Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
41ecc532c25e50fa31df3fd7e29c0081_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41ecc532c25e50fa31df3fd7e29c0081_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41ecc532c25e50fa31df3fd7e29c0081_JaffaCakes118.html
-
Size
34KB
-
MD5
41ecc532c25e50fa31df3fd7e29c0081
-
SHA1
c74d86f9b32f0b10729a36fd9ecdafcda2e45740
-
SHA256
b6fd42258dfbea211a60fb2abd0cb4da20f6d9750c03973a2b7ea787bc306180
-
SHA512
d9f59eab3ab045d41f668880a57b935a85751ce41ad726c385af8393b0e87becafbff56cce4ee2a714c399fad32fd72b731136a3e3929720bd19aebb439528d9
-
SSDEEP
768:SGNUq2U/pHYxQ2ClT/NDEQdlMszZ5BfeNK4ZPGIesnf:SGNB2UBHYx0h/NDEQdQrf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08d39c5ae1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5E3F891-89A1-11EF-9107-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435013231" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000036b960512bd9d5169608d004f4f6874cbc27c92d416e39bbe66f78f0cbc0655000000000e80000000020000200000002f37cd2ab7dd7be9ab88d8b27e24e928e728168cc4fc2623ba07ecaf8399f4da200000002572769531bb45cda541789c776dab90371dd0d73aa3d00ffdfefb8ca46f2a6e40000000ee37fb7f1151683cb90abbe336e9c516d2641d2d61e930fee5890fae799832fbdf53c7547ed1d7336f302ceb98c0384a5bcb1fa706d9f5de0fbc1b3b402898bd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000008afb021852894abdf1063fa4c5f2143a4893403181be43ec87e805926ee64918000000000e80000000020000200000008b5c86f7a6521cfcf9e96bd43ff34cc29441de64a78bcba0f1ce7f8406de182e90000000124f93c049924c79e66577a6f5ab07c4047a7e78bf1bb4fb41517f881035d774ca8397587849cde23b8be4a7e809825dc908295f384219dc0d991d88d6154cff42d69d283989241351157b1595f58ae637f3fc67339ee8dfc185f0666e0b41da8fa498bb822e53c0f24addf0d9b60815712b0730a0ab01323ef41b04c957e8bb19bacffaf646e306b030ea5042a3c11840000000a1b914ff38e99d5881515e74f60bed85ca9b91bb78b3195eafc73f6a432e7ca5b28f3b62d7d1d555c559194ba7c234a24328aec3c8fd2170c28eb3674ef98bb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2176 2260 iexplore.exe 30 PID 2260 wrote to memory of 2176 2260 iexplore.exe 30 PID 2260 wrote to memory of 2176 2260 iexplore.exe 30 PID 2260 wrote to memory of 2176 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41ecc532c25e50fa31df3fd7e29c0081_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a52dd95b92ed23ca2142ee121e5757e8
SHA1fad07cccf47a954dff2a72034db3e22ef0bc7315
SHA2560d87f52e2054fad436e00e48fd6385a0cb3d05145c3f5f5de309ba9f381c15ee
SHA51286d20e1aaf0a4553eda623f179abe10d0f6e154e5e2ef75e7219cc7845744747ce9dd6b5c1f70faf79052125e7167bdf3bf2cc5252628e8376d43ccb2c16aef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e227281c8722dc21b70d91505ede75
SHA15e8e7e7f975606b2b154b4af6200ad03c877bb08
SHA256bfff234d8fb5ea1fee56e869fab8e3f6903dc05e310d4b148fd0dc1443159fc3
SHA512c8ada9f45611ed161b747dffd82b829d6249bac81693cc11f5c943eac5aacc36f71e3cd48c8550a65b6f39b84cafa56a0fc544a79e6fc44f4014ec3bc48565d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d1892bfa6117aef56b75cb0b80f4d3
SHA1758d2265682d2e3a4fa592a03cd5c217bd3206bb
SHA2569d067425ad77a744a5023aceb01751a6e35a7bd3cbedfbcc09c285236e34c339
SHA512e6bcd437b1b3fe7410269282ca35e468083e73958776fd89e7c27d23c109be089fdad199b9524a2e4c4e514fbc0af674fadfdea7ce890714bd69af827e1634ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59947b261fba4ee66450efc9ed11331ec
SHA1d58cc91d909164c9907a139c8e9c7c1837dab38a
SHA256e615386ece94f924d01a016e4b3d165cc6c8c619b78d3608b0c4b2505fd1d2d2
SHA512c70f4fdffc905deb5a5f232f5b2e9655f084521f7055441a5095bde318243974099d7871d274be5ee4f21022ebb08b167b4cba54c499b9a6967953f9c7cb9382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc23bbb627a28c8dcbbd70ce827848a
SHA1ed20ae8f805a48e3c5b9ea4f9dfff145e9cdba3e
SHA256c3235e07f2c793572e1440f4f1370dcff028f8312fa14cb1f186107ba7802d4f
SHA51209337ffb30266fd1457b382df834fd596a3c3c42daf766c9574afe4c076e8cf8920bf4135d03cd725d3a304efb4b7a28523f49d4a4cb992f2b0c1740f60c44f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a63f4ce25ea3613f847e00ebfe7481a
SHA104d1d03885efeba0d2e9a0a1074ec05658b44698
SHA2567a98b5f6e00420abf209affab40845f76d037889421b20a40d2166230e844b05
SHA512bf219c52437efe9656aa7d100e28108778a656c580c68edd52fa7014d2534cdac8148f453523b5e0103dc1e8eacf7df834794177a023b416fb897572d343bb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8b34194eae815db87698bba5228501
SHA1c8fd17a4670035939dbbf0a38afc1ebcc437379f
SHA2561dd2c1a751a3182661d22c94da2bf54096c5d5791e194aa757df37cc38ff7c0b
SHA512d7f659876bb792c244be4e41f0f9bd045ba084f16a716d0dc608b90b8ea279c1c1287e94f2b96271bf6c7fa2989f818857282e5c93d9304df0df225406fdf048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd567a95a4bbfd33e4d6b3f6102676f
SHA1badcdda8c9b3655a45ced5754b642d134e03cb8f
SHA256817ed97d48315d6ddc68d795b7b461e48186a54ca96359e808421be5a533ea0f
SHA512cc0416944514bfbff53d64775f8cb92433fbe339966d4c9407a047937d9210622a6a938d886ca3fc83a8eab0d7cd8f7cac2d2db73c15fbf48692f4a64c843fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742572e366b5f5c2c9a5184e4969bebe
SHA1bf80ed62c20447b7d6faa5fd39454a075357cc50
SHA2563bf1ea50ebcefdb7c7fa7a3302ebf40d5295a648c08efe7d01cbfcfcc1ea3bc0
SHA51299c05190d6cf2e4afb02414446afb0e0e2d29c90853f6a032fc2990f1390e1430386dbd08d85901fe3dcc13a7fbcba41323043183330fe3d691c86477957e8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1378d514ff972f33ed3bb5f4abe147
SHA112e320dd632a11b771b6b36ea9febd08f5867865
SHA256559a7868acf98ff612aa6ee061a7c441e6ac5d39fcd96ad46974c7097a3999aa
SHA5126acefb1ab7d22340e3262791b21fab24c8523ad168fcd12a504726c88a303aed84f47edf2f2f7b92d7d218c07a119476546bce7c62d5f0fbbdcc392ebbb56429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de9e8649fe2eaa41a2729e78372ca27
SHA1ba19b9529e827e69a24688bfa0678f80af7a0877
SHA2564e2ec40e86d6f525936d039eb352116a6423ea24fe4c06fd183e738ba697b432
SHA51263ecb3b5614ea7292a2b854ca6a7a728e4fbfc6e5355f3fd81a0bdcbfbd27247b42d6496cd5ae106a0d736923fb18b1d401ce64300f3a02413c1a689c7803c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eba35734a6109cda42d54e0b375a94a
SHA132f0c07ade3a3bb5cc7cef818a341fcaf0dec9df
SHA256c0319561b41259099fd5011ad992e994adba27949e0dca390f7387ee99f3e0af
SHA5120dfc3aa3220aa5aa9845a688a1557e21294798bf7078b03867a00fc405ea214496f1b90c5daf9bdbe9f578b593ed411dc6757f4d79a503301421ab457da2a957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a990a118662ebbbc5b28450e9204a867
SHA18c97e570742a1bf517d66514b20beb40adc2ffa7
SHA256a9c81d03fd527b748281affd2d55881a7340b43346247a0d660e3600dbcaf66f
SHA51259d17d26b426bc407f4438205fd57faa8be60511540c9d4b9d8d588add0742d2c6cbcb181ffceb2f23b7553b934cb33b7ae16534c9ed9e3fd823ac614134dde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6f647c7332a5299881f079500ef699
SHA1d2e44043e29e99914a72eb439944c40ff40440db
SHA256987184c6ac80a8ed1f7149fefc8e7d02e81741082911683a6e9d33c6e3203493
SHA512a94207f667611fbfb49a8f8123aa8b7207d90efae6c36ae7a283cb041c0955a86e4f351bd8558e37459f03415b7c6852ae29bfb4905d87efa9e7f0661ea501cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8a554924737252f3ff7d76d2d86c5b
SHA1a237366f461a345b6d89c583835d3a6879a9e5c6
SHA256eb04b9f851bce3268a335fdd49b26a817056d8391cf52d08909ca34c820fc7ab
SHA512ca345ffb3dbd50c29ec2bd2120690fffc03cab5b14f491730adba4f739d74b105eb6c7e7fee6de174ebf80a3ac231cdc44f95dab98e99a1671e23bf3f30a415e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53211f0000457fd89e08a5d8e4ada27a9
SHA1d3c5483e44d85ed1f50bb2dddb98dcece0c42de1
SHA2565cb5e0eeeb733ed862b298d5918206a54a5f4022a923f6b0b35b0f7fff16bee6
SHA512bb4f73e3877f25a902101e503a479fb2cde477989e3710b2847e809af311cae9ee4beb3e0e200b92b000c9e23207e0f67dc20bbfb955e639c1be8605b868a2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59ae29d56baceea6a721e6167240dc67b
SHA126a40bdf929e8b34795b15b8af4b6d93ea3cdd40
SHA25604717f7cee2beb12ec3b1f246e4d75f3e0f8b5251e730b018e9712bb977298f4
SHA512f30ae0b9e22318edfbf2249b823ffaafb6bc61bff5062944de93ec007c7e78445381dac2d47479bd7bedc1bbe4898a46e1b769bfb967aa0926d25142629fc6f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\reflection[1].js
Filesize33KB
MD5285520bc859a840449187cc43864a1cb
SHA13d85ac9801d3cc9a3577bc6f6ef3c754d2677dff
SHA256ac8e37a73437f2c13789726ea053c21fcdfd485896aabd6498702064968e34da
SHA5127d99e9b95ed4fdc8a510b3830e7948be99d55edfac91ec71c4c7e534176a25ebe48c1955dc39a950f1a3322ef7d18910048c16492ebb9ff54d517a294602d6a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b