Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
b2246aaa84b9e6f39fcf9311a20b9336_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2246aaa84b9e6f39fcf9311a20b9336_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b2246aaa84b9e6f39fcf9311a20b9336_JaffaCakes118.html
-
Size
93B
-
MD5
b2246aaa84b9e6f39fcf9311a20b9336
-
SHA1
4ca6429499256373850ff935ec5df1bec6c0de55
-
SHA256
29a18bdd487b078c290a8d74b199daa0b64ba82f226fe7afe416edc6646bcd1f
-
SHA512
615366d570d416a009e6c9a3863cf01d0aec71ed2f6ffe0f3774bb09bb85f59b955ff88ed564f24427f8cdaa6904edfdac030a19d95150e420b8e756df6c1dc1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C92CFB51-5F77-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d7929d84f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000082ff977abcb6bff09050606f9183028b49adadf40ecc1521b568edb2d7ebdcc5000000000e8000000002000020000000519911939c47bd6129ae7bad6af0eb4b9b82297ea3f2c012b6685f486070ddb120000000895086953dfe1df4a7855fbfce6b967a3cf512cb7c82920649489049e0b8ca2240000000b79c207da478cc39ed04c3ac8e7333c9a71e2ff8a29cd947523d9b5935a8236b967fc089bb27512e967709a88e3950241cfbf3f46e68f174ded3dd69268d18c9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000096a033795d56249d5fb53918e9fbe1d3444884d15ab324fbab54e6118886977e000000000e80000000020000200000008642024b60b3c541e416149153c3fd93cb8d48628cb209c92d56e7213d04da6490000000f90ef716ccb335d59069eeaaa7bffca806a6f2c843f0715b88ea01edcc389761d4f87241473e3ab6ff766f283a32d7c700234b76069c21d65944f86e8615810d2ac1e42de9611decd49ac2e314f3eb7c88b929c10e43a55c98c4db730f6f3fa427c90e47638fea75456bf63b0df9207fd38876fb1e8b12e19b34814e717f5a06d190ed1043c6ca1ff4e45c3c3c99778940000000d24903e7a74b69be26df8f8dc941d4f8c16ddbeaf523386358c7debaa15a0159bf362817ed66a4fa8c161c5ca14d0a5a161e5e7d4e51db6ac24b0f1f319e66b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430377223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2104 1924 iexplore.exe 28 PID 1924 wrote to memory of 2104 1924 iexplore.exe 28 PID 1924 wrote to memory of 2104 1924 iexplore.exe 28 PID 1924 wrote to memory of 2104 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2246aaa84b9e6f39fcf9311a20b9336_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5189a6130e1a94c674ee28178d4186f88
SHA1514679e1bc9df81f5ae79ca043b9355269221f0f
SHA256c795047b8111766e6a865aeebafd5162c6a50877a38ca5c8bb416771958976d0
SHA512d7f8a8b760a0d81d072a9261fd262e93d0da5645efd1b320ada15cbc3577631f3c6b5ae34d04070ca03771fc5dc464f70d18f9a2f586d3292e9e46f76fb07bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c72791870eb329863e48afb5e549f14
SHA1a014d8a20fd839b9504117687df77679d67657c0
SHA2561eef2ff0fb12626fb2a63c69ff30f1f93355fd92fcccd96d21c925913a971c4b
SHA512aa3219e087baac0e06e9e51b471bf1d470df79471fcda48f700ad568e935c9aad46d5dc1ac1717f010910715c0ee32144107b0e238929c2539133ad25fe196fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565fa87360f0ba2a70b34cdd9472d0a5a
SHA16f89cf2b40ca45765a289aff0a46bf967ab60f59
SHA2567e3119f2c23f7beedf95709d7f8925771dfceff9a2df0c4d1ddcb62a19f56142
SHA51219ecdb29102743200cad435b3ceb747d0281bcf4da07b30de449d3fd735763446b8eea6e865db5523c5e45ef32ac687d44b1f2c8faff78fb31fc5cebad21896d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2ff0ce8981c4ab643f9424e39f9b57d
SHA1e064ae3569845d4b91971cd2d6fe06c76256344c
SHA256d4c069407bbedb3f5ab83c5789ec5afc93c2f25ffb92ea2dd7a310de3729dc6a
SHA512e7aa1ac91b51bfaca4a46a70d04e451e053f5e6566a95fb6bfd50a66888d21321782e3064f2cb9e57dac19da7cd9e296d054d1723717303625affe0b0fef77e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52912c40201acd5dea738b38bf99c1f7a
SHA18571e5d8063e124403239c8815441d045e54e56e
SHA256b19c177b284623314e8a1b35520b098f6e3c7dfa2c9fbea0d56929b58c99a9c5
SHA5129b0d4d4f62ed405155f23206362374e25f87864dfffc6c9b2a4dfec8e68f46545acbc696b7d56d6b73fc5facc1d99de19f2a810fd4f8d7776767eb2165f71dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb7c01b368d4e40fdefa086e6ebe240b
SHA17b92fb6d793024166a85a66d8567727c7130c0f3
SHA256c9309ab242ff39c7a46bd9028abcf0f1c41d171372a57cbe340c999cc7fcf7a7
SHA512f4c10cf0c2caca544114e8be46f279c3e1af0fe5690ea29993ee73b1fb3d789c6002157af9aa07f37540401a66f6468f8046d7346257ddcc28acd9dfa1c37d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f4948208b18bfca8776f8105c5aa262e
SHA157c02f89a20041942224e59bfdaca44e2124d162
SHA2562c630cbeebf24b25f505b09c5381f954614cc9aa271a2b44fcba3ad446dedd91
SHA512d56bfccc04153e158834c511d99a1a7d035bbe6f4dd480c9a0ffdb2a7325ba56583e644fc0bb5886c292eea1fb6281339766ad478282a0b2617f439f370afb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589a07364962905c43a652b84fea64b80
SHA11222a218c07f13a3ac6c1cd8a8d2a79f5b26f0bd
SHA256bf534191fef34bc4c54407dfa6ab0115ed4b039cf0d2faf7658751f187ba5e4a
SHA5125859e8604fb4527aaa1221825fac57dd425eb45fd21e371fbf110c99ab319e18f9a36decc258cd4418fd5060410c11b2c16d4298d8aed8991b3998db405f5fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a8225265e6225472f3be7d58a4c6165d
SHA18dc41a0797ee46ba233bf081da138f4f8567ebdc
SHA256f56d690a3a401908eaf943b2e654f6b3d4acb2f01912bfe7798d69f3568ccd86
SHA512bd7768efbb4c74a8001d96908aee3231a00707253a0f06c8ba9138d1dda93a13b82dc3bfdfe7dca96d1c596cad61e995a44ec65548bb04654fe434223c65a742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52377297713a388e22aff92257b06fb10
SHA1bccea55568f30d50216f55ab10fd1209776fb815
SHA256ef3afdb9f02bb49fa8f44abe0405008e4c3f056362b3f38ea5c5b532a85d6e6d
SHA512dd800888c387857784e1f7c10c108029bffcfd924dea267968439bb1902bfd8d910f8f4964bc60ab1eb6a0125b2cc5f05ea9999bd02f70e5d463073aacd81f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4203bff7191012b20d5154ff76a8ae3
SHA1a9f9a767cee6a657679c203363038fd5a235e809
SHA2566b665c8a574e99744ce8a624f395f1c56f5b4c621176af6d203f5126daac1f88
SHA51237a8059cce8c2d087ae6242672777fa2c1b57836b24a51cf476dc0f6800829fd2fa61a30ce705355cd1ffce08845cc797e8593d938f651eae771f34ecf3dc179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ed32ac92cefc24695beeb5516c1df91
SHA1b9aa25589ad3d578f2eba023e9b89aa9dc72da3c
SHA2567161f6d1e7ea73415191cea011ba1c6c72bc49d4bedf358a05f66c0ae3fff574
SHA512b576a5f03a1e7b3a816dccbac75a476bd98af520daabc5e774947cea4cacd4209e23babbca5b2127607bdc75b6bae1775ce87808ba7b26e401fd09dcf3ebb408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e562e7a9188995506adac392de11912d
SHA1290bdf85bddc5f7a01dc26c8dbd818f578a5286f
SHA25661354dd8ec1687ef992bbe1535e431cf6fe42709d8780492a0839fd360d69b3e
SHA5126bb40d47a4d71f306d664be289a76f49b5308e47751c38863d64a05dadfb60ce1cf514e31274e0397173b348b780459ed2f7ae33836079bee7cc6cce4a7485b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535c21a6d3b719de6e91223e37639580d
SHA15cacb22ee3397e8d3168d0281ae32680ff27a41b
SHA256db60491b5d1d2446879ba357fbac243a7db7af894fbf2ee20bcd11bd031d20af
SHA51205c60bbfbef93acc2170e34ef18615fda12567b9118c811bdf29c6197f7509cc617429853fd1ddf32a98565ca84e298f62337a40a3cd64b067bd59cee52ff0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff45f2ee174750b734e24ae35c564e96
SHA15b62a6b6803f0c60c027f61b2f17248666af837b
SHA256e232c8052474086eedc00fd601554e3f8e3ff08f71d1bf9a5e6cf6d4fbdde95e
SHA5125b88d73edd62e57b62072ee7024d35ffc2e6e9d6c54e66ed939c47d987bf001a60f7b42f14b2dbadf5515cd5f4a1fdcfb1b2c32bc09e2731fc9c291f72f92380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af6bb4c4fb29a95ce3cb9b33ac4028f7
SHA1b1120e3166c6f1df0190eb2aad837b4f6e491c33
SHA256977d0fe761ef23de3ea5680bf8021f838a66a8ae5b26cdb59312ea3a1525ed13
SHA512c11c2295c2a49c3879dd6c8c902d3740f86a7e47b27fb99d3d3bfa08f80382f5e1f5f782182c1db9b1ae7e2650614e801dea17a4628ee7c4f2ce358edf67098b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5417915e44be5d9857aedf2b8947f7c7d
SHA1d2565fa2a3048f4a540cd2ee5bc5b1c8cb509544
SHA25688808151b2e4e8cfe9909146468de6b2bddbf74193ed9fbe758f837dfe5bfa93
SHA512117f4e7cda8518e36609a616b5c5c619ef0e34e0abd5579687d52543ec1d52b38ffeda470560981e51beee9453c9fe4e519a96909583d71b221b1d796cfb5a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591139d090dc8989b07868c10233c66b3
SHA1965e222c2057f99a735059d12975793a32b5b73b
SHA256e4732408428104c825f12cbccaed26c2de0160f71d110062e896f9af31ae349c
SHA51237eea970b3e6f7d35652b7027d49b55abb0a32c82f4e3620ff98448fb47afc8a9a61576729b805fb0ac61e723d944d14f1f85949ea2752465a2a943a4aa0074d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5130d4317387b67ecaa3dbeed7c7489be
SHA107f95fdf971b806ea098ddb5567ab4e0ac3b32ba
SHA2566b28e52fe18e8374e6ebed2fffb26a8875ba6e868cea6f15cbe73f8cfb2a64a5
SHA512366abd71e09486fcd0170ce7703e32238e9add4b595b6d383b6a811a783973245c0f6f0ef590a4f400ae69c902d4f754104ae65a89530a300667ff08f3619d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2fa4617f5d4ea96539035c50d3f0177
SHA1c9ece868b59f6fdf024c8de7bd49ba27eebc1fef
SHA256f3d5fc867d7c38b48fddc9384069bc8b9a25e47006141440bf33fd3986c56495
SHA512c575b5e3f9c7895c2bfe14a4cfce574a233b25ec856beb3d230f6a5aa64e06d7c6239e6ac6c15ade7c7cdd159ab754e377a69efb2fffa94aa65355e4dcfd27e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b