Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
ffb4440f5a811c4b9c87db3e665022c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffb4440f5a811c4b9c87db3e665022c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffb4440f5a811c4b9c87db3e665022c9_JaffaCakes118.html
-
Size
19KB
-
MD5
ffb4440f5a811c4b9c87db3e665022c9
-
SHA1
eca87c533dd6cb05820ba83c3fd9c3422ba5f2a5
-
SHA256
b612d9f15f31bdad2a2f467ebe6e26f5475f5b6e7ba42d436bed9a4dd81f3cd6
-
SHA512
d9e6321956871f3010fae1764743973a0d398e5b2d16f19d4fe32f4c929959615bb671d26b849ffa82e0a4418ac9f180529ba52d4af8386c6e4d51416f18f9d2
-
SSDEEP
192:uwXFb5nRtnQjxn5Q/UnQievNn3nQOkEntoenQTbnVnQmSgHMBPqnYnQ5yNnlnQVV:UQ/UqSGk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000260e0499d587968866abcdfbe4d05d75364f4e0e01e0cf12c595dd2c2e6f8394000000000e800000000200002000000019384ba22434a92fe06a0d43bf9042aaf7606b409ca80751a0cb6fafc98ada6b20000000f5349582a3dd7099eb974dce86aaa47ef97fa7c282aa553eeb27a67213393d78400000007f801eec28014cd3e5ba7d7495f937bad244408302b0fd2bcedb918781b15a4ae3edcd3aaa08b3145ff0dd0ad6b819e806576940d3efc1d321c9cae38e34dc15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30938a42da12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C587291-7ECD-11EF-B2CD-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433822490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ac3cb45f99454452723cfb994cacb9e730f93baa59aef228b577401b9567b818000000000e8000000002000020000000fd2f2c66296482e35a2a9e2add99f848e47879ec6b16a6cd45b06d68f66e087d900000009e529ec98a60c2d31f190b8022cf15042ebc322d04aa0d94c629516d8a39a45793ce1d3f39748eb8d934ab57c7f00be88d7ae057e27dfddc7fb186f803d1121e3ed536c8c9cf27a803f3b91fa96c22880c6fadfde52432c55d09c20668f2da23803f2cede28a86782300f5507b2385e432ff8c4297df158d6e1676ef45947ba3df9f9f2ee57b548885ffa8fde04f25cb400000004d7afc50b0dbfe2ef4575213ea597f2c2c1744dfab5af7e45394b4c3b25387941a49566d96924d1337c60ab261ed695d96745364494447ae622bef32f637362c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2604 1752 iexplore.exe 30 PID 1752 wrote to memory of 2604 1752 iexplore.exe 30 PID 1752 wrote to memory of 2604 1752 iexplore.exe 30 PID 1752 wrote to memory of 2604 1752 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffb4440f5a811c4b9c87db3e665022c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534eeb7498a1633ecd73bb96d7795be78
SHA16b70c5452110e50b547f6afcc0ea3383f6e93251
SHA25672b6573c293a422826b9761778cc538ae1c114d58b76b54a85fe7c4898711077
SHA5122267a7bfb1a75789c272bcd79de73fa797bd7be88a08f7a12c2306818fee14017011b27bac2f910b75af32f7922c56a6db89339c07c499cf754cbb9fb4bca833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31311da6d101686c858679d72bca6f9
SHA16af13481dc047110f30ceaef1660274b18231eb0
SHA2562861d92116d0e41ea2eb4faec48bc5792ae828de7ff50ed238fcf476081c9af1
SHA512ba86bdf9b17b73df5e4f840c500241ebaf24b121cb55fc9b56b25043ac803bcf890240129204f488942d8252fa543177f155b41991c171d27c9a8920ed893789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50450c78a510ebae61bb555ff420de189
SHA16d5d96fc6fb40527febc48a3284505f4b07b1fdf
SHA2569ed558a7778903a0409952fa5760073ded2e30d4e69f54f4a7d32bdb1ea8946d
SHA512f855057a4ae5325adde4a19a337066a098b4a1a86caeae4d63b9c290bc1f9cccf07f4e4be953253f88395e8e43f6ec9a67b26c1b90af3f9a9d7e9bac2bca7796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a19461e6cd107d38bea153a7bd05bc
SHA10b54bf4bec6f9104b5cbabaf6068a7015b7f2224
SHA256a7bfacd9f9669b4d04358f9bde3b9f91f94d221c114383617b41a27a744b5bea
SHA51273aa8ba35840d57ac9dfcca13a4ed1618a8eb92310ecf3bc1e4e3055f761a60fdc67498a0b59365ac8264ea11e8867d2df657ec2046c90f3cd34decfd59e4f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5344bfc38cc759b9e2f1710b43f732315
SHA128bd517c8d7ce1c59833f73e60ca698fdab7d8ca
SHA2565841a72178644463d787dd7a6dd17810db5406914cce8d764012c293d439610a
SHA512c57606714f629045ee36a98432a8e09dcad2046fed62bc8c0496e7375fee13b08bc84f7afdcefd47dc90f8b94d36d5582a1a7d8a703b8881e1e030adc98522f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53541d5bfc94c3b6c3276cd2280f07fdc
SHA1e64acd25bca0792ae2c3b69d1911500a6f8390f7
SHA256db2359a1b14cb25ba2dc4709597f786e9eae10f9f2d3df8a7299847e61cab8a7
SHA5129ec84449a274f9e1711a949d436a3e5864fd09d2a991bc1b9855d50893835f317daac91a8d1e4a93d0a475cce1b8f47f296bf4311f58265bff29057e55a10927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6fbd3f9bfabe95efd6cfbf9c3829076
SHA12e25b33906399013632cbe2e89f5a4010f10890f
SHA25636637d473a11e0d5fd429493fdb2aaeab30ac76d3a9eaaed594c6322b3dab05d
SHA5126b88040a80a5d2b66e0d4301ae3d8fbdfc9006183720879eed65b1c5038ea7657b7ec3bebdaaf1a9ce1f883c5490716117606d200f400e0748b71a2ac0413242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b04fa785f22e73c7794576f1139874
SHA1066ce77cbd15dd7c0c4885a2cc671a5f11ea988d
SHA256a35d41aaf393e7f875bc035f66ef50d17620eff2ac6ed50894123eff8148161a
SHA5129fd1d88019ec46315265fb621a1a453c7246f258c23322fd5526619d485ba37b7ecb27bfb539ceb3ffa7e8bf21edf90a5f86ff3965fb1dbee3cc12bdd62f627f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e2c8d232064f5d0d24d9d2c13519ba
SHA1ee0e12efb65ebb55d4691736e4136885a0d9c568
SHA25688e2ad64367c78898241fab3f8d8b9df69c8f8772b0130876cdbd4613699347d
SHA512756c4f23c5364f5f83bcf6f743fec1f0006561aa511d5844c085fcef33b211d4236a66b5606a8da51eefc39645089e1bb2f81fec3d5e5c38e58b130944a60ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d946d969c60f3367a96a71c537faf69
SHA1fcfa052953fecbd5c9e821aa84b5480a68349684
SHA256b8367abae36f5bcb9ffe1fe70c7ec12c04a317364ac74bced5d36bd2a57bdf13
SHA5126fa415640fcee5794d34ad4d2dcf5b873ecf7ab393f6cfb4d7c08db73e265ba6e16bf0ad915d4272daeadb3ca8afce87cb139035fd4406a327b0997ce3cbc40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c337ed0e51024001205025556db7788
SHA1a6cd9891e7651c71496c50006b6917336e8199c5
SHA25676b9d2f16fdee97d5befe0d0213e49948ae6298aa8252773300d09be985438cd
SHA51276771019496b111d3a2beb60f65735adfb570711827222f5ff65dcd547d444d541fab97d836797882d2290f4f9f27cb79b3dda363299670a88c88be408867900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db055aabcc203eb0d033c4f52c5723d6
SHA111e85bce2272ef44be8e04eea2e5c46fdbcb6229
SHA25617dc7618efdb630ee47fcb22a762602144fb740a1795b068b87304d935c5a196
SHA512a1fc18a123bdd335e109a70f0b00d092c2f0179a36c234fd2bf3817fb41c1dca7a74d10f1360a07b4779625ff9ccda2b36debbffdd5725d6ac2f8cb6c0bce0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a6e58a4334bacb55b28f8b622ec97e
SHA1711d7664311f8c3ae80c4da8e05e3ea6c0206274
SHA256f868476b882bd610e7638b31e56c825a526856eeb28a8613750747b465d2d8f0
SHA512c5870c41b6e2da3f35dc7ab28d0f3f9bd7eedf29df76f79167b9ec58c10bc6612e05c109193d3ca302656f3641b6b0f6fbdc873681354ddd89d23d43cbef55c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7f71c6ab0d6c23bceb6d1eaaa0ff8c
SHA1ddfacbe14135861c4e53f8b25fc11233c1ef0531
SHA256a3ccc7189d7a61fd594e3138bb5ebb0c520543d05fcd807e51feb7922951d012
SHA5123a5ba15d1d6c02552e09859633fa69593da55c7b28452ca3824d96b065b99d1d165c9515544ddc73bb972f7510aed5f923d304bf920773d1a18b964ad35c6a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328e7c26e9433dfbcec9150848ac1763
SHA1569cb204cb3c3f20d3e79371f5453142cf77105c
SHA256ba6138e7f9d2b4a71b2ed6d85c4e4bdb899678f1a3afa6d2a6b48c5260f64548
SHA512fa9608ab684ababa1d59bcf2c4d569864f7c39965b310a2d718d9ceb29f19d0b6f8a84c1de0d3df70386e3f84765bb48df1fcdf6d73bdb4f04d3c24fa9d1114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de007cca3a3e021ad94cb06e3385513
SHA1ac9ac3f779549f093005ea02baf7a6be343428eb
SHA25646e80a99663a82e38d65e4a828c1b8a8f32fafc53be45fc81f21d6e9c6a30977
SHA512fbb21d57e90144eddde52e5bcbc65c1b50540cb2f4f9d49145aa5e1d72ddc5764c9954f7397b7adcac31998844978f88b3848805c442243bdc007a22c747b77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb2161b970b8e87d3d5a5e95207cf24
SHA107512742546ecb044b04d20d27ec90cccaf979a3
SHA2567ea8cc67f6c49cdc89875c94c160e3a628ad2879a410e91db79a0551c784129e
SHA512dbf43fe68e0ca592619b18b5cb775ea79e4618558ef2b1e77156586942896b5328995f9f86527bf503fb3847571e49aa20a1fa9696a7faefe19f8f5a8697ca70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311c4870321cc12b912e357dbf5c388a
SHA11df5abc25b6d1c77a2b3bb027c836523f193b8ad
SHA256daaabec759b9fe34e29fcb278db3ca6d1b0b8c4bd3d3e3083abbdea9d0d128b9
SHA5124424dddbe862d1df615d70311bb1693e499d178b783b26f2bc964853b938db2363b3746844e4429733398efda927d18817cc5693bc85bc1da6395b68570b86a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b