Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
eac247e094c9cc1d3c2ce1a83bf1e42c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac247e094c9cc1d3c2ce1a83bf1e42c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac247e094c9cc1d3c2ce1a83bf1e42c_JaffaCakes118.html
-
Size
159KB
-
MD5
eac247e094c9cc1d3c2ce1a83bf1e42c
-
SHA1
1e8720aea4f6b66642c965fa14a5f709bff85040
-
SHA256
afefbbff19a1f068c96e142ff00a4ce371a185ae99068c24550736031670e9ca
-
SHA512
c14c6a2a8ccdc8ba55372f25f15949c46c2602d1afffa6224dedc81de66827d81d65dd37ed1df103f56ec3e6ef597571e1a19181e68091725a7b9bdec87f737a
-
SSDEEP
1536:SuKDqSCuZl07lDaInCyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:SuSZl0RsyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{440CC6E1-7650-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40676c575d0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889126" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000bb22bdb603534b013881d6ecf15b5672c0aa469566ae0f1b5473c4ed34a2291b000000000e8000000002000020000000e929302230f076ce4a32c8671afa98f12151e01d8ce79697046ecfab6ff87a6620000000415aca2bce7eeb5d994324c6ee774f87995615bc3a8cf055b73c94dcc5a42e2b40000000f1ef6b2b17f50079569df4dd6c6d939bc15eaee6209a561e5d98115125a271f776f4b7aa659bb28f7a26af3d4fd53df0a85de030d45fd10f536db284fbb3c2cb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2872 2632 iexplore.exe 31 PID 2632 wrote to memory of 2872 2632 iexplore.exe 31 PID 2632 wrote to memory of 2872 2632 iexplore.exe 31 PID 2632 wrote to memory of 2872 2632 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac247e094c9cc1d3c2ce1a83bf1e42c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78d488fabd0136015a11457f2c65c25
SHA174e460df620cbf479499a5b4289485aaee997c7b
SHA256fc1a56ee63d7d8459ede82c7d64da855bcaedbc62b910a77636a420ebd8b98b9
SHA512b73ba8daf639859cd881c56d0c4dba2aad529cbca14e4e87758c34e98f52f866bf679d984c2464782a00b6bbf82aec1dd66e86c0650c2c444045667d5ccefac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95a28b11906db6bd8f773c08298f627
SHA1767d7772f70c9b39dce5cd10893e570f6599cc09
SHA2561acfb2c1e9ab9b6cb7021a39c853e07fd7e0085339bde2029f296d2dca5e7093
SHA512152c339b0782f0ba909fb50bee88bd0f88ba7e4aa787c8e6ab171b509847b5c91027774001bd5d3248524db2391765fffea83640cb9d84aac37e80f3ce05bf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77d8d29b10b7710cc6e4d2a21313323
SHA1dc68c80fda99b60e45cd43be329d7d853db32cbc
SHA256449d7202826f798fdc75188e22c5bdb7d1955ff8093df8f04fd3705e8b7359bd
SHA512fb4fc7673d9586865d40c8487402aaa8aedae4b8d433bf4527c077d13e7547c05bf39a4f532a6dc96734793d9dd6ac2df7a99dd899bb18b436b8e22e33c0af5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a070c06688597d95ad8d1a8e6c519161
SHA162c9afd0f82bd806e98cf2407cb244950d528a5e
SHA256ebde598c91a7597e0d68b1788046dc253ec1fe7da7394dee1192f8bbef1e41db
SHA51254095b23773e15bb446d370b7d476b1682b07e96415336cd89559e77a73dba0cb158d5d5095ddef620ea5211752463dfe6af23be6fa51e6c0d5f42b644ca07ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ad4ee9857ce3a5b4982e2beeed3aca
SHA12fcf19e5329eeed1bbae03c52ebcafb98db4838f
SHA256fa959f89d972dbf6b979bc60d43909cdf8ba4d37e8b41b017762a96fd88274ea
SHA5129b7e86d175d3c2a70acc9db8c6d82131abffdec654a784f0b76cc9e14e1e226a4ba91fc7bfdb82629f2f338b790f9dbdd25aab127986961dad63b97d363e46b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2e8f0f4bd945c3dd1a6f6a2a446620
SHA1fa7e352febafd1327bd41b7157ac641a75aabd5c
SHA256d155f6568b652160f245541cd4534c2245bfb6d3f0611247a17f997ed4d7a80e
SHA512449a5bd09c58d2569728685ba24715ef599affb59f784b186e021f9f5fa180807c1e2af8ad9b5b621842c09fe3bec45db8d0e28ac2e008bf2f7d1d5777e30804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1cd2df136e0554b6876bba31185ee8
SHA124697fc265b466533ffca599404decb584cea067
SHA25679a935f277d0a3b99d5e900a75a022b1e50dfa261856c3b7ffcf08e40b0c2bac
SHA512be2bb1b4bb50bbef6037cedf322a299c1b9e5a99246f9f55b99f77d8de06c207235570eb2cb38460362c7d7e62cdcc64d0e5f3584bb7be4f02570d8f6126430d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a556c2be1fd73a53a25675405009e8a2
SHA15f5f4e98d33ffb659e2b5dde504ae76d9a6b2a09
SHA256f93242a5dbdfff9ac1e0d25ab56edc6eef9ec00ee70efcd341cb242737b1075d
SHA512d93ee2be1089ce2fafa040f32ad4fa6c77b34f891a1fd222b9c7415b55be27221d99a876fef66422a061950b2c2a3772181029bab2c2ae47c35195f10b75ca08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df74a9a2e30bde83a3ace7e575d6a44c
SHA16aa4daaa95516265e283f52c144c99419eb1f451
SHA2563f58944aca120baeeb27e966b11c1f5937a05284d27612ab74866d9859cb1cce
SHA51228dc727ed18b97d9c2c60351266405b893c2211163dac403de2f38b94dac844aa336845d762a01aa7b82169a18109631f506f157ce72826592ca88de7b0b27c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca724590e040f63a61821204527d563
SHA1e7ffc41d2d3e57d1722eb77c6786114374fbd8a3
SHA25677f7c9a05344f974b4bf877a59e63d87465a56ac53fc5ba87741777e95396d68
SHA5122c0f3fdc5f6aa0af39b1b1e47182874843daa73e7b6d3affcf3dc784481ab6467a1c660fe7adbfb00ed9394ff0cacdcc0a02cd5c86984a31ad00a8627bbcacc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be51f51aef7436a71294135bb23ee3d4
SHA1c2adc387a75d9820d96f02586f7677ab86bcacf9
SHA25669f228632fdbdf823ab66fbc4fc3547fd559178da614a963f1dbfe88730fd28f
SHA5129b81f52f59e171b7900a89e6fe28ae839658ffcebea849871f83326f1bb7a2fadcb09f70224e2d6ac6b452fc317963ed3ccb9e874bd8b150c23d6b794f56841e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d221b7d7e3bfa63540d8c7137f58d7c
SHA1c725a954fe45dd8bc329b7c6c039ba43e83990ac
SHA256a51eec56571cac6170d4abd2e459f3478ed558be9b59579c98b0af70f706667d
SHA512ccf165ccc580849f6fe8f5749dae72c7bf7308050a18ad384d37eed6b3ed7582de48d5bbc7f4858656223fd03a869184eb5e53726ea0672344b42a3a01c59238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9884ba0d550424180980dc94b2998e
SHA10f4cb77d9c75946dc2a88422fa2da3a45301f583
SHA256454138913d16fdeec408226956ac6503cbde2a1bd66193f0df22425904b13cad
SHA512cc43af6589189be0bdaf0113926ffd9c50490810d89121676d97c0e7b46a69707ecd510c3e675f3beb539bf0dde1aa6e493ea603b03c298b7fc6994a4e158e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52411d97310d24bb248ad7099e64e474e
SHA1f9fabf20408ad6d7037f0aa818ed2d2e8a450e81
SHA25600911d067884f1ddd387326cf4f83a32b0f22f14ff75bdd33afa2fc1f1a347b5
SHA5126418f507e6a29d8c0d9d3112dc3432cac6f31b354c3516b808b11d3e31093c6d1cd7872ec3002edf06744b6d3f389d0a31b3593de91cbf39aa2a937c59ff5103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53210071b79c74447bd8f424612a8ce5d
SHA13ceb4453c4e5415190363395d909c06c3029dc11
SHA256705e79d00b6b33af19bec386967dbec0749abddbbe8e65c83bd91bd5e5b885e8
SHA5123136bb077cb0bbe7fe6e8af25ba5bec67f982ac147a3a646068fed00e98ca3ebd4ea264e0e2313e3d106b5abfab07c71a179a6fba74562a9554b803f7328c19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b9cbe884455dacf29f897d4f7e1a80
SHA1e40c3132a0c62c0f05d8b7b500f7a2ae52ce0191
SHA2564b44f07b6427733f51aa2e318160a8167a6927c34cdb3680b7a3072875e3b4d9
SHA512d15348a02fe64e91f822d82d1d3c65be30b92de5ed028d76616cd9946239ea1178cb937c021f1e8224a32ec397ab5d331b44e081bc9a4c54625180332ae16f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309b52947d31179a9aeff6031617a895
SHA1cf0c13b2c9409f1c1cb4e5c60ba0ea5fb0b5b662
SHA2563c2e55106f4025a852918eb07e1ba51323cf27da53acaa4ff38a3c41669309d0
SHA512fb33579f0e4eea99e0ad7482fcd9c9f04297ed39dc2fd7f8a04abbdffed13f6be47febcf9e223bfe76940e08fa3c4f627fcc2d88e081da4c59de9ccaecb60955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902322ed48de3d7e3b810113f9fde691
SHA1e6cb8e841b996933fe5f87c410a47ca58c49c80f
SHA256ef2b81f6c08166b5447714ac586b711c116705d544d2e6d30684ae40fd92e6a7
SHA5124ec1b3108b75083883c36eec94f8532c9ddc85fac8dc770c63d02f7563d3899e1d4ae031ccdd16d7376baef6a474037e9dae230f9bf275530bbfc22f7aae6f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20a33033e38c469871e20615f6c4fa1
SHA1e7791c3ad5993661fb606344a0e2b6827a07f88f
SHA256cdc67b5fa8ddc5f2e651988c9436a249a1d60ed4ea7efe962a69b3d1b49d446f
SHA512a5b23df937f365a5dff47a12798075b2296ef8ae30e966a95f8f8ea75b64bd9d1722de14d35b31e6bb2be1397c0f32c6f2da5581b9a53c025297ed2c943fdca4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b