Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
eab0240900617b4925b108d078ce9381_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab0240900617b4925b108d078ce9381_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab0240900617b4925b108d078ce9381_JaffaCakes118.html
-
Size
28KB
-
MD5
eab0240900617b4925b108d078ce9381
-
SHA1
849517396ca23fcc7d200013993fe0377bcca795
-
SHA256
085751ba2d98e3c59801de573f33cf11107a7c760cc64164a602ae5066422fd9
-
SHA512
bd9113033923f80281bcb2ef8759cd1a0900e56c0459a07a3005679c3c8a619d64128837af177474e6f2ceb27950bb0de7721493280078a7c064f22566b69269
-
SSDEEP
192:uw/wb5n25winQjxn5Q/4nQiezNnD8nQOkEntQ2nQTbnpnQ9eHDm6Nv7eUZQl7MB5:2Q/Zgmlh7eZSZjz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B17500A1-7649-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000080e43e19861eba34fb792cf1e3a0eb78a2dae63699a5c4601fca73cf4f40e193000000000e8000000002000020000000e29f759ae03ad48de1345b2d19ecb66fda5fdf52ece23eec72f14a5ca7102539200000005790d1fb2386165c226904f847ecb07de9b9673c227f46f5e1ce2f908b93594940000000ff8478f6ba845b8f54f2c06dac4597f01d72ea0b79ce3954cfec430e99b060a49acde1d606904974c2950872efbdce3fe56bb06465f268870dfab71d28ca9bef iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905a4786560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab0240900617b4925b108d078ce9381_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50cbeaef8439f98eeee9847b2cf7ddc
SHA159eb1dded1a3198a1841ee728b42ac9636ef8fa5
SHA2564add5d76a8ba021e2520774320a1c1b085e184fd8f5e5a612652e7abe8df5b35
SHA51286accf4170229affac00d151f9c39dbb0c49cab0124f57140305e9110987aa681c5f2689576bcb02bb53ab0a0bdf2b40eed8f5be1b2ae59c47f7cb891568c67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa68a7e697ee3cd9fd001bd3b252dcb
SHA16663647080390bc039463d333ef224303ad1d806
SHA2564d487c1521d08325a11b41818c7324953c33300edc93b1c9eba650425aefbcc6
SHA51219d36fee8b5e11ca28433df60280449a0427387f5c27e8f5993320e723f064f054f5cf564ab93db2ce788d209292427fac8d9c8fa0c7c50d113c4603358ef778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b984ec3f38051460a17d0b6fc34270
SHA10df921b8c8b73aa4fd87d20af81d7d38df1e68de
SHA256e650b99b0745298c5b735a9b28dc077c486f2f2d53779d035de766cd2049b514
SHA5129257491e59516eea5211d52ca50b01ad337a6c6f640f49fe5cd98e8bfe614d114a3c05718bea451717d96b8f564e4c936a94ea4ef9516b33f557ae02c4785c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c1001fc3abe243132679b5651a3890
SHA1f9b0a7f242aeeeb346ad12f46eeef2a2a5e47ef5
SHA2563639a143344fe819dc1a8d7a60b700745af57b9f6feab39a04deac874426a4e9
SHA5120d54833e8c5d44a72da5dfa76af30241a16dcd53d02f8f597226116a1cf3e985d75316246099cff327666b4aeeb4be17f3625ad5fc92de88694b975423f297c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db799fb9b46c366bec4fc968de31a33d
SHA1f7cc7e7be9f30f788af062580175fdc6cd1fd33c
SHA256b6b056d431b66fb90f5ea0c2229419660f0ca40a51df3a32bd9ac65bc8bdf292
SHA512ea80c5bd6060945a9b7ae2868bd9080ad4c0e026d5bd8597f013b778af18f9e008288b2fd75ef7aed9d26f387ae1ea47b3c94b68e01376ead804013ea3f7ce60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057304b3ba6e32fdfe4acbafe34efe81
SHA166cd77ac48e61c71d45985f073fc211bbc4d6c4a
SHA25671c9d495cdedfe72653effaf4577f16c5440ff49c6e57490183332a7c288d460
SHA51207221f21cafdf762bdb2dcc69ccddb2f60bf15db458abdac53671d13c10010cdf5f8396a635689915cef196829eb49cddd1717301a4f738c42ea83bc16ddf987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c4da13b1f34b43737977409225a327
SHA1b9dfb132e3f3c9cbef07453eb8e0cd68b1abf1dd
SHA2560ccc3fedc9e1ee000efbd0d93d174e9dd1b73f25985d2c315cda8ce1fc9b77cb
SHA512e10243f31903466355c14c4fd8df0519be9fadc74f82baad8f611dc8260381f266e93edf21a4c177eee21abbaf5ebc76f6f323d2d7a3a98f4113dfff556d368a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b231ff914f4dd8c5c1da2a13cd0bde
SHA1764dab937bef141f5d3dedecb394c4c6fa0149c9
SHA25645a07ad890b32e1c8fba96a27840793a838379dd7a121849ebaf7cd45aab8568
SHA5123081669f67fd3349e0df3318df6c7e1e4f080b45b72ab51f09e5a7d7d7f968548b504478843d6e1ed9008f9b16deaef2940f9be04f585d9c34afe9dad674eda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562378122bcdd90fc1f39b97740933b42
SHA1e6f00dc7686513a633716092b7d83213e308f94b
SHA256469802b3eea7844b70749083c28d9151240314c46f1463f245b9e2b7a55bdc3c
SHA512e9d53ff927125ebcd1b12153f3d19de8740fc4b4cdfdb7ca3bd59740682f72c05402e72f08c4d12348136ea64bd6338bc3711b74cbcdf0a197188757a90e227a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec60ef3afe51580e0e771eb6fb44e4c
SHA1b3c176a88979c8ae1c87f2d3f9bc710b8b0c488f
SHA256b9cc7460b64e244bc5d94b45975bd2ab380a2a4a51ed1b3c8f998de6551c5c24
SHA512dd8141c7eaae6d4b87b437eda3401f3d9166a17aacdc29fceede87831351b72ab3c378d02e39ad49c1d84d26ee897ce26120d49473f56fd930157a40d26b4d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e441c86bbfd3b03e5e95090a9d235c7
SHA1e93597660d7c87a5df2a8d2c1dfa3c37f59c26cc
SHA2568307dc8350266075dc56f2fefa870114b652fb85f79a969df60ed7a6dc8249fa
SHA512958695fbe3dee48b6f2112405f1cc03177605cf7f30f6969e0af031be351e3ffe99cac5f2263c31bc5f96a82930fc69724f28d96ab6c9c297b7588fcc1eedd90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cedaf39e3aa1a91782efc843950a21e7
SHA1bd46972555f07fb2b144c935c7a910537e86820d
SHA25603ae691f9f245bc8419ea73cf66a6286f877b1afc9b2a4350071bffc97b12136
SHA512e68b27b2b6ea9d4f2aed3dad204a2b9b12a07f2adf8a4ee4b79d3e2a5451af08da14503404a7a8a0d2deee8c94cdff273a5414a4b4ad54581d994965115d3e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50decabc70cbdc366e695d7bed6731ff6
SHA1c33c41442c779d743d11958651d0159aa3d69aeb
SHA256b837717cabe2f9c6e89135eea2d8a62f64b5b7b41adde78e7431fbc1e2e5c244
SHA512a629426febcb04397230b443ebb697db57785669135847d9085d67578a3e58990c5504b9a70bee0dd3856c16ef34fb6612d874d629a66f0de1f14293c0e0efe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f685cbacc862da9e3804ee671a8a64
SHA11b1e0da72df46bcfb49f5d5ca9bced7af9d21b8f
SHA256ae632d5b603f4a3bf0f654cc20bb5368c21a3518da720d4b65be114a1d46389f
SHA512c2c847cb3381ae7ee9c5737cf9e67ab6fc0d8a080641c1b3b92f5ceaf87ea6c93a2dd554f154d4b178f28d28e004a3d0c06ea9c9b1416f287b5f106a05a343dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca09eb173d3c6c1dbc5e5bee3eb970b
SHA16a96e96482d463c90ce0d4055527b38b019aaeeb
SHA25653033dd84d64c1de89ed2dc9fc4c855858e62a71b7f3ed3ce5a25b3e7fdea323
SHA512fe7d209b73293ef464f661a9c74075023917727104682c0d2a650126497eba494ead60138cc89424ce6356e18928fa54d2f50e5d6dea51ecef1ac240f1ffdf62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546120a1dfcf3d00b6c4a545f5c422256
SHA120dae2d62d5bd9d8d82ee0e7b80f2678b72a678a
SHA256a7fdcfdb28143e203ba302641ba13e07239449ddb0c13e5dc52d41b961b8b7d7
SHA5120011a853a2ab269ad5eacd7cf0b2bd048553e722d209775d1abc5c9b84a14c1ca47a670aba2ec538ff6fe02e132587bcae6ff8e5446c0dafbb27b35383b29ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb796b160180857035d871963cd0901d
SHA11d7554562388c78d093df3c7b136e1ea9beedf22
SHA25642bcd9509a164cf6a3ee6d603d45675cff77f5a39f5704cacaf3dd0023e1313b
SHA512ece17bd4b11f00f08704de0f33a1134e35655054445c0593c36ebd570c95551c7fc191e78e1674e6211b38344add4e05215c9d76cc3074712ed4f5140d3834bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d8b58771009af65db3d0165ca04158
SHA106cf19a8566e448be8cdbe726d908edecc8af160
SHA256bc0d8d14658715854d199c1da2bd19597383d0b5a375a25f05ea8bcb83181bd0
SHA512f3ce6c59c89474d19f93c09f4a78a1369ba6cfeb13093269ff9c57ec992bc854f30173e3cc5d89c57c304f1949b9e28b22cf92ea9a56a5394d6cafe63d1dfed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ca6aee3d611fe993af62a332ef7e8d
SHA1201da0c6e902880abd6fc7926d6e2cddb602709e
SHA256e69bf407c9cf0d5e131b97cc8276c7c6f4a9fe6816b9d65e4b165da6ce21bb12
SHA512b376c63481a84ed067cd27ad9c52573be13c05f4e224a219ff0de08e0872fa416e00d17efac99da94994b53593a74be00f5fad0f1c51e8ab2875fb3d51bbfa18
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b