Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
bff171d10fe1f2bce03612e04e33a1b1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bff171d10fe1f2bce03612e04e33a1b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bff171d10fe1f2bce03612e04e33a1b1_JaffaCakes118.html
-
Size
9KB
-
MD5
bff171d10fe1f2bce03612e04e33a1b1
-
SHA1
216c592b1b7919e4e3c7f8440b62ae4a4ef8da4f
-
SHA256
cc6c5cdbdf0d4c6c82fd6ded9491c493ede1df3f6b39aa11ec263c8d086af65d
-
SHA512
bb768313ad7123b49a15e61e70d1c405127ae607465f2936087e5f2829e807286d2dc68ea5db9063d728e7ddb3750ba39d07e393c1598df43e2f8e6e7c2b71ed
-
SSDEEP
192:aHst3Oefcfdma1CYAcFL397NdcAGRoOQiP8G:3fclma1CQFL397TcAmoOnh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d5e411a4f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CBF6271-6297-11EF-B8DF-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430720586" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000bea6cfb1df47248fa18162772ce09459f4d60731528542a53db61bd472a2bfb8000000000e80000000020000200000001e71a4697fb4bded92ef8f2f165f1182639707d56a15764c7823cef3cdd04a6a20000000edb33a35d6c7400679af38e943892b3cc9e999ce505a22cf39988ffbd7f0132240000000912c1f7e2c20ee950b984cee9feb72cfdd276f9c89bfb3db980d03ca5f3a28389a7b75a7c8385b035ef82018cb90f4b04b1108cd6039b7106718a0e4dea0db33 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 480 1732 iexplore.exe 29 PID 1732 wrote to memory of 480 1732 iexplore.exe 29 PID 1732 wrote to memory of 480 1732 iexplore.exe 29 PID 1732 wrote to memory of 480 1732 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bff171d10fe1f2bce03612e04e33a1b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00fd8348789247e88a89370194b0718
SHA13a2d54931211b0f0e1233f70e753501314200b0e
SHA2562ee3928072429a08a99997e56175c47da67e945a4af612a270fe052134b63e55
SHA512e35e35c1d6ccc9445e9a70f8dbde06a0a0c3faddf71fca8a79f916096525507f7b395d181579d80b5e431cd3495b64f0cb7050c57dd70c4312e68960564aaf25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ac2ae0373a1cae9441ece2d8985630
SHA1b08719a0708bb819a785a7eb47983fdc3e2fdce0
SHA2565feaf1b05c9592421e3a6745db501299afcc257081b88d1fe9163b3bba872f2d
SHA5127592b1b24c2085f51607c655bb1a32502c00fc7ae012f728379daa351a1e35e3219e27570ed7d4e3412247f51886969df9be803e230aa61261353428a9873e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923b52a79d439389e0d605b72dc30071
SHA116fd7ab051a7d4c80f33d68f9965e1eb204a7a57
SHA256d91b5fa43cd9b63ce71f110a98992f512513eac0d461e3cccd7f2d70d490634e
SHA51227853fcb42f97bb15ae68ad3add70622a62aaad1466f6bc976148105407f8b3cfdc48b79db6062b378921c5a14cba245b6d1830e46aa6e666a73e636d59840fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fab4807e80b94c18d26cba2cd686d8b
SHA12a18bef7b5433b853bbcddae5cba8ce52b434295
SHA2564ffb56f2183159e60f789700fa6dbf2f8ce476a96fe56d56af172f27f77054e9
SHA512b75e20583e2c6206770dbe38c81b4fd3fd599a9ec69b71cf2b39b17165e9b2ebbb0f849cabb75a4cd43e2a5916146b155646593240639aea00109a7b93446482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b6e6e3cadc3e264c6b30d73beabae7
SHA1545602107ef66732a725f9bf3bccff40f1c87120
SHA25659bee3393412cc85da79ba004cfd67ff7fa1f4e53d02e83654a4db5459373266
SHA512981a6b10f630fdf4d26360a6d67d931275d5a5758a2c4ca57c134ba6739bf58962b5afbfe97473104a93644232a8a8914aca85b24508be7a06d64eba765c8fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43cc3d0ecd49a9d6fb1a6af7e519888
SHA1ef70b5cd8f9575eb09a547843566f3da93e6bead
SHA25686a25e755ae5d3f683db1f7a58681151be9c43b03abbdb31e4e7eae2a369aba7
SHA512ba9f174a82a9d7f6dca34286c8fef7574864064005347dc1450bca98960291c351b54ce3c832810436d6224ac858fdea12b7fda2ebcfa6bcb17ead64ad629d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0624a1208a3fec195c8723f34b0b81
SHA19b9f7180a530d33ba72a3197dd036d99701b8e12
SHA256b084d630e4e80e86c88a23e4b32cccf6485fe25befe12dba0add8e7090bd70ba
SHA512ab46f5c47eeb74adfcd4bfd020fca24e8f0d6daf53a009faa8043f82fe9da073bf571c06323c83b16803f0cbd0e1da940e9ab82f384462b363df8ff0f77e3184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182b56b8699e16964215acc682bcef05
SHA19cefc7aee7319e06e0dbdec3e618d38ec639ba91
SHA25627deef5c8e2bb2883abfc8d1d13d878553f47ec573bd2757e2f2fb1f5c70bb3d
SHA512d5a549b8e5fd7f066010c28ab5b02dd79f38225bccec46c6d2014cc7be8b67161a3d420720a84e46308674fb83fe2ab8995e92a31a282de5e849d5cf80279cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335abc6f29ad8f0bac19480fa4649e8e
SHA18f49c6ce398ed080c3fc17af414255e059feaf24
SHA25656bc49bf082acb1f139659349223982f704018296dc1157167b56033e30b15ca
SHA5120242885b3eb31345cbaa510d25a48ad56e766c9dc0239b78758edef736eeb8e15cb85b7521d609391282c33555f03e698f7fc9a80b3d8eb5200eb1ad28f3ef8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57486de60fb4bd3d61fed357959ad31db
SHA1c2338b2afa9670fc13de8e478dd8c62cda3b4057
SHA256342699c2463c8de58eabda651dd96e5ee22f32a15acfc2e7a7aedb76d4581c16
SHA512ab8a25a1151143321a03ca41596106ed0c2c4fde9323619fdab46b67071eb0c2a07cf8312990b52812ee701a1a982222b8438dd6d401be156b7d58c145d250f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f83889d46251f57c5c1f2c9cf41c9d
SHA1a3a685bbd143d1914a14c334a588eca0d64e5e02
SHA2569abebbd4bd62f79a398b8faa704ba3191450fd5d7ee45a4583da0cba795d7ef2
SHA512f46f232e14d2623bc1ed59868573460c9b3f1a89cff6108350af2e9fa672bad2e3f95b17cbef64a3cb77ffb2ccdd3511b6bd2728c286584b1a585ac6151f5cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76760407bbed27b4b36bedc8699c168
SHA17948bfb651c78fd45685fb5ffbe9c63bbdea09da
SHA256fb70c0aad87399d809dc0736c80d4b75bcf2a52b193af93f971d559e2f6d41f9
SHA512d9e7cb8fe8f1282136e8216a029ec2e319f17de36a48b143d31586fae127af8eb0bfd25f62cf750828bddf652dfaf6e267b296820486a29181c31b5b532059cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506dc284adaa97c3daa4d53d0864e75a7
SHA13d60db14a9671f9afd45237f7c86026832b2154a
SHA256913d4408b6aecc127ce032bc55f08f0215b73565c4aaee32c4766fb0c7109d30
SHA5128051e7e7ff693b05a730d6e0a93a876499939c67c5ec33c69b333b2ec1fcb96286a995f1ac93487791cbbe79ad67a02e60ea7f2ec64b859f0a46adf7ef5461ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33adeacc7da067095ba7d7d8b1bdaa1
SHA100bc40f6b1a5400582a87906f30fdb4f4757f562
SHA25628c21f4654e4c3e9ff19672fcd8c7c3869f84c6c53d1244f0ee782aa3bbc0114
SHA512c9f4c01bbb98d572c4ad2ed172d8fbc6ae727475c278b80dcdb922084fd75bd4f76ad5cbe7965dd018a1c6ca104eb158cd9cb29b01660d2447f4e8bae2c9715e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a839215f355bd68de87bfc9f945395
SHA12e54e66fe9e0fdea970c746b968b662094750a6b
SHA256c630d6773da22dcf2c5f7640c74043f3bd9e89df2b01eb82738d613c9f1685d9
SHA512d044dcd5297468228a91faa3f999546936877a06d154c4fa94eb315102bb200fbd1e9c634cd499aa28ebb5e7c8030a1023af886435c50ab29d25972f84dab12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0cc5945efc778aa1ee314bab0974579
SHA19484f18bea363077162e14d96a70ef161e09336b
SHA256278068bfe5724e9e5beba26774f169ce1cef8dcc896c8499f12b70eef8c5a5cc
SHA5124266b0370856d00f73017bd809df12bb25b8164a771520c0745453edc6f9ce81b24aa78bf5b88ba112377ed89bcee9572fdac556c9e2c2c178b812d4d9dc3a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628212dad904d83aa5268c07a67f7e2b
SHA11c1ada70030ef15f8975bcd8035ab08bda548d71
SHA256a5af1d580112910f8add7ebfb40a06e20ee7f5e179ac16db87c0493b3c5053e7
SHA512f9e731991254b9be46322ebcde7f0681b603e09bf329eb60529cac69abd2e8b5368aad67a2c105c4248588be9afad0db8dec1bde5be56f7b85f7c0d69415756f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56895988745a64a58407e6476d375097d
SHA10534390d30abc35176a31427e6ba9110db9b4976
SHA256b0f601ebeda90268cd8e47d248d35e6e1dad7ac1c1a0e021690fc64a69ddefda
SHA5127678d440d7ef25c6edf635cff37cae3cd013061482e577c1c2eb389570bec18d189d317870e639bf1f79f165acc50ba737c746c0ec06a004d0aeae14efe1ebec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788f58d751bd639b36c75f516f91fe0f
SHA1c89f84ab251457961775fb40059fbeaa0e3619c9
SHA256b2cf8e4478fea9fc4abdb0e5ba2ee1010d5f19e9be6c26e21203f18f5725bc9c
SHA5123e6a0ef64546e8f90f3c3e3c299bcbce91c200cfab8d58dff8e4d4a8b93bddb311abe9c5556840d4e89d8d8b893f696d5f7aaa368868c4e8f3700a5d0293ed50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940f82cc4ca72f1e1015016af6a866db
SHA171f27f33f6cda012e20235b400da176b45cc9afc
SHA256860a097b995fe676921e9d361e64c11875060ad5ac3352ae74fd59b7cb62c700
SHA51274f99d5f5b6d08971a055f1fe79b0c2eb9c479f91b8583008d1e426a3ed16012bb13ae836c43b8118e6b19d52423b800428fd777aca170800b336352dea5665a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512dbb6e07616b5efb44147c2287d5f15
SHA1cca3f39daf417e65b34bd8f35e866fc43f1cf7b3
SHA256f24174bfea6fdd90a16b5fa417d936fa665ba27d04152109c4b2cde859a336b8
SHA5124d205b618e75c7bf91cc8050fd7c34e53864eaf0a5157fb4b01c40e822fc44127f1e983495d9e1556ab05816213a46d20277931123b237cd304cadce59b6298f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b