Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
ebd6b2d8b004e66e00da3425912d7455_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebd6b2d8b004e66e00da3425912d7455_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebd6b2d8b004e66e00da3425912d7455_JaffaCakes118.html
-
Size
18KB
-
MD5
ebd6b2d8b004e66e00da3425912d7455
-
SHA1
6404be701435d25433ec177360020aada07739a4
-
SHA256
1e00eb6c24adb79df36e0c3ff1469207a0c19ae179a9b6accbb8660b09568a05
-
SHA512
5fcb07f5da5816465517659028781558c0e2aff1ae2d7369573f012ffd9d04b65de9696aa3ca5430c05c0930a7963d0104153d45e9c69e2ef130e22815723b32
-
SSDEEP
384:smlIc/tu483THm19bwgN6Z8V//gb5LOXguLZ:Sz8V3glExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009f8850b90adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000efb78cd9aad10a9b79974b097f384c9698d5de728d15c6b2bab105221259e9cc000000000e80000000020000200000007d55d16be919754055d60d69d86943ec4210a0fa44def884f157ffe9e105adce20000000e14d53178936e2b74b8a086faa86ff9be61c5a938d66b00fd4e3695cdf4f86ed40000000db2fa3542f451a4941d06c7a1851b6ae9f4e31408dee5a442883c11c026701513c18d6f6c5c98188de2eee0f76f6992adebab414865ac9badd2ac72603209303 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432928664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b8ef6aaf3ff945d4830bba2f9217346ef8fe040e11c82987406b4e5d04336643000000000e800000000200002000000054d33de2e62c7cd3183fb588074a93eab00fa9eea4aac3bfbcbc836f9af956f190000000f63d53ced8a63133fde0c2b43b033fe2d3b43093a3ada7d1e21b6298a9859d58116651a84360f693cd088c718174e6963134f2e6f2d2f832b3741326eb94fb4542abffb1f2507372989d1b2442b51f31b056ee43308b22e393590317f16fbaf8b2ef7d8867f268783cbdaa0850f27aa293bb3b64dabfa6c69e888fd143a5ca02015abc7e81363a9bfc9499a37725eb904000000057e9b33eb0f435383f1e1096534067987023e354d3046fbe33bc527f06028d917d35c6112dfe2a32aace6787ee2ef0e7c09d28269a8212286eca15c0994d7c35 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52873D71-76AC-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2324 1920 iexplore.exe 30 PID 1920 wrote to memory of 2324 1920 iexplore.exe 30 PID 1920 wrote to memory of 2324 1920 iexplore.exe 30 PID 1920 wrote to memory of 2324 1920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebd6b2d8b004e66e00da3425912d7455_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8facea2ddd13065d25ac41a7929342
SHA1cd3e1aecaebc5d2ed1b34c31a1eff00660bff060
SHA2569283655563e7bd18355b867eed3ff74917ee213fefaed783e767323a6369d256
SHA51225f8d9eae35b57ff6f1e0ce5f1ad2e17b1011fe5940b679040273341222a1989bf802aa925fe13e2603b00af8892948f712bd06bf4ed86355bf2d05717000549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553dfc3d6c1425df9b47eac5e01cdc48b
SHA1d6bcb9c7fc7a68f4e69ecd213a5e4c752dfa442d
SHA25651a2449f79444e4cb4fd6c0e95a5a057b6b798132c0cd86eb6f968e0dd008b94
SHA5120d1e0f42471aa64fd0876dde3334050be0c8344ac0355185bfb423ad0d42a66d06b8790d74bcf27e2d3cd87614a5617ec82675cf30c61756fa49164bbf5facde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be15ba35130cfe204faaf1a6f324160
SHA150680d2fb9f83a45f66e645403b5c3f446895b0b
SHA256682d91a50ef3c742b1f5a21f1e6d3d78a4538acf935c8ece64801d32300d564d
SHA512c7c58f1ae8df3dfd4118d96c24ad8c1aab25cff140268fc720ec2efc4d708099e6daab07bc777054fefcc09d01e77449e744d772c524a59051584c5ba0f96790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59797e5add97bd49df90bba0e86c6fc8b
SHA1941c738075462753fca9e13b5ffc14dd59564d27
SHA25698aebf14f2c7e5bf2d7a3ada4cdf2f9b960f452e581823ffc445335cb590df51
SHA51231d918955dc0afb499589d8932e5dc67cc4e6e208f584b5522f37bd66a72d875a4b1132efb7669f554a0ed147ba9a0ffa69ca6d8a52dd346c453a5bf2a042ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83985a60fcb98b3bbf00575d19e7c8c
SHA1606f668993e85cbbef54651e5ce974075385a5f7
SHA256a4da138bd78c9b1198e628a758c8814b34e55e5797e28956e561fda5543ace48
SHA51229bc39911563e94369bd777183673829fc19224e87c14dd4addc66dbebb5e84164acdb7569cdaefa09f01e7e1b169ddeca9550d27305bf455a7804af8c5820ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57556396f4c076b3b86427637bb2b370e
SHA152751baf48e78aad2c72f2d38512bc9ff162c648
SHA2565106db3e6421a1e7cfbed7cf3201c598223063b0c1052b12df7db93349ddbbde
SHA5123eac6b009a7c32b3df02d1321a973fa60e0a3130320961e6e70db8ba7149923fd2becec4925f8594de2f4121978d7d9b1d1a0e6ee42a35d4464dae4d05a8571e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51919113b5bcc0cf480f7c1bbbf3e2113
SHA129f571a2e2f91a512bcd28ba4d9408899c608a9e
SHA2562ae16ab30d455425ebef16755719f5b54c194f342b6a3c500ce10a6d425defb4
SHA5128bcb47eb5ca90451c1ebd6b2fc9fc84bad9d9591e35cf6c3c106e0c545a298c78ac5cd3038893b36fc671f7278216f1b8c737174ce1a122856be416291b3a413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf9fe653023dacf145bb1705f804ded
SHA1bc4c3f4da66b5296700c51561b16c0dda2944529
SHA2568ae4838d3120ae260063b018fcec9779f5ac281c655081974c9ad15ab153a7cc
SHA5126c8a99e008f7fdb11e38808ea16e6839fc145248fe51df8e3bd1cb86bb6cd7381642414224371549de5ddcba1b4a3bf6bc5ea6c239bc18ffb152bfb5553d92fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c57b2d3c0cf718d67f6a1128ae0d9c
SHA146cf8396163f36b6c728734799d45058947d10e2
SHA256268231fafa69674de8c2ae2cd94a51cd85f991788fdf72940e1d7598c19de9d4
SHA512a43209dec3ef531f1f7ee18e4ebd789cc7bb9baf3802040e810c352636975b77ea964e6ff234dd8a6677afe4e7be08e3366c2705bbea60680b79c7073b6d53a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507aa809444e9206f1bb865e4886de4ee
SHA1c9b623d0f4a6c2fccb713bdef0fe8d31618fbf27
SHA256fcdb40a12edf549dc94f6ab85c9bec9853f403fc086a481721c17c4216f1cd45
SHA51206eb3c093983a5ca2f1256c2a219ca448625cf1aa0ef2eed5cbe16d697a0e56d146b267121583d723642adc2781821f519a3dfbd8fb1a8e51846f7b8cb6d3935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0916b89e603970149aba0f073bbda2
SHA1596095e7a81cc3dcc288ae703f4ae5ecbf922d51
SHA2562234640c32c323c04fe704b34fb785f75793b0c4ac851b1fe0af1991b5c508c8
SHA512c02621b088607e8b39c41af5c3a81d3d7f68b129d1c4e91751d2a4e6fcef1b701bfc299ec1d9ae2dbc793360946a3f90d39a327c68076753caf426a4eb679fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d852e143c09e08f0b37379bfcc4f251f
SHA1e7c694df1cf995b446319ff833b9bfa502282657
SHA256000d0e469dff077fa120ac4571d3ca43affd339b28f7a19b620a72cb7b51a5d9
SHA5123ba8dac6fc77c5c6eebbf6f44719b54cd87505ca94e6f84b0214fda3e977b5da5fd8bfddc7e374436e36f333fd028410621f15d6b01b8c76b6969ceb7f716142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9b8cf7d800b7cc5996fa65de188c2e
SHA19d391e0b83052f78f76260ee1326e210e03d30d4
SHA2567c34423bacff57876aff83b329836df7068a22f16ddff836dc69c405e7303377
SHA5129e240da75337f3036e98dbcc66037abe903d1abd00eb5bc2de1c6e1d8260dc5136831181834679463ddd03e92671cbb2f0d079b862c6fdf2a81551c4ea7bce30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7757edf1b97aef1f0d89ff398d424c4
SHA105d14b6ac7a03ecda856219fd59a6ef641399283
SHA256a8ab04bf49f689cd639e918a65a5ddacbdd72cc36b6c7fc42431ec789fb7007b
SHA512c502e0d50295659f75bed8dc12f7f4e49a06864c307df7d1d5b5426cf401564341a54c1cb6c043830b72aed5dca74b2ee023b47d65c021bd85639a5890bd17ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76f5276f1d3b08360681243ad7aacfd
SHA18fc2aae18c2aa0a6d29656460c8f88900531d1ff
SHA2562562d23bdb2d2b41d2ab170b310665b6cfc9650f40a0b2eb33a7b68566fd0802
SHA512e184af6767fcfc32738ee6765c59bbff56deb2d74e31e27e585a550923134f57e876139cde428c2c17b96a3c98c64494df28ecd072bbcebec1289297cb1a976e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91e619bd273963ab17758aa547d86b3
SHA131dd71478abde0ffcb7f82a1d9cc75557f2ceef0
SHA2569ed85ef16195e2c4f5e5ecbcb5fc97aec21e152ed8ba906fc329aa0cefaed233
SHA512adbca56015fb7bdeec6fe3f2db648774579f7c4be68a85a25d17641cde3208892b82dfdc235438fdc605b54d94c192c315a38e20f6e8f5add2889d017d39ca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4ae0211f7f19c6962e9eb31c7c57b4
SHA13abadd8d80d1efcc05507762ebe4e412b14953ce
SHA25689796973d62cff1c38696f1468471682b66ee4d087b0edbb8ea5bb81cf22d649
SHA512ee74271ce4e418ea877bb8fdf4cde2a5b76925960a9db7a02fa1d3c38cc444cd542a63176cb9a7dc9daa9dac19e0f2ba486f7f53ecd50676854c6b28353df293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f579670c330de0bba2d6be691b37d85f
SHA11689f5a7479c4687c776845e0b058abd698c008b
SHA2565f99a70475dc4b974aac85ed56c1fa369fdf7b79907dd2ed75f6fe07ea7a5b3e
SHA512bc9a54395495350382ca86cce33219d57810b576297fec908234a7ef9d65b35abb5747cad02acaf21bd19c3fb0f52440f640e735279a3d53aad9020e8d4f2c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6c46c3f2921d4407d7353fea150c95
SHA16d7e092e28aa31abdb395f65d0c63f4b7194b905
SHA2567754e26df9965ece668d3e353f66e4752481311a75439f18ce940105c8a98f76
SHA512d626b1339c0895ae5bff8462e3e397dde43fa711dec4e29deb065e54e695cdf6c4e98baf69ebe8ed6ed315901cfbffe7460b33d4443d4211cc03c2df744ca574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb8983f62c0d4380bac256bd53fd293
SHA1162a11dfb4b56963eb303f402d70b85aea7f7a25
SHA256aba9f1cb7fc845451623a67b314838d5c04a874d687d5038ac6ef20046295499
SHA51218e71bd05dfc7e64d7788cde2187e4698b0c85bc3a192411f5dc8ab74f840a0f5eda469166db29a47bc899d748b8ad988ae01ae5f9a9745ab2ca71fb819a9905
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b