Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
ddf5d48787acaea0f5029ea9263a11a3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddf5d48787acaea0f5029ea9263a11a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddf5d48787acaea0f5029ea9263a11a3_JaffaCakes118.html
-
Size
84KB
-
MD5
ddf5d48787acaea0f5029ea9263a11a3
-
SHA1
22d2e962d7505ae91e6f55d4658bf941b5df7da7
-
SHA256
dafc8077edf39ba92308062654d55a43fdf6125d6fd55c4a3834217080b9619d
-
SHA512
01f4cebff03b09c2c49162e38a9c9e3d2b50345749c3c02b73482ac3573f35ca04fa35254862146cd3868c3f0d8425af88a38b50878c8f00ddb5637915e3b8ea
-
SSDEEP
1536:/WSC1LIOg89jjNB48TO+TP0ToDTlfTYQT0gTbKT+FTcjT5a9P/eGcfx:vC1LIORSDghlMfS5+Za9P/ebfx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50609ff6ae05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432374526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000082ede3769e80fc9636a2d4b0e7cd426e76d08cd5fe5a4ced7ff07b420b5666b8000000000e8000000002000020000000e54db080c8763ca1d883a53a12911049297d403a61b0c398c316adaa737208e7900000007e3f55efcf158842eef2b896bf7315e2e11673c8cc2cbcec031775d58f20b10b083b1b3f414c77d3bcd2818a073f51cf8d180f2cbb97d1f5f3a562110cacad9e2d9bdf3e8ea6e07da938614a01ceb1cc2e0ae32887665c9419e5e9b56450318d66839a432ace2c04705208e8772edaf965938516d0cc11e09851440e61706522b29f6b4dce11058c05c19f02e91f88a2400000005c0e0f7c2c7fb2a97d130c17cc8cd8201433d9327888958ad61a18f8948cd65940173f8886e3f9769b090e16dab2fad6f6ec7c87bff0eb8ff9d063d46145135c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E8C5281-71A2-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006ff1d83aa52bcef489870fed21b87aa2aba413dc6ff081496aba50a7b0021a2e000000000e80000000020000200000005bb842f464b9aaa9b58042780ae2f84af9daca5bdf2ae395b5185c0789837aa120000000aafb630c65cf9d019cc15ca76012c4a6543d6ad462ff17e0ce3749345c1ef9b7400000008b4918675511ccf8044efabdc18bd9dcbb3e78ec9215f7723403eaff6a3b959333b673d92ac945a655e763ea7ecd806b1dc1b21152eec8f52431065b644ce28f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddf5d48787acaea0f5029ea9263a11a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029b501defea5ac41a5c1d4ec62db4ad
SHA12f256eace3e98f506f9d56fab160d496f3c7b8ca
SHA256957eb5335554052eaea5962c2aeec5abd89931464efc556867a7a54a2296410a
SHA5122514592ee69c520cd230443a852bfbe1fa08e4939c0f933a624c9d0083fb359696a923f1716a08c15d6b106759f7e052254a892f7486619cb1774eec213ef5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a47050a02f407163579a50fbdc4bb0
SHA18bd31d257120614029dae1adc55af8cd177dfd27
SHA256a9c295ef0f0e952886cdb9b505c09cff04d36cfdb1c0017ce34f71ce93524bfe
SHA512ffda1061e778400e6f80c6420ac8db35c01a32ab75608892134cf63bba42cb760665679d7205b0abf511cc69f7218f19413032b9c9b0924cf04e1518f990219a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50635a4e02ebb84dd06d23c9d34f5d00b
SHA193d5f94d0da1f33b9bfcfb8f960d52ea8af93ed5
SHA25642cc9e30c3851698ed3622f527a5d89274e38a97a3b065e686fe0d8923338659
SHA512b205c33ad1502a46f2f2fff0ef1b8a3789350afc41007534201906220e6a267c6a716f6c00a9eab9314574b46196c34ed28c57f6bd2b21e8c71881c082b6bb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504377f41cc614f4f2b83e7c82253bdd8
SHA13c50d1fbf991b17319200591236ad172bdce4761
SHA2561aeac9ba450f3b897c825f1624316f24813bceb9b91bde03e1ebf89fc016ed9b
SHA51230c2eaf02aa8256dcd04ef3310b8de87fb1a3ef1970768f88333ba50d6208d87de871054b0f7e3b63795a3c33af8926ca56e00d3eeff51b59671000cfc8a41d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75997eb0520e1ae871154175719785a
SHA1ee2661d492dec12e60db46f366ec68454c10cde7
SHA25674565d5584ee2fa33737879d5d9519362c712c13effb49fde7255fb22b6ca7e5
SHA512de4be93ba98fc0d1d25f3ad55c075a746564271d404a11a3053245d24d52d07742a47fb999c86f4b4a2a72fe8e1902154db698412a0e487974801d13e546cd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d478bd4ff8b4d7a873063fb87c7f34b3
SHA1a5f433b690d32c3467b0d27af69e621c61964950
SHA25656f0090a764909c6a9bf7f2306fafddae2c07ee71009bba1c38cbd8a96904754
SHA512d6feb8ee347861d467cbdcb14c20e8718a2b14d2b04b2d7117799ee11b252b657e20dbf32cc2efe5c1599df58be466bac919c4152910db5b2b0cda3111b12edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522de171dac379bfe7f3258d90ac1a86b
SHA1603be38ec8a3b9dfb579bb2e87faace17046f6b8
SHA2562c56f89b790a63029b18308849b255e68d1627dd720d5f6594c9dda8857fab4e
SHA512e371eb21df6121462303e818c5f4b818a9ef58de207a6397a07fcaec316189bda5a022e0edb486c3d3515b697b477b0412932e149340e56c8a79a4af21017655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7a8a110547e05460e9d54047b21fad
SHA100f5f5826351b8f0f9cb88d4120d42cfbd877093
SHA256bf0b41ea9840366ff440705976abe2cfe08e5ed0abb782ea75657a990269c058
SHA5123cb781082917e21567059e11a894f446e8da19ba00bd997c6f1078035e0c5f763544496730b9ad43b8c4391f88014b08e43be3bc4601a81dac11c82848082de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a3bd4372b272ff4c713f2933933320
SHA1a46f194a141b5b3861f83e291ad6d6803657b5da
SHA2562826749f44f5b30c65f23d0aa83891acaaa96466583924e0ec2c8b4168bb262e
SHA512ae96d3ee7b748ddb85b9b4434e90f95b55545bb7e5deb942ef570fff7cd6db26606d5c133f909b3ba5baf098c8775503ad6464cd3a0547aa622eb28b3a38538a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9188d0e64213340b28a78409cccac1
SHA1be3e686c6171ee8d76b8f97a8d68e52e6ffb190a
SHA25669ff1f09620de3a05fea6a07765e053f2215245eb0b253e2b2bc037dd97e3b36
SHA512521c1d644c1f70a5cfd167b9a17892b28d38c6995b2c8adc96487de13a50f8be6567ae54e71df21107cc83e0a54202f8b258eaa7510d8f1114ff0a8443136ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc841d99fa311e1bc3ef313a948a22af
SHA1a73e4ef856ad4b7b04fea779d4bc88fa3aadced9
SHA256b4680c71b5837f6fd3e7153c39ca5b6b4face256edbbdb45a7b4027731d904e9
SHA512d0e0b03bf5d9af47abb86e2ae49a68308a145a613b34afac9a7dc9042e286ba998a7b145966bdd8ace0464a3528c551e15145a50d2a46fdfecbc46764e0785ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ffc899428cc5e32afdd33c7253db80
SHA18d13fe0542c30a4b14c57528c84e3115f78c98df
SHA25661669653270964178ca80f04f32a5073233f9b9d0d18c63109ca40b847b180fe
SHA512d4cb51d2256da9d218c4d48642665e5c82f48cd503dfa733020f1c943c8b7d72b7b540869fc8d4094e9fcf41f42dc0093a3d6e5a31f48428bb512c9c5d6cad36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919230ea574c3ecc7c464cadc952f3db
SHA1db929fbee1c228af5b5d476ab0492b61d53cdd14
SHA256c7170ce1613cac6271569b2b4c8c935cd8b99a7582f02092027ef0d5369e48d8
SHA5123253970b4676b447eb49e8fa4ba9a68a4d02fa14aa883474b65da58025e24fd1d71b4ee14871f49897a7d982dd6b9041d4714c99dc5bb8b0272429a4c7598b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048dbc313c3c3daa58043e38884b0a14
SHA1e4110fa5b23e410dccd59ef913119884b1ad1241
SHA25611eddd84d7f5116f2278e2176caaba852280709dfaf57f6ca93e89f2a4e42af0
SHA512a19eb2701fc00799fcc47f3af4b50a955ebdbe059dd5fb292ece2f1497b4a2a1bfbece2c1ddcbf0bd378821127cbbb7f905f3c996d92803e0e9d39fc05af8246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de2b71bf316d311a03b2d93fc9be8c3
SHA14fb0dbb480318deafe12ada367e4f867190fdb3f
SHA25639a386e5377b7c21159ddb62fdb30815ed12ec4afd00a89b18078f26159bc2a8
SHA512031908de52431fa7e5ec8ce408fe93977d4626b8832dee55767700017b1f70bd3f6e322fd9dad9f5be6a5524f97e6b898c2dee39c32a256f0a591ab8767dca81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518f3793350a70743e6d7f198a5c20a0
SHA110036ff98955b82ee457b1e35526ed12c56d40d3
SHA256ab9df9b32952b4792bbbd773c037427ef6316fa5ef340707e1ef8d386ddfc67d
SHA512d4ecc64fcf6644cc1f7ee8c8b9cd59435c545b8bf498450da4981aa06d033f549b775dcf7e39b0ec2cd512eb59ac63f0f00fdc1a200db107611a61c08775590e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c77f8f590728957a6d5ff84042d840
SHA1d738118882c47b29782224acc94bbe8cbba14af1
SHA256e65e53cf866c7094e9c91044a4b9e6b6925b3aed4a895b069038e4c0dfc13782
SHA512adac48e11b63233cdd44a183075ad65160991d675ae4a4b8c7ad4b3b379db49502328b69fd360e281eaf154504418b69622d39045812c87c6c7e00a24aeb0e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567dc16a872f52a5800770158507ddde4
SHA1520f79e8e34f0fd4346960a96f9cdfe846f7d46b
SHA2565ef4ed2887c11eb161ca282bbd42b4636d7b3078157ca0aec3c480a66352e818
SHA51230b3448cb855dcdaa01808be67427d2e06780638df3fd385a6dbf30cdbaa3031820f915a7dea2b86d3f20963ca0a550f9536e3e5712895093fa05712d4d74c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b533fe81f6982abdbd7a1808e451f31
SHA1bc372cd7d1f3ca8ceabe07d83ed9f5441da4c2e1
SHA2563540143ca53b117189cf13f908296013307780499e0ec715069afe01c80b4242
SHA51253b824a1a7d1151cb9aabe9b04d7d58c172ef0996679360d6bc2eb933b1e85303b93310349dc6c0eef9767cfa15de0fcf6dc67459d2f8e0864b403c115dcabdb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\style[1].htm
Filesize805B
MD589411c66dea461e6b35c7137695d5166
SHA12967f62451b1a07c4c8717eecb1d80db31ca10e5
SHA2567cc1a685abd945f80732f1b21058df736ce9bd7ff4370842b966cc833413c302
SHA5121c3ae712f2e26ab0abdf9f46f2bdae1246756ae6c9439ffba501a9b8e207a3dd48efcfa6860097f692a8b03666e3e0975ce1197577bc97deeaff5b284fa4115b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b