Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html
-
Size
27KB
-
MD5
dd368af90fe1fb242250f6881b20b917
-
SHA1
5fa1cde27c067ea8cbfe148564929f9b9a6523cb
-
SHA256
282ac94685e196aa89dfa4dbd261fa268560cd6ca215c443a3f5b05c972acbb1
-
SHA512
ece0f1e5b4ea989730d979bea8112d4bec1e7d00aa7ed0a422406a7a0002b8f81d8576d163aba74ddae552178a2789482d8ca6835d88215788b1412fade29295
-
SSDEEP
384:akERviNRql8oAMBCNnUVp7Q/nxmgLtf6WdCQWRgW15+d606zgcSxanK1NKSTNOWm:CAvIVx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27F786F1-715C-11EF-99F4-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000111c24d26d53ee21c7d0760511e7ef2af6564827c420349860aa6d90bac268d000000000e800000000200002000000073e2979de947842756f7c13aeef5409ef40fda2a7049f664b344ecd3d7c3a8b42000000040600ca03216373347757559a7fe8136fb5b6c9b609602d5a19665428968e06f4000000029e80b10c27773af423b4d312c862d1cbb7c0bdb3a9057dcc5f78675b0a1f566925b1c516d82d142fec484728686ca4281ff1acf470a1b98894988dce3d31164 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432344477" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000008f1a5232c4efa43104e24445fdafc5a2d037a7593e579cb81cf305d979beb2c2000000000e8000000002000020000000b18d4729ca938f387d792813669d1f8974c7af58fb214f1c50db73484ddbdae390000000e79e5eac8094fd909196ae7fa83b17f7765f4bc90eb2a57083816d3ae15e66160092c5dc86add16f10be8314ce591bd995be7ce76e2c111dfeb11ffcaabb5333a4a9390f50586334a357ec1dbf2c509e49c08156c6e63cd6c37e97474396f1c12b318caf1bcd61ef740461e24dc0a32db06e62b9fa96da7e44da85a03059a20296339c8e689a2d806ad314bdac24c2d140000000e92e1c50ccfd2601aff9771b2c6afbe51154f12f62131c74a25f249fb630b61b13c0ae12623412f8b020da37c480cad100f9b0d1c1c47a1823fc2a799d2c9415 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80de43fe6805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2032 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2032 2464 iexplore.exe 31 PID 2464 wrote to memory of 2032 2464 iexplore.exe 31 PID 2464 wrote to memory of 2032 2464 iexplore.exe 31 PID 2464 wrote to memory of 2032 2464 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f022fe30974d6349fd8ea16935b4f299
SHA150a7d329b0bd5f78da83b40f873d31bc5d293263
SHA25693e62f2bb97b3af45bbc0bf3b4ef81844623a38124ef47f9d14c9096faf49306
SHA512df8b0271d6d083a92e750161855dad374497c12bd02245cecf39386b130792e644d521af41073cf542e59e877a74a838663d7f05b2c4ef2cb0d10be546e54458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b59b31b5a6c7d6f18f263f024089e4
SHA1cef7552ab7a714d9fedc255ea91235a95ccc1089
SHA256741ca1a8d9e1c4bbd8cd7761c8ebe7dd5637fc7fbcea66892518e9e2057616cd
SHA512b8e5a72cd0041383de725f1c4b69b765dcc3e89af2103f1deaabddf90cd9e8901f3f23b7239abfa5849eeca8047070c03aa7ada6487cfe14434256ea5d2ba3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4945a9c7a97cfe307b21955b199e29a
SHA1c68d1c8aaa3caf9e81bf7095120accc73b8d6910
SHA256748515ecad2dc8ffa38a786b990f8bdb854c35ccd983603b194692a4bfb17bb0
SHA512a9a2621ce10dfd516a860f00d129a557a6871f54f436874cee9d84cdf7ed3c98911698c2a3b1463f42cf1abdcea62ae26e5ebc5f9140d1578e2069cd74ce8060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550814d1c93b6f1e4aece10ba45861da
SHA1067570634e72fbf3406b63a3d25f90e6d1257761
SHA25683a5ca4c995ba0759fae6a608dbfe222f9c8919e0c8cb39e5dd56db817b20e42
SHA512d2d68b6baa04e993dc5f32cff2e91db30d9b90840f1d2177bb9c3884b00f131bd6800394535ab125d8a1acbe2650e5db955e23220a845cdcf1945339728e7e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf00716f90a1ca593d175570e83637f
SHA143d58aff27ebf6a2c8309b974f8863a1f77aba35
SHA2565f42646d4c254d417220e3afa7e952e830e0317f0a769397abd96171779d961b
SHA512747c7191794dcdcc8511d8d5f654a5752503b695982a5c96c786c8c4760d7147e58761e55ed66ca923899256472824701c4c5eda02898640fa83e7f344890630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e26a3d3c9e5142f3e1bf90c8ac0fdec
SHA140dc1ca538e42f7e7b692dbe0643b5ce876bdfcd
SHA256a1db70383d912843d972ddfdf1c2c3bfe242bbe6ad6ff2088c25c4a9ac20abfa
SHA51291a9618f08ecc90edbb7dad26ac6ad5a9c9cac5ca9dfc4b081a1c6a5e44d6fe19c4d44877dab43876b4d2f9fbe2513fcd5fe4e2d6524dde4d154411fd8aeee22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c06632dff1d28b03b89a4bf37fd40a
SHA18425f0c2e2fbddaf3aab0d9d475cfc8b00561623
SHA2564270dd79e27b04e7607c4550c66b10bcaa6a9411e4be5909da4a43e0167c16d9
SHA5129f680115612e053d62db5baf7a54488cf288f2d5c9df81bc2bcc024092cd4ab1b0f8371d0b90c232c287cf96cefc08fbc8c0396fef57ae3657f0a4140266afb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb823be281c1a9a81ce558d3b6ed759
SHA15303de52fc9009b5994ff1a22d216ab2e6a643d5
SHA256e56aca5fc427544a900204114beda98d1c02f1830fca047e671c502d0977db24
SHA512a10a15d57de67ab130a0fe794878abb32083101ec39e646756f0c2034094e23080e3ef65b6017f73a6945a626c3c2b967e15225b05ffe26b7ccbcd7b279a05aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0a19c02b1bd42c03302c6501b11526
SHA1d77a472ec854240f28edb1c41ce77ff457b26f40
SHA2569fb063dce7127328848dfce9a686f193ae0cdc0710c4bdbd4f3e056a91c1ff59
SHA5125683ecad5c56db870dd26c0d7e631ad84e5a3549a1e843a8951d7d829c551e91ecdfeacbabcd9ebe370d8d84fc40d302fb2decf12743dc0a1d3311f1e1180dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537204671ee06ec6403c4cc633929454
SHA179503544b7571bcea57e6cab95ff0286d93e4a3e
SHA256b4ae361a59ae89ecc6e12c64313afb334cb047851006ba49c37deea33e33b670
SHA5122db8ae3069896c6310c9864f7da3ffd3d66deaf9f052ee93192ea3d5cb66ff26b1cfa8b2e1196a7958face35290af3ea5546dcb8f9ee6b877b7ba5e8ecd1c991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577277add5dc15c4e0d1b6585e0af0a6b
SHA12f12dc2893fcdc6d570b9ddf2965ab1561ae357d
SHA25649bf58df7a7c993416fcea955707824bad702a4f545bcd79595ced0c57039264
SHA512cb32078cd30155ec542635c6c4eb300b1c3f090ebc3ed700877743b65a6358117ac96a0e69f1c7cb540751269b6f4f7a3a20b844926a5ded542bc83dfed0297d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20d28cb252b2c4ab901109ceccc916e
SHA15c83f087cd19842be3cfd22d1a2fd1e607ef980a
SHA256176b11a990d5ec9f164a1ce8965c00faa4ae016495fd3150096bc5e791fa2c47
SHA512cf87f6260a26de1594711675340f05ef5838dd644b658ad3d2bf21c1b24b258e6f2e892c17cadc28e874bec9997d7927de4fdf1db438b9782d2a6773136bee42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860b500e09b1406b4cd2329c15a7f533
SHA10b80c6810bd6997f66a28b7da526eec2f0b97178
SHA256411cb5fc27891d53a0f0ec4aa9543a93e21f4938e7eb7850c15e5ae191a526a9
SHA512c3db6a2a58bbea5de8c15e201e20f99295d9f33fdc96ddf9438c9548be2ab7bd57a6c6db1400c07b1fafc1958fd2b5921c2364cb06f55b9845d13acd7368656e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9035b0d8a9f09c65db3e09b9ea53a8e
SHA1ba34bcd196492e0ebdb2cd7855dffef6896f4cf3
SHA256accbef42b2322432475c6aeb19c7f213634f7fb5ccf365fbf0cdec757a1831dc
SHA5129685111f3acdec27307d21ad0bfc903a68cfa456ad5ce28a4c976a2cd1e98814b49d6e93afa39b32bbcc64d139d20e35ea229fc113b79e2db0447713744a6fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3e620d3d7110216378bfba5564da4b
SHA1e606f072e904c1a07c42f88f2f5c523852557d4c
SHA2563f6cc8e1c105b73585fa6766b015b14bd9ca22386a236684599b6e6dabc7e8e0
SHA5129a0ce83e6807d413b8f94c7ab48d2c77d01166ecd07e9eca5353b79fee71a037bb9a40d0434afca9b24fd6ccd5811bfb42bf788eff77c473731b1012d6a89b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da56e9d337075f5912651beb93b3d607
SHA1051b7ed45abdc691ed3bc2a91886d639794f0074
SHA2568d45480442c51e8a0247966296c7eb8218a8dd2088eee5a813603a1457b7b922
SHA512ff41b181bb43b0d8100c8c576c06ddc6234286c7920277da40a332c4014e9fd018063b5c0c2ac395c7a145104487e89337929ae2e4feecf91f9c5b5a63fc63f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c10faf198bb403c63627e30c9fe940
SHA1c40e01d791eef2e23f58dcb635eef236abbdedf1
SHA256a425ed616fc47307a381ee15276635c1806a46e7abbe1c2d30cda5480dc8deb7
SHA51227916982549c66e8e1dd14e7c1b72777903ff40574678e30061b1a973127c32797beacd5dca03b7094decc19085b2e941e77a37d128193163dba04c6e34f75a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58318a47b8735970acaab4455ebcc95fb
SHA1f48c3d049efa61a093d3875f98c5bae18aa156e7
SHA2560ae90c77de4d3211c512edf745dd3d12494adc8d21a5f2ae45410223d30577f2
SHA5123d0e64af5d640662b4a5a9d04b5996efb7f3401bf1e79c43709e542e5d7c91f6311206963db24b1fc65fb7abd01e732cc91a35f5abb2407dd184754ee48711f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b