Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
b5c42ecff7c7d90d37bb9c03622d4bd9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b5c42ecff7c7d90d37bb9c03622d4bd9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b5c42ecff7c7d90d37bb9c03622d4bd9_JaffaCakes118.html
-
Size
12KB
-
MD5
b5c42ecff7c7d90d37bb9c03622d4bd9
-
SHA1
f91a4384f3bcad3ef8f58e221f4ecde644e7df80
-
SHA256
a4eda7893efd760d0c0c40dec80b2b9832c9b3d976c7e045c08263687a1da422
-
SHA512
703508d9509e7fbb0ba934d33831c43d9772f5909b1576be82ac61411baac0b709d70e9ee242ad39a85a3f98cf44f7b9c4d15509ce8159780aa8b97689ff9cbe
-
SSDEEP
384:Flic4syKl/GvGR/3sfrwdgihClzfDqf9u1woQ:TxBGvZr7ihCRef7oQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c239f32ff4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A555301-6023-11EF-B8C9-666B6675A85F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430450802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000009b79798471e4c585f3173b3925a017d5055e6435e458110462cdd0a13d34f6df000000000e80000000020000200000008b332ef1b32a3383192c65cfc1794d1a93d7a947c644759888927611fd2dd48120000000a02c83b8986521062e677f6c0d12eb5dc262f2c492e2374411c507ba29d9483140000000c6780e9d491926298daa07e1c079c9d0666b73be54a413b12eeffda8dfed0c574a34b62d041b65c4abef2467c817925d4bde4e564d12f442c9baa6ff7a6d2828 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000009b1cf189107f61cfae4b672a7d3cb61904c49407af6512ab3311beceb5a5943a000000000e8000000002000020000000ebfadf050bcd6601142ec1981b6310b639eaca9f826e451445a35ce08ea57ee390000000db92fca7380f71fe45f8119231e565498ea4aefc1021f69d94df9a3bfea44ce26a7e91553566d5ca06e805b408b95c2b417a376856b103bcbd45145fb186e240ef4e5850df701b63e6397d0590088315855bb78ee1e9ded532488808fcdbf4a66b23f7ece575842f42dabc62e706b3bd5b2bc5ea51f80fd732c51c8bdcb3b06ffa54c12fcd49262d7458602dabba216f40000000dc6dc31cdd3a2a814acb93d778f32bc005a5db51f4b95bfe282c9b247e3feb0b1b086720a750bfef1d175b38f43de6ed7ce2eb6d5f64a86ea549668457185ec7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2192 2556 iexplore.exe 30 PID 2556 wrote to memory of 2192 2556 iexplore.exe 30 PID 2556 wrote to memory of 2192 2556 iexplore.exe 30 PID 2556 wrote to memory of 2192 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5c42ecff7c7d90d37bb9c03622d4bd9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ea733a0bd099968d5b78d2487ba571
SHA1dd4409f21f940c59ce12759de398938df56c6959
SHA256e0de3d2d78a5c6e6a91fdcc9473584ebd1ac18d430a61bf86ff9e1d88d1a12a2
SHA512804788770d83c7e5de0dee6d914c545088851c85e3db99432c3379993bfb4e42f214a11c6c5894dea3dcfe3bcffb055ad83366bbf3dbe095d402a77ec20e8202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53542cb0583c60b63b2e417915717e89d
SHA1774161296986dd83624faf651ccadea430f6fd1b
SHA256fbbd80aeb60fc3e33ea57190e9b8a8fc70aafeadd551b75004c878348a4c7a26
SHA5125cb1438e7977cd90b0ceeaab9bbb9a35370b4e716172c01a07f96a64d7c6ba309b3870e23d059565f01eeab06ac9875aca257284dfa27d86e9c56fb68e11a9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517564dc85ff2374348ba8371c3f22357
SHA1fef61423441fa9d8ee7b417bae40c5c848f34926
SHA256ad6d88d5253f58081a95def76517347e1e318cff99e79234d47197aac9e61d34
SHA5127142a448ae5a5613dcb0dcefa64a2832ab07bd35c0e5841d3c5ed2f37485d3dbbe571086308796e1cf54ec255038f96773e281bd0a73065810c77afdc159667d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb16f18de84fa817c6ba36d09c2b710
SHA142f4238dcb01607a7c24e6b5aef0589ad08d7266
SHA256afc31e353bd0fd07cd8c9185ca04f8203b48e35117e177a9afa65b27a2e81d2a
SHA512e44cf5fd1273850d4ee99155d054e60a236b5271879267bf03675447ec7eed7191793554c82a5c3b4c44a85e94d8ee3de550ac3b3fa1c5d3dd5847b9972206eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597eff56b25261e48464438510bc51196
SHA11d95c934a2854e6bc53f89f2c0707d09a090e90e
SHA25614e085de77c2575503840658af2466b3bc2fa8a0a95be90c9cc8878484c74dd8
SHA5123e118ddff870006a3860d62c50200fa6300e903d88f3f7f60561f3c2011c3e78b935996307ea03c8f0ec802707020d5f6eba0c7fe1d331ff34268557193430a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98d7109a2d728aaf96a5a183f751425
SHA194a2a68ffe6402212e28677b660f1292f4055383
SHA256dd5e4eed73ef8e50af09b879bfc26e064f611da004d32556264fa12dcd18620b
SHA512a113eb6b38ab523ca6508a8e0e02b2f70e7323d12f198dfe4d622d22e2b072e2d233d24b360c5cf0ac0d43e58e7241a21b137c2bf6d8a31cef299117a078d3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c473aae7148c15adca899ea38c735e
SHA1d9de68fa7fc01ee471dae0350727bd79fcc256cf
SHA2565cb22a646ac4587e13bacb54583eb94417af44ee1165495fb5c35d47bfddbf52
SHA512d5c993d8ad705b9c792d4af5c391920753d93c7b33a308df2c494419e774fd311f2614a9c15698e66a63d94818e3890c08d84aa4db2bfe239dc976db5272f7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070cfee1c880352a4e0a028284f3ba3b
SHA11f510ea4ae2c9da82faeb1f0d0a07cdd545f332a
SHA256089cd69e47b94bf5d3036de64abe7781b2552892971d8fd914a9caf9ff5879fd
SHA512f263b6e9fe21531b83d7207c00939872b1fc6938e0ec52c688c1afd94f8dac5cf2abfd822ae12f4185875eb74d63bb3303fe6559fa04adc7a5cb58f04ed9ef2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2c22908179a44a5f56ae62ec0e8143
SHA1cf55c29fa902285b2e0fbf3421cf3aca6a08a920
SHA25686407bb44f82c27958804dfb297085c9b6deeac4557676522e9b076ea6b98b42
SHA5125eba914b0092289ac278bac4ee99bca86be0a40293c847dec35f07ebd5b80ae34948271266847a273b42b87eb876fae94f6c19091684c2246b549a9b7eab908a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c154ff00d44a8d5645d44aeb1cdd635
SHA1d1f12c2c1fcd7ab68df89fe2fbdcd30d98f60e38
SHA25654b04f5256ea16a0133429dfaa3f9350349a727e74ae426caf99ba590e383e7c
SHA512d01bf271bab184fefd6b5a4e98706eddc42c3bae5c2f6a777d98abd6ccb0e9cfb4810b60ecffd05498ee2b80c0822e63f38b3341a5151f99a2bc6ef30e45d555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be828247d79d870b7ec471fc8c635c8
SHA16331286dfec0d6dae93447857bfafb77deee70bc
SHA25631b4bf18b914882384df47f5738cbef580c33d0eb6e8731cb532414025f75fb3
SHA512ebc23ba2d46e2c32562fe031e91c2efa81481b74875a4cb8874607a4732732871b4c4da663630ae5b2c61e9c35b3dd47691e646f68291e3d362cd565f0330bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e81fb9565b71a0f142e37196fb139eb
SHA17957510fcadef1eb59f952cd0f3f591f7b77b2e6
SHA256561ca0616b8e05f06733aa6621032169a846fea352876f7840aeff8480e86f1a
SHA51290c2d210c86b264b67f093088d30a93a13eb564c8f955b8cbf42b389488ee6d8fac7619275f826e57fa564170b0f24182f6327fd74f5b9feb6120de2cf32cfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c83b66888bac76a5b7d7cdb4beaddb
SHA1eb4dbd3a84973b757eee3013ec4ccdbc34d20778
SHA256db057d42bc0bd0e15101fff6a12fe525fb2b1be0c15bf6aabec7ab5d04a23c10
SHA512ee1782041cf54db1e6dd29d67c4a3d12c6fa1e8031ccf0e8868a42e73db5c9cdf65abef69358b9b1854460e35f0898c7e4c1a238eb69254f5bff09750bac6fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c2cb66813ef370f77c2884a2734ebf
SHA1ffe1c24c3f6852baa272b3ae58f35d26386adad0
SHA2565283947c2621ce56043d978ff1b2783b0ee43441d853b929b6ccb723b9ffcde9
SHA512746954215f0901bd8edbb284918af2a866e40b82d557ea612ff9d189a0ca171b1082386ce6b3127c97863948db032bd98fbc78a061050edef98ecd9b42b660bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1f4f0b09ad38706811c85372fbd6bd
SHA10f527be81f0b889fc95cc58d5b92e1ca002354d5
SHA256624d9ab1b706d6cdef278f6b3a3ee849dca781dd6c16bb6f88137d2df6e0b665
SHA512279caf9660b2f5d50368a5e009916ca61a26825dc25be566b776b82441111e588015cf4481638471993a794d3fa3d86223d3fe88cde7a434d3f90ba2aa558921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b6bc39cd47388dd13f3e892fe2ba610
SHA1e0f06aeb091bbce713115caa18f3b38f6b53ab2c
SHA25656680853c3b255843d5a952e620ca130d857bff46895e94c75d31e9cbaadafba
SHA51221efd2b0399dc3ebb4f68839366ce425ac468133aa9adb555edffec1a3a2f650a31caa7cfcad2aac6d8dc0006738c9d270699d548feb112c8b530ee1e3b0eac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980298fbc541d2a1153245e8a1174a35
SHA19c1ad5a5ac9860e7e11c69075993e9026c354286
SHA2562bcb827da3cba9b044274c3df609d8ece8781036c31fc0752755b11329c1433f
SHA512de65322306229ef1c48870cdd327f1a9827ceb12ae3109ebf280046a41f34df90a4f473f40708827ec04fd8698b34406d0ee5b34091faabecb78e12806733e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515455ab0a411ecf8c26436f3219327a0
SHA1409bbb364445ba3bcf1c63c772b314245d841843
SHA25626fc043d482b723b1f9baf0cd81e26dcf41f823d672cae82272a559c4ebcc2a7
SHA5127355000e5777f88acaaa8b9bd65c6c65b0646a4306c35eace5990b4ef8f37a8ba4110db52c88bd7dcefd03c7cb8b83cad2861b4ef3ecd6bf12dd62bb3606b781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c55965240dd0f297fdedd0d18c50e8
SHA1be465f6d8d28ff20d89feeaddd3ade4a1fd3cb89
SHA256d4051d8c6aa46109371f2b556b9548beda03af045f6ba400c183b76d2672f5d7
SHA5125b74a06e1cdae1e995599ad2daa84a9003bddd6b9e92036f46ae0889e68482c06ae2b3d979b77d70fdab202e34b9a7c2d21c29941540216c577b5b1071ed3ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c85225a207f7fe147df03ce78ee51d
SHA145c277337ca9b6034c8c2cd24a748da006c0a6a4
SHA256eee9d0b19cf2538d5e93b096d12c2cbf52e1e93297d38a9e73cf323e0a6eb2ee
SHA512ee12fa737348b3902eee265993b01aa813abe02ce78a9dc028798bd2009e7ff53bbf3c979bf14b12fcdfe8b0e03ed5411aa3dbdb523b6faf3e2bd758dfd8e57b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b