Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
dfa8235c8d9e9724aabd1e3d3e0d7e13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfa8235c8d9e9724aabd1e3d3e0d7e13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfa8235c8d9e9724aabd1e3d3e0d7e13_JaffaCakes118.html
-
Size
124KB
-
MD5
dfa8235c8d9e9724aabd1e3d3e0d7e13
-
SHA1
4e97bcc278f0b5c2bb040ae41e3c119d2de684d2
-
SHA256
2bda025ca072868d37fb0c0a4f54883bace5977a1e02eabac5f6768536ab9814
-
SHA512
850dfb6a251e39f37a099a0ca8d2211dc7e9eff4ed68b5feb7bd344c67ab2f98e980491d5b1c9165530f2247f869bf8e53f2173fc3e8e508261d48a2ca580287
-
SSDEEP
1536:8LbiTfAitXll3S6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:NFyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ab11ab6f06db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D687D3D1-7262-11EF-9F10-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432457297" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000fe0e03ae29256c4f109534e03d2b20da8178ac3cb6699bc50eef73c3038768e6000000000e8000000002000020000000530cfc043593d9863057da3511d91aba5bbd71cc4d7b0dc73137fa0c5511cd68200000002c17586d945b95e3f8d75a1d938d257fd7219300ddf88a93c79e950560b67d8040000000562284cfa5cd28eaa86ac05b4c910cc61ac3bb44e72c0d162025f835ef96016327c5fdb52c9319988aa4c0284b545f0c91193e6941b98d52f9dc4293855ebed3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1944 1192 iexplore.exe 28 PID 1192 wrote to memory of 1944 1192 iexplore.exe 28 PID 1192 wrote to memory of 1944 1192 iexplore.exe 28 PID 1192 wrote to memory of 1944 1192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfa8235c8d9e9724aabd1e3d3e0d7e13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb44dfb434257d0cd82e4b4c16218de
SHA191e56f90e24dc7a1d53332140290ead77f97f6e2
SHA25686d482daef93b35f42980b1c0b449adf3f23cfe070d8cba225032fae7c777682
SHA512b80b3bb18270a073849040a130f56e3780f903adfe04120e68614c6c36031eaabd04aec5abb0b33e517b2d72e4b229dd269cd5c3b72050721649ca6e398cd051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6c3d26a16d53f5003a9684aec6dc23
SHA19d245d032d983694eb20ab316515fb222f61a09d
SHA25679fd22d23fff87e78f0bbc12a7081a600dc9e10975d298a45047609a98e05773
SHA51252bff3d4d3d70e5ae9a784c0ec7fc7c239ef06485f74fe700a36bef0867734e4a66df876e4c9f7b11f4584368c545abf2f0a6725ca275cb52c3942f1a995f2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bf9bc2ac936d8d9d9aa88fa6bbfc00
SHA1a8a100b5e010adf8cc15ffe4352b22d2335cc6d1
SHA256706082e7a9f2e8a2eff3a810df896a8a7123d4cc30ad0e33f8c19ce0f29e271b
SHA512e0d35b9bddd01e86ba1ce189d21528df3c9299b66df07196863062f19f4526811c68420e2ff3b5dcb486f773f562a8daa87aa2a951369668b2204894586eb2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ccce29aca9e580d3b7dbc36f30e8c6
SHA1c56191518eb8b92d94ed17ae2bb48a817d9821ce
SHA256b33245f1705a0efa2ed9c37d4844b3f4839d80f5274bc68b13f02499418b52a2
SHA512725e85921669e8cf16cde9d72065efcb636f403a79485c844ef0e0e797be5f36cf92310b01725b3d655a62e383863891ac1b032388f687ed5ce7f927fb7eab39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c421bf47755cd47677b258d758882e08
SHA17c39fb1cb12fdc1c308095b19208eeaa0bcdd6d4
SHA2567095fb62146770770cb4268ea55c93c2eb038295f39119256ed2a13af279682c
SHA5125f40ca428a460f8a5da2a4edeb340f0153bfdf1963908a9b8d0c5fd5613741f700c5ec9aeeac18ebe17fe35d1a5535c99e6b1c51126fe86078094fbfe7b13e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579996d4f9f5b2387ed1cd8b9278a0084
SHA1e731870e2356939c3730eca5305d1f20735189ca
SHA25626a327aa0aaef11365a233f30f96b4e4150f8ace38983f203a634d2c789548a4
SHA512dcb5e8317abea2c0c05adec2c20a6e3d4fc8963cb57c0cc135cc32829ffd9f2566f2a2ac6052771db0738e52fb6519252f1a9d86c300bfdb73b8db010d0662bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83d6e1595cf2bfac175a998964ba994
SHA1b6a83d5f6392c230720af903450ff65cd3c92b38
SHA2568fa7c34ea01e654699b8be9bb5a5db8df6360c0cf641fd8eabe0d4d0441c0754
SHA512f91e77f57f385278983d0a01212b0d400b4dc4997dee06a3c9e48e2a7b4a9716ea067e40042dd95e110d950bccdb982086f04b4dc450874bb559fefd322461d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30264fb196ce2105d20ef2ca552a8e7
SHA115ca32ea6a5a8d76da3989d7e9d8db27d07b6d1b
SHA256c7868649dd80126f80a1a39d9d25be0ac619adb284650388096b212c2c18e266
SHA5124d0609d6859061a7f07f4901be460c2f200c2605dee04fda7dff5151006bc3664eb9e523daa1086c1fe21a4ac59e088d2a3d48108912fa1fbad729da35e8edfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d3e74315c436f06293846a8cb2331d
SHA16c215c68cd9eb2d52bc8754156186f18ee97d1f0
SHA2563bdb1c1124eb623dfb3e26368582500f64fce1ad8a9cf39ef0242fe0bf8fc855
SHA5122e10fe13b2512009b3ae80e4fa5d5520f233ea7f15cee35f4f317b5d5a6b467c716e29d188952f97238dca46e4df62db0e3d441fee29a8294685c617d54fa331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad0dc8a3b496479ba68033fdfa4fa79
SHA1122479278047bbc4d88bcdd38793c6c45d9e3d32
SHA256b7b689c85baa1626a7248a6a1222d1241c33f0ed4a6c457202c2c2b8ee4c414b
SHA512afff41824b2289713d945f03110801f6eecf3f6a8b05cefab03f70a44af683b40cc812f7f81eaeb63a32285d06ccd0ef7342ff9c470f4c3bc3dc0b4d174f68d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1d1a5709005424866ac8c282ffed65
SHA13154c0d7777e6ea01df097ad581619284d7ec934
SHA25650aac6ad78aaed21c3e496a45259c8a0ca5c7b4caf13232ae4d4f4d67fb84106
SHA51259d4fa6db4aac769a7d71ad06e04d6eee90a146ac4ec3bb7a0e09f97150229e8220bd11ff1771f55bd752c907d0f981ca8e1c93954e145380dcb460f0a8d50da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6aeff27a9bcbea3f6a68b5477968f79
SHA110546b89f057e0a12c905c2adcc0133646f56f91
SHA256a8017e793d96a4264df886bfb4bf3df8b9ad43401523e9748df378b3777f2acc
SHA512e1fdddf8928a549f279ad5cab6aa6a374f95be1d471ddf320eaa2fa9119c5983028a5849ab939ef2b6c4d28a1e73191280d970e2d0a6140bb5f237272fa76ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d7c0bbd7120cd14c452bafbc2d1448
SHA1feb3370fbe9740f491d74f79404dbfe47c643883
SHA2566a75d7a8d97d4806db71cf4df6bd3560abaf9c4f3bd3ccee7dfe3e171ad5b44c
SHA512fbee0cb63fc371407320079b153bcd418a7fcd5aa8953aacab0b78699a1b8703cf3f4bbed0dca8799a91b3b310b7b67c1f077ae73a516d1e1beb22a2e49a3304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f3f956654c9d900aa14a442412f94e
SHA1b4f4b22f5cc535e50a75b0db30635289e8c102a3
SHA256de2a38cc748533bf65fe59f699eb0b4d88e296621f4e6c7817befb5e99db4428
SHA5129ae64ae5329af77d5a1654daddfa22884edd7a7b2029b338643a1b4d71e4519670a97f34e9ebab7176ec447f0b6ea37fef2e60024b1fc19addc021bb3f0d9ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f702212ee1ef7e9b73d94d96cab21e3a
SHA1c68e8e937e7dd70c697d37c2861171a5ced0734d
SHA256068c91dfdb6c21be4d438b7433b40b3152dfae464bfc1dee05726e92a92301d1
SHA5129601c259581aa600d7f832d4001274503fddb6dc6f5311aa34ec55bcba28438d9e2ca1274023fa7cb128f774430f909e205d9d40097579d46d31250d72470f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b563dd1262490b5efc1aee6fd0e5cee7
SHA1eff7954dd861362b3598b3c6b2d0130f04e4aa78
SHA256b43b125cc07b716de2f136231ed56b96b1ee4ed48b3c05dd51464c9ca3884540
SHA512886df79eeab50e3e9f5577572a2fd8f13b8da96d901fab6c36e4e9e81f98e350c145d730aeb131ccffa047932d500ba952b30f25ebcfbac330dfbbc253f47001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a6f58d2eb40f0160001568a0b2e368
SHA11dd2d7b150229cfc7756a61bbc8861dd336cc5b8
SHA2569c1fab4c7a6e3b1a21ff02f66aec18491b67b4fab342cc8b2f2338333ee32415
SHA5128636a47e4e6ad66f6404034ff97d7fc71f9d98b1c647538d3270d440527c6d3224ba6f5a59e448a0dfdb3a6a669d54a6065544b7a0dec51f35cd940c39be8861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce2217958f6db49d536388c19dc72ae
SHA10aa577591a5b03659e07cd31371a3a67ebd996ea
SHA256c476df2e07982ee641aea24d7cc5c38fd184bd4ed11e35ca8f981737a0bcc4ce
SHA51214fd5e44bd9fa0cd2704de44e75b02a53a23235443f0dfa1b0e1dc469b16a23ddb240d3a2177b1a52220743455e28b0d287e2cf6289bda5ffad7c9894b4f3124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa691d48afc9d0460d07f180663f8c5
SHA19c08dd1f06bfaa4e0d06077f31598ad56ca51f40
SHA256ae64f3e877c017c53b2c8960ab5d884f45c9ffb03e36b3bbf8420f54f06c2cf3
SHA512d3db0caef24ae8a7e1812604b4ab9e710743aca07fd9bf0f4232e83edd1debe1e39e16c14364aca51ca45e74c28452a03c7891b5964ef997a4dc102d842d3a6e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b