Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
b05a756a6b2f894f27a64f4000abad67_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b05a756a6b2f894f27a64f4000abad67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b05a756a6b2f894f27a64f4000abad67_JaffaCakes118.html
-
Size
53KB
-
MD5
b05a756a6b2f894f27a64f4000abad67
-
SHA1
efbff3f15f5279673f5e0f90ebc589083f5b3f2b
-
SHA256
1e0ab611ec9776d50955b5e8a319e64cf8d3f102f951b063bc04f3f0b0fc0c84
-
SHA512
ea1a716a9e7917aba5203a034ba6d78b11259425b2ded660cc312c987684580f394073a316d517d4edf96fff12ee8400459f1a30f08c6b45909e393983a896fc
-
SSDEEP
1536:CkgUiIakTqGivi+PyUzrunlYQ63Nj+q5VyvR0w2AzTICbbqoh/t9M/dNwIUTDmDE:CkgUiIakTqGivi+PyUzrunlYQ63Nj+qi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8059ea0f2ff3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36762571-5F22-11EF-B29C-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430340473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a6593e0d7b9ca2b473fa9d88ef6888dc371d435480c3be054e054f32cbf3ee89000000000e8000000002000020000000d8ca7988dce985ec1ec11935c28881540e36af05e79b1b4aa0d590806e45035d20000000f77bd8f7df2cde5ec1e5ca546d6ec0d66e47c069eb9a65a9a497b0c20484c76c40000000594bbf0a5bad1001ccba0d812d147fbbe0d249a727be5d338b5253c5b1970b44fd769dcb321f68e2805e62095f2674bd0540a58a144d9d857ab92b1d8a4ea7ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2172 1656 iexplore.exe 29 PID 1656 wrote to memory of 2172 1656 iexplore.exe 29 PID 1656 wrote to memory of 2172 1656 iexplore.exe 29 PID 1656 wrote to memory of 2172 1656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b05a756a6b2f894f27a64f4000abad67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a798f3c2faf1bf558ec0cfd256f0c827
SHA1097df282a33dc7da43486b4048e45fea198adfe7
SHA256867fe0158874ac6c02028360c44b2200b471b99442c38fe8861b28424974d14a
SHA51297dd26b49e5bc87485433583556aa87ecb5cd2c27d7bb420c35c12457d2cab1e6a6e35129e7f42de63d52a364c7466a34b036228fc73fb719148ef6784f614c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c68582b4d4f9502e668c9256447430
SHA10ed1fb6a3898b1932203f6dc012934362376458e
SHA256566dc0def6b63f4461c9c35d495838bbf0b8a12e1e618759542ef1937264ac0a
SHA512e372a508ea756f6e63fc8c86e3c79ba1e1b1897985fa3610684d7444e6633cbb13d4647d8bc215b95d2d6a5fb9daa54300a57b2994b03c056b339ed09ce91857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e62bbff2bd84609985aacae24ce779
SHA155483c95be4dbd646e51e204e00496ff9aeacbcb
SHA25653b5cfd705ec6f034a175b5413da88df5ac8a6b0133a02650a53120239e5b440
SHA512cc8b3f14e508d464d49f4bb09b23386dc7993b7f438be7ed2ccebd2a77a598acaf8aaa667287a4e3cfc6f04b7bdf87f08beffed4e35929da14cb2742e9a9f8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33a0bf3fa8dea819862a51bafe3e232
SHA11c45883e7bb5f8ef90fb37130100a7be0c0cc176
SHA25616bdccab0f90ef187b47c17884f02b8749877d9ec216acd60f13596bdb538eb6
SHA51247b22fb557c8ab58218308df97b33c1be1af6f6bb3cd129be21b99538b45fc6bf1efd61e5b156b88bcb71b9631bb7a3bb01a73e008c8f06605286f4be7d26a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1901c5ebdc88a356a1e020cca39f5b2
SHA1e9edfd81e38530340b126615409ce03ac5ec25c2
SHA2562c27489bdbeab52d685b7f284a33a62c4f17df03e3292038ec2a4494f1fa7972
SHA51252d6dd5c5cd844d4f6033ebaaab6d52c42c0fdc146e313b7c398f18b8c14c5cd111d61b7b01c37f623939b80e94232921a4de3930b8a064cd817281c566bd7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7042772aef54dfd9528ca5541ddf0c6
SHA151e480b23704d750acf28121b77501ef4e6a720c
SHA2566100f68d4a3c614f4b13e9a466a3bc463660f0bb2d0baf8d594954cdb5e1a418
SHA512588fe34788a8223ef2c89a3afd9b98a95f4049bd8760eca33522628f37c894202d1419366127a02df3ef755187b8af887afe2db169e3194ec8d0d5a424bcc2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffcdff3c7c8d6bb02f8174e93a7a4072
SHA19ade2ddd222869fef2906d8b0c17115c7b992fb4
SHA2565ee8853c3fb4143192671250459db5bd1737a95d5e6a374f20e9f2f5e29ab412
SHA512834d67f5bb8986c513cd30ef24de1175b286540e026171d5f2e371fe239e226978c25183ae015bcf4344292065732397ba9049ff17e7825c919dc3e1fae57c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9287f724414c449bb0136fa688f05dd
SHA104d3a0e326e9fb5992b0fcc877022e3e00e03856
SHA25657477b42833ebb1baf0e050c180aeb996e8e0ef5dfdadb675d26da463b29bf7d
SHA51277a195c4c6b746b38b960d344c4df29d828380bd5bb018215539006ddf6a6e6f500bf8959c2c67ccbd2323eeb25fb9c43244f19423046376e1d41d904b9d2a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fe35e00df1a1f7f7e7bed14db8c06d
SHA1fc4362a0de001ae72b6f432e3f1375010c2a7387
SHA256ffb04f9e33aeddedc0a6dd6dd45b7843128f9a8ba253d75f7b4c67e535a60d87
SHA512338efda7d2d3b16a649f6b999afa0722ba69e20ea8fa7e465189a64a052cca35c7de24781c18a857b87e01fc2c5599166b0bdbce91fec2e4850eb1f5e94eb5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf86a8e4193c4fda1b98ea91ca7c2c4b
SHA155d5d1849211fd7eca9c88de6acf7623c7783ffe
SHA256dbf1767d40d41c35271b0bcb23883ed0e9d6c8c8537936961487bd46a2986261
SHA512f7fa7a0dad4306133e935c8ad86a254f62ca8657c4ee3f2a3c6668995a5a9a48314b52c19dd79bca4187fb23cfde407ebb30ffb72741c33975683960d6e48f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8ff6e2df0843f5144d84fb0ceee380
SHA1bc5a051dee56c08b8547e9f8716ca70df46c31bf
SHA256d4739e65233ca1abe0331ea08f9e2400611a076bab4809b4fa41eaf853f1bade
SHA512b7da4d05b4e589084d04736161a1aaf33d448774ba5ad303b931f7ddcbcbc490f0ddb6fb3bf1935e0a605d2d39316f9b0ce346eb443c07525f17149f0c10f502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565fc88b1d37ae779aabdc01a7168056e
SHA1eb36d1140d5b8be863fca244c7c1eaf3379ba2ef
SHA256ec93206310d1735962d1ad4b6ddfff12370490d0c95cb015a9428ccc2140d9d9
SHA51201f3236936da0addaeaffd7555707230f25eb9281a28813236239cbcb563ea1e080c5642e6b60fb6351ff962f82c8f93a7d0db47429f38e227276caf1eda1224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564028c4054620572dbf3e57979682d4d
SHA1cd3f103f5ed9e0e8556de5adaeea2bb53c76662f
SHA2565719c42f3e058fc6a33895c26982863ddad13832d99237996cace43bf2189703
SHA5128e47d5b7125ef8632d220f968cfd0cba9df25caee2693291fa8a85cdb3c713596fef8527308df271b7aafc2b163360f7c2227490691702061f0a5a1a859e2c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f72c753a3a57377db79ed26789aeba3
SHA1e9e7fb03240d8c46abb352f5c3214c098308bdb0
SHA256f68c791a70216e07b3d446498dcacc619a956d29003da64481f4c5428fca67f1
SHA512324e9f3d1fe16e0c881388d2110a5c3b1869458c8b848fc346a4ce2f5847d82ecd0f4210b2f849ad9e13bba610e8a9acf1ede96f1b6bbe122c9d7f31621114a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a06043a70ff92bb41b052ef18c3a8c
SHA19947efb290fa0588622d4044f599c752ec9c4680
SHA256eb3ad911802bc870731e720959397b7e840e996be63dc7e8733a2db361d77d02
SHA512bb02e457b53d7887ed7c28fa2ecef3bd1f9afc24de662f7216f7812f245dfd48997e557b79115c002fd8052b9790382df406c38c87eec91216ebef42951c0bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d0acee31055d34f752486a610d3920
SHA193f9bd19f446a81b57dc64fa9600773f82859560
SHA2561fb2c288111d35a20b507ebf15ce525a9b2c146b22b5ee556c5c9b2b886f902a
SHA5124470193f3aac9ee5256cac76df6a3af1636487a50d9ec22fc43885ad705c0d54a4b6a158ede301490eebe107f02afc7c03f06fee0d6646049e172615eeade67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7427e89ae22c7e23105a7fa5307ea70
SHA11e5ffac8607d533fe4902180d84ab4952e2fed40
SHA2567ad4d6110d114dbfb5718806ee8c1e331a0a6982b651b6ed3b565f825766b6a5
SHA512d87f64cb1bffb638f597e9819a4e12bf855d1466174502324e4c963d026e1c963e5238056caccbd7e21c3b46421c682f5eac59cdb2187596e67df93ec40f5f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d855aeb4a82f5ddc9ffb2461d6c712
SHA11067c5b42316fe3b5cc815bde490dd099f1357e6
SHA2564aa396fba7412f5c8c429d371870c5de9b04016090f7deae0b7dfe9d91ed17e0
SHA5122557702943e947b843b02e715700ef44478b0335625817b7228b04af08c27084c2934522ee7c7315df8069e9b2900301a532800f5dca751c5bf465bb81d02ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fc41ad401a823fc35a4bffd62b4f73
SHA1c03280746bdfbcabe252d7ac80d7f477fb2fcace
SHA256d4fdda2141f9647b8ac345e3a7ee1bf83da10be7e3893a90b083a4276c4420bc
SHA5122ac9791a13e9b597dff7430dc6676e4b297fcebed9aeabc340b2a5c338e083142d1a14e52342c5a44dba675521578d830da43e138066a167f5d799ef74271c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f26c3da00dc966d2e3dfb30d00297a
SHA1a167cffaf77eb563ae168223466813239150cf36
SHA256935d7feb9bd8a4185c61047e5a1065b8dbae73c9c15ff720431dc8ce3578b7e1
SHA51251b77e2070764b28352a98ab5eef032e30921003b141bfae2ebd2f8d69b91fece4ac01e114f9cea79ef1ee1b49e6678e1ddf8cafe8215ba9838b5afbb84c6ee0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b