Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
cfd426b1c31bce68c14d089b93fb374b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfd426b1c31bce68c14d089b93fb374b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfd426b1c31bce68c14d089b93fb374b_JaffaCakes118.html
-
Size
213KB
-
MD5
cfd426b1c31bce68c14d089b93fb374b
-
SHA1
1a17f9bc173ebb7030ae16bade47acda74993d09
-
SHA256
45da7d94c8c9fd0ed5a79461ca55932f838da18793b4219c4d4dc1e3790a146c
-
SHA512
7bad5953f85036e06f7360d592eebf2c66d9ad85f225d2676998e2a416d3801a2bfb28790576b6a2520d53e10cda1078fcf83d82bb9d080d9779715368e0b5a7
-
SSDEEP
3072:TrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJF:3z9VxLY7iAVLTBQJlF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1052CA31-6C63-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000001f44ae395bf9a046046ca038c34973dbcd9bbdd77fb6002468a5d0b961f0319e000000000e8000000002000020000000329539e35cc1b6521e481d9a8438be04032b503a594292686f2b57e703479b4d200000001c021471b6c8f4669da1c0cb4ee023b15ae98fcfd98b5e47ac21d3c79c3bf94040000000ab23942d7ac6df1c865ca5bbd34c7b479561359302bc2736dad01574e784350b910d2b208967b34ee1ab7b62e3dfcb6253e6beda00e153780c930e7c23395548 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b5dae46f00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431797689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2064 2696 iexplore.exe 30 PID 2696 wrote to memory of 2064 2696 iexplore.exe 30 PID 2696 wrote to memory of 2064 2696 iexplore.exe 30 PID 2696 wrote to memory of 2064 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfd426b1c31bce68c14d089b93fb374b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34d675d1a804f510e5c066ef6e77903
SHA1ab5fc5d321c78ce26d39b13aacbb33fa0cfc68bc
SHA256a04cde1cde812a0f1472a57f5d680402be2ce06a33cf1f3f9fd10495bdd34ee9
SHA512d81b9621f7d911c08a826edcb9911ee23ae21c76c441a4ab2141f251586a4ca7cf30e73c2cb4843d8dbd9963a25edf2c391caa2816c69109187fff93e98f8114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60846bd8c78744eec4b71535a06b08d
SHA121ceceb2aa45d097fbe40696cfcbd6e5193c6101
SHA2566d416083e9c82d851c6de4e58a6e437b30b57b235c98c0c089fe1af315880c7f
SHA5128f76828f188379e3cdb442689222ddbaa358049664287d5d91b6d85f3e0878c6c01940ddf42b7a4aefcbeff19bafe949c4fc6ad7287530bc8edb5b6a53f30f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090f31ddb7959020c546c76997f45d34
SHA126d9d6ffa6e55ceaacd557c601410cea5eea6ad7
SHA256764f42d49b5aae51a14618d920294b69e1610ef28e1bc9e5327f6684df2b69fd
SHA512ff9006de8509a9b227885219666487b5ce3f7fb3ff1baa92e3bec743b986e1d0b128fef9d0905e8ce00be76a005fc7bcf63f7c1dbd2565d078b1b0ccdb6b893d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225a2ffafaed4b33e129d1ffa606fe6d
SHA1e9b76cf9030404c286e1f177404a3569f1cf6946
SHA256c5810d3a4c92ab9a45881ed9789b8f0a5186fed2fee5cdd0707c92a1e1886261
SHA5126cf76e5204e1161cf3bb12bc621a55570bda3e08f0de7619ddb114fedddbd02cead6b74a06a6f8417a739a0e93bb09e138120d6c8b5f7dc1dfedfd3a206e6776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcce15e0b68cf23486b71094290a2047
SHA13a9625c0a39b51fbee74d54897d6e90773aee179
SHA256dc97660db2cb42c7604b576bccb8aa8ea61575e03318e7d6c5a77989de118e3c
SHA51236c9ce64722ef476de36f79e7e928703a40f70c971ce041ed029c478a13c6be27f0d60fca715ca2072d21f0bc6e2d4108413bc95d4ad57bb968958638df73dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d3b09ac584e0cd00323a085c5e5ba0
SHA1831fc7ecfc7084cf493ae155022e9818476b7aa8
SHA2568566a262fd6535fecec338d2d6623c25797744d07fd39a7ddf4c40ffea90ce1c
SHA5121ff115b44f1b89e7f4010754c5ab7248383a000f0cbde40006c665aadba7f2d0e1b48f7ba1d987b085725279349a9b2ed97290da6d49f883f15f93cb6b3586fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901da87b34e0b27a0ecec3e1344b53f8
SHA1d5e0aed8c56b575d9172e2f8b579f3b088b6ff9f
SHA256aefe9088bfdf48fc4cacf8c37726396ac3fad3d3c3985aa5718c7318da53a012
SHA512469ee412264fc8c9ad92dd2db47971f2c941bc87c66c5efa927e9031a894d9a7d82e4602ff98977fc8f45038de7e00e5a0b34d2096b9356f85c23a89422478f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec7c4c4a182658ddd2d8c2cc116a189
SHA1305cfcde7c343c876ea5ba58c6a8dce9855ffc72
SHA25616664de0462c1e93297e39ff0336ce0a0b75962b1ab2214f2940d9c745424713
SHA5129f7ba9da0110e5d18c7428399d8ad3d4b1cd04b88b563d9d12b6e180c6c47051e03ff3df60a31942a5507cd77b9d5579e49f7a9852bc802f1bd6ec018557a66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e426c0b81dd885bde5a79d5e6a764f7
SHA130e0f36927ecf3a313cc8dbe546d9f9e78f5f28b
SHA2569baa57da991f9ec1a07716e79f2c24e30b0b6fec93a7f0c956e955f2d56faad0
SHA512e3bbb9d2553db82f56f061063cc4bbba307d54acd3c3e0571ac32be9e0bbe62d5bf66a13bc5b688a16c2a05c050ef3e6f296769ddfa00e5127d102beb2addd51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ce8fec0d3aeb18ecb3280ad50f45ff
SHA1641bc64d8e694783f3d8468e1f1f5922ca87a6f6
SHA25643e3f2db9c34ca3bf09ca856bdf582d62f4523ee4a5a1615d9ef3b94138369ee
SHA5123b16abf5dc57b24c110c8e62b2ebaf7b4636d952e5c5d5ffa224ba8414ec40bb4bd71b5b720af3b48db09fb727bbf9cf306b0bf459ab48c42c63c982b19c6e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70aec851d2de4ac75846d57066c5bec
SHA1d3d0325d3bcf99c985f3b936bd17092f5618e9a5
SHA2562cdc7dfb6a3dcc12a3705a27622beca382fce93e6f8f21e6a3140957f9a94920
SHA5127b28d0298840fa942f65d9c7261d2c8250bde58d1c41d97585dd5be1944ed7da27ffe2072b4f230b5e12575503d2dd8536d7facf3dbefd7e940ebe8fdf829f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506928c1c0650510bbba5a93d57e30b73
SHA155d00561d27aff35cd7b74dc18184ebab10a01f7
SHA256a81e3f06c23fc6a4ef4fd427299cd8a491e3c6d36678781cf29bde57e36d078a
SHA5129bb5c471451d212294d6ffa65eff69060c77a269215868664a05d809b7589066bc3202dbcacded38a5e4b331ae94ae7f4fe838bfa2961fdc242f4c5bce0e0978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5ecbd62a854a534226f9212cc7feeb
SHA132e68ad927e9603121d206e5cec8d224c89a8b56
SHA2563fcfd328bf7bdc30008b48bf1e8e570dba832d142c0180119c3a7c50210377b0
SHA51243a47699f413ed095ab6980ff53136b9b95e2432c6a89c8c8756f2b4ebd3f99ab307197a70d629f1c83cbed14d94bbed646294313c0b37f76c12f33d8c6b4123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91df6a428d60108652029527bc5f970
SHA11299748a176978833cf291dacbf2e3f8d7d87fe2
SHA256cd5a0dfc7598bb7642690116a5fe6a3ca34186ccef97290729fbbff2b4e18db0
SHA512521b33d4be5b2a6f44c06d41ea65d0caebe5bedefb24c953e9ce5c04bc215c54289fbc9b93bc3087fdfea26a332c500223edc6b673d498ee1cb91770ca3fe28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc8d58ee8a776281e26735e7bd4e658a
SHA1051527e95a792bd91977798a1025954aa6cdec81
SHA256542cdf3a0492a6f6870d8dea5b45809ae38a844b06cb21b729fba1576f843b1d
SHA51232af490f3afeaeb67e7e5a4d052a07cf8f598f0344466ba0d13764694e435db0c0181b822a4a0325e2b295fb2d73f23327e89332ab33e8aad84acf7cd5b4c7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651f52e80ae0ca02addbf8823ab627dc
SHA139883ceee50049bfa9665dbf9d0b41f124ca19ee
SHA256b9417987fddef98a4bf84c1fcd90f636b528c22290f9e28181ee703060fb5abe
SHA5128e8a54d0a84a7d4f392e3a53ef33b9761333e2d1b290784a746a638bf2fb60e206d6b5cf1e901a65f3372e0575dfe9b097149076f452c60e5fea7e0510d0836c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1872ac50539ac17034cf21ec81b583c
SHA12bdf4beacce78d345af4c7a4750b4c1c87347ac2
SHA256f944c420a9dffb8801d25569140bcf3d11b961e0ad4b1d8b5803a9053c02b7d8
SHA51258b902134c746fe60d5676694709073c35d110988b617010ea5e245c4a35b9a41160a57690b053dddf6302b2823b8378797528d34898a69b3dcd1d774c13ecf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae2b2a5d15d9f16462f67c975ba4a8b
SHA1f86215e948a016840710a7e678474bf0f866d56e
SHA256b8f9785ea6787c47809cc08b70baea2976214d45af18f98bae2dc1014faca29e
SHA512ccfa3416b628c62a5498a24f3c0d3f5a1a1a3bb8b8e132e97c1049af1aa3926461c2ea2b103e1457561326b930da8748812e2d05d9d210a444676e22e836b514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5295cd18dad9e21d01ef54774398c79
SHA129870a165e1cbdf93af732669725b8d25281a6fd
SHA25656eb9490987a02d0e4b58edfc91a5fc3d16c15848aec1f970918e715755fad3a
SHA51297cb89109b46dd7849112b6a0aabe3155185f2680a5feb9b420507be3ec69de3e8fc7b84d81498444f2cbc8ade222bc2c199c7b303dfaf9695b566d0fe35790a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b