Analysis
-
max time kernel
144s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
db2451d99cad15491e30bfb45bc8456f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2451d99cad15491e30bfb45bc8456f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db2451d99cad15491e30bfb45bc8456f_JaffaCakes118.html
-
Size
139KB
-
MD5
db2451d99cad15491e30bfb45bc8456f
-
SHA1
73287bf5709d5c1a9bc7142aad0a2c0162c8ea21
-
SHA256
7bcedf3c77e726c4ada293ada1db19836a9bdb3049f05ccfc6a60ce8f7657136
-
SHA512
41a9925ef8e12513316523e8df9ec07bfa3885537bacf77d6710d5124e0f9bc6642b75dccea3139383445e7d53f98a37bf7f43a3b37c7d59ca4b2bb45fc69b15
-
SSDEEP
1536:SEtGsWu6FJsJlVP/pyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SE+NO5XpyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006b23700f5eeb48a48d18b0b540bcf1494661d3b82dd696847b2e72df5d8f1d62000000000e800000000200002000000073c79b2beadc4714589e0f6fe53250f11e17268eeeca7d37751b0615d3eb91ab200000000cac8554646fb2c72cd76656b7ac029be403fbdf12f582ecfd96b13eac915d6e400000000135eba1dab3d71a6f325efe665f3aff21853e14e429cc66bdaf0817503d62f28325aa09d1bd842698e3e8fcf37338dcc64451bb8f5404b676739f821ced91ed iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b064fc768704db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EEA5031-707A-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007065ab67dc9b7e61243c9c36ded669eb6d6db14ab512e6adf4eff7d6f82c301b000000000e80000000020000200000004d4f9be37c6537edb0a45b36d89858b33950c9ea93a75ad722c18340afa4c4619000000063970775277ac7a23f3759e7b8490fae7e0dbe27023a42b48d839cc10adb0cac30247c5e564999c7d23303bfa64c95d16c59744b87e50b581a72953b08fea7e00439da29584d6c62069bf7c9b987b68348eef8eedbb08c54d6ebae5a13fc29e4aeb3cee08f6c3052b84138aa812ffa0e14c16c760a38f493263ad401baaaf19d475621d1276a26000de8e3d92c346c76400000007995cbd0d21c3b29aaba83123a9347c508c996506c92c9be034afcc32f32fdce1e1b230535817b1f1eb9bb6e1aec0ee6083221fa1cafc4217d731850b2728a93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432247504" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1892 1656 iexplore.exe 28 PID 1656 wrote to memory of 1892 1656 iexplore.exe 28 PID 1656 wrote to memory of 1892 1656 iexplore.exe 28 PID 1656 wrote to memory of 1892 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db2451d99cad15491e30bfb45bc8456f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58567985ca59a66ae7948a15aee5a2b
SHA16f5e8ea6f5a5adce168ffec43ea1b23bd4945fb5
SHA25645c50ccab2b4f42e4ca339a3e2e2849a4fe508e64f9cf7ae50021ffcf719fa08
SHA512557462b10aa5f2983721b7b91bc2c6da09e56b7f43b34d293adc37d6a4e25844951c2b34ebd6c96f4c677cd6add0d0efc18994d9492618105db09b6c7e377425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554591666d531f55b871ad13724ac2fca
SHA1fb6459896ff2b265848b6f2e4af73809344ca120
SHA256a57458b0962d23fb91a819cb5b9ae7db48c8563316b2cecf8af4f7d07fcf1341
SHA5129b4b8042d5f3691c8bcc3e6b9f973439544598fc4675b7b2da69837e049ac6882359a25edaf7c562302aa219342aed87217f535eecc36ba04536e14cdefd3446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434b8e176e9aa4d356f2600e5dfa5780
SHA11fb039183910c2a80dc755a70edd7a790adef64e
SHA256673e4fae7c521d4b04c70a60399397666fa8da8f26c9ee1103a5f4a6bfadc30f
SHA512df01d58a45fe0fd1214a466bc212691950f47eb78ec114afc6bbb608df748b26c1a41ae7212fcb8ed282f35858b947d3c4d699d2361b6c64d78a69d934b8df5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537092e4d6fc2f61721df5f21d3c1a5d4
SHA123f1d338c08dc17e76c751f73ca048be141346e7
SHA2560e66fbe00a65e6b20053506396e9141b1408732ff32fc9bf8772a03bd40b81b8
SHA512db2f15bc89106078a4b7a71bd3f5c38165866f9c870c4ae824943d5c9934eb1959a6f16f1a041063dfc9cc8396e9dc7fa906839700288be1d6c03526fea63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299a83bab131005d4cf039fd482e1d26
SHA1eb3cf669b97a4717c220dd2d516d609cbf3b86af
SHA256575ca166d56e71585004bed70e6da9caa7f799210803491ba0b251fe915ec87a
SHA51200f9ac1cbb503356e1e68f42151706b7036f5710deb36056729e3b1dee99f6128613b246203dea3b21b47d3b7c176552f5cf313d7ff09f7d4b631ee5f6d69ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17d6edbac79cfc22bc5e14c2258c19f
SHA13a58ccba00d298bd8e440549f766a7cb62165705
SHA256df049b1f1e8f35fae80aad767abaaebc46c886cd9caeeca3d9e3e5e1ede47f4c
SHA5123a449202bff9671f46d524e4f7aad68c9738a2b41766e624a059e655c0daf89c7d4d52ddc3e6d6afd54cd3b70f492ffede3f19274bdc5a0eda87605f0eea29eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788b6645854bb066d0a0f47870dc86e4
SHA1bf7ff6f4a733c069e0e5ec1d45b4a3a522adead0
SHA2562b9b3b862313a0c81d6438f9fd10f589212c46217cfd25e916cf1f9cbe164697
SHA51274aebd9f5f9c6f37151e491e214777d6ddc825f208b8dba24d63ffd301c3476dee2cb1d05433d75f74ec57fc5c1b9361ba1b59ba2a7ed1cfd863353dc6a669d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b4c8805ecfd20f62d90bacc465c883
SHA1244aa3f08bb96c7fd1ba2047e02006257a7f400c
SHA256d1d1c08e997a606a276530c24566b5f7e86c9c2174085a02781c65f3968f783a
SHA512ac57e5d87a3be6d1c58ccdd4ff0db1cb4baa9031c13dff5b178086a76a00bd1c85b671453d6fc9668ecf94672faffc1560ccce1b0821d33b04efd52c1bf7f4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6b8214f77a29dc071b742eb1ddab39
SHA16f201fd1a6a83838d353507748ab1e4770ce5fbb
SHA25623bce9774091a715084b99620398510a5c774fabae9394df204a8ed8a42f6cfa
SHA51262218b5ba67d2d2b1575571f47f3200e75ef175a177acc7c51df0b3cd8079ecc45b608d961ff09758ce8e00c7f67eb56598b7d7b7d4a6cfe169e908c96da6006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603b726cb30c4d46d0640bee3cae9201
SHA1a9a42938d895b2bf3b9fdf5580b05e355843524c
SHA256068a2bfc42343537df6706a5ea419737174c5aada70eec7ae73ac2e516b32fc5
SHA51258be8943a454555213e4b3f1f52640e007fbc7f877f2a073dac5d71e3c3a56174bd7ae902a8377d37aa690b0a306475c4ff723eb5c2057f6c127ed315ed10bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8dcc4eb59ed69fd12f1258545c77b74
SHA148f737684216338431849580397263f6fe86bcc4
SHA256579e50a6855930ca88b86b9ea49dd33f49e6b26895d1b370e38eecdf4764147a
SHA51280db5e6164b2ca9bf70212e782d2e41c92bb562a0627cefd81607f2fc76311052023fddba5c4200c65155f93eae039efa2cb3419e155a1192873b90bc94f17d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fdbaaa34369106e01a795a40d469561
SHA132634e71c788b73a111915df2e543c48d49d45fd
SHA2562204672d30165f8eb21c27d9a5f9f60b566d961ae28d7164702a1b1f726a1d5b
SHA512c099406c13bab5da46a559ec632a5d3136764f960b4a7dafc2309826ef124c0d6dc28ff7fcd4143b49f7e0ed52b6de9cbccee9e6b00bd20f58f75730235ef43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50607a8828ab62ff75cffaa4db8f6dd88
SHA1cb549ee0bc8a8f3614183dc5219f0a7f56a46bad
SHA25656bafdafbba5beb198dc441c6413b1d41de85f81d9b774abdc0777495a989a4c
SHA512b46b930f8b1c7f75ef20a37ae02f3265c9ddd7498575efc0ccc5fe1e04260549a2ed9eefb0b04b5bb440f17a702967554f6ce1601c68e18b4db0c817efb4f8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571808eec6c1231e53fd9bee419e83188
SHA1d6c66db2e0cb9fbdf623a5e04ad44d9a258b92ab
SHA256884c9c944a45b0207ee5749de40f4db3b714e47a17c243ac266a7ecbc5552171
SHA5127782e4e89a4f1da573950bbc5f3785ec70b05983c1a2dda1f5c0f76dfab2aceca1dcac2a0aae7597852495eda8c7b4faa4b40e25651b7368fe3b119f6944188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243ab5e625bf568b3f6f7f2fc9e60fb3
SHA154e5e3442222c8330860c0db0c47472586edb725
SHA256a9ce148fcd7dc68f40568d44887637bfdd5a46d5cf4d7c3f8ead3c08e9a1a8e5
SHA512dc854944bbc50b2f69ad4eab8d579e96b41df6ed936be40ffb4be53e01f6ed1ab6274d9626cd369044a46070b8bd49767d7631978a3bbca4a249281eacf938a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475406c944333ae1e5c91da2d149c74b
SHA13f9b026819ab0b31843d580fe2e6fd91905512b6
SHA2567050905bf986d7ba9420b3a3b929b27b5093b5847d41a8689e1690f42d687842
SHA512c1a0b6bfc33ef70c11f06f4d031fbd16e5cebf790be26789d52bafa90a341ff3ef2907e8e3171bd7aeb75ae67aee50c392fc708f0fb8c619d168001ec6f580f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5af87e8e833239f7214324f4055403
SHA16cf9831a49509b30a7506ec7cb7227cb6acfab2b
SHA2561b9464a788b6bba02bf3831495c166b2f79b3c712a504af2adf2ed4d5c590f87
SHA5129c49a8f405ee14d359dcf19a0dcc3dd4515c8369d1c490b158a83edca017738d87c98140e72deefc2ecc41930a23e938613a7990d68a84f549a512d4de33e286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50635e6562cd6fbc7168a4daaa53f80
SHA11671d09b39d51c00cc34d73d6e7558746186726c
SHA256d6c602929984e4c747438f08a795c3c12b6a36b711044f16e7afefd1efc12faf
SHA512891d80973fa5400a7272737a785a47bf5b1dadc4ef670811de4668a1fbade2074da143c03a04e3128f8e26a298e11e1089b0414bacae630203b24c6ff188f4be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b