Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
e0be9a2f7c9fc4bf587ac4c63811f1e3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0be9a2f7c9fc4bf587ac4c63811f1e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0be9a2f7c9fc4bf587ac4c63811f1e3_JaffaCakes118.html
-
Size
213KB
-
MD5
e0be9a2f7c9fc4bf587ac4c63811f1e3
-
SHA1
61b6c59e205b0ef07155a02fa6384d3f92b5c385
-
SHA256
13e249b614ad66aa3008b89d59ad45a7aa86ec02eef46244f99908a6e8c4e068
-
SHA512
012f75d987b96087d6e08db526b6eb67c5ddd1dbc56ddb930b4cf7442cddaedd9a6c33c308e0d5bddbe7d20d89b33f38cc5a76c205f2288065864413ebd2243c
-
SSDEEP
3072:8rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJv:kz9VxLY7iAVLTBQJlv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000010702156b43af8f8cd7006dc0861083bcead9cb7d0b6871d3140ee2177c79ac6000000000e800000000200002000000013b30f815afdc7f2712cba87bf84e18000e4cc40fda6c1b06ef7b05784ba36062000000063e6f6e21da1da64f6e27d37f924f58d0e7347e47e0ae017cd8cdade5b07ba4f40000000c6df4d51d5531ebaf65a6c8499071826b2d266ae19602f2132e12041b66d316adeb2b067ecf6f2d515e0e5aa12014b24a283d671cd0f87e419f62059ed658e01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006f1463c0173a77471773d4d43cf4dc4b67a938726b7044e2351712e466916478000000000e80000000020000200000009d55f2b4fabb4b0f1face940ad2bc5e6281128e2d6be45c9da63f492146eeb1c90000000239f76890f38e2bad5267b28863c65fb0909f9fab5c3d635c1e502518860fafd8087adc08edc9abbf98125530a08f6281ad2210b710cbcf16d514de0c9c6a9b3276eaa5b7258911582755603262b1c880b972ada521b471df72bb3dae406757989b3e1cb566c4a9f1a4a16b8353e6f6305371619640d496db1f44e778d0b36840e6044b84427827cd865a2b74a83af2840000000aa4a49cc4b473eb269be3b18847feb8395b53c458909e092a7dbda485454749e3728fd8290d3ae8ee35fe3571fe3fa79b550c02b8659cb3af1a4c973a6e86a08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76F49E51-72C4-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432499229" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a9db4bd106db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2840 2132 iexplore.exe 30 PID 2132 wrote to memory of 2840 2132 iexplore.exe 30 PID 2132 wrote to memory of 2840 2132 iexplore.exe 30 PID 2132 wrote to memory of 2840 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0be9a2f7c9fc4bf587ac4c63811f1e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57352eb21d0778e0bd161f5f50f2bfbba
SHA161e0e37e80b95e4e7292f3563a7515cc1d05a626
SHA2561117afa8372aa226687c4c452d910da10614c3fe62da5b7571408ffc3709ef0e
SHA5125c19f50ef408c744ab9a168f8081e22f3e9ef65d021b727aee3a0616473be7527b9012e9cacc22e6bfae9c33c9d8dbae228b9ec269cef790287b46027d1c0ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532bc821c1db4d11b63ea4c65cba0cf39
SHA18bf4beda3e5db961e67afbc849ad73f274d1ee37
SHA2563f14e54ce3886420639023760e121866675c0421d112504a937b1ec22a30c1f3
SHA512d17dd678ebd1e4d6b92b1e27b82fcbb3eac4df909691750127a9144b2f1a14e076780febc0d640a886c1b8fa66b729ec6c541efa541af743e4ea5f67196bece8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ad18e58c87782ff2def81822e8559e
SHA18e562fa71539cbde69bec5388d960d6a85c3c978
SHA25679bde0ec61d10cb74a11da6248530001c843ee56e4a245bafb21b86a99a044de
SHA51270ec3a792d9cc8238ea16f7118a0850dc22bdaaea8d82fc40356a2c03a1d694c8e34f908ba43a5bf809bbf0ff87e9ec5605c75eac9f2e130ca29a38747ab649e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e280c40fd9044e2813402d38f5224a56
SHA191442883b69757022afe3e904b8ae14148a432ad
SHA256376295fa54a42382bb2b63a9f93ecd300a96b4bbf3eda840eceda8eb4d00c5b3
SHA512274b56d392c0a001eda71002aef650eed29885b9fb37c54f7a1b96d6b140dc3049f5e50eada271c34ddee3bf91665ad11ce8dc0c55390aa4225e0e8676f8261d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e7144a77bbc032c656595bc5bb2f5a
SHA1d4e4c2c0394d45342f9cb4064b9a21dddfde3d54
SHA2561cf644deefac5d32c42faa0bbed3298dd092c42a21bee571ade5964dee08acd1
SHA5127efe7b8c0e1cebb8ddade220122586144407660bc2cac564416899a1a9312444581c52daea36dfa7b741a90ed924e47031c2c04f7b24116fe1aa84856df6fe58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548687c292cebb42efedaf509cb58309c
SHA19ddb1a0bb8507e933ccfa044db4c9d690e69bd5d
SHA256fc12b8ccaf71c08dd5c6012b7c94bf25be4307ec319b70aed003f4902f0b0c2d
SHA512887d83724f1a6d4161e9aa74f558d01e0a9fe0fa8d4abf00cd1b1a85bf9649ad5e6f8373e10e987c925407af6fe1fee381cba2923207bae7a7193c75b2afa784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5998eb6723bfcc449600beec3db5a15
SHA1a2c79994289926db31941003bd7db3feb3131be9
SHA25645323cc715344d98f659829d64428a492d85f134e16863049b830342a67e10c8
SHA512adb69231297f538856382ab1625f5e33e6a4a756d6a2fa2442addfce398bb0dc7d380b2d8a040e3968255c5540ca7f74d3312f81ce50ca213775c13294974357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817af30663c850ac75b13c7a186d8b3e
SHA1354d3bf1023f0a9a9107102f3aa63ec13f18486c
SHA2565f685008b1abf347c659431ea955a1e4bfdc4b19e263398a281480ad161451af
SHA512e5665826a584b76b98a4f62e75b1768f4a42130050de7cadae29b91df0d042b330c82479d3d1aca582ce3ef654237d87efafcaf25503c4547ae6583f5f5d6f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b7e400b84f591c7be9072b11db1263
SHA1b4050b4706d777020cb67fa2c14e6ba4899ed97e
SHA25693088f6a484b13729c1b9f6e46f8bfe4c4165d7fdecab9abe2deaa613a629c52
SHA512bb3292ef356d15e31d9d32f7b5f64adcd2dd3b9e43e17918ba566bc2931a74c563e28828e81aaef474dcb6f8b4b879470cacbcb0f26717c5324ba3c6f9656edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200e631f177ab727d4b6b040059ca54e
SHA1509488e35fc22828c4afc9c6e9b07c6daf896a88
SHA256169769402292c69c7ca66ba2db311c20b6f52824107b77b01fd902141688cf76
SHA51299e1f3fc748f05e788922983b40ab8fb56b00dcaf55ac0abcff8506aaa553502faaa34f8ebd79131c1aae96a5dfb1eb2a835391a8f91600235c7294e212ac4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6979a9bc9ec61a33722851bbc963caf
SHA13c14404f3f994ba0dfde0cf5e487cf1feaac145f
SHA256e183d1e38b26adecefedba0d29d1e4690c778caa47d04d41335dc043a6a69e78
SHA5124baecdf8506c31ee4b5ea022e2e24bd29e9a62fb5c0762ae39094f1758cd117917eb3c4daf752a950a02086611bd9957807ffaefcb0b60158b1a26b999f3b10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956ec4746d93c61a59836b6ea9c8fb42
SHA1728e4b51cdf96db0155201035f39e2eefea0e6f3
SHA25694b307af0efd045ce21f867e5a43473f9f9f0c61e681bce0fc0f36dc092b8f30
SHA5120ab4a43ff01e26b6827955fafb8386219ec49a4acf3021004f10eecb5571cb4c02fb403b9bd16b2719dc2ab7ccfc3d8297c9a992803a943e6dfeebe2f2fd1993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a10d07d10572123de26a1f46de5e3ad
SHA121831eb4fc71aa1a36704b495895093020819ce8
SHA256d18c9c7042cac7d55a33c88f0311bd4cf7875d91dbeda27966f9262234258e0f
SHA5127c8603693dda1de0f152eda4f7132bbf2896b5d1e4f5d82c0fe4bd205599aae420f963f3163a61dbf4408a0fa587b5797f0f0681015f1d96e181b7cbe207dff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53700513dabd39d0c3c028f95ca58811d
SHA1eb3a07f7af40ce70badaf503e32749b26bc83161
SHA256342c5ebf8e1e158d787ffe0f82c8329cff9fe5be134c943eb7cce01f27fa44f8
SHA51243f8b45296e572d8f5b1443da40b3cb034db810d59d4cfe23df1257377be35b32a551d9a583f91c8558c6d08f03c47bb37742f5f21a8b7f66e8053fa8df47dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1b171ea9d00d97e1e237b80ddebd78
SHA1cfe9ffe97fa04e99b3002a6f647b3e9d9316e6b5
SHA25666c3dc0c072098f1ae596c79fea002ef7be11024cd163eaeb5a5c80990a5f9ba
SHA512cf363995f3b01b499b1f6cdb5473df26db7ba6513007bfb7fc10cb102ee5397bd9ed3dbe0593fcad428e7eb3e73b605d3b548aba9ca72572c072b08d0fff30d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c58551be122d8f868be40b06fac8710
SHA16bd262382aff8c0ac8e278eb1ffebf06608b838a
SHA2560e96121e0cf07e4040dbd9c44566798e0b3ee40590392e6e0afa2b6c66481d70
SHA512ae2ae6c4e20099e117230aa8aabb390df82f1c8404ae2b5484ca28179c2072edab79db4f6d682df72c6d9d42038b5d9316ca6380873e59e5d812c3a4a9c2d7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2583c3877923bca78f1ea38cc19f9b0
SHA112db3ab4776bb8db463adc25a3d954ebd8da96a8
SHA256d321a2971ef2aff9e7bf8d946a524b9999acfe8a367d555bfe3bf885908924f1
SHA5122bb8bd91e5d9a24956a5ac816279b5be6194f2c8ef73a94073e1b1cc5bf1079ebe43cd180505f0aac6bf60644b867febc61aa42d8d2e2d1f48e67b3a9ee4174a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55488366d29df3052a036b5d0c052cb08
SHA1ee98801d412da43b8855ce197c3c90a54584ab7f
SHA256b3a0a7c5e2238de10b3d2fd39e795577259db3ffe265afed3bd18dc6a6450919
SHA512b7fdf61ed684801b1bba2f010e8ec0e78558e60bb8295c98de1e0d8f46ca5f1ca55e355d890493394707bd277d252ad1d681af001dd9042dc2898e1113c206c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b