Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
df5338bab4739568ad9bb27f46b38b91_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df5338bab4739568ad9bb27f46b38b91_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df5338bab4739568ad9bb27f46b38b91_JaffaCakes118.html
-
Size
15KB
-
MD5
df5338bab4739568ad9bb27f46b38b91
-
SHA1
cedab540973e41dbb0cd4293c70859c3d782b011
-
SHA256
70d52fbaedd1e5bdbbd2575693116446636660929f745e0b8359bbb52979a871
-
SHA512
d4165252063d68d6690521984837ef41af57ce0f94fd265296e21fee01e9f801f441a03b4632765305abf7bf67738bd07e2ff5cc1e9302410d07538977a97f93
-
SSDEEP
384:KFeMq51i8oauLjBVeg8fUAIHIzGYk2qk1Oivgtetbp:difauLhkGY2S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b7c355c8e5450a34dfad122c08dccb3173e36173a32ed19ec5cd02dbf2528961000000000e80000000020000200000000ddfe5d1bc315b4093668cda5d695b61c3813a6b9c608cd29bbdd67198b9c62a200000008d5108edafc28040000314481f17bd58e397f23eb0f204df58699272cf0a8e8e40000000b16a2b9d07dc35cae2f8d392ef84acfddd96d873d8efee10c3d3b22c1a0dccdaa8874f7cfa60d0298b56d948835f99e1c2ec952bff31d15a47a7280d6a0227dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b9f5c65d79f6ffa7d59336ac6c17a010a960844acc8425f27e695e70c22f97bb000000000e8000000002000020000000b1166437fd12585545400f2da4471623cb35d56239c7fb576d4d346ebc0db92090000000aa4a9b5a8927bf8db14ba1bb1ac14a40b1e067a3fdc1016b16a99ecf0510ce3b76878c112acbd0cb1dc93fd617560c62bf003fb20706614a91f02eb595d511a54065bf87271716a8a85b2d182ccb08a20b1aabc5c82b25ea95975a1bdab75d8275e85eeb82f391ec6b11ead2fa7a450cd8138eda590b679554802551e91152675ab33d3a680b3a6910cc2c5c97113adf400000000ae98129b35618b0ccd5dc02db98cbe8630a1fc234f33906adcf5b8940b395f994f77056f2b661fc5b78624991feb95210fb6529e1a7ea7caa17394183f80787 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432442791" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503534fc4d06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1045EED1-7241-11EF-A76B-E67A421F41DB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2352 2544 iexplore.exe 31 PID 2544 wrote to memory of 2352 2544 iexplore.exe 31 PID 2544 wrote to memory of 2352 2544 iexplore.exe 31 PID 2544 wrote to memory of 2352 2544 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df5338bab4739568ad9bb27f46b38b91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbcce05dce1a30739dfc6986e847d2f
SHA10646542b78ab8db8d7a995d8057260bb5c451004
SHA256167a4dab1823b030eeb54412b6475a5abf8470a6987c8ecc5ac948fad5f5e191
SHA512b98e91e2fbed596cdf1306a21cf6f4ff77df8eecbf5e5609f2c0a8b919c2930889b060593d03681e7702b59ad0141a2c404a745018c84189aa0cffb7a9bd3a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0effab4a894c627e02032d1447a0007
SHA15f34a7d54b800bb801b0cd0943a986b59906c714
SHA2562bcf4c5724566c8342061911f29945adc1c3ee87ffd7dee6c3ed7fc98be98806
SHA51274e4a57650dc97911e4d4b1c2d00fcf6fa13cd30b339b8a2596209acf77a17fc1637a2a9a5985355a7d2db61f57f6ecbaea713aea3101fc30c50cbb04ff40dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12a639ae267f91cd7dcf8dc76501d45
SHA184407530fb13aab7d2989943bda116682f4a9112
SHA2562707411ed49abc2e5bbd8a2ce335268c48f2e333109d5c164f829090a4cb917e
SHA512c1f908ecc327f453cfd90c05d21bd198d728075bd8f5eece746020ace397b93b1cacff12230992b4ec97d2ab54a10852b97980cbcfdbc5342243782f37cdf0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58271dde1608224afc04912963694b673
SHA11b434fa29aac28d556a36c933f52a5b7719c825b
SHA256ba7107203a38a198a9fce99733fcf877139a1366ba35e88cb8600b4319aede67
SHA512d27458047d27329f895d1d6167a6a0588d5ece4438a93cdb1590d33cd7bba21d6e6c07da30e8caad0c8c22a79b0eb090727a36a0442832c96e86000b314cabaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1a71db412200b489aca12437f80d18
SHA1bb6515fe56894f9d9a644e87cb1285ad17c9fd6e
SHA256ea7af51f4e675d5d7cde93ae8688f800cec0ab7d6ae1408ed048f115ccc17b5b
SHA51216af93042ad03936100ca2eb8b17f4e13ef8e23493d0589ba2d8e394aeca4a9ede4a3c09f854080200420a6370dc9ce18e1ce5c7b370d18f9d491f27c9636d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeaa3f750fb984ad2e1964170140647b
SHA1cab533c2a8619e3373db6a415ff9fe1c68ff6d10
SHA25649c7dc74e4d49a7334ec5e0b431838f96ff169847f99b97ff9bb768057afd925
SHA512cb6943e3f1c5e4c46e744d46c4c33779b924b0b165a9f032d15a223807d69a25fda2da516881910686f3a6f0ba2e03bd1d881025e2af0ca1c1a8d70bf8b8b782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80c1407ec9a1924ab696a2333dab8fe
SHA19af187aaa5be5d7491fd9693552c4dd2c02cb380
SHA256684886e742dfff6e3ba9db52f8852394c45dcacd03cff143c7e470ee1a0d075b
SHA512106bf58c8782b94876fb29978351f4f28e07aa00a67cc5e5b2524542dbf8b07cfb3cc96cbd76f725d9e117ebb6841d51aa91922aab6cbae03a4d86880e504de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc20aaf6a93f6700180d86420feb3c24
SHA1308b968fdf8ef25b6d524508729ed3510a9bd686
SHA256083dd1f43db46be9833fd295acfc1a3534f7ba78e7602c930d81ef89bc254c7d
SHA512052cf66920ccfb4a9ec4e40b9fab22d9ad6a7bba412af0432ce6862041482dd998b0f4927b4ee2aa26d7d7c49a193470000d20211fa04d407faafd198446c20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae03d377ca53cda2dfb4445d1e800d8
SHA1252d94c6425c31a4aa4d9181439c7e046174d0c0
SHA256a869a8404142a4742b46612c98f054de6e2d6ef4ce1e1046dbeb2c0ff22df695
SHA512e9c52c4c256fb474f9847f596fbccb42818fe9d712af6415602f99a052165b2eed83a9703ea6d86f39b1029d862e9d874793dcb1d1a3ae665792dc9aca66c714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59955bdf8028f198d6b2c22c473fe5dcc
SHA17947458937a1a471c446f820ddb2f016dcad6fe7
SHA256276ec42bdf862dc5247b9161573b86c53d053c1d287cf1368078333a5853ba3f
SHA512d168f7e50e33b2e24596b3e91fef152d665f56dbd4a1945eee7b743e37e4af6ce6c309b654e8f9f7e656fe243ae205a0d444692dcbcaa1be6a019b6825729cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd57a0f1a06a91b0b67d05cea6bb7e7
SHA1c30db7519d67a3ef55f8704555c9655cdb1658af
SHA2563a54e700f462c19cf28e209b3a8c4263194fed7876a3fd43180cca0123f9e30c
SHA5121eb4aedd2b0254b7b40bb338d9a8bead19ab306e1eb194cfaba7709656792b0abdb26544cb2bc2bd564a776b4d14f6434bb0234a69019cae7d157f5a3afdea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8c52f5d3bbc75dd89130c77c90a001
SHA14eaa4b6a7589252e94475c53a832a74ceb9226a4
SHA2568c2a1f5978728d9548729a949c12f26d9295c4ec718ac72a1b27d7f879d2da68
SHA512a4ff01a2fa27a4dab0b48fbb6ea0a8ff1568a7de6636f8841c511c67e459590c87a40fb4171a9d5bd1a178ffcfb3b6b3f712218e6721ffaa5380a30339392dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6dda83ad52e4b0ef0762a01ffaac080
SHA181d9f5f73ccfe94a8b2352fa897117720d216fdf
SHA256b9d58dc094dd622738ba64bac0476696e7c345a91079448be25b9dd72b3a2695
SHA51267a88e41c57d4c7526611499e0cce53a88388cc9cb456aa6ad649ba0e86fa28ea932eed24b7658681e15544a1d76fef9cecfb200fa9bc8d4d532377b75f743cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f74ba61c08683cf1c0a5ed7e578b60
SHA19aefd175ab574fb5f97afb8c3c64b83a70f2ec10
SHA256e297cadbd99bb324a4df98c7ad3c665d4e97e5672149452111a1da140a831113
SHA5121b62e4e4e95f0b350c36822eb77ef0aaafdf35b5fb288d054bd0544cf53a5584e02656a1bd16f32a6ee1bb3a7b97089e4c406d771f6f42a3684de0bcf1074164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe670b4fa072e3039d66a79a1c22b410
SHA15479a70567ca554544ef42d8217acc2831819c75
SHA2566b41e5c4eb75e5ea51b8f0dcec5dbe2ba1b83cf088a08eebae64efd240173a3f
SHA512b4133c97ed05c342694bfca078ad3fab2655bb6dac3324633a5105de1e4263898d59d6518398f4955d94e5b24dc0b6d9de316923b405aa050fdfe67b245ef3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b81b66006c2e4976b05205b3710c00f
SHA170a54b22e7ffb03ced2c2eda564db022a693a3a9
SHA25681d9c21505b206eb8240edf5397a2a63f77adcbbe7eee5070a0c1a5e060c5aff
SHA512928ad126dbbec9cf0af3a1044aa8188047bb8ffb0aa73ec670faf0ba6a309b86c8bf3d2bc429914344266c9a5a31009b45c15b053270a09616b313acd0b3e95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538171ca42a018134d1d4ff8b5a84defb
SHA10a32d16894d74fe6efca0a3efed92763d8634b5e
SHA25668ce17943b1c60b481063274c87dd73f212c61ff75d129e66a1956e6ccd38e10
SHA51292313339b69ed8c56773e27cf7baf251d65a4aa2c1ef40fa5bd6f5b5a8da22e76c44a91acba82bae2b932999780e56ff4aab0d9d6f04a7bbfdd24e51f645c103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e4f166561c0fcc58784cd6a3075ea5
SHA15f9ee1f55fcbdbcf34f698e7135e4d7c2705c0ab
SHA2566ca37888f86f81b8901732cc19d96175878786397d0a44df187cdbc208f376d1
SHA512a640c0b25ba6f832c985e0787ff7447d8a64c6507b178ac027625a67013aaca526e329fac31c9e08bc2bb6cc2b668092388f242fc4785dc45c79ed7a957a265a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff8c2822f765ed487f08de1d9cff11e
SHA11e9bbf50aa17f661af23e7e281060c7a4cd19326
SHA2560ec835f03585e5c2fd8f97d515d074564ef59b7d3c11e255de31fd8957453fdf
SHA512599fb6e322bd5de073319707ff2d4c231c92cfc391455e3b785bd89c88847a5fddd7643605ac3b267d3bc1d2de82363f9c71317ce5230803d83ba3c21729ab2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2bcc58f942ea9d189b9ae4172ed9a1
SHA16013ed6a5b91f951f0d2359e51a784a9fe7ef4dd
SHA2567cc47ab739070d7b2b4c0d3028b802a0c9591d7bfb0982ddec3118a0d62f8281
SHA5124e55860e2d9fc84c868a278bb78b61ead3b884f702d0d696a3dc3cc856f655b85c53adce0f24754c3d8eca07cfb2e0859d2ec55419c15f0b91403570d566f31f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b