
SHA138fc27734888315d982fef0baf7a4bcc96d8691a
SHA2560c2d4d9db9b20e89fddaf208f15821f85b1fb870c5b522eee73e92f8271c805b
SHA512bf9bcdc8ad59f3952dd07a32eb9916c58c464ffe432c2635750fa55e7bcd28d620e54f9d3c6a15584385f256a2d792000c4d607ffc0abceac16da559811bde42
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b