Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html
-
Size
86KB
-
MD5
e28b666d99506d9d2584f35626f12ba2
-
SHA1
38b356d8ae3c1064e91c87d31c449cce731dbbfc
-
SHA256
4d001f8abc2eab306c0650219c2e6bffe45c02a4714ecb4c388cffc878f0460a
-
SHA512
568e81505a57da85829962e5b408c51c657ded906743932013fa77004f895d1c323e3b506e89c80232f61b531f02dbafc01c5cbc745be110bfbafaccab0a8b2d
-
SSDEEP
1536:f5Orm46B5ndFySVsZOeWsdLPccaw6E6z3K+IMz+5m5EwpoNJxtWdY0ywefYRkHX4:YseWSprSwes5Dc3BuymK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e297101b6bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010cfe9ae9faea848b13f701a8bbb1e92000000000200000000001066000000010000200000006eb5940707e9369998de78ef28bc13ad24068fcfb0ef2b414a21ac9b20af8b8f000000000e8000000002000020000000efb0bb1cacc83480fa5b450e1a103275e2b6ad5f7cb29ce84fbabccc2e8b533f9000000035817a8307121f21f79f6ec3ef389ec6ae07e2e5f328c4a8c812802891ed96b5a66d126e7397624a7cf0c201a96b25358ce1f9b5fbe543a6e17d4e84a83a1256f87b25de4d1e7bebbca046bde93dc0726cf8485d16da49fc0330b6575928009a9a5140b531be81b7ffb5d9a5d6f408e05e6085b37b9c0ee6fad1c6c118ee4f5516617f56daae48b1b9db27219685940840000000f43262e5f614e1cbc4f0de8a379c59137a09d9a98e46e2b7d9707057f2b8db7119b9d08edd9caf1cde3efadfb9abb3eb32ece94724b9187603ddf94d59d79a43 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010cfe9ae9faea848b13f701a8bbb1e920000000002000000000010660000000100002000000098d78c4981e660eebcd9d2ccf3b926e74a8704b084bc1d5fe646d42f81055bcd000000000e8000000002000020000000da5b40fd9e6f6983e50a5088cbaed365abcb82182a1d30d992bc4b0c8886e1ca200000002fd24db6bd2703c0134bb895a43d0d7e0dbdd8fa3a272074f59aa7d738144bc1400000009e8219bef77f3a3f193efa6385fb65bcd2cfc346e47012effcb63dcc775b5b3cbc10b0f79f2ccf3a8fc96db73dab193d11ce903675f5a81e7b51715ca74c15c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37967541-D70E-11EF-8659-F6D98E36DBEF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1852 2992 iexplore.exe 31 PID 2992 wrote to memory of 1852 2992 iexplore.exe 31 PID 2992 wrote to memory of 1852 2992 iexplore.exe 31 PID 2992 wrote to memory of 1852 2992 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55605a78981f300dfe064986e2385734d
SHA181bc00df9e078714749ac0fda474ec3a985aec56
SHA256d48396afaa4443dd5aafe1534249062932a577aad8f0b0abcef0dc9f7a895a22
SHA512bf18ed67debf5b6a2ffa06619da305c0d0ab39126f8c262d2d3571fe67770251a3c4ecbfe65a4cfe0679abac275880ae88c15f92cfbcd6f05c34f5819db08025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506aa10b6c62933c10c7f51827aa501b3
SHA1dfd87e496ee9f9e3a2faaa829519aa6ed1cc6e7d
SHA2561e7586b40c5f9a47713a71d1d5b6959defaee9e30826a684f8b07177b02094f5
SHA5121285c005f9976844a25ebada2c22a7b0d440f5a8c919c7b0a6eb1831c41bbdc7d111d3cd36026c3782b2382c49e4eb9178da1c67b4cb28811a81141ab34836fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a7139ecb914dd425114601fa71c7fc
SHA176fb7bea402e1355a05946cb68b6ebdbeb03870f
SHA25605c81078d4a6d18bac65f5f01ec5db1754fa3c0f04633b1700dc1cc9aa4002bf
SHA512d51251c37184c4090741edfdff2b604505e86697d026c4e84db081a163946874dc03ab7f6bf30413d281105a00e67dd6bad0494adfca32f377d1029432af1261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638a2da3f78027589e6ec835e4e886fc
SHA13eff73ef03e34d257f86cf14976bee36241b0988
SHA25617847004d16cdc8c3a0a9bb0113988930a0e2c92d5cc2aed193a5e922e8e975c
SHA51213d7349f97cc6c27147332fbd7f5c634c22e15b9d75c7175321a4fbbc6bda9db0990af81c9c9fd5905d4ef28e36d78cdb4dd7fa9ec54ebceacc6cbcbcb202561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c621083ddce1fa13e622642295f2aef
SHA1b14e248a6d7169af8b5fd1085565a948c2b167dc
SHA25675057392426f7b0a1b4486af3bbcfe9d8e9a7d6fc876bf0a9173f33cfb1652c8
SHA512a218cf834962c2b43cd82e288c031df6c1ed8a6cfc940c6504396d2c4d4220a04a64a73d8aa846485a41035398694e6872f3ace22707be96b6f427c620acc8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd96bac1376e46d437ef42233d92b468
SHA1bc095a0e728266d467ca3a188ce7b8b1efc750ab
SHA2560e0713606339bce4dd751727fa27c2aaea7f0e629c77f20e5af41440db44ef72
SHA512b7b77d33764cc1e13cbf8006352abb8f72cdc654e124826654c161e21b7119769c4bc0db22d8c8c3b66bc166492596ec82f8142ad5468f03151ac90999af2114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50564c6bdae2b0cbab30e73901f2ace3e
SHA1f879332200bc425e94058e9063efa02585bb14d3
SHA256a596c79c73ab771eb92b2e3cbef284335f257104ea0a5403c23da590caaab743
SHA5121629ea318b63ff54567f1bca806142f8618c20e49cb8e16bb48c5aed4c7389292a476deab29cd15388725ed053250e1098f90f1ae85a064f78d1249868a7916c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbdb569302fae94d7eb2f2244a5387f
SHA1ae0c919d3ab7b7020ca33ae48991060b943f17f2
SHA25631d1c420f6b77b11799451e2ec2dfb8868f5992d00a33665c6e24f4de79fa455
SHA512989bd28a00a9928fb0d27285d32981f5d3b0dce5a21591137bc8e2ba1db7a1620682a6902d2b10752078ef920f2d2d5097b4495556a7bed2161f9c11b2c30516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51156af7100e4e08938c627194736af87
SHA11f38d37e23b5dc79c267ccafa75b27a5406d0475
SHA256bf3d6095f7d160527fce3181d98e1e868170012153cce94a4479893c482f63ef
SHA512baf64e2bd22b1dfa263217999e2378e30beea1c1fa94e1c2dbe875303d24148914d223b214c4737024474fdb904d1db3d96cb0e1a437413d45d98d2f2519c569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2ce9b143008f07dd401758bdf1e30b
SHA1ffe38ce02e2559eeff648997cca18d9f7ff85dd4
SHA25634afc19b381f53bd69a3af6e62f34692e3d1eb355da6845f701482608e1f4fc3
SHA5123f277598deaef0f86c9591d4016379a3a82c5e45a8535b0a38a95a32e819267a5a5ae0ffdf662e2f7f7a829bfebeb39f341502eeda191e6a141522ebd6d5f299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2ea25d026c3f3d2a3d9a7f3e243707
SHA1ed06e35be575e09151e0075266bc9eeba00ecba6
SHA2560c9a1cb45f385261ae59534589b5c30ef304144fbe12553b4f42276123172c7d
SHA5125b1261eb5e8a4e0e2ccb169a991bd0d0468ae3c8195d44dcf66479a08510153a6ef2f73ed6d69b66fe1d5d96c19fcf62b981cba6bf031f1d844745449fa5588f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f33646197f140115ec8aa993e45a128
SHA1f8aaafe6994be06a425aa967f0aae1dc7914fdc1
SHA256aab852e6f0437682ca74fcc42aadc70fdc55507849026f9d7cb776ad90f57b0f
SHA5120fe95c5b659b7299d068b82a0680b2c38844b68b2ec8eda7b24066775ad6d754994108fdbaa21699cb7a6a0d54f46458149b90366603dc8fd23464bcaa6d8751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a134d0e211d63f680c95d0fb61384ea
SHA1a2a9b62e16b3a952177f0512e08a17cbe214f25d
SHA2560d1c69ef63ea2e5980436c371fe2daf50bbc0c0979ce7862583928b223ed1813
SHA51273a2f8786f1b635c626851a80535798d64c2e864c76670fd5e35e303d51f27c871ba2b8649918ea02100cbea4dd5169e7edb6698139ffaf4c37c389979ac1829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541da8cdb0ce9b613fe53ba30c3d4fe5a
SHA16c8193b0da426ed35907f662c98048763a2498f4
SHA256f92daf821e5d12c1371e91f72a9ba134894ddc51b04850515b960b5c0d1a8840
SHA512988a073236f91f30a9eca6efc6d1ff14ef3780f2a2f6c3a1bbefe9b8c66a2ad05e51d3c624f9732fc5b7f1c607957fb81671670f9b85f66f06c16b9b7216a52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b5209f4a640cac44d0ba214726c4a1
SHA1ec7d133e65e7cf08efe815df058901cd1992de66
SHA256b266959ee149bce3fc0945faae24b680f3e92e6ed41cf9fbf093598415b15821
SHA512a1175f14f1b7b28070541f26243256b15458d8b4683211c19429b272a8e85e9e0237a72e07fdead81dd08365535c44c14baa7087235afa96446c178a1f274ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd74f44aca173e361885299b281a6bf
SHA1d91e23ce7789cd636f37a3c7567a20799a25bbe7
SHA256b48f6a582463cb9bb987c54242219d4148744d9caccf602f47fde01ed3168094
SHA512511e9016e000e496cba3406bc8a94803d29425e65a010df2bd39046fea9b47755f888ce5174cf9cc2083ab729ba64d72d4856cbcad1dbd3e5258c545a90f39eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5812ceafbe9392ea24216b0fa0b165d
SHA1ae7fb95b98f27df48b6fb0a5dfb58111c843d31b
SHA25662bc595363129589d5ac6a760e9b55777eecfde78268ba526e18450b16850e42
SHA512540eb00681e492cb87e96f1000162373fb38168e15c509b43fb60d6b3989c0a81065b921a44c3796209a20e6a724a2b19cb2e32f336c1695995eadc528da8564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840d8c4b96cb5638d2ec870b3942a938
SHA1e0c550232b403a0282f1d8623c6cad6d67de5af3
SHA256fc9eac7691ec973b24bd987635f09f5919706661121db0ef6b6d7fa2461279da
SHA5125685b0e360eef79e635d4b23b565020577485581ed7da56d27970696211ece8bbf60cec580e6a3c0b5dcedfaec53075424d4a5ec4df9ce94a604780825586d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b9af85e7682d89f4bb3d2fbc914227
SHA15afe6f718f624ab98d055ac6688804faef4de57b
SHA256421bc95d623a45827a078c997ced54d250911574f5c45204f3b17147478c1d79
SHA512db00674731843261477d7f6b5fd036f9e4085f9724967087eabb2423448e5ba0b597f29c3cca4c22be64e01f0f39152ad427594c4923e00b0bb321710782b9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f90d84b9a10c22f61eddf47826299f4
SHA17a49630f918b7ad6481b58407f01e8d682c5324c
SHA2567ad61e6763acea753de9bab0e0642b08c99c3d1715ffe1b85464c16d59babda4
SHA512c937c5638bb5d8f5d18f7558fa5805872c0c8a8e95c9d39db05aebc1b24269e04fd2fbde02d96bc2a1e29568a5307edb01c1f614c1d00a28b62dcf170bf77d2c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b