Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
11c453571962b9ed1d6ed15a1e02b910_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11c453571962b9ed1d6ed15a1e02b910_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
11c453571962b9ed1d6ed15a1e02b910_JaffaCakes118.html
-
Size
139KB
-
MD5
11c453571962b9ed1d6ed15a1e02b910
-
SHA1
0eb360628bfdad46332a099a1dca203212875b07
-
SHA256
f7fe84b23f71dd2dd72e0d9329e0b9d9f20cbd8d813541a33fc3bf6bb56f93a5
-
SHA512
4aec86e522f907d1bf83e870942bb8bf42abf8fd43ded39d14b447ccd657413f32ba47da3a767a1ef8ac1b4749d3f84f72d051c2c8ef70ddf08828f4cd5040f0
-
SSDEEP
1536:SINvQppMoZa7kcblY+zyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SI4c9zyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e5bf09dbe45d52f06cfb697e2074dbafd0d7b4bb8d9375f724a4f37c896bf984000000000e8000000002000020000000d444c127cf28169244f046f6827c398e081e69b2afd2ce60b5835c68b323be809000000082d105babd9222e71968623047c42bac0b4f9d8a35513f5874164902619f448478adb97f459ac9604581a5344355f24f0884910a3b04dee0fc7386f1a6c1e6979d299f8f1c83747170f3404e0205c9cd6c4ff42d66a0d3ad2fcbf85f6ee6dc7cb2f339b3f20200354c91a52a6bf959b970adac9adc0c20515e48b61ce07fad1050d81537c6ea6278a81ef50b99837ad440000000f88726062d164bdabf03f51e32216572245f8f57fa19cfd9559a798502f744c9bde713f86d89fa77f714ee9438cc701c928119a0a100169e1b442d4c9a0ce3a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4055b4191316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434176649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{038EF591-8206-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000034b42dc691786c9778b5377f75ead261822ef9aae2c211deb41a9923bbbe0a24000000000e80000000020000200000006bf2d91e454b1a43c1f01c3c177a828bb0297411b20ec9ff8cc80082ac19701f20000000a2735f45c7f165db29416b272a93a88587cbfbecdcc976688df66f4eca4c086a40000000254d63d229b29bf93dd291a8ce0cf6023b7a7444ab499023c54bdbfb5d60e2db4edfbf5365ccc2361f1becfd9631d51df02c2a99976a4f9db0423164999c6cfb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2176 2084 iexplore.exe 30 PID 2084 wrote to memory of 2176 2084 iexplore.exe 30 PID 2084 wrote to memory of 2176 2084 iexplore.exe 30 PID 2084 wrote to memory of 2176 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11c453571962b9ed1d6ed15a1e02b910_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57214525f3cb31ab69281c3c0435ae966
SHA1fe88e92e4954a97e2a5336912b08defba632b490
SHA256094d77c682c5a4a63e3e11f6508d03d399672854c1456220c42679fe478ff744
SHA512a16ef341478fa0931c1a50e61b806120cc47c96f338f87a2633899d2e64d696b971929d185c311c2073b072d300b094490d6c9e6dbb1db192a59a0d74d7b7b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555c7e0867588d304db4dc7770df9bf3
SHA18bcf813c53ef041284113f2700b99b4cee738c72
SHA256adc235c5838de9b63cd2378c44b9f294be3bd9f6477eea4c96c172977323ca9e
SHA51251d911e3003f662c90a572d4c89b9a96710ff0992bb6ea0c3b49ff3f2d2d1ce401733c6102d60f3f9ae62438cd9e67cbb23aa6a461addc356c45fc2ded7ab6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58f99dd89944ed3d7af474ab9760934
SHA106486ccf607e3189c0279aa9c1379d8a74a09e4d
SHA256e6588131ae758b91e70db3614c897889cd1cf95383de29d85aee685f124c2627
SHA512d3acdb636687ad131e979eaf715a762dbdb015955e183a4113c771829874c0fefe4a46ac6f150edf1493e9d6a5d87f563bd7fea4636e35f503baa9f06c6ec2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566da75006a8351bd5c15eeb0b66d4df1
SHA1feb29ef3903496fc02178b67b8295a9f18eb176b
SHA2560dfb130136279e3fcb9d6367091aa3dd70eaed33c51fa0c7ad13a0de291cbb7d
SHA512a99ff401756e3ed3ec1a013e466b7af0260cfa3dfa537375e6dd3b51f3584de588279916f0cb96a27a92697aca7761337c4030a130760e80743d64439f6b88d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c65a699ed769dcb0f0877cddc1e3d3d
SHA1fa4796ed03a35e54b63f410f81f01293b53cb3f6
SHA2564679a3844aac73b015b4087bd82d02beccbab504aeaa0056b6bd6d7760a2a114
SHA5124d1dca302ac77155db0762ef626c8f561f3a29f575a0bd64822a51ce9fbe5be75e6d7a0f2476e153296a6d98eb1647e00f549f1d487e91fbaacbf4e214e25868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522246570c75871e90820dabef794dafe
SHA1ac26451a1d12cb8a97f5782c884a1a64bce56f77
SHA2563f6a89d15a8f82b5df08a6d687ddfb7d93c8045befd1523601c7e014bef94e16
SHA512246a7250b7152abc1c7e034138b1def2591e59aa5f876a61fb473683e0360f40a08273e3c92cce6f85f661074f124d07339123c7226fb55f862d52e73a695e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffac2c23f7c9ca063f20e146346b40df
SHA1d6d600ca149346d16688f0d3278ad098beb4024d
SHA25619bb4166623fb34469d5a8d8184c48958eae7b4ac25473b221161684abdfea1e
SHA512995b9a75ef07b3fd7d3ddeaab3d8656febe938785f1368d723ab8e03e88e914ca39a5e84796c97a509d037de60dc83c255228bbaf9b19c67cecbd64e07214957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197c37210493e91c484ed4da8a7d1cba
SHA17d8cb9475a2212d5a974c81e271bd03b05b28da7
SHA25647d73366cee587c208c7e0c067936e78fd10818bfc0f685fd5582435087f0950
SHA5128046130f10928ac12709aa86ef6c1f3cd730cac3a6118546d83ac899764ad2fdcd816776f2dbf5bd35433a43788cb2f836277a154e820ca25fcb601d59eec736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da8e39278dfa976dd29f09b27d0c938
SHA16fccac4a50e2d92bcba832e2cc96464802af94a8
SHA256e994bcaeee2672b4cd289e74cfda3e8b4406513559b4cc310441c7b764dce4b6
SHA5120b02cbfdef78b15fd919279c3d0929bee0754628e78a45ee760c10569b5db7dbb1c9fdd8ba77fa707c120ec9cdb662146657cd59e26230d73bded7279ce5abc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffd57bb60c6d633211da97817c41111
SHA152b3c49385e9a2ea2ed24522ba962791317fbb52
SHA2569f252a57156f7e8d2d56a4507f83ac6b66fe69b9d329f62ba032c480e5dd668e
SHA512d3b56840196b94a62c869193ce8233d2c49e8c66e31cf02604752b1fbb2434d79801bb2ef8efcab7055b31ae6e5ba8cb5aa4a1422571c0f3dd148fbc9b1ce154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598225b865c03eb58313c0111e5e7f20b
SHA19669ff6cece7ada5c52405f4077e63b9a4e6d679
SHA256e208d52a6ae3b2b47dab37be4d01795bc153e760d5c512fb067d96bea97956ee
SHA5126f52724a4c594304399db7a6596d5972f55d2eab78190bc42a086a30ec9bd39eac4e2558e3706ec8445729fd404f4c3d7e42976f2e71e9e6fff65ddae0b19db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426027718f44b1c0820ec2f0c3fa2953
SHA10b6b4f366460be47567c156d83d856978e01ec31
SHA256b765f5357e70db336ce25cd03c1d1136390b2531e1d16fcd390abb59d6a293a3
SHA51218e85bc597dd4da88df4b09609b356e7bbf7316ab840e241f267f160f9b4f249b2fbd2ab45cae95db3144871946788ee2719842216204b33b7be1e2de24eb247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58078576d5fe95f2376cc8127688c4962
SHA179b7ef5656cda1fcf3b9a9f59fc3e6b21be0520d
SHA2561854bea89f76d3298bcb069f7d0c149e73bbdd3da1380c0c84d0a06c04469d14
SHA5126b3194090fcaf2c89174e78e0a87ae727a8392907423f89d1698670e8e7400c834934cf6dee1afddd9caeb8835914c7373182cb2056007deb96f4cb940a32617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570727dc3adcac13824c42d7df96d5eb0
SHA158a7788be035b8b1bb6cfe3b3b33ccea03547a62
SHA2564c24ba6fb980476e2107f10340261612cc18392f0e630fbecefe509c54f9e19b
SHA51230d11e4efde8a6134b973aa3e740c881231ec087aa3f04fa5b27d7c3d741e8f86bdf313dc39a9776cdd6e15bb99c1f98208474c3e813615143281d102a1735c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c229f65f236f7bb86f1efc3eceeedf
SHA1e8239e062f7f0be494f4e672d989ba45bf5b6ccc
SHA2560ee58db52624d4600268941d183b69581116ad5114d803108ef12f0155b0c25b
SHA5121d2852f2bcb25d5bfa0cf3d95c51d3f278b6aee7d6c82c57fe4e3b740e6733b33918885af544c3df5aea93e459c508aac15e9e9cb7f3dc65b2321198efaf8b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53360a00fffa3645e27527a9a233f956f
SHA172b22077edab3763309b0a751a31344c8181b3b2
SHA25618ace5487a937ebfc910757787cdb42abed544648b13ef0a3622f13f31731ba3
SHA512a603e6c0ffafc6e861c65a3f4e5ead2113a5c6ea9f834db73490374d251b0e3d38abb78531d9ea994fcca4856c405edb4283c889358d03e2ca408191e3d5677d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501534eb941b39eaae7612d04efb11d85
SHA17bde371d9813223492b783b51faab79a14a3f515
SHA256aa6a3e4ad46c449dc9bf9fc809e3f5fbb25090dedde6351fedce29420a4f615e
SHA5126f9067c80026e7ca91109294cad82508f9a327f115598566bc9fd05b9ba6a3b4d8a808b59c40b500f3cde1c600c9338e3bb2686526e30252b5a642e354b0d290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50057f908c47d432a3c851ab5a8c77283
SHA172c3719981ff83b590ec5d0dac1bc32a3181466e
SHA25666afcfed28654a78e8c0831c781df5557f2c3fb08e44299b3a06cbb4b2c4200e
SHA512b3af0e59f90cb36397a3c709a87388c1c95fbb19ba8ed4e1476a7b53981ed9926742996d253e9b8043233a07d9c93fbfb6608e114cb024a2f131bc5371f973c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b