Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
303934b0a75fa51adc72092d4f0cf353_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
303934b0a75fa51adc72092d4f0cf353_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
303934b0a75fa51adc72092d4f0cf353_JaffaCakes118.html
-
Size
23KB
-
MD5
303934b0a75fa51adc72092d4f0cf353
-
SHA1
a2da2f399c7c1689d547f6eefd9157c2752acee4
-
SHA256
be137b359266be49459ae20753cba2c0ab795174e6b5fb8b4399fc0db03939c1
-
SHA512
549d8a259af12bd057c1c4ae1563c22766148b2b2782ea615cfb73ea78c9653d8dc5d1b1ebd63b9d2c6c15a2cf5ef7ca7c000268b6400d1d25106eed520eb124
-
SSDEEP
192:uwJiQ1tXjuxvxb5ngRiQm+Hu5r76V5rnQjxn5Q/ts1nQieuUNnPZSnQOkEntnsJ+:sQ/RAdudA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAEE2A81-870F-11EF-82FE-DEA5300B7D45} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000007d1c9b2fe3facfc1d02038dbfe1db335482bb6f34453e0234332336f359f0496000000000e80000000020000200000007296e7c9aa1ab766de6a3319f180c30df4c6359e2ea9a403ddd0d60bd456268d900000000789f46de45f0e15b2b0ee5bfaf768bb3693703ce64f3a1718e0375289b51d610fa059186ddf808b20257f1e3404af836c810127bb15e284cd548d17697970c406e10111ed7f984f8225fef040ab18b7b60b870078dc52b42c0be577c0dff45736175b02268f0bac795f2169a599efa949b511efa60d1e64a5c544653d734d00b61a74e48d88b4c644ffaed22d4af6e340000000844482a36c1ec9c5ce04a9d8c3630dbbfc35446160ea6ab1b0a7a4edef8ec70f47eeeb8b28bdce30eeef2d1fdd232083429e94f08f3dc11696b710ebdf380df6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ce53a11c1bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000006a2b6ecd5c5140ed8b53c37fa780152ffeec5ff5ee4fdf899331a02c21168cee000000000e80000000020000200000002ea333d617a3f975e6be4d8b2ba29a028e4b33058ef14b0c78d991d981230ef8200000005f846aea7f120948203460ddfcc84d35bc790c4117123940380aba763fbb43e8400000005461440ad455b85c72ece4a8455d05ca62d8a03f1f660b8f54c12a7de38920ac71a017aa7f961867eeebd262b194d53fa557b57d17d068aab7991eec374c301d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434730606" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2724 2408 iexplore.exe 30 PID 2408 wrote to memory of 2724 2408 iexplore.exe 30 PID 2408 wrote to memory of 2724 2408 iexplore.exe 30 PID 2408 wrote to memory of 2724 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\303934b0a75fa51adc72092d4f0cf353_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f0f9fff787fd6b7cbdb7e723e1df5f
SHA141abbbde5272b3267de42a14c5f942ae4dba84c3
SHA2562287ab5a15e117d33b39a77295fa97c1bd9c534701c6fba7c2722e237ef14159
SHA512e94d552308b712eecd8ffa0efd388766a02c688f2ee29490cfab7ee94c785e2872dd0c00d78885228462d354fbd0f16e72b23be77314e78277a598e2776845f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af80a47120e66a4bec6cd9f4fa6b738
SHA1438e87c3ae3321e2def057179900dbd0c9e3d1d2
SHA256f069cb154957c6d4e49a0ead075e7b4553ff5e3ba6210b69abb49e5cec85038a
SHA5124785865a4f7fb549fa550ca8932042136f21c146a25cd14fc3cd4288757124c2c3cedb9ca51293d981a13a1203ed323e49f29866f8bd8d04ee473ea12da442c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52926225f45082cf61dbd10350dbec92f
SHA103b5092298372364e7c25d6b8f81c4c70a833a8b
SHA2567db40f44da5a30d1a7415af15af5b8b3649c61853f593c81437c6140ed73eb2f
SHA512fa1e757f997fe40b46ef9259e1c574b93bd7b94de9fd58a5f3c7e79ae042f4e6372c43841bdbc9b11c635f1016150f924f256ce753e471eacc71496675d6d6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daed7efd21241d7c626d08aa1f39f683
SHA1840894c883d270cf0451f23846943b669aff3dbb
SHA256601cb2d001bb269acfbdc887e11d10a3baa6bfe972e1cc3d35f90016a76e8a9e
SHA5125235ce8243477f89b09719b4dc7c6018df4c02498d7658ca7639b6e992043a46cf54e3d19ed937a8b5375776ed701c6051bc026e0eac0a9f377bd44bd2ba49c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f0eb81d32e847aebb10ac2171005a0
SHA18b4707ad4f50051106b1ca3e8b663d3586897853
SHA256c34b9a1601896ce2556b8ab37e7fd6c3c253eefbccaa17088ab9e126140f7f5d
SHA512f2954ed5618feba61966bdc7faf46a26526bb57e121b276f0352ce43487e6fe4114b0542e2b67730e9c62f9b381adad90890e932fb7811e5142206a7755b2fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b1f12002a5cad1c5f8377d63af3f83
SHA13f199f72d6e6a4c47371c3c430f51b269ec94533
SHA256366b487055d5e9a88155731ccd783acbbd4d603a6e10dc0e700a99b9a53f8560
SHA51209bcc109fd7a6c9f325a58117007cc61601d17f9b403eeb4fb6cf6981d2d1de369c7fdda08f8ac77afab7215746950289f7b80e4a9adf23e8b7026aae973e990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ffb0afe910a5857bd50a34604af24d
SHA14c996368ac75523c9c2513918be18d8cb2a5ae1f
SHA25630a1c386734b83e8f446c0fec5f482e2e7fe7bc3e9d940117b70c84a6e8f7684
SHA512fab3d2ec5f4ec8fde8cf878aad7cb49106ff22b188dd16a02ba62464280b772b0ceb057672c8feb0acafddf1c1ff0e13356a5a2ddf2d7eecd70d4bdc00028524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de56efcb4ca7822dd6ea895ce9503baf
SHA1413284c6e4275d8d55f0d7306268536f8cc43f01
SHA2564c580b3346bd93d695c1ced0fe3f42c81539a799aad38a537d0103e8b21bcea8
SHA5126e79233d8eae441e687b4295d85b57db458914a76acdfecd5b6f4c938b8623e3d377c2829342256ccb1954e704f47cd130e44e624ef5b1fd26bf8de0661c2aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57143a0d155aa610311c84dea72e77933
SHA1f5157725b7ecc717971046763f126c881d90c284
SHA256d91e9ca9d2f98eaf7dc1b55f1603bd6984f3095eea57e8a18d106e67c185d816
SHA51222a256af786b8bccc78bada17e6e05f6544cba5f56d150a7a4f5c884bf4b38dcebdec82ad2d0713f465a575b2df10bdeca43ead9adad0b7f813673007c2b2e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec6b450d475a8b65bb4d691f272d478
SHA19fd01a2f940ba93d5a6c3e63482cda85e89c74bf
SHA256ed460274899df52de795166432a5c318b82714191f0264c7a52342af20fced0d
SHA512a9ecfc18caa948145c2c995ae0093190c345d680fc64fba9a10a90930e09cbb91bd58c9ac53a212e8b7e9a7acf33e2bb9407cf0bc3bfde72d16d688fd772cd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7422c64e5d38ea66810d24f4457c2b
SHA1326c1364a0e9e6d1535731e20d88644fdda70a5b
SHA256c7efc56194add35d87893460e019b64d47508527d1c4e235177b2aa52ff4c80d
SHA512f54e4f6b2bc0b65acafba50d601f9212d98b3277fa5d780e9e6f6844fa386d5b446d09de0f886fc46c4c8771f8dc076ec3955235927339237bb857de6f358bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ba7fac5e87b367d322a3da4fc63dcb
SHA1da3c1af330b8b9a6eb306a50641ced86e84b7201
SHA2566c1d83c325c6a5b357ab55be144cc1d16f1b06ca34184076ae31f5e1634218ac
SHA512c3630884ac35544778bd8d186ba5260031329cecc3c0bf882509f93624d7a540b4f085a34d719642ac929738940ceca2aa27e0e13d9a51b3463fcb6220e3ca42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751ae357f80beab1836ac3aaa2004ac1
SHA1c2fcaae3d36992c66eadf620f1a49707cb6aa5cf
SHA256c0632551003ddee9aa2e44a5338a0527258363689cc606a8cc5efb51abdd50e8
SHA512610f35dcb81769aff8a9ff3d0229751856ea3b846a2baf493b96ec46913168278cde392bb6de139c431a0fcc1ef2e1638cdcb6fd84e29aaed5008b6c42525856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86e4d8aa85d0027a0761913b20869e6
SHA14ef17e61fa859b9b9f92cb4f2a79c76b12a75ae1
SHA25626e27adcff753b1b0f3e9dbb18533a5ea56be1a5d57efb186b1d35ec9ec47b0d
SHA51239a95d059a70a363f6a1b25101402cb8df05f37b8cc5620d33561e404739b456e8ed302faa851b5e00c7464beab43a04686b529844065f3e1e928a0732df6703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55392fecd44c580c43040896cfa9af06b
SHA13fef4a01ae5ee4b0baff570136eda6476887a0b9
SHA256e0e8f4927a647277933d8317e80d2e2cae9cad448604d5af01a24d73fc4e3d4f
SHA512db523cc2fed64c1bda4531db4a7bdf3a15ae4aa96e4f3bda4ad6b98162f5f62f0f4a32a12edcda15d2a4f6bf2d03a5688567831626c73a9ff7575de4ede710d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff943b65e0b4f71925d4c0c986b80a85
SHA1126a8491a84ca03f917523cc4d076fad862fa3c0
SHA256865924eef3245c880fbd189589a15c880aa1fc3900b0a2ba56e2e48e95702ba5
SHA512ef273c11e523bc3e3da6c9f4be7f2006c08ec4c31aaf7fc7ee69984cb1294c9410eccc6d670d249958732d148a6d5a180161f7a5fcb4fb7a33205ea3a76d3248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88125428704fd47f00a0272acddc0c7
SHA17b4e3567fb0c8e76c2b1059d6a45466aa89937e7
SHA256c0165a9429451f7e13bf317aaf8370c87dc6f88d482a9e5c0251b63042ba9498
SHA5127492781eb0c106fd2a553ff2f76e30d1850c87ffba3bb95e838e012a10207a6d86525267527d4a707335de280b854994be1540ee0dbe622d0757fee4ffd57c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c09ed4c7de25d3be76b71c7d5d702a7
SHA115d5a31f79315d93e20f39c6f2d3c9bdceb583fe
SHA256069e370c379b9dde82f1dbeaf1d789dbba3edbe5df5cb425fb2366853c55e601
SHA51278ac33a5bdc466f4b429f418b140dd9144f8acbd45ca2ec963ce8f5350e9e5c6c83234b29b7b54af04c637297188939ce63f372268311209ae196cd78d6ba381
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b