Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
df63348ae238ae0ca86fe3ad171f0cf2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df63348ae238ae0ca86fe3ad171f0cf2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df63348ae238ae0ca86fe3ad171f0cf2_JaffaCakes118.html
-
Size
73KB
-
MD5
df63348ae238ae0ca86fe3ad171f0cf2
-
SHA1
e80ce15dfa0f9b65c5171d4ec45ac34922be963a
-
SHA256
90a11b7f6975a347a3203d1ed844038ad061ee0bbcd3da905920b98744f3d6ee
-
SHA512
d332e7fe5ef703a581f59dda49fcc692a6fca9834bab681871d25b2128046d28269516ffe8f289fb5239ce19868e6c6813c0e32e765ae1e333fdd6cda0a91ec1
-
SSDEEP
768:JiagcMWR3sI2PDDnd0g6uj6Y49PSUgpoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRe:JcYTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d1b5675406db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432445585" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000799e6facb3a3643af6bdd71d8cee48b62e09362f6635ce49db0d68fd6f96328b000000000e8000000002000020000000d6116c4000b3f71f1b804dbce1588098ad8cd4ce1ea7360bb34976838074dfa99000000092d4306a9ef00c62b4677b1431aef8cd70326ef651afd67afadc8e5238468ddd3e69a61e2ca2802ad8738f0d1082b970731909758c07e8bfff573e0d3be8cf5edaa9e5aed55e5e9b47763b8ec3614504f762b0a1983269fcc72fbc3ba0e9bf0ade78241ec093f3464e2e059826003e3538fbc89a863e5233e26805c8855a8f1784b7e9e6e69e922021aabf22df6634d4400000008d05b39c829b855cd78e53004839366c0c70ca24b6d953038287baac969ca1710942a3a025914e49f6f3124d702dd2af55fe899fba5c778d5772e5e4fdb307c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91169EF1-7247-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c1d3eb6a94ac13c1d3a4cf3b9fb8c631a5bda44fa840dcd75e2269c837dcfb9c000000000e80000000020000200000001f78b5d5d691a2b9ba1c3d216cc03a53bde4f9acc53a1e47871786b3d28fddf420000000ccd08b5215f8276885841b648621aaf6d09462f146ae433924e240fe6ec8723e40000000c9dd5e9fdd28ae4b81500a24ad286d03250df1ae2ebeeac5ba31eaa4870505c31190ed07fc14ea5a633de414b01666b59570d5c982883d9830c8b05f4d0df830 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df63348ae238ae0ca86fe3ad171f0cf2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c562d5d237af803717f77bba9fcdf5d
SHA107adee6019fc40b0f9297c3ee322cf0d68ab9ff9
SHA256210af0382f641ef4b3dffdb5fdeca43be44358accf89adeb80cf6b441203427a
SHA5120902c0b2c2a793dd114fded6927d82141e86356c552ac83d2a4c9089d4ba4ac565c91994114330a7e6c19fc780a1ec7bc925c6e7cd7b05809334ca4d1de80191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850d36eb24c69f66d73699b51beef31f
SHA150d282a74d7c3c9b5d9a9f6161e527bff1c67a96
SHA256d5f38cf3786c78eb6f848a10bb9230b80a2d394ce8be85658cdcfa618eada3ba
SHA51245977b05b6a0aa6606717d56e1d722f23c518cdea9438e552fe268f97de1f29e639c10543b06af9a85f9a5cdc504ae3d92ceeb8cec787eef0a0fe543a52d9f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578bce7d39d62de0732856dc084ae5a5d
SHA1f45fcdaee74192e9cc2d17c445fec0c26f0e57b6
SHA256373e1ecd3177cda770e67363e90a6c13396240f30d839f0cb6b5516f2c8ba2ef
SHA512918f0d9a4943c3183da92bfc1594dd3f7e14c0fe6ef3823d2cd060bb7447097291a690f9f1da0f0ff9f7c5b5ffacc2717b89c64756dc02b13e171fc808d40adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67e8f558f0079b259acf24dd8d1fbb8
SHA1c97afe9e7a78b8d23af2fb64460c1fc1d216c071
SHA256eba0d12181ee77d09da5646a3f21b6ec26518163a3e4f989488411cdefe62275
SHA5124530cdbc09e4299e913ee4c1654f74021f28c400bd4000c55b2c63cf083006ea16348f25b4a88b8409649c6e0e970194793656c3ffa0a9b5cb89abb6c97a51c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77b9c9ada3611316087eed23c5d52c4
SHA1c26f500765e8b48406ff4cfc98a96ee8b6d5cb2c
SHA2561e042cc9aaca4d4a75b459529795e815c3f4acf67a15927387ee92d534435012
SHA51298c3562804ba1f7a6b78622248a22ec7fbe3d82648077c387b32bd484e5b4f9e81467495b6a0a6c140b4bf9f3725013232ac2edca57f0690f4aa0c70fdc24862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595306ef834594f0723fa3da161082d34
SHA1526441709dc2c3edf7ba1796f9ac8b4509e65405
SHA2560f4f3deebfa2fd6f564d6d12fdf39e9130c79c4e62d9cdb150c8aae7cabf943e
SHA512eba80de8df8381650fa7aa6047a1019f68c9a11f59d6fadf9dca7c77196bf3178d816c52a1562ca8a8efe84ab70701b8d512cf28fcc915aa8c7235c7ebbb977f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53380f585470ea498c67e0b3896de54b7
SHA14ba4ae965f11a7f662bfaca44d92874f308a6674
SHA256675a73ca8c52e86e9e59d4710c87f428f869e3023aad5ae75bb1dfaad86947cc
SHA5124ea219dbd393c4ff4d8bfe919ed2cc3fb6c261a9ddf1af5c928d13e38931eaf1105ad26735601e7a6c23a2914d980a15d8ea2c368eabe28333bb378080daa442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53291d679789b70446de68aceef080ba1
SHA14c29e206ee5351fce4ff47330e0eb96347cc4aed
SHA256a7f480b12e7be4e1e64ae4732a5f2d7b63ea3f7b1735bbbaa3fdeef06200ed8e
SHA51229011abe490aa95308fc64080be7c64b9907750cfb174a88c1435b8f58eee49104928e6fe7e1da5e72cda060f44ba7c33c0e73cbef66a2635b4223aa71fcd678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe795681086a79c530d86eaa39c3aa0c
SHA1da934e0c8865c98eabbbf00dc96ae9d4852ebdfa
SHA256971e9c094a0ffa9bae87a4f4ee6e4a0d636d0ccfbd2a964e289566da64e354b8
SHA5122f555bc940f001f6af4f268c42e657ec97b4222637d2ac8b883a84a8a2415a084ca137fa59701c158626133615fbc1070b765cfd7f3dd17fe91bb39eb1ec7964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf37fb4f939c92cf91af16ec8a36cc1
SHA10f0cb3026de3036a1b68c15a1bbadea591ddbba0
SHA2566424bcb47ac353650b053c1de5e65f82b66ed4a9557ca305d290a0a3dc76af31
SHA5121037c99d3f833bb306252f65147fa019048e9abc2136f20b7d2da9c58344b1196618242aab7b5a649737d849b297e9e4df3a6b39be4220a3b848e91f672ed503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57036a70cf9da0fecc70015d9935a1695
SHA1d39e1870ef975b402e3f15643ee7aae631d5125d
SHA2561588e40365dfb6d5d0ebe4316bd85f69cc541371ea88e72379c5dbd94dfb915c
SHA512437a5ddf30c074446e49460fa960d12a1e4500227e51d1ef77517b666b1f26d902ae7450bf82ee82a59c5a180ca8f799fcff5f903c1c75f7e2a442081246d1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac5e4ebc4ddc21b6045e01cf1fb2fd2
SHA1f3bd3494c6f9cfe463ab4e08484656aee8289714
SHA256887bffafdc54842c113a6f6ab125b5291aaa4bbff1159c9e94b990bf2a504d07
SHA512362e4a734292b4dec821ba210c22a36e01accedac61d1d527ce0f3568afab6eb4f1fc58979300cbc366f725502a7673fc805f64d4a2134df4392d92901202552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54531aa9eab00bdca52a2300940fd40c0
SHA12d59522a7b651f1fdf543d941bcc6d15dc369305
SHA2564bbc6e2796b37efd9a6c10870c5e5b34d5c1d95193b7961bd3df76de5c1d5f47
SHA512475dbb2fd8c5c76c723f8f6e733b28033b5a14aeef67f05ce8a3dec020a1a31e4b7b79ae8d578ef629d03ac828929db9869f66e47ff93d1cb599ada63ee14ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209f99e3c8520f5e67d1f5987b0f0fea
SHA1c2534e70ae6be8193e383009e895736804c81ec8
SHA2564ad70fa6911b7a0f69bd45b5fdac62a6b15d9cf33e81ea8ac4ac7709f99876f8
SHA512cd5005425f546178414dcd3b0b0fafcd5cd85d7a713db9c0fbaf9972ab1087df629140c976867a8f9396193c66fa2731e4d0bf684bc205f4aa2ef2ca7383a0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d905a7ba8d2eee2fadc80fe4ed84ab50
SHA19d60cf2ca94c70e19f0d554c15354063007f7162
SHA256c4794cad213c92fa2f44868ec4ae56aad8f4057552218987c1d7fa5fe4e28f4e
SHA512382bf41bde14286795512fc24fbfc6aebeeb0a349a5c7e50386f33cdc4bb24c3743b067c4b66cfe736b1ff1d86375f75d48974c2ad29eb93a58f348c9b9c6280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54741514f8d567a60761691881d68de8d
SHA1f9ec9879766334333f8b3ff6076887bebe22ecc4
SHA2569c83e4b2dfe4de5b471efb69584730b6f7e50db2c07ac1c23d959ff04061676c
SHA5127b2332f08407a2996e73ba80a6a39f70c43cfc0cfb25fdefde701697e3182c292f5f6a5645626934df4ccfde10ffacb5dedfb8853d20d09131e594d7f4bb5d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e07367d5abfbf7f684af06f2d3dd47c
SHA131eb29ca015a4b2233352658308fe263c4380f46
SHA2566024c398f156c3b8ad9d7188aef22e64fce9516dcd68db858ad953973ed2e952
SHA5126bbb9d862c52085c4dcc999eddd652f63d3ba6bf46900e3f24536375ee077f6388269fa81af227f211e92223fefa13115ba0b7ebaa31d53397a2cb85c6db2cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777baf0cc1c64d5d9b4c93c9308717c3
SHA17532887d7f1ae7330648b639e80ab88419830486
SHA256f012659ecb6f4bcea2dea8ba50f5a7e6461bbd215ee5a8ac56a6d78f9c6a14b2
SHA512905003dec866057a62df08e3b3a4ef08002e2532539a68867b58d7fcf269dece65012c7806e0c79665b0ff86a09febb02b6e416365420eff63a2b00e5b77fafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db719ce8aa2cf754fee2457d6f1bc8dc
SHA10cff6b28202a76c854a5272eaeee91cea6b5682c
SHA2567a13c49a733646974adc4ae45f5ab0f2f73aa09a44eadf8f2e12f71c68e94e24
SHA51283c3a9dfa7d62c72922933787bd3d058add8ecb819bfb515fa7a617cc4adb8e917b91b42b848433422869030a14e9bc9a4d5bb671f9b590b3ac7dee4c3c47621
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b