Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
a364984a4a59d160258841522824c3b2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a364984a4a59d160258841522824c3b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a364984a4a59d160258841522824c3b2_JaffaCakes118.html
-
Size
79KB
-
MD5
a364984a4a59d160258841522824c3b2
-
SHA1
372eadc99bf6ea35dcaadd5d9bac392be2825e5b
-
SHA256
3764fb383680072d570949ab9576b6d8666f56611b1eb20eb7d7d07e0e1d0b0c
-
SHA512
1f2be16327c087f375553fc1ac64e2e06094949e41c80691ad1416f997e6aa8cbde177a27b3a6661bbd1b32debf8d5467d4d50955498582a08da53e80c7836f9
-
SSDEEP
1536:XBvopw4fjCWhzLaxC2OSnt9ojt9F3/Trk4Z/LBCTD76Adbrx:RvI7CWzLaxC2OSntyjt9F3/TrkyjBCTR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007f9dd8b76f8b640d795cfc98a1cb7e3e1f8793ea6ea7023f6d3c5bf4f11a78d4000000000e800000000200002000000017c8c6017d3272c44f23485bacf97cf556bf65e7e798cdc9c0bd3ad5766a1acd200000004b2d84ca4b4145ce302d2ff6d2a1fd2f223fdd25fa130f4d11f256eaabc61a8940000000e5567166def104f80d2c260592b7887a7fca6a591abe4ee6d242ba0aa04c92dbfe84bdc4be4a9c461f5f6e2153b5ded65cf2250ec54b0e50eccecd12dc752b09 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0353cb9c7f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4B67551-5CBA-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430076191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000ec3d028fcfa74cc756d1bd79e017453aff91908cb6a83b71c19ab00b3e9095f8000000000e80000000020000200000009bfd9e4b37a7a36ff09795088cc328a23c7c85fbadb1fbc4bb02500102471bcb900000008a2a64446000a2d2b9cf9ab403514b8699d2acf787d2f74dc53f145be3d25eded95c8bd4154ec7c91a627d7401dcb1a8fd62441635651869760b5cdbaac6d7fe24ad0928d0f029ddedc1c338e3a27bf58908b7f614818998c96fb87902f96fb7e5e809d1bc2ebeb088435a28c55d75aa211b8f9aab6d1bd955e03657941258b9c23b67bf96ec88b5f00b63885de8461940000000529b0a325a7c78efcb31cba3891cb42f62f4d299247caef2ce2136246428730cc16205a3304ef3ccbed6755d3f3eb59a143c8732ab58f377f07817a8a00c4c00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2108 1940 iexplore.exe 30 PID 1940 wrote to memory of 2108 1940 iexplore.exe 30 PID 1940 wrote to memory of 2108 1940 iexplore.exe 30 PID 1940 wrote to memory of 2108 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a364984a4a59d160258841522824c3b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d256ebd38ea8d9aa3678fbdc639221
SHA177d89dd33abe534d77b4949ea15957f749e8cf09
SHA2562433e9b98a76535058f453f579358deaefaaf7b2952d8613e16ca62fa2d9901b
SHA51296dfc4f81e17ef576e065267e9f682ce4ac2bbe7bbd9db281a0cf60dc11d8c63d794d6abadb19233b9f2e5a42bf67e89fcb1c85ea1e61ca4230cce59ef2bf5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac0942da7481ba2e150a3bc05a399fb
SHA17608b6bb434e7e40d81bec3fb2003477ef3f5e85
SHA256d113d6fd859e4383c8d88ead6d801b1a82734f777d23ba905e7b385927e15588
SHA5124d08552bfd78f724457907860288533c227936b038ed41637365bd5054c57aeccd1b974ef819a422b8576454f039bff3bc86c6a2301d3815fa008e555af8fc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d61fddb1dbb0fbc5ec97189ab0db97
SHA14c7e689f9c39a900a75758e2ce461ced689efd5b
SHA25663411bb8bf85fb5edbdb957d1ddac2a5c86bb7c22de747bb41f20f30a078a0ab
SHA512c26dec1efdfaad61e5239c09cbcba750110ff1b2d70a7c260e9baf5907e6b5b9aca972e9014871e281d70bc3253ebbaf1bf6c74e5825f1ec66527d8e39d7b914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7ba3c7c91dbc1c3dd4c6ecbb59cfb4
SHA1ac9b34e903bc747ce506c87d94ec6932d3c188a7
SHA2563c3acb98c6f30a5c6b81b9fcf688dcec9278e03dad4189f92a491534e55e5b10
SHA51264b1be4b594caa751091756bd4b73a859485cff21cf7f2d225719a460f64352be938adb7b75746415227898711363c89c61cef58c7bb43f629266ddf37c45dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab799eb226ab996814e4a6b55cdc1a1
SHA18dcabcd7fdfa4c7895ab8b17d209a9684574bb8e
SHA2568fd6832b82844256b75f46576f3210f90586f1e7d797e4fd28395cfb179d1060
SHA512132509af62086474b5e3ca2cb2a19fd261a9239fa3b266591d23766d6193979c53bb9e5dcfa4545528f164bcdd6fdce751b476b26e53a3cb04ea400bc61af710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b35574cca14a841ca16383ccd0333238
SHA1a9c4da9cb575f9077779bb4bad88aab43a8e1e0d
SHA2566036dbecc0b7ebccaf057c66b9d1f499ea8cb7468dfb0546a67b840c37c307f1
SHA512f157c1b5af255542018c88390604ca33f2155864ba946cf41f92afbf24a53753283d064abcd87fcc344aef229b722930c5920430bdba3063e303bd9ca92c6881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f8b2fcbb0da7470efea1f6ced2b320
SHA117cc0b0f3515c875f15abba9be4c8364bfe5b673
SHA2565809a611995361719b66a2645c073a6198535fa97712a17d861c1a1d8b70f3de
SHA5123c2618e188c3a78635650a66e5cdeb15722e9e2e7d92b583cb68a5984d9fcabfd4b488079c1101f1fb582e494ce137c914d2f384c6d76ebd171b323847116985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b028293b9e3f70a2a8ba102b5a6f7afc
SHA14b73a50864333216e82fa1f95ae3a5797d1a2d38
SHA256d428bb86903a2abbad305d6d0d44cefba5c1162d9e9c43132a6e17090ee4025b
SHA5124609a880da36e3e5a7bbf414a49f36b4f14bd08d906a6bc765bd76292284055c60ddbcbadb175e15b269fc9237da4fc53ac76942b03111dc3f822100a8582f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864056620ef555abb0ddb575fccd0acd
SHA1584a525738fac80b78a2da6940ca431d12c13c88
SHA2565ab9d05cfa5b02a351e345fa68312220f5cdf140022880868f4667d6595cbb4e
SHA512c5fa610153c04dd5553d0a1072b14a6adbcefe1dd1ec7755d674debca1f1fda0b4a1dc5340a1c72f91e6dfd61bf28ad3beb9782b0cc7ccadb301873ae204e453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5844e39e52cfd94023080dbed89c330
SHA1d1204214f3e303104f22817ec530830c359bdae1
SHA256488d306f1bd6d1f31be171a9186dd07b4b5cd1114151af46d0062306e7755eb8
SHA5128ba5263d4496e71f78c6008b8b81fee91768e3da247ada6c9b7129d8d1c030af69322a0944f3d35ac078dcc3af27dfef1a0c428ca60514bf8ed530d6358c6662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080fdc183204f9a2130e5b092ce12aad
SHA13d0a4ea5c790da03301d17f8b68c11b753ad966e
SHA2568e86fdf236a1ca5315746db25e590d9f269ad17efac143dbcac63605362a8bd6
SHA51208d8eb5a12b634ede2210fdd9a7d2eeac0391590d768d7e2e489155f3df05445bfcbe426a377d20e41eebb8d08391cc7be70893663c0a5a59a4a9b2af533db2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc1b312ffbcba76bd6b304fd29aa61d
SHA11e071ff709f03654c85a3b121aabff5d6fb96f7a
SHA2566916bc048685c3d47310ed15250494a9ce0b8efacc9da52e68bd5543273357dd
SHA5120bbd99af2d8278162a84d598740d44ddcacd1ac406fba0dc4f01cb4050ab1a7128b8f057e5143d00a49add8f5798662b7cbfa0d1012f1f9dd7a212f51b04d286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa65e9d408a9358cee6bad9ddbd2e646
SHA1eb504f3daa4bb81e30d5f84b9bd13d3d33fb5340
SHA256ea7d52ba3d759a8bb6d577673bcbf22910f2ad50ffb7a03856c94593005d626b
SHA5121634f126e0960ea0e663f8254751e49ab6ddd5de6fa6d90b0a40c2f4ff738a70c6fd22dc298c8b908ed60b07e4c9968584a75970a726ef53fc93447c4f9a3909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b14f8aaa9ad4c8365f117ccd759565
SHA106b8b03ef5f7d02212c9cd8fea6e4f685bab191f
SHA256edafe365343b0c9c8dcac6fb8f51fc56e9f191770591d1f89b1269d18fae79ee
SHA5121530f0a7812c0a54549823291f6fa49aad91afc264d9115e6e5e7047a4df8b0b4599d0d517bc78a0c95f008b4e304ad0d7e61b661ed0bb7d3d4893f805d19c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa00c5f80c70b99ed16f89ec1771708
SHA133439c4e3cdced7a0295006995fa8ec9a0b67228
SHA256a0aed55d2a85ed8ece37c307f567ba56d9624ec3a31dfde4100c1cdb244af575
SHA512f66b5bc47adfb181fc7a466840052fc3452be4ac753ba67298916bc19e4e61e0c63a8e9b2f09bcfeacea901109e9c49c3c3686cb60661389189f4e2710f3a4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494f903bce0b085d6285d6b43feebbe4
SHA1ea10c12bc7faaea8b0d9facaadba7f21f30a3981
SHA25663a922e729f1ed390db1d4a55d9bddb67e9390157fc569c7eef6f7f9749ebd86
SHA512bce18b04f83fc37d9628bb7cf4fb85aa619e8c75ee9bad5a87ac00250e10fb6d9aa1a4560e03061b9c09d1e70483aa0beb230f7961f0c8511d8a7fd63ff762f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5439724ac54a58afa091059bb53711
SHA152f09c53fd231d11a72bc090cc3fd7599f7041ed
SHA2568f904423a7c2f2ca9f5089fe66274470648e860323d3ff2a381aef35ef735304
SHA512e63fb3bf6804cbfc5578d6bff8332c46bfc5e897f21efa8736b29fc777bb7c0bd91881426a6ddecc4e26f3a718bc4cedc7ba70b53b3ba62ece88a618512cf995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c1939e1971c5f8187a60318f9c3e6d
SHA199ff9bb222eeea8ef36aaf06a56766be6b6a9762
SHA2565824b981d6f549d9c769c2f8bb55e31e209f7ea31ab984afc0261b80448d9ab5
SHA512e4549b0cbb5446b639504a9bc0df9f17a424de8bc0a68299e460881607bf0bfd761bd54c370984cfb3b9eda3ff0d25ae3c2016abb4a7c4ef2be38f162c8f5c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b40ddd0e1e69342de070c2245da3d3
SHA1d079a3d9f7c104a9135b4833d9c4ae836b96eb12
SHA256d8418686143206adf8bb69beecb0a43cce2aa9b2f1a73af5da2af45ac3462a38
SHA512ca94b77d964ddbcc2207b99e1a554cbfa4421c399862f0f3db12bc8ab24d3c62737ba00add1561074f06f7b8200a33d3798cefdd46e4b50abe171c0e045f2073
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b