Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
d172be8bcfd4a36ed5cabc02de47c5c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d172be8bcfd4a36ed5cabc02de47c5c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d172be8bcfd4a36ed5cabc02de47c5c6_JaffaCakes118.html
-
Size
69KB
-
MD5
d172be8bcfd4a36ed5cabc02de47c5c6
-
SHA1
4d3a37e1af733e04403fb7277fa22e682aa056aa
-
SHA256
b835d9b9e85f0745f83f78dc8ac5e9d6a28bc71c291b0b6b7e2a6e5b1a02184b
-
SHA512
4f386d632fa7e080631064dd845909f6efd9948ac6272072249d805ba583baa97744069b745b6a53b0391c0afe3bb13184235f19430ecbb2db8a52bd0ac56d7c
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6s/6+A2XQ2l0oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J3ijkTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008c7ad14ea1cfad9f7506ef29cc34ec0a2ef3545f99ff9f2d43f69fe5e354ae7d000000000e8000000002000020000000173e261f86eecba1996f7b3d52d2cc72ad5cf17ce901d8ae89ac2518f87c5d70900000004dbbf8df57e7dda9ea1933824869a3abce969fe267b083ff761a0cc14dbd9cf5e5daf89e0e61751a770cbdf41d835b7554c68d78dd01e835ca3fe160d3e1f0f323f2e3fdad80f2688fad176c128573aedd758795924f586a333d0d862adc96f5b619d7ca8cdb6b42b6ca8698753c754ae1be213745e54feb5e70490f71f08ee61793965a332a43340dc1c23c0df52d1940000000beccacd717e531f2b96e8f9c54a22787e492432dc37fef7874d9c3802bfc91e5aca7dd295fee1c122f4a71fa59bc60b5ae3e9f966865e10852c8cc5de4065a95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909d953ffc00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431857966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69611B91-6CEF-11EF-BDBD-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000046e5cf0b7184e6d349f5c351e9ad2b1d216f7532020dccac927247e8c1fbc27d000000000e8000000002000020000000dbe8640ef94cd94a22bcb5ec2bfd8c1f8dc945f4be7f7a6ec85d97842b56537c20000000910ad24719ae9caf52c3dd68916b4aebf17b158a6fe0522d0fc90d6dc679b4a940000000b625664ff52642b0a5da331cd1844ec805c70e5a66170713aa6dbeb76715aebde42f4092d48af32ae78518684fc679379f8dc7c6d81398f81498a8cf9a800242 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2472 2336 iexplore.exe 30 PID 2336 wrote to memory of 2472 2336 iexplore.exe 30 PID 2336 wrote to memory of 2472 2336 iexplore.exe 30 PID 2336 wrote to memory of 2472 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d172be8bcfd4a36ed5cabc02de47c5c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d7e117bb8fcc620f4d515dac2614d0
SHA13da3fc11fce4b4323f00714fa0eb682e3105eb9d
SHA256f65beea0d334b5a5b47bd8bca3f5febbb104b65ae752662afa3812121e01f566
SHA512da96386297cfe2a4ef4067f8a0a06820fa64ae948ed65878ed0fae75976ff64d1fdea7190c195932fb09f8e8482514b71935ae10a916cc64b4de8494760ac695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f023ce3ab00d8899795582e0ee2a47
SHA156f09c488a56699d253fa061b1934ce3642d95db
SHA256828e8b7a4facd66b88b84f3e24e0a34c16628931687c56df3f8b0a4d474eb7f8
SHA51234e20b414ddb818a83c834707b2ae1c586056d84f6ec22a476fd2013e97dca43780ff26338aea17151ac8fdffb69fc3baec04156c80bf04f5d1e9197e8099520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c00c9210c3f7febdb6a51817ad412b
SHA1c08da8bde6417972f193b2bb2bfb3e8c0d0f2b8f
SHA25619ae8e4a6f0bb091498910a3921bc6d3ac63fc8b9e5712cbfba710a694617b3e
SHA51266c705a6a28c2611ea341ec938545291293eca7ad21c9aa1236b4a46f64a6df7c4147552f404c0ad5cce3a7d3d32893da7ab181266c0cec861ade879a99a2129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c5a1d301eb4ca96beaf89d6cc39971
SHA13f0000192c1c6462f3a21a942db95b0caf829c7e
SHA256ffc9fe705c76fc62ca717d978fb0af9d55a459223001a88093099457901d1676
SHA512702e1241fde949866625d325619a2909cbe9251191ed06d74e3f4867d2412d310ddbf77fcf3814c67f5de62746dd5f40aae8a7997fda1741535bcbfeb978c664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5eb140ba2cb1fddff879b9af2324686
SHA1ce2fb478be9ed86ca33527133fe68ec9ae88a07d
SHA2566e10871341a91cbf7c842af6a2a6b12c672a82eaa171e1dabc59000ab53c6f3e
SHA51216eee2ed213822bcc3ff4180415d0c8a494ad1d50a495e5876b1e68a838031495282b0722f8a10fcbff3fe4caac402295804c0fba1d1a2c1ca68868a1821884d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7cf7a7b5f984c4d7ae33e192c1ce2b
SHA10cb7a0720cc2575e0a40d56cfc88608a8b06d1d0
SHA256fd51002b07be3d853ee498dd2d23adc53bd03fd9354ff17e85c93da851f7251a
SHA512226602fe068e5224738cff102ab7f9dbb8c141bd11387f15447836fdb9763c9cc9bcdc048cb37dd8c055c2c5693a4fd4c75ed208e33ba7ab73d60a519bbdfad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672df9c2d12608c742675c8f00abfc42
SHA1374856f17810155a8bca97c5835da7c2bcaa4ca8
SHA256b22edab1948a6afa63133a2424190bbe4f75ac7a81deb7256a5261194467aead
SHA512c8ad3e9c158d7ffa22b48ff6bb9dd7582735bb19a22575e7902da1fddc6d68bf2bdea16e93c65436343d9ffcb597e2d9ebda86af85108cd1b42afab3512f7fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc6b9f0484f52ac65ffb877c7d8195e
SHA193f7fc77c089df12082e2520129d4378fbd5a6f8
SHA25610ef2ccf2313e88938a65be2097f6dbc9ab7cc732e9f6d3acee4974fda9da0cf
SHA51232d5f6eee7ddffc9c51a01b8c70eccbfcb796ee1b38d96272c9456f09fc83a59d247e040adb3d76756b1addabc1e794c3ec6e073cf89acf85f5196844924676b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60ef5c73cf6c973d16abb14361d5a13
SHA1672eaeb3c401271b9fdb0495961472323ac7d31d
SHA25696a43704b7bff39c014b18078463af1ff2b9fd4b39bd5cb55514c711ca27492c
SHA51291562c053df14a6dace64e474a98d3d4e980e7d54f790561acdafa9e85ef09e7234ddf654c4db45bf95a869305bb0afb543e60393ed4d6d7dc7b1f54c616e957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58273e2a994c1410f143e9482d6a52d54
SHA1ddbe4cac6f2f80ee53203ddcfd6894907631843e
SHA256e2d1d488b7be9dd5328b4f35ee8070c71dd0c4778a2de4515f5d6c2c3deae8be
SHA512698effd115a50e15d328fd0241d6605840373536ffa181cde519f6b24ccc221e63b6caca338e19e87e65da7aac6373eae9c83444d1c2dd899c5300855c5c699a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddde4d4265fcf7a0a00c519c1241dc13
SHA10a4f5e2022111e1c4adc482b8613885754d85cf0
SHA25690c16de3281a035976d41fedc8ca63024942c2f0b7f39609fd0565b28eab246b
SHA5127784f136abf21a844243ef6bff617c52972792009eb8ac1d37b905a2235e1576417008e8c98ca462c3eecca8c7cbcd33134cd1f8c530fe3359f0f3a458b1b4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2887ee12a99c624b48f0274879781e
SHA1306fd69417a16387b68c082d42b5f9effb44df98
SHA256371e2edeaa6402812e4316b03f7f47459725ffaa01cf5e8a2eb0135e7abce4f7
SHA512e9c0e1c84c3c02d947042a9abf96af240aaff6ef3b057d1be8f4a52d1cd1a76403ec80fe21fb533550c3c9603cb3e3f3b1029151992779534048580972c06497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07f2377eb466051360142d1fe8c0831
SHA188dcee2fe94f23f4bdae111626b556817f7779b9
SHA2565e0c5ec1520eb2d58523c308d3ff5776a6cde78f6efacc126d97353264eb37ac
SHA512c262205f8e9a51e1167e91092de992da041df186a5cfa0e3e94eca6dad9e33e89752e939a8bbafee7e629174bf6ce586e71222f0948cd24c914d142a75e55a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f4a4706bcdb3cd328ebe62c856dc93
SHA1e825e114323e832534743f85a7c4a14ddce127d7
SHA256d375ae5f2cdbbfeb2af9f7185b566508214940b9165e3c4abe8d8aaaf3946bd5
SHA5127a40392d42af8ce6326dd7d4fc113c2c3c338da04f37a880a8db1cfafd486ca09bd99e41b5682871ac2f76841c339b79f6db7c9c2f0792366c8e1c7a823ace8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2f8b1be7f253e2d0246dc0aa30a250
SHA10bb67667ca68c3b95b896e9581e2669fff323fe6
SHA256145c030f1a2b5f3d2c1a751ed5ce39b7a3322a9153f2c49227706b0097a1964e
SHA51283831c9894d086cb339a4a153d6cafb6cbf8ce8ea75539bd81d8a80b122c4dc6347240772d63daf67177592f270f6774ea42bdb0b780a22bedbb666ef37c3d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56265f9e936a6beee05ecf7d0d8c164a8
SHA199fc16851991012cc047a0208257d5f9758c1e4c
SHA256a877934efb5bbb84b8928a20ed5ecac5cc38fbb0b837e4c07cf978dd4437a664
SHA512f4b3bc69a07ffb2fdff578b3b015dfb8e963f0be654d8c0654f4ed2e40f0a0e1a486d1dbaa38c4d3d90e4fa18c9b4702c9cd59b6a7cfe0c075a8aed5eec0e259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd140e977f0d5792dbc65875c9d91ca8
SHA104796468907236cc733e285705f7d8597a37d112
SHA256fdc5e277ee3b1d499f4765cfa1ba46e5f74e46b035f7db0f5564cd40e161ca3d
SHA512fa1766c656d21f9c50c8d6c14ffb0510f6506242c724230a47f1d78dc6795642baf68c2ca09a248017e8dd611de74c74947d7acb14513ea07cf8d66a12a0e5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d85feb23281b9f7eb11635513e7d9d
SHA17a8da80351ed99f937693b981b9fc0e20b7877a1
SHA25621985f4b2d21f4828ca7d298c9caef21d9d587f73f46835e61cd37e1cab257ef
SHA512e79dde57b79ff5289c8d5f0210c2704f8f99c53454064de3205e210700ef83a210f0bf67f7f24574e54dd98c5971cd0984ab34fc5d1f112d518cb1a2af942577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57817998db7037688e08d1328fe819d33
SHA1ae3945ade1d11b13105c803d2b9e3c0085887d4b
SHA2565998d81dca279a6a8ad2edde5443fe8cf5e1976cfabc3f5fe63ffad09a4fd1f4
SHA51211674411c5854855ea098df07dd62da5f0e385008f7eb0bc2deaad7bbef83005a09a148ae916b9255e65f8f0c0fa7b40877d4a54b304d81f97929242361209c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b