Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
407b79abd29582e0b53180c36c7132dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
407b79abd29582e0b53180c36c7132dd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
407b79abd29582e0b53180c36c7132dd_JaffaCakes118.html
-
Size
15KB
-
MD5
407b79abd29582e0b53180c36c7132dd
-
SHA1
17f459d0bd8ec3a94cb8086773d53730fe5943fe
-
SHA256
79acb358dc1e9c66a79d009c2f48e4b041c1146f8484ea89663e5bb0a5245420
-
SHA512
368a515253c8121df35794430da1ab6adc187273abff07d8b1799e219fec7bf4c3d4d49fbd2624ad9bd108e1f4bf0824f83202d362ad5f80685d3d426dfba6d1
-
SSDEEP
384:NI/ZdzQ98e36SOO51HZhaXly1yI8YuPHR:S/ZdM9fKSOODaXE0I8Yu5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103516d07f1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434993108" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000cb8acf1a315d98857897af706222d8669f3acbbed46c95e52ceece8b49c6ec4e000000000e800000000200002000000098e8bac7fcf2d04355431c26cee5dabcf563af7b46ab96a242f697a8ad4d9e952000000092657b0a0fa14bb0329bd2ff5f1a69b401f376ab06ca096d8c8e0a9609d380c940000000fa7d050073df68497cc8bc1441228d09ca637cdb43a32e62d465750862f6b7da2de9a881dcfc48fafe9d83e42b28024677051f2024e5648828c9f8df8365084e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBA32991-8972-11EF-833B-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2228 2432 iexplore.exe 30 PID 2432 wrote to memory of 2228 2432 iexplore.exe 30 PID 2432 wrote to memory of 2228 2432 iexplore.exe 30 PID 2432 wrote to memory of 2228 2432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\407b79abd29582e0b53180c36c7132dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61b6c41fc4e5631fce452ae640ef915
SHA13031614aa780fc1d210d8b05c479edeb85b8fe44
SHA256e914ebde4c098153eadd4c9c93ebdd8bbc620ab52638f0c1ab9407fb7bcdf47f
SHA512b8a62b88da4caf6ba615d71a2e3b63b2cacc3feac4b8a3974f7de8a3d5d482f0fd81ad27f4d5f09ac955f08e4a22650c367414ead9f263d96db493fb6f05a2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898e63861aa70035282cdff714e4751b
SHA1bdbb63b6ec084f29b75430275d96fa7bae2755be
SHA2562ef333b2d374a27e01110e0d505a61cac7896a8cf40a5148b7ec4effe29a0f7f
SHA5128e93d793dc52d4df1a81b73411f5da4268ef360f252609c6699757a1303af9b095e178ea78c2f1e725863b7c555abbd8a2ed715d6980fe8e513cfc57905653e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96e2ead24e6a955c60995c18608aeae
SHA18a62d211018d9d9e9feabd67a3aa32a2075eb00b
SHA256cf2481dbbb41334404f1252bde7da4788c03744c7ade2fa95db93f90566ecbf9
SHA512e86ee6988560c0617933a49f31b86fedfb545ab604de2863677952cc62c5a2a036e92c4a91f273c70092e3100c76d33423ff75a9c103e3d7346fa511406a14f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c603492e941d9496a38a51fd1477332
SHA168270d80b023b89b483dd4745e81faa671764e68
SHA25663b77128f9ad052c9d47a983e0f413ebdd0671997c184af6a3db895a689f7abe
SHA5124e23217e3d0a8226e281d9cafb38dea418e3f38e75cced3158770585754b083f36b75df07b4adbcadf29e27ff9d429a53a0064fe5580df3e1afe287c8b4f0a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74e99e0eac26a57ce337c8f4a85600b
SHA1df1ba8a59d236955ddfe9fb723ddd6bf04f069c6
SHA256037e667a60caf2f37953ecdd2cc0baa6f15991a87d7885e0143059add59e58ec
SHA512ec85f8c03067381dd949b83e35d9f7867969717799c8362cbee84f520b825f8abe9dd8c8a83d0ccf91b4a9feb4d4f4ca4cb16592074460a6df609e28d5f191b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e1ea556b745d91dea983d2ba26bf74
SHA1ed62adccf4d936c7b4c10a7941c67bfc129040d5
SHA25663d7c42ed42e4c6d8a27e0dcc907da314e741717de7034799c6e58b76f9e3760
SHA51236adb8427576fa5246692bf0f86e1599480b0dfa904f457c0313c0ce942706a776c07c7507738537c099b42d8b6e9f258eabd5acb279c8deb1617de4078947df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c177989719f369ad5c80ff5ab6611d98
SHA1dfe6cb19a923c822ba440fdb8fff87a7427d28d9
SHA2560c2a9c465611a15fe189ba3e70c3b5704a631baa47e16fa4cacc973482ca2288
SHA512f000c07043cc57b0a23b3041d0801d64adfc6d14d79870beb4d95f4f24bdc86693d450fa681bae5ac4758cd3aa626d2d6e2ddd3068ff0cdc31df8255c85a682c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042cd813b6889be5b4fb1db5743056bd
SHA1a86cbaec0c2f24ed8d235fcc4c8c39bb5dcfd057
SHA25653fc763293e1a8a1193e220e9b7f46025f6670a11836ac51e2e42ba9c27295f2
SHA5124f915bc0fd3494e72ab4b96a784efa4bedecfec309291c6cbffb7227a18c6a0c947f4fdde1353bd3ffea8a44b6cc1fe5c8f57d9b9ab4b33d327bc12344857c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a38c7657f5b453efbfca291297c46fc
SHA11f118c112a6bd020dbab368e09447663ea660a36
SHA256b5bcbaae4f6f0d3b260577a1c63be252a813a5342d0cf3fdf85608e0b16753a1
SHA512944d49862b850b06aaa4cb8b017928fdc399a7cdbbe31451f58f35eef24e622d9f860c153e03e8011d7ee38c8c0dab4b3d6ee5ed4cde9596b421169671bfa726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e660e203eb3ce5bb0fb4a94a618d1ee1
SHA193e546d19e3ae02066e8937a836cffd31958279c
SHA256e8a408468750cbb27536145be1773442b2810b3cc40bc360f2777bbbe14da30f
SHA5122ecfcbf79688b19b3079026d9df435aa8e7bb4be61841477bb0fcad44bc0c2f16e9751d27080a7d6ea17f1e786309b225e22a0640177b190889472977297fa17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e282a735815f67c0c8ea04cdaf789998
SHA150111088cb33ae631dba95f2d0fd5356c5736107
SHA25688213effbbd9d923bb1a91cccb8ffaedf43700a9ffd3b66ceed26328ff0705cc
SHA512440481e02c42a71a5bf6fc6d9bb96f8b26121020919f150c61f8bf6f36b794fd6c42b3b93fa8e256151e4f31626cafec6367c6d2651313f13053f02db8b415d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57954ce0b6dd16b646d7f4d5f903fe03d
SHA1bb2c9ffe98ecfe3685585aa046ee087bb7afe52b
SHA256b0ea3b6d09af47bf014b5348997785067824d7f9d407b606b5f6717e8a550870
SHA512262ead59462a2e78beeea62f2a61d3c3fc7399ff612c10aadb290a844d820fb66e3e3824bb100079267a473ec089c3c229409c7fd0175004c294959a805ca464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22f4fbf7701a4336d5022401ca333f8
SHA1ab547040776fc4e934202420636fe4bedffd49ef
SHA2569e8fd1b5f9f027e81df2d8d0c8e303f25b6d9903f91b4339425803246d92989e
SHA512a86f068e3927f38ad5e42fe39a3bc43470ba2f185f97222b27fc9b1ec46d39952012913523ae2963895c0b0c54848dc7f31bf55cfd4a253e218fb12238c44413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e8aabfc4db1838df5d28b4e4d4742c
SHA178741b2b43437bc520506874680583b49eb8399d
SHA2561da9d7a69348918bbb02dd741959e655d90d4304879a48fd57ad385d3204b1dc
SHA5125b37b1580e87085039649353977b95244ab3c4439cde443cc9b224687adc6cf2921558838bbf0ffbb1db58c2e50924f1520ae2b9d42575d95873198b4d2e56fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7782c3ee049d001fb3655aeac271d5
SHA1334716a3dd81996535d5eaa7460c94b78726f432
SHA256f02d4ca379808e90801e4830259edc40340f19c4c256c854a3d26bb6f77445e4
SHA5120f38eca6af7a464e0a007eb300e2189c85016f53a729a4128c33bb722cb32f3e0a1346cff9cbbdff86889d036cbcf77e9c0e781d4c59f16809b8cccacf1742ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f4dd1bb5df1b34a816a8d8af6fadb2
SHA16a1b52b958e10d916c900fb0f48a0d68a00d39ef
SHA256acdc9fbe9ad4c646338de9ec07e4e6f6f983b851e53edd8b7b44e9cb81764773
SHA512885330453f49518d7714e76b386e0d922ae5d2fd811101d4681d3e9fa4a80cf65999b56b6a3f7b0b90b2a43238320a4ad1c2559ca9f83c035edb52b3f5c2a908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c4aa706f2987436e31d8dddf6343a3
SHA1249c51cf99729b6ee25765733b0d3fa0220db394
SHA25613ed295f8f449f0f6c4251a3e4b5c0f0df2b47390b6d65a7bbe4af7adc262942
SHA512ab4081cea0a38efbb6ce5507efcdcc482cc18c56a4d58d59d39a69ef4a9ffd5eac3c30129c7e46d0713e6f12e292117000af903cdd7a2a39102768145cae7e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918e9f0e139d01248fd8aafe739e9960
SHA1973353e396243904e9b2b76f52832c9c312414c5
SHA2568db19ade80bdb2319098395722cf2cb3f818c238086b7c798ce69f716985a0cc
SHA51241e693aed1bc28437986cb941e3997e12d9d12ce7d562f5b2f39e4c0a3b4c5185ddb920f8eaca40897a4c103581126b207a0fce86eeb7bd42ef13b4056a5cf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9642e5a140bb58a3cc381e50c3a00e
SHA120eaa2e08f730050d3aedc25dad4a9c5d6821cda
SHA256b55c283bfef22818d4ea1f82fb8399449fb3a2b09ba1034ce6ac71b3930aa5de
SHA5126b7e1c0ca7e1180eba39a55af0cb78ac0935539a36795a573845c55094524bf892e3047468c8ba56c95f14d62ea43ab5e5476dfef060beb1907f15d0c10e51a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa0051f5700423666022986262c5987
SHA152ade26f57d1d713cf3ae8d5edf1628361c1c850
SHA256a3d90165f51bbb9ef2c961f59aa4457e5ed8a5576ddfc78477d7f2ed493c111b
SHA512d900487cf136f7a80d066ca384d9bffbc5b438bd4a7402755256497d06ce56d5950e2896b0bcfd53be6b4551caa7daf61e520883429dd95415780be272fdcf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d843dbc461be0ec03493282826c1d1d
SHA161d1ad8792f080656b329848fa01db0096436b7a
SHA2562389869439732bc00332a2141abe4ac572fa46a3823cb33afdf6f8e12e5d3679
SHA512259d8ede5e8984d34ebf7e48e0bcc6ed2a78c0508f53bb9be30f02c16213d2f070394b91d714bd8e2a82efaed30cc85396f63fbd6d8b7ba47111c373b9c6ca13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b