Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
c80d332e78eaecf9bdbfd884a40246a2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c80d332e78eaecf9bdbfd884a40246a2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c80d332e78eaecf9bdbfd884a40246a2_JaffaCakes118.html
-
Size
10KB
-
MD5
c80d332e78eaecf9bdbfd884a40246a2
-
SHA1
a44028a56eecfe15e16f02c57e553155eafa729a
-
SHA256
26789f3451760e1eadbb22df43a80ec20b1a4d02f5a201cc06ce07363849e51a
-
SHA512
b30be5382fcacdea6279e0c59006516b0fb30842bea72070d68463dca4ccd77df5014a5cc51ee698acecacb1af99261ee57c97aeb4937a70d9c78a94cb7f49d0
-
SSDEEP
192:B7dt+QczUF+lCs2ThIijFDKkFJRSIMcBYKdE1sIEmOJeqWVLwCe:kQ2UNminkcI1suC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c081ae0cb9f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431059445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35C87A71-65AC-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000004aeffe7986963334f844b266337ea0f0bc976abc63a87878c04c23f32d817709000000000e800000000200002000000023f16f2408013de955cf5716c8da611722122e060ba2dbe2fb57f7f9f32a8a7c2000000011a3fe8e4d45614fd2d8ec21a7e245acb31e6b5531918f4343dd7f3da15a02d1400000000715fec1d4d272ea237adf6ce93df839f54374026fc3c2f9eb7a24aae03c41c8e1751d1d360eca1dbf0b74cec22c0d4fa9c0305fc197c4894d1c9e47e7e10221 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000006f7287d9c29f8d34b5d95ed3c0ecc2a649b87791f0524743133c45220493b808000000000e8000000002000020000000cd83113e44f8030fff243a49acde1e1defc2b234ad50f68e26fb9489313d177090000000fb652b5f43519efc86fe38479147ad02878b7bdae3a86c2a2a0a39d2fe97622b850d5dee8d9097e9869495da276795f36d805207907782402279c7a83165a1ec1ff5e98f6543c5807762bb58ec8e8dab092fd61601956e7cf3d284ac32149a6d852b71b1f2ffe919a776cec62722241f2223cb3e7c5fa4d347f9ea07faacf3ee292d3f3816cd8f2dbcfd29bfb64a363f4000000045cd10d8d76990359d23c4849894e9450a352c47cccee1213052e81bcde8696fffe4e103cac0b51a33d437b87c9f17d797de76d015ff9768f2d696a5ed503d93 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2460 2104 iexplore.exe 30 PID 2104 wrote to memory of 2460 2104 iexplore.exe 30 PID 2104 wrote to memory of 2460 2104 iexplore.exe 30 PID 2104 wrote to memory of 2460 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c80d332e78eaecf9bdbfd884a40246a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006daee7cb79bc6f7285e71b6597c5d9
SHA14793c6cea2370e0c9e7e814e65d1b571024d50df
SHA256641634ca90c35f6bf5f2a6aa93f3c78aca4632f9e43c0cd56f9309291ce6efd6
SHA51245594a4897da82333119293e5d7f0113b7e493d773b35315b295d7e6c9c70a86e4b3d3db42242b2db691a6a481d858198c57d7ed80b7cd223ba7d381bba35f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9047621da3d263525e14d534608a1ab
SHA1bbddc10cd5269aa65cf1ad85d911128154fea70c
SHA256a3bb2403df3e2cbd29f7bb0011a926b462b38264df1a7c1eb99e03db75e4ee79
SHA512696cd1bf791843792b6465de32bf81bca542da3ec2612d8d8e813f4f5d703aa2d750aff2b7fdd20192f0cb78c5bcabd619c6eaf5322bd41e9cbc1a89a8f136af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cba5269bdcadd3092ff8df3d9b1342c
SHA1ddd7e3ee730227f90cadd33d2bfa5f55132716d8
SHA25671c02c712e5302df976d96c5e47b85dd0cea09fa2995100ec320010cf50e99cd
SHA5121f1231cdd200b297b7256e24ac0ca06a0da99c1457de99eaf4e0a24ea03f65e881ea05bcabdf4f9336709bb4bed8fe28dd62f697e69044106709e1c0fe408435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f0d89b42518b86cc759d9dec840ca4
SHA1841d03ac6fa2323fe9a9ace7c1355b470afe6d5a
SHA256be9403d2e53f3238b9f27f105201dd22e51c8944067975ead7f1b78fcabdd7ee
SHA51286723d2d4dce2bb40c5973f50214625d48c79c872dafa8d3fd946ebd7a07e3623d1d9e473075204644cf4efd86754dca49de6d413d75beb11fd50f992cd615fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced34ec9fb3b3229f264707d556dbc7e
SHA1405a3a0ae7403e669b08beb56086bdb00c89e872
SHA256b180e203dbf1b2bcd4e65109953adc399818327018ef9b41218a3370724f8506
SHA512581cee50f18c52848a35071b69f691f17c378135a410fb54d833509fcabc94531465b186f01d7cd2bbd0ac7370319ee41bb6fcc489fbac46594120bd507a96bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57061904bd19384b03502bb5a960e271d
SHA14269f94a101aa419b75b1fb1fb7c22ed53635fb8
SHA256a06d69dd636b3ca50c435c140d424a1153648d7671d4183ab22a7ae7469698e2
SHA512748e82aaf608d0de53e127019597ef910563727475e3d0af51869f3d6381c3451698265762071fde690b5ede9fe6d2485233eed7dc8a8d3fd4a2eca65a2efd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4cb0b938858d280347b8b48852b8748
SHA1731484a255db30ff942fd3cae79d2ba64a7ada90
SHA256c495641166afa347163b1f36ca9ea5b448fa01f8cc33d36be9829f7597c8a10e
SHA5120f236a7dcaff99d5b1bd9a9f7ccfa3991fd604795617af621465f997501cab82f974473003afbc4f640fd79cb92bbef196e154112e75d825f987bd27ece1b41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cedb66095bab5ee024df2b67bf7008cf
SHA1966b5386d479b173f1f0cc969cb39257aae180be
SHA256a28627579551b76df4493216fe4b9b0d642daa476249479e3c96482b0cea1d7a
SHA51261f8c4d16bfc748e4cb29b83fd278884128b29a8189222370c1dd3bd037951beea1ee1cc32b8817574ab5226372f1c9a760fe2a770ccc193d40367d6712ae3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d990497a3f7766bae6cc46f435e7c9
SHA1b28188ef696ed9aeb166524e3c5792cfcb67387c
SHA256d8b94450910d2f11fbe7fbc771508790c8af186e8e62ef187514bba44ca1e414
SHA512203eb11f1b0bfa869819533765f6e4e138aef4819a5f931e1b53e07af85f7e98fa8bd369d768024e69673493c71bb82f4d2788cedd630ff45fe241ae6e55ddd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7e65c4be3b4ac9ecf1e45f7d2d0c89
SHA19e118e89011b743ab39f1e24f9eca2c0190586cc
SHA256c4427706510f2cf83a3a0a049ea1819727f73a77b60a878e109cb5c8256c3ba9
SHA512303338ec60b0c15ec04e6ac470b70cbce7fabe0524a689e498c05a7395500e8ab72bfb3f3601055959f709a44bcb22963771908c3cd0f6eb3aac7c4a9255f717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d40832e0fecbbbc6b28972e2a2a115dd
SHA1fdbb6d73546946b94b494a23f187a1ad40bd7f51
SHA2568a4ce2880267a614755caf7e237015642d4b1a1b7b60c72f5a81a5d3c4104a38
SHA51236e0d2ec8c7e68f4f75bf29d842daa1b3abb77c750018c2a7fbf4046c9e678df2bf5dc79b02b5e94aa09a13fbe550bc46daeb4f4194d07feb94a2afa5573cbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4e969b61938365f41247c31ffee0d0
SHA1264aba87649a17585176e9ad904c0fd67cfddebf
SHA256d9281e077522614da4088488ccc3acd17032346e4f1056f2c67130d4f9163682
SHA512d188df91ccf8c3fd6d790a0205a167e9d69b0eb9bf2a5049e2d2d8f5490ebf8da5b43d885e66cf0b46fcf17b2dddbe499be9ba73d99e39374e20e86a633e4359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e4e93984fd339469b233f663939ea7
SHA15fcc7290e3958b3ae51b6701d8dccef94188cdb9
SHA25641c098006c8d3a074e1925334dce958e6756ce2149950fca0620bf96f748b5e8
SHA5121bc4cd56b1804de469428ff9bf26f175f14dba10123b3917a47d80a062e39556b240ab673bcfe75b4da0e7ab44a6627ceb64b57722643e36f557502c39fc1e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9bf4a56b457c08c2a1288abdee3641d
SHA1dcb32416c641ab3ef009a9a6a5859d4c4e13bae9
SHA2560016e7bc531c528f9fd82dd0fd2bad7a27a63805d2f853695f198eed4d018d1a
SHA51230bb80fb6dfdfa6ce159611d3fcff1c0798e23eaf7eb05edb80dd791883697c53f80a79dab1e613fb6393988eea38fef33bbd4345d8e9547b7cc9661f62428a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a3f436cd993dc173a3e90a0c77d2c3
SHA1277baac4393fc2662a6525fee50257a21a0bc6ec
SHA25646554232ce6b2d725df239195ce76cfd299125923522f523b4123ede2b855f71
SHA51248ee60ec103765ee79779438f6ef8ac47fcae6bcc6848d37c1a3de9a4ef7253b8aa235e3ed4458afa9ecb9c1c8d61ad4fd1d0934cc65c14c794d32c7beaceef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2db02b30ce37a0dbd37a156e2882922
SHA152720a4175ad0f1f7f9ae905567b228bcc87e333
SHA256facfd4373e22b26442774a8f5d376f965b3712f961dbaad9f379cbc6974d4766
SHA512e295a525ebce6e4cf508607d97a38fa6c7d5f7981c1ea2eb9dbeff68b2b33b0fa28e78de8305dfe4110177525cca8913d3134b7d94464d841bb562d52639d440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57271824a89959afe50e5fa604119f543
SHA1acc2df18fa8ad8930be7fd5fc7dd98da5d833cdf
SHA25697135996b5ab7d7049da6205f60ffc3583678dfd2fde2f4cb24b4a44c3783f9d
SHA512c3bfb3b248b5b4069f11e3c06ffb69262fa687327406f83ffcfc4174906208c99cc28e5bf9b3e226f4e01c6d81281434af655aef8cd9719d2e40590737d6b987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829602dcc0f5876116048be486ef9953
SHA15e48e19abc3a54ce8c21955105796c80d0d2dda2
SHA2562ad6f3a88380dbedb362e3045396d519878d9bf3c07f61bc98de486186a7cb6d
SHA5125a8ce938056bb33c4ad9e175ea41731a88eed87598b4aa4ca1c9fb2777f79b96fd3092c5589c464959a760a8bed680493d4c6022bbbcfc2e426c2ce2ac99ed96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eac734af7d69c01a9b9cc4f8b71ba41
SHA19abcec2589211da5d186bd324f1664d9f6b5ff2f
SHA25601421e171045f7b0faa00082d1d9127e6df6d4e5d122850fd0191b748927b837
SHA5120aa02ad2f9a77e2f83bcb79b98f6822b6cbd5d3c38ee7262ddbc5acce5ddd4a00df6058d490f86465378964ad6a1ebc3d36a207f31aafd2911994c176ef1bf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f417fe04446e47063c078a2153072a7
SHA174d772965a568a68c3e40eb14edf158c70792924
SHA256ea0d45549dc564e1d5bd67b480504c2713321e9a34d4ba90d24ac0d77767b8c6
SHA51238e789b3b7cadc3c18301609b395c21e836410c1fe7559cad4a66e13477bbaf88354e07e8de7451532eadbe3a4004d1462d818abbc362eff153151046475f153
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b