Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
eacb889fe17032cbd1ba6b02567140f3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eacb889fe17032cbd1ba6b02567140f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacb889fe17032cbd1ba6b02567140f3_JaffaCakes118.html
-
Size
26KB
-
MD5
eacb889fe17032cbd1ba6b02567140f3
-
SHA1
09a6cd658f61ef3be08d0cf8b3751a2fe70cc543
-
SHA256
866edfc97be18bec113bf00a4ffb20b729a3a350d04df95b292e33732ccdcd99
-
SHA512
35f1d179ed067458f4c00eeb58bf69ae12b5845ae1f55438a9de98d26853e76b87d4d9d14da5c47e3678d07674fe0c2be0fd764612df3539561cdb1c666ea347
-
SSDEEP
192:uqenzkb5nqOnQjxn5Q/pnQiekNnQnQOkEntH3nQTbnxnQWCJVevo7NtfFo+NzQ4u:nkQ/Lygcke2f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006aca638d2b1b303b33acc4919c79f13860b1fe48b54e39fd2bd06186a5788f5c000000000e8000000002000020000000e9f9532a27f5e8cf38fad9b3064a578fd754cf6a3a6e71e406fb0341ee66f44a900000009eecf01edc2fc9de3929727bc4e068707aff176124c269e712b0be2886a2bb2f092d6f6d5f5cb56375d259109370a2d068141fd1d142700724b61d344b5b1c563fbcc531c3a987506c94e499571fc5e8ef5385e98dd359728651044f1bbd9d813eb75eda00d9aea8e2c16971525179e50a1041f5cdb9b4cb1ac304e2775f4b13126eca6fe2a41a87378d254423700ba6400000002c2c326503d2a13cd6892411ea278be27198e0cc1be2f9c70560fcfa8b1069cbd587c94a6edf78c0d9cbfc3fd8a5d61e2139accf586c5170ce3c5bdaddda2227 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B16E5D91-7653-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d406e078756e4fdc10cd3796b68a3cf7b8073424d8bb61ab0a5414455db443bf000000000e800000000200002000000000dddee6009e166fbb2a59c79c3f801cb566ce01a360fd59d7348c94ef6e7a60200000007b5e028eddf527a956048ca1a4fd35dcc21a2bafe6d95b04734f55bdea6b9c15400000003b6a5d5e6a5fa91464eb088754a2e97cfc8fbc12572d64c542233531dd7f3a92add2e15fb4a11bcc98bb0738ff658720838593e1661e5dd414122431e7aca18d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ef0d86600adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2372 2084 iexplore.exe 30 PID 2084 wrote to memory of 2372 2084 iexplore.exe 30 PID 2084 wrote to memory of 2372 2084 iexplore.exe 30 PID 2084 wrote to memory of 2372 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacb889fe17032cbd1ba6b02567140f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118697f6f6b8371e5a871ea185bbc36a
SHA18aba40dd3c768ec5f6a3531d805aa2c0f44b437e
SHA256db1e8b3eb0fb7296cf028d82486e6603089d56b07830f4e901499794dcba307d
SHA512b70615a21670deb85baa9292e9f709ad7869cc8448746af42afe956b4ab4fdfe0a263275472d7e075808529edf9ce891f3d40882d17c402539de87cc4389e4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d381c6dd3a1d25dd77f261dc9c7924
SHA1c86298ee5d1646183c5a15967aef5e041fdb9dbb
SHA2569058460506c7477c9eca1d8b6bbb64f9d998d4de98d903ab2243914f2bacbdab
SHA512cdfdde43b92d81786e95ce92480622800eb37bb9aac88ec0a10a7073062204a8c3767bdd4d4a6514430159c2cfccbfd05d4a364abc851b4833d05677c635fab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a2ab710313ffd41c939783c8319d70
SHA1f2790dc9751fa53b7c76bb516d5b83bb0154e9ec
SHA256174de1d323db45924a6694d6f5d8cde793f6f2a60cb826de85416c77e15b68e6
SHA512b8d4c0033dd9e7bad0d143a79b9f2b34b05df46ad7454bc77cbb0bb00aae53943888590bd716e95650cdf01371439b4f6a22c53506159d4f2fa53afde32e3a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ca9fa98a6a7e5545cef11eb8941d45
SHA1ca516e118223d3b716e103c0b560076082cfc9e5
SHA256b90b5b6859174697d8b5222d748f181ed1e93315517627e86ae15bdf832710e9
SHA512d2214d591515d4bd873243e0d2474275bb7f95b57e1ab7d82f64d5da9b853d608da7ec0cad8e80e64ed191151cef3a818034411dd3a85b09408c7291dea21389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353b1b241d3164062ab45cd97cb4ce32
SHA1d127f088b7e5395a68b011a6082b3ba13731967b
SHA25697d43218d720cf77c13b0dcbe3b05a8a7f7b67462e2562901ab00da1f85aa5e1
SHA5121cbfd356afebfae221997cff6ade3ef93983a1e30e5d0ad14dc6da0598f7da9cfd2a60c23a613511d53f3a237047c8b3ca933547fa3334c9c13dc6f042f789ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185634dfd9fa0ad36592d422e3346c16
SHA1dc301ed8c18110871259c206bf9436736f544eb3
SHA256dfb95efd8b45572c3d4495c90e2b2741defd71cc66ec1f328cf029c2d09ce0d9
SHA51232ef55571f8c831f3188933ee9033fd6195345b1bb30bb04972f43568ad5bbff980af36bab223edb89e5c802e236dac200a6192f7dcb4c1ef71ef1f035824cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fdb3c8bb6dac30bc9464f973ef74f60
SHA117903911d0b01aafe4d366cd88588e68f5bc5f22
SHA256c939f061ae52264bda4d041b5a19b3e437809ed3f8a00bf6e34da9fa85d60be3
SHA512d1cabc55110c86c56e9bb0207b2479818555b9969c262ab485567ecad5e72e360e4417a3e63cf0ec0562e50b46896ecfba4820da1a1c1e42580f8efeb66ad8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000d4de525d7b06cccccf2f722d2af8a
SHA12f73c2e0ee36881a751b37e2fc17f9af31c98f6d
SHA2564e7c2d2d8cdb0bc40e36dd422c90d942f019690777e83c00d6e331c3df923233
SHA512692c2cef6dad3ab2fb27e3fc3401a4c6875ca31c6a898d8a848821fde06d68434064d5ba464e0433ab894869661955623638fee029ca71b5438d6977f42e661a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af7ab7297b6963ee907ef010b2f5605
SHA147b3c987bf715f5284385431a7b7445a55e53c24
SHA2569a04e224c17b556c2f0ed262581ae05597f9a68395c445f8d18efe45f7773136
SHA512339f9919ae8b9fa72e214b07676f8a8c5f7b785afa1cad18e36b09b2919ff3c8e7d1514af40c6cc2c5e8dec84f1cd92fd924ada4a470a61059342d829bd1c6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c06a790243f2d0bae415fe9614b370
SHA1cf32b5f9691ba22a45c16492ad7ba8735a13a2e0
SHA2561f9bc2a324690c03e034e486e516b82609f390a03d27bc6a07c7d6f489b84011
SHA5123bd03d08ac0a750ff6a1ebb7b317576d443b113508e4d7da1520d80b647e5bcaa01ee9747fe9d3eb6ca4b27e37d990ec503638341e5dd536eb22ee78b6df91e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea42b3832118c359f6620bafaafa5f39
SHA10b680f8db70cb55252f6f209a46d18fb52faba00
SHA25621545053d0e79663e7c098c6a32237b2d49bef533359e054ca6cb2ff0b4604e4
SHA5124e4e6e2f161d0c664c00a66d034c5dfd984eb851c1ae69820f78582b0b094a96af9826c7440c8fc797e02c79a633460701581b6923cdae8b3f14d5609bd2237c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928072061c7e28c1368db5196fa07fe4
SHA18f0871887b210adc782e9cacc293693da035346b
SHA25649aaffc0a257848099008ac824f10da19ba971bd1b419f9fdb44962a8ee38b87
SHA5123a761a3f5516e72628663cf5084d560ea29aa549f234bae987de4eca51093dae323c02304989181ac91435b347343b82192238511e0de23337665d789d2bc558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a5e3ff434644113c98b6a01a1cddfd
SHA193d35b8cf85a8b4cb2f40c7b40de6425a21af186
SHA2563218775aeb4946f2dd1ed18d0ccf62f94c5946d94e7c2596d4c8e183f782f0dd
SHA5123b487420f7ebf1e8c8b5c248a8b5ab8a497ae59747ecb60ff2c1e6c714ee1d86ed93204685d45aabe37d14865777ac5b01467bf6472c69615cd248a40a5b4bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db05dcea188156be4d2765cb45e4004
SHA1ab2b513b98079dc52e9989680197d6e4066e07cd
SHA256404852426e3b6d3406b83d9f000ce2c8c95b2b6cfa7557c3ccaf14a50c955255
SHA5129b6dd4c09f31e2333784b881ca407cec83f248aebb564dbe95bad4b1093473aa2df6c4a994248aefa2e00a64de29e05287004da7a20f8ab79313b6b154dee2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e1cb16ea2d1d6e9a22350ea5372f07
SHA1ad0d0d444c8287b42904a468aee664a1dc7bf0d7
SHA2563d3e2fa8c480c6283e953b8a6b4338e35130d1c17b0bcaaa807a51d445459c33
SHA512d08b816b795d13e7dc1607eb720b0154751bc36c3e512f0cde2ab4706af43b12ac640b8b3769f9919a01be195eb8c9562d919ede635c59adc5cd59f5779fe973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53618708c5490853280180bb3ac3d0195
SHA11807e11492ae2bcd7adea1e4eac85903354b2cb1
SHA256aaf921d9c7faefd9025e812754b2193c1afb19256a64612df972caf3bbe8d3b1
SHA51255e8b0fb6bfe252bd82083f81faf00979a39a5a0c614540555fdf35bcc02e1521aad49ebffe999009ea197e28135ea83d5e775ab52e670aafc223ec808eba721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272381eb3861edee4fbbabeb2ac7c8f6
SHA1b0880c58e33b155b2ad3f3d8720cb67f81cb812c
SHA25684d7b61607b774c36ca240f81d412e6c5bb219d87cc97039bbf05dcb9d9834fe
SHA512b03f86734cf14af7d0508e44de0c39d73b808f1e9a4cda304b39a9d40a8ee6b6201305bfb38bddf1c17e47f95863d2d4c0419e2ab75aa8f84bde6d6dd0a13906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd612d974d4b9c337a1beb0175ec579f
SHA1e553c2c008f12e595a4adec650f01faed9543e4b
SHA2567ac6b7b7a84a01634793b498d81dd64b56bd488d985fdb299e5f8d2134f41641
SHA5122807d61df83ba5e356e7c4b5fa37b5e0cc53545a004b039c5916b7070554b33a006946ab6b4c22862b0938db71ec6c93f7386d241fc9997368df6cb53271012c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b