Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
f6f8e2d9a29d1182310ca149bf93938c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6f8e2d9a29d1182310ca149bf93938c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6f8e2d9a29d1182310ca149bf93938c_JaffaCakes118.html
-
Size
27KB
-
MD5
f6f8e2d9a29d1182310ca149bf93938c
-
SHA1
7e7c5c711ec43d3007efe01a765005b516cc5809
-
SHA256
a7947d69fba1c22a02a9fb2b7e157f87b4a5d3898c0883b697ce0aa6c395a49a
-
SHA512
ac2739ac2569a11d7e4f0348595dc6e41a1672bed5b9b2d4d3b36cc62e1e5a1bc50462936d61710d03459540d2a3efb0f2f6d33f93be7118c48d6ad7656b0baa
-
SSDEEP
192:uw3sb5nhanQjxn5Q/cnQienNnvnQOkEnt4OnQTbntnQ9e7Dm6undrQl7MBHqnYnR:wQ/L+lydyStF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433464856" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d5646184743a5d55ecb6a8b61738758b6a75dbfb53c997f0ce70a3a224e89488000000000e8000000002000020000000b7da9b0de735b372466ae694f8d79b2f127239e422d7669c8ab65865c4bc4ab220000000a9ed7a176bcdf9cca5c242a3cb265098d889cddac95aa5c59bf465732c95a5304000000078fdef26f7dc40ebc349d71cbe25b67e0dab6a2ed6a76d25fa9c9ac6fea1ec9bb82cfc88315126058869056118242d5365601edfbc8bbda89ca9f374cf07e5e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2057da91990fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCAAD971-7B8C-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2116 2260 iexplore.exe 29 PID 2260 wrote to memory of 2116 2260 iexplore.exe 29 PID 2260 wrote to memory of 2116 2260 iexplore.exe 29 PID 2260 wrote to memory of 2116 2260 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6f8e2d9a29d1182310ca149bf93938c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c9e5957952dedf08c72cd9f0ca08fa
SHA1c175b14341ede3e3ae68b0f394740e761236345d
SHA2567bf625e74831569866e2828b1068c45892ce4cd35e9bebb9bbf0cf1de2ec3cdf
SHA5127f1be98b1bf82639deb148259cd95800d36ad054c82629fe3cfa6760d020b14a15377d217ccc908fa0f6e06e5379d86253eab6d4f1bd6e80d9d6376fc1658aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480c3d424d5836fab0213b3df3005fd2
SHA151bc13045106736923d865034f891d4884641257
SHA25628fddfd3fa01e956e07c284980f81defbc0db0b4dec3049ce3df7fdd2cc9a442
SHA5120805314e5bec17a54ef0af02ff3d63eeba010538ea2a08efdf611d1d43192e9a3d03db34471d4c66c1e6cfce750ac1d1f427710fac46bfff0dc498a8f772d064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8ffddf8ca5e7358f559747006ccd8b
SHA19062e94410ee7af301ee50bf1a908438f49b62c8
SHA256ea5bd5e0473d548ec91b144540fd2f87d14010badb80290db8901a52d256696d
SHA51242070917ac113a8e5b8ed5b94ba850be564a4e82a99163f70903a670958bf0b1532f10d833417de7917d4a7ba643166f6018c461b944e3e53b35550bd7fc51f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9c3ef6a4b4b6850f3952ddd6e94d7b
SHA10a900d7e0c8eb7152ac0fca651371a59aad15aba
SHA2561c33e75461e678d6b543c199865f21ec15a8db407f35fa3e2771a8d63e5bc7cf
SHA5129ba48f5ece3a7bb21cf5fdf520ec94fd8fdbdcca2d2ecee09684e3d7806cbe75f0bc55598bcfe17ca4519974e80e1cca24bede5a36d827f35025ffa6c0e71295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1101f05ca9f4fa70d6ca29c4d61083
SHA1c1d7573246a1ed4c333e760490480e2bbc5399a2
SHA25630d64ff43f9c959dfffc45f48ac46fbe9c2ba935e19c2a2ab5aa27c16a523836
SHA512298ee86c5a6a8443a6d5d87b7b6becc40e9c26979b3bc852b0a89282da3155c91dd2932471ba6cfc7903c03afb505e9d6bc09f5ad1d42049fa7e8ced2f89457e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30aeda1a87316746d87e856a8e3d51e
SHA18f4c89470c62b2664ff6180566754c7b840f3bb2
SHA2569c5e5680623bea4bc8b430c0aed73b11da7db79137e17b24496c86d996ab4a8b
SHA512f54993cf2f67712bb8eacc41f7339cb5cb6fdea9ad6d584b7d2d1ba5580db6d22cc429534c42fe8b3f464f3e6f44c194d1f2c1e6497ad57cab1c85fb1cefbc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc558560957b85e94a7cb532c5d90178
SHA1f03938301ae8893167266b2a00198f46c9926f7a
SHA2564161e455b49ec8ce67fcde1ac4abb47d83a1f66a57b71a724e48a1272d9cbcfb
SHA512413b8786a3588c61d4a323478c56153b449349d9de10f150b4017d271d1d16499ad4e0cb3bf5e6b1dfd891c5a580670cb5d8a5e38725b2330d2634e4808926af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a7e750239d07e9d48a8fc7c3194dab
SHA1ae17eaff57ed0a75afe017ec1e8c5e70e66437e8
SHA2569bc8fd9246817c142e26d6508d594857de20e35ebb37c511bdd4636dc612c2d7
SHA51251de667824be9807ddb44aee3ef6cefd4e50414e93fec8677e094681be4382967a2a9c584b4f6dd60976c3df1275b45d204db89eec0222e4300a1b9148da4d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa2626d5bcd9538e71a61c1b9f57649
SHA1be7a195c1986bf15b24158f2ae72fad82f45f00c
SHA256dee928da7c7856b3a65bda594521e11041f107e8b17aa80f82f707e2421f543c
SHA51253b99977d054b624502de0e2a9194588cdb550ae094e30880d6cba02e9c61ac6eee9e2e0889211fc0a3317c90a72a06627b171818cbd7693cbc8cdb026695b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea5fd7c5aa460de48451af93438b850
SHA19892ab790b7b0f24c3b46262afd26cf599eb19c1
SHA2562d7e26a1310eecb31886a6b392b242acc458ff2531069e509a67f9c88da10e6d
SHA512009b5e87054160f684c1fc67e11fd7cca371ee514c14b136b2ad52ce4ffe6193fb3638c3ab97595b707ce34c0b4d294fb1563e75960ac3ff17bd70017d12c2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bfa1db9b24f60fabd3440bbb57ebd8
SHA11a3f7113422a3eb1dcbb364aa40044e4467c9074
SHA256e00189eb9c372aac01245d560281d02a15e610104e7dcd57124588263ac4bcd4
SHA5120af5fe8e98b7567981848c4cb98e45d38de98f5562deb67865be5210205d8513cc76bbcd4914008dc38806b1d8cda10c3374987ebc5ae7fd205b11b0a9a8cee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbac32f33767239e4058fed41ce48369
SHA13c268de6fa67a229a5637bfaa9459a0899ed894f
SHA256e6fb360bfd926ffcef5d4a0cbbd166560493b7ce9b6178964b8fbe1131fde0a6
SHA5122baa4faee06511c5f3d5a073b81230fc285558c89dca1d94bc2e9a75be220190d20edc4663a76c123aa97cb49f1e4dea01d9fdefdebc7724d1c9d0bf1dea3a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df918d2171dc4262126707e24cb5f7d
SHA1c1a9b100a0b095b7a289ede014b427ecf621e32c
SHA256031d5d4e6f122b5b56d0be2814fc7fb0a25c59f1529379b2965698e577149309
SHA5125703efd232ce106a14212f5b61278394d18a9c04c320f59575c0e45d3b7f797b6f382725f17d1e19232d9bf0702be385a08867e167c0ebd753b03d7cc6ec7858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149805200db35d5c54abdb5d0175f2f8
SHA1fc5cdcf219b4d23cee5bb72c079bb703689fbfa5
SHA2562f79413d3b4f0a7500e115feb19d312029a2dc5b794bafe841a383888110e3ec
SHA512315625bade3d70ae8f6a3d866580b8c36175c6cfedb8d7d77c99d05b9acd1d9ed112e386f1a0758de1fda50af63812475e318bebcf96075ec8503b3a7613cc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c71f302f69d3afeeb9c400122e6ef16
SHA14bd77f103873d8b7c83ca222008e672b2a7f779f
SHA25609a15f8176e6bd87dc65788bb00f490204fd21d61d0b1c4607c6d081abba39c1
SHA51276a502f96455e1c5722f64938a0c3337204632b39d1054b4ae893b5bf70ca40dfd4705e820633b066ff56f16c7940dcc2e7f08aae21d708a32f798c431abeae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261f6ef93e3ef0f48d2284efbd548a10
SHA1d016524e31420e50149f145407b2df2defedef27
SHA256480de4a438bfabbc9bb72a79b75b436c165e4f6c140e007d037cd68008e25b67
SHA512d150bc28fd0837ac8be28c150527d583854a38906841fc20ea831ab91cd9a2069a2d544abfab7b8ba5f42c8ecbcf7c44129b83660b83317a16b8b910e2022986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769c391b5ac23bc3386d49aa1eae784b
SHA117d46782d4a393ba4f5ea556f3e52bc34df644a1
SHA25640f15ca04fe638b901ae4a771ef6182fe070b93b8b3f9da96f72817ff09085ba
SHA512dd719bc69d9adaa4737ffa85f417f1bcd3e215cf553aaf822f56c33aff1998b7604a6feafd2b3bf8aa79a619f4602e5142525afa5dc6ca5d3bc78a48cef00511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58946ca119b5b3717517e37afc5913d3e
SHA139c83e3a29e89d9652a46d9287ffd12b596380f0
SHA256dedac6f838a542fddec49679cd1a51020323b6fb67e36c4b0f8ec443fce42286
SHA5120b883e40191d2a48f89d7bc1f73d764aa74a89311d8e55cdf18007d5bfdb849421ed0d8847c4e28692a89e5b21ea973b007f46d94b9928426d2e5d7dd2402e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56145feadea4b104788069d0bf933724d
SHA1be00bb2fcf20cf6fa7e87cd7fee96ce6eca8f9bd
SHA2563e0abf9659b810431b677ec9f13b2b5f84a87c4d14f7b01f50af8fbb0fae8c51
SHA51271ea6d900317484c5c6d1d943c23047606535329e9cf846d2af72787a390acf8a93406f08deec7c8a9d169bd75d50a3d1914ebb18710be25413f0cb38e786aa7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b