Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
e10c8663fd185bc25c944f8da3078c2c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e10c8663fd185bc25c944f8da3078c2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e10c8663fd185bc25c944f8da3078c2c_JaffaCakes118.html
-
Size
13KB
-
MD5
e10c8663fd185bc25c944f8da3078c2c
-
SHA1
15cbe7b8d78245155e9059125bcd24b80cbd4717
-
SHA256
5d6eeba495e601ef43849a63de65c1b78bba8d63a093e789857d5ade46669d19
-
SHA512
149d5588c2c0d62f5a3d26b499ef8904852254441b71e58289a509ef6b6815a2fd1533980254e5383a2e044e393955c893563f55a592114f679a6d4eb9088177
-
SSDEEP
192:CyiVyO6X0EkEWGdjbXsePv9e8wQFCVCf73xy1wZMp2VdFGhe3BpkJkLLr7:Cyi/u/f3ULQFAi7hy1wZMp2j4oRlLX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e008ed9f729338a7e43dc00c4330bc59a96cf83f54be20ed3d888c4432ba9a98000000000e8000000002000020000000ac3ea622e0e266e2703d79ad8db3e2f433c8a9e26c27da45d49bfc78ba41cc6a9000000039fd9fcfe9399ff615e231172c4bac4372216a98f7478b8e8ec802aec0d25b2686ed42df7c6af6b431bb7263d066608962e95977c08a55c73a23b6cfe8d40d9ef90efa52f5d7c57b02594260a5249fb2302900a330335c2b58383c78a8ff39ae11c9e34571557cd37ab05f8ce63ca037ea6f73bd9c829dc84da0e5308663a0fc0fb89f4f50bf22eed1cfe6ea2078a37e400000002f087b4e25a81bd02927017189a70e2f8784f3e920bc48666ffea3a37fb68061d76d5009b0de1518aa6ea6fa33e41ffeb1d6e08e9eff47af8ad02aa6f3edebd2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432510366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000797402efae43e0046ec9d67b9390de5661d8d5113c6dc50da5c217dce6367f34000000000e800000000200002000000007630033729244863e557a2fa6befdc0db3483502d752055b1fac67b9b4e3b4e20000000346f2d24071601b23f953a64e9778399e12040f76915556fdea3bea5d1cb7977400000007306426b41977b671e148f8eca61371872822e74e170fa09cd1576cb2afc55071ee0451234d354bc48289e793f9355d2940f96a0554fbfa9e4e37ea2fd19025b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{657DA531-72DE-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8025be3beb06db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1900 2104 iexplore.exe 30 PID 2104 wrote to memory of 1900 2104 iexplore.exe 30 PID 2104 wrote to memory of 1900 2104 iexplore.exe 30 PID 2104 wrote to memory of 1900 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e10c8663fd185bc25c944f8da3078c2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca446e6c0d3a4ff2c3db96bb300b212f
SHA13f16b991a21938cfb5149fe125da3679e047144d
SHA256a92c97dc8663bd02faa37b9c632bc862c8401a4ffc767a394a7e6c07131073d8
SHA5127d00d49f67cd66a4856f5de4ed7520611264c446e6c23962e7f5bbbbfb3de9363c1f75a61d9f047c292618fb98b402ad0da00fa3b6de7a77589a502495002f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593dd7cbe791b45950aac6bb4413059a5
SHA10d0b4ae88ad4a7c35ab25c007610a5f3ce56622a
SHA2560a34084e54bea7843189a7ea7b589350630e20fbc9c87450123ca3d79a368c6d
SHA5125a0817fef6fff5a593c6b34b0cb9463b0d12a850b776856ac858806b8617e005c6b7fbc401ed5c924b0767602e344e399ec8c506b1514ad0bf737da7ad7caaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18311e6db7bd154c945d7dd742ccb18
SHA14c1577287f1a7b4bd26d91efa9e629c9efb73de0
SHA256b7bae48ad9d2eb6f872cd5b96099b9f41fadfaecce982177ac510fb569f0e5c3
SHA512a9b77bbccbc1e299e5f459b1877ce77171398f7a9c66cb2767288cc1eaa8802aeee6c8a00e74d045b75926d41ba7151174e10af6b7cd7b291517f75549621bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c842270e209aad480396bed078f56fb
SHA16a947d5b8de0415d9c218a06ad0bf578c630f21b
SHA256042a4546b00f50e675c232624cc860ce7dc59d7267148a271b2cbf3c265ca1fa
SHA512d1fc6138b67fe0471d6f17911574dc72ad3485419390a6e99f8511a611cb963433cd741fd97b40b800c1783311d80ea6d94b8105ba587ee12b32cddcc59010da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e316eb26d648a8b2584a47fbed5b1251
SHA1b93402700678d4bdc42b394898f3099a2e2b1b49
SHA25665770085709c61bc9825503a90e922794d6574ce2f7020e170d5fdea637d03d2
SHA5126c851f89f6e74b7fb4053827ad9becee23799318a217a6fcafd53067b04d9998a7e7ec8c2e1aad61de9f7af678104f1d27736dcfcad71ca736751e3ee1bbcbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8309067ac47ab057b8a6e71e26b7aed
SHA1c9230c460defe387de26bd87025c547e9130bd65
SHA256363038ab6c49f12897d47b75a24b66d821d82b4b6b30978ec34124c0cd23b50f
SHA51269047386765111de390708869fa7b9c273876b4222f1539c46911afafb1f460c8fdfa95b2ace7ab50b52a38de84e115ac557aceb8646817bd75e5cd3c79a25bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b014887c431fee7c85e6d543e0daa4
SHA136cdf082424bf815f5be7a003c02cf1e07f4d4ab
SHA256b149139a44b4f2b42a3332144dd9335ba72fe29ed42cbbfea07eb26aea1ad449
SHA512920e32191aa83d47a85216d897ba31fbd47ee7212afe25c342a7a192d300bbc6645b1aaa107805e818f73b9a99f4842fdbc70c25aaa78108f626f8a60553871a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a329ab3ec3269d8bc44e53ccc3c399a
SHA1080ce2d6624637b8ab709fc54c9d9086c8e5a537
SHA2566167c9914d5bcecd049484ae90f82f5f9c68d2a5b19a106c9dec92df09ced4c8
SHA51230955354cdd538703cefeed41b74d6fe2fedeb685c0b080e795a50ebcc84f89120957ec58d020b5772efb99644b63e6ac3784ff884e6b05f44628de9bdc1a1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844218bc257f5f4d6093baa450b4d084
SHA113a892484ecd909e2ba6d77748619f0e5a2edf3e
SHA256ea21fca09c4a4fe62820419acee3b00c3de0d1377881879ffecbb4a79103bca5
SHA5126ca74fe3ff6be1118e92d8c3e1780a052b7c497cf904cb47006446e4988de41d2c350fb038cccea4b140d2f94c7d5ed262c51b6dbcaf78b304045e55b46cde14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aee746bbaba64a29984ee6d8df2c796
SHA13155b3a109ed5984a91a6665347a3b6719027273
SHA256f66ad471889203a689435d67d80689d9351c6197852064f0f15210d496ca4472
SHA51251b4e0c8f456c18aa8e15cd7dc38ac38e126bb4467ed15585e7f2369704a299d05e1fe32596284424650b2d65f7a713eaa99f454d4c2967877b2209b18895c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f376058d701a4fa0615a78303dc46323
SHA1f4ca8b9ee23375922cc8cb8676b5ca196c8a455f
SHA25669b1c653123203106bf28ed34b0647a6310392efbbc483748810f66547eca0f7
SHA512f877bc94e01721a485ef21ddb8028c71db2e697bf88923307e3ad0c395c05cac97d40027c8436dea4a5ceb99cf03fe6ee0a99a8b446332f5ee5591e1ec0c85f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974d41a76975cfe506d4836af4a016ee
SHA13e45bde110a435e84defb97f4568c722b750e5b9
SHA256cfed17e511bbd103e5e31d1af8e4c7c69d2acff939ec5d61beac5398e244392a
SHA512057047573cb1b79943d8c01c4150ba5577e7ac8fd1f8b4aa11538f11a939d4ff16e34b951650f4d1c6cb674fc67debe8c7c8a1d98cb3597a598d8ce6badd202b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b198665b79fbe43c58446263d1f0d0d
SHA1d4c131767c88b6a59941d04e3fbd92cd0fdde219
SHA256002972c1413d55c505c0bf6d026619e24bec32ce9d4a6989f855cffd59b6bfea
SHA512c02345456d701d0cc5895c15f1f2a217e9dcc7c2e40c69c4c19c2f29f3ba5fe8ea951e420213ddebe1a0194e8a58844f2978608cdd6a35e3b401e28d63d756a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcc4213f847c0767aca5306e396e8e3
SHA13a7531f004b2dadb30bb0f8e96833712d988b6ac
SHA2564f5522c2652c85d90e01ebf4510c4e72815005a64d4f5ef8c1fe853e211cc32d
SHA5120d4e76e5f647cf449792529d780a5dbaf1da79a99ede807703624b20cf5f3f1e8e5ab706f40faa7ede8cb7b6b2721aeaa0a7680e591fe5dde9bf9b23d95e5ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f625d882adf1ab26ad39b8e1e02ca69c
SHA1fb99d5659a62053aba1bc0ca06681a9571c74b1b
SHA256ed467270eae5bb5207b46f0ccfbe1e2e296cc1af20ef26819e60efce6f161f05
SHA512900e3445b0ecbc5501487bfa490823ce3d48812eebb4c4ffd5d780b41e1064eaf11e968bcf77ebee32fa8d829c383dffe1e6393427db135e5cc051aedbf89c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580da66adda42407af4d91796ed1d78b
SHA1d72f82a3a5bb22379974e0f58217da529c978761
SHA256087024684b122de8a48f994726faedcbf53717752ced3b4787b7891c3f4455c8
SHA512b0b2d59237cac2473547852b457b4b1d2931caeda8b02a81cb3cef826692445d98c95e85cc7b38f47af7dd1c252cf0c9b5981a6d2467c2de375cfc36e78d938e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57254e5041872bfc3f47b0211ff274e62
SHA131cc25f83b80d43296a1bda2c865f131ae548dae
SHA25615b395848dc9f755558c1048b02bedd5ebd30886769818bdeaa13aa9c08d8692
SHA512529881ecca21463dc2cac638f06b1736f7304a6f8c2b3996622f880a1c6931a8a40364ee265c853b4760a562c02b83680b1f532b2fdee7f88e323e4bd7078e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e41aaf8e9bce4d3ba1f74f3c8b5dff
SHA18dd1382b89971a4d394b0f5144f536f9daf8ffa3
SHA25637999d0f97a9199eaf3ab741e796dd3b9824a7020217cf7c75353369b4cad7e4
SHA51226bf751b04b53ffa40714391b179197b40722b7ad04a6895668ec164a295d20f1aeb58a6b3b5acae3d24839c811f996b208e91e7d2d91cf52b75ab335e2dc1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896562bccea55d74f42ef317687f917a
SHA19c3040e92ef1ee41ff4bdc373f4c9e3a62e45344
SHA256cf15e8dfff029e290d9c1ea0d3d9fc151d18158e867775a86505c80109bec245
SHA512935a7ad02e618c04a526e9b850eaeb82de9d5cdb2947ecae577e0fe322ae1119237dbbbd72be03a786be4e5dd602ffde7e0be629c6b1607cd9fa498c0068ad94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e9787fd43d029efd41a79754142874
SHA13faa725d99ce74c9b474d7893cd57f9538694fa9
SHA2561c42b6ee849c60ff69ffe2426b76b8e93e9d3edcbd49672fc15e9d18dab350c7
SHA5124c3022a790b0fe27ff86b4e9baa2605359ff5ab66a937ae8174333b4d92bf794502e850d630e1877144d920c3ec204fbd433f65acd06eeff66212e03fbfe20a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b