Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
142a9c63c30184c0beeabb3ee39d473e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
142a9c63c30184c0beeabb3ee39d473e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
142a9c63c30184c0beeabb3ee39d473e_JaffaCakes118.html
-
Size
139KB
-
MD5
142a9c63c30184c0beeabb3ee39d473e
-
SHA1
cd62c633a6a96ce2ca4266d03f4f040179ae606a
-
SHA256
c3857ea744950edd611ff2452a9ca20984dc352d1300cd45d4801d2fd3a92087
-
SHA512
8a62c164ebc5c0c6233073fa76d0555836a33757dcb53075db75cac75a9067376c5e60c83858a3dcb6d6183238ee4a05921d06d858d39bd5e196cd936a102676
-
SSDEEP
1536:SgBN/nFxHFZieDB0+3+EltoqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:SgBMwoqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d68e4e8c109f4578a91852cf0a69e90ce69d5b0f1a04648a16a915c2f896844a000000000e8000000002000020000000373e52ca55886bf31c0f6139faf59c35adf577becd843a0d776c43ac1f951fad90000000b17686b011c6637e3733460d6bcb92d2b072fa86a529a3b797fd4b4223e6ac0a1d462a53d7b644d946df23de00968fe1df75acddaeedcb09d0053380a17d081b976e9e95095e8b64d0dd3be0238abb71fe0151d9160836ded226969dc54d1b665fcf0532842e50055f8f4b0b4fc5b8f95ae2ae1c5a3347645e197168972d8355c53d3df2d6873ce8b5e6bbc4ed0e49d6400000009e0844fe1cb1dcdaf8e62cd46ee9d03870cbc42d87eecdc81c59295b23e9b3d728f1ed795b443b5a6f5fafe956ddb77792215c36c75d348cb06a435bf21710c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000473bbc2e38a61350dd961d6a128eba7c92613445be1b448c48916f8c7fb14ad1000000000e8000000002000020000000b1eaff784fdb947af2fb3e58cfc4e0838c1b30a1ef53d9626abb0da3e93eefcc2000000083c33ab0df7b943c766fd2dbfa1bb1d042d1462d24463a4afc3c38cb138f27b2400000004e70a82e2c9f8142c488655bb559e02bc0c4013ac475e6edbffd4f47aff3689f60ac200f17a960c17ca1e66f8d392c65d48aa94af9b398f09a0623fd11668b75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e50e407e16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{299D80B1-8271-11EF-94A5-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434222669" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2144 2968 iexplore.exe 30 PID 2968 wrote to memory of 2144 2968 iexplore.exe 30 PID 2968 wrote to memory of 2144 2968 iexplore.exe 30 PID 2968 wrote to memory of 2144 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\142a9c63c30184c0beeabb3ee39d473e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9c0d82b91f8f6be76c16e1759bccb3
SHA13843db42c11207b6c437c9e08225432bc7822da8
SHA2563652b191db4291204179862a01f68a52b65b37cf192d14122167a5920fe8ce27
SHA51220ec317a93c7522b1cf3e64527335ad4aeaa433fe043e38bd5f8541f74bd083bb52cf50265aec1674ff00b3211dd22d83001c954e551bd14dfe2e528c54bd953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b2b730cbe275e21b02172f88945408
SHA1456ee1ca748d79a61f98feedf39748f1b52bba8e
SHA2569492bbd5a22e730cf098fc77e8c9880d34d283b646ff67259ccd68cd9be99e65
SHA512216b18f69d98a319517cd1ae0de069cafdd69f85114c7a0b246cfc041fe8b3082789a5dc07acf7ffd9184cb60d95863d2dfc3e4e392cadd95412abf4a9dd778d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db67c3a6de47fcd665bb08b8313eb95
SHA1e5c649d9739680530c096a62e6af96610105dfea
SHA2562931ded3dbf5c6ca9d76455d1a2f2d74f132cffb4f6e0d972525416ae9bae924
SHA5121917f5baef54fd16c20988a3b0392ad40332b810d818d4e7ba8a300005677ab2c629209e38fedbe42c586506ee8990f63155bbe46967015bcc3ac80993ea3ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741f5e6e8aea50c950c35ed87fc9c416
SHA1420e3191ddc5348314c0c335af8af4635eb46a4b
SHA256278c3cf0a32f0a9f22d1efc953c54e4d78dd18d63f1028c5ed20a003083385f6
SHA51232dc6fc35350044db5a2ca34f8d2b38ad77f4727f21cffb4fc0f0638da1166b595f5625beacc22fe5422e5eac5f1f62b2c175291eb6cc85801cddfef7c8b1a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528272793dcf0576fed7cc58fc3abc9ca
SHA1a25e58028fca6e2318f12a728a28c839dc66133b
SHA256a5ce32c7bded32ff098d1459878dd18a586110cf37b906c4251db9e80003359c
SHA5127ee3670b6b2fc3c1f375a6c7c78df3c0587f05380d3fd7f0856c28be4703ea8e4ea712fb6169a3dfa6abfba361e34e9f72577cd23ab9786350b0c7ecfcc44dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e305a7d4e807653503453c4e98ecb7b
SHA1fb6044041d6cc46adcd8077e9c7ff1977a12800d
SHA256745eba34372f52ba520a83d0600c0ced837f7e926132a38c5b3eee93de1ae341
SHA51256b103d1773f7580a1eb988e6d45e876deecb350f0da68b963b28568a3628b392ab4f132c387e72dfc039de289a4de4c6cc66a4ddd0f9e6ef8329424a377df8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a644366875758969e5a6497e982a09a4
SHA13e0a347717da3f50a9c131b4e6e0930bc5223bec
SHA256145d7d37b55bb84a5441e7e922715d04554d2143b69c94992bf3c7b527210e6b
SHA51207397e085fbf2f4c7187ca9e58f28ea3b6aa7d6dfbd1b50a2c569105ea3f7c9e035a6837bbb123c5f645c2c0dccadf338a533b3532d5e242ddf0a93bb0dcd810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51461702e83d5f7703d580900282ae518
SHA1fd1202ea600438d1dab2277fb1f8e2920caa8899
SHA256f2c1e6e645022bdac7b43b3c3ecbe75065f63a1969c14f831a70247d0b8fc63e
SHA512a16b0a9e8f86447de4e33715a9eb27325bb84b1c4172970a013e5795b3212b76e786c1b8c4dd8c89b2867930441823c5d57b7b34d9ad6805e8a022ab80c96fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6a8c0f40277fc0877d248902943410
SHA1bdd904d2e8c1507f62e625385e15bb8515a739ea
SHA256a0ff4f396d06a28ccb934bc7fa3c5dd7a5f9174986d566969812bdf898d12702
SHA512e200427ac6e8d1f4bfa094790dd3275d4d026c5e35bf43efa1c427b487ba48b953ec3132c211b03f587ef8632545af49a7897c4ab79a32022a075b87060ecee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a88da73bf9c390e79e6baebabb99d4e
SHA19c571a4cbd5003dbc6b784758fbaa2647599771c
SHA25612da9b944ddf054a6297a836b590e6d12ae78d85466a84435cf6ff0ab865d0af
SHA512dae328db269cc1ab45d253174d76289521abb42106151e889e614d506245a20aeae54b1270d147562440bb61fba0fa09facd390e5e06d699fc3bfeb575cd2828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d337e73ded922e56e2fb601c1d090da
SHA1e7dc5c3ec29344bd303fd11959a507a2d9420cd6
SHA256f571039472b44665e52e0d31613793a9527b717411076651f8127da95ad648bc
SHA512c2f76c0f585d60f87532e24ec604e8e091a01602b867c368081cf4132b79540934a9332276b22c16cbfbf5d1c021217661a4726e9885561f8114d34e04c34a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef044ecfc49808d8cc98666553472cc6
SHA146c69c82a63d8896b2e1688da25c01c53ada4464
SHA25657204aeebddc026d896d77c8e8ae24868fe1aa082cc1e6b2d7ccfb3ab359f3d3
SHA512c1831b20d12434f0470e81f1be905ec75ca2563d8f2d74294ac926aab2658eb281e4e0632bda90687e80fe6d7fe27ba352fe4c0e33fc5d2e15c23b6daf688f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb749edcdfaf519ce291e2927fe97671
SHA105165e401c9fa52ae10ab5d357742c2a3df084e6
SHA256619771fd906e736803ff52fec2fc6504e0793f727ddf62456fc159a3b97e7600
SHA512e4ec79ff351094d7c16523083a20fc4c2dc1c39ff2db34a2dec36e1b2a548d9dcec0b998d0eff6479fb05291ab6eab1cf6b073370850e75ed5c91d367994442c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf014b78ffb0ad843ad64fd5fc19a042
SHA1984025cb7961d4da7e704eb2e0c8dced369a973d
SHA256b04da6837877868cdb44de172076cce3ca084e11dda0c24bc98221c388e731b0
SHA51233c52c4f45cdbee73d9907327ac5753b211e96f02ecc52e6aadaf4e5ef9ef385cc90bf318629ac76406c43e185879f5704f9414d3a7cbf43f54f0d6c5cce8ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db1c4626d9cfd3dc754318fe36e1658
SHA169beeaf80837f0b6b7fd7bc2fe7a5bb8859dae43
SHA256c29267251cc3ed30b15fbeedda7f9a69ac0348eed551018db9f232c9e9cfa9c2
SHA51284f7c8843017648a9a3c0c4075e6980f410304fad9f4eb435da271a5ff72405d3b0ad1ac42b7662539269756d5ab8a6d1943f49c1283c98f87f207b4648e5a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a6d50ab684967b3c68ff964cb56127
SHA1254439ddb65c4abe31d849739936d121997c78a6
SHA2563bcffed0b34d1d82cde3a6009e982b03e6b5499f756a32764f84d1eea36298e4
SHA512d796c518ce70ea061c816deffb6e8d089171cbef3685bedc18b9328694427c9c3ed7cdfbf4700295d87a80bc75568d3091357b60ae3dec02c07365668faf88df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d12c3f8ddf166bc32fe8d8f88cea29
SHA1ed482b57bd40006c6643c4a94e948106551976bb
SHA256f953f55add28b5a3e335d5020cb795a32fb5e66755fd3dc39c7f0578654922ea
SHA512b8b2599415b5ce559e6c7d1ed5b4f68ef355ae5e23828f5e9fca7abdb7e23caf318177b705224097edcc892b35cbcda73980605d5b01c4c655cf83dfc68caab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0959b7e14269582401e37627e6c153
SHA1e8797617a5db821207dca8b40e67fb73d43564ef
SHA25654c8355e25a5e821fb41696adc7fe5d3b661192497a0c0099c85e18ff923accc
SHA512e5f28e86792806939752d7176711ffbbcb289a1b928a2b9410de0d4745d2851bfc9199f1e98a79844c2ac2af6884a693e9f442fc2bd33070dd5b662d75e3883e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b