Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
be5791aa406e4d35a3ece4904b5fc06b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be5791aa406e4d35a3ece4904b5fc06b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be5791aa406e4d35a3ece4904b5fc06b_JaffaCakes118.html
-
Size
139KB
-
MD5
be5791aa406e4d35a3ece4904b5fc06b
-
SHA1
3561e93542e604ef27f906aef0e0751508b64432
-
SHA256
80bde2cd0674c5000703d791f6e5713e6a33a73cc412e52795df0c0c9ca454c0
-
SHA512
28d6a8969978d4678894167d6580b4740a1d3a451d8b5ff12548b17234494a4aae118e5d575c3c1dbb06438ea46dc1172d41958133f0731536a68fe287cd4a5b
-
SSDEEP
1536:SG1Nk2Ci1qAslwyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SG17qAHyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AA95EC1-61FE-11EF-84F4-428107983482} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430654895" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3073ed630bf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000746bd83ac69acf53841c0eea1ad5ed07e7d3384c5f48ba4785d3a5f80ce1a5b9000000000e8000000002000020000000ec4a2aad65d6a4cb59e4e37681a5dc94e4e161211206a16bc142c6bb8c099554200000005233fca528e17011aaf732038e2f860de65aeaea627e0eec44a7c0c997095dd540000000b4ac147c75e1da042310ff51ea66057b061a6fc621f8f0cddbf3bc2e59c99f430d1c9b8c0bddb7f511c183958e1f61e5b774833b80027d0102c300c30650f90a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3052 2356 iexplore.exe 30 PID 2356 wrote to memory of 3052 2356 iexplore.exe 30 PID 2356 wrote to memory of 3052 2356 iexplore.exe 30 PID 2356 wrote to memory of 3052 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be5791aa406e4d35a3ece4904b5fc06b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563890c192351f60c3fd126584df1bf91
SHA19e0d6ba4bdd03a8bc49dea6fb96e19f29f26a5b9
SHA25666874448bfef16b713f11767dbcb84bbca0ab78a5fa579fc9afdd275bbc4e2e6
SHA512054ef18a770f796fca97994eca9347ed8435a36db2b39c1e37c475b1e8498ef914d9d6a9aaca916d53382731b2b83ac9940d656157eb48e671cf17e3a07ceecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5200dd2c403d78a3a014ab301268ad8
SHA1fe86122f957c2f6d81169bfef363a2efb4a7a5c9
SHA25613b7c553e0c19ab9b67cc5149470d00ec4e91c5505d96b5f16dbca4741150790
SHA512486b117b410cdc5e6dfb177b530686c67082077478e0487157bfeb6a81329ba7373442f4d0bee4532f1f23999a02b2a6c2bee4a6b88121cb4b0b8fc91a7796c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc6f07fd046986a9ae8084c9b3f00a5
SHA1a0859613afa54b430fa9b0fad33ccc2ff9fe2bab
SHA256558eb8111ed2b4f94f5c0840e319e241b1fd2d4620c2438f3b4299407e6f34c0
SHA512c47dac7767b33886731ea1704bb71e1793b9f545e752f4726d1f200878a6bed9686b439596c69c5f4d603d2c379305c203baceea0dfe9f9aedc4f821fecd65d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e431d143943deb42a54e8caa38366527
SHA1d6c8d9a81dab55caa95e672fb1a9191f9651793d
SHA256b55c242b9c5a5e740539857081c3cab7a1db0ab8f5adc13fec73a03d0f5e79ba
SHA512d4f2040ad52df77bee10dc9ef23a772895da54c687d4e5ac55dade7b9b9e266267cb46ddd12616dbd2d2c1a22f7798a46fee17650e97b5ce24539a752f66d66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04a9f8aaf2f829ad3bfaabf726fde16
SHA1951505579e1a9d345d0e1e1043bdc16a953d6ce8
SHA25624affdd0ec954eb2c0b201ddae1da63fd19b1c12de776910f48d52b066a422c9
SHA5123a32b216f2baa8ede2a13f8f25a33e67d57664cd39b8c5d3134d050fe1b89569511feea283852f25bb1d0d85ac31460a0c825e8ca5eefbf17513b9162bb8b397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca10f2ed4dba76853f399e4fdec104e
SHA1092070d2d1e1e7301c5b86e7a2e697154656aeb4
SHA256c0f5e949b1cdad80e518263a8338f063c13c2bf448b254b26df42eac281c09f4
SHA5122c8ef04fad9d4dd58804530bf6ee112ffbb088780dbcdeff4bc6fdab283256b6beb08b730ab3a9542fdb92444b4913cb584f4411e115ee730309e6750d16559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc67efb2d476b7480c947e7cadf9c475
SHA1847e4c54058f6f73400f82f1d59c02a0695a8954
SHA25692d18a35defcdb8d9c76d679bf67cd3b9b1a80360fba7543bbfae64e6c41a7db
SHA5124861cc720e115a26a6f49f98f7162dde1f79bb18d4b9e5e5fdf19229ed394d3de54ea9590837b9b2eb015bb3c08ed9d824268471bf9fb131f53aab6f9adb03ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57674441063ae548669128529d3df64b1
SHA11a7f97e654ce886dbaeb7d9e696fd29cdd422776
SHA256ead1bccb305c6224f0a47feba109fb147e7ff50d0ed7565fcd8961f3de3d3350
SHA512edd7d890db0a97210f29b5c55b850939527e2331de23830415255ee3a7274aef2c2f427ae91910e483cb91ad2bc7140ffd4f7e8301af8defb9787da0d5466926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e35f505f8c9e6015485e2a50fcb6526
SHA11f914b347125bd11856326be4d538ccffd922c5e
SHA25650a9810fbf2fe0d2b7d8560b315c6a77b173e531755066c8fcd07cb185803758
SHA5127941db4dac588e5c8decca6a527ac8c7d2e3957059e3d00d9c0f203914cb3e182f76cde7a4de33dbdc9ae3961b3ab90615fdd316a5be73f1ec912b82defb39ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ade83628b6aebc88cb9abde820b4fe4
SHA1d897300f3388f0584411861b0ea07bee4d1eb92d
SHA256ca811fd86408bf99723421d4790c704d2c620b8c129c194bf69cb7996256249a
SHA512ef288081d42b6e6961dcc8f0421b2acdb0389f8103f845c46560f58c6528f686f4f539f29df41da3972d231f7c18df5e414032a9c0f6c713210b8c70c2f86815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fae78e4f4fcf24965e2dafe7cdf6402
SHA1a5f5fe66d055fd73c8f2e23d00ef8a7b9e5ddb5d
SHA256bf663bd0fc52d6a6ce6116f141e9fa1a5598b1a6a136fca185bc4de50b4288d5
SHA512e82d11894b17ed293292d2b6e7ceadc471b08371a273209465aa6fe181db737775601ed6cd3eec34206591353c6817741f61437ae5f70257ba56c13e2f660bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c0d9c300dd61b81b6576ad58c581ec
SHA18cd19d4672bc1043401211513af4cfa7c061aaa2
SHA256014288c0b1eab1cf888912cafe8489a465d300c30e891f48da3ca197c06b380c
SHA51273c3f9fa103add67c8a594b33bdab8ab241acbcbc12ab38d6dcde318d01c50e7b4350d4aab9fbb9a01dd17b17f97a19590b353b7131887c6ba7c878b86ef5888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1f0e09579544d61c3f4f79f7f44453
SHA14a3a56aec8797c480a01c0aee95a3a7a781dd3ae
SHA256d37070112de392997971eb6f79b88e29febe5dfb3a75ac84847f5b31ce4eb823
SHA512bed56da95ecb8f13fba02155fc81ab4c86c1cbc811fc124286f9dc04e1297dd0438aab2fa02530f34bbf96743e0b28a86c602f587b007c8d8949598c1fc00f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341738f562794e8834a78946da34d56a
SHA12ea00bbcb8e32841a9b20398c36586646ccc719b
SHA2565726e648c0dc5a108a8fcd18b7db7d55ba32c5a820c62f85f82bb3758e9763c0
SHA512c4a24133d12343dbe3495acddf69f847ec91a5f2e54ec9d01f7d074ed400ccbe4c94425c38d72b877b42a9449dda950a63f032f235bbfaaf185336ca2dccc963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571efb9f5c4825a5bb53857eacb8e7b2a
SHA1526702daef0ad8aeb8ed1a85f736fc9622def2d5
SHA2563ead7092787bcd3c9b81ae318190636112e6c9d23d22792c674e92fdee892b42
SHA512a604473b6d4a3323cb95e7e112e0bb50a46d683a8c96cd5be88df5e29c1953d1fa9382ee647e2434904836e0ab9999ace866306a288c073589c16b50024410b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55533050c665327e689fc46a879a9c9eb
SHA10c4aa71526863d8389d04e5412cfb567d5cdf99c
SHA2560e8582804c2bc189d64e760b835eb7fbe05022e309798e123e99d2fc8694a0e2
SHA512f005f8522b8f682d60707b9458e0aea4f5b515ef93bcef08f54d4d7b6f4be583aad8514d2b057e33554e0dac13b5e2c88dfc2eaf1d56f8baf0b3db151c312307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef6fbba530d42380696fc6449fe24ff
SHA1ada68bf99a9e57402622f6cf0c82c603c2f0e487
SHA2567043ed9e4ed53ae5c754e98358d7fe284bc6b64861b86a9bb61d7a467e2fc084
SHA5127146c4a718909dd293c5d2c836bce143b607f228d929dbbcbb82da517461b25e1fb08e923c670616983c7bc0c086538b32bd2cf70f5a5720dd46c5cc71275cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b317574451e0c71036aa1b9465d7cff
SHA120a840d0a6f81902715479e8784159118a87562c
SHA256d1c5f1ab823b9a0583040bd01332e1c20f0a24314b547b2da8a3eef65061e6a8
SHA5128fc3107cba9dc2c78dc8bd62c869c690c36c5c8789484905928393afea2f7ebea9ad21689dc6f0efd1e844cc70d5bbafde833b7d6beb83ccf3fe3718788dfbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad5440293d0ecc91c73e5b29bb86723
SHA10879d948d618cda3e1b5bdd93100fa6f4e71c2e4
SHA256d301bc3eb1614d8f997c41e387f03cd3e5a7b0e8be9542fae1a7410d18befbcd
SHA5129ff03a19876e76bd4c0b709e2e458578eb750e99b215f51bc8e2b760da5fbaa649b1e84a9c8e07f21a569dcc0e3bfb717c102a9655ec4d1c6ca4ef902b844d62
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b