Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
da561be40db2d9e2872da6add467230e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da561be40db2d9e2872da6add467230e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da561be40db2d9e2872da6add467230e_JaffaCakes118.html
-
Size
22KB
-
MD5
da561be40db2d9e2872da6add467230e
-
SHA1
b295e077c5d4c242eb710e9455a02a45dcc409c3
-
SHA256
4f7e726c70a49c6de6c9f79fdecda90a7a056dcc0b06970d77746ea0cb027b44
-
SHA512
e60a0d22a4c3e42a8c584682a72de9e85779c087cb7926370ad7221f4f2caea8582a0c0277db116adab390d9be4f5842fca57634c4f9dbb57a90e34692928ecd
-
SSDEEP
192:uWfZb5nnqnQjxn5Q/DnQieiNnInQOkEntFlnQTbndnQ4CnQtAwMBCqnYnQ7tn5nu:7Q/Y1A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003897d20c84d0d56b11fcfb2ba3ca5321cd06a7300de6cd695c87b55b4b273db5000000000e800000000200002000000066a2a9f637c9cbed7aa71281d794fa126831d10fa4518b46ed57feb6ca04540c200000004b33478bca37ff97857c3997be5756c1410534069e5de757f62dd7f51e42dc8e400000003fb3790f2c6d7ce1a7a3f1cf8ae78a250b94b02a4f00bfa6bfd87a73428529fa2aa8f2dc365e2445e5554f9370428685c4af410286bc1388c0b602607d4c82fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c44d014504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000002d751507dd9631a57bc939496662fe57a134d1a3586423b2d49fb0c66cff73be000000000e800000000200002000000093f432010d621c512639c1827c5d70e39a2a54da720ae0db609166f16382d07990000000c654c5e92ae8a9a38139b623acfd20550618e06799c38e802362af491a7a3d47958b9fd3caa73686fee389db82dc4923ab7fb52333594752558df85b2c90f58aabc84b5ee9a0f656d2fe9daa3d42bf9ed73ddea28c1aee45768e5e6d1e0064b4362754dc43572d656c2560ef5b6d4e466ab44dd313dcc76b739e58d3be1e5d15a77e91e70215b193291c4279b270f22840000000d9475606223165dc1b3097aec66145005c32bd16dd5a0f489936d426ca86ee981d9c1fd5087002afa7758f8b8ae8d6f3a1252db3a840934ddfc623fb8d3fa6bd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432219073" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BF47031-7038-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2828 2684 iexplore.exe 30 PID 2684 wrote to memory of 2828 2684 iexplore.exe 30 PID 2684 wrote to memory of 2828 2684 iexplore.exe 30 PID 2684 wrote to memory of 2828 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da561be40db2d9e2872da6add467230e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd243a666eb52b61e2e37f08b397a0cf
SHA1878b1efb6cca1943f5d05e14b8f1777f450dba31
SHA256882d64251328ea353bea9d80bc322bd921202d2150efa504f5663f68c2226198
SHA512f305808d5b30b4ed310765cd912f8a596aaf4010170a74b1a849dae0d04086aa9e77c3665e4c5f77c78f1572a304783011198cf68393a185e824ef0571e9df1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1986bebc20b66703bf21d59dc47d20
SHA1c738ca1826cd370666847ecc35e23a90034dc486
SHA256703cc3502e535f7153d173e8c96bb6307ea182f0aead094593f6913468f569b1
SHA512b2cae474102f3ff22338a01bb709bd479d68bc25b161944b521938e5722b29cf3c3315173cb63227692fdfc2e9adfd046cba39ad387bbf6f2fa967fdd24a850d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a77782773dfd5620f72ad5e3b9dd2b
SHA16a19c83c34611e138e6888939a67efdec2592066
SHA256c421b9c325e439d4265d9aeee3f371f5d86d6f754ca8677cec7fc4f086ba4c81
SHA512455f819ad531003d63ccf3ad5683a6c6806e5e99da0cbd2844f3230b4fa72dfc8efdc05189e39d6220834d5af1a985ebc3ee07f60b0dc1cc21a472a0ec59e40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59639fe116b443ddf905b2a7c1efbe7e4
SHA1ae1fbaca8afaa7b44fbe2f4c3390bfe6533ae8ec
SHA256738ac0b6f21bef215a10c4d923081a512f25b351dc498dbd3d3af33e5f62834b
SHA512a8194b98842b2c619deba7f8e645938e58737232be5fc358e25b46793ad8d81de9238d9ff67ae209ebfe72d879951bff5294b6226691b3d5b0b546f031c141e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5433891b7c015a187677bdd6c7ca86
SHA14e80dcc0a8a5072f29d3154a0fc1eb6aaa86d068
SHA2568e2580dbcc6540ce3f0cff0f15af2c8dd8dff98e1f5d6beb2f328891f9fdd581
SHA51276707c555266ca68d6dfba99f1db0a1cbf747aee03022590f3bb97b26a7c5a918955abc874edefc222c5c9a53099ed46914a751c456e4988d7cd591604eed8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505dbf1dbc9772db69adf3016336fa668
SHA1a54e1d5895e74b4698d6b190ab56ff4e88578ada
SHA2564d2a22394e0ddb4823482cb1bd09276a0015cbe1cf9dc7da7e1817785166dc87
SHA5128d5fbdd3ac48b5fe2419c7f884f5b23d5561666a74e85a7261520ca7eb8c9242a60f8d55be42cdec5820be934d8b2774440150bb3f1d63185d997595814411b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b85d4d57e4079206b91778598ac849
SHA102fc69d1aec7fd04fbd0b05b3b127d16e5a07031
SHA25675f5a6545b2d613854a7c40d8983a7dcfa1378748927782e09bcfa29c13d72d5
SHA51231668840bb159c0d09d1656326bf3e3c752e3f8e6d4e6210b3096f05f06918f9df43281051210fc4a8522b59d4431ae4516821da69363d5573245562f96b2cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236f44461667fccc66395121021ad5ca
SHA1a8c13b9f6c55f48c54145d69e7a8d369b0f42bff
SHA25657c73b38136304fe8c56fec9b8ebd8d5442d2a0689e3bec179889a1a32de0f43
SHA512f237aa2b538dd8aedd58895a0fa2dcb9aed5a4828dc7622b928f227457b2d7628d7f4ccc308bb919aefe2ef5594bb04b17527ff9ace944499da4cd8064014bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f10b9157811aee78e3297c9173091d6
SHA1bc6ce8c198199841ca15863ccd3c01e7f718a52e
SHA2561772350377efb50c0f2cc6e329c4e2b1540bd7254b04dccbf4de7bdf939812f2
SHA512a3ad248503e8aa8e53d405457014ba7a50e68426bd4898a2dadd6706b7190951e803b83f90af5b880745ec8786e9fc412247b09ea77c88108c31346b0618a563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b133f774de459072f6149891cf5c955e
SHA10cf32e0a8e806d680189995b89ec02647aa10b52
SHA256d9faed6487707b61beeb33a41cc9a4f27fab9a27d2b086923869dafe8a5c644f
SHA512eeb8f23877d1eca8ed0e4d0c337bdc248703351fa213ce94c4671d4c00ddbb27fb50aaff39379ba6d5b7da45fdf312aad4269b57f434704724b0f868a2df8656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6566f0043fd711a08b9379528e3d21
SHA1aa0232330ee5ffeaf8391cc440f2b520081720fd
SHA256eaa844280156fe1fcbefbcdb0509839ea68f4d24c37acc0b44bdb78a65d8bf96
SHA51287a3374231d70a7338623049cb24c13ce84518dcf887c9ac365fcbebf0cca96fd44b061d28239cb22c69b975e66357b448f309b213d9c169a5f66c40afc02d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adcaf31a90f9d810d7339f8dc93b254
SHA143d4e33cffe013f787d113dcc0807f77bdb08967
SHA256c6cc91fb2dfa1de854e274ccee277cefef59b1813b0aff795d5cc26ccd4932f9
SHA5125e5950c23dc19ed8a26451835fcb7085f9280cf663ea4b6a24de61d5e3b4adba37dbc1f86afe7b14a66d52387abda038dc4a19408aaeba17f9372e0709d93a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c19fb4fc37f28be7602cb5f82c8e039
SHA1b52cf557e9ac4531700e98d59c6f0d8419822298
SHA2564f67bb4acb130f76ddc26bec6548d86e61b91d27edf2d79140d136b709b9a886
SHA512acb20a3f2b5aeac280b41fa91a9e52681531c4c65431e1f957be1d81d119e31e83aa7cb58e6be7a0af60ae0603a2bfce4c9322a8d42b658a23d23135a910bb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a023649a673a1dd539832616cb3c16f3
SHA11f821e57623bb86e07e1dbda5a7c67e47e9b8f96
SHA2564028e05e3c808e7467c28ff857502a61f6a52e778d21744d8b6217414515b80e
SHA512c732484e7a5e21525f51c3d9ea8d306dc4714b129bf2b09318e1c6246e7f3b2b74669c2a93f1a59c603c64ab5cc4431bfcaaabfe34eb3841949cf23bf472c9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593dda0c4cd579788a19d4ec885012e7b
SHA14318cc8db2799d3ed604944f8b0598b763dfca87
SHA256cec2571c70c8fc0a171a1f4b3df8b02799042c07ab9ea80c4adbba162b88ca96
SHA51244ee45bba5f7cd978a17528e2ec503818edeb5bd454eb56155aad3bcb9d7ac74ac9a3b9b7d22369c6d959ce9b7ca499fbefebd7852e367ee7b628e90752328b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b9c5e7953ef98e1ebe4c71828d5b29
SHA1dc1b6c17b917708bc5551634df523f637eb92b92
SHA256445fd7ee5fb6ad840d1334f1260e30fc847afc9003adfeab7daf269e4fd51771
SHA51252ab06838d6e302fd4b4fbbd908b137d17ae490693ba0897dbc9e7840869e47b2d425584553f6edcd179cb19dcafce0aa4dcd27780d83df4687a8c2f918e4991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b970eaf1b7d6e5173768e86c475ec804
SHA1b04cad18df339352868a1c552e2575d6897ac8de
SHA256cd344fe7730dcfb894080148a45ccff93e1d8002f7e6ecd9339d5095eac85f3d
SHA512e9c97d7714911df3603619f088c91f39f2a0562e83733baa5ef5755f1382f24beb5327e0c03b6249b2039920ca1973b2d26ea569dd19efa976c6bc4e181cf4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ca663adbac12a85890560d76e0c769
SHA152d81da3ecc3e5293d4b72c99af50f4f4664d73a
SHA256abeb5655939d7ee7f3b90cf92288d9e56f05642594f32284ea386f49c17fff2a
SHA5128f2036aca26ffd70c53cafa2a0c8f33b50eda914f946ca6ca1845c018629e04c25e15e770f20965e27fb8f21aba96a63015e8be87daa2e49d60f5e5e43495adf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b