Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
3ba0f96e0a3cee8e63bcf6293d026e6f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3ba0f96e0a3cee8e63bcf6293d026e6f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ba0f96e0a3cee8e63bcf6293d026e6f_JaffaCakes118.html
-
Size
69KB
-
MD5
3ba0f96e0a3cee8e63bcf6293d026e6f
-
SHA1
c891d9a2e2c5eacd44bc057a62d994c90619ddc0
-
SHA256
e5b653dbbcf1b549bbe32f3271f6c94edf6a270311aeb743e06edb54faca0c8e
-
SHA512
e9d1f55e0fb4b70bcf24061be55374d90a800afe56eb602cd250f38de3129894e65503437357077c7691df90a389a1f5f6dadbf8980cf5c4983e85c6f343ad66
-
SSDEEP
768:6c1/VWEAc0xlCewifpkQdrpLKDQ+ricYMc64ZyQrvjyGuUTw4bsQfktQMb/f4:nrIC63pLorYM3kyCjyGnDkthb4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434922157" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9086e2a0da1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8C120E1-88CD-11EF-AAD8-6AD5CEAA988B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000009aaf5061bd079ea822871b479ec30888360e1929174fca0ea334f9702e2a3f81000000000e8000000002000020000000e13ee844c2c0c8b30faf4bc6f94beb33ad0f6e713b31539b55e0eca9445a03712000000094337ebc2036267eca93beba31f96c5ad283d93d2668ad08f4c63bbf14547d8b40000000e69dfef77ce9da99132113f590cf391fe7ac0cc6407ec745d23aa309f29aa20ec26af0432283edce92c1c892aeac78256ef42172c009820734339a34f9270773 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000003a08486f7d5fc3c1440a0ab8b41f76e39b89efbf7c61af4981e9dff0bbeab0ec000000000e80000000020000200000004a3515d2f3d739da510fbd0fffbad28a5be5a96df684785fbe88fad95d2630dd900000007c343ffe573d0be792c1ca30d70178532900764fa9cb8f08e85ef294e161a30fc289e229fb6870a5828d0a54cab012b5be074b7f8ba6b1ae99d3f6c8226ecf5d458b239c5cce0198cb9ab2860fea142a8f3e698dd921f689c5a530b547ee7b02c6b20794ac3f90e30a525b3e73c1990e0dab10890e159c3ceca1c88684d890733062630b0b893ae62c1df395e29f81e44000000034c74049be7bdc16b53d118183d5c3df5134eae618d862a6cb90e6a7c73cf641156c5b8d48ca93e1696754ab2dc2fec95724e926464844c8e31d1a7608ca6c77 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2984 3000 iexplore.exe 29 PID 3000 wrote to memory of 2984 3000 iexplore.exe 29 PID 3000 wrote to memory of 2984 3000 iexplore.exe 29 PID 3000 wrote to memory of 2984 3000 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ba0f96e0a3cee8e63bcf6293d026e6f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c810ed1ed176b0b5d396a518bd027345
SHA17f73465b94e935ff2bf7005adfb6f1668c25d9bb
SHA256dc223cf2979cb959d7085c34ef89c206e67cc0078bce598ea2f4cdcf7df60a5f
SHA512d5cbcf5a74e462acaac873bc64a51efd2b413ba91d770b26afdb87b62416d5473f570619772b77a5d2bd5e815691fded8e72a439bbadaf1c28c269ebb936693d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb429b7610810bf7f5cfe832be75d3f8
SHA14828a28192e37c10f97ddd46f9ddad68b43293d6
SHA256bb297b0b2e68ffd4b01b3005c9bb9e2863036bf9a0b1faaf6168d984fb7708a6
SHA512646b284f94a576ebb890d9f87467c4f257c772dd6e51f5dba480076d39a9a6a702154f916efb7961f49eb56f430b5a38c6be6a62a4cfaa7e7d671d5668157d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b47ec05c5ec72714fe2d5773429d5b
SHA15aab85f04155068a81be0af931b532e76a188774
SHA256c8a9961530170d943df2f31486ce1ad8f5ca3ec86e867693b3e74b9c8da3f81c
SHA5121c213f030866b4400d2f4ac8e2543273755892c79ca2dba69b53bb2376a6cf37ce33bd385a70a565b622c0d11132a05b87417a563a592a556a693714a70bac53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf45cb6ec62cbfdbbf0c453d30179e56
SHA1f0ad183d182fccd52f93fbbee701d70934d5f9ce
SHA256bad3c7b848d314576aafe82008d536c0e3dbb6733ba1de3dc4cda41b29018794
SHA512dbcaa78b3b51ee8d028a0629cf186f47fa5e2fa4e8064fbfc5b0f658b586e17694982469477b7a7bf6ff2986ad6cfbe295e1831ceaad359a811caa684a255417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f7875b643eda473ab00315273c4246
SHA1125ae68ddf19f3c1a34730f643eb63601b3004d8
SHA25649e7bbbf7f584a8f0953b54e39cc30da35b72187bbe3ea17a8484c9cc5ffadcd
SHA512695fb5532c17a374850e9a1aeb8c1ec90afb5e9c06714a8ca1d1e9a30763c80c169e457a04c0cd23d23a9a08eb30313c3f0341f9a8fa5db4b650f1a5138602d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6c6769a92138e31b21951f37052bba
SHA190fadbcd2c22c51aae25c3ddc7714f6d99355fbb
SHA2560233146e3fb6089ef8a7cca266edcad196b7a0cf70b17ed8044b7ef149d2fd8b
SHA512ba1a02c4a333150b602544f803dec6db0a02d59c64314fa43fb35d28334a1c6d9593183c85ff99186bd56be8ea97f31a357ab0ecace520dd08fa1119fe5f7ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f673f161e7f4145cfa53333b70de89b5
SHA1dfd66cee899527b779209cd84597ebf294a2fba4
SHA2562f567bdeaa8d3e2bfa48a1391fe4e958dbf3ffdc5dee34f74909bb446c3fbcdc
SHA51211ffc66ca54ccab41f47445c2d758aa415d06d6f1a5d8952d31aad78ccad7ac725bb6593f156b9ed05ed466bef23efbc1fdbd7f3a979490b5b63098505c7e96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8af009c142e45b6aff8a53f68f1da6
SHA1733bb30cab94f2ee77f532ceaf5109b9dd5ec096
SHA256437f12c530a11b3b42dd1952dde2e9741c5d4057bca02125a186c491894e4559
SHA512a045716d554209463b2f8a636c7419f28005167144ccebda4e98e9ea7af380a29937cc9bb8d576d58e1d2786e07c23822ae0e914c9337482caa50d70da3ad421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5277a64b0d58e8fe3298c80d30b352
SHA1dcff48a5df8b9ebd34bd4a5ac3e3ea2c56e6c389
SHA256dd705ad65ef0da131ffd0a830ccf378e48b546e298cc16520e41b59297cd7af9
SHA5123ee0928a660b59ac501f32d1921a3fd99748dc0789f8af458ecea651c8315e89b2cd8b64597fbde8dfd5501fbfbdac2ebaa0814d5a46fb71ea6c527560b43092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e39736ce4596c58806e2e049075f5ad
SHA154164546eaa52bb0af6de5d4836f35028a60ef62
SHA256f568826e84e36e2a608ce9b43c47f516cbacf986813f37c0493fc617aa1354c4
SHA512e80f9098eb4659d900e14bffc0272d9cdf782a14f04677a5a1da9a1eceb991677eb7a91f9945e1c487b4c664407c091407d7965a42c8f4df0bc8afb4932ca276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58646eab41cbcf19a4745a099670ad8a4
SHA1f71ec4a3ea35411d479d88d95d1a888487868287
SHA256c7b41da7ad056c6a4aa26083d4a5efdded664a8c4d08f33fb5babd722d7d1bc6
SHA5124b76920a55ccea172621ab64732e54826729d8ccc0ca5c2e434e36d4d42d52bf6388a99727eba992a73a9f1732446b8d47eb8cb749566c22a544aded617867d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421057e702930261d8164ab475cc6350
SHA1057f08599eb466896462affa0c5705a3b78f44ee
SHA256ceb4060aa0aa80533d9b32782766e1fd13280483e3ea8c39aaf1fe5abcd487ca
SHA512800e2946ea7c0f054ef3b277e14ec21e6e44ae71674ff783db7398c336711b1ab98155447a4df50f0dacfc0c81282befcad5351723ec5c30cd49abed5075fdab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560196accad22cdd0f958166a5714fcbb
SHA1ae7554fa028c1ef18850f6f11c6f571b0d6a1cbd
SHA2561d98510eb4461f1ed421f8f22feee08ac78208306b6221910d3b47b601e48ae2
SHA51286ef76523e1e8e926debe44530da515cb5afb7dff69594ea6059d69d227b8c650fd74ec71caf52454e5d547421656f1549329a4340bcde07fef88ddc191888bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59096617e5668275072d6168ac6a0dfa2
SHA1b4edd034524512fd2d2c7f6bcc88cb3c10a556af
SHA256e480881d4cfefd3f47c619b7bb5e8497ba8aa9b7bb238bab6d06f89b744f950a
SHA5120dc8cec0e19db6de6d27e80006d94399465eb8fbd3fd8efc06622ef9af7b06a774b07bbd54aac8a241dc829b9bf375774dea14351138642df0de6f5cebbef015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9de610cdbf779aebddae1690b53de76
SHA11458e1764a92ae2e8039c08a5cb3034210960740
SHA2568f9626c76843616fe1af3477edfd8e70bb14f1bc8a4d596f8fcf06307ca04624
SHA5129d486d9ac5981ba5bd85c912a95a314f51c830f677a2e021a12c21143f3e6eb57d06feeb913089f4b555878984b8942bb2ce055a5da907d73141cb7b575ef7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9a6ee6eb5d9afd10e27955d65b7a95
SHA14013845d1ac36d8f9da4861a59e2d77bf1c75f7f
SHA256ba3e18124bec8ecec846912c7ff8fd58ad40d3bde92cab3d5c4a9678cdd45414
SHA512696d38b5af5e63f7109a767a4aeae87ba117ce58ee865dd9c2aad59a9f0bb548b0955184e82cc33d3d7c946577ab53920cfe8e03ce1c08319ca001144f863d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031948e57c73ce2c5d24ceeaf1d3b7bf
SHA16f84daa8e60ba80977eab3932426bc58e86093b6
SHA25642872abae4adfb7da63eede714be80b1236a2e28b00cff70dda304a28f60a304
SHA51235c6b3c3db3c36517f9d620c83eadbc0e473b103be63430bc2a86bb2e33c487e3dda9b57c0860b7a01d5be8d5af99344a53556b8ac46b1694ba8e76670094ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe25b090b236b0bc922ca8ab2c08152
SHA11e92511f585b37fa9cf6ad70e021e8d0e32179a6
SHA25641b8b2d307f6c3dee730e3ade976ca23e7d2432111af58af856796f53f668939
SHA5127810b09d8a40e741bd12c666579d48979aa8d589de1001fe54be52f8ed0aedf53b3aa144d7a2396959d38b2fd1dae626909adcc44c4c190f37e6e36f567d2b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa54de31bd70f28feb52ebc0bc769a5
SHA12b49e88ce9a0cafd1f4fd7878ae1184349b59c58
SHA2562ca545d33998df2fec1403823ce626493147d06a615db29b147459db992b4c47
SHA512a2d771a3d03f18370a61898dd261a191ea2f065daa6e511f1e3cb86749547b8b23d70305cf7f67d5aba9e2f4d2e589ebc142054afa6fbee6f3353dad44bf7be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae0c4802608da5ae45a5d6e80f0175f
SHA178c64c6d64cc7758c4b8ec98391f4842397e31fd
SHA256e85480aa9e237ac3998e2ca28f1b4b403df653ff53266b7c55c01180c37d6364
SHA512640465b778ea376c1f18549a042dc583c4bd3595d2e7e9d4075e0c5b49839e3bd41e24b46cbb614684c042298ded7af2421c3188bc33e3d9d877ac594babfbd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b