Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
054f002019d7f979de66373afe329e90_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
054f002019d7f979de66373afe329e90_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
054f002019d7f979de66373afe329e90_JaffaCakes118.html
-
Size
13KB
-
MD5
054f002019d7f979de66373afe329e90
-
SHA1
83d79227eb7857fde9adc9e771503246ea483d55
-
SHA256
7881c620fdfede1d57b2c1f5a1f22f76080adad325058a3ca21dab6bb05569cd
-
SHA512
e3b022a5ac7be9d72bb04e30dc2be33e6c9535327462b87d7267d220b3e91745847d9bb166d6abbb856e2cc3c9ffa7771719387fa0a883ffbd8d0bb48a54d826
-
SSDEEP
192:gO8xybPbZvsf7XsZpobyY0vn5f7NZYobyYkdcsMbub5jM30Izp6MNFrr1+GBQIkF:rPtv80vz4csMbub5jxm6sFrr1+yB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ad44a1e613db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005a4714b40a444ee47eb4f8ca4a0703027b5bf431d6416fb24d7b9cee88053635000000000e80000000020000200000009a9ace4b0c29c07500f8dc753d5c0803bc527cd21b20cec4180598e00eb611052000000091433efbcfca068f595c05809dff2cdaeff5295a5071fa9b85a8e83509b13f7640000000d9f4db31f04a983e0810119298246c305f1d1d0adadb50c8ee7f67f03db7fb6884410060149aefd6e4d201b62cb1fd6ed68c5f41610f18d551eb9012c1a6a115 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f9a314af5956c6a5dc8747552d624b241525c36e90f6e602c98052cc12efccc4000000000e80000000020000200000008f4b2654c918489766c0574af3afbab631f38e7a96f2b1982ad6fb794c5a836690000000baacecdffdc417eb9d3c49efc1c040e6f32c0c1cd717f1523137788cf09991a3e877da79a447f3905b805a92c54809509ce1c5319a22c39d5d91474196954e23771ce8e19650c11e6333e74454c8dea6f37f6d6d987638d62b02b5cd5a0d94c979d8895ddc928aa9da9c916d56fe49a3442e12a6ddd5e53f7a3751d7e497c3c14d5a6f66c930c227afa6266937fd74a24000000082f309491523de2e7964909be4130b8f3ff1dd8c6457dac03a9e0220554e6fcd56aa5359b9d3ea5113f66fcde7571d86e9da8c315bb631e12aae043f9d34436b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433937753" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9614A91-7FD9-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2824 2932 iexplore.exe 30 PID 2932 wrote to memory of 2824 2932 iexplore.exe 30 PID 2932 wrote to memory of 2824 2932 iexplore.exe 30 PID 2932 wrote to memory of 2824 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\054f002019d7f979de66373afe329e90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd239b88ee2c1ce90c29af0616a84fdd
SHA12831b56fa705e27aace0e607878829b842d153b2
SHA256673e5864fcb843e08c2349f3c63f8dfb7846326d321b6570dd992fb489715ae9
SHA512a4c8c06879f50ab64bd8c0f147fa9d6dfec8ca9cb4fa146137f1c43e4d070cff95f793966f2383579b5604d674476adf800b823a9ca8f2985f8999c00d2f8577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924088b557399d9f8e54011c004eef4e
SHA1b832e1535735750ffcffec0965fddda25084eb60
SHA2568042cb5ce8719ee94d5898f764efa1a275fe9c0d31c14e885c2c3c4080109ea3
SHA512178639396e053d0c9c5c339911381ba0e078a110fd5a401720249d43b36e6e4632abe0afb3f52ecbd202c9ffbe4307f1faea85867ef2bdeaa8064d2c656aa7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50524e92c75858b65d23f70c407669363
SHA1b856bd92c3429d40fd67ddc40b346a54fd57626a
SHA256fc78ccc1918cee60a4bf82bdf00d939df2bfc5bfb8de88daa0668315f4e6da68
SHA5120a995bd999f6e48df39e4be4650029af58965b030bb91cf659aba55a5fca6092352836245c255887c7124f31266df69b37afb064e941a04deb405d894b736195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd7bebbddc175933617a51a80b9c6d8
SHA1b9a8468e563f38575ae65fe00be0fa430f46e5e4
SHA256d86bd1da6472534a71587cc0d48c032185f695753e267af38737b490bec2b46a
SHA5125d2eb1e25d3d9d34d7fd238a85d25afb2deeb7064af27fd54237876218bf53e17945e22ec3fdfc2b43a165c2d914d0b53d6c941befd6b8e7ab243b06121b89d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab8ac2134a536f5e3a4a2be8a48aac8
SHA1488c60dff47f221ee8d4643c4fdae1cc92a3c9af
SHA256ca3e621096b9963745d7f4da72a220621e64c0f1e36b12d031b102dbf6fb1da0
SHA51213b89569e7e8d4e6a34f2b499752fa2e2fc9e98debc9422c7b721b4356a6f90a4908195df715af460f3600be3feb98e6a31e9c2d7296872410119a3f69fcd922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddf11e1a961581f544f1b7fa65942f9
SHA1a1814caca47b686f3506c79be04e504105b5981a
SHA256231593c873a87ab4dcd5b3484e811791e99be98d5ddd04b5496eb2dc77ff1d51
SHA512a8ac9181ec5f424715ef1d2a06a00709bc83d384ec473c3ad0f4654aae8e6fb0ee1ec38350502394a99caf8730a53df2f53b94c0cd00e27f1ff5f1344a6dbed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdecf75ddde69df61c61a40717ce6c1
SHA1943975478163b330b0873af5b3c1bbc6f9193046
SHA25694f9e7ba5779be44f0e1ee3bee943d4d9eac7c03d89a5dee346fce5474a81d2f
SHA512f89705da7b5add369deb6e39dcb2e15b8a2a6d209fb0abbad4180b11882c9cc393f0806aef79bf22e67f7b45e06bf4f8c32da952dfb9ea5eb3962be073d7e429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be45277e0dc52b8737352022dc4c2fb
SHA1b9ba8679d92fa8113b42e7af3905d07beabd5070
SHA256d9a14b587490e01ab657b66497b38d512d5e1be17a2b929a8171737c34656009
SHA512e39f2131fb492e93a81a2437bcc6f9cee2e3e24b30f473456ce37bdc1e8736545621b8d62d66d735f84ae78a7504a837bfa43fc8419bf22f335ba0a7f735521f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdced4d99d633785a31ba4fe1f43c095
SHA111b653e0218ed074b73263ab97a6fd7c1cf440bf
SHA25657be697c5632da71c33f46fd9ab1f1f30ae262d41de70c3ce0dcf9907cef12d7
SHA51231a114eff28f3973f94a6ea11eb7b3c742ffb9a9697401e896b513cb3b35f2dd882abc5abbb05c8d69998e51368a20fe93236426670201bef1d1e2b382176ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b84db3c290f4788104b0000beee155
SHA163879fc1eb21c619039372afe9e8241b2ca08362
SHA25680f903fc9287bbec5e4d30b3dfbaa7f257c4a32f270aaf56f81c063311735214
SHA51268342fa65d8a1e2c3f319fc17f685ce64d3c0bb7f2a4a20e2e6db6beb2f8434e8a977edeab4d11702df67e6821b42736f97aeffb4a510ab076ccbcaabbbde373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55689d058ed1723e4f06efd6372e01896
SHA186babaf57ecd53d28c68ab2f334b9e5819fe47c1
SHA25633efc9f755388b5a2f244b6f8a115881844e7db8577846e91f6dd9b72a8a45cc
SHA512c25a8965de80e937880bf65a895746578901b8ac390bc17ceecfce9341efaa6fbef1d443c3a73b25b4a71b99ef804a112826ba9d945f838a29b3d5efcda9463a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc65bbef7d466378b8feb3ce7590181f
SHA1901e6c9cab1c896e01f8ea54ff937c8c43abd6ae
SHA256f3439ed2437ea55145d3bc0fbccf63d67e42bcfc2321710ae257758c10029a28
SHA5129290be12ac1a2cb2b6bf89df330057586203d001e3159dc83044ea8f347a60ca29fc295253fa1010eede74d03cb02a8e8881762b83211b17e073346dda851c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010f4c9601262b4f2354b94cf0a5ee40
SHA19d647662bdd73a9cb80730d6ebbe5133506ec5aa
SHA2568425ee46940d7826a0ada10880e9fedfcf101b1e17497981501ceee9bfbc12c5
SHA5121ccb5b40d536d4186f63dadb34d35ba8c3494d1c3771568025f7cfd42cb0822c9ed23e930817337bc27f0091668cb235b4aad59b668c1edefce8c92da213afb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59041b5510600558aae06e0283883a6a4
SHA1b2db62da89b574915a23b24074e8301e8748b41f
SHA2565372ec01defe268fc05f975da1a37ad79d61efe1f12ffde82d57e596bdb869ad
SHA51239707e682889b11e36256f97a771b8cc3b5d91547a4d3b8bbf3b6a246504ba7e824d916604ed0eb74401a022daef2d637a3cd301336238db8ec5eaa13d48eea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb218bce5758e27e8e85af0265e369d6
SHA19e9d0031014e2df34404ccc4bd1215d1f8b8982e
SHA256584d0ae813fd48e2000e85681ecfd691f5ba91f9443dd8580da181a53f82e180
SHA5124bdcbcd90c6b099a513e9a192fb2d8ce56d8f7b4d0194cb9b1116415d0dbd2bfaa380712193a66e30f0ffde0ebc24108be8ec2d6279785ee2a1ab9fdf4a2121d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ed332829afa9d2ae06e4131b25d4f1
SHA18896e68f7f4623c1b4297fc4fc10cbcab02243f2
SHA256146bd850f5e5c196e37ffce7f008703eab4c34d5a981fd83893ca5b962c8300c
SHA5122bd58cc163c5b71f61c673e694360c4ca39d4d57fa28e21ed816aada2c7375e611195d2a6c0b50ac49361f69c08bd45e1d0e9a2fcf56dd0790cf1de7552a1419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a5fa745dbcf3283862c84428e93d22
SHA1562c8035fb0be79eb04dabf9d19e67ce09b5906e
SHA2567dbb249b1c9199bfe9b9491b94497c2bcb331e47291c19a30a31a3d86e5a0b2c
SHA512c8d9ac5c468dc6ed5ec44be377ea358e3f1908df56ff4aa6148841a9088aa0a6aeb926a9b46a63c92b6e2502f934cb8c5b68f731effbfe85c9236c95d77c363c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df728345572cd58f7aedfb4e2d8236cc
SHA1cc6b59c89f1b471fb42acda37a8ed15fb99f209f
SHA256dadbacf8c2b881a3c254bf92ea694fb5e0bf25edd081688524ef21e50af9656e
SHA5128e60ec95129938976dc79a4720bf78c910271c7e27eac84619ef4aecb3aedbf84f465ecf33680299a82240eba25bb9feae6dd2a29a0ace83aa6c438e1f73d590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634e50b83c0d1606af4b702e73ddcaf3
SHA1e187eebfe5f69c9e0915119c610acdc14c49811a
SHA256bc3699006dcb93858bbde636f9bfd12df1d94bdd262d825cf1a1f2029717ba5f
SHA512f98475c6c9bef590144236c7daab50bc0ea18b3fa5ec18ad5eb0c254fafe28abbfba16604ec32d028bbf65a4418931665fee1b28dec0a73fe261dcda6b654a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f320b446a7691f80996761bf93062bda
SHA118a190650bfa8ca72c52f42011d629bc80265392
SHA256c2a4ee6f04e0815326b1cb1f09e260f4fe1818b055841ac686d502777ec3d078
SHA51273048424c86f66d452dd3f1e66856e291b9cb0b60acd06a5e1892d92ea6907b7c0097c85fa50efe0570071225633cae0f25c23505c8d488e7dbb7b8de95652bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b