Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
f6e8c0ecd86a78d31c1da67ffb994754_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6e8c0ecd86a78d31c1da67ffb994754_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6e8c0ecd86a78d31c1da67ffb994754_JaffaCakes118.html
-
Size
53KB
-
MD5
f6e8c0ecd86a78d31c1da67ffb994754
-
SHA1
f6e5aaecf4446bbc0b3f288442f1ac8dff934a17
-
SHA256
1e02dc861b9f2f44d4682f9a878a12562e01dccabb73ff714e07f0942f901055
-
SHA512
e3e85e7ddd7c0e17eb5f047a676a18b28f97c6a12afff0dee04d444e5faca739fb1f969092fcc293f88fe51dca89eca4e77eedf689d3df85a00c8cf0bb2672ca
-
SSDEEP
1536:CkgUiIakTqGivi+PyUIrunlYw63Nj+q5VyvR0w2AzTICbbkoN/t9M/dNwIUTDmD6:CkgUiIakTqGivi+PyUIrunlYw63Nj+qC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433462241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A69A7831-7B86-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c29e7c930fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000032960f7df110328032b069cec1d1f9820d54fa97962985625b3db1f2419d101d000000000e8000000002000020000000f40ed0d2fa0aa4003886b36d87e295dfda0214623ab9c28f89b5210d5a315bcb20000000d74d8a6d1d310ce9a6642e2392a08b731df317d4a4d304803385d4d058d7db07400000004d65da01bf30f7a472b1165c6d94dee1fe20c3fadff6781540641a1c6699a522489065d4de9f7624644b74440fac3a4d272609b7a7fb1dae7f61c1ef03186f77 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000a018958e8e059b0686ad709c260dce30f3fec94637e976272641da2b2eda8f7000000000e800000000200002000000060a8d8112cd8fe58f37d98ed74f940557f8ed726c1e5a786000307b6d9f6689590000000df7557225492e8c54bc7c43172f0673cd74663f5000af831279d6ac160fa7d159d45059a8ea0d76af0136bf008cee8db11011cee0164769779fe8c6963b86c1e46e903fe6210fa5b8df735ff5563b47e6dab26d1f90081e672cf9129f54d7534fdc04f82915e676190f3138c2f9145afe46fd64422ea51e6daf088aff9f0a59070abfe5361a48b16e0584c88211408c940000000edab52304282b2845b18a87196bd542a0ec2dc47ab95baae62bdeed438feaf7031bbd8c2045a045675a07feb482980a1799bd78cc4fc0a0209b3905214d07da9 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2700 3020 iexplore.exe 30 PID 3020 wrote to memory of 2700 3020 iexplore.exe 30 PID 3020 wrote to memory of 2700 3020 iexplore.exe 30 PID 3020 wrote to memory of 2700 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6e8c0ecd86a78d31c1da67ffb994754_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0a79843db26d83cdf41045a8c88b91
SHA1cb3201c60b9dd214428b5dcca4b3005272de6e2f
SHA25650fd81045a011ccff1ccc981032b8fd4c2d2dadbe163ca1368762baf6809ba4b
SHA512e41cb8f4eadacaaa3b525ac9d31a5d0e80e30e534e326eb0f9565baaf3b3d0aa1080857135ae9f8927b00526a7f8dc2cfc1515fe28a559292e912c2de6044599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515909b8f6cdf39f1af3289e555edc9c6
SHA1971403db043df4853fee75eab1247b8ea943074c
SHA25632512414e7203cd4849a8cef4b0e93d2fead957d143c7e594b5d994555d96ccf
SHA512007868b77f0855c966a499bada8d75c2d17e15d9e8e9e8f5517c92e0d0309e6f6e1ff59637c979fee8eced9c739edd415ca535a8051b38cc756f4b7c1df603c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ed9ef88ce031dfa707caba674a6180
SHA19af3b8ebb15132d6061adc3a1248def2a151217d
SHA2567ea0bce10eef4cb9589188dba8e1720ad0feb50756c7b31a3b43546db04d847c
SHA512e6184a12c28cd950ea1f6018337fffaab0e790ca62ddc2a25138ec39d0c60381af0344231d3be1a28e76e505f0859d4d95771d6ce6a58c1bd5e0abc640f6d10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228bbc3a02d69e62e037ad0197200789
SHA19878d96fac70908b030014476bbebd58826dacec
SHA256395dd08d851c73c23b638fb6282f15c5417ea6dfaba57911c155de6e486687f7
SHA51221ca0950f3b1cb074ce7a9d8e424db9036aff69562733c5c75e1a2b3c3d072cab260bb4ba366532b9e62f0c00375adff6327f52d9514277dc21c00fc2240e5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592986478fdf7b5ac0740dff27b5ebf46
SHA159b8bd406ffd7d8ab00371c8784483f5fe1cfcb3
SHA256c1ffc185dafa6509a87203ab05039fbedcf6fba34f2d373b9f2bc5bbbc3845f9
SHA5123ab4bfd72d5400a745ea048b180c25ea911bca50e71993d368f73d32692aa8531130f10508bd2ba3d850d4515d7b37035840b5458bdc5e3b69ea94cea6c3b200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f14167b0412aeb107424f455f09d2d8
SHA1b78d8f1cde585b09b7d2ece9303e4ccfbebb271b
SHA256018ae12eab8e2e6c5d6289eb78cab29db43e9f0d8634df47d45fc7f19e4d55ab
SHA512490a3bc0f1319b2e9df981636d42c99504c938f0e508eef0964bf5d88ecebe53f2ba9a8d1b57308ea109499f84a901fddff74fa886111b5abab203c2f1098d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2fe55de6352481e0f856882ac04e4e4
SHA1a0307c59c89a8ca28cd8d6d02906861a21a6ae29
SHA256450bc4fb30be533f9a3f6197cd951ef1ad3c20f251da4af48fe34f6b10442fff
SHA5125a781984438d52b05b8ef685b23477263cb6afb14396677ccd5c0b12e3d53862522c3d62eeed963eb3591e51a5ea5032e35190972c085d8f8f85307b264c303e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ceb92c94a32858cc62e2716b167359
SHA149f478d803d7763837f0417506dd31395e978fe7
SHA2562e2b496a2cf97e0ff0fb24a95474a7780114931c2b19d61c2715e52ad294873f
SHA512064ef1ed7bc8305ff8c5ad71248312dac611a3639d726055b9b5e7a828d6f518df890744c3e26434218c0e26526fdda3f9abedce09f0853187855427a096c659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c9e3252d25d5425016205b8cf02170
SHA11af6a14497595c53d67669a9a772c6bc810ad233
SHA256193f333811ee821eafbf85f41029fd625923aa137bb181676ff91f23a5e416bf
SHA51281b1f015b317e51ec3e86f7797c1dff8770ece3625a14169dd6dca70822c0118cf40b68ac0b985fbe673ede42c77dba44265cbd4c18651155a20e2b5ca3ad690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7866f567264d55646e0c7bba611b6d6
SHA19d6a57aa639f5e13a2f63230e1ad8be20c08fe0b
SHA256ba24f5521bf29fb2ff322c564fd5503cefc3a93c23e99cbfeb5745c3dd051779
SHA512db4d2a4bd52183f8efa44fd4a1be0c73529c1930fd31eff64013fd7a56bf7f077589396a1cc620f580a5eb775f906f5ffd9720f20162c7281936dff3247eabdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0dc346f3598085eb9a7df2482497d43
SHA14951f9f6e4f990a5dc51f24a92e05753c28aafda
SHA25659c586371faabf1c173e6d65c5d9933e8a4fd0ae6bbece2736f378fbfe8cb212
SHA512c4ec445cafe4eeff5a8f1c015d8fdd804480d8e703a0af5cddcf5dbf7c1de7cdddf5cdd39341d01622b0ec96ef8a412efa7f5e8e0a747ec49c2308d58085508d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798ff538057c58385c305135a558b4b1
SHA108adb9f0516efc97bd6ec375266912650a627892
SHA2563bbb70048b147448e1463a332613b14041e9486ee771227b7b3ce38f418fc1f2
SHA512d37424fe9ddaa67aaa095531fc81109c70e4bf817dc37e89d99eabf827cfb8cb5c0bf32836d4bc36f987a1611e09e3e1c6494824dc0039c2f954b999e0185d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaffdd1b7b038c0b13ab5a88ea424985
SHA1b51b9488e0ecb5ef3c07c0460ca57fc09d5377da
SHA2560b88ccb734961b5d48c2c136c13a517eb56bc346a7b0eead887f3392c70e4367
SHA5126faba87bf7b2591c404e4de31e09c96dcdcf9b2e20bdd62ebc55d6abb9d452bb6cc9a34cddfe8f44bae4c21bcb1be0edfb0f972bd242c88742520a2b86873fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732cc74680e6176ebf7d2d3da7c61cc6
SHA1540d2c8a9d0bb0946827132a79208e3cd1d4d611
SHA256254f046355d873384db67a1c1fb7800f32281e81686c4a5c316b189978e26213
SHA512103559e062975484540c92c695befd6d1aff7ce34583da3cd4a66e157fc3c6d1fe87ff81a0834b3f8059a8e38f395320282aab0cfae82f83e08152c86d8bd2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59266843b2a99df9355183196cc663b9d
SHA1d717ad749c2460ad1341d803ce3497224e6c2baa
SHA256d3b2fdb3e68505b7f27bfaf934adb88ec6eb374ecf1ce8e69e45443a5c118cae
SHA51282c4d07c17306791b82be1d6b29230d378e5ccfc48f604ea2729a508161f251c7ba0157fe57c861fd12e93cac09e6627553c5c53d273190ef7bacf010bbcc044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27b98e1dcff97d31545ee645a717309
SHA12b9a14fa69a7d3948edc35ef5b4fc1a0a785497f
SHA256789b8e9fe21475d9f51c43615a86e13a9643842720f3916f55e1c2f7b61b78be
SHA512cf05ca7955cf6cdba12376bde33805e547a040dfc9b927e31f6fe4fa73df00cd87a4901a29b7f06c223d5b4fd260d0075ee4e860b4544736132cac4157b2b2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc09ce86e71c487f90d11dcd5730f41
SHA11f06a1da6d78ac08c3ad27deda43950861fd35bf
SHA25697ec964a088b82275770b05c2ac4bdc52de468ba979d90d5352b8f90dd77c5c6
SHA512d3f956785c7fe687e202c75df163686ba37e92265c9551235eff8bc9ed249d6d85f906d5bddb25a13d3c56d711d034dc2cae14ac4c8e00e9e26a537764c38012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5a6790c8af364eafe935d606e9a603
SHA18c508b257ccd89ca16c51a9709d443bc88422740
SHA25647517511f305e888fbd3fa8b12524abfba3eb813e02f66a4ccbda155a629ae8b
SHA512b0a86eddace86e6eb2951651a074c7a0d98680e66921d7c89cfe243e3907bf8c9ac717bacc3d515b7371dbff467bf176009459544b15c90b91255ae833355c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838ee4a027ec501fc19875fe9e929caa
SHA1fccdd6993412ed884d8d0457b392e7aa0c73f8a3
SHA2563194fb3e44830e81191d28a0d825488a299d8c107501cbd550480a205ee4f429
SHA512ceb8b2b1519efc56e154d9a4fc3bd58839f6070c6798a9a33cf6d2ac61085b6210e69f222f23dfecdd7dbec0dccd00e136a94df566db381d7b655f9dd77df90c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\solved[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b