Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
2b87ae026b92fc675b12b4f7da54e973_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b87ae026b92fc675b12b4f7da54e973_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b87ae026b92fc675b12b4f7da54e973_JaffaCakes118.html
-
Size
49KB
-
MD5
2b87ae026b92fc675b12b4f7da54e973
-
SHA1
0b4e1d3a9186d1a814972cb2b13a62668d74f88e
-
SHA256
89f8263b5621c8566c8718e3e517717af74f622604a6532e3f35243b15efc93e
-
SHA512
ecee7f12e49833743cdc303be7d5c9ed8469207ca5cc916875edd3b3bc0b7b5b9ba6fde83c8d92b3d39975387689d400afcd50ba6b37a3e27d04623effa7eab8
-
SSDEEP
1536:OVxzguvg7a6oIgypg2oOgQdb3hZOguTsEg:mxznvg7Yypg2oOgQdb3hZOguTsX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006a29383e0611629102c1979820afdb2b2e490ac94a38e8ebbded81e132580b1b000000000e8000000002000020000000743e8c8ebdd88bc220b304026f353a865229fb7fb4c9b6247537838ab6022c609000000036d29a9d484c915908169b1595e0b6b01eaae110dc72256b84352e45646dbf439d046fa0f8473a3bd830867e594a20664a5a1a0d0bd8dbd9b85ac3305dc9083cffeb9e8e7d038388b8078bcc288bc359b7559921c122df12b243b940599cc782949df403d0733ed27fb5f7e659d897a7f4927eafc8d905f458257a6101b7c4e4af461b271176dff542c8a4ac7ab499e840000000311d20ccc087293f873364504ce7c7d5fad844e4d26912a8b7cf8ebf9b037d9a5cec932417ceec30f03b87934db97ae3ae9d5371a8d432b1a316a5f0bb1f9056 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000003bbfef995a38f2a5aa0449cbe3a24c6f71fc3704987d900b0f4e27e0d435c77000000000e8000000002000020000000c045477efc32302fcfdd8f4825c5e71fe5f6037026e086b74e3a558546da418c200000003ddb40b5a98e8d3e5d7e429fa0c0d1687053160aca6425466850d744492ca8df400000001c282d1d920958a4eda10ad6f25ea80bda1a1eed790d4826b6b9c1f73daaa104a74efb23c237419aeffef58656434c97f24bd02236e89007b1805b1ff0484928 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434649406" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00c119c5f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC813F91-8652-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1216 iexplore.exe 1216 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2164 1216 iexplore.exe 29 PID 1216 wrote to memory of 2164 1216 iexplore.exe 29 PID 1216 wrote to memory of 2164 1216 iexplore.exe 29 PID 1216 wrote to memory of 2164 1216 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b87ae026b92fc675b12b4f7da54e973_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacecc04e01180b248575e7d8715cfe1
SHA1df1bafc52902b3505a351585858e4973ee34db05
SHA256b9bbde994f1a49d6baa7be1b97b314d18d4be827ac140984221c054b4c897f8b
SHA5124ae8e2adc29f952510d1afef776a05b2bfc503156938254b2329cf53c89cb847074ec6c712200ac1d84355cf1aa8f0c1020063e478f8f9042f4463f603ed947e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598aa9e78125c4da8c6cc652fbbf7e761
SHA1dbd66e3485e7ee177fc070ded10f2eef52be16b7
SHA256bb013f2ccdb10b2ed9cb338a1778f59c6e6dad28bc0076c409fbc87c1e62320a
SHA51228150e9cb586e821b50ea1cb668c0c6630dc859feb1db6b955650ad0dbeb2c8a9c0b907820cee7e1b41136ae8586193901c5c5d6f94d6ec61fdce42a9f7ae3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e604ec420c3f674e9001b3f9a57fe0
SHA1fc37a62c843ebe30102941b7ae5e93e821f0be32
SHA2567b306fccc66585b6d3397d484971314287e02d028447fe1cd6968a77b691dd5b
SHA5126c1f193199c54ace09c8dc2befaa1db3cdc56cea570b124b66eb06743e051a008efef392dd628b9ee82520c40b8fb392106263c993691d4d9bf3bf81176ee72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710750f91621f2a8e4af92a329e679e2
SHA177e29717098c6edf72cce2aedb3a267b9bba6b85
SHA256b92f6669ac051f5bd6c157a83dc01a90daed7dfa11c25ca38c79e936ae834cfc
SHA512ef1d947bc2417845cb25c08cbae9add6e3f09645aba3d6d030e78569aaa6a570df41c51b56dd357eb27b67bcb8c25b19308aece7f84cc67846cc564768197265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c74f9bdff98d203e19bb3b065e8212f
SHA1616e19d98d2c35925e26dcee0b76aede1fedfc6c
SHA256c0dc3b481ab8861cd27658ea8361fa75c16f2af6f907c4d3e8bfec75f647d14d
SHA512db08d00ff1302ccb289e0101f380a39573adffd7d795bc86c0d4e5c3cd2965b4ef4f80f58a9316513e72008f57253d1813bc96b37724c0995d695fbd0a9edb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b2f31528ce8cb10be6565582ad2bcb
SHA1185d1b09aaa1aad4f8c69bc90a096a5d5117a510
SHA256530af65a9c32c0b71853a65c4558939cc425bea66214fcc4bd7e4fdf6b961774
SHA5124feedece7cf3abdde509695d82fb69aac851677390aa9a28ed120a32453213e83fa7d0d94ad4c66679d2a0d69e7b9d5605fc520a7bdeee8615993ccf2ed5e777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e805d010842df148ce34caa8649f62
SHA1dc18321732e52f0bea46fbc1c15eb7bd794d603d
SHA2567deb56b1328a9e4e344f4d94737e0c0cbbd7351dd4dfbb93237e7e15e0e65993
SHA512f899d34d8d77279fd232a4530c9355fb64bf10d3ee4e94b8ecbcb50faa7e96ae6fbf2a2bc9e925d8d41788f9b32cfaa827459752a24c9b1413459aefec636e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3814e72ad39208fd60df62c0df7bac
SHA1ae4deb45407d0fe4475bf535a8e8dcc4de8d1707
SHA256e7cf1851df0ccae87e3f7636aaa5c0ec2f66f2e3b1d80d298badfde8d647add4
SHA512794bd164656b4efff375acbd3732f79a61bb79c115b7552ee1d250f7d4284981f848c3adf3b121c74d5645c9d25b27d83eba816038124b83786f84a0a54fdccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07668ed9b4c00a6e827e190c680b2c8
SHA18e994c9517589713e79e4404fc40aa718be65158
SHA25670811afa9f691f2799c315843d82cbe72fa3f6c533ea66d70412168af46c8b69
SHA512eb4fc54be2a3c4fa1619774edc8e2080bbba9f593b962d6ede4ed5cfbd6523218d178ddb2b496a3397f39d473bb0a5da88cf27239af33128fb2f8f0dbb388ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51557f71c98f2a6e04dd2493ed92af663
SHA12912b4ee99b268a6b7c99df67b5d6a0e261c55f1
SHA2567980fc74a33a12d5aea65a239a4ab8ef04cbc8e20c2418029ccdeb6fe347dd60
SHA5124d8450e7c4f64f3826b2b3a9e3020af818a95817d278fbc1a2d41facbea88e23708278edac767e3446de08de942a7b13d7c3817da75f0334167eea094456e219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6262b0e861aae4b41d19946662cc20
SHA1ad22251667dbeb6328325a8ef602c2bd722717a2
SHA256275163b96d630b876e781b26e036e83d15996252a327f30756acc825e424610e
SHA512082fad679fd890c71e7504719494dd142710b6188e258f137e1288328462bfd4ca8e8baf567b119d405c6d04cc2018f777153b17ccd0361590929dcd6e50a461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51864ef19521a6dbfda896b1dc6d51393
SHA16174b641ef8735511e539f8582f302b1ee12e82e
SHA256c4f0525f05cbea9955ebff41db91d0a5448548059671f2cf5a8bd600b9986d3b
SHA51291a43b5193020d196fc5b7560d7c3983bad3175792a0af5fb1bae4960c3dad2aa16fd13238cf50ec0dbc7b41f0cfdd8134df88dd7fb68177be95943167e08652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3901af1e948562492d554d880e0bb9
SHA126f7cef3ffff1d5518d8284748691f95f9fd7a46
SHA256f8e351c0e94374600621ece54ffada35d56553a82a0eb561fddd70bbbabfa7df
SHA512e258897ed9fcd7aea8b3971fdcee3eae735fe2a03703dd302db77f7569e7b2c8c402676f71d19ca19a9340268a98326594f54ce9d660639779173c1eeaadc259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548095b933b923e88c5e06f549fac5aec
SHA1ad084131ce78808c28897f699ca2c40a1fef897e
SHA25617214cd7546fdb3a5b9554043b9445c757543c2db5bfbf8ab2f56fe5d3359667
SHA5121289dfed2cfea014fbd249f4f20cb4e9f01039e77b68caed9665a55275bd407082e07eba519077fc7d583a2228103b90bc90a2f4c60a47b5f895d331633d4d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7cedc6224f9b85ad61380b54871e75
SHA10e372f35d4ad210038620a83a6f8545dace17cc4
SHA25686abaef3f59fd7f6bbd86285e264d9a57c9252454c2920d98ecb7efe6bde6172
SHA512b6a0f04c41c4135bd951e9fd7e842c17a1cab04a432a06ec391297782feda5e693fe1948c791f41f74d8565921cf8dff89d77630671c06ec409ebfd3e1f2997d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1aa4a8e480cca50886d42bc30debbea
SHA1b115627f954b17781c3bd909e7b85fa3fbc100f1
SHA256c6ed9301b3177976cfd5bc32f734384faccbd8a62f2bba272c624b20c90ca7cd
SHA51292f0c5e1c747f7cfe521f9b83c73c28615fcc847484ea1818a2714768055cd1f2bf88573e286505942a0b7cdfa1a05389610bfc7c6281f31d983fa9152d3770b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59255d30318082981226d0e53370dff44
SHA1e9b092c6e7f9c4248e72574d22a04b20de7bfc78
SHA256358f0c4a0fb73622cf53d0c0f255baa60bb5ed596b40785ea2104231aeace940
SHA512d64ef47ba09f7be7c46899d11f6227580cb2d93627a2e34a1ccfbe9e6b78da470d02f8925f14dc24e470cc015f3ae71a684e87377a183c0478bd44e6c9f479a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55747d2e86e98c2964f382f9a160c3255
SHA1840e4d3f3c637d8413819a07cf041f929c58c93e
SHA256c949f705c2243ad8efae4192fecfec8fd7f8b83437026f4759270a22bf65b0cd
SHA5127ea850c92c452d9bf484ad6b9dba506191261e878ea199f8a45d94ed1c7e332608afcff802467689a4e241ddf56bc487148e8d950f28897014d2fbdd191841e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8136877d6713b601a4446c6249f534e
SHA15db7c568ac170f633066733f5b684961a1e85060
SHA2563b1cfe3b357d135cac68c6a5a2919b7eff7bcad39d5a2ac49385daeed82f1b53
SHA512e4ebce32e43b327a183b4711d78aea8da456c00f2638de710b1c54981a112390fb649cb93b170d2df06802d5a9d3b1395d669df9886e3056994a64e284c4b9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b01835a05ab801f47108529decfce2
SHA1b674fb5778db032189a8c196961d4216c4ccddfd
SHA2569bded96b32849f96b0d70d359926b63807fb36d1a663fd1e847157abc2f8665b
SHA512ad8921335313c6ea622ae221edbe0f38c4f753dbb0cc93d940736b7edc6a1c217f54da24c1414f134e5678ac72a2ba449946f5223c18ae7343970092545e8aa6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b