Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
dfb41f8898c2c31ed18aeafbfe7656b1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb41f8898c2c31ed18aeafbfe7656b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfb41f8898c2c31ed18aeafbfe7656b1_JaffaCakes118.html
-
Size
37KB
-
MD5
dfb41f8898c2c31ed18aeafbfe7656b1
-
SHA1
76d331563f05ffe4d9a6d2ee2c034bea40ef7d1c
-
SHA256
eb9309390c6b59079f273d4c21f1a3e0b3db9b645d9479a5618ffc19a3b238f9
-
SHA512
4b52e288c52705374fd3995a180540f8047f0b379ebc4e3550d5bf965db13a1ccb728ab50093d7f5acec5383d32fa4b3399cdfc44e10945d310978ed21a90e86
-
SSDEEP
768:OpLc4SXRCUMzor8yieevY34bvX4qvbpZWUA4pYwGjmbwwBi0IYRgQowij/xJ4UeQ:ISXLXRvJuvg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ef4b047406db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432459135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E0F2E21-7267-11EF-B2D5-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000007594e9be0d4935d2dc3e6ccaea5e8b60b932628d0d6e0793728ca16b20a82d89000000000e80000000020000200000001c73d30d68753f65da8d44a53576a2e540af5a29b5c150252f7d64250799ef3f2000000039698159d1030fa5e84c5eee1dfa58ab47d28c3ccfcf5b31f0ebc07ec18212f840000000a4d5f4bdae82f25fbade939227448a39ee4f6f7eb5b9714001caa29bfb5809db4f9d71865663dbbaa241c26d4c0829c216fa6603b67de600c40014c6ce1469c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2936 2688 iexplore.exe 30 PID 2688 wrote to memory of 2936 2688 iexplore.exe 30 PID 2688 wrote to memory of 2936 2688 iexplore.exe 30 PID 2688 wrote to memory of 2936 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfb41f8898c2c31ed18aeafbfe7656b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a249432d9d56b86b2800b033cbb1ec
SHA1808da3a5a97239fb9e7f9b3311e234e3ea67768e
SHA25696fb96043421489b3e7d2664945afcea96bc14bab02283b2a6a8e53dae5a5df0
SHA512e0a3c3282160053d5ce2fa382db7c917330818b375018f0901c69dc7e378ff3802b07e2aab195e3b26a7c8b5671ce40ec20c99b704db9201ce57d8239c8fd739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec727c76abd548aa49daf1ab13ade73
SHA12bf72c78488513667de26278b9282c5f4906ac04
SHA25672f355068ff129263adbf90e209a96b12dfcc2fc91e2ed20995214dc24e3171b
SHA5128d1c099a1852c537ee3cc3a0a0473bced377f752ea5f26361831a60e5edc1627b3e0f34cc38b6773cdd066b1ba097995c0f9404a8b2ebb2d1e9d2c5ac8a5a5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524adf86750530874acdc48b59cd16b7a
SHA15308c8a8a30438e5e5e574d03719c6551ef96634
SHA256d4618fd2797eac2711c2a49ad89aaee324681eb6e5b9d5a9df0b7c4fc4323469
SHA512312274ff5bf7de6ab4b43e9a3e3ffcd0504b32efbe63b78f8191be71c07367253e500cdf7254e6afae3d12e23d2662f08dd0bf8595e4f4b3efda2f610cc358a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57725e5bf21ab1e0c5a8870853e4ae227
SHA1655e92254000245ed4cc89c0585765305d0ba48e
SHA2562b2659d4ceeaf68a11b97d2880a3dfcfcbc3d26022e8c064bd7ba599d0543cb2
SHA512ac4bc0d7e9aca0d43344ba4ec35e3ec0c54ef308fd183c2b192430b66038ae867f64e040d19cbe7b9b8c62c7029aac29784f153eb178bf3f2ed45d6c8f7762b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1840e13909d48567a1337fe7d3a6299
SHA10dde9fbf28c39ca4afa5ca53a3ae0f48b40c50f6
SHA256fabe6e45babf061abb50e11f5d3683a237e5a8db77423a242a0255bf08d96ce8
SHA512b8c2a4a64a0ecd9c5b1026298a7dd559f0f394bfbea4196cbce8b01fe4ffe2feb3ff518b0d0509adbabf1c2c6560d01c95fae332945d70fc879a9f104fb67d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8cea56ffa4babad58759409ebd9d30
SHA19a238c2f52f1f409e3c7c44f6d91d9aaedf513b0
SHA256f0cd10afe52b65457c2745a450546112c2ba44e8d73657a12f2d6deacdf638b9
SHA5125c0111b1401cf0d0b7f4994282dc1daa4bb33b16b10ebdbc676cdffb93c4093022c8289430a86638abd9b358c0b763bdc2db929f2625881699590221bd8c9b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625463b8fc30994b23569e03adb31732
SHA1db965040dbbbb57d704726372972502c84afbbcb
SHA256839bfde9f2eeca33d6b0ecb12a1d1bc92e619bd845028e14049c9e7a94d7daaf
SHA512b4b8380305b77e9c6e6b9220f1aace6371d9d1fba2fa885f047a43adf809fd4ce4790424289714c737638c79e7a1d5c3658431272a335e7fc1c8381e5a7d100f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bae08b17f25416aa57a48eda906a60
SHA15ade2a5f82b8c61a2a9fc0d3818f622a85bc3af4
SHA256325342cb03fff3dbd5805bf52d7763937b7de328e9538738b1e1d1a9bcd438ff
SHA512d9ca9f88d835eb179cf9dce8698d6e9307c743791d4960d09edcf3e477c84509df17231beea499a3d693965fb3b6bc3e956349abf78c40083ef7b6298babe3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a97d481e25c4d3aa3f6b891b8530a59
SHA1f92c977dfd71d3441e6652fbeee437f6da56f08e
SHA256a8fdcc443234e9abfa218c110ead2243820be6b1a149b7807fe635f756bb28e2
SHA512d19cae7828de98e41974aff8ce03086b52723658356daabb4e7cfe9427fdd6e0be247cc53fd3e10c397c8dccbf1630c9fdd04a16033b6e39d28c3fb56cd7333d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9fe6958b7cb0a5e67d75948815d9b60
SHA1e84968a4059850827d73280feb9e953533777c3b
SHA256c450c90e57166cac458c0215aff7fa537ba92c08006a72e5171743bfd8cc6d92
SHA51275444a66768bcdaba296bec98751cbd5ebb0c0027b0ed6e464eb1e4cddca44a49579161bdf5773bbafc7e00a618bb8f1ea97aacdd2fd12c393bcfb7a5d4ef27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec429688c2c249a5339cc8db35d4bf4
SHA1e1e24efdd8fe29c5122e0af3bd4f519d407c8358
SHA256d329a5d5c3e51a3633abb36cacd8648ac5823a72c56697da6570038a3187eb8b
SHA512c68e0883ec6e5e4f4726e2b7c2f0af7733791851c3218a1c4415bcf0a0a7f628064170b98cb0a2aa09dcceac2baecfc73c781849c85284d92e6271d77118a271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521024b87d41d1f42969c05fd49106d5c
SHA1d165804afded737d53b92f3c4760277927914434
SHA256ccc2e654b63254795f081c4487eefd5b7c708361d545860d11834890797c6759
SHA5125de0e5171bb10b19aea71f17aaa57669de3ada77621b22572d14a304defb20476cd85877017ae6d30084df683b79d0319acb59dfd09acb0c07c10856f34b2f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a48b28d2e2e93444a0520b7cd0a014e
SHA107c312ba4bd581f4d94ef321498a9f230a30004f
SHA256c1011dc8f623a4715d9c647a161fdacd729399641c2182f0eeb43c2757b677a7
SHA512683c49c1635fc65f72c82a2ccb597e976ab2c8c584fc99d84fa36ff954d6c17a2a623bf0d5164b8741c0142631fd6c68d548cd551c09fa5603cc957d7ed0ef20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a835182840f0f3392cd9f2bbd8724bb
SHA1e91a1981b07f2991c34c884aee7db609e808a304
SHA2565bc77f468241a40f184d966f1b8d9452edb1e259d1e036d08e86d0919f83f55c
SHA512f54c0892f1d87a20068f2babb579a9150d90df0aef8a895dbacf5b423babc9f05b0380f9a132ba5de6fc36eb90c864fc64e70479da20bc9a1ec08a1cd9904ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882af9f089435d4b726ce1b965435c95
SHA1c6ac0e8bd1ba07584d18547805a32ac2ce32bc40
SHA256d59b7e35f3021d11cd57af95c47b879ff69d71e75962201f71607e2ca9b5c15e
SHA5122d0df0b04a3e550f883b47e6b6cb004e314fbd3217b71cb3e5bf083b2bcb7c13a5402ab95f3d83da5bde2197faf172bdb42bca093ee40183b2bd9d694e33310e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed63987cd3a29f3c095cd9d57da5ff5
SHA15f9f8859989fd0f02749c425931a22c53ed09246
SHA25667fe703ec229c6b026e35ef83016a598e27d97fb8bd8faa46ead48ab808b4aad
SHA512d131203e324849a0dbe785df96c8c5c63a769a96f3f48ffe70fa769dde77f30cf676813dd0f08ea53cc1db693b8b04aadd730f242f13d40c90227d11519ac21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007650ec652b2b7c7e5d511c00582544
SHA16024759d61e551ea7e241c765048e5600e33a9e2
SHA25697beef1b2c1558981ba27658a7a00aaca3c7caef1fecf98250ffba45dddf266a
SHA5127f7e5ce2b0bf9bf8d1e4ac0d8dee74aaec618d399b93d59f295036a15332717e2c61c764aa37e75a72033f419df11517d5bfa94ebfdbc246ac05029b7067cd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56762e627eea044f5c124a4e284a37923
SHA1ec3760cd74c59f04204ba5be72b5ec591f0fcd61
SHA256d65475b77f072ebebfc4b37777cc2ba857d1dcbc16213246b4f42e9f6410b154
SHA512fc135b5b90e1b1102452ff16bb6de487ac7a028981e31e588fa08d5d8a51f651b57dad95cd8f97035b1b2385d8eb0d0fc9943c3f4e355ca4bb4935b0f3e9e03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff40a8b3e54cafafe52725c567ec4b9
SHA19d21383b3bf3a152fac9577131237ed7bb3ac6fd
SHA256d0f2eaad581aaf8da385e2bef3b522ad0149096c5722213ccc9fcbacab298df9
SHA512fcb32474cd56d151956c004a44a9542b04005f8338c77778b35d466097d53b85b9a0725a745c92a7d1bf83373e79f9f1be43045d98fd89ad23d992b0eb7a9e1f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b