Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
e04e69ff0a95a75846d2a8b3dafe1e84_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e04e69ff0a95a75846d2a8b3dafe1e84_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e04e69ff0a95a75846d2a8b3dafe1e84_JaffaCakes118.html
-
Size
3KB
-
MD5
e04e69ff0a95a75846d2a8b3dafe1e84
-
SHA1
3706b59d4408e2b005ed0550c73c713d03edb05f
-
SHA256
c6f056f7053bb6600f3f83a56d21829b6f0002167ba49edd387c02119ea2bf81
-
SHA512
147a63c7fb0f2fc8722f79b39c82f543df05a83605fc08ab7717d7a76a6fc82d6f7a9dbbed8a10db2fa2c81dc495a76bc67e4ac26f44dc1b8082464cb5320335
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c90f59ac06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82DEC9E1-729F-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d4e731a77e284b2e4d59f30280d755403dc2bcea2fc9637327bb82a7d459a35d000000000e8000000002000020000000ff0561d117e96dde89687b4bec4d63fa4a09610dd413d253a396e600cd3ddf2820000000ae6e0f1920e639a9d2728e28f01ddb247280fc7348a388d3eeef2fdde1ad020140000000e0b1a6a741231194757bc5273f993cec5ecc72c86da1081122f9b5fe057d7bf8aff9701c29afb55b7d7743c719dc5ae10c10f1fa1c748f1aa476a35aeb540e86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000097bb68e0a7c259984b687bf9cac0a6cce39d42966d453e631736cffa089d8e08000000000e8000000002000020000000247e67eb168aa2248c71c55cf11accf192669184ef19e3415d90d2d923ac775790000000c44178fb4095e2565ccd5100dc56ed1c1dae99eb015340bd342f411e5ae70baa3fe38a93c84acaf7ad3baa70d5cee35f6e97bd11678d3690b92f2399c7862b4e286d0c129b2ed6c9471257c410a802eb82f9aaf39d2f0c97d061c8bcc68272c52f31b78210680884a10c87bd157a76b069f82b3a529b127b039956a06aaf4eea1be1aa26e250acb228c90dda62885ee840000000aacbaeb56cd233b70d824c691347e7258f4070675ab01d264b83d3550b0740eac5de63a46da83a050e6ba6306bf0bf1869a45ea72f7953b4d0d8753a655c818b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432483357" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1608 2204 iexplore.exe 28 PID 2204 wrote to memory of 1608 2204 iexplore.exe 28 PID 2204 wrote to memory of 1608 2204 iexplore.exe 28 PID 2204 wrote to memory of 1608 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e04e69ff0a95a75846d2a8b3dafe1e84_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54152776a5454deaa77c6bf21dd7ed8f7
SHA1d52f0ca94fc0d3f62789371e50dafb75669eabd6
SHA256bc0cbb9afb752bfef13a23135ed14b38ba9b746170df455c34c3e14df61e3dfe
SHA512cadd5005a3a81b7e5751de557761cc1d677422683c1c869a2c012c2b697bda73f10f01e18755517aee037199308adbef73570e882920f97c3e2692dbbc6945c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a342b13b6451db0c6d82a26f13a3d55b
SHA169c5ca31337c86fb475e1689c117405aa91dc0ea
SHA2560c3aa3ed6139cda10e489a2bd8fb0deb192e7e776bb85b211fddf35d1af02b83
SHA5129da8e8d34c901925138faec616b65e9b97486fc0ce83d794c4b03dd66dffe4f683944dbb63ed37a3116c6b70277b34171f58858bc5950b4e951568683f809d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc70c45218a0fd47597251f2f64c1dac
SHA1db5943a10372d2eb929d6df2c80a099aefdf2823
SHA2566a9f9985f516b036b4419408327d3e50943d6f7d8d7117ea494d9fc59feeb90c
SHA51240d54d2ff55798ec6235e0c9d74cebdd414c0e399791d53bd3c364c48ab0f8a148630af64fddb9af71b15cff377c0578031cba5ebdd214d8c9a9f62104f192f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1334f41ec5edcbadaec4818fa66e23
SHA181362f8410f821d537e5325c5e613163e3d9e33e
SHA2568ffa9d42fa705bed2f55c5c501dcb924519688869e72214dde7bbc802837b0f1
SHA512366143374f4715514fa8ad31dbfb9197b5f27dee88c7469348823c8d6a7d9d90c8c7e65ef9345ececde6d01c222ed3af26b1518652be9be79f6371689b88e6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b179eff48b383966067c47cca664ac6
SHA1b144ae9f81c2f954362762e6ae065bae17266775
SHA2560da0b2a6c576d5c2463abbfd81ab09965e1b26528bde6b627f58802e9a2f8e12
SHA5126769df56cb876243077b54e3f1e3b68efeefcab23d9c2658b8f145880236bbc5da430d1f7fce9c988ad086c700f59f5544a08554a2c75731e9df32daeaa89e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745a550c81047f8039e2cc648df4c500
SHA1d210cabd49c9a8bb5efc98a99f85ca01656bc633
SHA2563b7aaa568cfbe97375583a2f362e70af7f7793dcdb0245b38d4334c0817602c8
SHA5129c5c0fe7b2feb32f05e44d3d63f922f32037aa2ef7ad56ab861b61676182177019b5a74a7f9fe7449e64fc526cdb77dc59a78e40a79400ac151949757357e272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe2b200efa47445669a16c63e000537
SHA12e7cf26dd0846d516ae56aef4771dd357dd2fd48
SHA2567b222535860837b057480efa0a850c8084900ce4f29864bb05936d49bb8a08da
SHA512f89d0153931197bde831d4a585962b13ad9903a9275f2baf2733acc431b129ff9ef14a76141e8436ab0b0d584e6b26afaf616128dda85e8b79e077c8fb2400d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e771dc7ce1406a72c04d3dcbfc65db
SHA13a07b5de3e303ba05f61927a391c109390709287
SHA256c9bfc4933120aeab5224f477531ceba14449c8ec4486e6a179510bea5bb03c37
SHA512f4854fd56e6769b30627a67db61a6b0e67f26aafce3a53221eeeac9d1f25e778ea18b2bb267e87c85e51494149d04dedf3f5a7f942d1365af519cd175a2212d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577af5626f17112924f049da92cd87ca2
SHA11a54c62a04cb4bf4bff717efda8eb8f1339b88ee
SHA25665e5e3093b6b6b01eebb8298f87347495a3f55d3c0d15c25f1f2630aec11793a
SHA512809d63d4e5d53e8bf03de0b68e0f7123b171884834f14e67ef14c504f4e66d5df974c3c58620909977a80e54ae8d1d3834843b5562519253b0d241310b10fd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735c291abbfd0f001795bb4c4fe991d7
SHA12a968da090a5ae2c85cabce2caca37aa46dd0008
SHA2560f400b0af38fa3f92c832bff6a9f50c6bf5fa0c50e7c338f0039a212c41f9442
SHA5123e244ba811b3bc5fd870b5e62b1d1eb9da19b46fe08de0d45ad7717e8bb09a8f45933ea76f63d167a71b6fcdd81e0bd93b11d46466e43cdff757f958db3c3635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fdd49481b7701e8bbc19dd65d33dff
SHA176b1d396688d405e4527b1b74d9e95c49b7fda5e
SHA256106f9b1b9bbc5eedc42fc9b0541333dd3a64f5e9412e3fb64ca6ac5b4e46bf94
SHA512fb59ce4df4c00b47de51a3f7b63c08caa42ed5e1c6f43049835b9a506c9c677099e366d91ae787ae68a96798e145eca2f93244ae93b336c1c2843cd80831b77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ef7adfde9ad545293f657c683fa364
SHA13aabc4769f44597b693061a36c4b097eaec43501
SHA256a41f010e7511e047aaf734ea576d81aa3dbb3b82b42416be4c48da25aac6c57d
SHA51289a3e5aed819f86876fb653e64a2ba88c41016d30d115d1cf859c1f39fbb295a00cd01765a3c12986aeadc13d8eb3c97e56523086050574b7b1ec71a254e7c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cff06adb86aa66bdec12854870609df
SHA1d35f2af01fa523c3b1440e554f8e4700ad5a0159
SHA256d3f4307bbdaef87de13e8d096b547bdf9c0c0d65de11a436aa72f31b2a5d6e56
SHA5121cd0800dac74ba82062091333c6092a82791136faf1406e5ac23b4efa000070462304327bba68d7801e043176f8cfdae16b2c5e9df9c67aff7086f5528b1f3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50846cf84b860851e9c67bf5532a6aa94
SHA1a4b12480c0549fa48887979c07de0c9209aa9b1e
SHA256d59c22547a4a97ef92e076ca794d6e2b371e88a147251c43bae4bc643bfa2ade
SHA512b8deee466e6f3ea1faf27812e3a7607b80b3ee9698909e37f74521a6e88e801f60c5b023e6048a5e11f969da92cf9c404730bf596e693a9b6b9ae70a3864ea18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b4f793a624cab1efc27b86226b2162
SHA19a24e1c8917da12f5c21c236b2abb88e98e7c222
SHA2568e835b7c9af8b072d35f8a31c55c0409585f3de17e81287a8a4f674bcd63a9d7
SHA5124159076785bab412f8279e5fdedc23de6bd72c72212969ef7c9addd276a30db015896b0bc89254415da4e4f11572e787ae5bb1a991166ba098790568e8439fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643c636c39ad5d3497cd1650ff527754
SHA1b52196419d44475e8b34dd78a78534a7d59ed021
SHA25615aa81b692c10bc6ce2d89bf4fe80d39cebed5788e14bfdbf83931b267306a45
SHA512f616e31e7e8665de61ce3e1fba4e6341d0cd9a609791d72fce81a7e1badc2ba379d340f91f100f9e29bb25a7b84cd68a3bd13549c91b30374bfdd8fb37b40a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0e22fdae66844e69dc4a994d39ae15
SHA17d77f4b2c93d7029e45790ca99bb667d3479b239
SHA256caf83f9377704b8c54619969f3de83d8d3d501ec2187a5185e8038d01cafa76a
SHA51219a93954993b8d951a8ac878d810f0de39b182b06dacb0459771a207f054bca5e9fffce76a76171c79e2ffe412cdc3d407b0e2b2694b1bf3579abcb3c58a3739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae721266a6da2b901250d2f6c5a11bf
SHA1c274ddd19a0dc7a60bd3ab819088f5b90796d46e
SHA256bd391e0d872935384d4d16a0cd5cfa4c710d35902a9ad37c3cb47b9ea87e209a
SHA51271e0041c6b20439542789917a33f1a108aaf5751b78d207e48f1c3e03c712e8a0cea0b3680a003963b8342b5df000ffbd59a5e5d5a79ddd97cdb2f3b70e6a156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f89dfd23ad4fc589d66873912ed18d
SHA1832daa7eb94df07778bce40b7e5f7736657d784c
SHA256cb40b286ea0a2f4c3bce051b361d4562c3a7380302a6b251af29bbee9a241b97
SHA512fc696c393dc984e60d56c95a23ae9a42e9403af73edf2e7e37e28cf1efa72f4085ad68887586ba0913125562c437c0ee54540f9413d4a4fb446d58e0f8b1e3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44a916cbcad7e56aba39653011c1741
SHA1f71928a1ea3f47d26be00d672ad9b450fe53a6cb
SHA256c30ee145ce4c6159095704b211d8bd30febf4667d3d2f58b090d4e43dee2fded
SHA5120574ddd74c6b0a5ea5eda2c7b582e0155d2bcda1b32134f0acbfabf42300dfbfa5c9a983885af10794434f954d894334d22fabbf5c492c975b79cc5be52bbffd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b