Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
eaa7a52a52a78cc286f6bc749246c87d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa7a52a52a78cc286f6bc749246c87d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa7a52a52a78cc286f6bc749246c87d_JaffaCakes118.html
-
Size
6KB
-
MD5
eaa7a52a52a78cc286f6bc749246c87d
-
SHA1
4de70be6c91510b3e9da3406b2ce593e5aaef78a
-
SHA256
d869b12bc6ed23ddf715255f8bea99e4ca9b9bcdce9da81b3cee895dc0eca5e4
-
SHA512
bd3892dbfeff09e449c4f0ec766bdc3dc93e22c151b8ced0a649608bf0da600eaac0325f4c16f2914a7909170974a7bc9bdbb8adec097484a08c061d179a6e49
-
SSDEEP
96:uzVs+ux7C6FLLY1k9o84d12ef7CSTUsZcEZ7ru7f:csz7LFAYS/Pb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000f81e3ea4f762ea0f104a5e08945d375f7fb9a27402655b2e3a3794a964b713fa000000000e80000000020000200000002ecd8625219a99941f9fe9e97800fef214fe1cd79f79f6089d138447aee38db8200000001a551d94cd3be2d283634ed3b88ca14eb220b4d63f6ac7b22052300077df1927400000009ddad4eb6b1e21cfb8174998f4483d29c4160a68ef6115c9ce03071a6c0c56c5816c12e3fae49b5933723deac4b94d95d5d65b108382a3139bc2dec461398fe2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{731BAAA1-7646-11EF-8E45-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d040fe47530adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000868b5e92de65eeac1ab8a0b0680f988b0a799f5b0cadcf483b3031b98db9bf4b000000000e8000000002000020000000db64fe98da1d075a0e5a83b00c121614d47e96f3a597cbe89d593d103cee475890000000cabefd34ff3a6c3ee333007fa9ff38d6b47efa63c2a252d2a1f8d6f73c45bd2cff0e0d5b5db76ae91fa669e6e1bf661eb35d994d4fe86297773eb21938ad8b4a230ba53423c7799675fa10e2ddbc49b22540880ca7c8126dab9bbea110c1b7f3a39081454f06d301622bf530e880a7e948e1c06a021f4b1721b114079837be904e7866218c856014aba913c4985e15c34000000039e5547878bd1520f31c51ec319b57812a2556fdfef66c561939b5214619b3435e13325846d99a367750ab3478c62caada075e2ae7bfb351c2eebb1cd27a92b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2680 2700 iexplore.exe 31 PID 2700 wrote to memory of 2680 2700 iexplore.exe 31 PID 2700 wrote to memory of 2680 2700 iexplore.exe 31 PID 2700 wrote to memory of 2680 2700 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa7a52a52a78cc286f6bc749246c87d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d93744fa2aef4febf3efc7e7bda671
SHA1c204e77dac37e89d060d2a7554b4df3b694a5a66
SHA256c08e29d2f8aafbac85440218b76e92f1877aab0c7fb7a82f48fada2474bfd1b1
SHA51254c13041f0d92a0ae0e2444d2643826ae97726b1e4a24328a2f1edbf6ab54ac91232fd9af470e1684d54cd4c3aafc48c2535976740a62929c51a24b06161e872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784f5e529d28a24704bc98adf14c55b1
SHA18330fa46ef809806f6ba5b565ee418648278577d
SHA256a583797c99948c4460c43a012222a632042184878cca60ec0bd801f2bcd2ed04
SHA512ff0ed24046567023bebef30198dcc2edd090efa69eede7311471de8abbfbe0e01682e1ce1258b115167ad89bb4181399211e57df0071f656359db37c436c2122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bddc6a5ef3a9c1610e5afb3af7d413c4
SHA1195ffdc3a58b2ce897af42a292a5e3005610a4c7
SHA256d024e75bcc493efeb189cea440ccf1aa8d5dbf826e7a8c5d7835144c86deb1ad
SHA51289b2093af9469f621195d6ca913908256f8850e7023bb1609f1ac0ded3f3a29020880fbfe687ef3c24c6467b66950cd5e6c2f8bdbd4ccb9c049fda57c2d50aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fd72cf8c24b1294a0262b15ee7c110
SHA167d0f4b64bfed0f2e5752febd64afff14133171c
SHA25690a2dcf02172a9ba30bbcf0a9d4275c6db6a11db890819c6b032bfbb2b24b355
SHA51294ac0b50a1728873029c383f641b95c22f8d17e53b3f59e883a32f32e103e7eb477e2f38eef773a7675097cb678cff3c10639448fd5c3dd55f682546ac8a1831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7cf743b3585699caa9648a46f39edd1
SHA10b463c76c30f35b866b227e92ee633d48e93c17e
SHA256e643c76473ec560aa49b2c59d14de7fca9ca67f984e20038eceb421941c2a3f4
SHA512d0912ea8883ee2edf99f70b544af110ec59da13aa108c6feeee26725cc0d08893033faa15c9390c694bd303008cdd628e189c2730b98a5148d471c481426b300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e3341d6a34c653909c21b1e3c1c19e
SHA186b331e1fbdacd7596f8381f18a968bbfedbf725
SHA2562f157fbfb6c1d28e00b6617efdb6bab0d316fed089c9a255d3040e3f554d85db
SHA5126c49e8c5b3e804ac7d4258c586d61c950cce46f5b9a77b6202395ad5a6fd64a06f1faeb751ec8070d95876a3fc922bdb6185ff548d53e5357f0210cad7db1fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b7efc383a343e454b0065b662b6c2d
SHA1db77a42e35dfb208370b41eca240036a2c633e8e
SHA256686f5eb04e08043f8089d2fb656157d953cdb0e69d35d6ca1f55e107b9b73614
SHA512c89f6e633cc00c814fd3d38e104d6cd45a9a771ddb892b01e2fbc5645d9a8a8e311de9c0a850870f1d2b8cd95851892e5eef48017d28be5c241e316d46edc18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f164f152e5a202ddabb76b1eeccd8d
SHA195770f0eee9423a750c9c256c15afcc971f4cbc7
SHA2561350ae534944ccf61f592f8013d50765834c79947367194b67892c4c28af3334
SHA5123d8ca6202f83507373d2d61a24bf620c1fd33158d3a551aaf242199c90623634f8a74d251c3fe7a7dfc58ef2309cb5ecab7ff8725498c3911ea5d5bac52013fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1917577da2412e8773ae184b40a756
SHA1b11d986a12b3def22dab3f39e3425b8ef9b4e2ac
SHA2566a232f10f740be3fa5b0298c143e6ddde01fb5768512904855f73f318c0fe6c1
SHA512a2fc568e1b6c7425c0c47520bc26e58570b2db89b67b1380b49e847bbf4336f3b0016a998b14449b5c25da3a42527741aa3e989ea450749d2333e48f6c482bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe83f379417881ca2ecae6a3671a907
SHA197b0738d1f3e2a6fd688675179851bb75bce2181
SHA2568d87f18c4ddd7ae401f045378402c45a256732a866759b56be3059208ae22afa
SHA512b778689b6c0bcf0d4d9f8b16739a4a2f5f864042283ed17d430953f2cd6b2a54a7c1b5f00e5ac43ccfe6013926e22584f1dde0a0a0469b089243d7d20be10725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33f142bb56ae9d4baa27c68b16e909b
SHA1fe87e1300bc08f195731fd213485074a4424d2b3
SHA256d58afe46c7706a836cb775b6351d3d4c5f3dd603a74d7d3033f724df0dfab7ec
SHA512177511acc21faf2537329006f250f12c085ab87c567f6b60ce32c5aedcdffed89268e419383531948c8b35e72465e4df0d566ae3ea5c562911974be44f9bf1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3291c7ace90d9edfde1ca34c3085fe
SHA196720b0a0e7da16e75da77645ad295c398a8fbc7
SHA2561b9c6f50532430b19501d9f0debe21ef2e7d7df522e03d41d8e9334fa01d9719
SHA512e795ce596579931fc107c63b1c2c2e90e63187dbe19f453c1a111e79970474875a3c8ef5ae13f419fb572b667a25d351c6d26f9182325708f6379be93a4edaec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ac0fed4c5afde3c628cd883978bc49
SHA1d958171290db5e96defc486a194302ce127ffb71
SHA256a3204aa9fba207e40e0c1f459909bc340cf97cd827948875b26e7925547046f0
SHA512fa42bcf95f72cc86e021739a3b586b22e8ca7ba67e3e424ec2404eeda207b5e4e699b0d756bdf629a53801fd37682d5fa50876875e1b5a4053676454bc31a0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef2896ac7d1e320a685907f277bb8e9
SHA168761084004b7d8a59f7f856684b60e9287a68a8
SHA256317da4f79bf6b6fa3e0a672b6ea9b6497f44f216310f638e80a51fd3243881b5
SHA512fc8489c674fe2a887b019ed3c62d1b396db4dd59927705dd55a4b102c4c3018b5195430c71fd8ea12e2564d9d6e5d607e3885ac695b893a1ebc75124ae3e2c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66783f81a949253659ffbc42041da43
SHA101fa878d7d6f9978499841241e5d58bead69ec80
SHA256440b118fdb7cef401e4c8ca43c7d07b8c99c7e35a574e50ee2ad887dc8f7d824
SHA512a7d2bedb42397cf48eaef3e5a262ba73c575081007154ac14714140bd2ea09ac7ba8018ed4f96d09772f953ba7c486a36e3187f32a7cf1305e4795f340098456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52309f87fdb383b1446be226393741a
SHA199aa53744e9a27761eaedd9c76c78db4666279b8
SHA25620c5ab5f7dc611b0918c823e329c5087155500a6e9cdd6a47d1141a0186653b7
SHA512f512f007d7eb1bed7a323c0c811aad7fd882bd00a012d7ef1874da65cccf7c6ab299c3b6f32901c2e8cf7ad554f16ed24a096e81189b2ec8a014e0906313d3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51faf612bec7e56af966dbd6f3294737c
SHA1ee2f3fc5b1c5484251374041e09e3ade9f03093b
SHA256edeeabde2ffc1fd9b356356d73052b5a06c3c89aec0b7ae2df727255adeda2fb
SHA512c3334d0e576e3a2db59d4100bcc12861c7260aa70b56606414d58292064515c297c3bc67699480ebf74bd3b41ae24876ba3caa5a8f63bb48c6c5dd9fdec9cce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd5735dce075f477ee7e3a61f7164c4
SHA176340ce0bf331bfe2f7fbb730dfa4718a62df8d5
SHA2569a8f1e669c22996313f40e82a9b66c57076d80d177335277443ccd1ae755dd60
SHA512513ce6cb9073f12a3636c8e279ea31ba849652c3c42e30178e8a41a31ba280258019a4b674415acd8fd16214e46be5ee60430e607b33a2a1736043ce98cc3d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a9a6661cd6aca8e2a9ba06574c9f7a
SHA1619689b61a95dd0815c53ae585d65f79a306bcb9
SHA2561d338ff2318d69adf6412f9a9de8b67ae421b453caa1f6218e56d7633f233210
SHA51244e96b159324ea0b19a558377634c430d257019313f030983a46db67fcb6ac921ef32458b143ca553c0706571b1e4fb4c37d2cf4b3f1f3444bd0ef3349217a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd5aaf646318283f7d4c67f8f9a988cb
SHA170d6cf1ce9654f299c271ad1019b03432042b603
SHA256910eb2e3a3647d8c18177fef1e121e24dd80e7dea8340cf8a72711f40c36309b
SHA51261735b1c8df0b834882cdcc006f194092a88018944d5c7d8c712efa5b64a6612876d80072a2503152946e1ddaa86fe78dc1fad8089f1971616f4da0862958249
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b