Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
d0274623f57583151234fc1750f6307d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0274623f57583151234fc1750f6307d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0274623f57583151234fc1750f6307d_JaffaCakes118.html
-
Size
139KB
-
MD5
d0274623f57583151234fc1750f6307d
-
SHA1
5fb36634056a75b7a4ad3b47b7cbf5f33ec6f72f
-
SHA256
e48d3f21adc364f57516202fdc566ffd7a2de12b90d71a846c986f062d8224d3
-
SHA512
cee5836d69958d4a2087233c5abfd1170401c47f89ab6d26724cc7a454f026ef00ce9ee1dd8796710e9f5e122a4449f7739a049d6b1b5884ea0e710b9a044801
-
SSDEEP
1536:SvJOVapnlsTtEyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SvgakTtEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01705921-6C7B-11EF-97EC-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007d166b33a6e57a71491dc346ee340a983b333a9deb2d50153d12fbe2e25225c9000000000e8000000002000020000000497b5ebb86a63e72ac7462c01ce3e3890e2fce718558091b39681b55c0ea19e720000000fbc144da0c02a73e1b5c11ef6961a0ae23e15b880da23ddd28c7ca75d3b15500400000008b9c6fd64f11c9dc8f39ca421b7ac108a5b1bcbea519a23f45007fa9df204534c7c5fabb2409a91c80673f1f069c759306ac076093afb32add3845aa8669e0a4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431807976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702e731a8800db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009cab6eb4cf3c10eace61283af8350f7c90c512405f58901faafc02b5147add43000000000e80000000020000200000007920b5f9f832fee3d8b63df1680d04b357e491d1ef26bbffdef98810d78efd8490000000966ae9f0ce736f5343a03bb6dfff92aada083efed9d4fdd24611a5d45ae2b5286b7f05c5c2bf5532b127aba703147ac18580eddc06306cfa4dda3d2f83df0d05729d20d5de226b2b328c50923c0f6b74174b809c7a44d6ff7a49038b73d24e159e4e9bc16ad6535bb12a8add683e4360eec88229e335a4723dd10a051bfae86c23771e980ab1b2cb639aeb09f46ddc634000000089b8790427eede3c1065e93e95d7076b1ca616bb5cfd22062e334165af474100d9eb891d671d26d2d49b66eff4a9592d621e5e879aeebacab6fcf589c8522caa iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 340 iexplore.exe 340 iexplore.exe 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 1812 340 iexplore.exe 30 PID 340 wrote to memory of 1812 340 iexplore.exe 30 PID 340 wrote to memory of 1812 340 iexplore.exe 30 PID 340 wrote to memory of 1812 340 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0274623f57583151234fc1750f6307d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a974e308820216377021847c021cc6
SHA1a20712202c084fe0fdaf547bebe2b886e3b7ac03
SHA2564cf1100d154acffa6cf4ac0393af626e8a156c19f27a7b5bd27772b4d719069a
SHA512fa68ca576669b64fdfac00a5b9a1c73b12744b29da46d4b94800865339590e00e046c252b26bdace5a9eda36165a3ce892c029f2a8baa87c5dc79f8a39bea5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517bbc3af4c97a21fb6afbba0236e27eb
SHA183d252f251f93b411f5114dce75b5b9060e4942e
SHA2562dd890f0c5886f4e40dc1d35f1f0f0e726ff46d4453d74cebebfde287af07cec
SHA512c315d5a44b10f80839cf16db301c4c7927994163512f8187341786212f8ff5debefbb46ed2c6be6899181f28f02d9b6bd879c97232be12cf2b60f1facb2458a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578324c426eb8e2434db3f6a54fa07e53
SHA1a4af766057443813c227731182b53dd7c6042b07
SHA256fd10fe7b39a2dea553f6b483b4a1f0c848319ad59a1429948ffdde3a374acad9
SHA512971914d9298656c090cf663d8479dc8f689b759546628da9550a070b27ef59782e8a88701c3be9aa65d13b501515e16cda6b63877d76d52d8cc48adc56def8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a594335f99f7c7ffc9abf7f496674f35
SHA111412280af83fe6f8534f65d07915e1771519a84
SHA256439ad9e37492330f68933245a3a1477b6ce7bbf3c0af0c43f2164978c0bff31f
SHA512f26df214d2ec71fb59726af8e4476be3ad82bbf43a6ec19beb2cbd2679d23f18bfcbf8bd263d72f89c88542ebbd9cade746eda6f5415f24920d2da0ead41e226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e53293a5ac4850bf409ff9910e2687f
SHA1f91e9eac8c4e5afb0676f830b8dd3847b35c433e
SHA256c81a30a931c9dd24daeede38cbba6172e76b45e621aa84f665054fec4f345bb2
SHA5129b1e3b55e87d46fff02cb922098789aa9f202e5c541a2859be204d2584b305390b9537a538786eebc54c62dbc010ec1e36bbfca025f79461c473d7ec0d6992c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db9280ef788842efa24e57a4d1badb5
SHA13f2b577b49afc955c14d956aafbbb2edf15e239f
SHA256a5fed1ab467b7e36297438ee84544ce287329ee684adbd86e491cba2ae8f9ff3
SHA512ab78d939569efce99a03b1dce6252bd7c768e0d77c8c2425ce936bba3617cd630574f5b99eae42cc8bdd012a33219a23c0d0f9af91d14ea88dcc1e1b9d7dda13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f632bf213510d50479cd5d6efec8f8b7
SHA1f1471160c69044b78c876a841e50cb68140d8709
SHA256290d234db7f7401ed40506f2b84d3383b3a062a2f1833e5b57e33d9f7af81e3b
SHA512a3ed0fab6b9e1eb6e3827b261722ae3f28852533a096cf602c119b0d2134949d4c5098384be305d384a7301fd072d9edb50d2d73a8cb00405278ed29123624c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad0db7ec4ff3f84a76881671fd85090
SHA1df61448f88f11aad2fb218f10af58d8526c1dc0e
SHA2569783b63c84e9f778b0505d7cf827a43024e90b18bcdca948aae15606f831fc22
SHA51211344f5fd0af591bc2422551ac2db29e1438d070056a287276ac63f4f984bf2492c2f6837d8ea4c34f42508722256834e75ae9366ea2f1929d6a6b146c4976fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d10a88824154aa87aadac9e4844302
SHA1eae3f0c0fb5d617a6917cecaa9225ffc23263a38
SHA256e8a2a7526b5dfb95170ec46adf00eeb9f4de25f961a47276a2fae5cffa983dd7
SHA512d627b829ecc4da1dd0a48cdd60793293c436ddf43eeb70a905293a43315772391ce19a2584bd61000dcc68cd8f08adcc31ac918ccecfa34e693e63a1fb85ac2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a64d4296497175b27ed33b77c5d723
SHA16b740f24d7f2ce37c737ca4c754a5e86fcf881d6
SHA256681da1673ce37ee5092be00dd1db42db0076f46caac7d78439f2af76cf84792a
SHA512fbd84a879faba1faa8aa5949224dda9a9e7141c0ab45773c4bf2e7032b8c97b9ee458dddae7bde9c796b739f8563e05d82dea181786d130705f63c7266c45bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1018ba12247421f13b9c01c46d19e7c
SHA1ce31d86ef77c5a28d952db83743c6c75e0315a53
SHA2568601d311d22ffd9447f9d98340f2cb2db858e5900fb847c5b65fa7e8d1725bd9
SHA5126eb1b3dacafc8d203142821abaa0bc2d8a435505f0be805ece9a61e06e2b17ba63d5f9a962b1026d5802461b60fb3e5ca419f20bbc2f56ae6013f0e5cc0c65b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f664c61c3590a67c044fb547e9c7c394
SHA121fb29082989caf8250397bde9ce3fe1c77ea1a3
SHA25651351042521ec43666dc37b02055b5d9f72338d3bd1bbc37d91ef54289fa5022
SHA5125f5edfb4d788dc6049bd6fb0946a9881888ceff8fccf71bb1d26c099e1b82ee3f5c93de17793df954cd64b678ec6d36783fd0f0d569917411ba8b1e2a0270455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58915b35de53ed0cd9b176b6cd1baaad4
SHA1853559c48416446e8c562424a226115944974e55
SHA256d00e312d1f5a8b18f8bf44fd97dd4c63b4c47f71dc38a1e34a445847df869334
SHA5121f41d32fb17fae2fcad2ff0662790b6c893a4a6f71439982980879903d02a5c5db24052d21a6883b8c7d186b1014809051c60c4c05d4ef74a0a5da02e03ee17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44b3b1bf230759be5078699bb9c2466
SHA1bb6b276806a4fb9905fcc0788f70a790906e9c0b
SHA256c2d00ba4ae4225258b1d5cf5156becfafbf380052ba0b59ca070f2a2dd20aeaa
SHA512c7a0d0519c0d8c89e41584fa51011d68de099d6f5d191f019fbc7a47f3ef4499d4c417845429939d25cf2fc8ef15c11e862c2d40b5b637fb8f136a78e6e38861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5aaa54c43ac7b4091c763c281e10134
SHA1d7443d6d4a54a17d99c8f77af7c9b9015f8d5b3d
SHA256c0dc9173d7518aa02b77956c1efc334d6fdad1d49b4237ce7acbc200905d96f9
SHA5126d608e5fbf4f8ee0263b12c8d86748710b10c6860c0d3ee9d438370f2b6b25cc5efb25a696499cd3c620738d5a8514ae6b5aefe2a4078b6b39fe858923f4dbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbb6c616d6f32feb5a0f71e4a8ed309
SHA1cbfc75f32e3f208e354a508f6e32caa5dea5565e
SHA2565651e7841147bef13d2c2e54045aae0fd5f881409a84a315cf9fc0be92e99af9
SHA512cc503a3f7a8c0dc13eaa791ba5efaa1f32041747e8b7c94d8cd6ea0ce648ef462e728054acef14cc12b751c8e1fa6d9650e7a3637b1eaae0862ba99a9054d146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b652784247333203fe9f36778d360bd5
SHA19f7223a6c84d454851a3d20ccadb1db91e7314a9
SHA25602601f6ecd7057c7570cd5c010b0bee5fd62bba811741e2103149b2dcaa5d554
SHA5124af310874924efa2c5eb2c9ff1278035cac186796759e0c18d00ef27564384356a53fbeee9a3a5d37531a6826c96f38827c9313c7a555f3c582f34bfdcce41cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab60040930b14b74f483438989760a4
SHA1042a11b317d3c683abe110a06aedb17eb1940aa2
SHA256b7429b1d13c4ea11678920c6df2196be7a2ee934d13be7b58e0085d03bfab416
SHA51292603fccc4edb86fd6b46133a3be86afba74ce0df5c1eddb8c74637e4d53a10ca3dbdfbfd0682b2e016fada42ee6d6ce0456e7522d45424e9aba0303cbf814be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b