Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
dc101d004583d2d4145202cfdfc9635d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc101d004583d2d4145202cfdfc9635d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc101d004583d2d4145202cfdfc9635d_JaffaCakes118.html
-
Size
34KB
-
MD5
dc101d004583d2d4145202cfdfc9635d
-
SHA1
2d806017874135b5d54cd08edaf916c06713cc97
-
SHA256
4c900f2510cd31a4f10d2df033a95b9e2c2747c61544b34c144ffe858bb68efd
-
SHA512
147c26a79f70ed05a2a843a598cd1a082551f52f217ca785424866f6150ae6d39c570fcc15655e3f3c8699d6fefb35a7db4a4124065f9a38093b7ee9e097a64f
-
SSDEEP
768:2yThijI07aq05vz1f75LkHy1hvExAHNab:2gijI075OvLkHy1hvExAHNab
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103942bde404db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432287660" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e497100177248ee3f06f7e30f55d52e759baeb41bc8db8c378488e6bd3e736fc000000000e8000000002000020000000f378edd5bea657a67a7b7e8339130af2105f12854445c3e125b9888453fba39920000000269a9271c01b905d1ce6773fbb26acfecc87e78e75fd7e5e1c8f225d5f45534440000000e01e2a91a621a4a6b12b9cfd45b03b809fd601739397b7fe00499030eb36c333779523f00284010ac7472f06b279845563378663ca5a9a5ef38aac6f5f1351dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEF4E671-70D7-11EF-A0E9-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2380 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 2380 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2380 1728 iexplore.exe 31 PID 1728 wrote to memory of 2380 1728 iexplore.exe 31 PID 1728 wrote to memory of 2380 1728 iexplore.exe 31 PID 1728 wrote to memory of 2380 1728 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc101d004583d2d4145202cfdfc9635d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
504B
MD5ff89de5699916d1ee61cb10edd0d83a0
SHA187a0c9f6c88f6ec8a2a0ee9f0dd556a18b66e55a
SHA2565fa891f6a6aaa5a1e9b28ce2930f884d45b67b55427e44114fa115cedd2833fc
SHA512c5e0c131c498e01eafee8eacee590f72884c08191d7e219dd69ee5c29d49187a9aab4c39633cbb73a8c62a6cf095f0ceb0908e742c1dde53491e8f38a9f1178a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052066873fa72d163cf9f5385ef1ce0a
SHA1ff9ea4e27fac325ad2db6fe531405e10d6ed0699
SHA256e08b02a1527760390744f986e7667f7c84f81835675086c31bd4d7d62ddc5f19
SHA5120e8184d30b70a42b612839ba990f0b815084584b5fc24e691d9a4a7860ab7020730c762b485045c7bb313003cb6bba83bd6340f395e215c97e70592821af314a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b57209bf5eaa6d0de50165aa2127423
SHA171832ae808cd55588b0270f22e5b558bc6ac0187
SHA25695eb0d34917a88ca43883868dffedd7ee8f1917706acf45ba559efd37048e05a
SHA51208a98354ba151eae9e22ed116f52ed5d2469e6718fac3842a032be65613438e1953299f73215c21f065888c21b3a9519243d6c33888df038a5cce4179128b967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d721f9707cc749b41ad6125b7da270
SHA1598c6f6df3cc3051704ebf8b893c4b98a8b82e2a
SHA2569ad17c87d1b62b5f8c9d0d35fdbd8e966a0272947a5a278492eb43c69ea76758
SHA512f4e562d85af9cd363fcd9b882b633b336c801b79795dcadb110ac6b003ae45bf1bb3f26756d496ccafa47c31d7653bc6c67b3ea7e917decf1cf372f41f965cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dcb9530fe844b1e7cd5313004a8b93
SHA1f12de07b9e9b4df7ec885f27501d025ef7a83b3c
SHA25606b0e3ce08f9e32195524490989a6a6aac295e23a8fae78c16d09e80ff6a2662
SHA512e193f92b43167ac2387e46e2e831a24bc5018d696d1d7c55cddcd428f6636d6d037010493ab6517b42acccf3a61c5a47537f3a0dcf124d0c7c9b9ce3de3dc6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488bc3f958f781dd06c7d479eba1e107
SHA1dbd80c96a62eca5b3d32087e87ddee10dc5f8d71
SHA256e571199eb4c15652898b39fdb0f105c70e9d64da64e2f54f80d8f67195d89b15
SHA5123029d278f8c78645c92e3c6ae163c82a9a34f78df520a67d32c63affe9838cf640ad1aa2c54ac81fe1649ed7ff31eed5b14035cbd3a7560a433296c0423add34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521e716dfb8e501e8ffa7e47f87bae7e
SHA14b053a887377d42c546af6fd81d44f4d674101e4
SHA2561587e5a1ab1b4be0a83d0e0529c8f54d16a62a46a2df510e777ac710e9c413b4
SHA5122595de184644df7922f48aabf7b212982f287a8c736815bb1cfa2b545e8f2449d49da732036fa25fbd038e64e71d2d7c7fdf5e3f93ba68ff5eaa92c1739244d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a30193e04662ab918483a8e1876049f
SHA1bbb2178282edf3ab32ae7c01d4185013c84a7e8f
SHA2563d7913cd6e977a235c03f495feb590b035b1088768b5cb3099f20f7078458a00
SHA51297e16d4f501b82be55bb0f1e18a2ca8db4792d17f24ef3cf930defb809c27b187d22c750d2a29e565f61f984b3bb54bcf202cbae48a136a1624beaa5dfd9576c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf8f5130d587e2dc08f77c97393f69e
SHA1164e596cfa9dfaeb583de17108fa617786e5d163
SHA256f38f18b9cbacaed1ce97b6de9aa46c5fe0e7e42444a0f2fda905bf8a71fd3254
SHA5121fab42b6e74b7cdaa06a5f9e5ec37690be865481f1d08e4bd70570e22b802f36af8087ba004b59643daf5be66a2e32cfb5221eb5c1ace5700cc44f23f3b51734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24a92d3a0544efe1313dcc51af9d11e
SHA12d03b20662a9d11c175347521de4aca3ca5eb2dd
SHA25619d3f8a372cf06801760db084648fbad5401d69385a3f720c9df1d143fd6f44e
SHA512f3e450c1adcf1c9a818201c5ecd2cf20d479e5bee9d5d57e6cbdce7664363b20ef1f88248495e70483c9d935822be5c1162fd30bf67c54927b4df72431f7ebb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410f3bfc8adc48eed820fbddf6456ca9
SHA149c46b64d557c5d63bf08c2791a984ab04e229a4
SHA25601f95c5d19603fd2dbc2336e0d6b18eb80c12832ff89e804dd5ea60a5a50caa3
SHA512eea0a10c77ee3c5ad4f88b1d81ceedd3ba13dac0778ac1ced77e95816c0ce9d1d8d78290f89bb33365096fafd1ffdbf50be118f9074a46851c02ef2b485adb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9b491ff86355efe4e5f641e8560f41
SHA1e53a029e9f8e6ac13f1fc9c223b3a257643b0b9c
SHA25672cb816e098eacd49cce35f5dbb3c90da0c1e014c6f21f1435fc5bb1394825f0
SHA5122e6c0dc49742ae27e8b007ee506a51a5d7f1c4f98d83718e932772ae61befbd7a6916a4cab566575e7ac2991a4fc18dfe5f2a1dba89194c0ff7a047b1c117d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a6ee21656112ba7a9484ec0c11d5f2
SHA12f294cfac27226eb4599818ce684df19dc4141f5
SHA256333191fdcbaf439d25b13cfca10bdf3ef635250cff6139385e9ec2addc54ba32
SHA512427beb90fd20667c2f05d3cc401178fafc76fa283047d6523b662ac44d846c2a23935833fe0254b772ec882cd4bedb24c924363fc56f0d5f5744c21b5f85a556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e4e2435e7528d48da3e905d8c0e2e3
SHA1f823e0e6c2ebbd22dc12d05128efe93905325cd8
SHA2566ccc2b3c58511315efc5dab9ddaa218b04c24bcb39772a5c6ef568eb59ba7430
SHA51278eb8ceaa7dc42466799fb9f267cbb513744fa7849b595a9cec621acd960b14c31e57f598e66ff0e1dfef6ab90fa6744beaaa0c7a1e83860baf3ccd78991edb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6867e37c21f6fc2fc222e5e8951f6c
SHA1890582f911fefe4b4056d0ad5ae07dde8a4cc265
SHA2569598242fff58ee52b51102d12ab8302a612a7d0a5a7058c8981993d8f7cdef69
SHA512817302691a76838aff5e3c422d6f432c5ec128d0ffbc45a0f5bd84b40f085b0cfe2a89bf839b3f670a60d22c2f2c4424515a4937eba73362cbc7eaaa5efdb8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae82f640d51f23ccaacf08c4e07099a
SHA1bc6355ea0bde6a50e6b05007b4eaba72e96a3aa2
SHA256e83aa31061a548c969ea324a0b5652c697f28efec858dee8648f3f3162feaa64
SHA512eb26e420e2583de98fb0d803d2030fe90ecda80180c8db8cb66937c8020855892e21eed27cb212aa980524757f51e36f33d9e3d4580674dcb2970957874a7f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38834956091e1a3f629360a23cc0afc
SHA1595204b5a8ff5670e8d914b45441ff448e2ef44e
SHA25698175583a31336b1493516f9c63f0bde97d82663c679d22d3917383bf61ee228
SHA5123822e75cf4b92e0a9889a6daf863ffaded17749fb7f9ba1d2dc2d83cc5f39d156bbfb430be8dd8269a6628dae9a5a7e84c6fe13b5c4b92d644dbb6c064ed55ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a03fb2707e5d7e98e28b453ff88a9f
SHA115ae58baae7d22a7f4d4833a4e5c1646ff397b92
SHA2568b1889fbcd5d6ae9d5288c4e2e99f2c91544f687172d64806d3c26762efbfa12
SHA512bd81fe56dd119a56faf4a7bb6bc1f640b76a7849d493f0186ba59f301db45d93708f26cca233f83925940feca7329818b5fa9a7a1c510cc46b7150e3ebde7d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649f23761415a42348cb3627dda67635
SHA17a13e3af033e0e1dc41ce0c0b38e1ebe22bbc7ca
SHA25656c69fa96960f7cff5ec6999248e35a8dee3839e306c3f38f7943f1c3bcf5621
SHA51261d6c13782e75bd26386e50645b97d7546ad7299fa0d41983e4e360e64717d45d16253a788329c6a6da8d4627796b9d44cca8f369cc889f7b0ab90ce8cdc15ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d65611f90686d711c96cbd714c43cd
SHA1b2ad0bfb62735fd52c37ef995adf34bbf5c461bd
SHA2568452f94c4aab6b94d31b17600341f3c7fb71ba838639ba6c0beb448d18316778
SHA5120cdbde93270d4d9a426adea80f2b1d294e2b596c8957605df06f20993faa2459520575e0ccecd2caa8cbdaa93b059a754407723c241a033950adcb649a92e2b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b