Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
cf94caa0d6e3493d04ff9014791c661d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf94caa0d6e3493d04ff9014791c661d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf94caa0d6e3493d04ff9014791c661d_JaffaCakes118.html
-
Size
7KB
-
MD5
cf94caa0d6e3493d04ff9014791c661d
-
SHA1
2fc5323609918d539e7699f6b2035d4997aa21d0
-
SHA256
1b661033f91288d22ac691a59c118e2625e2e447680f7a6d6c60ce0ed0575610
-
SHA512
60824f594f4d5b0191e82556369d3d18dd1cf552c87ea6d7c00226ffc1560e32e1de1e6175bce29794f44f586a53d71b4c92ac8e5aa6cccbec84ef81a638f0bb
-
SSDEEP
96:izi1x7wQzcgNq8GAM/bJ++fYLAlHvGBbTqMZElFuwXCA4z2rLh0xEfZwo05Exb8:Ii7fcgkAM/F++fYLA8eSbxqUEb8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DC29C51-6C4F-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f5121053af7268d319c3d18878f505dcfbaf5c4f05206d7da135262212e0d594000000000e80000000020000200000005efddeef767ee54fe838e8036718f2bcfd2898e55ead584b557b99514abf3dbf200000004ac00a4d9eeb1f232bccb00400d94c2b817b56679919ee535ec5b3ff79b89fe240000000b31ac9174ac2c3ae71fded112e762907867b7204d819919d3113e65cde9a871b093bec1ba3932396b587e28d02ac2188f333c645913e36530a40c80c542b0e07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431789228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008b2b314179eb1160db8a3db199b4457b29d9260ad645cb8d35cd88ef3eaa6353000000000e80000000020000200000007102de9584620ccb0a3266682660975209045cf2f0c4d3b9c9c3a7fab640fc099000000063120beaccb2894b5306e48808cda739a3f0e0ba56ea7d14c8516cb288582721adc3e529c39f23f22b55758b223a0b57fb7b475b5099a4114490c8e58f754c2011378de77e44250e4642da95359240686f8ac96c17303641f330d026b5cad5b802a2f5101f8e83b7febf25dd060428360b148c3e452742734092c64e60393bf4dfd4c1b9915b63bc3e755362bfe02faa4000000094694897259fbf61309b6433c07975b863872fc11905409bdee8208cdd5d313845977ba19a5d4d5d9b5ee462e779364f244d40fcf2538497434bc42558457bad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a3fa395c00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2380 2156 iexplore.exe 30 PID 2156 wrote to memory of 2380 2156 iexplore.exe 30 PID 2156 wrote to memory of 2380 2156 iexplore.exe 30 PID 2156 wrote to memory of 2380 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf94caa0d6e3493d04ff9014791c661d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534487ab36edaa0b9bb14b04a2c0940bf
SHA1897e65f064c922b264cbc3ed5591f1fef9c5ded7
SHA256590bae0c067eaa8b45c6a13c0b100db763108ae7d364de03c8b961054a4eb1ce
SHA512fd1b3e69596b0a1cca95acc1b9e5b8f5a949236dac4c9581ad960d13c7610be6272e1f03c923c39ef3b22881e0549efb8fab70667403f1c0442200466bee6d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eaca39b5b4f28373ee68b3c729abcd1
SHA12b44abf41277938b7e0a6faa3c10050cdd6d19ba
SHA256f95512c81f9d5ba9dc58fe46e3b1d1c3f2ed0afc5083e5a70dafa6e878d4c8df
SHA51220df67b301ca5838d7854dd4a850b98839d0436c1abbaea2bf6fcf64249528d2653c0479158d1f2dec479fb65674c13b3ff4746c9a7ee23aa7d41fc66a838668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f660a64f142dc49c1bc1adb00b5b684
SHA19dba4d3cd51bb1f938c26c06251508552e567d6f
SHA25650d6272eae441c08a3661fb049da34532222678c4377498613f1a38663d04b9c
SHA512129d6fc06684ce358b7be440dd9038a2aefdecaf5a6265e49d082e78dabbfabfddf13308a2cc02437c4eb13d1c218551816203eeee025d72d456ab508b25cc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca3be547b36af0d9aa0d21650afbc61
SHA1950ef477593b40e3dd7597da49d284f22d86d066
SHA2562c1eb383f7fde8e1db444cb331d7fd9953f0d44b3075cf4d2de1a7c3316717b4
SHA51287b30f34683bdd5829716a0c8d2ec8d372c8d079b8dd01ea6fe07c49e2c8a962eca1692fe17828abb2be3f4b463a030ba42befcd9db0017147be1b44dce7fe1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606b5296f5cdb0ad69ca6b8259729a80
SHA16fb13e49bd865cdca4f39a5a856e2d50e63528a7
SHA2566f33066e5420ddf3501a7b03e6ee672062526d5df7a894e8deb4d57bcc2069f9
SHA512ea311f3a06485953fcbf039de35ebf3672188542098e8700dc555b5c20cb21e0a9ab12f82fcc2da5e2a3bd009f0fece88f0a6b9aa74bab1e5527ba91d0e59d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578b27e92b44a54a6453074649813ae8
SHA1b0ec6301ef10ac3fe0bc40d2063f730fc7733b88
SHA25636240ec20b3b6fb24bb779f86df91f01643bdc46b47b3b1b78bfc73dad05aad0
SHA5123426266ea4b37ef6f323f6bedb7f741db66d6e1adfddaed5b6954b4c5352cb38c3eb6a333f87a96ab8b4d27cc5ae3ab5cfbd132ee3e0738ca442a75d064ba12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3ea4427002f4174849e2b9d744dc3c
SHA1e3f8f281dfd7dd49e6d6102f11dfba9925202c2f
SHA256a1723f4e7b8630f35296605a3c5257fb14e1e2055a643b578cf61d9808a4941e
SHA51211c3650e6f18a975b36552c05642abe9dfa09e557e0305607fa1dabc943cb2e06fbd6284e79eaa1ec150dab8fc7f993e0b7b3fcd8914b104c4a801680e924795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2401f9e52ce1f4d1bfc9b88db60bf14
SHA10cd5bb1f9577f1c740f6ff23e643057c50abf0a3
SHA256fddc813d788440d5afb58d09e048d398c1ccd650897f35863fa323f7f96a84a5
SHA512aa65f2d72d25784bcbd3c9daf16a96f9db0ea8a38b5f50ae79344532ce3b6f09ea25f6fe503d4441269e955a7990b765188ab39e0ea49897fa28a7cb24d0709a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f795f0ae851f44408714895e7f1ff95e
SHA1e1f17f76d2346f92a37c7a1bb187890bcbed1ac6
SHA25699f3e9b66fa06ceb14ab9de944e05aec9050768212ec4201b514a7e2e87fbbb4
SHA512fdc499e0fc2da1bba0e9fcbb5bb65de4fd5c72f926bdf108a5f818d6a1b0935837a88044c9ac8fd5bc66417b4c97c27ade1751f2c6a8b9f407df1cf6bf1399e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d537b73f94874a0551778d8d2edb691
SHA18025e2001b2a60da230c57b51e00feaf32e24fa0
SHA25680e9c9474030f2406323c2c83177b78e2c9d77b669e5fc81cb5108f189ef9681
SHA512294b4b06fec5fb28b7a937630277e639358cec34ee6fee852beb7aa6ebe8b34dbb647c4a53d9c44d69641521359b973bd7263068cba919c67c10e9a351073afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2c554fd30e1c5ff3cc504adacf01df
SHA1165afb08f182e1b3807a2227697cf3e2a647ed3a
SHA2560c8c34a0377eefa3f872b368d22e14a1025a9a41d80955514182408c337caa33
SHA512e8b51833107399604b53e49a89c39f44b9c8391231bc803abe2151e65fb6c712bcd7c3e1160e44ec5c3f241bdcd0fc3be2b3db9565b02860b2ab84d5105d556c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c97d64c0a5de5f145f4a9d002c3c3fc
SHA10ba572a354287a79703f3f318232543d0e25d10c
SHA256b775a0e68c50e166879d8e9e62b487fd37a8fa43a52d2e0014bd3a764532fd07
SHA512e4c9c22096bbee2e62724e89046494bc5523bcd74d43b5c888ef576aecba3b9406a450c02c1b090333cfa6c4c4f4532f98592fed3c57a70e7ca7a91ce08fad48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3147999122b43680fd9aadacbe002c
SHA1d725d0a750ba392a68ccc22abc2d93815e0029d8
SHA256abf4a3fbaa3918dc86b7770f3589b34e8949295b146aed6bf87e419be40714e8
SHA512db1aa994da3bfc5c9238f1fa70be731ccafbc50467b7bb4826f4ddde2f9c496c6fea325981526c57d41e9ad5fe02a7e8873e0c15d3d7f805a4ab87aa5e170b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f34b2dfdedce9e75220fd557b191dd0
SHA11300d71d9f25abc473d01cc562be2b76107477e1
SHA25628bce7a4309d6c6c99d239181dd75a28efa75b300203fb07971b146dab3f156e
SHA5128baa879b0f95a98620d4a48c5c932cee86c17ae2aecd3724e3667d66c27cf1fe539387ada62e787c2285dbcf2a7107dead19f65b5f0a8e11295ce8eb7b267f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1b1ad43901f29754719ca0656cc217
SHA1c413e8976be97546cae4217a997d969d96177f5e
SHA256fca45beed88420fa74213bcc9e75bb8667d2d37aa9d997d469717380af8da19b
SHA512b072950055a7c3acbec2892453cba4e93bae369613a1f7c807024701e65a30eb60a4770f985ed4bf1a6c8c15ca34a76a184cd90d4f45d7ac0a3d008118c1f4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55192504252c33c378d911a64ffd1951b
SHA11303f3d538d230bc8446e2dc4963e513bbf7047f
SHA256720998d86b1050e2146a8a1ce80c32c61346d2bdbc833341fb7a30f487938f51
SHA512c8ed8698239ebb142ead7fba1b7ba0c26f881c14e48f688bd779049fb23b3b3b9cdfcce72c5c7c33721e9cd77dd1f4515fb1069e4f674a46b9fdc2c5feda021f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dffe691015657970d7b4e47f0bcf6c3
SHA1d49d5b44c277e639402a7bebeba99d830d687910
SHA25681ddce0490f1c5d25c4c9134e662ecdce5f8758a0e996548c201f08605b135f0
SHA51250323786165439346a611fa215734a18b05ff06295e79ca932a8ad1602cd94c8ff867f692b25f33d483760b32eccf167fec4aa23be46191dd8b8f1b4f323c076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58887a4266e78d421539f5c7fb30b1446
SHA15c094e9eefcedd715abc9d1fafd2bd649e0a9a71
SHA2560f26136f6ff831424afacd166a8abaaf59d10df7b934bc6a7a9577a74e756553
SHA5124400129ad045bb7379d968821fdffe12ed838113943064e0703b77fbc44bd818ed285dc443f2543047f73276bb00a14a7c51849a0672615c9326c9a8629cc574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c029a1fd493e9676d4a656da46e509a6
SHA192d536a8993566a1bd38189cd022151b964e9116
SHA25616a5459cbedff7efde8a6984e7f1a013bbcec23248da6a1c4d03e2d4e35ca6d9
SHA512a6f78a7bc0d7786ba3470f1a8652446a58d90d01139abe527327bd62bfa2d1702aaef7af43ad636bc05fce3f6f4ff4d2f35320eaad361736861102b1ab70b80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b47e75c3289a83abeab3689ca40a8b
SHA19c7f614fb9e66abf495b0052968a8b3ecfa8c573
SHA256d5d398462e02cea2d1cb5e950e28b724c6b69141430da5e97ee2ae905cf0d4b7
SHA512f298fd7c06e40c07659fdde51e6ee426370c278ab688a7e9326ae7c953da922bb6f02d9d7762633196ad2dd66dd329900f229161597f05e8db36a19403ffa0b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b