Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html
-
Size
53KB
-
MD5
e2623b7a15cde4832c60fad3fd369479
-
SHA1
4c93e5c0a90e551b506ae2c960fcad773c83dd9d
-
SHA256
a9f29efb6ca2ef488bd564a245b627a82ead9849ca311b9078c8f0b1d43cd362
-
SHA512
cabbaeed38bdd99b39b3b336ab8ff282fa8d60ed85e9cd74cb277a8536a6e8d40fe2be77cf2ca186c27a9df2d2abf0bb91c8fbeea40e7cdc452567a413225db6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUxrunlYG63Nj+q5Vy0R0w2AzTICbb8oL/t9M/dNwIUTDmDP:CkgUiIakTqGivi+PyUxrunlYG63Nj+qQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000092639c9563e0664daff3f8d431ec90c40000000002000000000010660000000100002000000037ed396b3ee0c8bee9797b3d368efb12cc285c48b0efc5fe7f9a1ce3daedcb60000000000e800000000200002000000027541124168a0c53f68847839cdf6185412da4ce49f51b5f364bfa8a9b03a658200000001358923a5bfd82ee47badd62e918a047d2eb17bede48e2ce246c8f87bf59f4b54000000030dd13671a734ca0d06b9a7b58dac3f443d903b2ac14646cc79c744ef9bad9b1548959e066dea081bf4cfa9ed0ac2b49282ce60db8a0d1dc8559300a6857ccd5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a9c20b1a6bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000092639c9563e0664daff3f8d431ec90c4000000000200000000001066000000010000200000002a9c04be167fa9847e8cf3ce3825b4fdfa8ca28b6020823f3d4696018dafa8b3000000000e80000000020000200000004341eeba1bbef38cc4e3dd7a3957e934fba00efea61496d058d786e0a055f89890000000031e67c057903e1df4ed4128befc663cd97047ab4518acf859a0171a2736f83a63a5e3c5569eef219fc1406a9eaa1148dbd785cef167d0ac15568b2ca4eb9cc428ae33a6cbb8850d9ab88bcae35dbdb821cc6b1af2a5aee6d2c84ff42c1fc934a2b2197023d5b2f00cb9ddebccd7d8990cf93773ebc8df9652c3c3860f17762f3289cd00929e8fcdef9e4f6c2295854240000000f8d7a2f4e6f0b488abc1c3c0f17349829309fe49ee71579bee29a6be032e3a5cb319e849d4af0f622d51af1905178b74088612528b64aa086d32832171486bec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34E1C261-D70D-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2488 3028 iexplore.exe 30 PID 3028 wrote to memory of 2488 3028 iexplore.exe 30 PID 3028 wrote to memory of 2488 3028 iexplore.exe 30 PID 3028 wrote to memory of 2488 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56682dedac6d4a0ed5b14576f1cdfe3ba
SHA1d093e9d3fca3410e21f97bc6879c1bd50f2af9b5
SHA256e7c44589847a7c70f7e0c6f592900e032ba6d1a4df97e480078590c3adcf1005
SHA512d720a2565d900636c384cf718a8a06e274da5bb07912b4ecbc04ae8e07de22354b4a0b30ee2f4a96854c04e1150e8ab5eb253f9ca164006c55c6adb5a199a3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5972a6f8a1ce023a9fb454c4715b28
SHA1cafc650a3238a4fcf50811b5e28bc5368ac5fbe8
SHA2560ec7a3d282ae9f907dac93d376e3c9aa8b31062a015bb710a85daa8d74678d68
SHA5122e93f3f19a872a1cde7a49526d5d8a733edcc103417065b0d89936f38892069b309504a05fefeb81410fca8a0e3a4642937f753bdc1e15d1c01563140b28178a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd714d6224e0d4a8f7035c1d30400c38
SHA102c0b217a83e622c683b081559ca2a382a96392b
SHA2565d524cb28db825a8180527af810de60e793ce99eb97b001c86f9c5712b3aabe6
SHA512e8df32b280a861077618e3b245759dcd64dcf67f39123c7d41c00797bc02f587437d06d33d4dfcfadf474aa74243a8e9b46602092a23781484cdf8f69a0946ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f8f351e58c3c12d488d6a81c01cd18
SHA1d743a8c22440a801f7b1e2dab7545bbe58eedad9
SHA256bb0a5af74c8e3f4d9b54bd2e9388a0a5527814ba65cc9082290bb81cae00a00f
SHA512c10acf1c8aa9cdb3e3058918d36f83ec488400a0cc1eb691e488a57cc8655a39d9c571f6b0803576d2dd011183ac7a1d89daa0d49eaed3ec08cdbcee99a4679c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aeeea0590c66fa59f5566e753fa06f7
SHA1c7ac55467c3f09fc697a6d4192e93939bab5fd44
SHA256e41aa200d69bf46b34e7b6f5b8b1c0b03f58da2780d3efa376d3c8c9b78edf0d
SHA5123d67918f9cbcda9d5cb1145b0a2f2913ca93a607c92b05fd8f2d08e385252e058cb8e64482fdf0f4ccff33adc13153fb81dfac9d7fa562604bdd9b879538c4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc0d21b86fa3323dab801f98b9ea63d
SHA1f33d5d365f5b004ef05bde29adbdc32b1e23c88f
SHA256777b53669e0bbea1efab708321ec22eced6aaf7be27a093dd08a552c3c555b56
SHA5121ddec552ccf1053409c753093093d3ce2a7c82aca0513454fef03332071e5f08e655bb1e8729ecee27f1547ac25323cd20ac9e06d963722aab2bc22aff4bc096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5bec6b74dd1717d97192e8e152e37c
SHA1b9a54e51aa213d8f03bf169f7c9453966faf1c09
SHA2565830d24b67494974c1f5ff4c2bf610b8b4a730a315edb47c10fabf9925bdfd50
SHA512a51b08c3894945090d059aeb2425a2cb89dbf2152894bc4f6a6e93657e8f2409343bb42d1511da254c291b179942d8753afc30b23d5882e5acb4aff45c2215a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010666d180cbb7ac615b398f5e3b0d8e
SHA1d5beb8d8bbab0df12270869109bc338d329cfa8c
SHA2562cf446ec58d0fb75278b05a11c6902c9d6101369f453ed06e4fa951f7918d57b
SHA51252cb1b12ae4b593e20343023374cdf4921085ccf234a2d9fed34d0c3690f724b40e70ae3d312e1ab5b36d2c1d76b6e9c4484ab142a26d3255b8037aa2f948067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed72921a20676c9ab9411c84128c1f4
SHA18e0f50e14a8cb6604946b0aea6ea221bf6601a51
SHA2564ff81068481aa8fcf8af1cb98f7b0667c0469868d2484b8d0af7ec5e834f3db6
SHA512e86612ded64237638b19abee8bb19f935ece8fde4e81826c3307acece3d3f117425371085289fc35bdf9917f11cf9dd06e1dcaf47b839e7d52cfc31aa317881e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53845a8e0f81c408aeac65be6419be876
SHA13df5b2b9b71b6160e7344286de3cb3f73b07849b
SHA25628da8abbccb37158eb583b44b6b708f024d180a1428b77b81a0c64d4161019f4
SHA5124aa6df53ce8b7a44650ddb5af45e599be43bc74c61782a0399c3d9a6ea6fd9fc2db7d2cbdfa931de6587869ccbadab97dca838fcc310c987fd5adc053e6d7f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7e4f067e51b2bebc77ebaee87a414b
SHA1169c95cbf0b508c2d250bd17e0d658fc5396f63b
SHA256811cc44288e7f483f2c96eb54e01faebaa5b55751caeae8bff110030a3998432
SHA512f4dbb4dfa405f5c0a42894b2394b634fdde827f84e3901a44dc145e0048018ca500fc0929c9a8ce6b6a942e2836d8a30c73c3d38c7e1164ef02addd1bcd25841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23bf57947d73b3cf08ddf8a5865a213
SHA16f9c7eb3cfd22eb64b8c0fe5faa4a21cda40bc2e
SHA256395ea641c61fff189aa3c8616c6672b18e2e60d35669bf06eb2ff1ba8e5742ed
SHA512f34bf8156ce8b13a796a461dd44663aebeb2a7bae634bca6ed55c2d2707809ea4b821559ea9711bc37d191a781877f96971d25bfaa8a6dfb0acf421784e2c9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd5748982967e8ebe291281a452fd8e
SHA1adf99df21a43f5b59ae8b2b928cb2a0f8577423b
SHA25663c79abbba19a709142273a00dbfb0138944afee353c8e612384796045efccdf
SHA5124a835fac8a302c06d52c8a761df99ceab9059df9ca9c2a76e33b22af3f75c80a3af2503207aa561975fa7808daf2fe71b31f693c7fa2838e4e3f7d2316baa462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512fd94ad2903e7d66fa01a6095e0f391
SHA10cb8e1e5af79a620a5aa0ac8a14795f0cdc52b19
SHA256c3e4f008a13a4ba69299bc19a6869ebcc589c30d6236b2ef7a13c8f08279d5a9
SHA512563a6907f2a7aaf599e6cc88f10aeaad6e27fe9330fa44d122e35b83fd833c9be1e1d786bece792253bb37193b326b7aab5c89a6ec2b419d9f9ae0946a10834e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fbeb7f0751fe56882a8ed730e279c8
SHA1a6dbb364670c7887beddd45769e9435d2b69c368
SHA256db987a27088f83eee1dc9b1056d5720e8b4f9113bce23b44c9dd7a43d380561b
SHA51218868798e8435ceaca53ff97f7c02a6b80d4c0da055516eaa2942d02341a5d5be98458926ce806e1ae7e73e655b8f0d0a4edbb176402b3a88d94a2f0cc06c48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6b5e47b69b1472fc9ef2cf0c11d6da
SHA1738b1cd4e220cf6a048926760df593a254c35769
SHA256034c2beb4eca1d30f5e5ee9fee536718d4c4af72914e21a5c4d1726fd5245a50
SHA512da9d3d772f7724aa2ca560a633ef5fe98f15f1deb1ad43f53c8f3f87f2786842b00c0bed52cb7047ebbb80dee1ac1bc6a8f90ebb3d78f026cb96e61fa96ba86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64e3da4a8c649871864444fd7094039
SHA1a183a3c466f18dc611412092ed15db3bab332c9e
SHA2562c9926d118dd66bf517d90e9239cc86ef85a5e63f9a541cdeea10992466dab68
SHA512d88415594d8f36e654824de3b5e2ac66ebd9e6c1cd204e71908ab6b1c6ead07df18d3e5d97445842f79345ad79051d6ed6372bcf3195d5427ce8fa6cf3a0b9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258c2efde2b691101b2dc019208d9d36
SHA1a154677ad3e40c18047d6de7eafc1b7219b7cf81
SHA25691cbf9dcb19971e4de8f693b8e7b0de9446c0675d87ae8cda0151654fdd856c0
SHA5122a3d1c06341a1f195eac720639bbd779e15947c67584d6f05cce2296cef1adcf50f8153a096adee9c622b8b855b7c74d10d70e37f6e671e82ff491ba5fb20ce2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b