Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
efc437ca137638727948f6e3a165899b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc437ca137638727948f6e3a165899b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc437ca137638727948f6e3a165899b_JaffaCakes118.html
-
Size
67KB
-
MD5
efc437ca137638727948f6e3a165899b
-
SHA1
57b22b1af2c16d52ad24a03901a6ed21895b5bc8
-
SHA256
580a415e3647d405e8100e7d83876ab6a5a89933d16eb08a5f18e8dcceda5d16
-
SHA512
c9e5c064e4f49973b6ec66b4ac119915ba6fb082a2755e4935b3848bedc745829e1bb95a027a050fb5d109a4f5ba888a9916f862deefb907cd62995b3d6b3918
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6si6OSoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdOTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6C45F91-7812-11EF-9D9F-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000da7c88ac6be7979371626dc6b61034ae4f9f7b6c3da255cea76b97b4c00f8f0b000000000e8000000002000020000000f3124ffc13141a494a0a361c65f4d6f7d7c55d7a9a84faaff24c2d45b8d6170f200000006626ee9bb812146ee766b10260d87c9c90a7525b564b53c20f2c97d9d9344509400000006184ca000c7a96b0ad6c8a1d92a605dce0d2cd659528b205ee1dcdf5c52f4b12ddb4b6dcba84a0de782bf17831ffdbeb0714b1813cad7530e862d9683023a72b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c82f8d1f0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d229171eae9bc55517c50b622a7b63b89ca99f7ea97a8df84d5b1e692e0ffd69000000000e8000000002000020000000945245a6e684d18d5ba86aaecd5da8feb8e2ecafe35311edc86d245d0c6ae1bd90000000f26148af441be4aa999e274b27392478bbc98b930284539d3a171647c1b7f658ea210863220f74e3943b9b19314b655defa96a1fadd0c09850ace19b7ce4a436f02f9662170efa4b16c809ca56b2727b9ee66b6a65f85107ba940ed1d2680af89378137a56d0e6042c4d432ac89dc99cbe3cf5e10f3bcd55cce44fece963c86e59ead6bbcf2836b1b81645ac17bffec640000000bb82ab598c650534797679ad98f1227446727d001b31af4deb7eacd96fd578d0f9f1a5bec8f35a47b32019dce06a22b5102c8cb1a1feaeaaab1357ad00fb7648 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433082591" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2348 2524 iexplore.exe 30 PID 2524 wrote to memory of 2348 2524 iexplore.exe 30 PID 2524 wrote to memory of 2348 2524 iexplore.exe 30 PID 2524 wrote to memory of 2348 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efc437ca137638727948f6e3a165899b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc41c8626a74a3e22d7e0909101945a
SHA1c84ddf5e043c83b3c56277ba3f0e67c6f379c122
SHA2560b9fc2adf8e0547bc906b2c3a1a27b952285aa707e3a75dc1d5b1809645eda52
SHA51235c3c3c61cf21385329e297e9aa38479b02053a7385bd7b1a31f01fd7aa37959def85927f8cb9cd52c83b176b7c7a7933f79e0d5019d80e049bba6b67638e962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52251e5b301f552e4c6db1fb75325768a
SHA196738dbe38aebacb995b6f580091225179316468
SHA2566de965a5518b93b7a6ca071f666f35c08c5f58189ead248b078fd1ff34660275
SHA512a78360736038ed1ed32f8affe82cbca886b749a9a23e98bdccf29e82017427604205b8d0fab7aca8abc0ffc8cfa93341aef601e2e23b894f1f10636cea743873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5a22ee8750d48ace38cdcd9bcfd3f0
SHA150362f8fcaf674330298bd1fc3e83a2fae3946fd
SHA256fe22b0f3fa78a06ccaf1561e64f90c08843c49c984f51ac1928d2c952194c5dc
SHA512f55d96d8e6ac2ae084e325b1c69d5fc9568a44aa49a0ff2ba45dd6789f8611879f18c1bcfed790f16f117094209bc891cda9cbbb6d14c48ccef541e4f612af6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f4d9046cd32528b4a921ae0c7e620a
SHA1c334c2b8782e315ac017f25be19d26eb3279f47e
SHA2561336e5ace4cca3001f8008cc5406ba3ac03c3acf81ed94fe9f91047df883fa8b
SHA5122c12ce26b884671b5d0d4f1440bc48a47c063759a55cf13a9afa7dcdd71cc658164481bf8e1734e9c010b4bbb4685a8f29d296855e54f96e87bb0e16d51734d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c87fdf1a054f664ee83eb14fc9e101eb
SHA11212e1d80a5dbc002272ede06f05d625fe4b3a3d
SHA256df2d7e34f3315f5a20a865b7eedfb57357c815ca5d01160f976541a59e53fef7
SHA51228f05ebe7f51aff343a2b559d34bdef134826a9b9e37b587d4baace442fd7f26eef475712bbbe401e4c2b46584913f9cbc27e7b01782c2904cb8e0ecb4321477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee95875529a2aadeddfcd05379898b6
SHA1aaf6d8a7c3d1daf15bf781ae8f1494c4f1f333d5
SHA256f36cd5bb98d78d3595a5c5b5ea506d9fd80a04643437391660e8102e4c56a797
SHA512c3b529f75a1e76a77269797bff1c00a453a48699f5d452ad9c8bbb82f05861d99ba01844f9670d882dab694329d66a972c9ed19069e571441da5b4cf0b01fea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f192bf0bc36aa434f5a1d0147d8a24fd
SHA102fa2c812e6bf9cbf53580a7fed9146be02c47dc
SHA2569cb4676cd31a1e7d2ad9b168f53f517a165d55fe1709537f8567f91395278074
SHA512d56387c700d19a34a0d07e1aa8f4305b0c7068ecd82070af2ec2c80895d1365012c5848838b799493a266485bfd1522b297a624303dd1d228688174823f1d510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203e80ce1a842932088aefd4537819c7
SHA1f04b6a578b0dc6786e18ceeb6483af9c80acf0ee
SHA256a855ebe01d4d01eaca22f41814675812fc5a4e37fee75379ac633675a8432f65
SHA5124c78d3e1a17e26026acd53ee42924a161615dc2e391c1e4c920f7901f19c17e45920c4517b19723c96aad54a8f2dbc79a985267bdb1e3862dd60910765353567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c8f8cc76d4abeafcccbc8b38f16aed
SHA1d0a16ac5694786025ed299c6c554c8cdc06e4a81
SHA2562fd7381428ae25a7454a3aa1634e1b7f13fad0846424999c4f29b6d2cf55361f
SHA51251f0dab134fc07cca41b361598e882923a2aaf423ba56ed294f0d982355115c849818d03efde06cb8d41040f18448898587c1757e8d68e7b7a32ffe507064307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0f88001eb768d6dd617001e7bebf9b
SHA1a18792be40061964319b9907fefec1705244217b
SHA25690ec7690fb8a5ed1ad51312336a75b5fe3ae8f29bc69ee9006131181aa0c51b8
SHA51237a66a7da6e6a4a8af600771030f9bf6f412a1da1ed8389e85e94af896cb8791f4cf4007347e41e02b483012976868660bc60e29ff52f26a3e84b124ab42ab97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57920c72add95ff5721b796a67b0aa956
SHA18f6c068c117ecad2b42d2ceaa847ed1d73f3ecac
SHA256ba134f02829bfa392ad8e94191594c3c12004a900ea5ce3c7dfa7f97d898fe35
SHA512955903620d70301bc78f56a942722fc99a288cac865c38b5b57b538b7e9fb4d90416fea41091a065b6aea0ee243c3c1e289c10a8036a8f6fb05ee4a6a05ade1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abe9174081daa7edee5205e228d7774
SHA17fbf3882caf057b7fff5b58b4c7414327bcee043
SHA2567c686d023cc5dc45e6fb8c1a158b5feab66fa664e36374cd5b6c18469a57ac70
SHA512ba27197044f8c68de966d30fcef026cd853d329f5d22f53874a4f262dc401a47e5e437d38a9a803f2ce89a2d171dd2b98f175de39e367e041b8370780394350f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e19a6eb606b9462879549d9947ba54
SHA1aff0f0ac0546067bc1f99a530d5b39d2f413b07c
SHA256fa5b29885833bfec67a9f1460a8ce6dc27ac266ded812ea55845e57136d5999c
SHA5122aebae52f2f2c39da39fab2f0e53718a7428669076632fb997185e47c9ec9b8f22c0b10a3821c7de5892cc6c6990dee4c53311d0d5a0f5acd6a85821f15dbd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc1f8d413e19d8629fb4dacf001fa0f
SHA1068f4aed16db09295a6c87363e225c8cfdbeee92
SHA256c8a648b3aa79218821c691d662777da61b5ef12332e14cd050f945ea0b10b1da
SHA5129971e7d616736e3d322644d89dcf40f78f3b0332ff009da897e52bb207f0963e38d15f9e714ef6242e574f9ace4df6411471cdbf85c493d3ae9aa1c18c26bbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be47d98c05b647a78a87d1aa9233f29
SHA1e70863152cf82869440aa6a81c9e5449b6cacb26
SHA25695c2dfb803783c6d4e414faf168623db7ef11f25988bcd44c699f88f9e917a26
SHA512f6f272f17008649aded8db7128310add87c9727e6b612cda581ac8a81fb806209ef164d7bc91adf909a85a684d9c47402dd576587c2e37950140eacd4134523f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50520a46f35baa658d6740b82a9749f16
SHA11ed9de5854d9ad3cf1c1081bcd1b00866e9e0687
SHA25654904aa4402d0d5c3bf74170593eae897bd7fb5a69e333a57831144bbcf228cf
SHA5125049b3538a0acdff459bad67db8579b5976dc2c356a8cbf38aeb13a41c98d9e64144feb2f7ec6daf2665b6af013825294c9359f10c223f5bd9fc7a65bc04b8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df0ee0a681127fc71a9c7a1ec56f2bc
SHA123d622de36c4596114c0a578617c722eabb0e49f
SHA25663bc9edd6f25981f4aac1f683cbe3c2d9959388af2c18045e322b62b56aedc04
SHA512c4b237aba7850761c40dab74840b1b319cae273e1f4d203d3039da573512e831117fe00dc5685ce1798295c8c4f203a4beac6b61bd00834a2d074bf96b42a2f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922ab64cec82bb96dd4c785053a76061
SHA1732cafe37f00792d5abeb5c61896eec1c9fe0461
SHA256230a714acf511e6d222fbd527c2a4197a40910f0eccae270c660516263df6729
SHA512cf08d68796fa6033dcff18111baa67b616676d787d5e7f0fee49f8385beda51560587209a94787f7a71329c3659c2ebe551b927307c3441b1b4950c620f78682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fdb45f1fa9dc3b86179f169fa15075
SHA19b09937febab2c21da016e49e18a71c997ef28aa
SHA2564fe5c98f5f886b880ce5962af31aec92794504b296751c7628b67a259bf6d7b2
SHA512c81e885c7352b53ef22ec620d918adf8b770b84ea9a1d63ce46cae33764909379e8054960281ae6fdfb93093bc0ee9205c172f31bf336799f9cd0844495b0199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db27c9be8ff87a98cfcbe4a9a6c93f8
SHA124977f85273ccdbe4542eac709521ffef4d1b6e2
SHA25601b9100eea9e2283b3072dbe8e21471f246a492ebd586ad19daf41847a6fcc05
SHA5121c93e2bd35655ed532be83fc40577d8b6babba5ee8cfaf0064d0127ef0eab0494222c4ed4ff05d746c093536114012562868d6b1ff06f49849bbce425c085fb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b