Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html
-
Size
48KB
-
MD5
cf4d2dd24e63754f122cf757d8740c07
-
SHA1
80559e936e250d96c148ed097c5f3be20802ae85
-
SHA256
9345dda3b505770fd509d767cd424d4d0059c70c31be357bbb8303ca9aeb28a0
-
SHA512
81777acda3e78231c19ca4307384f508e2055e8fc3706be5f40c0617e9a21814f6b80a4009b6442109c98544f1eacce4bc55665806e1ecd6efa234d64cdac325
-
SSDEEP
1536:L8IRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZO3:LfOjBJQi1qNEM+99U8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45A17BD1-6C38-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9023921a4500db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000001954a604ac52038520cc9be19fda3290ba07a15aa14aee7395d78db63d304ee5000000000e8000000002000020000000f232bcffc6565e58a4f2165a6d5785ca8de573ac431729ee6760982b81d56a5b90000000bb0b9953d0b28f5dc1867b6edf830e9d7e55cbed31d7a76a70af0844bf224629c6daa18933d8463d195ed27dd4590bc9a6e21729c3f2cdc42ddb155c51e9f3ea90ec04951540cbffa9af14581920c08d9486cfc05f9b9410e2382da08d2f5956b6a515305a1fc639110d7ee364c39309abfd1c05aafc8b3295e3a4092a90796e34d7122d8ba8929289ec784dbf95e7064000000044402d2cd6f69ebe2b973c19dc45fb1e02bfec3f264bd1f9dd9948f6c3cfe906d975cce2acdffa94fc276447003426fc67e3c56555e2fb9c6faf2456de78a48a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431779308" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000103f7fe356b0c09fb27dcee2fd960ac62dc6149e01558b1c31946e04ef7139b5000000000e8000000002000020000000b628e0ad36f5bf9229559d1e79674dbff3cb1b5b957d46f9d62b649e1380ed3620000000a0211221f0b9c231c83519f7626f7d8962943224fa4a3eb29df0455d6f2e98ae40000000a147eff17dc826748a0dd7b60d4c066d85ea746d92bb725c8048ed91e46303be59e11495983d94e6b2457350300120895b7d70f0c9b2caf0255547b613fcce84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2840 2280 iexplore.exe 31 PID 2280 wrote to memory of 2840 2280 iexplore.exe 31 PID 2280 wrote to memory of 2840 2280 iexplore.exe 31 PID 2280 wrote to memory of 2840 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58834f341003acd30f1cd26fb22f1b96e
SHA177ff006b860331101889e5192360806f3abf6d34
SHA256b58dcde694e7dbce7aeed037382b0a4dfa261bda1fe6e1522d069f29657e080f
SHA5129f4c778a0703fe38483d9fedcef1d75969126be0e84d21efb219aaf553535d0d50abb1463261e1b2a9ebd4d2428a81bf27004a5e61e6cd7bb5e45602c0748499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29a01d6837b178434e34a69b0c27151
SHA15f3805800ac67224b5c9e3999b22175863981b28
SHA25685ea21f688e4782729e6bab4415dbb097c31f482f376e0d3c358a707cdb19365
SHA5123198e796650935093d13d35b81a1e7819facf9de54e8f5dd895c2e1ddc437b2046f4fa7f0803fcc8ed139c3452586aff8c72a21f1fe5944a174c81524acd0e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afe72d8b3299d017c7af8c41b98a34a
SHA1fb98ebeab11f8e2ad018dbae1e104da38474c599
SHA25626a8927e5ad66919d97d48f463ec1684e814be67779a6637679bda197072b417
SHA5122960864d0858f4dbb12a3be422d47a379efdd3778249bd88e99a648f8e00cc98970709c895d0c51fbe0c379fae4643d5580cf42df4618c23b91aaf9fe0462cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fdf9a1d88f9fc908d3e3c65336a5075
SHA1e847f18411ffe8922dafaf2d263012dcf7efd180
SHA256f0b8d9862a875b3c06630a9c30ce37853766eb39d63672ee25ba1c46064f9df2
SHA512e0d81cc31c0c1bd55752125858e95556c1923c64c23f3cd2a9a495eff580885c2c47437a4eed8c7209b6a2454e7b93e0ddba7d789734ea1a1dbce4a692e16d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759218a25032432a3e7923b0080eb0b5
SHA1e612fed513b0f1d9c7e9a3ad3e34b0b6d17e59a0
SHA256fa4dc0ec2fddc90b6b4c63b8b8874988e168cf040e181507491d742171df5faf
SHA51233478ace25fcb64868d6cf2eac831a73d2c9554e9ff5664b44f19ed93fc3994135f261fb379fe0e247b63b0dbe0c66e26efb2df19b0d8f1af5ed25e8e49c52e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51347fad07a5ff9a7ec6e7e0a0d8818d3
SHA132c84fdc60d7951212737fd411766c2605a0d875
SHA25637044cb627d0822944234284f37c0227114e62e32aaaac5e59595ed1b0667310
SHA51291e826961b77aa6a92273027a8a9e43cc3e532e3205ea0ce178c236dab52a534ebcb4cc72ac37a59e13cb4c985e92bede3566e210372a82677eccae698b31d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126fb3463dfd5715c281718d21c7b99b
SHA18439c3aeddc9f88482f68580a15dd8dccbd63492
SHA256d52b368cbf271f3ff23ccef105651c8011896c907c21e2d50e5f41c5bcd763f5
SHA512e8dfefc4d0835bebcab80e8d5f96fcf5689c9280216622e3998f10af5a6588f1f3dc734ac97e8cd22d8d1910a307a98fe59e010a421b021fd0e636cc2ab21088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a128446cf244fe04b0223ca7f9d8a40
SHA153af1d1ce02fa3f960abf515deddb1f46d79df1c
SHA256104630c3a40afeab7e64b900bd717d1c4dc07cf008021c4c1629a8f0adc70571
SHA512390c90c8f98b6edbd308263c17386d1867c807a955ab1e874546aa47d3eefaa4d166f5b8c497578d33bc6d88cfc5981e31c829bcfc1c399e9f87fc8dff3a2736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf920d6cf69d6e4bb0c075afc55c6b63
SHA1f319fa398dc82901c4d3f44ae410e055f3d2926c
SHA256538fa75a5543bf01c4d853b148b1ee197c8dc463f398ab92f6fdeb45c3892d49
SHA51268ad3761a22d46c283ac348d35a579f644e70ee16f6453320e5b22ce753526a5363d098733bec5be462f76dbf9bb45ea16501cfd3393f78c18308568748507c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31f5e23b9f13c44a18055611783c47b
SHA15ebc5d87427ba8dec461593b021d9dc644b9bacb
SHA2569409beb6f16ca7dad15c15d9ed2dddc59b1cbc19d00a47618121e5b9e95af5aa
SHA5126f8ba5358656b6fcc039de93f28da2f5fedeed5fd4c30514f7c794a02f12606ea36b29ddf0277a1999838c8673107742897e0d6939ad13e6959da55401a0bf34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e2834820e44a390c5dfed650176566
SHA1b38118fb0f4d92237a6acad0762f798c54e59260
SHA256feaee675c59d7ce4dc312d04c31fa888004e8156d73ab6c03bc6fd8c8387f9fa
SHA51211b74018633e5f64763ba658840d460175ae4ad7e0bc5b3f3a11e3dc0b52dc11220dc58ebcae85067c537118238316ca87e4857b699a5c0e9f55d563d3f40165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dcdb09ad653809722ca1fe756bcce6
SHA1bf92c861e776f3f1af0cc136b93f92178b8dd136
SHA256e45207f3cf0100074b256e573474950a07dece42019d6fc39e0dc006399f89f4
SHA5125c66aad91c97e9bdd76c6200d5181cda21b32dbd78d36cfdd9afa0bc93837968687437a1c0703dc34cea350666879b12352ffdf44a948667b6d6389d2e3ffbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a351f8c9fbe3182b1d5b6c57979f45
SHA1ebe20604845aa6bfa4063fa5705101d02e9e030b
SHA2567edb0dc7d142acdec804c80c2c89305681a0ff73526e85aa1dd0fd9e4d5a4311
SHA51288ec0ed1f4493fdb9afd0948818a616c26905140569917c62abe0ee0244e089ae50fbac7879f0765ac367cb8819aeff1f4d9e2db38ceebfac88d15e205cdcf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50045556da457e68ec1c501eb35d4812c
SHA1f4f0b8ebea1fe463a33758518622a9372c6cdf40
SHA256b32c7cf93bfa4b16b4ca5b8da1eb0876f1824f2697d8f524b253bd9fcf641a3f
SHA51231cb1aa1dba35f4918a3ad078bc6c72c0b8e2b092633efd6b692e99e15fd1f7ad375d6baf9bd6ef93c3c629961d64f23de30cd684402ccb39dd9faf2c2ca64ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332bf56857fc96e15b54194e07ead98f
SHA19f4938e922120bad0400213218140c46dd1dea2c
SHA25666bd4e9c84339b868f7f473b45aa3210c9b5a8ac536ada2fc199c01ce920c433
SHA512a2bbe1ec5710d8d0403a2665cb375e71f0f00725801cf79ae059c87574c808ec0aa04ebe0580e7152e899c3a615ff46b37609bad3810116baf8aedaa58f6ccec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a66a140a57c0f7c26f92750f67a5845
SHA1fcd91907d1ee6cd8f38d440d7e01991418019f5e
SHA2561481b4c0b0c4072d6c893cd4e5fe5f85cdf367ab8631f83b2c906ff9c85c8f0b
SHA512f33b91fd5cea002834ff5a3857ce2d222aa281f64d2db263ad27ca415967895f6abec69e817cd045927bd4f0d634f2ffa9d422923fdad3b5bd838ba0e0c0b6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b5291250461960f8d86d7b96a5044f
SHA143d0708c44051269ba174337d6b22678225dd24e
SHA256e7fb4ab8b9f44830acbfae1f86c6849f06bb498b694b06f3500e204683493698
SHA5120091c32af9da853a85e3853bfb139b622566531c0b80ba1a967f55dc977fd1f6f69b2041cd6c9e486ec2816d13fea995d9fb82b43317ca47111ff3c75f745ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54134f46c531aa402c099e0b74e9930b6
SHA134d1c07f14e3b6b288f721f523d47d2087163f48
SHA256349eac03e4d0bdc57dc86c22baeac523fa31fb55638b632552ae9c100fac3907
SHA51223ff26fe2f3793239351d76270e1ad5daffedee3b0f30d72c7f702dbaa8d990fd5253934e82b17abfdd24d04c91e620f00a68a914dd834731b403980afb3d530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5076468dae86b3819deedb07cf01a5
SHA1ecd33b2216093f8911359c9436c6b0129fe49b91
SHA25638f0ec189e32804b7570326a38644bf255378c992d7a43d9d00391bc63077603
SHA512fe71a5f2d576991782d4bb4a76a59695bae3f32bbfdd060b53593595e371cd2b65b455b7464ca252afd679a53ef3295c40c4486ac43f3a31efa3a9373bcb9ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500815f038ed659462cfd22dd11098205
SHA1601f0bf61bda113270a3e65b0b593e20e06d3e41
SHA25612cbd72b93fedc3fe8fcf895e33dd151c1346f26cff1601a647ffbb7766302ef
SHA5129f1042d5f2d4f2aa0fd0aad1c2951779e2d18fa6de84fb526ae33edf19f6faeea42e942ce995a8e621fd3b3b951a5bb7cc5628ee8d0d57d4361c7c8a6d836ea3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b