Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
b99b41db3ae24dfb7c83154147039cfd_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b99b41db3ae24dfb7c83154147039cfd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b99b41db3ae24dfb7c83154147039cfd_JaffaCakes118.html
-
Size
22KB
-
MD5
b99b41db3ae24dfb7c83154147039cfd
-
SHA1
84fcde404c71ef61b12467a51b856c86ac12854d
-
SHA256
8e887713416b4aa4aae112fe1cbb017425ecdfb5d5addaad59d91b1d1bdcf2a8
-
SHA512
4a9f3906f6906d6ae4c69a73318dd98cf4ee95cf6465c97a247d28a2864ebb10aef074e25d2ba3608c821da5cdbfe9fbc98a68a9dad9455f91daf7529efd5170
-
SSDEEP
384:SiNCuO8OP170LVfCdcUgp9Wd1mDO+ib7jr8hFWsRO/t:SWhVVfSm8bLt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C2B6271-60E4-11EF-B9CC-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430533700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000c00e42b450b9df5a800f6558722df974f1b7d09479785a4a49fdcad2b6ac07b0000000000e800000000200002000000056145edfe989afc2b17ed713bb34fab02c65ac7d26cb77e01c60592de6b558be20000000473f778b534c959377c25928ebdb2d0bcbef8d62a80b5f9be1323e6b108d8cc64000000031dadcaa78f875b1803c3d08af82aa102f85c90ab86254b3d289d12e6aa3a9865f025b1ecec86e32b778099bf0f3f3f1a6aafa619eb5c6cb15841a9e681ee45d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e6affef0f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000690521b223426391bd3c0ea9fd6167fe2d88180336f057d8a2809e8080f5603c000000000e80000000020000200000004a48236854653a24fd661a0c9b823b4e52126ed559ead989aebd2b322415e89990000000276d1deb61bae752bc2edbd7d38ba091afe8a0f61e3e4cb98181a9515681f3d9f2205e27e001e9732fe047ecb1f9188b2b5cb07c308cb21acce783873e0cceff80884107c8f2a008a6be02a8bc7c562f2dc4da837e44f54dc504f8a99aed1a3c6d8283cf676f1994e94c43680b631cd6509464be00de93a702b1c085e56a1cedaaec9f93350829d9e2dc659c1a8eb4de40000000c509d0bb7b42379ba538f174a3bfc971a05842e05eb36f5ef8efb16f00d9c7e8c3b6af95e231b2d2786b3999cf11cea5768a165a6f233046d3821be3961a15a7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2784 2648 iexplore.exe 30 PID 2648 wrote to memory of 2784 2648 iexplore.exe 30 PID 2648 wrote to memory of 2784 2648 iexplore.exe 30 PID 2648 wrote to memory of 2784 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b99b41db3ae24dfb7c83154147039cfd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5185a1fc6e9ee0c1999017cc6061a4bdd
SHA1d9734d174d749d85fc6e895eb2783ab9039c614e
SHA25676b6067a9100c9f18d1344ee3d36e5b824b5a540cfaf922dc57f4fa42f7e1e0f
SHA5124baa8371f96c895daa1606df7f73f2af00b237b8d4f1c2664f47ab2184e9947cecadf9fa073b6f1ec925c7c41bf7dad5d465e003962ed7bdb0375b4a237c5ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149b162d28c94462b745736c6f044a7b
SHA14c5765207a5a12fdd3f6d7e0875adbab4a414eb5
SHA25672e8254ec8e244b188085e7cdd76aac87af362caa9f112990ea43654aae11bc0
SHA512433abfe35c7ca377c5db4d2f6761432946f14f59f80529e969b663d6c1db2e63831e1730ff17bf23162e85a262edaf521ef5f00896d6a3031c5246615740e25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a7a89dc7af7c2c99c2b73605872901
SHA196acc731d24da5768f1a4bd6f5759d5c583d09db
SHA256e31fd9e9be50f25fc2efa1e421d70bfd2772e20cefe615b363c5782748c9e16c
SHA5125efe9aad8db0e570bc9580ac740fb4d5981ac2d2bf76d9875bf919035df39623cf3992d6b036d8b9c8efb72aca939ef7bbef1905ac6c1c36f52c4830d3dd49ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63829224ae8ce0685de66c3fc68f0e2
SHA1097704254631455e8991d125a787148405455fff
SHA2560b12019041492bd9da142a647c2e2319c85b76350ff8f96c05f15c8d721138dd
SHA51278087cb97c9a6165f99664c38101560bc2499145199b5aa27707bb428230f6d2062df789176f405534540f4352eab6d233eeeefbaf055a3dc751e909af39208e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fbdd5611892198073a26b73fbb3fb6
SHA1b0382b59d403abdb94af660b063e8f8a5e0348d2
SHA256cbb95a473b3a506c4929ad1c151252389030c4252069f636111c4ad38d477d3b
SHA5129b76d56e2cfeb9a2e75305366156336c9ef91b381e506d89279c68c113c93a5ed427c5960dfafa08ebc12d43e5909e54d9b14fe4c3358f507a8d5621e649b546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ed93e63453b47e1d3d5b9f87e70766
SHA1c5b9e4801e7a30479bc9450fd4c695337ebb1f33
SHA25606e85a39f3e48581987127521f70f701c7e1d4e4acf6d8ad3a47eef0df4de9fb
SHA51247419ff8eecf3dc54c1698fff1c17ccb2392acd4d9ec408f7d8afc308560d66e9f7c15ef2c183b973633471f0f8f549f04213de5b490547c89303f653ef1a263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62b2333179c09f1bc1bf72f975ab875
SHA1f158dde66cfb9cdb6808231c7dde605241070652
SHA2566496a9ab2da9672bc8fd21709567fc5f36a6bf53eca4f5b0fff53c3f9ce2edb8
SHA512cb86d8040d387249646780ef78ac638219594e26b7d61cdb454d6ac45fa59ab3ddd6a629caee98821aa4e0b764c60e06da3daa50901267a7173afcca6c4b22b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281d5077d715d2246168ea55286b588b
SHA1f0d7d6b0d1850a0403f37baf2a19cbe1bb4b8887
SHA256acaef56bbb668b02e5916dd93f30fb7f0848cd3b9ad13e4bf5871641ef7453d4
SHA512f8ab65a568114daebfb432aaf5038a1b8e08751319f4205c21119b8097a1af8e3ed692461758da0457be213896208b50aa3376ecc62f44b77d0733a179e0aaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040aab585abfbba751ee9def80227225
SHA18dedd9bd9e91924a94aed8fbc951272085b7e998
SHA2560a4d5f11a94c4d4af186b136b41ebeae2cba49d0857beb475dad9db9a1b56a3a
SHA5122f0485d05bd0a603c5635dd89924925affa42654432e242c0d52fd61dac39cde9dead7e40263742c932168ab3790eddf3950c68ae428dcc73bd38861ef3ab588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548cb20eab6ca28bd327ff0ded6ea0248
SHA120000f89ecc3d63fee29a08b1c26deae8ad6ce89
SHA2566cc4b5ce46c1dede85410db09d527ad2879f79153cb26dca99a9c728de0fa75b
SHA512cbd10dc8d5419ff63b7f36cd537caeac4d0f1be05b8ec09f1a7e2790917e59535d433e319b5eaba1c0268dc2fb36a352a69bd0d6580d7370f4b1feb63bebeaad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb4e6166c9dbed3aa8e1ee14b0bdf55
SHA1c4c7aefff768e7ed30ec96181fec1b6cfb1f020b
SHA25612036bebf34e86bca697e6cdbcdc4c7b3b4ee2e6eb22e1dbc5420fffd86f3aba
SHA512eb9e5976283b42d17cfcc96774cec431a6ce329ef5bd9582832c68f4988d9eccda3e1d01deb46743d7f21423d53060d32e6080dfb17d49220a2072c69753b9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d666f309b82877f4c43dbcf71ec749f
SHA1d55f1ff72bdc0385b43c94e74df5c7032894b502
SHA2563460365ff9922b066ed6f37fa54d57a6a24e6ce389ce192eb636ebe9a88a6f6f
SHA51214645bc3de37f47cf3d08a548e629318557afc6b1cdc856639c7582f43c8d2a7496ff9a21be76b235e18a3c8e1b1a3e3943d58603539eec60b8c437f3088356e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb925f997c0d9131e1f5f1e645a6f5e
SHA16f970046b34f8faf0fc0f79059c268edc33d6570
SHA256116b7b4b63ccddff0fa29aab849c821a24a5d891a38f271af9067dbf791c31ad
SHA512214dfb91948c6003021a86b796f729ec1c0e1d5552b5b4e64dfbab3d51b42ad1f4f2aa82619090a31d404b0a629db39a9ec6507010f652db00481aa8c0c8415d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a9286dbe9139ffc00ab7bf85f11f17
SHA165759bb1f72a02ee8bad9ca79833f581a0324b49
SHA256b7559196922c39819336c93318d405f2c23118c3aa013a6eafc92561c6323996
SHA5125b72151fecefe1e81492b487663a27805a05be239869a4368120e590018a2831278707c2c2ab1d0bd87ddf7ffe092fc47466a86e79314ea56046b4d733652446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c82ec3846c8c03980b13a1e1b3e106f
SHA11e082355ba3d2a2ea06a6eb7edf8ee82cc6d1d4b
SHA256e8f59de264eeda6d2d40b6088d5095dd333fde3da0e97a5ca4e57961d15be4a1
SHA512b0cc20aaf48e786d2f2c338a84be0ab0a75f1f5da9e04f912d7a172f2ba4a34003fdf572ed647025f70a416fb1a36967e7a41ef072b1ffc2d5965bc5db44053e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509eb7eb1565847e1c0a694280f9e6c27
SHA1d04cbfe70d249c82de83ed6f30dff0f1a0774e58
SHA256ab15319c52f3bf886718f1d903f9e7aefc22984143fc1e40659b194996310251
SHA51275a29172081b5943ef889c3379a3b6965856bef0b1f43572e9313ff0db74a041195164b6f9aea6d9e2013ef9bdb29fd63145b64c79e52e2323379c8d32a27e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7cc78e1591f3753d8cb340eb7c35aa
SHA191cc69031454431dc378f9a1881fcbf6c7b105b9
SHA256c170e0fed1634ee1f1355de6c42841657c3927989dbf0918b372900c1f953456
SHA512156918bbc19571b9493ff9a1c4c1ab0cb5da0be4f4423bdb7fc4278ff570a3fcc62ca5da79fd40a626d02e838d6fc88f2b210d6da48976a5c278de7bb2b1a1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57a63adebb4756d32ec8cf6089f854200
SHA10bfd1ba107b9c607cbe5ff13cf0aae193cd8041d
SHA2561476bfc7de1b342c746a1ba814cd3e5376f7a8291739be58d567d213beeeaf3f
SHA51231a16e3305010774ad336a512335b98e9b666e27eb11a593e20bdf550d1f5fdf936bebe2c779b73bf1b76cde1fda2f816c40ad36969ded4e39f802c4e47165ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b