Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
f5392b2b93f8fd2f2642e67a25484d38_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5392b2b93f8fd2f2642e67a25484d38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5392b2b93f8fd2f2642e67a25484d38_JaffaCakes118.html
-
Size
47KB
-
MD5
f5392b2b93f8fd2f2642e67a25484d38
-
SHA1
8ef0432bd062002efa3e56b6a0af1d61504c8089
-
SHA256
ddac8d0f46fad6a488212d20622f7648332728297c9a0fab7883e0c658427791
-
SHA512
17f29dc434c2c17a940afebe51dab80f4463b5cdd2161985b272da753d8f05472e4a3e29128ac3d01b1d5c507c726c90bfa061d8afe3ed85bbe6df693048daa5
-
SSDEEP
768:Lyavg9bp2YuL1tPk7RsHB7p1nvzWlVxCjW2hfvCWNM2zy5:LyavkbpsZk7RsHDhmCVpCWNM2O5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000082149a8f191d514a4366a48d9d7f045474f22efa41c4faf6c5c696992407ffcc000000000e80000000020000200000001c34b10191a4cf2c63bc0b22652c7b40c26533bd221864e221ade9d6ff6d89de20000000f2dd9a4047cd37fdca160f907a3551e536292f6324d7a13e07e79ff5358af6b740000000781f1bce0d5075cd7fcc69f04ed0211ce6e7995f11ce438725c6bdd7b90eeb70bdbec7e6773f2c9a8fb78acc3099ea1249f9cbc6bbe3c43e38a3d13e5ad9a102 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2031ad69060fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94BEDB21-7AF9-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c28cabf6be438c6dc32f091fb99a48b84426097a0a5cf082d1013ed309b3b5d8000000000e8000000002000020000000ff28969f497d76e2b81061db628b0df909b763c749ff22265bbd1b4673728d4a9000000006a1028ce8d30be36557128b051fb9885cdd3f2ad1816af3c4d1023673488fd66f87f8ccb3a844127f9fba86c215b023170a83ce41d03b3239b9f8f94484c097d0a0b46edb898c7e0655c2f8f58b20f202b2f286ec46c8f8b9b0dc90cbb0228ca140d8dd2eced299860df19a2736e5ad932b382808a6d7c229c3f590dee560e8e85e02c4cb4b0f77112b27b6b6a8e51240000000f559777d45b8c2eddb6cdfb08c4278e8f44b5b18c2f0f9e09e84d18410a12f551d6fef8921c9d78f3c022eac1f80bd87aa0a64e7a427f91d31039904aa09d1ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433401651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5392b2b93f8fd2f2642e67a25484d38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eaff78af25c5c98656cb690628d6ad8
SHA133f37c2dd5c4af4e89392d4cc0503339fe9745a6
SHA256c808c5560e661f6849493e4e4cc20491c6ddeee576ecd5ddc218969da9464f64
SHA512527be7da605158cc004ad37bd0a4c366da7ca56805b48957084a063f6fd54554396774dbbb53a58069ea28ba3955fcd9aa2d7ebfb7f1cf14055f7fb949e5c20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54632b2d6e72303f0e56b5d9bf8b2db2d
SHA1f9508ece889d848606da81763c7f202d53adb1ab
SHA256a6f66e2ccd192578054b85f27e33196eca0753681202b43a2b6fd4ce6e244dc4
SHA51246c768938c94a133a8275d250095317c7c0889133f61481153eddc27a40600dbe46264e4678d4314a8030fcb7e59ca06d54d00ee63ae340677e77988f1302641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe6dc9e4faf5e7e144d47cd3dc17415
SHA185f657b0d5785428b8c377791239c19d897b9ff1
SHA256e578edcd8cdec8f80b1b94afdb8a527cc7b2c25b5bc2752114217bd345e10e98
SHA512b8070cf5931410ecb5d9fcbaf966f8409fa50d2c06320d64d614f196bec87e3150a1b3b3930a3fbd3e99dad5346122640563b6c1d54fe925540f989dc9cc39a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c0ff208b26c74a6a19f272a38a1b0c
SHA1628a009d44202a8e38d123ccd10724eec466b2ee
SHA256da055ea5bd4764163e842a53ce6a0905dc88f016660bfeace5f0dd4d53bc8841
SHA5120bdd934b630d6dd165625d86100aa51da7cc6ace0a5610a744bcb1975f53937cfcd6513d60ebf0364ac13562bf68ba4f96a2c3d1e3817a15d0e7567fea72f5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00375de42f801d4f6f5f06839077c4f
SHA1d101a00fd8a7af9146fc56bbe89bf9da41d6a0bf
SHA25660729155d30533e291ef8d096496ad45b539f07e8919ee99de663787350b3c90
SHA5124d7fbc5d8d1838bd981e858447d60e2be35440db002ce28c345677a7bc49373d9ab918d7718915e6c8f51991fe60538954e6ef2876cfa2da3a615a3534c3bd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c797147fabed2671c23116cbb46b02
SHA1563fddba0f865e0f8538c1d2ef993d6c68b02ab8
SHA256423f6c2ad03eeb209df2b11e2ca82d164272c121f76fa1061fae3384e00c330c
SHA51288105ee8f186d06ddaf78949854aa3a913cd5faf9a87dfa6715a75892daa4e1e0cc4ea2510cc7f6dde477cd928a8584b06ca1ea3e958800059e556a2f375438a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2e2dd0577715ff0e235ff5db01afdc
SHA15debac4e24dbc31756588ed60bc46ecd7a9019f5
SHA256c0d3fdc77db6e3990d5fb5fb3a1d7d6e268d00fe2b9cbca28354e18644854a9d
SHA512837781589cbce0664d58be3e0fe3df40b9cf247ee6a62f3d6c1ccda26f35cf441a329422a11ba5f74b81365be0843833cbecdbf08d5fdd325f75616ca89a44b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591998e0cbe5fe6e2c852ba8f261c6877
SHA16394532e60998a29576d9a16b00177efcf610d1a
SHA2565db88612852e1755d9128614fc86829ab3e3f232e79d88afe18680da38e8411a
SHA512512117070d7c99fea76da587b4a14ba9e44e75929229996063154cffeec294234573b4e3802ee6973e452d92b8f54f1f1459be7600dfe571769fc79e0b9d44ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647a31a0a652e8382ea3b64b66f16852
SHA10a713513d1b6026f6833256b068d2d27b61edbeb
SHA2569470ddee7b272f182c4b64b63ee4f25ef5e4662e20fb198b9f6c074d3703a6dc
SHA512689781d1754658673599ec8ed1819159758cc8b617c26e985db2e4a1fc4f2a49b3da85da7d2cce20fdea795b47aa7e95eacfb887de3995a3a885b5fa3c16ff83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53736d5d92ecc52a89e70e464b9abe7be
SHA1817edd996461eec187a374dfc584f86fa576a4a9
SHA256517078c62ae651aa7b4ffdab32835dff687c963a6084d0227c7ef001a00ae5d1
SHA512fc37c0654a4ce52c2ad29e28cf6bae4e7d48d214412b43e8af60aec1a37920b12cce179422c40922e3bb9bccc3b39f71419d1c05dda081f968d6f22991ab8d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c561f61a012b590ae0797189596cc8d2
SHA102c996bebff2ac565f4c04a2eb40a59df9da859e
SHA256d74024705d6a7214eb0357f5dde49ee528d1c1e0eaa1d6da3a6338d23bb4c26b
SHA512fd18775e29b76a6b99a30c9f28f9f106870727aa7b7139bb5da899e75951249c2a1e6933007ef888eab2d0e9bcd61ce0bc5332d87b25d68d061b2915b4783d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c594972d06c628d0f6f0fdda3a7c4748
SHA1b681fc95b341f9a67d03be126c8862332df05814
SHA25658cb9fb935495b53d30248908285b8c5d651c3a6ad6635061cd94dbad54e057b
SHA5122004b9331b02aad760be96921ee4dd0ed963de138f1ceaf55fa90d94d55b1add54cbaab209deb1189f8b4256df2d822d38aef4d284c2089411bded699aa7645f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52321436e4faf17d43a5683aaba63b6a1
SHA19874bf23549efd40dc73bef1fb72fb1b3799f409
SHA256841e0c5fea3316a0ec51bef29c4e32889abac0ed6b8906f2e6ac5792c879c44f
SHA512041cbe1376341a5a754e678e2c6f4048202ed45cd5ab18511a38da98100c09d9af1195e66ec7a19916df734981d897f56dbd6aee795c06138b647094fdd723f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801fd2fdb36dc98e92c9c0f0749fcf04
SHA161fde08bd1b822f7e5ba8d634b3c9b6fdbe2587f
SHA256155522396042843bedd40c22d283b9f2c9eaef0e0727b4c5b5e8b54fe3c71f64
SHA5122b0f8097791fb36c2e9200ad10e9d58068889879aeeaa2dd67dcf0d6cb7a08f7e600faf107539a6ab892fcc5f2155ac5a16780727e873fa9555a73032a03f091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518217fdbb6a827e9b0b84be8e09e4542
SHA1444976c140e63c2a928d2a9f0aa7a7e8712a0136
SHA256e8dffb83eb53b7e55727ebb8c2e5ed0d61e89e7dfdde2e9a14362e60f2a3e546
SHA51246aff4bb0edc5ab8ed8304014b5c75b5e83425b92a801cf8ce073cb1d2280417f69c20c057002983782020b8b2a9b907f82f92ab00f06e675aae8ffef929ecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed278feb04ae82dec529d1132e846e4
SHA10ad31409aa15abf05a7711b5a12801e6166ee6b5
SHA256719131cbe91c4ee78ea28499416ce5893b0f303995449b34d2f77e9a105a34be
SHA512bcbfd74c3221ef7a96029dc60621502916290a9c7a8a59f2ec7070ebd93bf3409066e616def7bbccbc00024677f7ae2a3027bd9394ef446d183df36d9f2767a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa749938a3581f570b1e7c978fcb5e80
SHA1e2f38a3ed172f8bfbbf518e7aca35a0c5282cb3e
SHA256c28ef80447ec1484ba4fdabdd9308213e833116e7903a4a533b0c1fb1854c462
SHA512349e7dde1399dadd126b59a25797e6b5acb9a95338ecd9f7c869c16df0dd3d6e6ce0b81bfb120ff4e25d4199f6578036b5b15c7de9e7f3f2ffe3b9bb8681e958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5605dc71c54b9f9728da3aa1c29e85
SHA16d7d67f7ce1b01e40191a25d6eba7ab2bc7600f0
SHA256988fa5d5b16001b74710ad34f8f3b847784db143f818c2560ac97530cab1682d
SHA51281b28d2ce843e0d4c349182220646b6c76a341092500c57a0d0c26d93475c241e98968a7e6f88c92f700b3f263913984ed4520470ee9cbf3100aebaeef6b2c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50525d03b776abfa0a819a2aaf2c997e7
SHA1c9169bddfdd336573c959075676e80e0a8840188
SHA256710d8484c4b2b186b899591962aad43400ec0f322925aadda26113eb2f616a5a
SHA51295ced387598df570641833b1cc8c4a60ec8eb994e616265183314b44eff9ccc588034300d69b3003ae805ba01e894b4bb28c86ee44efa2f743d7640642a8ea66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467d69df5fe2214503236a13b7ab1648
SHA174b68a236f0e5d7976dfc44b65615ed1e9861207
SHA25689e530d9d7db184210788a524fe09b602c0f2a6a6ccac6a72b4532e6aafcc65c
SHA5125661a189d8a9b4feaecd072867bf361eb4b8f2d37c466c7f52c084933df72321e072160de3be3e60b4d367c358e2ce3d3c9ca421e8becaffa44baf4285166e7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b