Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 04:45
Static task
static1
Behavioral task
behavioral1
Sample
a13f0bd257eb92dfa4780ab5a055b951_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a13f0bd257eb92dfa4780ab5a055b951_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a13f0bd257eb92dfa4780ab5a055b951_JaffaCakes118.html
-
Size
12KB
-
MD5
a13f0bd257eb92dfa4780ab5a055b951
-
SHA1
380aa4036434f4e43719843b0b9a32840a004923
-
SHA256
1d0642ff1c880abe477d7355e9fa834a24e58deca2e0aa00b93cffc8eb5a9836
-
SHA512
af3b8be8e31504282f80c72990800d01f8e9bedb93bcafec53c09a4969b823f9f56c789e146f9700117ada6502c06bca8a1269d00d6c276479c5939a33bc5e05
-
SSDEEP
384:sulIc0V9jhShx/guhcBhTZhDnhBhchyhZhW0Psw8guLZ:cSBgGYTLDhTUyLtkxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B6AEC41-5C53-11EF-826E-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430031803" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004bd6c1c32d367c63151af142efa3e3fdbc160b70f3e2c5a6fb1759e238b26ca1000000000e8000000002000020000000685a694b1489b9d0d4ad62f04cf7fc1e8570eff8aaa64af5b0ecd9a767c99aca2000000024187b84eb84a223f9629c9bbb255f77529b68fa15e61bd4ba21ef9e89a94189400000000c5fe6642401c985f9e12cef0198b8ac36da7269182b6950bf965b071459648f894a9ba5f5e62f02468f59aa278203fbc36d3cf4f90eaccdc1b0eb2a2cacf78b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f6658c60f0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000027c623bea342332a6958bd9243c1dfb21cd5a1e686f4691bdd77e85ab251c067000000000e80000000020000200000003d595512cc138d498846c5d56e47003a3e9bd0a89807cd2f738e19d33463681990000000c1f3db6f28789a215ca4e004f78f8901a9049d2d6b45d1683c00b233f54d785037f95ec813dfe79dd5511965d3b14097523997e39e73f5ae0baa8574eff87db092fbdc0201da44a578b4f1474f9b74dfc3c8fcdcf086b7b95bbc84d510806cd16448f4a4880e9768d93804cd28dc8ee1d2e301891bfbeab9e22d2a1fd093eb91c2eaf67b134cc91dbf6f76b8ad6a06d2400000002583017398d2c00d1ffa198e4fe2038e8da40944c34ef714c9e0b814f1f3486e44b66d423e0cb2a5edb5453ade6f8c4e30bb9c4fa45d32ed6cf4a37e3e722f08 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2820 2164 iexplore.exe 30 PID 2164 wrote to memory of 2820 2164 iexplore.exe 30 PID 2164 wrote to memory of 2820 2164 iexplore.exe 30 PID 2164 wrote to memory of 2820 2164 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a13f0bd257eb92dfa4780ab5a055b951_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f727a7fa2dddb80b1368db9c4fde872c
SHA1d02500c1a1cd0bd35525f617a3ec514d2663fd52
SHA2563c25c687f563f1aa1fc829c6eda2326872c38036b9b2eac08a412ac5e811758c
SHA512e31f88debae1888aa7f6cc2693d9a9fc25021f345a5a3b4a3a7389180ddd675128056a974ff9b34c5f19ee66730ad0d688c84b8e06ec64e6a27755baa19c692a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f995308aabca30ea3d215111939cbbbd
SHA18b1b24514eda6ef6ea0e2d52cc095d1b7405a3eb
SHA2566ab5a18e26a1d6d0c4e6196cd3964c879a47233eb39bb1da4e1e4c5e29b37555
SHA5128c6acd053d5f3cee8061e7198d113b70b0e54bdb2aa4282fa3194facd93ddda19d6f37d2992426308bfd1449a052e624f238041c76a776436d3a14435c2975ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e3e50d3b397e15efe03344915a31eb
SHA160c3e227a5fce814a4bcc9157d99dc901971e5d8
SHA25678a5f8a6bf59460d01e87805a513ad7332d96ae62bf0064c6b5a9026fc696754
SHA5127714ab7e6daac191cdcad1b14f631e3e9b07d8e09384de873349472a623d9b5d8fe9f3d0193b51cd9a44087cc86d7184872ead7304d91359a25ace2b3bf87fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca8bf05daf3dc76d42a2d58567f83a3
SHA1acccb6ba91bfa3b6bb3740a0ab020cbfb564c618
SHA25690dce583691503c663b2f305c66526674a7a3fd3ed3419063a44126eaa3e10a7
SHA512c6d4a13772307098e135697974d62356339fe563193d4f9f6f88155b30550ab214177a49c3813cd1fedaba1d72f83788ae7432b23462c8ccb8a8d876ace89ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4b55d545c06b667d0cb1e75285574f
SHA1c9a6984004b48c630647c2f935dfe3c870dd8a7a
SHA2564bb9d1e186ab168ce130a8578ad95b97ca2dfc9ee3fb3b8621c00f2e5a8685a2
SHA5124624a56dd18af4a79a422f65a3a65503806167f82eb3f456cf5256d774a4c5343ca0bf96761464a29811350544d6472869d26d5690159a16c556c5900c4edba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59d9e8ba6c2552ff3fdd2a3b2f79b42
SHA1d1a91f1111f5018bb29688913a9d619309b7e06d
SHA2565e4b85e2898f2cd4e3a4497d2aab93ec3e7fbb9b57fe25716030598446ee1fe3
SHA5126a5db23862e8610c9e1a4e3a8c2f79122d823fb7397632eb97e1369fb8ec01d1abb8c0a92219db81f9a8b823de30ba62258cc85596a5d4ba297e0281fb5f27a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63d79b643ce5d2401606bd979ed44ef
SHA1d7455dfefa5b5c7106126df1ce1dc906613b1787
SHA256b90949bbe89de53a2c71807c6c395dce1c3ee6d3fe284eed77ad34622bc58a24
SHA5127fa85b13689778825684232e2b8b777630fd2281c21ae017a058cd0029cf514029b621345549e5211384849d14eb490038caa655b1b0b29e8b5220c0c2208acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb19d458f620754ee7282a8f2f2212a
SHA1ed624f22e8589db64fc6c007ed7145c18074e0b3
SHA256e65fac85d9f69030d2a45a6808b1331355ab98533902da81f57e791750524c4e
SHA512ce723e2ce26db66ea73edde812665165ef3e716b4068df99fba50f8b4eac0622580c5b86b79952540c0335df3e7ed9055ca06f8cfcc0ef8730551c674498b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebe8591ff610fe86c44e883a9c944ed
SHA18f9c15d1f7c9b5b551e0bf67a3d1522060ffa85c
SHA256daf43fbcdf2c2af3f76d6a41fa2f13bcca96da9ca0566e3a65945f7ac3849830
SHA5123d31886ae447e9b73ac8ad22985eefe9be779856fe0f75a13c5bd463a3d1ecf3adc8a0a72885f778051cc8379cf6d0f70b0e230020d5e5a9b2ba80fc22153a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b743ae5b777ad75c57b47145033dbae
SHA14491ece605d6cae340debb75f2f63b2f41e1a680
SHA2560a15578229abe8548c59289e5c5fdd0fd34545ccc78494c5a77ef0256e24aae5
SHA512f84f75dc236557b72b743eb9d78aafb316f9f90b7503d91340e7f019b000ef7ba12ad4b946525b3121cbdef2f2e644206e558247247f57dec9763c1dcd909da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f225fe49a3341962d1aecf9b8933872b
SHA196076150806be20653d0641eb997e7eae6793308
SHA256d6d0319a692e835756582eff0b5d24ef8290738e9f815183d262c5ae2d672b81
SHA512a5f167c86fdd43d7e76bc44b670839acacd68677d6dd32c5615f80fe7edc2f29e40b58f88642f3a98509647ef37b1942e4c161b9be82df6aaeb93738970efc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50563aa6d0d10f8d8cd4096f4d50c2f95
SHA141c2d2252756b4ff782b3e602c46d78b8f05688a
SHA256d63ba28154894f63458da376ae1b4cddb1b0ae6d5cd0a4ce30e9e2ff238db2f9
SHA512d84ee932f542363ef6783ca687ba9a02b2d48b791177a45334f723f77fb0ed2cf3ee347d86859655a2268fe4e172e76ab56e8765c0d442736e0c3e9d0bf1cb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9874474ba421854565efb70318bf05
SHA176ec6f5f5b14a7720d4a60ca620adc6031a95bdf
SHA256cb2d86f3c45e09e7d1c0c44b2a674974daaba26066c777d125307119e59c9a9e
SHA512f6b15df1541669e0104aac1ccce33faeaf1686859fab5336c87161887b95927202718c8b02fe27dfaa15833bbc618ac47832687dbb32a009b5f72987c220cfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54053055b3cfc9f685d9ce0e1ce4b29f9
SHA1f589c1beb68df5e4c8f35a8c9a1c6a3ec5adc0ef
SHA256a4dc2c3e0cfa3aff67bc70aadebf92b4c60adf84c97e65bf21e7c97f2992789b
SHA512010d72da96750452f589bfc326e6cab7bc5b495cb32dab724a52d2e358c5847abc26968a2a6019a0184e696681de8c09184c7767f0f053736b9949a1cbf776fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab386440250481de403a1184cbabad7
SHA1516eb61c7ea28945ff9c770f8dc2031c5c4527b2
SHA2568705ec55fafef1f0646434873c53f73444ba1cc98f51b1c8d2def8565583bf4f
SHA512cac203318f2fa64034733390a100ccaf69729ac8196224cd7a5849f0eb25b336b3a282d45a806babfab8a904cf221fb8708fb745f7b84b9a37dfc257b6771de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fac704f7ff1428a1504bf017ede4caa
SHA19f3f1527b9801341022572b27c696858ac9aede9
SHA256582f38038ca43c673ed8fb6c88979f2fe63783d3be17f5be8bb3edaa49db6d68
SHA51219ac54e88cffb328c911cf2a7118fc824ef9152e773a7fe62f5dc6c3874c7e388413905d9095953fcd4887d2a49bdaaf61df7dcc691378a5e726fb4cea836465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c432966ef52d8dbc50b3757862f8c30e
SHA1e4f96036efb45b3d0d8a024e7cab7db235c68282
SHA2562da734eaf70b65988247857d8583c12de839deded95667abb33993e40881fd1f
SHA5121aa8aed9cba02caf4306cf91c214cb48f2717b1b052fd0ca245f9024583158e20da0c94d6c42acd3e43362ac361ad1206b822c8ef35f85c7a2abe6bf03ce74bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b701e3773171f429bf3a9d95618b094f
SHA141f277b87da4b6ccfb272fd5fe6b0e14d4ab2472
SHA25600960bd66313a9a42327e85a625d32525b52ad554b856625ee38a9b647e451bb
SHA51274d86da3889bdcf37ce8e1a73d8195ca0b1b854b964a79dd0262a19c230722f617210ef138ca5547f9daf2e92e24b0476c721e96f68b35c0464424c4b3065c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590dc8982da981ca2843dcd850c073f2f
SHA13df7e8326d5b9762e77f5ae13609c9e67cfc8bd1
SHA256bf93d46b08a2552cecc6f797dcac20e31e926c0a96df35d266dc8fe56c26d0da
SHA512635fd3776b2efd4a85bc51848cf422439a823cd178dfe740a33c000dc92b4bea9992cb76664e6f6d15dd7f43b7f3836ee41182747fd59622f9cf9745fb17b2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b229d97b22d20ac20fe8dc78632b765
SHA1288777d755e437acca9e226801f7dc4be06d71d0
SHA256b03de91cfd60a5b9236e0e6d7b78e60865555eae61920ca8d8e87c34787e8414
SHA512f1d164a329ee3f306146ce57dcc00abc1a8842ff6d8551e2f7d0bd499a962e3571e541c57cbe645629d7db9d2282a46046037245b5e59a5a475f84a196b75d28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b