Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
2df37bdb9165aed8a41202bd00a53729_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2df37bdb9165aed8a41202bd00a53729_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2df37bdb9165aed8a41202bd00a53729_JaffaCakes118.html
-
Size
138KB
-
MD5
2df37bdb9165aed8a41202bd00a53729
-
SHA1
fa69a8365c3b58bf0068eb2d67e3c11dcad77ba5
-
SHA256
cefad4f09ee4c09a2f543be2fdfa5af51db0fd64e76c0ac0a8c57edb2c5336ef
-
SHA512
e85845a2f8870d54f45fe9a1cd4cc27b6d988f3b933d85d9e944c63f6f4cb7f7d58e6dfaa35f82b9e67e05db1c60d40beba6acc250b9a11b9ec8b383cd9fc5bf
-
SSDEEP
1536:S21DYTtlqNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S2EUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CC65621-867C-11EF-8C40-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434667257" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ab3a64891adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e9cb9864d1b3087f75d3abce42efc86511ac6b8c3a3f2f2084cf570e7e3c2909000000000e800000000200002000000035ebf0fa869c83fe87a6cffeee2c4545d7cf5e5d7507c8619588e9054d42db9490000000cd9963c085e14e0931911ff89b97c0c538d47f51b20feba28972afa2c4748787397ff0623fee5018c5bc97b613a1a2ab10380675b83dc98fdaf55115182a3f00150f991987209ac846613b2023f5128eaa919b19c971fa3724649f1fc331935491f3556c7a610c498e84ee527b2c9b9cad8f6e63c150d323985a2187284e5285e7b1a0aed3ae38ea3d5d2f34c271fade40000000ebbe6d8478ca2ed8b6bda91f3ca734a8bb04924b4529d5c04e45ec1fe1e468920918434c6f804da7ab9eb4fc05164aecf7f33ab4760a1313825fb50972eb1f63 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008bb2b00923122cca985e5a2f2218f22600a67583a99a6d6b67a1734914b300a7000000000e8000000002000020000000cb4dd0bd0260986ad31d11500457293c8dcec921a9e879e37738626528b18e6f20000000b48fd54a82df4aa78232069d1559676e1101f01511e1098a2667b2b1466b30e540000000826706dfeee4e57760ad338ea0e79efeb426902256a8f01cc4fe3e1346d4984fdcc6de339273fa88a2f0b66ad34c17aca93b5781a345e6717b2f194b2e71f9a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2352 2172 iexplore.exe 30 PID 2172 wrote to memory of 2352 2172 iexplore.exe 30 PID 2172 wrote to memory of 2352 2172 iexplore.exe 30 PID 2172 wrote to memory of 2352 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2df37bdb9165aed8a41202bd00a53729_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560489d900ef7d3d02beef279bc4355e4
SHA1900770259130c34493b41582f2b3ca5c183c7c26
SHA2562bf30a94ce9e05e709a3dcd236385d88152b61bd0590cf087d1ffb7a0a0c94f9
SHA512229551b8d469511a9ee24061fc710ffa751399afdc0d2cda79cda46e30bbe4d5e932f21393955a1dd63b09e7222c695527ee0bde1a6a875b2ef5502bf7b672c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402b439021652d09cf2754463a262eda
SHA1003e38f295d813df5dfc06e4b01573dfaa5bbdeb
SHA25610e02108f67d1bc9d53318864e438e8f983b6ba204d0f723f846d23d5280b046
SHA512ac99d61d8ca10e6c4e5f45e32f8792a4d9fc31bbcdb1ed564566bde00a57947b2eb9f5078344afb15f863058df50782707731d6cd18d9e94ca04528e6be47fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5c4cbd2923c9a250c0234a14c52650
SHA16225da7950cd33baf671c7d37fd7432e65979f0d
SHA2567d252ba077c2975ca24c5df5f7d768368388b95eb747da79b5280e760ca86bfc
SHA5129b7a889ac2ec943e53bc45ffe8d93c43a4a2102890ffe5810a70e70091f6f9d7e87cdf5c9fb4f5d51196a872e847693972cc17feb6ea2ece3be210850d452d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7cf1a280c4dfaed5ece1137ea55dcf
SHA1b8d30adc4fa6c878a6a63eb72daad2e8b7d3dbc2
SHA256c7bbd4f46b41e983d0335f63a57a8428551a5774d41eef3c963797298d8b66c0
SHA5124f4066b9941a87fe4fa926fda73847cf41de63c7d6ee5fdc3e490f8c4cad913ea71ab08d32b9cb656f2efe71b7b79878f51cf7ded4ec2b310d564d7668d61237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580982b9e7df9efd9ecc594cbcde4ffbb
SHA191c38470dffd4dfb739744dfb5811a5daad655fd
SHA256a141e485a81818fbf81262923626b75e966ac6d64bc5ae3b43ef2cd02b11c0f7
SHA512e8433b5cfc0b9e3dbf09eb4c004f9558176f6cd888ef6d590702976f1fd854e8b835acc20cdf290994370f477419af49ef3e44734209972f5df3368f83e03b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54603f5195779fecf263493a05aac1913
SHA11cf095cb1672e74f075003bdf7d89f855c173380
SHA256da3e1b957d82b70d388a3b34ede26cff344f8a3a9e76a52e6e5aa3aa6b698283
SHA512fdc0bb6af73402c53fc70833a8c4ab8a95f51df9cd3e3c97ec4a7c550df3d27f98b172f461e56de793299b19da41e6d92ce57a95bb2bd211b01302ebade566b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557994d704b63cb9cb269f7f4dc0c62c7
SHA15499106d846d24454df21e88d876cb5e0ae3eb57
SHA25600d1a934a10476ec5711ec4585874d41c8e62610c619684c8fbfc8e6ef451c29
SHA5126e3366adc6ac7a310c969593e8523f2d427e3fae495158e5dce15ffa44cc33520fc61f593d275ec6cf45ec452e0a43f0f6a473aeab47ac35b72910985a10de15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd850b883ee5761b0e583d544b14a33
SHA13087e2b75634461cd32965f6a22aaf2ec471fcad
SHA2562a8ea22938d2ed78033eac94811f2ee132f8218d5f37c4f1f36b1264038bd897
SHA5123a96af9858bcde1aae98af4fcea5316cfd1ba4184dd09896e6b44206650a76f8b63245dc4cdd2e6d46cfde7a72a5ceb3becee38451a1015b0f0a3843b0d4b60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a57eebe3a188b5b7f23d58651a7b96
SHA1c09dc6422f85ae1c987413744f469b47c2b27754
SHA256028c04b2fe1bd7608cffadf2c55b51181f5b6136c7cc179faf087f8583b6569a
SHA512712091c85011cab33abd2ed320273c4de029ba7abd71907853e83e5aa15916e65cb3f005e15531457f9e7e3486c98794e10b2248202bfca969472024dc156be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c3e1dd5283541fde47d16bbbef02a2
SHA10f37c1fc1ba0bfa1576c7d1f78ef784084beaec9
SHA256a2a475553b69c45f23f9d0f25d6cfbec36f59ac1123573a9f77598bb3e212b4b
SHA5128d141b859eba07a5fbc586834b51da7a474f439b019b2dbb4918116969447048ebf9c3a493a863b8a6853ddf82d8cf9957db404ae59ad86c5220817633a94b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af191eea3c5b1b073a0b7d41e1ec718
SHA1b104aa6cb36fd0d1ba370113b286b2f84c77e9fe
SHA2560594854db5e4fd9fadbfa7497b41a2ff0e06fd2ef623475a215a2ff2b669ebdf
SHA5128623b1e9c79f8016dda6164b42e7e57ed9a6a947fe8abe7f12f88054bc228c5d12a6c8cd594425ef79c40f9a18463dfd470f6496955932f11fb04779545dbf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb68bd05fea8bdbcef0cbf6c25ca6936
SHA103851848bfb75c7d5e2c658325af27aed657ddb4
SHA256d2a36a74eae59843e80dcfafec6b9acb027631ff4aaaf9411fd28f0c04f04618
SHA512000c2ef85f74d5f930df25be66f7fd91478eb44bd4771efb134b1abb3ea8c5f3144c7a1c0035ac64493b0f721b0dad2a1332ddc3625808f92ec6d1c1bf6cd812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22929fcb28e82572c1dbb0415c9c1ef
SHA1e0c1e638f50d203e9f2f9fe5397da4f028c3cd90
SHA256927c64ab059bc641cfe0cdc5309750633e822c8805a2361c91d8592f12ab22f9
SHA5127cb89f522e251d1cdf157b2b6d5a0586ad13f0cc744b329a41883f1cf4eb58075c5cc11431f24548f724837cb7e9d21aa7160f05b9acf282cad526d0ec04e55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652a0c20b3162cd82a4cf80b0fbeb34a
SHA1ccfc241ae69d4e6832a4c9f8ea37ab70edc1fbf4
SHA256211f9a8527c0a1471e23a244886226cac61d4ad127075214e6370945e1708f9d
SHA512c73e29d4c80ad4ef7f1e6219d5f774173e9ceb55b1689a49f0a5a0709daaed8c9f217c97756fe8d3d31fbc5b96a47eaa1ffd2c2f4a5b3c2f249ca56634fff760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc7b5e81da46d3436bcfa500ecb8b26
SHA13041d5fca2b120cc0b79450cb2e45f63414c5a65
SHA2567269c28ef11cbaf1b714c401a32ccd615e3bc84cbbb58b5a018572ca390f8237
SHA512dfc0177b4ac016554280dd5ffdde7bbcab0d0335461e5a491172b34b2b187c434874452fc091d8a743082c3f63eb87c37d1a0b40722c067b402f891e2aa2fc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd2655bc432a581f45cbe5ecf239325
SHA19d081ce24b5c3e915a4b1bab50cb6f6562004d41
SHA2563a0d08a36d5a3157143b8caa71273bbaac4f88a246cae04320e7006b169de290
SHA51216edacebfa9f3b8de2b6dd4129e836451604f4e47baa6b52ba183cb9274d180ff922d3cd074117281131dc4efa14c2b4ce89c8acb09d8034cb957dcd5934a4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b767a338c445ae2bd868ba4196df030
SHA1dac76290f99f7bd757aa322c6d6592ff4848598f
SHA2563d2d931ccf85d910495f6596003989d0369c20ad1285dd49fbf03f802393443c
SHA5125be9e7dcc46229ab8ddaaffe9f52db7d6fa7c0dc11b0497028918f399607959a9c18bd7810737cc76da71ba186222f889d1904c058a61f19a583db0cc5d8a7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd689e55d9aab48ee2a9da382fbc1cc
SHA183b4309ab92a219944837c68688f03068be28e53
SHA256913b2132ec3c263e792672a54fe486869afecab2e63e8a118784846b56860c3d
SHA512f9862655c61a52591ff1601a6b0f44fcb41d2556fccdaaf35af1aaca6a8458d01030a5982ea2e88660908e9114b195f5721003030f461093217cfb218e45b993
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b