Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
d2ac9c4db9f87a9e012ac117c0071fd1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2ac9c4db9f87a9e012ac117c0071fd1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2ac9c4db9f87a9e012ac117c0071fd1_JaffaCakes118.html
-
Size
27KB
-
MD5
d2ac9c4db9f87a9e012ac117c0071fd1
-
SHA1
9507dc87a16ad9a2ba4011706b3c5865b85b9560
-
SHA256
181200ebb28a351929364653f1f141c7a34cfa463b4425817e6838b51e71747c
-
SHA512
aaa02ef8e2708c4bd9ac2c2f45c1d56a64f13dbd2ac08f94a55c2c6852c7ce4b98dd04d196e2c9f91ab864e3c872b109e8946e28c66c1b7a4316e369727a90d0
-
SSDEEP
384:U3NZcFz2NLGkcGURcYW7YGbKNfU+dfU+6PPPF+BzBpyJLqLBG9fNWw1P/9fdWw11:wNZ8mMUWUABzBuxKgdh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8502D4F1-6D4F-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000a50a657a8fc299f73f19101bbd17b7de7809d4893702a555e15a625be8e281ae000000000e8000000002000020000000c68dcb9b2985cbeb932e9c423e4f31d72404bf4c4b7bf05d9561662747ddccfc900000001e3a3f9b6e4d40a3764a4d2a4708f9f6eb2dde1897632a2fefe3987e6a53f7b5090e46238fc13b0c50e47f3efaceb8d3a064635dfa335ca5050cc3030d1c36c9f16bf34b0b19cc183d8764ed809dd63ede82dac33ce317e93bbe417d1af2cd174b2bf70e7ebfa4ee3c48728f0868e60112505d7502b85cde87b0d6ecd7b7555caadadfd79b17e7b3f2b7d50346b26187400000009b92843753d7cc03df9cdac6c5d2295a39d7a8a18eb93d9b3dfc65fc2c44bb0ea9f0a0985979a287413d95c1e207ae786e5613cb9c27b1a5a41dc1e23e9247c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431899245" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f4374438c4d3092c7957f94972d0fb29b7149810c00fd33d6245391b70454245000000000e800000000200002000000008a5232b3b66c3ca55da7b1f4a82524e7d6abc5df582ab7d19813ea55a1ebcb12000000025ed9f7be3038d1dec10d1e4e83b54ae98e902eb48d3fa6978b7fe256e2fffe440000000096c20eaf400e9f493eb3182d25440d46fcd8eb8930b2e4a3dd272fad5bd4d0739fc2af3005b9e93c5e8d6c5168d8f7a77aaf8ba4560b535b05f47d3c1ac0226 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ba9d725c01db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2ac9c4db9f87a9e012ac117c0071fd1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581ccdecd5352d53d3e22d1c2256c38b
SHA103fe0b1d86afcbb2c7c7c6095facc8df7d210bc2
SHA2567cb17cdefb7f76244ceb3d58b9eeaf987d8cb9aa9ff324c212240b2d70f31887
SHA5125a70dfc439d1f041cc090ea2bc0ec337a27c1ed80436052a1df6b9d9984a07eaebf903b49af619e6aad8d6657596a0f952237381c6909ac4910cc6874499bc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebaa379a69a6bfa110c2b998ecb6fba6
SHA1f22af3918a54af4741ee40214e323ba5ca8b9cc1
SHA256d74c409d96fc2d4f99ac3c9eeee8240ba6e83129ac5030fc03c133d7acc0c6ec
SHA512efbd997d6385b947ffd49a63878f305ce617f3c328c6f17a00352064f0f0dc2550659e1f091917f509bd37b0358fe8780276586842dc5fab31c77e1414c6ec56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58024df1898d839ecea6bad8ecedb4d69
SHA1ad1d91e05a6ada08ff37bb2c8aedc5213c94ab19
SHA2567993c93de0296326dd0886ccefd5f4ba2a98b45b737b289fa5bbda6b9391c80e
SHA51212634d2c9679f3cf667454a1224595c2b7a596edbc2e3bf06da2fcac68eafcf709614c07ba3b6e0c29c8f3b7eeb2549b2a0b700c1a4071a89b19e72e872bfa0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a930d62f22d48e49cb98f3c37d6a08
SHA105addbd75543c26e332cb9120a93692b34bdafe4
SHA25620f735a62109c93063e1c199af8bf9357e8d63bba542a41991c6196a5c8d9a90
SHA51247c18430d71c532a436a69a38d3f1aec5b9d1c1536a07ec02b520b7d25637b8c1bb02fa59eabd673fc6c47b45248a6c9d2d33cc3ef9335594a05ef545e160aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e3361b5848db4048461bc58cb3d274
SHA1c5424d1df9ef0b6175d3dd802e3f45607fb31a26
SHA2563fa3e76d60bac3c3ca385d3703ad6c366dd0fe929e7f16d55cee683f8087ab6e
SHA512c59c185ac8205761d8434a8f73968d7f57b8c274e66cd2e779cd56313a643841e0bd71bc70d9e3ab8564f2c2153bc80f03a6438b9415a838d4c7a51146c57dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538d7f335378c41ecde02091b1c6c50b
SHA165ad75eb036972ca845e2bc6c022ee36ebc76428
SHA2565996ebb7109ca37e01589c9f8a3a41cb7a2edc1bac2ecc2ee26c601b02f315ad
SHA512a4949e4b47a6d4ea4c95b3076cbe0abd202ebbcf28e7c038edc13a0329fc4c364d6e9a6c067af82e20e4468c99c7fd8e6909956751b87fe4aa4a7ef0cabf4074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332aca504e75f37eae0d16e68d4004fc
SHA15485dad8b24920451fbeaa5a12b909ee48e0dd7f
SHA25695b2aa6560d67d241a9706cc408f8f758d043f3244040ba621a633f1e66493fd
SHA5121827f2ebe561aac76e607b3c753238bda9874bc180b419ad736c11163824181fd021dbccd8f135ae5bdfa3ff1fadb0ba068d441bce1852ed5b96cc537744cfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693eef35b5620ae61bedb1df9e201ec9
SHA1f2eafcc09c0e1705b19a1e07d20b19c3ca49a481
SHA256067a7fae0526834728de4dfbc50a8f9c813606e122aad01f388ccd1f34c0932b
SHA51239d7b2152d843f93188d866ede2bf7c9e2bea37611bba9df75f9b8bddf854abd18f8ca8ef782cbc0decf006a62adee29fdc67b4389e3545da61159a66a1d1e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a73023e8c1b137c0b4d0e11b83cb2f3
SHA15bbd4d7f1ec88b45d325f20596f28f225a228cf2
SHA256d098ded940f37210fba6c0013edee9d76649d340bb25dea933b5386401216d5b
SHA512dd98ff251d5b4fbfb01bf8705ebc2555dd8b7f667aebc9a27e4342cfa7e43288b493f21f40665f564e1a04f88a2c306f7d018945d78af1f99eea8b2cfb1e535f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00155fcc960a9708e1e888d282afd97
SHA1d167d9a26707148ff69adbad3254d8e4c33fceca
SHA256c988b53f2c1bb8cea585d3c15d2847adccc87de40d04e9e5b7a25a3600c8030d
SHA5127e27d6b5a858bb8bc72b9062d53c551f3851f7c1aa1bc61659f2b8fea2c42e741154fb7ae37a15334fd3cd2bbb8d45b1ba1fdffe4c1ec65e3e6c21eaff2d1d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb73ccbff342d9838a92baf92cb54b64
SHA1b4c1a7c89270bbaffcbcea52787a0af459fc94b9
SHA256ac46ee6c8fc98a3c12ef3d3dc9a564389d6feed1f4f5b980135bd94a10e1d947
SHA5127191c3c69017978f6d323302491e9d2c3a5ec34cdb9b5a9eeb95ffa7acaef338aeac26d355fbc31042a3c128ef45ed817329fc24e394cc4cc39321f67d5c6585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb62bdf7b79ebeeefa3f32896e182a98
SHA1e1b7e2853bf46a4c91fa38e45354e9931b3955f4
SHA256dd5f2d57c2d098742db1f87d887585eb699209477cd2b83d7e3de67c7f11cd75
SHA5125481deaaaf8369a26b708eaec4c27719c921546e2eaf0586898ebac10bc7d6c71e6bb0c64209f377cce18f726fe8de96950c68c9a8b33ed9cf9c78a6506068fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66150c5477fd912974ddd18d01acdce
SHA18836ea2dcb84343633b2f141b0cd7fbe1de35c94
SHA256afaf392123223e331d3df6b2102a32e262551db57efb3a310f95da75aba39e7e
SHA512fcf04c7867f768269f5764a9dca43f67f6662e968c9421b092a05ae56cd357e31e5b2d5e1f2d02b291f860839774bc9b054c8afbe556375cf7e2bc2bf09905e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48b5788150fdc7409c87182424ffe8f
SHA1db942fa0b21ab627baf3e189ed907a1983b30258
SHA256b7d0d9565da283f3513da026c1253d201754379c1d62635de29c314ec920d87e
SHA5129818634d5393024705295b73810b88f6282d87b9cd8eba5497daf478fd6adf39a445700ab51476d1a228c64e2b64f1195fb3b18cd433c5e93b410070cac43c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf2dc422132efc52be9100c0a0ed0f9
SHA10213707fe93c71cf461b7654d88ddab5a83f7af6
SHA2566ffeb51d4ccb8af0c8ee73f6d53c1ee1a7de2b69bff04eb154817dce3d444773
SHA512051c539fc7e6c2bff770cc29f87bbef32ed3f4a5f55328dabcb4cc2a747a866d883c9034b8c23369eabf5a684709155fbab700a757752048c4470e59fec97184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d696e447bbcfb08a2b22a05ae3f7a5
SHA183ce7a6c42ff9f185cc4f864abaeb5f6cf2ce5c6
SHA25624e82ccca369f8979f2f2fda1f04de457b0f337e4b57540d010306c3df4857b6
SHA512d1a65dad27ff74b5703891144fcd228885163be0c07bc9f14606f423a2afd9c0e981c27b3d7a0b1d1974cc22e610064230709384e32e06f742ab2c36d94e89f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f9bd999d7fb7991355f69a828328ac
SHA1a8c054386e1cf97ca68920238d8de7343b4b9b5d
SHA256517e15d5a176a394672f9ac78f5da39284dbcc762c3f77a1700fc3e2dc90f004
SHA512979cafc630c98ddf4f4d6da4c0fcfc0805942261eb2fd746253d041f3c53298666807302768d17f3393a10953875b2381f6021e8bfcf5ce0cba67d33519e4044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18d1378538da05f4f1cec41fbd1a4e4
SHA1718902fa6af3753c9cf44ab4b954e915a67bffaa
SHA256c405fa99a317f41cf4de8119d5a98ad972fc9de6f1189fc28774bfac71611c93
SHA51292c55fcd70e37d7add32f4834e62c77358c431e62589d82c41117590ae04b108af3a5b6c84227703f16871ba90a227d8750ee9818376bb890ccfde38f1d86e92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\6QMZUM1S.htm
Filesize1KB
MD52580dac13cf20d79d027c4f354e1c896
SHA19073fb8a52b6dd455c87d4a5a9dedaced0472d11
SHA256d93fcd293973efa10f99d81f0d5fbee037fb96b82692ecd0370eb27d1ce0dce1
SHA5121ce18edd36794a2cd6186a33d21b572c9e4bf06cdcab1f2d346a8362522cea082957232fa78f0848ea9fa8a962778f8ef856a5d28e9921c2d723d285c51f9e69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b