Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
c0f10a27a4fa0dc40a3ae0344a15b5f1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0f10a27a4fa0dc40a3ae0344a15b5f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0f10a27a4fa0dc40a3ae0344a15b5f1_JaffaCakes118.html
-
Size
6KB
-
MD5
c0f10a27a4fa0dc40a3ae0344a15b5f1
-
SHA1
0cca853032deb7d53924eb22c351b79fe4135366
-
SHA256
6e8c98ae4e3c8f8b2f670264ad7a09c2289d9e2b20987788212396ede4755726
-
SHA512
415206a4dc2c73c5b8fb2fe1e922b79c2d0b3b9fde3ca5f8f93aefc18369a3541e9c2d5a04a067d9092d75a81c3cb426c359ab4e865efdc8ffdd8ee14a3522ec
-
SSDEEP
96:uzVs+ux7RzLLY1k9o84d12ef7CSTUBZcEZ7ru7f:csz7RzAYS/8b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430758169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEB27E51-62EE-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c744de810e7b242f1fe601ea0f9adc6558aacd83d2ba57a537b38731fb7efcb0000000000e8000000002000020000000a55c790b28a07a6c26f99327482245f5fc9c22f96a809767df6be9c22db64656200000004ca6dafa3f74b6d40656eeb25817a003624453b89f91d7e816e3b0ae273e57d0400000002a88a9db675df9cf1e09bbf61c4ea8ef336316564fe128abbe168260c763f6374a3d4f5b24cd63f933c3dc7efa874300b9fa4aba72318647d6f56c1a279e257b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c3b993fbf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000049ee088e6701f64d55aee67f40680d290d533e79aebbaf4f996243eb066c0f28000000000e80000000020000200000003e31e80224f31c671b3d09029298ef3af079de444c9f13228034d0eaee4693d190000000c4bd500e458a63c2c842a3f2e78b4195654c4450f35f88b72b29a565ee87595d32e98f05069fa72bed42af904742add0bfdece2d726a4ed2aa4b1d91390ae85b451b7aeef42fcf37f590ce9be5e9c4690ec96d21866e2eb955d2a644605b906e32a31720688cd2236808e9a4bbb5bb7bda9614429efa0e70f09028e28666d781e9bb815773f77de75c729e644fd598b940000000ddfc8eac116bc41640c3d9778de8bc08ba0ea328e6c72e52923700d97eb8643ab64c9c93a16ecfaccbd3140d67a6642e4f5fc8ddee4a1754e70999090920c3dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0f10a27a4fa0dc40a3ae0344a15b5f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570f201724e3ca22dd31ff00f5a795d3
SHA115d07b249a0f89486d5c40a43385ab49217d8b0b
SHA2567600b59fc663da9f31e2de863f27fc6a365520bfd610ed80d76d0f67316ea78a
SHA512d5c337875edbf70d51d2c516caee81bc809c84b5da6916bc339f4237ed965c5678f8e65c6b81a5d0ccf31ee3d297cfa101836480f202d063fa855a0378d2b1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb710aba28c1a94afd55b15716cb836e
SHA157b757a39b827f9e8143c5b30bfcaa19e934e0a6
SHA256ab2aab3b4d9da0b2488f9f35d2f2a5ba48a530bf3ddc0a977503f014bcab1afd
SHA51222070d092a49975a3228291dd2b49439fbdbefb980fa78b34cf34ab7be0587c63e9f0cec748bfc77f0f1b17e5b9ad32ea75e09572bd214f177f745cfd0de4f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51fc26ba6ae7a1d0d078d836970c352
SHA1a4251938ce0d663a4366f3ebc97ffc557244e520
SHA256bf1e39e97dbc7a099af1ed216c43859a1ba2172e4f7deffa8c59ca971ea75280
SHA5126ab4dd7df2d496e5bbf22a6d100041915262147628521b550f4def59752be1c00016c5518c6934c9d030589657c83145c74f12891c55692e4de4246267f808b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad126cf26536db5a7c45a47075ff0034
SHA1555dff89d4695a4de3cf11aa04f607fd98e4421d
SHA2565908ec8894ef233fb483372c72ea1c7c1e9503e7357203adf5ac51f07f3848d6
SHA5120cb17eab72bf449ddbaa5756fe42db16fe8c9bbc84bf993a8cd0cae40ba66860d9dffbbea03193f80a76ca387a7d504cfb0cab2bcf7546c8dcfc094fe9a3aae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a7cb6aaba6dbfa93f184ba1f729b7f
SHA1cd316231e847769d6427cccc5f74f53357a62040
SHA2565a9d2366d70753e49bd6962c96343682e7fa880ccbb89c718898179ad88c093f
SHA51273ace8529d7801da176dfc9b747276c999cde8139c94b51efa829532f5a8d9afd4a37a3a2123f0aaf4dddbeac98d89d1bbe07bed517fdd302873f14334581d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d310096e4f13d2a01e34a3e2b58cee88
SHA1e249d1dc4e042fb9469a8ec444cf20de007c7c94
SHA25673bcb9717ed71c07f096191ed86c6d7b8147c3ff17b23c9d56b4e78abd3f776c
SHA512208361583c60b248e28b3a4b84a1dcf476be341a1ac1f5cbfd4505d720e18731062dc74ca3d94ac50276704ba6daa416b3fc3616568e05c0b687a697b4a91075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984e8b1d801be76b6cd7d776a354f1ee
SHA1481b3c9c4012141dd833c260b62b7c87e7d7b5b0
SHA25621472890c0b357ce57ccd31c2cff4665b0c7824c576b6c1d98da05715cbae554
SHA512aca985f33c384a1d3f4a05c9cb58c80e7b8d0be63a8fdc77b828a7a09a34af3c2039b2661eede70c7f2242057f508a45bd48feab85dfad9911276491bfa46965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8700b9f39d0c504151554c6c28e28c7
SHA169ffa0a4905d574079c357e9eb8d86e933b095bf
SHA256307a191909224ae4db71c5c0724e6d5e4d05f4e7953d361e081ca92257fec6c1
SHA5128cffe31cd17352ae405ddc743f216b5b0723e4abbb7bc8282431c33b4528a9cb820a23ac2dadc7092f53f9e63f91e2d6a05bc3f30d6ee8e634f4165ccae2dc9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafcccfd214e6f08e6598359d5f952db
SHA1f989bc78fb5fb094c4c0a7669308c3059390359d
SHA25673c8e8c09455dd8e246b55954a41014e5490370f517d0072a7378b0ee478bd67
SHA512a129aa0eb308ecb06958739aa0fea1e9faa05dd935a1529bc8aab64da08f8408ecff7b551428978c56ddae2994b9bdfdb450405e2af19e4c2a038ef779bb2308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41a9a2364420e0db63e9aa131ac89a0
SHA110e782adb19d2992cceb5447e1a8f3e678126a0f
SHA2569f95cdb7dd62bf21eb9b4d33c786417518b2a4ac57e62cec7bde86783450c1a5
SHA5127ac697c75cbddb4d647d1dbbebb9a4d270f60cda58a7858cc1095af460f40a89a1b4fee717704ebb466c7e18ac5fb88a22a5d4d4b7724c44d8f3bdcc4fb80cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7394d892089d74badb18508907e7a3
SHA1806225b6930abb89dfe5c9450db5580789e825f8
SHA2563dd5d2381031933554517df82ddbffdf95e766094293d022c8437af8db0b35ae
SHA5128657e497207679b56e6e4724ebd9ba5d57c3fe979cca31ea5c21d5eeafb9772816d5eec4aadf778b8784558e6a7749c486edb0b29e4c444de1e0d4d8a0c9b8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94e09881ea0e210d24660a90488e467
SHA1fb6463a562cd23f9a25d8c97602500ebd75fd56b
SHA25666cd24f4b93aa59d828dfa5f245b395a0c853aca99fb9261de31158357632518
SHA5122faac42ee58a8ce37602dac1c099bfe18be296f1155b0c5fb04f73b1e4b46677da102e9956e5c24acd13f1eccbbdacf0f40c91d55cf5a11621bfecc67a8de570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbdb65ca8b18a9b27efe7e2d7b7e6c0c
SHA14c9344ae19ae56a7c72d812223ba5e096faa3795
SHA256f8dc93ce27bab484d1b7f3bedb6c153e83926b35f9e809e9acccb1fe723d0a5a
SHA512064ee7d31e1175a86c1db6ea9c1834d1c8fe83a03862de9dac78dc82edf22f641fdcbb77bac426ad3073b792f24879c82d9b55d0ccf27767d7433124b2301cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0e99d3d18250c9144cc5815ce86a81
SHA1eeeb4f9b6b5f2a1fae8bfbcb6f145d77b28c66a0
SHA2568706d5adc9bdcc1c5cef0267770960724e3df9eb0dc9892b57caf71382f4f65f
SHA512e71691a932cb4d6469432fab499e9601cc630faa9024ff8b51ecec10d7dc16ca8ce329bd77a542649a809c81a9cca2fa2a424301fc8993523a7fbc94c5ac8663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573661aa0c11c7348fde4a8f5a099d5c7
SHA1beaf52d851c9d9ce196b8a87bff1b850b081d7a2
SHA2566d100fa6e572be4615f98e0080fc80b3e1a200c62083cb33dd0dc846ba525611
SHA512906305860399f6e6466f70009bd0288dde0e9cba0f84d6ff3245a32a4263de2ab9cb12c448c6e6d4bd768565d451a95df056560356899032ef934ac03018c93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8cb54266f8f62a44722f7251fa707e
SHA10cc3d0a69d3ef19fd8e845e4c15dc6412e9c9cd2
SHA25635e9b530ea5516fdfab32c88743ece5299784b6b640c8ec79bd8dc1d5714792c
SHA51209bc784c08f90e5a368b30facd9da5e56a87ba2170ed0c2448b96808fba030c872a153a62fb75c7a1f55a5c7bb6869dd06b721038644967f8d6e0fb00448552f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3a2e25aff89d151e8bb8edd7c57130
SHA1d461212ff3f8fb4521dda43f8121f8aaf1cc886f
SHA25642df94e129ec6cdbfc0da8d9b6cb92e94a851dc945bc232fc6472621fee90536
SHA5127ac89d8fc2840ce778b03b07ff76eb0ded782d6be67e92edc65833b3bd4bde4fb45536b3313ad3b3d5fce2717c2cedc8abefb5cc2923abad9dec5b5a4e0b79ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760c3c0c1da65a7023a30cd000b2f63b
SHA1e41cf5a3617e69570f5455e29b865b22131b214f
SHA256d9f846a5bf25cfe6daa34e2f357d4efc37a9cf469f95bce8509f8c0bfa8ea9e6
SHA5127530a697912b82a6c4caf75b8ab996763e46c045106714bd077b09bdaa4ea1d55893bc0a95100c19046c0aaceaa647ae730bd4808f56886672b4c31ff6156f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771acc8da5163d167235f23c6ade04cc
SHA12ff0fc08a7080eb94f44c10249584cbd172de867
SHA2569e3b208f6b8f1ba22cbe31a7ed0cd241e87a21316617824b5fb7e9ecb8d8e765
SHA51292aadc1dc15c48967dd261f59dfab44b93303596e83f9fa7844d56a7f1e45cbc6e5e1f426242d162d8f3b92f30f8956b0b1135210cd43715f76ae6e3389ea597
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b