Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
17b4fc6308112c75db4a09c49d9e2797_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17b4fc6308112c75db4a09c49d9e2797_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17b4fc6308112c75db4a09c49d9e2797_JaffaCakes118.html
-
Size
26KB
-
MD5
17b4fc6308112c75db4a09c49d9e2797
-
SHA1
1854740bbb6fe5ab0c93dd079c5c62f9ad73ece0
-
SHA256
c6484286d47e28eb47335113c0ec31fc83b8b871ddf4eaaf8440de7858150b2c
-
SHA512
ed3a96fba60e1e3995c0cbec9f7acbae1987f7cf20a43ab1a059d15529bb20312bba8b653c63ede0dfe3d4c512f655849fe19fc6f1e2abaeb81c2b8cf90fc052
-
SSDEEP
192:bswvsBlb4gVyQ42K21zrM18wu6U8VIbvsz181+wx0CB1DNu44rBTj1ol9Q8Ywi2E:bsw0Bh4gVR1No7uTvwuIw+AOBTho0QE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000691fb064bca4aac3161104e5902b325d61bef0eafab138f3bbd8aed8335b661f000000000e8000000002000020000000fe31fd8e2b45d18eecbc7584a8f49469fe09d3c33037e5f547b801bfa4401f6720000000216ac03e2444a2d35beab9b041d0c64cc2817256b09a22110af87152d3fca5b940000000f40732939f2bcf4de4c164b933d13b1826acda775a5a36efca517e0b44d9d7e302ad802c83992a4676a22e453a4ed239b6dec174029f28bb8d1676179fa0cf85 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70400ff9d917db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434372117" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{202BEA51-83CD-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2408 2104 iexplore.exe 30 PID 2104 wrote to memory of 2408 2104 iexplore.exe 30 PID 2104 wrote to memory of 2408 2104 iexplore.exe 30 PID 2104 wrote to memory of 2408 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17b4fc6308112c75db4a09c49d9e2797_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86f4bf0c82b76f10a1024e0c02a8933
SHA14875ce353cb50404c32816a246a2bc845e1d3477
SHA2563d50e1b160838b5747eff044e46cc453acad8cf6d5634789ab9465a9781ffe04
SHA512f0d648766c7aa91d86f49f7b8ff8292b1852d394a300dbe1f2e15bcb0decf71a19cdda373d4e2ba73b2afa51ffa8f686c289d4c6068cff6ccd6bbffae6b5d625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6763219ece701a7ebdb7eb7e3d9d62
SHA1cfea94a1f06124cfc1a4b1529c7a09dccaac7af3
SHA2560d9cbe899f8d974ec6de5a046b23d76fdb783acbc7f5f8a8839ecc500618c7ed
SHA51221cf4ed14f701fa12c9b6d5a13dfec655ee6582aca4b32e2b7b2eacf891a9514a932256b85a9b1ef0dc04ea367d400f58550a92f9f78ce0984916eef7b02e88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f18ca3d2704583d427d55372bbf129
SHA1060d54e504c4c7e3e2b1d3f44968b0e645e25bfc
SHA25642df06574fc180d2d15823ceeaf64664e289b4d550c92cdd21682dd9324da072
SHA5126d55f795dd00391cef0e1d71790b00a97e5301f3fee0d8dc5dfd497851966a0e942f590ff35b9e4e822cbbe0a7ed1b91941c3e2da83d15f00dc43f384b325a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962c53a69df6dd4f8021e810d0231cf8
SHA11c24f0314fa383566d3b09bb9e058fc36b766831
SHA256bd9991c91c0b09aceb47a96bea5cea2ce2e4767ab96d8e642ad0a3233ce7ea8b
SHA51253ca886d2e5364c8239ea623cd5a6da057d423398cbc4acc1963e8f91b40938c08c96f9d60d88689e3f94e260efcd9e2ed1e4303bdee16ff4ddbef5a884971c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27ce9c0d1a81dc99976542fdb66f2c3
SHA1f6e721922eac774fe7fb473f62ec5cbe0deb7f8b
SHA2561cfa732487959ac11ffba5618aed36c100b1171548b560c9b00e05aa8a6e30d2
SHA5121d5ffe1256e5d6be9310035f5c6eebd84708d418aae3e10870d631b3c4ffd832969f888a8c9d5c719c150a67afd6357dfe0b6e8a3dd12c0057dd0d4154a0630b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23707bc2ce8d9ac79b65893e2c16910
SHA198fef638c7a53924c4d70fe2654948dc2c01de7c
SHA2567b5892e8b99e1c12e6cb0c782b4dbaf0c50c15033e662a0e5c342f73faee9325
SHA512744f0369830bf86e2f390f1cf5186569c1182c6c4c0df73241282075823dc429b0f65e2ef89765e7474c019a6b3c18419d64d7bd97503f6cb4ef2d7c47e307c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c1e23e34cb6d1c5610d6105e1a4f77
SHA1e0957904d254e037616182bc3b2fb203572f7a6c
SHA2569a18ec9066fcd1aa83392461d8aa0bfc9bbf277114227bb8f4924ab4ca67eb5f
SHA5120fc4d23c2043252e0f5bba707409cdcfa190035e12397fcda513035299e6e059877c78587170ee0d26231cab196c1503c52296bb72dc32ba9bc57e7c128ee79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baed78c81024841437ab3d84992b88f0
SHA1e004e95e1494db32bf1b21cbf3150398438af68c
SHA256966cda06edeae00cb56c080c6a717074fe1b48904445dcb2418398d8a0bb1cf0
SHA512daa6ac16cdcdc94604822f01f50fdec25e56c0d7bfa31000a87cf7afbdc92a95b428ab972a6e7586e7154b70667400a017b5929f2f3136448bd4c4c5ca44185d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0ec59c3c091c0ff60ac4d5b416df61
SHA11f1e85625e0bc8c413e04b25f33137e34f21d12e
SHA25662e1452aa7d51a9dc7dde8b9bea34c727fd9c7a8d1a08ec3b73026713fd98b1f
SHA512247ca8b608496a31210d34bdb79bed65fa5c315995e821b9a9841cb67ac2f65aadc460c633d66392181b4f3bc38c35c7d1f7ca501d10ec64db9153feb128ac20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a5e25bdcc4c897a5d459ff62cc166a
SHA1cb62b6678d802499dfd76b238b179794e91bbbcb
SHA25674633055fb04259bd3edc46fda5f5655e5771b8647007049e3c440c04c83b79a
SHA5122d84e4d2858de3024ede2f454258e71903567865f9f74a7ff6c196097d8171c6844fabd2b349582ef6ba9dbb49731d2bdea455815c32c2f304ba3a6796afef97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30050608a99aaa77ff2165c86ab2c18
SHA1ce3645a4efc4d5308bf1a612cb259c44cd0aa1fb
SHA256fec9ba11d890621b4c85039e7cd0cafbf4297f3ffe6e9c506c739d0b303606cb
SHA51215f9d119141c82067ef47f3a2331dcaab6a82b2495193f33e81f8806ecf196602b77dcec541cba766ae9eb17202d529a1385623ba658a9432eb6cc5637c70f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a89529cb5bc766916d0c45d853d7db
SHA1cb0884d80c3c4adc22cf5aef94f086ed1237e7a7
SHA25698144f8c4a145be0a6989add92273aac7e82bd7ea0efa563240da65375006ee0
SHA512520c9404e5c7017aa88c63aca901ed7e6e8dbd672b506049934d67ad9b865610ec408af907f559a92aef2e5047567fc41f98a28f0818692f5e72062bf4e38442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6284fb7d1ad0c47ab566a2bcf0f3935
SHA16ea8154f333946e4b8cb849556d7ff1557c820a5
SHA2569f76ead0f4da030b20df1c41ca7d0567bae54cbb4ccf6f044a73cd1b7d64a2b0
SHA51223c2c25861e16ead1f937c5bc05ee3d453a0f28f57be81b2fb593c822db8ce2b93ac314a62836ba2050710333b8f2a0ea1754201d2e019b0b389045b61250569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce73eca3f9ce0907122cd62e1b760d8c
SHA195db6d4e1d7d3388a0bde547448c88bf0d9d5a1b
SHA2564f5520c3f0957d3e918e391ae6b955d6931de8cbf087ca6fe6eb95ca0dcb13b5
SHA512f9b642d3c05573760c5281eda718606c8a16033d83177ba106eeb4264c0bd99293927978b42f4826d68c7efe975b0850831b3671307dc4d4ea20c7a7b4afd9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509bda803d67282fdd1b43f7bfc578ac3
SHA1a7b6d0934aab5292db32aa32ac74425d15921891
SHA2562e02fed22a1de65bb094c2ef4a5c649a5a7e60ef85e0f8a99c5cf35f5cfebbbd
SHA512f715c9e47c2918a7eaed453dd4de23f8dad26c69893909fd526f98ebe1960d3395a4ce8ba3d047e1872d158de8033b4482ed63f108cc323aabab3f11489d4e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513afa923cae8f5d440f860891f28c52f
SHA16e2d9262136d7b7cd4302d09c5a33f7f502e0420
SHA256273828bd46956e16d5d4041ddff87e1cc61e25e4baa40b50ef72da1b10eaeb69
SHA51223072ea457c8d365ee03be5d89f17c91977bc8ab0fa13ca6c75f082be3fd31a732b0c3a6337d5997670bff7c58beea8e2b832f1d57f0398e9f75e1132ea98131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13825081e26aadd6ac6dcd20f488549
SHA1477e25991216dbd393530c6f9f449bef64d589c1
SHA256f80cc571bf8d67f593cfa0d574d02169cde6731519228a2a2e8c387ab7459faa
SHA5125eee9a27c2dd61ddfe641bbcb644e45a1896b5cccdc220e4b11895ed73fbbf320bd0c4f7d3a210f3305ca7b0bbba7651a5d1312c74bd806e46329295a15b520d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186bd620285be002af4621daba89a072
SHA186214146f83557dad38ebab2ebfa338cd59cb888
SHA256b4acb698c49dd3f642ca758313158fc8f3821d4b1098784eb380648c96893515
SHA512d3b93469c64bb6920bcee9af266d08ce672a4b54a92f88697c91981a3abe88b8bcdd864b79cd37d4a41cf717ea4c919db88dcaf0e0cfad0dabfb921410ddd784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db721813e960c08fcfd89d5ba0bcd536
SHA1b784978baa3ddc678c43ca33be67ed976f62b472
SHA256015921daa3a4f0c6d95eb8e6d1579acfde14329b95d7b88338ee44bda2a870af
SHA5120715be9f4b594575adc2b86ed67711498e0732bb97923fd1aaa1bd6c9788a9d4453759806967dfbac75446247c93d04ca794f9880fad7efcb297b23ad458f6df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b