Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
baa2ba85efb06c1885d4740d75c86c5b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
baa2ba85efb06c1885d4740d75c86c5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
baa2ba85efb06c1885d4740d75c86c5b_JaffaCakes118.html
-
Size
12KB
-
MD5
baa2ba85efb06c1885d4740d75c86c5b
-
SHA1
b6a93140b7c4250a5db53c92148980427bcb0ba7
-
SHA256
5732416e36ac2dd6b83cef84c80bb80a88ef3ea31dc63e7558cb75ba59f42420
-
SHA512
d6c0220bc87b7e0f24b2153bdb6bc16cdd2b11551f4e89560d7055e593e38881259dc48c7a455d784589c7fddbab7f88a024f697aac8cd132a48b5780692f94f
-
SSDEEP
384:1u70NogoshCOLIGLoNp0C0IO020biZ7eSjzB5M0NS0MWdd9:1hNphCKIGLBMw9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430554993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000f75567bdae6c7bbf6bdf9c2fcfddf5df923dafb88852b69d92609a98c379390d000000000e800000000200002000000087f7cbe69602ef6fbff29214efca09b2560e6b6ac2a995a82a9529af47791b3a20000000128cb5bbb53e29ebd401f6551b8b2320e0dae57552aacbe6e41bac90b38ddf0f40000000589fc30db0b5357651dc88c9789bb0d375161ee0084065b4deccde7b2d69d207ff72c2c8a8ac9e509e26c813e7ba96685b6c643dfdb334f378cd0cda583ad083 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000854753c703bd80968fea8103bedab244922ae91625e8f0f7242e0eef5b7b4f7f000000000e8000000002000020000000d20626524ff44c89c92233cfad95a11954621c49a77747db48a79018dedcf08d900000002e7f8d4e4b804bfebcbe5e9fb5e21edd4c0398ab0a983d31d5632ccb358c2dde6a3094fd6d7a21a0552fe65668538aedadd28bfe29c52ae98757e39fb758c4cce1f8f8c7b9cc8354351a3a6193a8a124306c24a7e0bb4bd41073a4ac741174309791e4e90861b865675322f544190e87ec39f089ebf176b9b2d33dacbcc894186bb39c12252a9520d0c6f270b914b646400000005c9f4ef6a9925cfcb2ac0d9b2cbf0246153eec76e593b0cdbd978d3d8a5bb659f07d809c4f71b39e6d38eaaaf7edf1487664f196f8837a9c693c9924bf123131 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B05DEE01-6115-11EF-8153-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a7a09f22f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1656 3016 iexplore.exe 30 PID 3016 wrote to memory of 1656 3016 iexplore.exe 30 PID 3016 wrote to memory of 1656 3016 iexplore.exe 30 PID 3016 wrote to memory of 1656 3016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\baa2ba85efb06c1885d4740d75c86c5b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD528a5fe1b8ce122920b37b23e7ab312e8
SHA1dce26bfe51f2a6b89df133cb52e8e03da4b48804
SHA2561a8efccc1661e6a41e3b3054e6b2a1f4780fa8bdb3b523c4dc3ec100007b17da
SHA512fc4426e6e92e011c3ccdb3ae104c04098004cc363b0c37740d8dcae4b1b543974e1867408ee4627815788f9d2a31f6355d619564ca1dc66ced0f40baf6a754bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141607babfd767c6a2f6a94259f8e4aa
SHA18ddfc7d280bc25210ff820adccc0416401c0f82a
SHA2566f19dbe72fc591f203ad397ce45a38bd736d1b9051d8a611b8c20f2ee36a01e0
SHA512fd57da31815ed4e92470a10a2c051ec8700f611cbe72a64f8b46b771f2b2dcedebd62b6e5efed903d26f54080555567b4e74e672ee7531b477fe2f2dc1bba793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4846805d64e1bead84e3c0edd3e53f
SHA1dc0d8430d801f857087b47d405925f685b77d367
SHA2562cc1b91dcf600f6ae488cdb4946d19df1c453769f01f90435d44e2770c3fcb1e
SHA512d36b541162816bfdff8de1cf6e3fe63c34d578edc4c8b1d7adaca2592ca1ce9f0f1a367d1c3333a033ade24ad583be950807aaa4449ab1a8f2fa2c8e7661369e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b530a5e35a5001f48702d91890b986
SHA12566b93d0e23e0c161f17377d11b8e2b7af748f6
SHA256fb773c024197473843066fcd45aab10d9c64be3beb6f6b5ca8dfaa5c31124086
SHA512cfc919232b5ff908ef052c385b88568b2c376c6675b28c53fac206469b7c1d4253980a8276474ca9bb894e62d5270a23cf24b222439dc4affa9b2e5ca5f5d7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a2fafc9eb90f46a6a13109de50e17c
SHA178039fdb0a84a453b4ce53ab0bb00c6fce606ad8
SHA2566d0896f3283f0ad630563a858681066c50f923b405e21f0f2a172f4fc463ed78
SHA512f686d0590accb0b0cb0e94999615404fae74e945992f82b8e3349b743968b85eb2be0ab99dc4611c8380470aed76acb9dfca34958309e80df358415a1090fdc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368dbd762f5212f39de43be91cae31a6
SHA1ca4e63918a97e4cf5a25867361c8d67b09c72553
SHA25607d67ef11f7d8e8777e000196af0a32ef2467bf779866d4d8b68495dc50c236b
SHA5128000da8961459281446f92e47cb5ca16248607fdb176ea62f9356e676ccabfe139c0fb18efa00f7f614ba2bbf08d82deca6bbfa0dad1f3099c473e81912acf0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e06254f5a6270b96bca40aebabbca6
SHA1a4947b13b12545b25a51d4388552e024008d52ff
SHA256b8d28efcc5cfc2c2f05ca48e818b7f4125469cbfe7549a37ac48e31ca8e268fc
SHA512b4358a8653d7e76c525e6799c664218991090a70584b27aa7240bc80d915e2d2b3871a304c3279e9cb1cdb27b675d5ab65d390d405f898abb7ca34f69d315d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036c2bca9baf7055d62f831cd10b272d
SHA1ce7158a9401dab11aea2a8ef76834d219f32bd7b
SHA256651acc356c748b9a34975575e3fa36e30e3b9a1d192e4f8ba400b6f071ff5dc3
SHA5126826003d868db203f962b91306a205537231b0f517a5b438f1b56e47e9832ce363acf1cbd7d76ba9d69b2c73e449f9cd3adcb13f429cfd3ca0b834c225817a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596aff5d01915b7602ca3104ada9860a5
SHA1de4286200f4f1e768ef054076195d80f920978f4
SHA256a0e0280612134129f8d91818ef5fc59f4f27d4f9c086c413b0426c65d21a3473
SHA5123ef824b193809e1c3059be94dbdbbfac50d438b4b3053cb8f2dceae021a93db2b862401b8d61f16993616b63c1b77bcabf3bc0a2c568f20230aa5df42c496ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e358c3d427980141fca52e1ecc8ec180
SHA1b1cb1342b01aa0cbddac04fa908a94b6ed5a4b7b
SHA256de28716bfa26d09665cb5e3c7775ccdd15ad3f29bf3a2b2e43be88c5833d65ce
SHA51288f29df8975c5a6b8369e36aff4681f583aa9ff3df5f0989d980b6d8ef5107593e9ef7e27906d95eeb2ca54a21cb7f04f4145b135bc9411447e18fe1e98babfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7305cb7cca9ff548f22dd8571c8e69b
SHA1646dfb8ed10754de41e615a8744184fbba828279
SHA25680833933576cc97e353cf8774011498445d7e06380feacb3bad015b45fa08866
SHA512154de67310b0338bc732178556559fdc4204acae3a97ae7c8868eadec29aa0e0ff200b26926a346fea02971b2479bd0929ef404f5e6fad5e640395d1369273f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc6a8ef5e71e0bd9f699cef19cc6309
SHA1bdc376a3f4496b6a0d0a82b94483b428e6503324
SHA256bdd5855ccae1976c68a63f676b6c2c17a330d214c690f362081fe4a8e671a7f3
SHA512343bc73c161c8e393dffa01604c9b67efbd9df770531784c0c0c74e254eb317db69a92ede116bb9530f3fac8d174da522baeff99dc24169bfd4adc1b9209d23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4172046143ed0c140d215950f851499
SHA10c7b4e1a9560389aead4d9663b91bea8b53f75b9
SHA2569b403c6a7dbbe9f582cff55edc4e0d0efdf8018939b17a28b138df3cec3e6140
SHA512108a4220a30e14c0da76e406eca48d74ee7e62d15863b71ece146244c90d536a5cb8a2e4d442d50b18a4f7e40c6cdb6be1afd0f81dbd747da56856447ba31387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54591a64b34a4675a8a962588405bc4a3
SHA106ed4b4add755ef1103e8ca2b11df3027532e281
SHA2566f216c11ba06bb6e810212b9844f0c2ef9ef5603b7c3e0edee6d226b72ed1d3f
SHA512dabf7743ec3a0ac7c92f27cc76c830eedccf5e998e3c3b187802de44925895b2b2d8dc361cb7d764ebba0343cb1be68d86bde80fe56160a3f62c79903876e629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58f37e3cd136283b4e60c4490b063dc
SHA16fabdebc59d52af86445cd98c0c19327fe2cb306
SHA256570485c4068e28fe1e13fe41f07ca82a68971fd51e2a0014d3812d0242c08573
SHA5124163b22039e529e45baafaa3705a7b7e0236b15f15f66367e5554759916aa015599edf40f991bf6264b22814363348deb7e7972fa73d7bcce6686cae895d4c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2a23499a903c5b4fc7819cd8ffb255
SHA15a45d3a3f23058f0380ff791d6981b83682a0f7e
SHA25621cdd6ae8ff728e31ffcf05cbf1686e52b52407e338775260eb9e10e748c2f15
SHA51247103981ba1ac4094737a7b59534bed066e4bf962c9b8c397715d8a8d4665980bfe54e63d38ecada9ad0e73a85a93b1168b2d099dc6ecfa29d1ee838f8a43765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cdeccf79cd3bddaf35e5716f06c2383
SHA17a5ae289503f51ee128b6005932428f74de79224
SHA256687c79ac1c8858fd5b642aeadfa19d84da2bc13d82a6844f8dcd7a1ffc35a208
SHA512cb6e2994364f0eef3c9375f60ea3e9349b0807d6c3c429f9cc4e4f4a0c6eb90f9cdfdafbe814b7ecaddbfe56612a86f52d490f23cb426949aaeafd995dfd842d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51c7c6ad01d4e3dff464d8515ff576ca1
SHA15532fa74671a3b6bddd8742800ce25309ab38042
SHA2562364249fa6e4f93157905e2d491444a83b44472d5be68ea9b93c856e5a45559a
SHA5121dae18c669665730d97c751d9381004e572d53d7faf92e1b4e1fa8c7842f032fc2d1f11a5b6e1c53cae086b68f6c88e19516d5e05fa99935630e161b3d075098
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b