Analysis
-
max time kernel
127s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
d0d6537f44c40a81501c00dd88438a94_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0d6537f44c40a81501c00dd88438a94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0d6537f44c40a81501c00dd88438a94_JaffaCakes118.html
-
Size
155KB
-
MD5
d0d6537f44c40a81501c00dd88438a94
-
SHA1
4a3c9f8f334a36127d7825bc35d4cb942188bf7f
-
SHA256
a08bfaffdfc4be38a43e9f92eb60fad0e6db3df631d437ca56b931f227f30d09
-
SHA512
84883502b136e8a78f1a48c177ca30388ebde8d986959c67cfd040e7bbe030d3466ccc996e165781cbd128be374c0055b5d4c9e7324b0add6288f67331adf2ca
-
SSDEEP
3072:UZb24yfkMY+BES09JXAnyrZalI+YfArtApV7:5sMYod+X3oI+YCAX7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2752 svchost.exe 2608 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2860 IEXPLORE.EXE 2752 svchost.exe -
resource yara_rule behavioral1/files/0x0007000000015e4f-2.dat upx behavioral1/memory/2752-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2752-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2608-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2608-21-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px42CA.tmp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431835985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90733949c900db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000972f20a77567c1f004866ce0015933be8a3ba87a54e9a2852bce1946b622f776000000000e8000000002000020000000703d2226611ad5f39a0dfa20675c0a1b25fa2a3de1367f827e656ed11d410a8e20000000fa6c82167805cc117724432469a6e47778ef385b0a001409bd063b4a92fc97e140000000353b6fa0792cb2d9a364eaabb2aa979062746934aa0312dabe123a144de5e0c0a6344ad7f3360e5cdb6da34979241ab43ccbbc1f791b63d194da1fd6c6d4e592 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B163FA1-6CBC-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2608 DesktopLayer.exe 2608 DesktopLayer.exe 2608 DesktopLayer.exe 2608 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2468 iexplore.exe 2468 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2860 wrote to memory of 2752 2860 IEXPLORE.EXE 31 PID 2860 wrote to memory of 2752 2860 IEXPLORE.EXE 31 PID 2860 wrote to memory of 2752 2860 IEXPLORE.EXE 31 PID 2860 wrote to memory of 2752 2860 IEXPLORE.EXE 31 PID 2752 wrote to memory of 2608 2752 svchost.exe 32 PID 2752 wrote to memory of 2608 2752 svchost.exe 32 PID 2752 wrote to memory of 2608 2752 svchost.exe 32 PID 2752 wrote to memory of 2608 2752 svchost.exe 32 PID 2608 wrote to memory of 3044 2608 DesktopLayer.exe 33 PID 2608 wrote to memory of 3044 2608 DesktopLayer.exe 33 PID 2608 wrote to memory of 3044 2608 DesktopLayer.exe 33 PID 2608 wrote to memory of 3044 2608 DesktopLayer.exe 33 PID 2468 wrote to memory of 3056 2468 iexplore.exe 34 PID 2468 wrote to memory of 3056 2468 iexplore.exe 34 PID 2468 wrote to memory of 3056 2468 iexplore.exe 34 PID 2468 wrote to memory of 3056 2468 iexplore.exe 34
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0d6537f44c40a81501c00dd88438a94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:3044
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:209932 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD530abb9b22de2a7e1dff0179c37dd7cdf
SHA150ecb40b8e2658b4f8f907ef93f0559a7643f5a0
SHA256f02e9ffbebcb2d19097479654513037479c8bb950a9271147269a0ec53ac7662
SHA512d8c19e8d6b484ee0a7c08572eb9245651b28358042057b420a885a51c602dfcac0d0b589d384edcde87a4f688d4ea5d8a85f3196ddbc54946af257a4973f4a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92151a837879d87aa5c4f4a0387d906
SHA1b06e5b48a0f6ac707c873f8e5062568c6b1e42ef
SHA256af8658fac6196a28babaa0d29ff242c3ab81e36dbdef030f982348471a24d264
SHA512668b42c1659ece5d7cc961d0a260e109f8ee7bd5c393189bbb41f9762b2ecb14d5dc3fe974bc1d37addc9d9a2be7017a4f74afc21e9ff706da0c73894e8d6056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ed28c318e9b13c6ef503050a3ea928
SHA10f582da8b277fceaf4485bfe426537f8ea694f99
SHA256082969291270591e7dcebfcff072c4846aa33f7e6addc42cc2305dcac50450ac
SHA51238af1f3e818d37d111c8f7b831f7d1fed653aa112197817d1e90097d7b8a742b725c9d63e63cfbcb7dbd6622f99ba1e178847aebf1c65a383a4b353712414dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1241a019562f461c2eb707c9db447f4
SHA1d29c22658a3f0e2644714cdaa3c9d3dc3700b61f
SHA256848fbff93be6be5eadc66f1e9d240f59a7918279ac0def462b679b5e268a7a7e
SHA5123b0af900c66ecde2767fc589c864d992bd619cd110b5553a927ed50c50435bcfd1ca02c67b5a1c778e8b6dddb9dcbe162a3e6df81da723649cf160ed413920d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59049550c0102e01c12db2010ba510cf3
SHA1227a38675072263a902d65f9c577cf7074e8c377
SHA256117754cc6ff997c4fc687362ecc371ad36faff4be5d02de2604cb1fecb0642e6
SHA512b4598931515303b5755acae128632d7435a22af9f05f26ba922febc13be595f72612e32a56a57b2128fb26922e68e8e82568c6f498a7028de19ef58356cd5c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343664469332d104ff0813c012865196
SHA1216320971451635ce18f76c84eceaae63580f64f
SHA256781c5679983b51cffe05e95f91c895d674ed595ffa5ae726a6dc3e2b6f2c86f7
SHA512f638b392f9ee7f9d0ea3e3be140305ca3a0213ebd919a2d2783cd69b5340139439ee07c215b739034402d5d253d4cd82a431c6a8913f952104d6be8315d0cadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e447cd0936a8a5ca5bba350bb7d11ef0
SHA103be06b776cd7eeb3e196c61a8731a973c3779c1
SHA2562cea5c03b61f09101ee21fcaeba7753fea3c273565316d48a1bdbf7f100189f2
SHA51286851819b42b5e6839f9eb6c80ff40b6fd30f7ed7887214c0dbbf959d1700903e8a98a6e9a9224c775e2eafbaa6a623f41dab4759de8c643ea382687af46b4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc65b46eceefe19b44025c12053304f3
SHA1335096afb9d129a280aec7e05906ba4a5364e2c2
SHA2563f1681a687ee435ae571b65be4a5ca3028f2111bf76b1439e9c3e27cdf1e4d47
SHA51297d4989056051e66a951512e5fe82593361090e9ab4bd3c05946ee7da53b188a1ff7b6ad71c84f9ddfeac1433d7299ecf892c050b07616ffe9702a5f57121b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470ec02a5302f57d44aeb88e1111f763
SHA180ac04df68ac621ae6defca07a6da4db4134a0a7
SHA25668000faac96a61862f2a11631767ef8644622cfbaacc1f5fdf1f3522061d0922
SHA512d006300091296c88fbe332715565a6d144ec33d3a7ff9aab952b21d1cda98cfe0078a9b28fd3bc431f951d45e52700e750f70ae33e650299efe50968cf239452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba5c97196260f04f31d2812bbf5dbe2
SHA1aeebdc45ec691ffba8ee6d95fc087f61780cab73
SHA2562a8a878bba2b9eee12fb2a923c86b74ae2e31eb6321511ecc9ad0d37da240c39
SHA512c1a4191904825822a1e10e4b93e589efb5ce740c3d4e01084b8e0c38a4c35950e365d633f7b886dfeec5416a62985ee133af866a0ea6c298188afe5d2ccc3175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a3923449eff851c89cbfecff5409c4
SHA13d433883790282ccfb19206fcdb26e5e2da913c2
SHA256bd1f57436e15b4f3d70f94d0e79430286354ad9fef396bdc211e44e82f3d70b5
SHA512c68a20654ea6a89e37053d6fa5176eada7cd38b5b5e2528d0a04c8d24d93e53836481c1d5b9fb2f2982bf35c584c506f4133ba37ed14e3cb3c6976f18baeb75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eaf8528bd701533339bb6ae0153bf0c
SHA191a070b2a75cc4d641a68a6e48b2d385f32efc3d
SHA256776f22df619f14b91972f3cf264aae2f283bba53ffc8ad5b3687078ef13598c7
SHA512dfce2255b6182fe30d6db17c9ba8ac6710de10100e714618d2f0593d7c6b907fc99518127aa06dfcc0a061d4e23fcf910bbe80af7c76c3d575aa485ac28d09f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f16fd776d64ab25eb0ab14f2832de2d
SHA1c723448e1b7526842180368c35cb7b7c54c0fec9
SHA256fc1cf4568fdc639d60f9fa1431b88bb986d997d73d27c8d5c899ac6f28b1eefd
SHA51271f3957a10f95e1ae9222430d640f31da5c40e530fc3f369f8c5c55a5b5bddb9ad4df7b52feda6da7b14f7070e087a1c23a3381a2523ad68732a8a6729b95aea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a