Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
cf5522d35c2210cef29f801f683481c7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf5522d35c2210cef29f801f683481c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf5522d35c2210cef29f801f683481c7_JaffaCakes118.html
-
Size
29KB
-
MD5
cf5522d35c2210cef29f801f683481c7
-
SHA1
9b9847e18021f732fc19a81704dcaccf8859e16a
-
SHA256
b29df920fa1dff0236cb4a504b013a89c19807ef8608930d15035fe28e6ab73e
-
SHA512
77d47e57deb07b0f84cad11d5bc21d6a398d03d9e9986f36a7ebcf403564000ac0108b79fe70a7ee4793e5fbc3888dba8aeb429b6289ce53f11cbf4e1e692a4a
-
SSDEEP
192:uWr3b5nrXnQjxn5Q/KnQiepNn2z8nQOkEntOQnQTbnVnQIMCGA0H+OhgamdMZR93:SQ/0zFgP1xZ7BLP9Qjfkisc2O/+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d6aefa1c9e792fdc38aa74f62e3e0b02f641c6deadb594cdff6f5f30204547f2000000000e8000000002000020000000b66751105aac6a432ca208757e8f117d73a3937a946b809bebffa84bccc28e5190000000457ddadaa9df00d017c32789699fa19456d7a48c06666eb96c428498d52e64850928829184105d13ede36291e613bc5732f1f9bde0f47baa217f052ee44657b6f01eb6fb98adfb2bd1f7bdd01a3e42cded1a2eda8274d1c6380742eb9d8930c5d9c01c4281332de70422ab993d1f0998bce79af0f03067c2ed664d26db3ff187adc78b5993bcb7fe218763f387a0dd6240000000b81dc2eca27090f61432cd2cf5c0784acc1a40b62145042f0bb5d3fc8cfa9fb4c4726872462dc9cfca6f6904143de05842e8844ee9fbe17afc51f2e8ad27c060 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E4C8851-6C3A-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005ec0c3612f76e235af74fbd48f64cc96039aa9865da2aa5697ec30bc62b82288000000000e800000000200002000000008c82be17dc00ad50bcec4447210d1957489d77bf19050f4060bb2b76d4cf50a2000000072056c737f660f74d6cecd412c49728d6eb1b2a758b67c8e654db45fba1ff65440000000045fc246c9910bd323f33f1595012e8e20563cad93da441b80b957822178204b7c5849df0f7e205e98b080ca20167ff2dea36c5cea3db28f66fbfe5caa5f1371 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431780290" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b388644700db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf5522d35c2210cef29f801f683481c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f59aa4144fe0f7e19263f798999130
SHA1ec7eb3f40cb1a54ed09ea92785ff24dc094d5230
SHA256a556afadb62a90b308124b62ee05387ad8334ac3ef876d485155b24121c4e5d9
SHA512605eb8fa686a086ddc8ac5c28ba05da4e225563dacb879672661a3588814027dab790c194b33e21e1cab1b99a588bdcbb55101ed42f5a87fc6ed5066c0a7d893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532213fad404e5cec0c67b14165f75a38
SHA12f4edd0075111ab1805dec078e1be7066b31c368
SHA2566200264581c0ff2daf8d5614e27116f8a873fdc6a0811f2d1d0556348742077d
SHA512279f67c2e79ef2f07ac9449b41a001e2589e984d32165f6431f5350659cca43d29c017258ac8c6141843dfa52c12f46b1cf02ec437039b204a9b591a88d0a8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba090288e8ed636be835d1ccb2e6de5
SHA1aba93dca63bf451a84c09a30415fce2aeb015c11
SHA256f2dfe423c89a5dfdbc9671b96d3c33ab0d3f5caf242e208b8d672afe71232e5d
SHA51229a47c3baa06af3645dedd5228898522941687bc98198dceb0dd3e98e84d9802dd9f537e640b4bf4b521d061396580d99a4256d61730793546ceef2a9633f801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749622858308331ce01f56f59f0fdfcd
SHA170ec1c20ed1dd24426febe861ab787bc75027562
SHA256785051d6a2a4cea6e45071e7391eceaa6f3dac06c67943f9d8aa765681abac22
SHA5129349e98eb3e63f4a28e72b51b08c30cf1fed70dbb733b5f921517fd1f01d59c85dde45ff7d9c5855d2a66fdcd0a6dc56f398c4914b340f7ef5d24140e0ac7e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca9c71b38b5be6932626796a368d2bc
SHA1a12f2849284e999eeef10394192eb54270597807
SHA256669142d0784bd042ad32e698f95e56d9f84c72c2e23f12f1f23d15ad3b7e5185
SHA512bbadeb162470c1b4aa8617533323c3a5a606b31e7970da30f458c7d232fb85a92d496f61e18ce312bf32fd92988c7f40d0854854f6f103de749b6993ba8b66ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fb024bbe617f566035f9527e8268f3
SHA11bfc43bc318b1ed167133d9bbef71ab4a2db176a
SHA256acdd73845ba40dc4b7fb66ee2148bf40aadb77e4dc8cb201c033e7124035f2ac
SHA51224e84de7a1e2c65f9d41551cf84ece5648100d33599bd9c8b5fbb3a7f2442fe2487144aa20c423d9c0d49a30dc49d5e7f9b626c7e043501cc468d8b7745b4daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e42d0887bc49e885513ffc87805bbe3
SHA156a6b507adf4e94420b944b767382b27bfc7a889
SHA25664698368e2049975816706f63308d29d10d9cc705c127ad142bad83d73316e6f
SHA51206064b7da0fe5f4160dcc4833465b2127bc9836ed2138f085e5160f08bf05ef6181ddda17894f93af868c7e05c1af57e8c594076bfa082f0921de8e599d9c70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883ebdc8296c95ef5e1839fad9a9814b
SHA11df288f6d2a199ac082c8f31179a558356e7c15e
SHA256ff8317723fa6fa29a92551d33a50032e44a1103e9360f4685ebe2246d908f5b1
SHA5125b709f2d31c0c8da86b858a22121119b12db6d4c8f53355424be723751ad9c2e81b703973a94be16b988a0c752640d9a5fbad23c4dd0c4c817849a876f1c2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a2921cdad8a27ea1e96392536f13a2
SHA1b5149e8aa7c19c86ab5e58c3cdf3cfd75b8ebeed
SHA256d4ee2b865139fbb4763a17387aab63c3ef19e59780064eb1b56cc7707680bac3
SHA5123d8d9ae071af3de031266ad1e6962201d8fe1578ca0d4670b1698ce45fb0c81a201b3408b6f1d308e04ec562122430f593904aa4ad33666e8fbb336cb6708d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6959e168fb79c14f5700e77fb6e9ea4
SHA148bbbb3500b1e7241fdedfd39e64b3453782d555
SHA2566aa2d1606c0adb3f2924fc910b818ce3fd6149cfe05246f70af1aa2cdbe09c7b
SHA5129d035d2103cdd68709a659fc50fda670b7662fdab497d71f1a9d725b370e5c8d226c872e6518e94382e1f262f2d2778d7315ab42172bde9336c3267e678afeba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fc8271168a8e30df0183ee901c846e
SHA1cc429a6fc9acd31f09f2969b1b2c10cc85e94f6b
SHA256ecc75a3da0dc964bda58d78804b9a01a1c1f31a2c77f4764d607d8a9ab2e4ebc
SHA51248b4000f84f6e774f53c001cfc8049eadca8ece1ddb49250c6d27095c199ccc9e541355d41c0354111f6e8fb7319c4828d6dd7b775fdd2267a1b2f76a75abb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b897c2a9ac9568a066f515d46ace9415
SHA1d496d984d1ca62ba8d50999f510cc74f2daf2a69
SHA256f5fa67828f611641fd3af8e405e6633a7bf13fc49111b537e7ad8395ec691061
SHA512ace44f529774f6f15ddb38ed6d28b082c66e0e4d063a54129593821f796d6296160531dfbd71426df283a60f73d487ec58814405f7ecc2486df5d27ae55fbf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feba3cc671030592109e22a999830287
SHA1b63d12bbd5b27cd82de51203c86e20991f81fe7a
SHA2565ae51505bba343d41396c270f407174531afb68a3fc249b92d71d01642bb3bd3
SHA51207f7981204cc0570d59ad3201916b1a61d230e12154621b134a3061c36e8eeedfa40ec93fe886bb9caff0d7819987472d3f7ecd5e98fe60087781ac036f7ba26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc9b1155317f48eecd0e5413afc5bc2
SHA1123b8c0502130bfdd50c49645a382c1667eeee69
SHA2561d438c0acb17f61d2713b6e981c7254f02fbe63715642af5145f64d3ea0d19e1
SHA512600ab530315f4c687b4b419248beff88ffd16345e01a6373bae9c78246d62d6b3febd7e3cc93579f6cc3c2bc2eaee0a8bc1729e7e2cdad91b99d854cfbc6693a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7d52dc043712ff61d81d0091cf4074
SHA122dc639252a2cb1cb9c9293be931b1305dac14e7
SHA2560e6c7a4eea86108b8cf53e09cddc3f51658c73718865dae1b3b0a91c3d07c403
SHA512a19ada67c8372fbec42d1b0b74bbbf947aa901d5dd95021dd5c9e3a4581b499bc66996400a2f660d97b5a82f88ddd57237795cb9ca10400f100f3969e5fa9336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9a982d3715141970a3a7cf4652b75a
SHA1753ef2341117adf17b3bbf94b3f0e91692700cb7
SHA256438c72acadde2b868195ca86a9bba4c962b9738df4b177aa17a8de7350bbe38e
SHA51288a09edd2b2bf00358773955dfe0143252bbbe911181b8962c92300694e9124a3f4fc8b320a905d5a14f1275aceb57952b3ab8e5c534ca3839d4e14c15969e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53c6f214a5c1e895e9a88afdb59d35e
SHA1a91bacdbd4d13219fba5a6bb08f7de750b03953f
SHA256a4b99f450fa2a961c6079e0f29c44dec2b20cdf453651c61e2875e38bec8447a
SHA51258e9665e6e9be3e70e27f176c9e7bb1d108536bb25aea04439df6346101ad30875c2c0ceb3fc593383f7045e9903368f966331ddb1524281782132554e14f60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4af4ab7fe7a59f003b1af47223c5a4
SHA10afeafa551db5a33ab9f18211f93ac72e5588aca
SHA25685b056bca3873e80de89d6c0002e996968cd9fe1085dc818c0fe3909d833c129
SHA5122baf8122bf90a29bdef8e93cb7a21c1c92c78cb9552a0dfe50405d5ccf7b0b8ba2760cc0764a8bd643a1777e5819382aa33dbaa95e6b0e6b4d1e900fcecb5f63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b