Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
e203c191c90fb9c156a01e4be5d56e34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e203c191c90fb9c156a01e4be5d56e34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e203c191c90fb9c156a01e4be5d56e34_JaffaCakes118.html
-
Size
20KB
-
MD5
e203c191c90fb9c156a01e4be5d56e34
-
SHA1
f81e4ac67784ffe25a89514a5fe1487ae19c42fc
-
SHA256
05cc4d5834d08b45c284e35fa026357595fdf423b3ba127129021cc5697131f7
-
SHA512
3020a95834961452ea68ba988623e25b48f17b72db7bdfed470e9c7af49a5928b7c619394d11e63a3d09a9a536d99cf9b3e9999bcff5da2c15d48c42e15f2982
-
SSDEEP
384:CanlVBbjPqoV+zji0Ft0LOzTQTzT+TCTGmvTG8LYqnJTydoB7Ujb:nlVBbjik+zxPKPg0GmrGEJTydoRUf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b46949192980d8d7a1be3dbefc5ec65e85a71d93ace40e3fdfe75d17499d9211000000000e8000000002000020000000f2aa620e71ed6b52c4b3fb3a59cc948a3fd2da1bbf390bf370301f79e7c1939120000000cb52b7960fa63fc33ce13d7c0f0c50af251ab96c91b3429609fa4f622006298740000000fa35f916c6171c6c674c2b7a22ec1f6d1c537bd0e314ea811fd79921edb8e4ce09b9ed23a2ccd39590a8a93a309e9e6e87f440bf91660d0f3372be7d85e21b89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D3EF721-7337-11EF-94A5-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432548470" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cec6f24307db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000517b7365f84ee9a92138509815d8bb596fbd04ec73a5567acfde5816ef565d92000000000e8000000002000020000000d69063c29dcfa6818f1c71e0c0c4fe9e6e28e0c5e39b6d1b449172bbae288e3b90000000cda3755ecc88b810a34b8a34b8ceb7975c646a7bec40ebf09b181e26c09f810de20914ce68755c6758e0381a5ce6dc1eee67ad0a9e3c37595afe96902cf60743c8af48204c4413df4fcc7569b753ba2dc7c9b1800d2315e1daf7ce5b0e16e5dbff60002a53e233466f513d8cc80307eb16e2283276a08d50a38ea436185a99ae161e3028102c40c5ea3ecd358aa1678e40000000340e85409d91936199acd65254bbec08c16aae16a7d919050e68fc7560d5cad64ef7e5d781e4f8ec2e313dc3bbf07dbf3f3aa362921aa781d3374ccbc82c026c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2576 2968 iexplore.exe 30 PID 2968 wrote to memory of 2576 2968 iexplore.exe 30 PID 2968 wrote to memory of 2576 2968 iexplore.exe 30 PID 2968 wrote to memory of 2576 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e203c191c90fb9c156a01e4be5d56e34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be36bc4786f359984307d541b92dfe8f
SHA1c4396fa7705765bde3732e16d1345d6319f18b83
SHA2560a16fbe5aa26ffe4bb625cb91282ea54e33a58060fa9211e96dc4fc94c76956f
SHA512792f50a9f357daa844ee9f0afa2925d33c9bc4f7e11782ac4a6036a4afd16a5938d26df29c540729d656e96397b8b90f4f27510c516d2dfed7dfe168a9312229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec767552f50ec6136626926c9775bea
SHA1fc0e08297b73e0224d2a6a9c1433cf771980d3ad
SHA25605ee2b423422bb2344e865c2ea3ac802fcae7349dc04c4b3479ad5e077382c5f
SHA5128e6a7d267e49f47712beab90cecd0dd082c2fe400876ac027637f73d8834fcd748ce2ff3d9573eae1ecc98d703160fdb32ef650fdf4318a413f2a44c1cc08d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb662882ae580092ccabdc283a097ef
SHA165e50f72c94dda087bbd934fc5ac4993a91a1d0d
SHA25640e527c235ef9215a14eac4f1a6755a7e38868eebd026a59b09b124d4c1d351d
SHA5124c0ddaf1953f462c055f72d49170cc6cec35ec6690da19b177beac55a074c0ac92f2d4b5bb0ad9668a262d57bc9347c9c1ea83d943d2ad830ad171aa34025b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d415aed7fac71b72184fac08f3815589
SHA14fccb5521ca2577fe034f04434925a5f39d9b807
SHA256799b2436b2a64eb22ad8a545de0e57089051418aa9603009956b59949cbd0944
SHA512b2f54ff249510b5acfd4b4c3fe16ea14ff05417e2ba8e23ee1ce8a23f3d646c058c6f76cc6a589db7a823991801af77681821c5c4aeea08e8bdc85c1eadd9ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab2daf2ecceab2633de3d7a5d669778
SHA142279e9980d6ef19e0da70183631fd59106ca89a
SHA2560183ff5e55c387f4e3536ec86a8cd943078490af78c87a9bcfaa8d0c0d6697d7
SHA512ebdf08a56000dca40d00da54e4995aa397ac51606ed7b3473b0b99724a273492f5741198705f67e9323f6a7b8005ee4541a1f377ea8830ff22227a2b6e797bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57040358ae551c648cef5739f97113a4f
SHA17a495d324532abe7d8283a58e628b2edd2be8fcf
SHA256ee7c4fe45773f81604dcce63f73e0856626d5468e0b23b4aa4ffacc45e656bdf
SHA5123f0dc49300395e73cf72d6f906becdc0109754356f54e361a71bdb2430fa5dde5e80ce20ddd1043ae1ddb7f6ef4ddb1a5df34d8edbfbf70f3fe2055183e6bdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59605d63215bc7346bb9cd49abbd67857
SHA1131e8591d45cadb459acf4b2be77622f7742f538
SHA256d9b6b6697f65e4209d4c6419eee21bb0428021ee43b853821db41eb2d09f7652
SHA5123f0f16ad3636bad6d5d943278982fcc44b234c39b5b3953929325e1a8244d35783f393f60d752c91ff1a3a75d752465775c85c7714112ffaa369925649c970c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e109f439db03d283e123ffec7340a46
SHA196322dcbb8ae80aa92aa1d885dfbf6dac5e357e9
SHA256f43e752996d281d0d5252050808b756c03e5dbb667a3bf4256c118dbcff099a1
SHA512d23a0052e850d7f9f7db8f6b0cebe8a64a8e72811f3cb2944023eb00406be2065d5cb4dcdf2b46af8b8c4da7406f3990ee4450c4d8538f0bd51a6a236b000cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672840d7df4b40d6c5e1a34b8e2dd56b
SHA1d370789e71656d89164e3ed589e4dd58b99de3f0
SHA25619dd79076ed971f4ac38b7a1e068f8f6cc048b5fb2a4afc1182bddbbc7df515a
SHA512a8c486d41427a0ce9feabd021aa32cb2694db48604aeee44837d4907d20bd9a8817f68960d63f66ca672bfb92fc1201e9f4fe7bc2812f3709ddb037e6feabcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6f2ee957ef501d3f315b0ae23317f1
SHA1a72dc6742d9d6a6284fadfd556832873c720725a
SHA25641a3606cc6fbc4d577d2991610d50c158a4023f19aedc67c4e9603a74c11861f
SHA512b0551124fe4c077d22f81b118e3b74e483871ce3adc36b4a8b9e076cf86c845e3067505a6a0db7eeff05e8c9632e875eff2953e1bb7256eb86f3bd40298c1e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ecdbb7313d3553810a97b77bb64ffb
SHA143b4307258139dbf1fc1a0902bf243077aefe3ae
SHA256bcced92d2e56b608917bc68eb6a08921bb9b14cf9a6ae5d81838220463f1265a
SHA512ae66044bf0bba82b1cd2618b786dfc4d1cd0831b232d271c33d4d918032ed16ca819ca2259611afada00552af814be917a29c4e25bd6c4f20861e972cb20936f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53377cfa49d6a4f3feb3cdf82996c7548
SHA12298faf6c1b1ac0f84e6bcfcdb228760658a77e7
SHA2563025575e985bf9d88034b0bdb805ddc3f56b174b1122f1c0e0c0f0ee9ab29f63
SHA512e738dab674bf6e56284b3bfa825161857a09eafcae86d1ccce8ca76f5aaa7414163d3f073b1ee4c6aacef296b54dd62a0eb44a3fe3b86ef8cb2a181220a8ac9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375d058e35dc458bc6cfaf7cc8f1af69
SHA1c774d90addd18ba8cdd222797964f01d582a89f0
SHA256db00b790ad10c2426f0a4e9d4baf2cb84a7e71bc439a16d5691ee82232f89438
SHA5121e912b837d59cc4460790c78b9f908c5d444b39a1e49a10f5df9c585cfe77ba5bb6120b3187ba0db6c28b7fde1b15595cb6fbcab833cd838f4c0bdb1b8b37d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56515debadf60f76ae6ccd14896ce09ef
SHA14e2ccfaa172dc2aa6366bea978ce29099d71593d
SHA25655214890d414cdd6f1f6a6e2f158f9da32cc8f91efb3763ee90c1220fa8e3152
SHA512ae9f48e7bcb3b8185b7777dff4272e8a7b789462edef8e7205af267d3fb576ba10219dccd453eb879c843bdebc491213df634f3b5874b93799373e70882b0f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55357204109d43c43e70a97ebf47ab90c
SHA1167a84245d59c461a71ae09efd1e526822bcda39
SHA256f8514ae4abb96514f5311c6dee36d94e331cd6b506dcd045c6f6cfa3b424adf4
SHA512db14e98aaa7135805d084b7fb973460c3e797faa501ca0511579a071bce751f647e98102227f4438b974c4241ab53172af7ffb75c1afc45472d7bfecb294e022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a961561a622b037a18359a8d8ad023
SHA171fe029ab2b03a1c1110131cd45a070879909b04
SHA2561f168b9972fad4949f44570a81f3ebfe21f2ce6a666627e4021340b1ca8145c3
SHA5123aa9e513668a2419d6c5d3dfcb75bc3dc7d41895b5cbb06a250ed3bcb77c0041f3dcecb79af9a0ae41e6a33445fcd2e8a226abf88a4fa2ff7b447889bb6cdcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaadcfcaecfc43591c5c246a66b6d8d
SHA1b85d726c3c636bcc7b5a4a9313bbfea803e1bc9a
SHA25685306388db7a5c6b0d8a218e60d17e391c9014cbd308e1820334da70739ffbe2
SHA51220763ed9839119bd12e72415e74cf1a21f93a1c97353839d094736a346e022866f7eae3168fba11883825bc864f1a5a69b9ce073ea63300d16f61d298805eed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577655fbc99bdd081574ddd65eb5a8822
SHA10726d8bca8c665a1380c33273eaad2d7d452b037
SHA256977adbf65fd67bb44b47ca0b1476de22f26886d879351664062481f9fa109190
SHA5126a7578fb07fbff86d598d2d80bb35d9ff27ff15f3aab8d1e7e2497aa0e192109fcccf46cd58ca0aac3c9c9f7ad869702932ea85307ddc16274dc6082b105da3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570be519e81c66343f568cdf73ebdba2
SHA145a5e55356c6c74462f8e932f09450dbf8adb2bd
SHA256e2a595ce305a82207fe2749805838406f6efd4ee29235e9af8f90e835363677f
SHA512908dc5827f387be5916b8b2b07939e5e728ec6e60afa402e4fa27cdfff4c0a2a601bd20fb46b760aab4ef24b45c378e9f9e568aff47f671e98d15f9a2c268a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831a00d8bd2d6a0646edbf19ff75963d
SHA14dfc287c131240ec05a98bcfc6e809869c65a939
SHA2567ba11cb7ad014cb5f135cf0c555691ef4451b1461ed5d2e8b6b48663529295ef
SHA5120e3adec9c79fd603fa1e4cbdb28a4422b3424fb31f081de53c2f241a39c02cd13d2308cb83d830db9f92347bbd789dd85d6a79c3f718bb34f9683f7fdd238f92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b