Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:51
Static task
static1
Behavioral task
behavioral1
Sample
cfe511ab3f9615de6fcca2370033a395_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cfe511ab3f9615de6fcca2370033a395_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfe511ab3f9615de6fcca2370033a395_JaffaCakes118.html
-
Size
28KB
-
MD5
cfe511ab3f9615de6fcca2370033a395
-
SHA1
e656902008821ea680924cc54769b6522ab28a69
-
SHA256
1e7f862d1d462390815f6b073591a590e7b43d0ea4f8d806c9d1381eafb164b3
-
SHA512
e03afa5341fca695923890b6bffd45db74632eeb71c659c02c05583a2ae6bf21b3531e99e5197be681bc40878b361adfe435ddf03be6ff05ec57a83df357c12b
-
SSDEEP
192:uw3Qb5nB2jwnQjxn5Q/jNnQieUNnQnQOkEntHHnQTbnRnQ9emkm6NBeqeO3vQl76:NQ/jI38zeqeOeSzcR0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000571d50297d4592695ffb9f6e1bb0d6774a329c4340c3ab4e942985f293a5b62e000000000e8000000002000020000000675d00f98affeb2a5a5bd4eddbd6e689f776d84108a278c2b37828b3a91280e420000000600146b7b31a14877d52c645db9d890f1a34fbe84a828a7ad8470000037badd0400000000a9ec07033e0b95f70b4d572a54193486204cc7ecd22f4a99e32d3b95569cc1a58147443cd94a7274c500bc8dba371b008d39790158456bed9ba2c3e2dbe4b9a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f145ad7400db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8938301-6C67-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000742116905828279c00f19362252c51f523021b222f47f537ccdd7956dc1bb725000000000e800000000200002000000062d43deab2f89601748326b8f2f87431ad0b68c36da77b8b2dfb168711010ef19000000069c1b6a823eb3a04c57f317b125166f2b1b0b29e3153cfdf9d7a5a2dd6461460bb7dc3e9ad0a1924148b3dc69b60e42d7fc4b7323f7ca16724c47c67a5427fbae38efd68968b843a2fcd5172dfc98cbc9d8516dfd5b9ca530b7a8cddba0fa8aad360146c42f71c9f8241ccdfdd441ad5e80a8f133928c1c02d5216f365efff7183ac2e7706d8d24954d9aee385baef0d40000000294367318c5f379219245dd432d7a4315b96d5ca1174ab772e2f01f36a144bd75000650d81e1e74ddeb6bc8266784561ceb114d2120b40ce0842738dc0abcb1f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431799742" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2824 2460 iexplore.exe 31 PID 2460 wrote to memory of 2824 2460 iexplore.exe 31 PID 2460 wrote to memory of 2824 2460 iexplore.exe 31 PID 2460 wrote to memory of 2824 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfe511ab3f9615de6fcca2370033a395_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cea25e76d16e2b56852db6274d8f56e
SHA12e649ec30812df0e2096a21f25ab07f8839de198
SHA2561b2b65492b45c89a4191c803b075a0d1792466ea44c756652b0f9d7e8a36f47f
SHA512c7379318356e097fba26e9e13e7dd50acdce148f97cdd2af58f904b87a81a448ee5d46c4f3e42c4b86fbc968aada091376721ed0d93e2de4b3f63f3dcec78554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd04de347e8f2216680befb0ca6a010
SHA1b2b2ecadfae68a14e5798b3918d005413c8679e4
SHA2562e1a4dd111a153fb3cfbd08c574dbf3720142228cc0318eb78e9df37dc4a2845
SHA51232f31f9769b377d6111668b9673dcdc2c4341ee3c0ac452fcb5d4a91e92bc2fd3852eeba2243a6eee2e44c5de73b029e66299a19298b8bab60ad65d33f110a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed057b8012fac5aa2bcafe585ec244a
SHA16cc30ef7f94813ced17b73b468a37b2802f71b38
SHA25635f5d8c4e5bab205f275e2e6038af6b1a648d6f1fa40471a0d2ab4869398cf7a
SHA5129437be00450a2f036a577f7422b34c3efed045ad7c308772eeda77d5d47c1a7860698a47ed60abae2cbfa67bf7d37cff60c88436d2b1198e05f56a116ec1cd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816363fae1a333cd4d680c6e3cf04ef1
SHA12afb7a59a2244b339b48c706f6ad0500f0f31e3e
SHA256ddf5aab6c69962abd261b268ac45e70b1d4ed288bfb0b4d0a75b506255071dca
SHA5122055c989e540f042ac86a106a953b376464e1ca09d9ea112f2e45fd05c0011fede722ed505857eabedd7325f0525949ff5a00c5b715a465c85e82163718c2633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d4c1407e1f71ab52d3b6cb9832fd3c
SHA1c52ae986cde9dfa7c092e37daabc762654b7684c
SHA25695672e7c8d29fa96567e3483a92d39555f2995b53ad5a9a64e486fdf6489a296
SHA5121f58976877e94523035f5cfe23be2e79753928df19eedbf44d2cc82299d7724df9458fbf5b6b47b8f72066ca10970e15dacfc8805146d6df055a9debc5da86ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb29e623d817875214becff8912a079
SHA1a23920987d8e5271499836a2d043f1a9f7f8cd69
SHA2563f66441e078ef493b5d6641b7dda91538abd616eaf8ab12b378bba432635682b
SHA512838e65096bcf68a649d6b5724baa749f41adb65e1dd1e728172f085f08159f07817365a012da1be409a8f9b9d37d91ea52d2ecc2b5aaa2917dda700dfba1ff96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ffafd231a3f309ac43c27f76bc4230
SHA1a88575f7c4f91bfed39649612a2ed07f1320d69a
SHA256b3b25f9b404b482aa84a1bac16bb318598bc717be1fe2d54b01dee227ab70dcb
SHA512b5c65f00ef6e1124b0ba2127a91641a27492f0246ccd70c089f2d243d3abe8be6416ba78cb95d9058f12fcd583a177607590d7e8d09a347991bd97c2e9a37192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513da1f16bcba73700838645959ba81b3
SHA11914e6d073e5fc49e94ec89da6d8cc7dd49788e6
SHA2563ae11e20ef2653b4506eb100a5d4c8e8682cbfbd20562527399d994229f9e4d0
SHA51265907bae6815ebeabdd3802e4b405680c082c8e731ff1a1afb6ab6ad2220001007b22b9b8c11c8ede1e4922b23e442ee5eaa9ef07cac43ffae74b39ba4bc21b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab9e47de5e608c28c088eed2d8d5757
SHA1d50c8890e5897fd870b2a7cadec6bf46282528bb
SHA2563314ea2f9f8cbea1bbfcf1f243c64eca3a133a3710e151db66cde33cb78dafa1
SHA512697ef54e8d1757ac899441d63311c47cdc08d557955fcd2cb6abe5d6830bdd0a0df2010353821e93aeee988b139944236b0b01a9890c5b1c4f395970ec01dcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50640802a23143181e05925862ecb6710
SHA11e48566f6015538c43e28c1e90054f7eab433415
SHA256ab454fc97cf2d0317ebcc12fa4a4da6db087d30660f7410d8c5477f2bfe55a31
SHA5127bc9cd0703875302678f43189c8ef9090d2ac8cfce2aca3c28156a2682461cb600d8c55a73e3a42bd1d51aff507c84451da770a4a9128ce56c96ac35cb074c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d40b489c1b8d70f294a3b38bd347d5e
SHA1c9c61386e87337e2df2f634921593c2934cfc0be
SHA256ad5d52efbbb80b41574a7ab0fa69b8cc87e2c93248101c1c05b70eddf51851b7
SHA5121a4733289e324d00f74560e31e44759123ae75591c12ae6785219d54b2536b28e7def6efd621d5945e083d72ba9e41f43403110e483595a9596b282f9c68128e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4865413ca0c916cdf9e7689df052f3
SHA1104f5efeb8fdcabd5edc628718111ab2b9780769
SHA256f08685ddeaea5856b8a36f6650d9f1f6f829dba6c9f5276ffe13a84ee4b42b9a
SHA512dfef432dbdf7852b75c493094b311bde601ce617fd58ece67b556606e8075530920387a59ba2ce8939f06dc51c75530b0013a1927099f2e88e4b0af953ad6e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af01eb3227e5471fa6129c498d678cc1
SHA1d13b7ff2ca16b218a53863a2a624957f500271b9
SHA256ff415c6ac4342a47a710a05b7c7c334c41b7df88cf38d0ce2581883aa9d2cffe
SHA51232c03e2cdd3c7b41b7c466cdb19303ee50a22be5b5b361efde1a1060adff776152fe50396e943e82407a80aac507a5c0da03acc03d3c79064424681dee5c0544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca443c55ae8e55ff05049478a978dc5
SHA173b3dc86f2309b0394319e2f838fe3e59c2c0c33
SHA25685e0789286ea5b26d6b2438ccf61e9a14b10ab2f5b0fce93527051994c184a71
SHA5128740089b1fb8b305344ded0f466d35772a5c089cbf21b6cc42d09d5fcc6fc9ba806c77ffe36a3c394e4cef4f0c7dfb8c6f81d1ccb431dc512ca3723d8b597c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887ab5515f96e50718e886e2d9a9280a
SHA1c0c797228d95b48f96985290958c303a6c0e574d
SHA25684fb6f9c1089c9015c36973a5bcdd39c4f518985f37ba054f67d08a273cd1607
SHA5126b3cb39f4376a23bd0a3a4cb6e9c2ee9dd58b46c31284cde39164563ea6192d287e778e7adaeea489c8bb427eff992acf3f46ca22a8e73dfa746ccaaae999610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d9295d8728886ecb3cdaaa23d75ed0
SHA1e55d5d3a195c2b8aa14d0bdebca5af9cb5802bb6
SHA2564984e06f289c8463638293288dee9f844efce1c9bc685d9b7a7b5b8ff6b904ef
SHA512dacd73ee7c0936dd76af7f8ac9f4b34081ac8cb146da3726af68f0af3349d50cda5417b33d850f5852dffd1a7f961b2934dcc0b5952a41c7a2d8a08c32a71aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f8e7d43d9f2a2b0fd435a84a156ac8
SHA122dc4c951cec34d2012d4f7268f00f1a61958f46
SHA25632fd5d120ba82a38e9e1c3a39e075494c8ed550ab324b2439e6c5c66b158f6b3
SHA512efa3aabea4730de506e6860c896906934fbc1d65a3d3c951010f96229dff697903399cf608618fb51c6124f6fe9a374b64ea406a93772de080e6717dbecc4266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cf7fcfeaf1a7cfcc075cc47abda0a3
SHA1805a03b1dc047293d170af4f57912b92740703d1
SHA2568c8b6c4873bec5a49bb683fdb883dc289192f856db22a71e31e72dcbfa68a02e
SHA51274f8a78e8432b2197aff758f7db8b2d47e069930faf4b09fed42ae350832520811c4ed023b72f9ee874ac26bfa64c2b54b03f331b9ccfeb2609b6cc74ac289b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b