Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
fb26e2b6a948429edc1d30e8536ea102_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb26e2b6a948429edc1d30e8536ea102_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb26e2b6a948429edc1d30e8536ea102_JaffaCakes118.html
-
Size
46KB
-
MD5
fb26e2b6a948429edc1d30e8536ea102
-
SHA1
23c1db851f48924c8ae9186f290b8a8cff459c31
-
SHA256
75da4e115847ba38ff26ef88f2e2a09d9e7d85f57624d6016504b1ea73a017a7
-
SHA512
a282a07d8867b866bc88d044d68d8cfff3b0623fb13fad4bb07e5f9e367f4298b0b2fe4d18735592f4724a42ff61f0e1c2361a1b646a6fe88c3341c3c96fc050
-
SSDEEP
768:yF6bR1bDINb2vbk5cRq//9bm9itKWdoGeA01J24JjYAX2V8ngP:yF6XvINSQ5cRq9q9itKWd6GgZGGgP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009d7017dc26d18fe8eae62605a1bf08d9d4091cf21475fd8436eeffa3c50cbbbf000000000e80000000020000200000007f58f3844154c15c0f6781fa4f3788a50fbb4ed473133c69d4c5f98daa9174b0200000008f0ec25c2a98eed1f38d4805b14b16b9e54aeb6b566c3aa527f6745bc86ed8c0400000007a10463ae589935ff540e7ff4668a132bb1995bb55c120e434c659c5e706d6b2206af192173e51023cdbf068d2dd864b9d2d410605785b54d8d1fa3553b24fdf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2072fb253b11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a24d79df497950eaad95ba85c5be0f8c534fc6ce3d0d5bd37001d756c34a2f03000000000e80000000020000200000004d9de81d5b61fb56f39f29892e238c0c1164c8d68d1f01c0de3f89fd488c25f5900000001fdc965eb6cfd403d7324847f725bdaf8ea0926e79bf84ac943d81d0f8f240e061ac31821abb04cee6f4b3d5aae0be1e244714b22c4316d98a71cd665e30fdf0cac17a3499ced2eadbf4bad7aae5d0ea6a61d5403b317963b896a923df07e05cc5dcc08a043c694e69a66c84b5d384fcfd37ea2e78d1ee7961737d8c066697c706895a9e751d906f4289966dbdebef404000000043db5bd969f22a919b6d900284a89d2dfd679af41a98f883e31c481f06cef1276acb1d581edd35b6060c3b38b7496c182dcc6fbce42468598d2a8810f20e3958 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E12E721-7D2E-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433644198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE 1124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1124 1632 iexplore.exe 30 PID 1632 wrote to memory of 1124 1632 iexplore.exe 30 PID 1632 wrote to memory of 1124 1632 iexplore.exe 30 PID 1632 wrote to memory of 1124 1632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb26e2b6a948429edc1d30e8536ea102_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6ee8b512da63491181bb1dc9f6b2cc
SHA132fb79a86ce6fb26c6c30b723e12b65e28e538f5
SHA2563170ea2a0f5d454bd1a76eaf161f94cd13a4d0ac1e1103109d7319c79633940d
SHA512ae66243f59db73b17e77010ee6106b1d808945930521fb222b8f1c4b8d8cd44214262eff2938d95287cf9ccc2f14ba99534bd5a6fa1fbba561a06b67d9f53c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e93b101a7df46e6c6d1550dce8a25d3
SHA12b1f0d34806ff35ad85f916ac31a9b80e9c91bf6
SHA256a4929211053796c0496c27c293b17421b90f880589cf55c245285eb7f2f06859
SHA5129ee6abb702427a6b9758d21c9b54707c2e72788a336c06a68322ab4400285ddd5e37a39be8dde826ba1a7a199ec13d0722e977c0bbd21a4b6abde1dfef1cbc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afdf4ef97708bfc01e382e43df3fb42
SHA13c2c94c408f1890fba40dd3b5dbf4e467d58b583
SHA2565194b4f6c9fe611a93a5f2cf0a7bf32c72ebb8d6c8ece0f2c9c6ef87e85bd17d
SHA512239bc1d2a3fbd784a2f122c008bc7d1e2ded9b77b07d3c3fff62a47b45cedb669891b8c6caae5a622e2ca34bc9c10f1c2798045680bee2ceabdbd5329c84b8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5948162e970d252279a8b9456e2c9fd44
SHA1dd8f0db0752bfe3456087a42e76f6e913270ada4
SHA256841feb93bea63887514ba298f874be49b305bba3fd5bb35fd7f6e3c12ad35a74
SHA512af8757df590934ef90abfae1a7d35c1296e337f06d7ade97bab52acb040121888b226c8fc6f0de757a423a4318a725aa296db0623298f3b16b7c3ee1c90edc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba2d1724bf00df249dbe2e06be630f3
SHA140bb5f443752eb672bae00c3317dbe5f323736b7
SHA256e47d50ff4be330a9ed1a68d226cccf5894844b3a994ab41c99ba539f7ceab7d3
SHA512094bb2ab22f7a0cddb7855f5e194424727a09095e056784dcc2d696877c06a1b71b9077a55adc1c8445e1dcb97f54fad2704ca7fa475716005e2f75f389213f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5edf14791a0c642d14e1ebae8c502de
SHA128ef60816a9704126d0aed50c4a344eca4a152ce
SHA2567915ee5aa851c56bb33cab8c72f5864e677ee3d9c5d74d8619316ce357fc1723
SHA51251af08181dab61021215f2f1834edcb294bd0c6277cf54965b0726a24eabdcda1bf9af0da838947edee34dbb9bd1eaf01f08d0884f6af33011d0e716c3e633f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d795d5a8a8552c3ab069fc4574b3538
SHA1eb80b567f148181e9723772055336ae8c34692b3
SHA256d72c9bd4bf8d94dd0df4d93c2e113306ee578cf3a45b57e80346ec7b9b2905f5
SHA51255b06568d0cf47cbe4ffe72623eb47facb59c03baaa972aff90372acf97caa941d9c1d96ea704ff56650116a9369c7453ddf895f881f81e88b84a11c6c5e27c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1c7021bf92963ef83e90929a262226
SHA17b9aa58b23552f0fa2235e59b2d43b97b8da7e65
SHA2560b741c33fc9be0f247a5bca52c4c08973dc87485e13a5e0dfaf6eeaedeaf0bed
SHA512bc6386b362f7a186264050b3e4cd205afdd2e4db048d5970189ca22b7303da5be9d84e8f965bc3fa7e849f83353993dd9ddf17b296a3eef31a76156e0a83ba4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b1502206b26d4d340d9277304af324
SHA11225c7700da5a9fd2228b18b90f324c5ee9756be
SHA25684a62d531d3e611e951aaab489ee7cbe386675082bc893ea8b3a042f9509f973
SHA512e345cdaff8c930063ba9e401f7b8d82f1beb7929acfdacc2d464a536c2954deed1a771cb4babc95dd2af2b4e0ad340cf1ddec5469eb8aba3cc5af28d1baf6104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f73e11526f7d56ba774ed756f92777
SHA1e66509e238f05471d4efbf2c693bd4956b8828ac
SHA256ca5ba7d32877da80dc0b918897b5eda04c5f97f0b74d4819cbadb724b5004de0
SHA51261fc7305b9ba306d7292f66f8af841dfe127eee742b3995ea955fa63b3b80a6d4864b9b7619caecf49daec45c994a2d8416c539c9bd3dedf074bdf88ef6c4431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25d110dc7fa73803c12ab1297b36f11
SHA194481113395bfccf0c8cf382492c8b4e2da6565f
SHA2561bfb9d88e6f61a2e2e197cc681eed6b9195da9402c399f871af0d4bdc8d0c2b8
SHA51266b849742a0c388c454bfc388bb366c2ce6641a59862ab2fdf4dccf31b5c47d722c04e68d3a8067c3e1acaf4a49b2cfeb1951636d2dc86b935c0131aa5573656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c689ad32978b15c53d4a7ca7c82344
SHA13f915ada82d8cf38353150625f8473dbbbea8d57
SHA256da6ffd36c37553ebf9cdc3286ab049dba58a7c5ac62adab291f785fa40bd1778
SHA51220ec06ae1ad9bbe571d14cc6cd852ceb36056f166b0cebfe4f7ff2e1f240e5270282a6cf884b806b9cb0dc59a1f520cfbacb923c72a5be8c8fbe4b93ebbc1c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371e0d1ed58f0adbc44d5e14f0efb8a1
SHA1f76472294fbc5f3c834ac0ecbe0bcf2c309a15c3
SHA2565094858678d8720a1bb46ef40c9f0195b9ea805210b72164706bd1d69b0976ce
SHA512d80774c26f16f5fc3b20210ef824859324f6a2b05efb3746a3b5d7b1b5db095e26401ab5f1d82e650fa569be0b4331fa0d7764af32c0375f967774b286863917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59286ae2216debddb9a66ecd3e6e8dbff
SHA11c8b12b8cc61be471cc32b987ac4323c71f12c83
SHA25623848dbb3b7d4dc083b2a090cfb177f91af4ed73a8a19c5cb6c748ff844138e5
SHA5127acb2acdb6fbe55438728420a708ef81e89d9fe375435657e3b2157119bafe5468f17f907f5486426ed3182fce75809450fe2450a6fa93c202e5d33acf6259f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500d5b39af817e93ba6b999d79e22ace
SHA1acc27fd209323149be88cd1ac23e951e3efa2fd9
SHA25668fbedc417c19e75828fc269b024e0971078501119133a0558c8c499d16620a3
SHA5122c37d1e712c40fd0ee361d12ae18c886bd97a2b293b8f7919350c92ebc6bd4e78edeebb20c54dd363599fae00fe176e80b4cc4ebea577c1f95cc6ad13adc2453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f903fc49f07ea0fea95f3bab803f70
SHA1f607cd1df647c0c6c2072a9a7e29513c32865b15
SHA25673e65a52046b3de98e9d26ee9fcda562aa66e0be56c56a5c4fb88007e5e0a594
SHA5120166cbf46da027a127872954f82c23ece805a878e5d18e39d587b74c01ae2e712b7f265dbc45dec2f5d08d3b0b4013bfbbda86c36791a9a50e72506b1b71cf30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\rpc_shindig_random[1].js
Filesize14KB
MD5e691b2e17de9ec018eca758518bf5dc8
SHA13238d543acf53b803dfbd260405fa558717daaff
SHA256438d41bec769ff386a2c1555b6bf9105362f67dc3e711c81c6092ee7fbf6ad2e
SHA5125589a5cb408ee8e0fd473de24224ba8fa1453eba5df6e591570810f992160d4f3e8f60f8ba74d9994861759321f5bfe0c4a608636913a8407b5184008457afc8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\cb=gapi[1].js
Filesize66KB
MD5aa012028297a26c039c37ab25a4bd17a
SHA125f23d01b5f580c00778e1c010225e5b8c73b66c
SHA25655cd2316edf7159b623e4ec2c9e3a334027c01e2d1cc386f833ebcd35ed87b38
SHA512d346eb082674fc26d562da9a12f36ad2cc7db1f1b35c891a8734284cf1bd052a967137c1281982070688b2bb2e06c7f4967d1c9397311a31a11a8560b9c45fd5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\2254111616-postmessagerelay[1].js
Filesize10KB
MD5c264799bac4a96a4cd63eb09f0476a74
SHA1d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA25617dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA5126acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b