Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 07:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fa4fca662255218488456760d38cb41c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fa4fca662255218488456760d38cb41c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_fa4fca662255218488456760d38cb41c.html
-
Size
112KB
-
MD5
fa4fca662255218488456760d38cb41c
-
SHA1
347e435bac9ff449ad9e70e932466734751f1c42
-
SHA256
346ee3b31a36cc7856d756bfc1dd961c81d0cd4e960b31784c45210fe7b9075f
-
SHA512
6dc47224fa3cfda651529baffd7dfedbba4d70c2700b844a14363fefa9c56ec0850804346cc5f9940265d29e30f0d1494a16277c829a843585c03b1dd24a0010
-
SSDEEP
3072:dBUcjvG8rMdcXmNRS4ascI9ZbRAQslEQSdv7Y:dLrXmNRk
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442740949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{542FE2C1-CFEA-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2556 2084 iexplore.exe 30 PID 2084 wrote to memory of 2556 2084 iexplore.exe 30 PID 2084 wrote to memory of 2556 2084 iexplore.exe 30 PID 2084 wrote to memory of 2556 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa4fca662255218488456760d38cb41c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d89dcd087a4a3babada524bd01929ed1
SHA181dcdae80c6ecb7b7f4e15b2a7641b98e8e2ecb4
SHA256b881f1b3d963baf6189264b47db0dda26f8e020b0d54e160dd8a30ba1101d6bb
SHA5120c06307ef3188c736ea055f8b817c21264fbb09c9a4430095d8976be1499cde77057c9ad365352ca469a9dc869ccf617dbb29bb859190b09b2a2dd40704e65b5
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_CF0CBB3D0D6F86153E0774F3F89E134C
Filesize471B
MD53f59a5a454b23c2c79c06554af88527f
SHA10493467bdc1d9cc5491200f76610b5b8d47781fa
SHA256869d9f2340fe6a980f38d328443c5ae6eb1818ce0799245ac20b4bc37efe9425
SHA51253071c9a07ebe826bd29113fd99de3a25d330efd408986c4386b18f25b846278820e8214a255b2730ab8e53199d01faab7711736e406a0c86fd7d134e552ec40
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD54bf1ae8b19b0c96d6575e7a1a00197f3
SHA136c10add1e1d36730c03f6b52b835d901ce4e323
SHA2565982464bebc91dcad867fc58ef8590f10b4c699435fbf63cd3f5f234717a6bbe
SHA512341a095ea52d5ce31c38a32cee6c1ef5670e73bfb49148cb262a795c8a17eedb4bcd5ca87ec556700cf7bb1789277959d2d5bca26cee282e29b7964c0de08dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5b72fdf9e3e91394eac17b424bb247bf7
SHA1af622080eb1ebc65c8848b5815625ca0713ce23c
SHA2568a2c7d83e2a19f8565fc229522f383a8c1bf56d14d59a8dc3aeaded8235a662c
SHA5128707f5f5d47906d4724a712d719f6697b03f34e21821c148345d93fe7297d668b98f0cced21940527682e7db5d3a25e56a5717feb29479787bae14857190b42c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD537098133e289df1fe3d99e9a1298fd5d
SHA14a3a604e08f486a58d0ab895e11c573b0b52f36b
SHA25630edb6680bc1e5fff0b806d43ee3c54f621885e3197f4ddd5790a06d99d2c7bc
SHA5129889d229141a6d0b9d172ff70cde55f1f3bf6f969ba4b002d2e523f4f13de08e4ab18806c8a2aceaf2ca12ee0dfdb4266b8060c51f92b9626c8c63df762fcf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5565151a89a027c269b3355cc007cf0b5
SHA19b783586b15165ddad262d647d1f8ecdad8e9757
SHA256f1903d9fc377d34ec8ee9c15669d32443b77a4a68061eb103c06a6f8b60941af
SHA512843a3d90f9aa843c6e77aad031bfb0cc052c707b7920cf4bcf18aefe9fbea6d3275aa344cbff74fc120a90d48a52b822f1be27e900d626649d5f121c8ce85d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5941e2d5fca8d09ca934cb1b85ba976e3
SHA105d8a31cbed04fca6c8830ce046900787784cdd5
SHA256445ffc45a2e832d36e0a881ba8cefc9dc4dbb1903e667bd741063e62bab036a8
SHA51220d5f04b668cfb9c90935bf8187a804265c83fab32ac1176a127eb9adba949f073430f88b0ddfeb8e2ddeb0407652fbc0e1ee834266955f929ab34581ce485eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57a610ad413da0d9f53d8115f90bd5f8d
SHA130ae7fa98d6dea0f2891cbfe9bb01f8c87766bf3
SHA256c355e59e3d8e6512522588363d06df6b5725aea6147a3d02092c5431b1910662
SHA51206141b6802b038941c32668ce50fe8151192ee4ae02ff6cbf21dc5c91d6698b57080ebfe2b97183f5bece29613b8f3fbb57ae5fa6197885c0c031c38a62d4f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_CF0CBB3D0D6F86153E0774F3F89E134C
Filesize402B
MD550e2f7c39550e697f018c120d884a644
SHA1f65ceb90f7e5ee01994dacb0623626f21370d1d2
SHA2565ba2c04ad44b4e68b204a5b4ddd11e9e38e20d4736da8d98edad4d276204de00
SHA512f0200d1d4d9cf50e90c1119cc5f9a39d89589531d61230d655d3e3fa2619cb2f52ce41d1ab71d438e4ac5fa17fc68ccfd4df1ae5e610cc2feae78218974b8a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd30add02add2d01be045341167a770
SHA14424b958461f3f7953da9c98393a1f0f56a4c764
SHA256187357057a19972da3938e84af8d651dae78bb022775942c35f26d8f570dbacc
SHA51234124de82faffb60013ae41957a1765a93150d0346ed9e0e6d8278862fdb611121198382336857ac3ffa0f791124a14733eb20e1fd2138d678f94501fd1f126c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56377cca555763e5b543beaf444414664
SHA1a57c2bccfdaf1d7e7fadd978381261f9e74c92a5
SHA25689dc25dcdfecb3f00d965e2343fa71262a109d89b4adda52bc8e7daad0462127
SHA5125586af96e27bc638a01a3fbdc9eadbaa037e94e064d24cff7d339a09d131b57ef687582e20606380670d763e9752c477c10848876476d67a688d14e4b8156e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa3c1c75689e3dafff6a1f12fc797e3
SHA1de49e1bfc6a9ef7fbf4aaf1195759963ac914563
SHA25610c4e816bace278fd06dcedfdc04eb4f66881b409bf3a4d25bedfb23ab601058
SHA512bce5a6fc359e3299b80ccf0891ebaebbcfb9aa59fe3fd87c283abd77c13656b9d753750e7838b24c9bfee42a9c200f0ebb2f182b35dc2a05b97d7bc34616d0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516698dda69539c3709bb9d10cb5e3014
SHA19e969466b6d28eba07629a5e66936c5acdb9e45a
SHA2569ec5054f3753eee5cf27b5b9c1b6a55f6bbcb3c8e1c490ecaecd959568956c64
SHA512d25aadf2a0eb78fd2b08d3b8d6e029d3c5834251b792c9cceecf5fa2a08f4f9c5381665c59acd2a153cdabe1104130cc5bdcc2ec6df17982bd751a36cb3dbf42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7b69cfddb8512399f00d99ac7bb347
SHA1f876836811b77a358522d66e6cd2472cd8b3383b
SHA256e166dbf42aeaa7817fc22bddfefbe0a58b4901cfec5148d4d981e883037c9d1b
SHA512b9205848e8812b1a8d907238d1c6551811ea9b6c0ce6dcf4fcdd6b05a8dbe8946e9e7be746f9e4a08631015503ac6b8fe67cc501fd8d001195478cd465078c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac625230e908ea9e74eeec07aa0c6115
SHA1ef5b2b9be26d5598138c7c3bc048aa4484a20f19
SHA256ec935e646469d2bd85e64d528668d575e4ef31820550f9b8a356732bc89e37a6
SHA51225474a88ba77d497f502b1493d12343e552d44cc5bf1c29d2e106de6d1986e253b9aedeab4f9217ee509d970083afa5599a1f9c0e51ccd49676809d7c4729fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd7b385e5b2d1b442d6aeebe62a6b35
SHA1bec70728d66039029bfb160f1fa51152e0362181
SHA256ac4dea07c029138e9407cc93ac5e533e61a1aee163b6c46b25c1ec78f7b64dbb
SHA51214ded55b24dba3302b139c194ebd53ca686fa0fcb4c2cd909807683eba09bbda912dd460200043ad4cdaff59b38c811fe25be0ed0185383e60d09e9a482bc48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4a307cbb02d7780a3d9caa5a50d356
SHA1d471f88edf5d1f8a3fb03525b08e6a4700945deb
SHA25609315521a9e0dad2cb4bb1679b3103e62d5fef08d63bb6df52b3ec8051ed4ef4
SHA51216893462ea3c7a1a05675fa239b953de82820a766e3af545106431b69908c73f5c2fb78f20db9bc88e78d662fea91eea1d08278ee540e1750af01899d44237fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df1904166de70fdb2bfef3f199f8e39
SHA16b714f09c1f15030d0c5fee12aab8037e6ce098d
SHA25657b5b59eed69f56f85d3d6015a3bc3308ccab47452f2535bf150fc366efaa99f
SHA512f40c15c051a09410789dcf81a2cf0cb782703258106b4d4fd1eac3d9ccc32f75848b4db03a3431d174f6155381289cab561e18357fb6ea6f55c429c101e19c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5119192b15f5bc4de256cce0c86f61b02
SHA14ad93beb38397dbc4eb7cc15845c43cfbe28ae36
SHA256f05abbd4d31e9958c735fcf81f1cb5c9579f93b3e34c8fa394f5d9f4b906b88d
SHA512d442db604435a25f7dde3413ab2d97f9f2511fa96b75da0c59b5d5e5225bcb97508685468986c522a8675b21ce24cd9188ceb8c1d3c4a2869142837634ae3402
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\recaptcha__en[1].js
Filesize547KB
MD519ddac3be88eda2c8263c5d52fa7f6bd
SHA1c81720778f57c56244c72ce6ef402bb4de5f9619
SHA256b261530f05e272e18b5b5c86d860c4979c82b5b6c538e1643b3c94fc9ba76dd6
SHA512393015b8c7f14d5d4bdb9cceed7cd1477a7db07bc7c40bae7d0a48a2adfa7d56f9d1c3e4ec05c92fde152e72ffa6b75d8bf724e1f63f9bc21421125667afb05c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b