Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe
-
Size
126KB
-
MD5
426793ca868ec84f26bf54e08cb988f0
-
SHA1
5a27af370c442304f24ef3e02bee001371083199
-
SHA256
ce08ff273c2a52e3abd62da4d77e879553efeb7f6533574b8aa2a21345436d2f
-
SHA512
cb1d2b53fab6c6bf113546e9fcd73b72074d009a23d091d984742f660b8634b7f90dede7dfa0c6519746d520b5a34db841e6e358ef8dff2011101389abd93820
-
SSDEEP
3072:2He3m89edLyQbDPyIdcYpXddbVbuvHqEmN2H2sJeeEJUaLhMiRUZTCJp:HMcKX2HqTN42sJenIiRX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation acrotray.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation acrotray .exe -
Executes dropped EXE 4 IoCs
pid Process 3052 acrotray.exe 112 acrotray.exe 2444 acrotray .exe 8 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\program files (x86)\\adobe\\acrotray.exe" 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files (x86)\adobe\acrotray .exe 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe File created \??\c:\program files (x86)\adobe\acrotray.exe 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3330678518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9048e6cd361edb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb73de6dedeff944803e966ed336312400000000020000000000106600000001000020000000858941242973ebf6dcbdae99d0500dcdbffeb1a7998ec51fab2cdd04a714b1ff000000000e80000000020000200000008c625b0129f2bddf5febfe8e9ca62d2724166eeab54aa89634865fdb4f58de3a2000000019143714683734f7c43c10c989d9c90e52a363971326005b1c27518831e4211440000000502d8a88debc73a8453a185bfd9a307afacbcaa757ebbfc59d67ef1bf120bd061f9fdc9445dc37632941f5b3d52382afc217d072fc9eda429fabf887fd00cccd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0136fc5361edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3330678518" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F223B8AD-8A29-11EF-B9B6-E6FB6C85BB83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31137334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb73de6dedeff944803e966ed336312400000000020000000000106600000001000020000000295c903e0d3f9505d23f2fabf737db068368fb710607c2a65c75e3fa4f02828f000000000e8000000002000020000000dda5c51ff4aca44293b44ec9d376397ff0843c5ef0ec12b562d3687729510bfa20000000453571f09dfed6bcd414d396f76ecd6d123f5823233a816a16b36a9612cb41c840000000262d1e4d0b31d2a31cda5fbc832820a331e7b0c89c837e7b5a7f776d4adde4d7eb41e199fa9e598f9190451ad01f66cb26cf6085957b5ade6a652e3a4fd0ab61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 3052 acrotray.exe 3052 acrotray.exe 3052 acrotray.exe 3052 acrotray.exe 3052 acrotray.exe 3052 acrotray.exe 112 acrotray.exe 112 acrotray.exe 112 acrotray.exe 112 acrotray.exe 2444 acrotray .exe 2444 acrotray .exe 2444 acrotray .exe 2444 acrotray .exe 2444 acrotray .exe 2444 acrotray .exe 8 acrotray .exe 8 acrotray .exe 8 acrotray .exe 8 acrotray .exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 112 acrotray.exe 112 acrotray.exe 8 acrotray .exe 8 acrotray .exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 112 acrotray.exe 112 acrotray.exe 8 acrotray .exe 8 acrotray .exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 112 acrotray.exe 112 acrotray.exe 8 acrotray .exe 8 acrotray .exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe Token: SeDebugPrivilege 4664 426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe Token: SeDebugPrivilege 3052 acrotray.exe Token: SeDebugPrivilege 112 acrotray.exe Token: SeDebugPrivilege 2444 acrotray .exe Token: SeDebugPrivilege 8 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4712 iexplore.exe 4712 iexplore.exe 4712 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4712 iexplore.exe 4712 iexplore.exe 224 IEXPLORE.EXE 224 IEXPLORE.EXE 4712 iexplore.exe 4712 iexplore.exe 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE 4712 iexplore.exe 4712 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4664 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 86 PID 3644 wrote to memory of 4664 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 86 PID 3644 wrote to memory of 4664 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 86 PID 3644 wrote to memory of 3052 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 95 PID 3644 wrote to memory of 3052 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 95 PID 3644 wrote to memory of 3052 3644 426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe 95 PID 4712 wrote to memory of 224 4712 iexplore.exe 99 PID 4712 wrote to memory of 224 4712 iexplore.exe 99 PID 4712 wrote to memory of 224 4712 iexplore.exe 99 PID 3052 wrote to memory of 112 3052 acrotray.exe 100 PID 3052 wrote to memory of 112 3052 acrotray.exe 100 PID 3052 wrote to memory of 112 3052 acrotray.exe 100 PID 3052 wrote to memory of 2444 3052 acrotray.exe 101 PID 3052 wrote to memory of 2444 3052 acrotray.exe 101 PID 3052 wrote to memory of 2444 3052 acrotray.exe 101 PID 2444 wrote to memory of 8 2444 acrotray .exe 102 PID 2444 wrote to memory of 8 2444 acrotray .exe 102 PID 2444 wrote to memory of 8 2444 acrotray .exe 102 PID 4712 wrote to memory of 4596 4712 iexplore.exe 103 PID 4712 wrote to memory of 4596 4712 iexplore.exe 103 PID 4712 wrote to memory of 4596 4712 iexplore.exe 103 PID 4712 wrote to memory of 2512 4712 iexplore.exe 112 PID 4712 wrote to memory of 2512 4712 iexplore.exe 112 PID 4712 wrote to memory of 2512 4712 iexplore.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_jaffacakes118.exe" C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\program files (x86)\adobe\acrotray.exe"C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\program files (x86)\adobe\acrotray.exe"C:\program files (x86)\adobe\acrotray.exe" C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\program files (x86)\adobe\acrotray .exe"C:\program files (x86)\adobe\acrotray .exe" C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\program files (x86)\adobe\acrotray .exe"C:\program files (x86)\adobe\acrotray .exe" C:\program files (x86)\adobe\acrotray .exe" C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\426793ca868ec84f26bf54e08cb988f0_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:636
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4712 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4712 CREDAT:17416 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4712 CREDAT:17424 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5f3b26541da3f6fb9d754b08aaab549c2
SHA1af7f75c1437bbd374ce64bd613fb0edeffb711de
SHA2569e205c8696fca9506e3a2e4dd2f0aec81fd871dbfe57d4a455dfdc138c2c6868
SHA512d609aa998acdb42cb01bd4b80496786809b42e09ca0f222844f70c583951968fec15f88933c0e2907601454fd9ca55fc4ee73754351789b994fb962fbb4170f1
-
Filesize
33KB
MD5285520bc859a840449187cc43864a1cb
SHA13d85ac9801d3cc9a3577bc6f6ef3c754d2677dff
SHA256ac8e37a73437f2c13789726ea053c21fcdfd485896aabd6498702064968e34da
SHA5127d99e9b95ed4fdc8a510b3830e7948be99d55edfac91ec71c4c7e534176a25ebe48c1955dc39a950f1a3322ef7d18910048c16492ebb9ff54d517a294602d6a5
-
Filesize
133KB
MD5cf582f9546624da678bb029354679296
SHA1bcc4d4d039e9cd329d02981148762b612c0b58ff
SHA256e87c532e7905853b1b504f4033938355aad53003652228f047aaffc5e4836ffb
SHA51225f7c96f45b9d847ea5d0aaeaef3b11e469ab97f5ee9afa9d9e308aba1c7496729f9642736fe822648990bbea45133a87d9acde87c5169f9360d628909f84ec9