Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
fcdce90ddb61a0d2f28de90ffe5d2ca1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fcdce90ddb61a0d2f28de90ffe5d2ca1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcdce90ddb61a0d2f28de90ffe5d2ca1_JaffaCakes118.html
-
Size
15KB
-
MD5
fcdce90ddb61a0d2f28de90ffe5d2ca1
-
SHA1
2bb421dff8b85c1967fd0db92bd77fdd363ba2f8
-
SHA256
16d127e12efe9d2fa53cb3d83d3a422bad3973179371ae3a6502cea3f32340a7
-
SHA512
1d1cb308bf102eb7da17608b0d37954bff3d2da7f9d052a982e453ae20234a95e761a99181389b4c849f8f33722cbbf26ad4f605450b69a4b21b0f65fa56d454
-
SSDEEP
192:KsejVrwT+VgaGC9RjT4eHYcNtCd4Blwh9GJkxf+dwfPIoId9ZdMtqi+74FswuTLa:Ks5J2kPIFeGbmoCwhO7Tw9P9GMbKx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433708819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C32E2511-7DC4-11EF-91DA-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000cb87590ee23627083b3ab54e2cc67704d7576f2590fc872d6d1060aa472f3d3c000000000e80000000020000200000004bc06a840fb59b4720539c7ddbdc1826c0e5abc5f40b1a2ad18165907e73823c90000000b3c012572872836818d7d8e0c1e7eca3a247e73587ae6ce70d04eab560c591018883a15b1cbb03970ee9ca9f48028d0d7e5f281ba6e5238ba0b5f34c71ab537eed085856f26162d19705abdea09e0fef4f4337c82130b4283dfa6cdbd9b248c08ed144508e5ef1387da98f7cc63427a326ca4f86f065b92bb46e528621fcf2a3fb7dc888f3479a41ba9203ae313c24044000000069c8c4a2d8278a578e1df1677db70fa8aa9a4659209a270b6cd11140fcd8a77795326cd55a406e377c4248f034359790b8867a5375330ae051257c42a7fe013b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000679b18e5b53f6b5109c4d3634eb8a69b96a4e81781ca18a0f4958d3bfc818f57000000000e8000000002000020000000c6609937558bc4f0ff0164296c364b14a5b68c70823fad3581573c9a79bb6929200000007718f675b2ba154fa12a7cd704fc003e67d08e353e5fb136a9d548dee3836e2b40000000e1e9001c53dac6bcf81d4d128a2978679cc56ce54af331f972bf546be3811459a67cf8a9220a290192a81158a713aeb379f6703792cc78a36555eb66a109d235 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a7af97d111db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2252 1196 iexplore.exe 30 PID 1196 wrote to memory of 2252 1196 iexplore.exe 30 PID 1196 wrote to memory of 2252 1196 iexplore.exe 30 PID 1196 wrote to memory of 2252 1196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcdce90ddb61a0d2f28de90ffe5d2ca1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8591537f438b19483de7d78b2e57c08
SHA1d7037a0dee80665e0442a81d268eff12b61ce2ef
SHA2561033dacfe1ec287aef40fe813d7899822caaee3b389a7a9f174029c3c8c76cd2
SHA51256a33125d204b9ea682304141b2f9f975fb16062ffc449bb8db1e4d994d2718acf79e20bc48b91c3b3e400d0737360c964c1ece3790a0229856a5edd5cb449d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf72a1aa8f9d36b89a507e6abf15d2c8
SHA1a7d9867947f6fab5cbc0f64ae027935f6444d06d
SHA256fbdb48251fa9ceda4d9a631966507af37028e55c3535f369a0071ddc61cbdd86
SHA512485fbfa26cf2a85ef1d3136c00f92d623e0d77827134fa9a83b17b7adf17a37fde305c21502992d8c736e91f64ed7729afa57e7853aec0007236e53a4fe78323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b77f48e4185a6d2f582d1817ba2a537
SHA197100f9230a566311e6300d052296c153fe8bd9b
SHA2569b6d358757033cb874986d6ba7cf62b1b8e00eef60e19c5812511576a135b814
SHA5128c54c60c5f58974e2b33972963925bdca805c085700d9f2dec2d1f50b414d3c60ad23e3863109be96e859bcc9007e03f257145b83aa896321429e52276dd53b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ed30705a568a1c06ca85262bb76d01
SHA152aafd17cd03914e4cbefb8634ca064135e03902
SHA256780a97812ba1cc61813946f664d8465ca655711a70b81e0022e318a35ada444e
SHA51282c5a728e247d7423d4317f9cdd3b212cb40289e209ac50cc74d0d20dce6ceeef59b325af778c9ae1e05e0fc1265e098c560194d12d23df2b21805751789a28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b10690c5715620a5be95d2c70ca427
SHA1a3884549b211b743406b72b92d23ff86aa98853e
SHA2562b77784c05626252ba0e7b855de26988bfbcc92505367712a59d64de04d88245
SHA512f30971a94a2a279f510ecb7e44b461b77db0905e6189f307c922e7832c2aa2a4042ee6c6d62c5e4ac9f60dcf1d55f059dc1d8b413763821d2839baed1e5b098f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3356ddeae61c1fe809f1336cd87cac
SHA1954eb301c9fd1e68ad550e5e83ee41105e99ca0d
SHA2566e1d8fed9ba3735802d9fba1aece0360afc963e5303f24776764aa5d0e5795ee
SHA5122d5f55a1f6cfa714da48e82f3a792d41439a8b1237fee3d3fa10f90496f2fd034c6bbd51108394ea894ab82a66c94a7691bbfb47f87c63495d1afde504235d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36462324292941c31e4c67af0abc9f3
SHA1a42ece0c77b5c3e98546bd7ed31af45317f7b71d
SHA256701d356aedb673cf016ba527579cf95acd2c55c8d8ebf404627f6b0feac2108d
SHA512e667935e78d59dbc4f08cc17b8d8a95c9359bce5496ccb18f82764c76fd86772276da8fa122c92bc8194d5308aa426348b5f4c507350a88a32a9e83215b92a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97308ac7c9f8e48d5bd5f39abe95ea1
SHA174fb0c1fe08397ce0954dd3a71d0077a53ecfc62
SHA256d8c0627b1eed96d894b9a053823f140e5093d7ed9eafc48a7bbd1cac924d2459
SHA5129b629160a404cc391348db041bcdd1e9ff121f6b453cfbc526fa031ba8623623087847c4981c13a99b527f4169f900adc5c0b0bc092da0b281f9bd782ea27340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57caf7ae5c6d61816897721009dc870eb
SHA10c6d765cb8df1bf294f85591ea2a8a8a137b039e
SHA256266ff92a44fc1df8f02e9cbbab09855d4088cb657ad28054c513aba7229263d0
SHA51292458c54c8a88cba5f1f6d8e5058d5f55ae0257df73235754ffb8468f8db4c38429bdc7902c1bcab8d532d0da0be13ecce630bfebba508f1b37b52e43af5cea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073bffbb6c744ce5c06be32c263565ed
SHA1ede5cd61e59c7f5e4841e17ce816aceda9199df8
SHA256cbc8bf548567c2217b999b6119fb49c0fe62f4e42a0e5fc8bd7c1d56bfe0ff51
SHA5124b96739335ffb76e7dcfdd9d12d79ba49acf52a23f0a27dfd925f79043dc3de463f37395289832fb083026188322311e2c796719203c6ca8eeae26d0badad44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e028f51dc8813917e7412ab302567b33
SHA18cfa68dbe93eda32c83da5cfacaa1075dc1845d0
SHA256e56e15d571c8b87a4f6bfcc6b7266d7954bc68a8f84b04b8ec1c3bfe5a214385
SHA5126a90a317e314ab3bbf251c830e264b8f34c477621ca089601543fa7f13575033038e5cf719a45246227de218dd2dc157a6d00fcb5141520c5dc45f85f947e008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52123d85733ed3484210982b3a8878e8b
SHA18eaf8a17d8e5602e807e89a9f5de50f87cdb7170
SHA256a29aee297eb3c983e7e4261e80af20b703271deba26af06b486fc6c86792bff1
SHA512568712d76118e27422e9b92fce2340bfcf07bfebcd4bd8c4412c33fd34f2b478e15c666269a1124d00129ccb34ec7a1106386d14fddf29a14edd02fe9e07dec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82fc8f9ebcab2b7c47137d00a5bcf4c
SHA1818c4a04d7820e8ed99bd852ba3ec72340488256
SHA2565c0b5d4d6c5b553edcc3cab89daaf2877d5c8996209b89a4607ef6326a54880e
SHA512aedfef6d85174257ba147e26ff033b9df688808024b050edd0bea9ba865efccb061d89c367a058875703309bcbbda7a2076da53db24f5b55b1a0442a818dd62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0efe5defbd5480286a43f2f93a4723
SHA161076b68758df59fb2d1e74df3684556bc39fb88
SHA25624cd62edaf5c855b5ef4c053834b950d7da252c5429a53c04332f02bc7a27b79
SHA512fbcef1b4ba266d3203f41896db1d03b345a7ea486c231ff90a9e33d59ecc7d14f4a42c7414640ac335bdc4a76083ef1fdad289e03ca83bade8cd0bf953cff655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547decd5bc455acd745e05bc82eb251ff
SHA196a8ccb0b3a9216a3b5296e1134a8febd62ac3fb
SHA256a9a2630801a31e7c4b18f6f20967cd46796cb24d225a5309e834249915ece774
SHA512cdf9dfc25df28d23a41bdfe3a01003f0b235375065b25e746bf7cf20e73709366d395a75e8ba7e45d7f0b4ac4290def287dc88c10eff1f37393abcd4c1dc4f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f74077cb6864415ec6cad7f66c312f
SHA1d5c2582b88443971fc29132befbb5efaabf9641e
SHA2563358cc38cae754ec54eca6be6ba2c8e3bcd53b142928043897babe3552ba511d
SHA512199d1115937c300d832240a5cebbedda15091a07f8a369e896be10ba87f215df9a7bf118df6d2d6c9fabaec50232c7af5fa10c459c72a32ee7330bbf55d3d9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed3ac1c58cd09735eea0b3394d7b4d9
SHA1fcb5c2edb8119709a6f851020ba578e5800b19d8
SHA25624ca436ea813a48915fd64f68e4c7b0fc70b188de46675ca6dc673c58044cea3
SHA51240a660d7ced9171b1d2692dafd56776e23fbd8e8bbb0a85fd099a03f659e40f4af7bd2a753eab17917ed86aeab1c31f09442895b6ad37cf2d23a2b6eebd508ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25c126d13e2788ae486baa0239e55bd
SHA1f66e0b1cdde987baa91d53f85c0556086731d84d
SHA256bbf377fbf5e47b56a68d5f42628f7cb1451d86b7fc8a94b06285eb76a12cd5a2
SHA512e4c68211d0f3ca3f5a27650c33c7b6db92e30c205169e9e7cdd0176134d446191319d45a91330d290916196d0ba52a649bab371086619be1492ab3d3aef0a26f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b