Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
de99ab50249c1c8ed15f09896c033095_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de99ab50249c1c8ed15f09896c033095_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de99ab50249c1c8ed15f09896c033095_JaffaCakes118.html
-
Size
94KB
-
MD5
de99ab50249c1c8ed15f09896c033095
-
SHA1
1e3bd486a402801da131c0bbf6f93df2deafd78f
-
SHA256
6397e9f061ec332810402109e9fcd132939e6968afa1df0b6bbcdc808e128b98
-
SHA512
a976778a5afba01e5eb8bd2996eee6b01fda88ce120e8109cf8c4c2d9a2a60cb5e96dc9c941fff118c4da626b4f8eb46cbd81688dc25c2bf862e6d9473f281b0
-
SSDEEP
1536:WMLiN1UVS8FLp2tvA7LeDEqrlupnyAf2p3yDZW8BdkrY8mgHC+qpEyW:WAiIeaBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000eddafce803771af6c9f0b99b8ec31d93e863a442b83e4793a5b5534fb117560b000000000e800000000200002000000009449b52462f239d1d03c1cdb34ff733eb46777a5d9c0b6e22f224af0fe718b7900000001dc7a7167ea0e46c514b1708863d114d811191125c59c2f40207cc049c81fe62daf7e0557ac61ca205a926342024046b98b81cac59bce86ab109e9a3561b8c689978cb5a588fa06ee3c7e1661485216247836b32c4541e8a60752031ffde585fe474f5b688fc3283857f55c2d177f2875f8eb3b384067a480ac3279476f285cae7d9bc80301c4587efc75ae71c80b80840000000ff48fcb31b0f7817c0c75da917d390ed96e41629c30fe4cf794b820629649b290e2fd6c22d9333500154424158f23cd7d1270a5a5034d7a07deb1162c3414ef2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04e5f2f0506db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57EE2E31-71F8-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432411558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002164504d9390134259f2cc6109985c2207b803e53a44884baebd733f8d3a37d6000000000e800000000200002000000050cfecb29e6b51ea4d4692423d51cf033c7e9b15374d3f06b247af45bbbff4bf20000000e631a0e1791b8b559d907caaabb6f18cbec9d5a80ab7bc80a5e09df497f2a8af40000000fff6915184f9276610f6e9b10efb30f61b71c5430b6ff50655e5d1fd9ba67793b16cf3d2c5e0e5eb07010ea8de8c57f512bc9a862f63016dae3ff1e811ad673d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2252 2280 iexplore.exe 31 PID 2280 wrote to memory of 2252 2280 iexplore.exe 31 PID 2280 wrote to memory of 2252 2280 iexplore.exe 31 PID 2280 wrote to memory of 2252 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de99ab50249c1c8ed15f09896c033095_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f9eec576acac3aa1323b06dc064ca0
SHA136762eb0934e6fc874563d8e1f4cf70dd995f63c
SHA2561152a3ed01c90fdf8018a6360689bf166a5ee4b2667f2d6bd3626b90ba86ecf2
SHA5124ce770622d1d72c43e2f4fb18dd69a0e548657d7c95081bb1e0e4a8f459f6db6714a7645cfcb945cd5d67617a28cd7000e1f414938775cb1cda746b5fa729908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f930c1ed13f6ca9f53076d4affeb97
SHA1e38430bd5cbf69abeaadbf1c9629092ca95644ac
SHA25676e2b93b30fbcf9c052046e6a14f4779d941989655caa83f7b7bd8666526244b
SHA512e8961c7829523e91e8e6ecc408fa9b10e3082526fdcb0c7f21bfd8da892975c870e65977a940d05984d767498b3d75a00618c781584c81fd1a9bb54cf626444d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb9489b216686c4930a43372c6d5658
SHA113a77b0f7c63a2faa2c968573940f2d11a334048
SHA25634035e1393fa5f7fd04bb938e20362c0601512357b32e88c9a59863cf0f45a29
SHA51292bb9ccc147037f9329614641e6eecdf01d78d1d76901b40f71e436fa3ad305f344a02a21dcfe171b945a551c6b05158edac6f5aa6bef8969a48da9a446d704c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297bc9ec3fe3ac090f86235095a14555
SHA18f66768f9e1e752a58279f4500f7da3f1e3bb8be
SHA2568c7c3b6e6d006e63577b95464d1f5ae224743c0bc49ccc3bfca2654acbe8097d
SHA51265e5f41e6901bbdfd3c1c9fc96a44134761eda756efbbd4eda1df4b804a18aea0fe468540014233f65c9a0eadbf1f7a44f8ab0c0398103a5ebc77ede0b895422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dcf83307a08ef71134724f29c63870f
SHA10bd999f4686d1a64cbcb07d3d81cad660e0b54b7
SHA256b78acc0f259259fb3f9d0b58a7b5a116e64fa21529fea2d0b1ae48ee531184d8
SHA512bb3c0cb31d1523fcc04f1115a480e97cce17796b52f2cb3ff00369672ef90148357412bc56303859e1e7f622da8b5172f17cd8f08c8fe7746a0a6ae3edc4d417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f123ba67070881de76ba4c54a57999e0
SHA14ade1c7d69a29b025556fba94ac4db71724a7f41
SHA2560428f817329ac45faae58c5d6360f70b9a9ad700358eb19aa67743953a23054e
SHA5129fd504d2981fc023172fb10d8f339d3a0f63ed07de3db5f689283de89e184da9c32672b3203bf6ea57183df966462f95fe4348ec9f329397ac416f089e279047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3bea352afa742e9005e763b9fbad28
SHA13ed3d340937580e027327a9e418c69ac931134ab
SHA2561660c45e439ab00a65cc6dab706db394175be355af29e324453af972b995485b
SHA5129b6a97df0f1180ee2eba0ae6edb30c77a26509f4e20a814ccae6ce2f6532e78f05ba075703366d990d166b231be83d3c605a5f4bc5bf2a86cfdc7bcdcee6bd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7ddddd20319387192d7ab206ac03a7
SHA170af3f55bf680c12c1a378edff54e1bce5776eaa
SHA256f2b63864266bf1f8bef452ec7be4ea9ee28b13f3b79a5bb9450329482d0a1c38
SHA51288b777f47ddc3886b9cdab17e395cb5bfe110c05eb02d3e832a131125c1f6aa3d737449734699af11e3f7bee5aa49e4724272dc1576a33eb355f4b1d6dbcb1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e1f8d77ab0f427593d5d5fd0d17c63
SHA1fd119a73420fa6738ecb6f4badbbdfa9192501a2
SHA25693f9dcaeae84c581d3423e7b89822f848f80132d7ddc150d6f2a7d6e9f8c751d
SHA512c5d6e25ec4747600e86bbed49d5b9ead1e76b2bcc67c898578affe70d1593a20a5946dab8ff5cc733c2cafbae88ed219b416ed65c99388304f66781e37cfae96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca97226bf03f2096c8c0d616a43289a
SHA1ed5ca335631483273d1c7011507469bb069ff124
SHA256d2532bc632ab93bf712e107d545f13c261a34f977b868c4e236b45c1772cf23e
SHA512b2cf407797c68319d20a803e10d7256283b964da5265e11a9103151758937fec7d567f9f418ce2ad53b988f238aca4a58bd9ce2ae60041cc19651b88f1538c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110e0e59fc73104b16b8e16a3dc41eb6
SHA1b7c9c451202a870ec756cbcee39662881f46c4c9
SHA25698f854e65e057b403573432f64acb17b2a1c6543c2367badaf6c0acf594ea97c
SHA51225c22e23899b80878ebd478beb751a9dc04889d7be2b3a9bb276b59da0ba1ea7ab835bb009f171e2f1feba0f4acf429cd883bd0aa8e34f9c2d11d848467b92c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5d0cfd19881b72ec5d6247c74b2313
SHA161514ae83fa86d219e7fcbc463b542c8c4e5611c
SHA256f93aa7ff52f09cd30c9c85b1147fe520a30e61651c717aa1f696851e372165d5
SHA512aa9b16cdbd75b1cd9932cfb83515fd00ab2d29375013f96ca7f90b352935027411d08f65857b427391da5b3c02a4ec0953d1366b43ab8d6e8b0a027758694773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec921ace070f4c49a0070017680afe1a
SHA1961e7dccf8aaba165c64c3db92556550f771146b
SHA2568a67a7a2cbd099fc2c5e232962fc64bfb94bffe16512392c86624c8f4e9a2345
SHA5128840c62fee2990026571ec6e3fb1945aec2eac6bd932906dad05641a8740c37b0c7e24f8b033175bff56c200bc4229f7dd3eda10b78df1b52f93382c8b5c54a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8adb28d8ace4854020e3eae834ea8b
SHA1619012ccb36a56ae2682298e08928b292cdf712a
SHA25676e8e1ac3cb25a8d993e1511828e50ef85fbbe0e6fdb38c2ab9919b7e729e766
SHA512d7e4912bd1805ef099e10dad00ff15082e8dc8efd9c3e34a9b02ed17ae173e1af2e21faa7d5747b4b27fda3eb9aa23363ec6b6825f7a11594b54c7f9b5514481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d84b2f3d05a2ec3726c274eff32da1c
SHA1a6c9ec31c6373fcb705daa3a31bd231c88ca018c
SHA256ef21d124e99e13fcb7c4cfdb8cefeff31c087d066c8aedce40194cde95f7679b
SHA512699cc735480c472d20a296933d8c847c551ec3d67f558d8349fc85c0e4587ac8063ea943f8401f32356cc5cd3bcfbc3c22ba6ce0a8f288506b0aa8b4345bdc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90bd4c9173ae87601d13f45a1f1020a
SHA1a5661ebdc6a121c5b451064a8a2c636f7afa31a0
SHA256c577b14969d3308e10e0194badd1c039dc063d8358aa4b06acd191135bb8a7ba
SHA51258fafcade00f8233c1788f935ee1accdef256f52021a8f717c72cc12717738a10c1c76633bdd471ea937df2d0a5463dac5452ccef899f58d4b49177cac561309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ccd14b74102c83b56bb4f11e756575d
SHA126d9af07ada1a514e18bc248548ba686953a2e17
SHA25699bce8dcc49d0ce6c3bee11ef834ed134dfb11c307b3b08915a4687ff6feaeea
SHA512b360185c0d8d5980d68791dc2fc2c416cec05b47778b305fb9796abc1a9871b267910d7647520dbfe5ecf59d1e4278c4af891b934fa0d0b8e43d44e122105dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddd53e79588993cb671bc83635b061e
SHA19ef517bdce210ed0636cfca7423af236b27e0a8a
SHA2568c05e32bf14add9b95f2ddb25871761438eca09b220f392c967d65a7a1f05ad4
SHA5122c1a049ac76b546b8f115ae98958533ed82726872bb5910d1b66da606bd60149c28de46cb83ce0d10820cd0dd60bae3976eea31415c4b90f8844afd7a0ac652e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145cc4e5645557f1934fcb30b4043d9e
SHA10130f748484785649d58138cfcd9a73445e2c210
SHA25689803365a3dd2b0bb0d3cf10093a8a9047f058c82a9d54764496875df2786731
SHA51294957a9280476ac390bceb94012ce070312198d3506725c0c6246467ec814b586d89cf5a0ac96e0f4d6143a31bd7395eeddee0051a080c0103f97d71347da4e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\jquery-migrate.min[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b