Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
fac18e5398dd01d5dab1d55c77b94416_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fac18e5398dd01d5dab1d55c77b94416_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fac18e5398dd01d5dab1d55c77b94416_JaffaCakes118.html
-
Size
32KB
-
MD5
fac18e5398dd01d5dab1d55c77b94416
-
SHA1
96c4693406b864b8b23b7ee8da87a0415e8ca073
-
SHA256
2a8fd4b96cf371147f4b08d3f5e00b45a1304172ce345619dd9e0f99f26f562a
-
SHA512
6d6d966da13b27cef1ddaec2650bf2166f2a3510b4089df5f13bb6c6537a10a6e0a876e96366b81fd619d481453c39aa1974cdf2d5ac9fef44c74e501d03413f
-
SSDEEP
384:7CAVFQ/gRche+tOe2RUt6+XOoqPlgJ8LH9UzysAf3Sf9LAl:c2KtjXfqPy6l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0075933fb10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433616738" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DDB8171-7CEE-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008a819c6de706fcd8aabc14f5ec02e9bffcc7af2b1cd1b1a58b6334db3143cfac000000000e8000000002000020000000e721011d65b560039e37061ef68938ab1ae6210b2ff09696dae65d4771f5734a90000000cdaaa062ce134e674437a89d89f055e87fa61b9656d523773a529d96419d4207741d9ab5163701414889730ff3171641af35ff74b630bf1361741f67ec62f942256fadfe8d21755c26c8dd1e0f42e97b5aeb20170552c0d74d6e17406b8a98c1dd1a8700c8186d6dbce473abc60be56f0c396ea17463fbfe11aa9fd81cbbf9c4ddbc3e139162b109229e79c74f8d077d4000000038af297f3bb2dd4d5224389805688c9419beab7ed63454a8b3a76ae7adb8929cc990106329ec429cc151f9d1a72635c7f9cf1dc6dcff04fafbe49d33e431a7b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009646ba72d2913d47db397a827b3c883296ae1f6a61ca2252a6dbf5a984558d7b000000000e8000000002000020000000a677ffa27509e6801c00183bf166747e26e55dfa06669b44e640ff697882eb3520000000cc7a8c7def16321972d81bd335609cd29560ae1c8dd4e947bd9160c3a317e16340000000f65bd95056e5176019515ab3b9d1a4a38e0006481247d9da2eb1ad1f26fd0c9890ec019c0aeebd93fadd09c6fb18bc9ec7c663bff4661bfa8e25473351acd82c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2432 2052 iexplore.exe 29 PID 2052 wrote to memory of 2432 2052 iexplore.exe 29 PID 2052 wrote to memory of 2432 2052 iexplore.exe 29 PID 2052 wrote to memory of 2432 2052 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fac18e5398dd01d5dab1d55c77b94416_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3a40bfa078a9cd4b5e476c901c53ac
SHA14405df231b2808cf86f33caf4ed6a621e3c459b1
SHA256c98db61826a650fcc33912ed83e71088137d66d0a84ce70f32784312dfcb257e
SHA512bc32d95fe008b60e629c5d14332ad07ed030400ee65874b2b663a5f12b2d46eeb09e7cd2bd1a524083bf7c751f6e0bb70d32ac310d53ae3c981c009470be74fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d845a8007c37a7a4d0fbdb863a3bed0
SHA1a3c5422216a7fbda8e6094a597346b3e4fc30deb
SHA25650975d96336b551d4e69ef58efa3d21f399c6200adb46112e047347b4e8b1f39
SHA5120580732fc26e1121c532209a7b411be75640a5c2cdb49fc29ce8696c9e0a9ad8e7d2ca71270532d2f9052142de2def63d3f257d077da585da4c69b184bf8341d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a782b2d990e0ab3848c43ab4692e2372
SHA1c596503efe99304c0d617cf5c8b88edd6e013f04
SHA256de5db5b4afb289ff42ab38371c47c38877282f318a4f089a5cc34808b8e1e67a
SHA5129fc1c8fcdebc8173bfd5230ae89a7f71397605a850059fd5e0fe0d65d46bd88e08ec73da28d13570369683dbf75c1f02bce2b961dfc31a2503c9e6dd6d8d2b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be7d8b271b6955dae87ddbbf7708378
SHA1f61bfe89280950f9deffec3ade0c048e44da6437
SHA256d2a07c94cbbf36242c14c55cb065486febc5207bf6d823f8e4cfcec274e2823c
SHA512db68372e6ac45dc3182c78b3d9f288cfbdde77dbb7d0803749f4b90cd1a0a43eb05d6ca84b555b57e429c7ab8bbabe415b79634efae91db6300884e25c815189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e370d8722b67883d803422f7c37043ce
SHA15bad1974389a488b4611ad4cb8df43f73d3da415
SHA256b8ede914e5f2f99feb8f34ba94e243d90a3d3fa255b1cf2c71926a26137d41a9
SHA512060787dcd20cfeb5ca23eeac7663880a1a00d0b778258e3591389b8dc433729babe1e7c1df0ca7ea365911364941ddaaeaf331642b1669d219fbfd6192bba456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594eb2efdd3dc8ce5fe6ecd6db472071a
SHA1580805214a5040f7499444ce6c29776476dde3ec
SHA25692699642073903dec093ce4a6b95fe93760bfcb093c0303659ea0e4103916d9e
SHA5125b136b88d16857bab4988cfbeb135d6acd10fbd09b8c643bec2e9c5541f0cc144f9f56d74860977c55c3cb73c13c4bc0de49537172b2f09f18f877de477571cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a7d8777380ba8de13c064bd3f6132b
SHA1718df3e39fc4e7109e1910077731b32e88432669
SHA25640a4d8f85e385009308852337bc063bb0cea25d5c1042b039bfc4381c5ebc5c7
SHA512a1a10e3f8e293df87a4e1dda9875eb67e958ad0496c62f57065e738e88d3127e05377cc32c35f069ebf448ab7728597676ac2abdcb219ed1a75c811a7b89cae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26f31572e9a6a1de4036aacb9980287
SHA18dd6414f5456955018a85239c94bce1a3524849d
SHA256bcd21a476ad2d90351f26d2955655fb394364b18fe3f0a2091a070552ae0f8e9
SHA5129aabe1742d70c08c84bd52b1988ec07e40123d4d9c97d6e60d39206f02706177f97f15abedabeb585b3de08946395985f9584bbd673dc6094ace00f298055a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f9796e7e327e0fd451f84a054b6ed6
SHA11447a4f2a126ac90aa827d38885b3c3351559bb5
SHA256068ae7418853c7db670be9d59e05f4a6891a004e6c0a1427f11ce4edc058c9c6
SHA512bcf79ebb3e0c5a2c3e5e8ab0eb0fc6b1345f3f6accab3edc214e956d59b77d484a1b1497e7b4e7c7410ba9e180cb1b5098934cc2b605b227cf36596738ab2c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a65d63b6e3785c1e5e43509da3d7d1
SHA1fdcfa824c2d5b37103b514488d344d6f10f34bd9
SHA25654f50b117701aa76d5210f45fe19fd642e47e6fadc623d9433ac39ae0acb8b36
SHA51227aa915fc11bc97dd757e4f43d3f78b9d342124d422f4e84eff6e907619bcd0bf766a086c5913443fb5dca2035cd18263845b05c50bd8fbb040ac44326d243c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f6c4a7d1c740e5af6c6591e6d77124
SHA1679f2b4a4b42ae63b736d101f0159168e360d568
SHA2564d4d25189f5cf7bc1453ebbe6bff1cbe5eff983ad4fe28c45df3692824570ada
SHA5125c0f283cfc03b4e46b2e8353e12871bc258fb14214704b4eb14d54adc794731a98419ae2b1790f0f75bcaea68b5003326ea8d75d72072bd7a41f82496df76116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587102155906a19bf0e1a6d16f8389591
SHA11cb90a09869c80091915baccef89b6b3ace3fee2
SHA256d9255ea3d62b59e7c1d02a1514fd38e8097a91d3ee69f0da06ec969c6e285dbd
SHA51264e4208b7dd09b194e4230f0b2c96a6cad2b75a1bc42cbc249a2a34392c43c398cb6d449081cb454fb94b4c43db97334aa416d4f56c919a1012d981f7682bbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50877cabc688dede6005d66e8c8d0b39e
SHA14c1d0f2438d4dd9c8928ceefd7b4b1a2883822be
SHA256e00c79aebda08b6b1953c088a2b97a39e3f75635dac9df89590b457e2866e9ed
SHA512d83d38f0020fae0384c4c7589eed2a5b0920e61a90fedf2f1faef459b1ccd4ffb70e71eb5679fad10722bf6b12ae86591298595e19fe231683b9a8ce00645dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166c5d226dd69c3bac15da0ba50861a7
SHA1783ae8b583f73762ea02dbc292ce391c6705125b
SHA2569d0bd472375c5accb8ed7e829fc8712d7759829771298b8311d4915a87bd3907
SHA5125390557239f91b0bbfca286a2091004fde62bc6a20a0c79e6a37c15048c691ab8017db2ca7b191f9c190f8097b0cb36309c44de1baa44b73fd464f7d8644d22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8bf449d5058690b00efc0b5550a94b
SHA15399b41bfd4ec9f66a232525eecc2b74f9592ee9
SHA256b92378ecdd70bcc44faae82699b2e3cfae1d39f886123e2615b3b446076810d5
SHA512c2cbe5a94a1dd8a6ebdba90033ed739963c928a3d1d55276567be97ea879b0de57d307ff798ef2bacac9e434e8296f42a2a252d7c04b72b942bdb6e858de956e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52643b94ba1b6344ff12be2c566c0b141
SHA1bfc8fdfe38086985e3dc69d145d4c7381162ccd7
SHA2560c7dca115985cdaa5f9dde1f60e850c8d1f5d5f15880343e3462b2e7ff7dcad1
SHA51209fa65218da699c34918973de10f10c639d688c3d1ce35e1f2d18156a3c28f637c2bdb1829156a9deaa4ca5f2f7784608619c02a7a6eb50edba5d46cf340de03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f412250ced79b3fd1ef626706188a7f4
SHA1f370814ce0af6a1c456a51f43ed1937d9aa21dea
SHA256ffaca15c4a3fdefe4116a491c5c79f4b4240ae93fd147c0f84966f951aafc590
SHA512bd2b36d0d6f911b491030545f38eb121897dd57f1ab1b094bbc1a11cd019efb0056eb42bbc5e6b43d55e74f83a1876606a5e5fa947b138061a0576a6f7d88ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571997962f1f51f7376c3dc590eaa2472
SHA1e32e1a54a894a7505ff58c3f08bb421472af030a
SHA256fc7a87642cbcfe3866cacb0d826c6b36e20915ccfee0408d992a894303005c9f
SHA512be00d840ab35b60592fdadba95430a37612cadad9a9058387e9f0f6dcefb6a4b269b06c8c6c11537c78495cefb1eff9a11307a2569f9c77dabc185d457e781f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b