Analysis
-
max time kernel
74s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
55fde6df4945369a5b947ba4c8d30f71_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
55fde6df4945369a5b947ba4c8d30f71_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55fde6df4945369a5b947ba4c8d30f71_JaffaCakes118.html
-
Size
30KB
-
MD5
55fde6df4945369a5b947ba4c8d30f71
-
SHA1
61b07513afa0fb8a15fbcfe486f17e5838bdfa1e
-
SHA256
0998d14327749f10225612e7111b063318079d61c47c0bbf22f40bbaa25d71cd
-
SHA512
b558d88a35814ea7fd7b5120758782762bffed2c480b290b1185eb098630eaa27a49d7f28327ff692fff86374edb377fbc2decbe23970ced463da40fa203c628
-
SSDEEP
768:Ad+Dm4eEhaILQAl6/+KsW/xxAS/ki9QGKXiymq02ROJawj7OVTWVSxsKS/S4xZ:bkEhaEY/+KsW/xxAS/ki9QGKXiymq0RZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000a7d3d10c3b769e028e6e1b91b7ac983fef1cab5189cdf8f5aab0e4d15b936c55000000000e80000000020000200000007526ba55955322142727c17e40355e4cb48018345d2afa0cdf551573a841449b20000000c84f74b854b0fac18f80bc4d8c53654beb65b243d500a9e748d1d960d75b4b594000000090e8e79960387b4330669ee0064c464be847acea7c8ebc33823da31771906bbe05e05eb28a429b0bcb2e2d7ba904d2a93dbae415d22a14e2f0f9b2e7298e72a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07327A21-8D1C-11EF-B985-56CF32F83AF3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a894dc2821db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000e8a20b72e4806f3f9965276ce65027f6bc40660bc2ac8f544235b4a3b005f8e5000000000e80000000020000200000008c74563dfc4fd1b8ff808316537c262f02d726fe6b4e547e8326ae27db719212900000008a22d940e6a23838c3436652688f341dfc9e588fca40e49ef35328a98b4e9cb3b31c6f6eb5b9a0962fd38bf1288fa3413079bb5799e24fd45201daf5b44cd50bf9446bd378faa79caf20e6f594ad0b8cd386a5be5ff0712f4995cb8649bf4dd048e2a30d3f69c9d1830d895d20195ad656746a691e96af195036a151d3feb2e186ee27c87610e6a69ed3420d1cdcc71d400000002cf15c8af2eb3d9711d89a8ece70648d77ce5a21041a6557754b8165de21f1d26990d9827f48db69f2c1b68dfa329ab860e54c2a0970924c1a784be2a407dd67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435395568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3000 1688 iexplore.exe 30 PID 1688 wrote to memory of 3000 1688 iexplore.exe 30 PID 1688 wrote to memory of 3000 1688 iexplore.exe 30 PID 1688 wrote to memory of 3000 1688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55fde6df4945369a5b947ba4c8d30f71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588509272e7cecd4c979d24995b8ecceb
SHA1548b2e5bbe7937c8bede43e51009007f293f4107
SHA2566d0ebce07414bf66550b362687134cc98406c856d72f7eb54a331d81527c08ed
SHA512b7f2b7929b1373ab838c7a2cb124d2c9841b0c8ebc3a012d7d6b180b389283b1b1aac433fb2d7641716fcaf69eae0778d755cdaa118cbde78fb7faeedddd8ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbdf328b65386d8dd7404a2652026b7
SHA143296aa0bec5b154de2d45ec4f271d5b6523589b
SHA256c851a8742a233b41b53b204782d127e117feacfcef2d856c360979c1ec84d63f
SHA5120f399691e9e9727dc2299f6fb6464c25e1ecaef0aac8b96292e1833d941a47bfde6858c61ae78b745b54fd13486bd4a15380c81176fc4ae5043a65aac35b43e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e49bfecca562e4aff6ea3fddd68d591
SHA11519eb4d6698455ed175ce533acb221319705ccd
SHA2561ab1d4031bd7dd17a4f42c816e104e85ece92088f8bc84f05983e39a49bef203
SHA51205028387077d31b871ae333f4f393f2388bc4056950ceb728803d685d57da03ccb5381349b981d9ef51cea6c304d3aa838f2762cd242ff8fcad758524059066c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adee459ce2e0ac234bca706e232e41a
SHA191208f030c11610fd81d742c6e2fad387536746b
SHA2560e12d20797bff3f259861dc805c53bf4f7a7bff3d96489def0d707a0aa10c365
SHA512a4bd62d6809c8641f3992ab1e11897da2c86a55c1b37488d6a7918a8549404bac2b82450763e025618c24f3f3a02839b217b55b8b0f732703573426e7b7341a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2319d04a20d0e93cebdd77f3fde8d6d
SHA174c258fef8c6720b1757849d9364dfd1ecdbbe24
SHA2566db396244833331328dc172e70e1865fc753436139299cfc0b09e5511b558b1a
SHA512d1a52048165a640ec2fbcaea272e2364440179028ebacf8f783d244e3115dafe1a2e13b993cf292c70148a5ee8d8b319b5d5c825f99974ed52ed28b9412c1507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ea0e46f210da76f412a10aedf90372
SHA143c975b834d950ca9a807d5ff82dcdc07543d67c
SHA256edd703b2549d719b1b2cc0b32ccf72a9322c51bbd3b3b759be9b91a4cc696d2b
SHA5121887b69e50af2dbf576ee0e64df0298192f48a644d88b9457d9493c118f6d922bb0c209fed1129838d110f1174b3a28b1fba6adbb6545fd377e88b74bd08250a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcbf3228c3bf6a7203c74fe483a287e
SHA1d6bb046e1fd1af47154836eeb5481ae05656b70e
SHA25606542465e2d5649984d05413bd597d8e7c4de98283a1e60033e4ca1863eab2c0
SHA512331bdce84d751d5494cbfb57164aa827dddc0e338be7825775296e5612b9cb56ac0d40321409bca47abe4877dbfe9e72624078d3f2fcfb085bcea40c1e865d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb5553da0aa04d4be9378f364df01ba
SHA1c5af27d24ccdffc5286450c16c45d9c0b2fbcbcf
SHA2560212efce4e8310358da55542749f3588b696648ed65d181c0d8ed7771a8281b9
SHA51278e86bc76546b1b86b4b2a24d65db9aeaeb2f8213698196c5876b73b8bd1c5f991b0cc20bdf25bf5664b6ad6380a07cd8253bc82f931eb2917057e5f323fb262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ebec4262cfb26a2d526a839cf439af
SHA17275e15f8fbda8ae448faa14871d2e9fa9ab3975
SHA2563a108babfd98116a706ce2b01b56fc95ed8bb74aa6c105ff8f5ff6784cc46336
SHA51242204d8bcecbe39ebabc2b42d4cb30fc0875d634196cd815cb84804cd531780aa40eb1123e2a0a050943b868672aa7beecb5beca820d83995b429a87571ab4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e184e3bb20bd5886527b61220d5da960
SHA1be7244459917803939292baa8581708df30f2af2
SHA256fa1cfb859ea924b68c8d7d8ee4a675c32bc82929e87bc3fb45a05043b78f84e3
SHA5128e2d3a99b46cf843c7c1f901bc2d35b1770cc0c04ff86a0890a2469c41e869a6feb3ab871dc2932d5ee77f84787f51071f34d983ec70eefee340af53d1ba74b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548218c4be2cb56584335b99e2e71d75a
SHA14031213b3a695a3cb530884833efcd91a62c71fc
SHA25647ca26d12ef0072d63c394ba5dc7a293cb7fe6cbdf3f7fdfc4be9627ee224932
SHA51273d2a220bc902235140ad270cbca653d5d20e9cbdab2865eef5e587aa253f432b4524e6baed4593d88ddb89d1776bc4b05258c48f2568e31e545aee50d986015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b7607277e137d73a763fd91399582d
SHA1d837244ef3fd941ceb15311c93fb20e152e75e54
SHA256002b5855b1e2ade449bb977a78e26770ec9775fc6bea29966d3bc8aeedf4f7b6
SHA51264a390f11ccd7b761240ab04646f2474377aa65c940252ad27069abefc9d53b5c9083472ccccb7fcc1842a975a85cab4872f799f462413eea57ba33741fe345b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a496314864714c0d8228dc4caae6c2
SHA19738bdc473f1968d8b863b0fd7003699265bc8e9
SHA256d450ad746b81e2e935308c7cadd95f61def44dcc42e206dffa83b47701e17247
SHA51280774d951b91dc312881449ac0e75a7f0ea9ab06f3cebaa86a24a49d3675f97fa5e03c0d9a0299271940690f4847751aa1c262e34c5013c803bb9b30689210a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82e64ebda9310d2229cb75228048778
SHA12e976f86a177c4ee8781b76449cc17cf06bd2577
SHA256c6dece3593731055d655ee6fa453306c8826bc47e54877219886fe7532dd8a03
SHA5120499ec9bdf88839953704ba1ffb51eff2d57d6927ffd23292e634ccb7e947bf974b882031b2ea9b3c41a018f97dc08c44446d69c173b4ce812959b6777365201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518986a503409ecf3343fa96ab3441a28
SHA1033155a8126f70cc59873382e114ea118588aac5
SHA2569d56f2370a8896b887b38c9a470fe467eb90a2e0edccb94c9c250f82730306f0
SHA5123c3a094d220c5ecbc5c2d6599ce7600841726aa9c7e1f1c975a9dc0de47e522ad89bc5941625e4b58a9c641191012ccda1cd67f626151df6b7f73b38045ffb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbb28658ea8e4ee15b7340aedd3c7c3
SHA13f395e42ef952453cb5d1ffde3f9330ae225f86a
SHA25693d0ed13bcf432879f97b5396f6b6c9414ac986a0bba73a890d9aefebafc6138
SHA51234b699c79e94ac3376878748049c6fa9232751acc1185016a9303fc50e09d53a58bb286af88b5b898815d25e7e85463643eeb363fb23f359da5347fdbebb6ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1fa139215549e96a48387f59e7bbc7
SHA1d1ce070705657c9230d471fba22a87dc9a11d8a2
SHA2564d413249170df0a859ec3320f1b23fa55eeed869b5ad383b70a99405580ed6b4
SHA512bde4ba4cbffbdba209b2dba36da90e9caedfd4a1622c720b970c7e9f00549deef633aae5ee01f7353312d5b8a68481c8d1df618baa88a503d924346d9cb9eb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb58132a764f8eaea2f45eabe1846a5
SHA12209a6e39be600afe6c3a26d30f96192a313c315
SHA256b13a84c07959aef0d081031acc445e99f8380e777c8aca1d847389ad503305ad
SHA5120bb5b826a658950abd50c82944ab30e899e0c4482dc5a3bdfb4ed6e366123aa5c16138b5d9276f0e3ca4377e173fe3264663564aaffabf1a9439d9c1f2297b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b2729e18b57fd6a664c727a0cf10436
SHA1608835e9345249efc1818a08a65551cec59014b1
SHA25605e9b381329128acfe298f418a2b422809c4274aae66f063d02dc95f63d33ad5
SHA512a6fc24e4cf86db5e75df51cfa633bce89b40363c346d18613435819ae155f679e2caf1d16c01c813ac5caffb3909d19f8843a838b8d36a7bd0ff4a236f36725e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c9ab73c3ca287d3ce33b994949848a
SHA189f623a72a7ee701a136a49857f1d93140094b49
SHA25659bc3bc1989755a4a7bedb19bcd7de13865fc842dd1bd5dfcc2f8c96dc5cbde9
SHA512e6613d56d695405ee390ef7372aaa8caf1f2f267a6466c8b4f2e77f3dd01b2c41e6c59992ef688a68f5368087232deb0d50eb27ddfbe3a0f728451b54fcddded
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b