Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
fba5308c0f35150e243fd97545abd4dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fba5308c0f35150e243fd97545abd4dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fba5308c0f35150e243fd97545abd4dd_JaffaCakes118.html
-
Size
688KB
-
MD5
fba5308c0f35150e243fd97545abd4dd
-
SHA1
c005f79c7a7ae800e2bdd8b0b3eed0f60feb105c
-
SHA256
b17667a3f738b81a239db9f37c11d9261f19a2dd89157bbb53ec6098ce784fca
-
SHA512
5df0936353741e7bed61ff0eb6af85d249f2f2545e8f490a04a75b2cdaf38b0479f01361dd4e70397b1a5233dc9cef9eeb96e00dc90200b29fe585690a082bbc
-
SSDEEP
12288:X5d+X3R8mU9jFv5d+X3R8mU9jFH5d+X3R8mU9jFB5d+X3R8mU9jF3:n+Wt9Bf+Wt9B3+Wt9Bd+Wt9B3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433665100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e025460e6c11db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000002fe114cb30e1e6c386beff83fb9f9e58af545342e4e3fd7c477f6b7e7aa095a4000000000e8000000002000020000000f766919a56b272397de0300ae02b2a73cfe0e1b51867017d6183bdadb2a2a62e90000000db4804a6cd9ea928dc66c96bef24b931f8b59b79016ea19147840547ddfba0c0082a72fc53d414c1397941dbb430d090b5c50be80bd492fb7c300cc2b8f11132d3269c361e0933d26883b95a94dedd45913677ff216297bc56a29f9f288390b3fdf53e2c9ea544f74b895939a1bd7f2134c1f6245ed8bf3d8fa12aab649832caab9a3679f046ab3f69f3eefc993ada0e40000000bbd818f0fceddbc23efc04004b2340e0e26a173732fc35319ca9ed15e2bdcb15b00b900bd604fbc6b57ebd0396a175781fa0d96dac43cf698fce6327598600d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ba405411ce7b1989aef553b4da50bf997d998ba5c6b812a3d3f47bca657f56c0000000000e8000000002000020000000febb67e2ad61dd6e9e088a7a135f98954b50aa978ac04b8f6b10f53082f959c220000000a9d957cb1b862f755e61c3c5fa76afe50882fd3fbf3945fce8c8b501008f449c4000000032c69f54b01b6038331d0a58b33b6d78ef332c2956d7ac69ecd350a807e005b6544133fad6a44804a2ea0a0230ff2e00a6ef3febfed2945ae483219e43cf67e1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F81208C1-7D5E-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2684 2088 iexplore.exe 30 PID 2088 wrote to memory of 2684 2088 iexplore.exe 30 PID 2088 wrote to memory of 2684 2088 iexplore.exe 30 PID 2088 wrote to memory of 2684 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fba5308c0f35150e243fd97545abd4dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0c070a2ca6bd31e9aebe947b55421f
SHA15a44a00b99e11753c45b669dfee97daaa63e3b1d
SHA256d14b91c4c45fd2dc9a0e7d053043ae68a9d09c84128475bda872e82f7dc0d86d
SHA512c4d16fa4eb4b30225e849735611380ef23124eb4d8f135941ae9a81e8098a80fc848f8b531b52099a7560786194b32a431de2891bcb10c1b9c93ee6dff868eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64b20a0b6676f8f11a9c31d6241e487
SHA1793d967d42052628a8bf2ffcb084b0cfce53a65e
SHA256819d5db8c37298cafc6ecb558aeecd8ef2dd29fa93817e1f5b347723000f6022
SHA5124c04ed0c807b46c0ae21fca9b073d5d1d04cbc21d5f5bf1abbc94aff3fa7f49e6844b87b59a4a1fe253a5ba70316ffa8c5ae322bd6527cbcdf999a5f1deb92de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9310eb598148f3a3e3a27e06256d92f
SHA120b1c63ee615c5be5e858ab54b5874aac3bdedaf
SHA256dd19ff0f40cb250762ca3c5b9f6a3ae1b156321a644496793d893d35fe2ee658
SHA5123110e13c9a7bee3c35df1513896bf6d965bff665f140223264d6e3721cd6d25bd31dd1fef3f5e3880de07a0252aa4a0c068e0f067cbe5666a96f477362c0faa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab792e211bc556741cc557a73fbce16
SHA18346f9b69d06e0ba456b0ec23590194c9386f4de
SHA256343b90ef9bbcfd1c3ab334e760ca6008bb7f3c760bbe2f151f9f0b6f939ad590
SHA51239cea5e71c343b5578871fe6f4784eee2fcf3866a0305d8efee956a831ec7c5d451d9f62e23a1cd14a5775f17612d0778b9bd3ea9243f41c11de2d51a5bb8496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b0ef0bbcadb8064ddb9d9a4f1fb7ec
SHA15afbe89ed019db29d387e547a220867abffd4aa4
SHA25681e905d8a4238bc70395915ef0a800ff81c52a1fab0c794f14b057a22adbfdb6
SHA5128208b1b83feb07d5dadd723dd22b6fc64b793ee9cd02fcc5acb4636db4a7ae579c4a55776835699a29a55ad28073f2eee4c3fce861ce215a074570682187f3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad481436bd4978303cca5405dcd3d3e9
SHA16be95088a3b0fc4b067644a0dad6985e78f38c90
SHA256619182aab6395a6522230af056a5eb922e003abddd4580ca26157d763cf7d439
SHA5128df9967210b43ec75975ce86ed3c7d473f34f59434ce61ff619f8ae2196e4489e0c37ae5b0f896d6769979f9cb12529b05921016f57eba9735f3a1b668fd0c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53886a6254bf91a2e0b7b27686122e4bf
SHA1eebaf7c3090ec7e5e596fc387a1a577bc26ef32a
SHA256cc9dab74802e88d029fe217aaaa832447864f5fb936ea08a4e929be8146c54b5
SHA512cb842e153795d62a0329a35ee55c8bdbbde422eebcadba532021af8a2af7573bd339e5200dcfb17b71b02a516bf8d24fa0b7fc02301214798356ae8a56bdd7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd12d294ee53c0eeb4a8f1ecde97b42
SHA177efaf89df5283fa318b4096b12e5b228548f8eb
SHA25698214011d7e68bb46ec8146d613da0dd574be10f3f1d8ea1b7b5ae8f7872dbb1
SHA512bbec03eee6202ccd4cfd1d42327165856709f80fe09bf691a9775babfa60d0a81a91ca9f122daa861718aae4482d28e1fbbdcc954e781854f702490d4648c225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962de33c3016817e84d96bebbe3ad513
SHA1b5d194de691ad4102d8d7ac06b33c547f2d9994c
SHA2566864fd97f6480fbf40832eb08c96c57efd5687372caaa03e8eb2fec8d06de4ee
SHA5123df657374893e06db9bcd4229842153753035b0b6141ffda364b672d9d026437bf1d7647112d2073dad0ce7ae5f29ea2e42d3ee544ab81f0731c4361bda33f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d04ff8e604d6a74ba820665906a62e
SHA11c78db1c91691b4c4add78e54e6c85e3051ccf5a
SHA2566fe510b4a9304acd1e0e3f540b38b2a49631c5130c01a6d61bd182b167c61e63
SHA5121c27350eb14ee471c9f673657e9d282617f9d7f5a9eac11a3d53b75c1e247515f815611d03312c6188c79659bd3e432b807411745b6bb5d45e7bf25ef4868538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a77cc8e0dfe55f1dd005a6a5c8d6ab
SHA147b7c338d7dc67567717b762f8dc68a95dd1980e
SHA2562696a81abe67d6164ce341b5ef0698459875eeceb2a41e81022b7273214eaa64
SHA512d0ddb3cc52304e8e9be844fb2c61e91a0d88f67b8f1ae87c473771eacfc352d40db1e2fc80218894122a4c33926071dd3dc0ae01488139e3583f204318574a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53352422e2cbcfa460a093f5637c9fc23
SHA18ef28acf304ee3930eb2a3eb232da305ac402590
SHA2562272a3643a48824ab69cb72c8698474d64ddf7dcc22856f7a04b4691b3e7e135
SHA5126c3cee525338d7b480349842710855df0f4a459ad0679f7fc6a2c6cbd2807abdfeff7426b275f7a2d65165eb129a07069e81742cc4d5ce4f3a7388f7a800ab4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047d94843b4e2426c7230d6796472db9
SHA15132321ed133eba09122606bf6e1418574052571
SHA256d5a0e440c2ecaf069966bd2e05e34e02cd116a9b9774683b95e9721cbdc1e576
SHA5129ee51e33f892a3242cf0d3deb67abe3e6c168404a16a48f398f3ab3a1508844fd91f89b79561883913553bf3b303887d87f440c311e1c189356bcbefd645b473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da3caab309bc26b435fc44f3d749361
SHA1ddea71b65a6cd5d7687b4421510e0ae58a93df09
SHA256958eb033fc6bf54e1716a986676a492e4a5b3e049706ea406ec1581dc11b9919
SHA5121d41f7d65f6a03c61d787251f6e4ce21c1f3a51de1b70a37b6a853cf31f6420317432ec4a4b2afa6b5014e54f1713f7377a8c42ca4dbe785eb4bce0f7f716cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca79531cc28cfb661fe3638a183f76ca
SHA1db3dec31f69b13d6a8e27ddd457d5f475acb8877
SHA25649115977878ecab7a7298e90f1a30d55ba9ed7226bbcd87dfbf9b3ff2b133a55
SHA51212ecd22ba74461bd02205dd3fd6314e852983c5c3b927df17dc99dfb06b2c55e5bc5922fa9de908e36d5e2fef641804ddb1128fc3c8c6b923e8de91592d98288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfbfdd46293ed44586fbca9851410f0
SHA1255ce21cb063647fd76f8c055006464efc6c625a
SHA25676396908e3737c8261c954b2b64636201ba1fd3fac144af7998dc52f4b1532ea
SHA512f85048bc6b1534606c22a530e4e53d40a3fcfc5240202f45db1abded566a9381f6c70373fae13727dcc212cfbd10e2bffde6766d1056ee3eba304539e98928d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a26593b76bfc207d209a9ce33f43d7
SHA16497581e61e92290628171ece928f2847b4d0e95
SHA256d0524472c126681fdaea1cc55da038937ae632571943677f1d17e2df4e57f571
SHA5122c7ce0828a4707e7624d01bdd4a8b009a95663d4580b7d4bcc19cf93b61ebeab07c039057eb45b77bae28d61416d2be3132a0eef518bb807251c7972989ac990
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTZJPBOG\openhand[1].cur
Filesize326B
MD5feff9159f56cb2069041d660b484eb07
SHA10d0a08cf25a258511957f357b89d3908f3c5e6e3
SHA2567342f390b12f636d14e25f698fc5e38cf6240994dc0c07fefbbb4e78ec4d03c7
SHA512f850277f48ac14fa363265469776e6f7f07f7dd743aa1d1ad7cf2329eee6d323da3422cf6baac066c84ecd24800a02088053ef3fc0488d170e7fc942ac8ffa99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b