Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
eab740da305938b9a22b1bb21f913139_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab740da305938b9a22b1bb21f913139_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab740da305938b9a22b1bb21f913139_JaffaCakes118.html
-
Size
62KB
-
MD5
eab740da305938b9a22b1bb21f913139
-
SHA1
8e86ed4822322f4ee6c31f2312680861a4c4e7d2
-
SHA256
64e97c0b7237e6fc9d23b87c430ffaba5d8d8e36ae6bd4a2a07fd0c4144840be
-
SHA512
9a3ba87fe7517c8ab015eeff1fbff8d1ed149ee5381b89f2de47e00236dde515882a219d16f3183e690073f9f05de400ccba1200180bbc4df05a494b64a0e27f
-
SSDEEP
1536:GuvWKlgGW5nhqkeIwedUePqvtCXeAAfaYv8KhE0pOzdhz:9WKeGWvAfaYv8ME0pOvz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a611bd62a7b3f226b4fbe653019fc9d4ee6e0276fc9864de1dd42c7454400ce5000000000e80000000020000200000008917d0e370b5730bc469420def2d3ae3e76104e4df154d59d96984863eb9c826200000006010a35f95d3dcbe37cc3fe887bcfcfe1c07f3be8a1bf66413170e96b00d1b0b400000006cd019e9fe4903652299811c41ecf7a91535772cd3c2dbc786d4d0fc539c2a1143249c8d9e248074433ebc9dd1d466784a902e52babb71d1debf9b73a33e4a00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60108C41-764C-11EF-82CE-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502de138590adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887455" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002cff73cd7927452cbe575f619f5590a04558c40f666866d54227255150451fed000000000e8000000002000020000000c7fb1855de51b8b85c7b28d313e7c36807587d44bc58dfc5529fe5f4e33a3c8c900000005656206a3ff39d384d24e100b5b976be85f16a19e9977e78dfe416e56bcfbdbc543050f36946d0b256ef13a67ce4de2eba19ab2627918e5e66313beaa18f6a92fa227f1529533214c8bcc6a874000a32afed6c7be8c59913bfb4ed74e91128ade086e117d393c4f03d3e5f80000800b1db49a99e09f9ad4acff96352221bd767fc750bd21b616d76e1db2c54674dff7740000000aed442638ce7630cb40da0f6a2fc2b6db34d4a0558205702bb70c9e5259623bb04245f2c9df6497d80708ded83d55b3f4dae8288450fec75651d046e6986258f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2476 2976 iexplore.exe 30 PID 2976 wrote to memory of 2476 2976 iexplore.exe 30 PID 2976 wrote to memory of 2476 2976 iexplore.exe 30 PID 2976 wrote to memory of 2476 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab740da305938b9a22b1bb21f913139_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff66ad17ec711688f7fdfcc32caf42d
SHA133e9dbff30d73d0b7e11376e473a1a9de21490c7
SHA256be36c683b52bb349066becba64a88556d87915fc8149ffb169a4f6997169e058
SHA512bab4b006e4a0022a97ac0a9387c7b39c876ecb9e00503c62b3520ce392e3f30c487c2da3221eb51aad2b8c172aa6835cf8ae6490eb834106f040cc67905ba71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f245987ed39463036f38ec5ce7d6e20b
SHA1345684cc8021a62948f3201b9472204f7a2f19db
SHA25632059c3d053f1e660da9b337e09af327a79c15495aa75a4da92d44bf72a1aa9e
SHA512ca580348267cb18dde6120063d1ec81831f190f74c241a248bed895e463a8a0992dfa64b47952b31295be4c54818da30c1e83ce5851d5366790253e60d4dd8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f2465ce6791b939b5e72f4cb23404e
SHA11b0e6f22d1247cbd1a143bbf714ba732539d1f84
SHA256a8dfa29334508a7ea8da4243921eaf88c8afb43b8343a19e3c7c993a9027d0c9
SHA51232c9d99cef58a072aa896cb49aae0afad1ca0ffb9e046d1579338b89290c11188975a55a6cdfe576e5713aa2f7ef926a04db321a4f8b9b0937af03d58dc215a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e24a704c41959e1805539a499194d5
SHA1bdc08befbe73df4c6e61d0cd55e3d71a5686c78b
SHA256974557538f353be9dd19eb62e335415a9150a9f56c159305c042d89b8fd070d9
SHA51201af5193718eeca2d06d78fc58ff534451dd7ee13ca49f22bfeab3663921cdc53d5b95f59e87b4baf50f3b16ccdcb24509d134f367f91869e32f5086f6ef6e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7daae8e4aa7dcb5e567ae1024fc5017
SHA1c4c426313dbbfb2009667dce58b7204d9ae56c0c
SHA2569a8f5a427b039e0b8780ff780861fe1f88cdd5a714bc8baafeeb3469131211a7
SHA512afbb28ade34a63d852382f76b1925316a7065791bc4e34e47921f06a23c1002de237c3a64da22ed4f9623f8c54f7e16955d4de49764d29509b0ea00831f475e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187296e18b543d48fd0c4ca995d2a076
SHA1578d02149b3bba8269d23bcba687b586ebd3d02e
SHA2563f1e78d7f3f0af7bfcdc1adebc4ba104a0d52e786baa484105a6e34de4c15059
SHA512b25e7771d955c15bea284531a16e76de0dd87f3ce20078e5ccab39427ddc1759d91027331953dad0c145e2ffa7782ae790849dae088ef28a9836cddaa6ee4b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c270b81dd6d5e2ada264bc0102d34916
SHA1a5977a9ae28fafc0735eedee9fd36212105da925
SHA2564e4e4d8688bdaf4b410a719972741b996c9e564843759df41a58b3f10da9fd2a
SHA5125fde6115564fa4c28fda975b8145ab76c8c15ef4f61c8e38b4c6cfd79983e867ee6dbcf456fabe29125d9616c8d12ee3189d8d4e44cd6f0801607f5c341fe342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b24e5ea5194c291db87c38f1aed42c
SHA1258c9d9afca59cfc8f9123ce73e84bfe0cb4d389
SHA25632bb5adeb53c65ff799540b01257e246aa56f935ec8749324da63fd60cdcc0cc
SHA5126b7c7e471e7627b18ff49d44a59953cd13f569bab0e07aa9e1f826bd4754eddbd61434600100696787cbdef6a0131294a7d4718e9470a648739a66d1b0bff3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506dd064ec1c62f87fb803acfb6596dec
SHA19b20a6059388a2cd396388a4272ad13538b35e70
SHA256ec23f56d821dcde59ffb9a6a6bc4ab041a24cf5994fe8ee93172ba6066a10fa7
SHA51241af3c0ad23a4af6e1cbb7971755e709da339eb1dec96de3c45a2a97932cdf4f2b0c58594d4012ed3c3c1af5d5977692f1861dbc174b3a5e65ab07ada7093b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563fb8061f011f394f4f0de6c2f2e0d0e
SHA1bc7839dcc9b0d6ab2b9112a4f42648d5620270d9
SHA256e0848717457bfa7b4ee7019d8e4fc036d04f006e58dd063c9a314178e0abbe94
SHA51208c1644e211da615bf5ccc41d4f2ed1d7830d7327d037f77edc26f9f435715bb9e13da6b94801f50835d4b848313005aaac86732a8540b7c3800e357b8971beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150d4550716319f4934df89a5ed4471c
SHA11526fdfa3b0423a74d0348e21902f2ab1beb55b7
SHA256a4c9c3e06fd952579f5cc988f84529cd486c3bd23383c2311e42eb3cd28384c5
SHA51278c67304c879cf091357eee40bb906d071b8c71b1bae0b73311c9a2c67b2e1e49a7ac7bee37787f394370f64130df5d830dbf1c21eb659dddba40faaf17eec24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559907d564b268df9c63b9deac9ffdfc0
SHA16678da116bd0d4cbc8036135f3885c93324c3861
SHA2568e55b9f8d76b33ac04ba8cfec683817c59301b87cef6daabafdd9db5e1c281fa
SHA5123946a57697c5ebd5beb8c2afe5b0fb409220b2a5ffd8f1063ab788aec3f8fff94426abb91cb96f5b59f05b84b514ad1650d53ab90e50ef79c63c0c88eb93efe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab18037eb11d4ffa6c7ebf9860a824c
SHA1e93df43d598048fe300b8c97a94015213d6ff799
SHA256140ffb7f071367741a902e5605e11dfe7b2b3df4a6de3826899daf1ade9af203
SHA5125904373cf40b3a02ba93c916329d5b88842cc16dc0e3b4ac416805c6db6351ddabc755ae368a973a27b2ba5364f6e4f3ce4de8057bbe9998921d9d5c10b4f1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790d38fbb6b36ea4be5b41bb8021b555
SHA155ba04abe49e7665559d556310de7155b2cc43e1
SHA256d952f82113de9aa05ed7fcef78bfeff3755c996bd8c0133b3c104cb4a9879891
SHA5120d163158d5c9b1d658f3e8ca2a4c38d9d10f79242c2060224897b9b5a70c2127ca053242955de0fa30e647f9ce12d9436c70ccdd707cb16a0300882ed35bfeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e45033141586083e47c7a3be1e1d66c
SHA1f753da937e0998bd7970d523f8652e50b7cbdfef
SHA256aa4a0224f7d946e099a193a3bf8c88a126879066396e8c155e9c22dc5907f5c7
SHA512cc060a4c047d860a33b264d794571010f880f79eff597b902afcbc73d14630ed6800188333c954923eaa720dc86b949b3c966b8262f3545637c599769026dd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628b45d6f1241907a8f3a4ce9df5634d
SHA1dca70b74673c71ac0326b394cdeb18b146ca5cd1
SHA256f4f3ebb41bafb4cd0de172e3c0be626028824c7210bff00b60254fd914d04dc9
SHA5129900528f990005ea5aa4bc257f0e37153489b511dacb14aedc97330a0bf0c4713631db69f5ef88e896f69f809e88081967a1e63b04ab5311f6b01732a743db2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8443b2ee21eb9b7da3dfef0c39dd88
SHA1ca216da61bd204919f853f6450a7277f0ed49b82
SHA256e82107414306825d2438788392c75f1db9f8ee02e9eec26798c9bf2b4547f552
SHA51224648dc6f568daffb057fb635adcfd2de3aa0fbc9312945f0fcd839b959b5641196c254a8e3f6e9f36e3588c8fcad79e9beec69df68957e417eaab3ec2645b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df86b2f389fb85208c4d14080c68d664
SHA12ace84035de9821642364bfd9396ee0c2ce01d1c
SHA2569d92e32b830e8034e61826d5e9a5dd1ffc593b37a7ddcafbde012ee93f79e88e
SHA51297e3338bd9e0a28f6d3a0a1fe4024e50dbf6af10fc00fd961f65758c926025dfae78b3e7314f2d63a91451cae26315cad1f1266583781f2e81981fa6633d788d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967b47055410ea372f536d81559c36d1
SHA19c58efada629768653e0b260b1ffd54f060696c4
SHA256ae80eb10b9d5a9da55a79cee52954098481b91e57cfb1c1b4ef42806df01c9fe
SHA51253a3cb47b673e291d2a2fd9dc3f0603e52b873b53974bdcc30bcc39bdf9269952d1dba713afcbefdff66df8a5abcb6c78924c484fd4025236430f43871668546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e39e01a5d54bf3e3ce5aa5e4e9eb1e
SHA1b0ad079b4c65ea42c760086c5fc422dc2e15bdeb
SHA25658220c5addd2ed90bf36fd6b9ba1624d13cb3e308265f3f3b169c3795e9fde66
SHA512575e6fd1dc3d51e4a2ec8a32088fcc4478cff10a57337d6feb851552bf61e883390d15e3b4809b818aaa0bee871b1ff6176aca4730894c2ffa3c061027930786
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b