Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
ea828fd4980e9b004e679971b2df8d11_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea828fd4980e9b004e679971b2df8d11_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea828fd4980e9b004e679971b2df8d11_JaffaCakes118.html
-
Size
27KB
-
MD5
ea828fd4980e9b004e679971b2df8d11
-
SHA1
246d7988aca1b69c17915d73c4be6758aee850a9
-
SHA256
0cc54c1962f28d74a93ff712d7afc86f984fa9e531ca68ee9c9dbee7570f979f
-
SHA512
f0db1404ef634fcf7b9b1faa340814805625f9bc7c0f0dad0ffcb956e7c7c7cdde1a7c0c17b3f21706a05bf43786b3a8b7238874468a96aa15e6574cabca27a7
-
SSDEEP
768:+tlgRyyf4aUealFYTd8u5aBwkjfeekq9abnoVlBef0vo:+tlgRyyf4aUE6u5aBFbeeVaulBef0vo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28055151-7638-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ea7f4c65c567084a450d20be3f8823a1d084f08405f3709481ffc985980f931f000000000e800000000200002000000057533c451a1a69368e2b2beb66e9901d337b669bff79497dcd636687fb7fe318900000003c85dc69bd60c5b99ec6a01b2bf381fb3a99b3d568d964409ff561953df44b0f0daae3fe953384def5dcb9c162e78d53830a72df999cc24bba71cc28a5e19f6ba289216959bc1461611650478f1a74cbd88f025c1916f87dce195d98696eea38216162f19545f7808d5e0eba48b112b4e0eea09e5c2e2175f47b43671494fb21f6bd99cfd23c8c5b1e7369de41e52c0840000000d697027618ca78c79c4759fe966f59732639ec6825600ea01cc6a020b3c8aa0606c56796906c83a9d05902a53fe7fab2513e994898d0786c86fa48dbd4653a7a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878771" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80090cfd440adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004b01f6b449dddc418b546f1053e2f9bb5a11ecddbc60f2d2c031ed76ce76d7b1000000000e8000000002000020000000a9aebf44736010a78d7f72a65dff24cb6ce6707d7cc5507ba77d9d3c2dbb33f120000000a6e5765163a1a5382d7f77003acb0233522b91c423e3bb34c693243e67cf0a33400000005e41774602ea62adf0c34b50648535ea31fe2cdf901a5ab3ec148025f2963923f4b400a1f1b6bf001fefb9f609b483a8896acfeb11c10c5a86eaea5c3f856555 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 3068 2852 iexplore.exe 30 PID 2852 wrote to memory of 3068 2852 iexplore.exe 30 PID 2852 wrote to memory of 3068 2852 iexplore.exe 30 PID 2852 wrote to memory of 3068 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea828fd4980e9b004e679971b2df8d11_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5593914ddb192795da68f9ea1b369b
SHA11e3792e7f9401ab42b758394e33772303c86d45e
SHA256b9370aefe560e3874226e0c85e5412612f1ccfdf04ed0fcd9648bc07566fe08b
SHA512b078637b31ca9587496ab245ea6e897b89cd18d06470749906103679871027cfc0df088c8e23662f72bc755283555d87c8e02c23b15b9696d69c8402b0b6cb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3ff31be95a3208fe2b91cb3b2d395d
SHA126156301c7b977fca2040c1335f458f8433f4a9b
SHA2560c6aa8178c033126f9787da33976ba049663bf7679d7b40ebd553fd222a80794
SHA512268cf31409561a04a8cd8fcba9e57664b0137e76c2efe85f88860724d80a0563563eee5affcd9e37e88bb479cc62db37532315e5e53cba4961b6a9bbfb9e3012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e639b54be4e653a107c3584fa9d3b7
SHA15980b08aa6a5d274351c3df1e3835ac2e137a795
SHA256739cd1ad98484c8c0ff7427178947d30c974667563824bcbf3c5176d91fc7eda
SHA512d89ad0db5de2f544267c66cc418e97a2685280a6c56e7b45d878ebe78caae8270dc690a62bb0be561e8ca94b6072f1ea587c4806f771a2a839294ce60de5e902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55178241966a62b54ac173ef0bee98dcd
SHA1045fb0e1eaa5031d3a86398ec2768662c1bb61eb
SHA256dbe2c32f3b43cb2a3a34fc6912d1c06c28bfed5c48916539e057989a3fcf0f84
SHA5122b4e4d26f041a42352289f5786de29f809ee1a7786c69e2b79a222d812c9a3bf49b5cc2296c1013b47becd032958ada40a62f827f24ea701631e0450d5ab363a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9510fd1fb050ea357d3a365463d8055
SHA1c61146cae3a2df24727a7236d2bb96089dfb0a35
SHA25631a63d69dd7efa1ff022e215b1cbe1c1bd1caf80ce22b9f89787513e64b81c96
SHA5129513d8b004b2251d68fdcb74ffc42cd4777007bb32dec0f7c85e8a307d5cbbecdb62c071e97a2317f88ed602f79d5ed8987dc6706c389e4dcc635c10f04d1d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3d41410f77eaf1aedcbf2ce4386053
SHA1edc201b67aad7a9b9c6ed5c595449ab30f0bf60f
SHA2566c64bacdc1633e90569daec4356f698c2942b4133a684e8a14846c8929992ca1
SHA51295a4a09f98f5ed2fb5324021d90faa24e78528486ffbfc0e08ff7cb2bc71b1e9bcfaffc74327967aefbbd572e84a63b24b96aff567ab5d147e2c83ca568e9509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd572fe2739cb57ff686a4a31ec0357c
SHA14dd53008ebed17a3ff0adf536a775a7d0ad26ee8
SHA256af6c9b5b04ce7720a6423c2184ab8ef56501efe52cea3cdad9e5f37a3d1b85c1
SHA512dde0eec87244144d5191b9f1dccc8eb9223262766d13b91f4ecf8fc04ad50172d438380cd98c8900b694e9e18a9648b6faee299b5e288d2605b415990cf67413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056f062d71d376a3d596d9f8f734726b
SHA1faf80de3af2e5dedf0475c5f533a4b3dd04cbbbb
SHA25655e8fc05c74edbbad5745a7b05f376c75bee2551df8bdd6de4be89fb37110085
SHA5125f9df22ff230cec6a2115d1ee8ec34af9660ed1743331dbad6ab89e1982686363be32a2ddf8f25d2b30ef6addf7283a3106771f42f4a25005e293cb765040557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363d677a11df597a049b57df2365e100
SHA11be05b2ad5ccfd96eb152413bbbf667048a4f140
SHA25630e781668b29f180efc19484cc5f73f628ce676ced998f8ed4b3de9b8392f273
SHA512e76e9101c0543ccd6297b40a4d9303b7cec7763cdf9b204261189f05c39ca683c381dd040fd29013dbb57c98fb9bfa3cfe52f588ac6aaea9d9ab8da291d014ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ddec55c098a844f0b14dd5308760c1
SHA1828742ca16179e1262de13668f550ef063731549
SHA256fc20abc940633f6680819d27f4713d9446524f154a71a3f601169c410a162fa4
SHA5128164ce57d6807af8d1c65f125a5e42f794b4b10a027b0273307ee5c99f42635b0e3c5055e8afaca171d739a89cff089fe728672f65cea0dd3d8df077e49ceaa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54142acd96c8d4ba557638ace801e95e1
SHA1bed704eca2ef04bd599e97f596579a97e4535465
SHA256533d07f6d2f7ea2e3f34e5a3f513c09efd796caa011ce9f3fd5d76a17c148a0e
SHA512a147784a7a619da844afd948d9f9f6dfec9abd1627ddb8bb6675e0acb44d8e31568351cf18d23a4eb3d79538e5d05655f560d3376383e979f97b3e08498cc15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776bd228fb804991106442e0c2bf8760
SHA196ab8216f6448e3d504b54824cc18302a98c5d71
SHA2568d3ddd31bc5d2d5790d1cae05b09b37e85e5344709123b4c7d277ed0edeb72c8
SHA512698d4b00205a01d77997b3526338398c93c8f951b98d26ab053f24e016eb4dfc2e04242b080eeec6738cd7c4b3d9740b0cce9c10aa0747155d5a5d08f67ddc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b850b7c36578e8fa72573a5ec4ac70
SHA16401069a6145f44c86647cacb6131fec367e5907
SHA256346c5459087ae9280c339f25f85f372cb2ca9ea10bda0d60bc7f1f7aed77e7a3
SHA5120d266a21ef8a29358c54988ace4ea7fcca532d40c7950a822366c1b9b329d0351bfb0a7ba4dce93513ca7a39fb06cd370cc062b9dd918d5692daf2c8ada23af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a705d5bb5add42cb8ab8e00e0badcf3
SHA17462093f36c8ab9f2fe32402c0975f983030ea87
SHA2562807d55cab625622eba3a4c9576230daff6afe0c19ababf1ede6026a4ae49f93
SHA5123a47ff43d17a1e852e6f99eea6aa9bde04575a59f8167df43d3633b6fe6ca4b334940b72b459d8c8096415a4b8c5ac5e0b801327a2b7638c104258b7fb98f35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f4915d864c1cf2ec230a9802a1f138
SHA1bad4f571736dd9ed4435be1afb4955cf2a34eee8
SHA256add8cce83c6bc8796b9b77fd34575bec71e12e24f4fe03497695bb5d0316981d
SHA5123c4830d4c84ae1052a33c1f7f526a5e068d0b53645751cdccb146b0b5fe49e73bcdddb02000cc52817d5d50a598d4ce2e09e9b7e906941cd749eb68b5debdd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2cf17ac89aba31ad5c209ec0e930d0
SHA132f1b97fcd0a8ddbd682ba69d7d68d1b0236d794
SHA25659a178076f44ac524578708749884717e469f08a37ee79d2196c8b9f0cfa932e
SHA5125b9106c3903d933c83e641aea7343285366a9822d1129a343937e27bacac0f4fc2257176ed084c4aa6f705bde5cb868c9f72abb67bb30c73ac42fa12db56fedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8b3ca771b8d224d19306c6af6bd33b
SHA1d39437dc20f80dfc30edba3c6f2aee582ae7b3c3
SHA2563129c4b3e06a4049deb0fd72f52e3edc505cddfe2dab3514707838fd21eba26d
SHA512dbd2925fd673a675f7b4a22145ea3c31f3ac618050fb5c2d8a84bba769344cb5af88b2dd977d6006f13090dc78d84d6dd8864ff2bdc10d53bed4a93e39cc0a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59083949359814f8705333fa719ca34fa
SHA114fc6d30f3e928172d735aad9e0fc584b5e5999c
SHA256615587b95605995bb366d4f00ab0db92d6be6b028c17e41c83ab159c7832a9b9
SHA5121b2624d1f102147573b2a41635ca4f3aa880079cb20850da7ef434204ab883303b6486f5521bff15c167efaac999c4bdcdc0f163bf559d5770be67576a7a53f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ccdaf1fa8ce630f4c443561f7dbb6c9
SHA196f262970f43741418051180e93c2b825d008b52
SHA256424effdf1830f84cba0cc676e13294dd83bd1ca66a0399f30192a3f35ed43a46
SHA51225f4c06a399f820c43908c46e4885b333d89c7590917e153957e4cdbeb8f23bad5da0191c72bb9dab3344f3706c9358fcbb0402ac5611e4917d13ea3cb21bebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555179c4d9a840cfff44ab9fc72e84333
SHA1492a3ffa27c15609a94f7534790e1cf682517039
SHA25682fa9d1673be0be5ab8c39ad8a25d84d5567bdc2d9d0ae9e779b524f3be4fa6f
SHA51212034627a48a3b5357c8e46cd7d31ffca5c86292bcf372d21197ca36db07c1e52a7b77b613a50996f28e1fea95f6a692502693200e17808906c71ca31f1de608
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b