Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
6a9126833d77113b1bb76e5b44bd9e17_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a9126833d77113b1bb76e5b44bd9e17_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a9126833d77113b1bb76e5b44bd9e17_JaffaCakes118.html
-
Size
30KB
-
MD5
6a9126833d77113b1bb76e5b44bd9e17
-
SHA1
8ca807f3b59936a804843b2348a5a8bebeb0de11
-
SHA256
38d7054f7314509e13aa983ce061216eadb6bbc91a2fedf132238b1ab6613836
-
SHA512
19f8b815eb8948a7084b78cb0c5bb103b124e0733676a1a9c132300e1f46197e09b40846147c516806ae8ea17ce18ac984068c9adf6fc97e5ea9996ee48bdb30
-
SSDEEP
192:d6zdYtScIh3Vw786T6ouxENJ4UIDC9IzP:YdYtScIotY6X9aP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fad8ae6b423bc7132645c4bd79cb71ad8ce149f040da65634cc6d2c4923d7c3f000000000e80000000020000200000008cea98fcf4cb1b5d9184bcb51a51b6ec13af3d3d75eb7030591c7037acfef61f200000002f0fe3663d5aa67d9ad39f4064fe9243bf0857b5e7e0a5787c5431e6639cd669400000002509a58721b819776f3a48faae16f1c8ea94c3f0f648f9b1be1dfafc73fa46c3232a3e0565992324d190e4f03444cfffbf78f1aef971266c0fc9ceb99f3fea97 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A8B57E1-4985-11EF-A3B5-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000b60335ed722ef7327b56369a367762c8646fa47dcf4809420837b6e9c2a0a315000000000e8000000002000020000000e74e0f59b54291a940b7099f4b7834a06e12319252002c462b8e0f781fd431fe90000000e06b932115682d21b13ecf8d0e25a03f432eeaff0586a11abe571b83068abaa5a9f10e1ba026186056dfb178b18b499fc906f25bd3868c94f0655a452d1f552c331d73bb198ebfd557054fcb1c58e13a73bbe736c9ced6f6033a151203c489345a2c293ea0192203f11e056f6e42250c454e544266c740efae222920391716e9a48bf09b5cc6986eab979bf7d06656bd40000000ce6aca2fd921275f123dd43fb1bf7980bc4d0e2f576e449062b55533f35b0f843357e15caa98942dd5fc7661b48ff6a2171c0e84ad6d48882e5d0aa639296ec4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ac2f6f92ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427964232" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2848 2740 iexplore.exe 30 PID 2740 wrote to memory of 2848 2740 iexplore.exe 30 PID 2740 wrote to memory of 2848 2740 iexplore.exe 30 PID 2740 wrote to memory of 2848 2740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a9126833d77113b1bb76e5b44bd9e17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b89fbf0b658e1f95d6b67f0e2d24e9f
SHA19a05610e40e67e1a00b2cfc4a4033461f83a4bcd
SHA2569602a023ac6b36f03823b12013f4d965f0985fd1784e1c54646471a33b0dead2
SHA512abe07664ccdf0ce27ad46f5ec536576e5981cde7563bbf992f0a2d0d1c225046f7e2f2d63cee4e90389adc61ffa7d212b059a7d9f544c43e422cd4155083f4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273a736a0263fa25ec57e4df5a6b8172
SHA19280e05b827f694e59b7a0e32aa2de51f11df2cb
SHA256278767b699d851f9cb381439b37dddb4ebed7747405ab81d38f7f1699606547e
SHA5128a38952798182dea4691730a7591e5aec2d8a2ce021ad36c276e24e04e277a8bf44cc43181186e5fd1c95bc71bb45b3e408c89fdb97848442ee812136dd0a1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57251211b12ec159fc05cb049c0989ef3
SHA1457208f4790da51d86e9b3a0ab0ae707241e70a8
SHA25637627dc64aaabe502f31bcc0d83ce4127b8faad2ee3a531b70a1c326ebb0a791
SHA5124e4418586dcdb356ce1a8f80f1a967ee90daf63802f937ac1529a1c78db0f6b3522fdc9337202e8fc4e7f35933d39dad6c719aacd85f123e386986c23aa3a982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90c21c2944af802e691bc577b202174
SHA13502ddb018b21ceebf52c8e13aa18aba64f563a0
SHA2565312f8fe160343f116bf6b78f252437179b99db4696cb268790b37db97bb8c8a
SHA5123a604f69dc2d0373c81a5848e2e70201785924dde6c21da82a4084041fb7bb8a28c5a225a6796c07aa1c11db4bda22bc279e6b5f738bc28ad2712d9f90fe31a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4683620e55502ee39f0980438597c18
SHA135f433506089d81cab83ea2fe233fbc6a8506c43
SHA25676992d0fcfe17db0c154fd091ea2a7206124d2a3ae06fa5a92f2e130227f2d34
SHA512dc52167913b70252aadd515983db619e05e6f4d13c2f17acf16b44f03cf08492cd5126fbd9b9a30b2018a772c8b23f52061d0e1ceed472907cefef499396531a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc81f2a2a8655569e04a8c8e8e46c22
SHA1639b39b0abe73771edb26dd594646e4e18464215
SHA256b2758737f501d512ba947066a433a3705a1f507c7fe623846a474f5150e73e34
SHA5122d564e862b764e1fa446820c1833e2c980c996a24374caacf43bf3593b523833be8279c3e8fe5469a6f1a53adf97f44c536eada4720128c29cb9fcd47acc449b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d436c48b12e49ac6cdf88b61f76e8bcf
SHA1351ce37cbded997be2c208f71dec0988e7ccb9b6
SHA256ef8af1dfa58e1f466a673b5c7be3eccb9d033914f93270850c90752fde964a6e
SHA512c56d3952bb1dea24464f1efc4fbe4debbac5709c205ca85466052e804752fdbd721f215e04a29baa0e03f79d15658af2f19b8b1c664ecc148ce712ff60b1e000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ad5569a15db9ea451cafbc6506a657
SHA16df2b83582df0f98b38dd054a4979f3a4635b38f
SHA25663c4f275637002f468d50a25bd0dd67f337adf33ee4b11e0265247ba00c7de3c
SHA5121a345be852fafe1d1c63f9b02c15cc16d31d08dda7040f889630c2baa2175361a9c6fc33319a8b0543830c36af7347221c9e61e4ef37304d05c6569eb5aa8b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c43d062c82623466d4b6565cf236b1b
SHA14bee515eae140e295527eee40faf6ca5af5ae79e
SHA2562fa5a060baea0f23afcca83b0e17e9124d4a8014af2f60938246dc22830e3097
SHA512afc548d691a45a443541056afdffe81d0497d769815fbc1ee2d4dab13865935712a2b8f6b73f32b73fd966e134ee3c5e5c1e960384e817cabef7c79c2091d50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abcff359d895d1c07390254a0361972
SHA10cfe00e4d5111c69ac87c151901c98a1ca5f1c08
SHA2560d9c9ffebe0de479d9e0c84cd2fd7370d406a5ca36ad2542080622827110350d
SHA51239d2dbfa2f6db2990fac23303de71c2910682da233729d61ef02f6e7ec9232e5824aa9695822523a19e8b1681f9ac562c89db09e9943540abced62855a4ca928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab110669990f9a3f4712e775999ed024
SHA1273c2b8378dc1ab7afd9b5a4b3a606241a6dbecf
SHA256b2cd49a6fe56da9b85fa4c644fe0fa107569864443b630ec59da130c380d9e30
SHA5126b509abb747104d3165dbc11547d2ce0c0d2ef2ae6b3a35b1d52d8424f6bf24344a93285b2e62d923080c3f4ae86eb603a5c50cd444e788b00f9c7a0ffb738ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56216fe1797af6fb4b3283a5addea98d7
SHA132db4bc1214b5a9df8f91264cf5330c3a9e81ed0
SHA25639b4110d3db43c858eba711d44bd79d66dd749ef92e37835ad2d40e7a6e28607
SHA512f9dd587a2069a0fc4e8ceb07508c8c1aba37d57de51fef5608b787ba15564b1fcb6f3e90fb928e6a70aac8cc09838cbc1369799ae6d019cf8cdb760e75e6c697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6eb71a6b6c82edc5870fd4f70060ac
SHA14f66e5215cf79a2535c60b9562f0661c7cbea596
SHA256daf838f22bcd297c4dedb083abb7ddd85cd8567ef664468159d4323d9a200b4b
SHA51237b4ae0b881ffdc6a4f30b555524968cc0a65fcfc159ff093417585e49bef57548c0106b8fb5fb8d36f26595705a4d0d9b305d36b9ba444b68d2cdfb90b2d894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f02d1f4b56cfabac23e1e39850fa84
SHA19ed85816c8d6f52b3fa9a255a52352241097251c
SHA256a99470a6687bc903dcb1ae2afb96371b381340c22b64ad2ddcc1ac95c87c1495
SHA5120d10143c8df271c529256077206d570c2668a4b7428fb9ba48964d3fe1f4dd985706f7a4a0bc4ee767bf3ad1ce9efccacf011bb8d242d06e2c9de8037051a14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a376b6765b45f7d72d6554e48b5c5288
SHA13af421efd4883340004775463d0547ada2ad6c66
SHA2562b65497bda4155b1e13e8eb866a5b4d58d95bddeabe3cd903c1a32f5bd57b548
SHA512e1597f751e9ab62ea27d009dba7342576dd8c9c549433909c588a809ce83b806c4f8a07e246128c825c35d860be7570b6b469315a65926d2bad13daadb84e992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854b24a0293bdcd185abda7b79fd3c2f
SHA13572c6f86656902f1d92737d834b013b66d09e51
SHA2567c29f2c98fc89eb9d7837d3af89ef2cdc9e8ce87255bc5f8b7d1e82a593636b2
SHA512c1756941b24452501637da663c389a6ac870f616324259b8f3e26528b5105854bcdbe794b6d33072ff04cb57fd62638ae969f2e4767021ecc6f11112c866e77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca58441f48ef39edc9d178d9d79a445
SHA1a7fdb54a3400058620c0bcd8ae51dd9eb97662d7
SHA256a02984fc71d8f02e2f6e1fe0c0ae262273b33c6412caf307cd22d7fdfd02af87
SHA512e50a7e6839c3c0430181697635600eb00a3474a9552444e422a085979e0ec94d4552237654f9522b2665039b73f88667bd442c416ae3caa6593893daf6759deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d12b11e4da341ad74a66edc8961bd6f
SHA130dfee10ccc172f9e16f115700e85819f3c8539a
SHA256efffcf5be2d414ae4a45bbfe38a3a109b003573d2da6b212afeddbdc9fb51405
SHA5122081e80269a2adabc7fca643ddff3539cd497494318eab0dbe9ba46a278381cb0de99914108c366aad031edc383fa14da3b4577ff5046f6b341fbda68368d57f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b