Analysis
-
max time kernel
137s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
eb32f56b1e0362a01b4297cef0df24d2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb32f56b1e0362a01b4297cef0df24d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb32f56b1e0362a01b4297cef0df24d2_JaffaCakes118.html
-
Size
349KB
-
MD5
eb32f56b1e0362a01b4297cef0df24d2
-
SHA1
fa304f174fe674fe083e4a68a9cfc0389334b420
-
SHA256
f05d7d747f6d48cc526d1f5e4d5721788bf4ad7ba569cea7871b853d4c23dcc1
-
SHA512
c9061b0cb08208bb50eba27ab15471fe8e6b869830e37857d74f6e91b728b2e331c8dec5dc28fb6a9a38e8b6679ab528524a9427952ea70cbcb6c5fe3567b766
-
SSDEEP
6144:SzsMYod+X3oI+YPH9sMYod+X3oI+YAsMYod+X3oI+YQ:m5d+X3X5d+X3Y5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000983dff116aaeec44576ab5ed3a4f3b6521870c345a0f82523b5a8172872ea08c000000000e8000000002000020000000281035df815fe734929d5be7d797e710375febceaa5dd112b28378c98445348e90000000e2e683f8f0fc36230bccc670cd0a8565dca00e95354de9492eebce50d2a13bc856feaeec6cc46e957c4054618f86c17721dadf3dc4752be1bdb1c0fd722067aaf00bfcbf8aefea5a9aa91a3fadeb8350738376b6edb540c04d24115528e2d383fb57d2f13f230498af2a1813ee9146e307165c50d95d40aec170df075eb9f93dfb46ba036d6a5df98348406d8fd1b34340000000a946f135a7973ff499a7032a5275b0d8f8d4e3c04aff0afc8e416257db8361c94d1f68ef88a595186129dc89987baa1885c8db78aeb32458307151a754dc046d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432905679" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b05e1960951efdd0bbfb362eb01b6448bd432b4a54df27ae13f832be3637bbfe000000000e8000000002000020000000b53cdbae9a19c38519b3427c77105ea2a9f153434134022506d57404cc0e3ad7200000003aaab279ca39af8e64ef335a56c9d306a5cb08a15f33e79745f67fc4c2779bd040000000cd5aa3f39b3b01ab4fb9cf5a234dcf3e5f8b93338a57fda8ed11033c4b76ec93e33da88e495454870006c8d3c08b06f85acae7d095f948afe4bee4390007c225 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDBD0C81-7676-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06ef8e1830adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1324 2672 iexplore.exe 29 PID 2672 wrote to memory of 1324 2672 iexplore.exe 29 PID 2672 wrote to memory of 1324 2672 iexplore.exe 29 PID 2672 wrote to memory of 1324 2672 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb32f56b1e0362a01b4297cef0df24d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ece019324393a7588b6f8dc7386ad48
SHA185a453d29cef8d03a436a451c7e0074605005584
SHA256055dc9060051d94a349d91a1c7b5480da1c7fad047fc71e9e0b87b59598df3cc
SHA5120a9be19e78c34e51c429bb188b7e33c43982d5ee640a4d5c1e846d86a80da9d43bdd726165887fad7f7a8a142f80995367f3ca8b7e2ea050e3ffdd01a944e53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8579c0a8a608e7c5a96f5851179725
SHA1cc89a10f4678c1d12c3ddde3cbf44cd443d8c698
SHA256c595519dfeac6c636633fd09e8e06bc25066447cb55036d75eb7253767315c70
SHA512898934833e3fb755cddade784124ef7503f1ae26262cd069d5fb7d0845ba8ff81c17915cb10dc294a8f9065d3e14aee442a8a81c0b1927c1cafc55d1298668f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ce2500a172463ec572c5d56590dabc
SHA1b4fc59cf83b7052369b867946d967c4bf03fe42d
SHA256bf29eb674ce456fddde839533516a2fddb66b94d8903f5305b7e790b50d3e755
SHA5122a4b96b80e9dda127acfdaeb41c9740561454a0d452d5d84852d91ded4bc7e1f0d351fa469aebf91b0af93bcf84fdef3af959c0f2cfeec23d0bc8a63e22ee1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbeee49b03055d2be0d34a64ec8518b
SHA19b06f9b2e233795084dd3441a0d1cb2bc9a3232d
SHA25676ad23863f1a827579a5a80b7d9349aa4b442cd17e303f4f0afb599d441ceeef
SHA512399d7fb9fb53d8c33ca3f132a00e28b7c2cfbbbca8802cf9f428a4f8d4e374e2fd3e55949139ec07eae88b4aaf2ce1f124c9f26157c5649e8692afeb410c42a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61accec0a194f3e68c93afa6b4ba7a9
SHA15af044093e5ac86511954c0f58373751d7949588
SHA25688b1b187ec7c8c738cb6dadda314c0de09eabeac749b770915e8c525be4c9db8
SHA5129be8297aec547586b62029c6fac7c6f43bc92c190a8350428197090754c53ac3ed121d0d90eeebc654bb1e050bf1d5e06f5a09aff48ac690f5fa9c5cca45284f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954e29443fb66bcce95c2710c103b47e
SHA195b7eea4715191eaef29bb9b7f2a072426a78616
SHA2565aaf097336335c3df79705b3239bac2806ba2805f01aa0abe697b889d6cde9ef
SHA512b007d2e82b56a2638073d3ba77558596029c6c9aa28d54e13676a09a6ce07b2373a968e0f9ed9eee49bcae8c12a3bde91747968cf97dd9ca5f61d315819b8c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c34aa8067f4515eefc23b60df23f605
SHA12b485201be3f42e03a5aea20f5f4015ab5d87c84
SHA256d774089cc43550ecd6184c12a1eb969b09eb3e3357c812795815484e2da548f0
SHA512af19de3c8bb8f3593db63acde16d4cc061dc19133fead3d4640692b0fe7374e00779635c7a81bcf79e26ad82090de27b9cba74daf6e1a6e2f6274ebc2979163a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e859c34b8b0befc6adacd856d7f511e
SHA193d3f2a71336217266a186c3a5cae8fa0acb786a
SHA2566746833f87419614a6cfb8d7703d73f76272fcebda8237c4af565d2a91cd11c4
SHA51230b9c90e1ddcac3cc3625e8daa5a32a186acce62d8646edc97985f7f2917ea045fc9e4ee6d6b60d0472d4f082a1babdad3a1e9f9f0e9d3373406185ba897d5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5ec1e3287b0920d5d0d942753f5bb9
SHA1d4b2fad21f14c31bc163b7e3c1ba340dfdfd7524
SHA256e57b478966fedc1204430f104c6f9286a6eb44f88ea9ba30806d33bae6021469
SHA51277f56a8acb99fb7f6860086cac987176a9a63d3735a2d6525641bfa5a5f96c99a3c3a0fc884125c951fafe0e0425de7828a9ee0654e0e5d7bec36bb0f13777c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cc238bb8737c2f7205dd85a8edf748
SHA15d5ad4fdc57304f3d38d95ec6bf521911c2e5910
SHA25670953b1c5df89a4003466c38b64fe6a6f1040249d26dbfdbdb1588e43cce0a65
SHA5125744792c6be08612d11cab3ffbb735f67b3c2d801873cc578a9790d7095fa7695670558485ea9c79a845df14b017454e7cf43360d32b37470eb8a7db58bb6980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c729372e46a274f430c81366f56ad0
SHA1f4618b692936618568c4ca3e1d6f1bc9942e6cf0
SHA2569a42924f0dc015761ce564011280a37d14e786b4d3299a304aacf9afe95ec87c
SHA512317f44434e7fc95c500eaa342da240faa454a30c98e7c23a83d053a75ac3d21547a460f4701a07f95a63e544299da850ef3da7a56734905c73313aeb4aa8c191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9036bd794e2a2c9e561c0a0c2a6bb1
SHA17a5ddbf8a4874e405ff7859c7422ad07d676133e
SHA25676c757b918aab1f4d0533c38d205e4d4c8d65c6e7ae9194968b29b07bb8f62c9
SHA512e48c722f9e4ca8ebefba725f42d45773a728ba0e784958115504fe2258b5513880e1e5c185cd65a07bc77d417353b3654e839846a231150f0f6a1854fda73fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c939bbc466112ea27376fcdafd5d2402
SHA1ad7db4ea90d32463ff4211eff0fe3c8339a2a0aa
SHA256f2feeffa0f70a118c47e5a18dbfc4fbac49a66fcda4e37cb6a9ee3003953ff1a
SHA512ce2834056c6b3dfd3731ce232fb01b13f595bf68ec1e3d0ec99a10010344b42f33e46d0949587d0b476e931d72a4f596a8ca962bdc4c2e119c8e33c4b6f2c7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55284d8eea93d7eabe88728b0940b4580
SHA116be1c1e51a4a7168a55be715fad0b8f26048d43
SHA25629195c8d62e90ef4fc77de8c058f597711755652fbf418c21a558922bfb404ca
SHA51270a5ff19d41202897d6fad0f8203c8719abb9421b7435834c9d8fae779ce2b2a7bf030abbf0505327a20c8367cf1023031c8a60d4a91d58b2eb0d2fec45ba06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0c6ed19166243e59a644cf101e2fa6
SHA10e8c19687b76f34b2eff29ff6b3a9eb0eeb06edc
SHA256917ace90c01dd110f6690700033be952a7a32191acdfe934b11c5f04040c58f2
SHA512718b7bdbbdbfd794cc5e5c7a2578438302ac2db6853305067f7b067886cceb05d35a1358a6010b1221489e220dfe52fb32504c39647bd6186235eed2b298b6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd8b15a00630af3f63d52b4c36aac08
SHA1582b1e3a0b90279f979995678b6798ec522a0206
SHA256b401384fb5909fb8a57e491e6de86fede7fe2c6b24cc4ad4bef2844d24bd658f
SHA512d98bb065fd1571e0edf47080c123ff13771a62f320a55c8109d98a34e108631653f8afa2ca43053bd257c6655908a121c70253d3ac9266d95f33abe191c5ab10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c99427ba20901199607317dde89da4
SHA17f34e664b54c067cf9cf2d8320bd1424be361dce
SHA256f84d5959a7cba904d8a16d7ebd48798bc6cf339a73c9d04ae3bc6d6931c3307c
SHA512ab4f0b5c3d89ca426acb5bf63361decfb24517d0d0a4e5dee5905bf7166bce14a041fa0c3726440084bf406cfd1d4e2c77db7994f36c44158b46e135a1c86757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca21945da88d4c98239b8e2ecb35557
SHA1aeda9a3a186feea0232949709c2258b2bd6c97e9
SHA256e72f29f7f23695d8e49291577edeb1caa7441136075754966d1a97ae7eb9a344
SHA51224bba926fc6f283a1d3d1bcaaedde52c73ddaa02af541ebe0c4d3a8e763dd4158ad7d64d77e49e2e4fc39e20f6f8ffc3a9d2dcff80e6198e87cb7340e6d6f752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae9fdfc6ec1175ec04c47a5df354bf5
SHA195dc49dd49c2fee628257ad4948d8432fcc14db2
SHA25685922223d9b6bbbc465368ceaab081218626e3248d1c55f1ca645371c13c3434
SHA512b71a424dd684ef807a5402d3e6e26ae10ceed2e9bb94b82651faa95bc5409ba4627990afe3053e897b2c4e7abfec2c6f0f2beef618f18878cd66ed79ed6d8d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a19a8fdfed4378fe0870f42f14ed1d
SHA1ca548fc25ce9e46e8267a369d25d81955ca92000
SHA256a9c2c5213ebdbff60f088b5001a989439e1992f485d766fddab6deaf0d854479
SHA512cb5f1a949663056a7d340c2d2d722a7a82b7f3832a2fbb7c8be7c537949c5f1684afb030114e7bac485a7c6d83eeb3cb3127b89becb6bc5916abdad2e041b1ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b