Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
0d06f2127ccfdca9142a156ba113327c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d06f2127ccfdca9142a156ba113327c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d06f2127ccfdca9142a156ba113327c_JaffaCakes118.html
-
Size
57KB
-
MD5
0d06f2127ccfdca9142a156ba113327c
-
SHA1
3894b1fd379eaca51abd6a922f9f330d20a5310d
-
SHA256
b8410f9b4e731a49472bb4e6810409b043883d450e65f7b362b9ad507665060f
-
SHA512
936a3cf7b1e424e1ece7d449c58d0107531c072cf64f37444efdf789cf1996cf3a65cf1f277bd1658fc786a7d1d5d1013caeca4f1e88a159a7bf19fb984c7856
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVro5BwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVro5BwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006abc15c9788325fcc19287e7bf30c8af5692af373ac942c0db88dbc3de7cc74c000000000e8000000002000020000000c328f07046a7d522e0acc69523cc293363b41bf30423896e4749a4015facd8852000000076e9b82b6abfd54b780554c8f3e6cd1daa6267b6dc755594c525afefdd630684400000006ca26310bb7b93141bb43fb973af4d67d57b91fb2bf76f1b42ddce8ebfa90334564ab843046a2d5d1ac64d630bfb8483106dde746d4e81b9ca0e118214eef2d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f920f0ef15de7808de95d9dc684f1b4c8f136a1962d6e2cf923d8a40263d1f55000000000e8000000002000020000000955d52d7617b5d06e5056f65a04d0be6e8cbc3dbac8994c51b9e2de4ba68352690000000b04f3fc34564126d0ec17e4929cc750ac86d113519d4d0787ee98698b7e58d15922c1ab5534c6d5af14be1d33e10c738543c88def935513129f14fae852f367338e33a5526044540c931f361637261e4f01898ffd162ca7f92e44c7b590fa3cdd464d482085aa6a148a21c8db51579e81f573f8618bb580e3bc9828f6d626cdd640fea83a56d82616d3babcd18ba8a4040000000a58b5fc885b190f4e2942fe75ae920f38e9d78e9576ea2adfef7dfbb41102b6c29214b99a64d35ec18353829c3d0f6f52dea9fb89d9db8645498ea7cb47b3fd8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434075964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601ac5782815db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{968C83D1-811B-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d06f2127ccfdca9142a156ba113327c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD515e9c20ff530a4157e52c7f5eecd0406
SHA15c0c5a3a6d73d4e1bdfbe7bf60678d48ab20eda0
SHA25678675ca406c1e891b7d8850afe278824a01a8ea6dd4cfe77564a83230eed1f3a
SHA512805c7567733d7489f49126dd5499071c13cc586259e3dacbfe605cb7e0639714fb9f344bd7e45592a1bcac0b989b2afbb073436f01a0406bdb5c8d7c2cc440a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75134fa2492b004ff2c54269ced8422
SHA1858554f8c5c21342e619d99f62f51e5b66d5f89a
SHA256a60debf6de12096b03aa9a2f72b8f694f8a0405bd93bbc5b2abd8fbcc613c1f5
SHA5120ec58f7dbaed3c8ca6ed5a7d1c67483474c91d9a0d579ac965e793d21307fe93efddfba27d1523585f1518655abc0e865a2bee28988f4ea62f89e013e6a2aedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616fa48f111c3a5ad80e07699afd3b68
SHA1839c764c6d9d41c1633b526bdc00569d12ca2170
SHA256e9e7ea1fc15d1a1ec54997800959cba077aa6b643928aa92e6de27f8f48f632b
SHA512a2afb515666ce5ac37a951e0698969556936ec6070bfe52741ef45c2b23a16afd240e4c7464dba61c43241bb93364d821fe88d1dab231e3df9eeb705be4aadcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ba9af8c134a99fa214eac757f2e549
SHA1ebc220e3be0c68cfd8ba182f207736a15e82033b
SHA256cf960fbd1ccd17fc82ef316872d28ddfce7ceb950d4bb1c61d0ae5fe3bb1f618
SHA512230d903d35378bbc3dfff5c9b63dba6602fc53353e815e41998c21f3dd5c429f92e1807ad2d49cb17f8d3976c2705cf37215ce2332067cd8b8acb867260533d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da731d931605ab09a40c34dd9c18c3f
SHA19b5b1e3a0304351fcbd9f55b9c87057ffa309bd7
SHA2569ff849da1de0a83d1b619e48b27f873a37293a53bdcf81c8b67449d456cc3893
SHA5128a37a0858d6ead2aa1fdb9836f6bd4638538fe37f028d9d040905e318769e5f7fab0020b2cf6c22471635efd19999f2e64ebfe83ec9021441ed254097e73dc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532771053bc7d01531570c07f78746fa1
SHA15d6a842bf08d8fe71fd6a6ac537a1e7475a8c439
SHA256e4f430f52bd6470a5ac558bdffe8cf833ef7b66274e733448c200a9afddb4485
SHA51237d0f591e3f67c36aa36bc0ca614add617629ba4f8323e462bd6b64a5514f0b75fc7c0d8900cf5e957c4a51bdb53893a16313d1ae7e5b75a60d4f4acbb88d9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58beb377565e955678dd27becfd8dc609
SHA1ec1a290c4477b9befc4013d2c57e44ca0d3cbd82
SHA256934f54d6577dab3f518c26c07ae8017551071ea699d284568a81eda5b9bb11da
SHA5127b8c3a2709bb022969e2f829357533e88286e7c3d47067ea3d3db9ae168753caf8fdd497c0cf4869c272bb89d63fda980e12d18a72e51530d5c6c4b78cd53fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161b05f2d792846c29642ef9468796ec
SHA19f75208d04daa606da43c2f5ae235b30b175b770
SHA2565d71867f25819639cfc7f2f63ae282cb33424ee43e4f48d96011521978ee9bbf
SHA512582217c38f01f9f0cca751588a9257cc0bce961e69406926d637d20f1797debae627f0ff343122b807b6eb52be2ee527f8ce4c574aaa964f595b1767fc8f668d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f939d2bfe874ca070611b164b5f4ce78
SHA1464be57fe7e043e80b6d282446176ff174e976e2
SHA256896af9af0bbfdfe48a94d39606cd1e186c3eb56f04b150724ca01d762943eec8
SHA512f4ca30e46de8e2d9314e266db72de6bedd40e5d2b7f429164bd878aceb49a9cd7de9e1bbc03dc79a7627c5da5d21bb36a6287e6aad8c36525832dc18c2d1d580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2ed5f2af4c2108b48b1ef32216b674
SHA1184838db7683cca550aabc8b9f9cbedf7cc0c674
SHA25695a6636bf01c53ff4ce6b10be86bf574654983cea90dc13526b881315592a340
SHA51235a21bd07db4e183ba3cbdf9a62937c9419ece8b66adb253ee5ddeedc36084f786c6f29b0373b143ba6fd45308743ff949e3e137801327116f13fca5100952e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536bf3e5b6de55ae80c005bfbe380f92b
SHA1b6ef1e0b860ed2e8815f0fbfda7736fb9f87671f
SHA256ca8f5dd0a2bbf349d026128cff98d11afabe0ce9dc3ba61a4a46d931c039e3bb
SHA512a54f854d44b24947c2f60314099d15fc79fb00f24b545968b84bc357956669a6e449d7e7d9d2a0ffec975f9b12c622148663b20b4f2db0bbbec13505d33364a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a74aec8e664f51ee1dbe9b33984adf
SHA121c084f24d26a6a440692ef437f8fb3048c224c1
SHA25673ab4ca1a43c9be50400a9408a684c309fa489a8a37152b89336416b3095650e
SHA5126f96b7423028a019655a6628b43dd2b7545f3ea3f8e4dd58c3941843098f10cb4e50656fc22382c2d7da76fb2632127699aff2f4624cbdf0c154abed952a1511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d3ac1814e61ec822944a5c5c73b985
SHA10a5a519c3e791b74e367058e205a5a321bd75853
SHA256e49f101a6515e546cdd39a34844f4736495c22d3ddf0bf7c5745021cb41be98f
SHA5127c5e0c61f54f83b6b51b7130f36f3c20e84d9ed215affcfd6d164e4e6dc51089c8ff62c836d8976854eed24a23e80684a68a24176083468ef64c9668924c3884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd209e8e3c8493a65afc9a538743e87
SHA198d18ff190cf83ce31908f4a3b26eb64ddfd846c
SHA256706a70219f3d8ed48a6d8c11247cfb6683f280046f316ce4aa7039196677ff50
SHA5120d7ce9daceb21797a156e85a22cb4573caffcd17529e1297fcb158b0219c3ff544005e7fd90fbd16326f3bb286c14c472ebc3c2b090f408ea5df016ebf8f2333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535de8792c2a014556eee31c3b9955871
SHA16225057d3bde455cfe73f596339bfdae3c849529
SHA256ebc64ef7ea1b5744b948e51e066177a8802525802a24454ff8a43573757fc628
SHA5126919a7f5dd15328f9dc35a4a59f3dc9ce08f477937cf752f2d19c16ad358a1c0b25380282e0ddd01bc94629412ba17a149cdab79c4a57062683a35ebbc96721f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56955e5e7f0835f77e65c05063437a3d9
SHA10d9f4fb5d795e4518731b637619743b406eaa7e4
SHA256d9010e954ef428ea6850f7844ceab7c34f5b996c90ab2e053b93f0a560ddfe2a
SHA512617ac22a5ded96313eb96c1148d124759f057ab859385b6f3432455624ce8fa8d166732a82d3e08853779cbaa8accc8568a4e920b9bd126c6f9a529b15b36b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b28eae3130540c31b4c2dfc83625f4c6
SHA1ec483832ef59daffb499d46a00572ba82855a64c
SHA2564f5a15621051986f9125551df15c7d9e251b55e0878d43912518b564a3a511b5
SHA5124a8712ca3bc72ac0d62597fa5d012398c13e903b858ac4ebc7055726a691e1f864999a1765e7f9be2df50e57e4b9d08ea8f62b14245577b655e14edb576bdba7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\f[1].txt
Filesize40KB
MD5d1a273a46be72ce3661102e28ef4ba9a
SHA1238052f0c087c2dc41fcd92fff1ec0f161026d28
SHA256d8244b7342d8ccf6c8c2a663400bb2ea3d0422268af0de9d69e6855c304eda55
SHA512e7762641acd3db1dda6421791764a00941e5e231895b9530a7e75e6c25c6a0d648deb3d6b64597b37119dc05639ebe1ae38a72b6f9959d83be68485b5613735e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b