Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
d0e02e1f75f4b451a25007529e31b957_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0e02e1f75f4b451a25007529e31b957_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0e02e1f75f4b451a25007529e31b957_JaffaCakes118.html
-
Size
461KB
-
MD5
d0e02e1f75f4b451a25007529e31b957
-
SHA1
0a1d47c92ee07301ac41ca02d9233a7099f7b5c3
-
SHA256
89c99fe6dbbf4e7a4991b298f4cc3732d1062e289d8b77f1a731a1351404f2b3
-
SHA512
aa862a1ce236aba69d5700af827e51b1c90b85b2a8e005aa077b4ae74d887f421e504f36911c0c44674054ce9a6631babaee0af8deff3905cb37f0450fa30e14
-
SSDEEP
6144:S0sMYod+X3oI+YUsMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3c5d+X385d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000720c5c0b4785689c67b9a4b2c3a5ee0a4284f88ea31159f1d2588d0a89468df6000000000e8000000002000020000000424d31beb684a975c16bff6e4c75a003208caa961cc05ffa9725dc858ed6c3879000000001cb66d824fa1799d83ae3a59aaf5baf12b6f38c956957d1d19052500ba6d6965f798db2b3bfb675935c1c894fbc00338f32bc2970353890765432ebec06bfa3f50aed0a6ec04329076b2eae70f1c6bf733738afab129bd1288dcb6538ff8eee728d7e953d403676a467c5f0084ced510a05629b7166598ee54a7d811c9c458b2a6dd7d49f7c4a7938dbf9d7641f31fe400000006bfeeedafddba746ce58390497eaad565b8f4269d68201ba9da6a3e4634911f8f7bf9a39509c27ec6e08019a1b1e983b7b8247fc688a3a3dd6b72bcc3ec952e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431837531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4034caadcc00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D531B261-6CBF-11EF-B939-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000009d1f4e189a203a7ff02d6968e401b0bebce88f4c679df8143db69506dcd242a9000000000e8000000002000020000000b467a667a90fa7b390ebfc1f190171ba213affb61eb9299485ea90418c35ae8720000000227a63f047fb5e3ffca6886e9159d101c23de7282fa8c6df1080326d1e7e4fee400000004adf6d4079a4378245875acca149fb5cfda9da972a37c9cc06a0cb18250b0a8e9bc7a25a9cdc299c7bbe7c861b29c0aa0dc6123ddda379ca182fcc4e68015b4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2692 2392 iexplore.exe 31 PID 2392 wrote to memory of 2692 2392 iexplore.exe 31 PID 2392 wrote to memory of 2692 2392 iexplore.exe 31 PID 2392 wrote to memory of 2692 2392 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0e02e1f75f4b451a25007529e31b957_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c749c0518061b1c8bb23138b4531cba
SHA1b549016934485907d59e44a3a7152aa659f9561a
SHA2563aad990a0bae2d6d3bccd4c4c84adc96abda4ad157d72a47ba4da04b80890050
SHA51274c7b0f972d24c5adcd4d9f721b3d97e274f5d0e9ef73c9dd7a9c97faabd4e98aff9d099812681305a7f16a8d65d5ce065ba6cdf4e8d264fc4b274897137c7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584130910b76c7b39d677e657dcd185df
SHA1adad1e125d7e18ea135d515f1b764417f3f47696
SHA2565b75d66cbf0baa213305ba7dd249e2f226d1430b47c6f7caf8eae83c2ecf3ac1
SHA51289dcfc4363eb981ef00776bad9bab35afb6d7149a45d333039b17dd43c1d1dca7ca7697c0d7f98565b019e123ef1df4f128e563f660e9391c4d44de8515a8dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50943d5350b87245b6616a2d2106a4e24
SHA1a3b99d25f7d3c742c7bae556050264df9ad3ece8
SHA25671cd9c325846380d074354e934cab669e333fd306f8defb4cfc21987c97b26c5
SHA51271b4f7471dc173ba40c25ac6cb230886616dd9543fb4ee753c3897c37ae318c15536ab590357550b0e32a13c89acddf042845f96f8fd94220a70bd7bd5ec19dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba11c0df3afdb622ac79f3ddd86f6c3
SHA18590b0e455efaf26bb55413a0169058931cb115a
SHA256f95eeeabe4952aa5af7a3b9a08a888ad07f2977343cdb26374235448e1821d1a
SHA512b9fdc0f9f147ead203b7504145e094884191f880002425005a3eb9bc6d9f7d23e57a71eeecd1b985748e6727e9c324be81da493bc222d76b8c73a110ce3dfab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88923225e08b35c211ceefb13a7e314
SHA1be80a72398b79e0d3eb282b28fcba737dd080e23
SHA2568826ad54cad5777fc517407cedcd493d111723a2e9339ec7e3f1d09db1373d78
SHA512d0084fdffbeafffe82d8d5ab3ad9e42c6b47725fa5d1e2b5fdd6f40a4ea2ec598235afd695546f24bb5773199015742f0aa225ec79e2f3310dfc997c173fd1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d8542cb04efe41f51c5e3fb35f753c
SHA195526c1d75fc2d9a64cffdc6091f9c656db2553b
SHA2563da0375014d9a9909f410e52b366e782343ab78d165da20a035b08e03d11dd29
SHA5128dff3cd53589aae596bddbb2b28164c729e30d9d0ededaa248570c1c375e82640420d46125dc255095b0e4ad671dbef9fd8fe3739940171b3b5943e260470b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55188ac1824a967a77108b5c967769f51
SHA1bb31403873f982087b20c94af92a671e31db9506
SHA256f2806dcbce9c1f07383063783810ede811a0e18d0ab31642b132148ce73b0f84
SHA5128a0ff3013822d63fcee517f9cb4d15a0ecb5bd3b1ca783a246051900084f71df77881182b684e69355feb1f0c7a201f7620138ca2bc071c1e2aa0712fb8ac78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428164710553b8b3d427fd3e8921ab36
SHA19dc48a27e6e89a524a74d54a200b19509dc159c5
SHA2566690812056661acb36e47c86419f913420e93df499f73922475d7920a84a27b7
SHA5124292f588b5ecbfdce518ea444690c2f19d43068c0dc2399c71d891b51346c35ca9a1cb1f659f67490ffac6a15f2f3e52af3303f6d44ab378adad7d4f36000b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38df67b14056bf8b1f6a58ca773b417
SHA10d9d4e1269d4a385a9d6384385c536d495178bf5
SHA25672a28dbdfd6b73a2ef0662f9fb0fcbed4c7666788312391ed2d1b5fbb2ae96ec
SHA5123aca18da7b02c8426397a0e3c86adee8c7233aa979c4409b4e25792c3eb6cf190a51d6973b071a0ac7f159436efd3fdfe51e39484b84f24b1f21e97d5b973dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6a8438d8a5226ce867bcb26b6f5f30
SHA119c59c32715a90520c495814acbb3e9c9f6408d4
SHA25649e32478f9e737304f1a3c70f4e6d2548e908b0b050df946b42949b2e4f0854a
SHA512adb271bb444f96e91c2c78268088a39e76704d04f8d58e8ca1f7815dfccf7fb8e06840aa10f26c4c4073744335144bcdf801709df17b9d4b297d4eb176453931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afe426b8cc4948b7bb743b57781d8a6
SHA12e8192ef2fc0c447dd5fe1dc5ee333d3b181a045
SHA25616964741e4b536bbae02d004f0a4aaef698c0c07d096e4fff2a3551a6d70199a
SHA512a4e9cb461a62541280c0fb4ad46ae1580f27aaba9d20e2b89a943d107ff82d85ba7efc3c520d432cc212582b0d2329be81c6f775be063fc97b4436bb515d835e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3c5f97313d3051992fc72a5aee4bf3
SHA1401ac84c186e7603091550d11bdc60c3d981e9c3
SHA256b615c1aeaf5c3b4a81b2881af910d099bf7415a25ba2f163d7e04b13e3521c17
SHA512746a74ea61186ee04eaee8ebdf0f72af6f572c182bb5b71970dc884dbd5a993d40e29a69dcdbfc14942959e54daf26cd076509a1e7d06ee4e973a00af191c6ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f40f637f058bf0e4ea30530c83bee19
SHA1c25f71caac940331be992c11057f8601d08be4c6
SHA2569ed975cacc105c127194c751458d22e526375a3be17330a6f0b1cb6b63d6f779
SHA512c4ac1e97d0764f9819a8b7e2b65c8d29a69b3818ea04cf8051f7a9a03dbc6c8579f1531bc402451b965cb8449e9f2ee53ee3c0cd558b483536e5eb94974a1764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba7bab7382a99df08b8acb608977560
SHA10e80e2db43e60064e14288f2fa9b220caedcdbf7
SHA25653e5354d0a4f415c0b02116528d7fd0835176817081e3deb393bd3897e80d26a
SHA5122482233ed168a50da3d192853668a4c9c54aa51fa692daad89f7eb09f6e7758dd527e6f4d1236ffccbdf076dfb2b865330122b16bc364998ae5f380abb62a400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e87dbc37211a8837841faf88aed256
SHA1391e2c4b3a32a74e24465651e8d54ef6fbaa6890
SHA25625893608baa90e0fa644b36abfa18006688f336212919d43b4f8484add1a8614
SHA512d0250cc8a1ac773f4588a578c26076fbeaaf1594a710d5c54d44c98d40e67461854b8120518aabf093acfb8cb107755114727a0525d3e8902921f4af1f20019d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a110c21246dc3da009201db1e91e8c82
SHA1d4955525ef34c249929a805eabf2c988ae21f576
SHA256e7bd31ec4f2ed65db5078cb7e89313e9067cb98a1e98e4cdd08f245e3d5d4693
SHA5122be1189f217501476b61493a4db92f8a07aba5600a7fdd481d4aec4079aa01e54cdba213e0b7003c39e1a9102e6003990fffe7dae4e21b29e491cbbd8dbce24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536302fb5d606ad382bec6668d84082c9
SHA167fa7de04560fdc23774f11fa808957f0438dc20
SHA256702b741f6ef5fdea529161db5d5482488ace00e6197ebe93704adae547bd6b5e
SHA512df8229d848b809468e83521a581c26e14bb6ed62ff6cf7abb5ec1371165d15c50688d268be253f86455985b3a3bb89fde33c7bbf328d6215bc8ab89054d0d7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593783fc14cc6f5506849b457689531d1
SHA1901263c955674eedd05fd212ea2b05a8b46c8cad
SHA2562f475c7f4a045048f501cca0f8f6be4c38ab462ee17d3a897ddc295bcbff39f7
SHA512e7cf7473f890cc251b9ad4defc33d99a396097ad212c5eace388fd4a8d2198781acec785f018d583fc6b1fc0385d1da0c559215c2dc468e5ee40f347d31d47b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550caf35d5f41d4f49bed0f8d1fbe203a
SHA1840e3b2be0f70b111c119b5c98604f21004bc3ce
SHA2561a9f13ea07f4cbccb32e69cecdc559dde586d49bd91946c9b26690102e840940
SHA51296ba0d0f22c412c30d4e92d8794a3937fb7bcb2612fd0d9673cc2d38d16bed9a1b33d9ea6372ce11d22422ebf658a74c92b489057f2dc6b29ca8f846e44aeb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584de163e377643e57873ceeb80f39762
SHA190e16821d3b06b947180c1af929bf84346c9a198
SHA2564830b7db8eee97e739682a7663b511f8fb3657a475c54f18f9cdacca4db4cd1c
SHA512c65ba256ecc74a750e0d8aec012780bdc49177416f2e85577ebe570e4199f02415b00e47687e8f68aeabceedb143accc8f3243edb153920a6cfbfc398be745c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b