Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
43a2c202fd06eacbf30ac3de853be069_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43a2c202fd06eacbf30ac3de853be069_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43a2c202fd06eacbf30ac3de853be069_JaffaCakes118.html
-
Size
7KB
-
MD5
43a2c202fd06eacbf30ac3de853be069
-
SHA1
ce781570bd462d981f0d58caba03caedf7dc91c5
-
SHA256
68ca1076181dcd5439f2a70d8848e5956215ee365463c955ac2476068be063fa
-
SHA512
8294e9c45cdc9083696dd23e40dedeea97f54ca632345c8e6a536442429a4c459a2f54a8828ac90552f1096bb20c59939228bbd50af813971c7d3d7d6f1420d5
-
SSDEEP
192:uapuaVBRW7Fa6rVNvG6KpWs9lPv9NGTRm4j5Er:ZuaVBRW7FZ/vIWs9oRm4i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005c7691fc1f02a27b6bdcaf47151f892469a36393e344e764b4c6e20e7845ef35000000000e8000000002000020000000ead240dd17fc51c3ca25427ec4890f4d4ce56e9f05a81ff282030a0c122da70e90000000facd95e2c3782fb86cf4379a276c7f69cc0acbad9444e7c8e1c39356dce87684d3d75c244026d378003be80fa257e98855ae5cc72b2b43b42a7f0893453234806a50b14294d37b7d9f2c8241b0d32489184a08a50e411d43c6231a5858c6d15998fa1183a1bb2471986bc381ace6d6082d806255c0bcdbab97f1d3f782daf31c1cdb9bf3bc2e52d789f598af0ac125bc400000000cf90d206fa987e3e569693b810a715b82135931cd7f6a97ceaac7ab0d60dae210096b46fd3e05220c4271796e4406754aae3087e5afd62bf8de058f412ea172 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000dbb7f03b956548f685d7a799b967aa30cda43937232a853dae051d57b6b06084000000000e80000000020000200000003057d28f4826c4b6a80cbaa424f11fa440951f71d7ac72e79b4981c85c0842612000000007dc8ac3c27064d7959d20502c33aba4690ba2cad7cb2b14ae885bed7281659f40000000aebc3632cb37ed13b16934104ac61c8a4d6f487f137fea2dba5f354ec2567b3febe61bf3adce423e4ea92666c3075dea7b899ec1014d830bf5cdbfd9420ae100 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A09447C1-8A5B-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435093028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30acbc76681edb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2480 1708 iexplore.exe 30 PID 1708 wrote to memory of 2480 1708 iexplore.exe 30 PID 1708 wrote to memory of 2480 1708 iexplore.exe 30 PID 1708 wrote to memory of 2480 1708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43a2c202fd06eacbf30ac3de853be069_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b47fc5a2b063fac411ad3e7c2305ad
SHA1c5c05481e15ea8856f7118c44722ec79c39b0368
SHA256cd2154e1714f5e8e7690723f85324f6d216ba35b3a93474b388b787c7d68747f
SHA512058e4aadff15ffe6c0b047f650ad123942c35c3d6c9584e9978bbe36022fc8705ef4c163668b312184b22b40156e41e2475d21d886780e36e24e348b583fdf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b43f4b73ce0658ccd6058274981943
SHA1b0779d50c72aa76cbe2ef67da4e10d30a662db3b
SHA25683643e8b4766ef0b57ab6e75086b167855229997971b637c7e76ab17334b52a1
SHA51294165280bb98c46397500140b6a16522a9fdbef881327cacdc45edf89c7ab84e7590a68ea945b86ad0058e325cd0c0fa7382c2c639fa8b504f748b897f046054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb48b089e7c89b28f140e2f2686a5da3
SHA13db41525f24337ee3fadef16aaa63c8ae940b971
SHA2561e740ec4e2a468404e68336fbfcfc8e89c7fd66689ccefd81d1582dc8efcf067
SHA5123a1ac11c251e5a23d38b3006ef968128497f085af31a0a5506371dfc1c1d39a7f12093ea282e673ca6ac928c67431fc2a02a14b5a8a44e3d474989dfbe0207ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0966bf621eed75fa9e8abf31ec629c
SHA1c1d8329f8ad7800b4a280727323511c0474bbc26
SHA256a3ad22514f580e571aef43e6c8e20839f3a1263ffc907aad2f1be57c0f42586f
SHA5124788c81cc83f526e0a33e4800a6198e2de3fd923e1b051a383a31bea07451628950a433fa00abc7991170e1982b15c0aa5a24ddf4299a5d974221e1e708220d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261fc835d96043d3b7c411e92e1051b1
SHA1731ddf18f4d1b9249882914fa2c6a6b0c8c588bb
SHA2562365d8f2ad32c24d14712f1dad8d3c575b8195895384fe8cd6745a9fbd75f182
SHA512f2137d55ac0dc52efcbf48335ac365b936ce6482aa4d60045b7455ca4acc6cbb228b51a738e86a7a5e895086f0408d5d4cbc3a4426ef66c365cc1fbcc3586437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996645ee047be2700b5c8782b913090a
SHA1b0d227d336117712698a3f465a7d3c9c6ddcf2e9
SHA2567192e71a2765fcfd6e2f4ac75492efd9cfefb49b9814539fc17b3a2faafe61fc
SHA5121a2dc134b6ec5512bf277cb70f445d7e9e8ae0a39b7e95beb93ab463b4f3fbe0c5c007c4d6b4b1d056ee79ecd790ea3774c6399d7ba442421ec71e7c45f324b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26fe8aec9419e7ab0937a54246a9480
SHA17ad74ae91fd208c2b35cb1c45d7164f793e2a84b
SHA2569c54d7351da8ce070f8b2cb3958c1fa13ae2a32d1aacae7cae84c80288956416
SHA512a01fe45412e6a67a0eb06b98622970f708ddb662e9141eb1de0f36d8d43554fc53e2021703e5049309709b8ca061b2bd0a900610afaf03c044bf68fdc87e221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f072caacf18603ed54a41ee1e71182
SHA11a4284659c8d1db3bde7db2626628e632550b6eb
SHA25684228c12a58819dd69829c7573e2a92202ea47f71c94a04a73cab1d585ebd2f6
SHA51279d173fe5f579da5751b71fb3f8a861c2979cef65e51048cba9d9af127ce565823568d61bdf4611555b607ffc50d32a940210836dd402a4c31cb52f37aeb02cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba8d905d521d49d314d196667bc0c80
SHA1fa3eef5a817d2145a37477d915d87c4dde209a5c
SHA256fa0e77d1bfc01b44a316e36c5ef7ba45fdca005a9d858ee27d7d5b16a3298f02
SHA512bae26439b94a4b86ba78b651af93c5d5b1ca2acf5e505147aa033b94ea505395a4afe05eed9ee4ce2a92033ecfaa2483ab30ac2bfbd63182a3727c3633cba02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc168e9889e5908d29d64f360dd741e
SHA13c6bb7a2502147408aff59b97dc10fc24638c7c2
SHA256cfe04db0b709628ea75c7b7e831b9ff617445819a4cc1ec693419451df082fd7
SHA5123d86bb1de5f8cb1bb62b19c4375ded80c05f473ccc70514d5ab6641ddb3ce7a189289b67141c0fe261505c7f40e6f137a7f26fa6a43c6113f84b5716bf4647e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57784541ebc2ddf4b588ad5d910463da9
SHA127d8eff817e826a40c4d09dbef5292a18597fafb
SHA2560c54ae336425ae5e601336c0995b9b28d6bb7b83216f3834bdfc653790d6a025
SHA5122946b6cf2e7bc9b0bb5bcb8d8116ace8507308fea98ecbe45c9b23d986ff00daef27b7d93673b968a1c3a24c5f9521f7f3ee50eefda9f7b7e40dd1860c7b5c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8049ed3ed4028031ca414a02476530
SHA1d3c518a084877c998c02416c2ab1bcea7668f317
SHA25632fa52eb130b93831c77e1170f7816871ba4ba9e009deaeb353e2ed90d07ed30
SHA5127d0a223b47527d94725265fc0b16dc2c79d06ced371a4d36ae642cd5a22b9449e9dd6fa110ea026fddbc2d21fd90bb5c238b48934fe9fad5005ce754f2f34800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4f6ad91bf98ed7bd1c5160c18f7e80
SHA1e80793c01fc48f8ca82b5626f6af580eccac6def
SHA25627a0fdeda34c7acac12919202ae2e67ab75cc67dc483927df27147cc2c37345c
SHA512519e3aa9374275c6e8d46e922394eb3a6b0a0fb77caf254e712ff315cb05ff59a869e70b07c968f781500b4fc0d13cc2f71c158c12934a93b48f108399ef38fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebc8d87ff65c2ec5d17cab01f20453d
SHA16d7c1ea941aa25dcffb8f41a535bbb9c34cd5440
SHA2569d6843eb8d741a33924e556bba4862ed61f569a3d2d5b20d99e548a8897fbb18
SHA51214aa7891f85e2c58f0a2eb85c720504199d2f08fcb5c78b267df7a0d5c353d06593155a9306c31f9a8003d364adf940dd7c197ef1b63e587086a59ba77de98ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda53f1f601b06c77a95172c3f286371
SHA1958eedae429376b797ab1661c04fb69f21ccfdb2
SHA256f5d827fce692329e3644496f2bf0a793af3aabedce6305a23637955f512eb466
SHA5127dab5f5918a6d3bee0702d752b360d3f67482edfdaec5c0d7231eb231807b49edb746696e8a93b27e57118b2c4a4a3939bf148b188b4edf3f182b3829cdd63d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a53fe19fcbe6c32591f9f958fbf526b
SHA1238abc5cff155a06bbb77afae7ec648b0de2e34e
SHA256c80cea11972394106616d967124e7db9d0b0b647846077b5bae28993bcae0e22
SHA512387f4eac9c8f290b164d07c8457c650618f35d3993fa56a6e3059f65fe17e758609668f6872a59c19c80fd12845b0105edd3e9300212bdfdd286aef39f31a21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a30b5a9f22e530f4ed2e9239ec4eec
SHA160415fbd9504ddb1665bc5457dc37af7323072c5
SHA25615db50efd9bc236989cc63ac5cb3497177ead2dcd2c91e8980a9016618a92115
SHA5124365cc0030636becd89f940fb850b8250a1fd0aaa60115f99f6e49923ce58a58fe35486c8ef3db70010d4ff1c69820cfa06133ac5c4612a69d4872f3cb373c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6cb9ebe0d82c5e9e63baaf5eca20b7e
SHA151debae89071a0a80525e57d5fa80419e9c6be21
SHA2561f4c96fdc6d15120aa02c9a3210510eb9aa8aadc96e171f86a1308e613cc6bba
SHA512ac4c08901dbd2859f9eb23217db1937910e0be3a8a081bf4a513f10a5c3f8234052c1eeec64b2151224e5889152968b430c1fe62d4f632d82f102861238136e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976f2e5316e94691b757b3ceeb5ded31
SHA103bbc9003d4374d8ad09695173e76880957f0fa3
SHA256e6d3812f3e16002c264d9b13202a98af9297d34671114f6fa552e544ab0aac36
SHA512923df7e3df44b4677c50bc74c0a4a892b477d0de98e565d29890e3a072acd5b40b498281e44291720c4ca059855889859cf2b95a80252736eb45d01780ed6aad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b