Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
ea7a2ba3eabddba08cccb6b2ce49abc4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea7a2ba3eabddba08cccb6b2ce49abc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7a2ba3eabddba08cccb6b2ce49abc4_JaffaCakes118.html
-
Size
10KB
-
MD5
ea7a2ba3eabddba08cccb6b2ce49abc4
-
SHA1
0dfd292a2a011dff3c25cb065a44f652b152bade
-
SHA256
1e9db77de06af6603d15fa22720321f2313e18e2f448497f997afacf4ba02dea
-
SHA512
d7a1b3d647508ad1cd55259068da77685b89b0a86e2b3deede0c8a7e380fd3326b380bb171bb760e35edcf0c6baf118e90bba83c69897097f7063d86b6924059
-
SSDEEP
96:uzVs+ux7dvLLY1k9o84d12ef7CSTUzGT/kO2UpcGhuv+ip/njG2ti9WblVHcEZ76:csz7dvAYS/m/qcpjPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000073110b6220eee97d86ca55fdd7fcca210e1181d6567287370d483a83434f1f9d000000000e800000000200002000000095718fdb386a6435dbf4f273b35b7b9f6c9349635cd3c835f37055a6c56d9d8790000000d2467b51cf4f01ea3c6fd6f7bb61147244fa26260ab4e3db7193ddc6d851d5a5c61db2434f02d569bb6c4d0b2f0142ca011af6c354dc52e0576613b3fdb0a30059cf08e3a964f86abbfefc990dbba877614aaebc2b13809a2fe891f0056161bce3b553e92893299205d7a60e1733c8356ff88e1f0fe68d741d2890cee07843e5ce82569eea8a45a1085bf0f349615b02400000003480dea382b949fdd6d5bc12ce5152be63c84fb30547e02001dbdf1cd66bd4f677319b6de0e9c3e6968ff34ed501ae6969d7b6032fffd293f2f561ac0d975b0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00638891-7635-11EF-B798-7A3ECDA2562B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000065fc1f677fc4e32f73981f3c3a9e2685ea33aa2a201d263db7a3be2555af1d75000000000e8000000002000020000000ba2dbfa879c30e8080ee1ceb409db3a2c486e9224687ced0c53e508e4ec4861a200000006219cb9314ab521ebb37114ca210ab810359fed1eabc911fece69de7f51a38ea40000000f3352a40129494103b711944c5e1609ac5a03cc5cc2dd0fd9467f5fe352828dc840275d021a55c1b6f0fc65502c9d08366f8bc4bc11ec957cea1a4d120ef2f24 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800ef9d6410adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2296 2936 iexplore.exe 30 PID 2936 wrote to memory of 2296 2936 iexplore.exe 30 PID 2936 wrote to memory of 2296 2936 iexplore.exe 30 PID 2936 wrote to memory of 2296 2936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7a2ba3eabddba08cccb6b2ce49abc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4a32a4eb426c09cfefb0c047b6af39
SHA156af2b026e7d3ddf7cdb606d2e19290c72b64b4a
SHA256b260e700eab4e35d9d41a1357828da5e3efaa7dc69afc27b0edf64bbb33851df
SHA512436a96ebb70cf8acbc1f224edbb88f8327bc15497e00bcb66ed0c53213a6e2782cdebd3535fc44a0110afe28ea60a51a72d4146ee306689e2795540210f28a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65b3ba71251eb41f05b1b2643ac73e6
SHA17427ca5ae0ad22abb0daca189d45ff0bd187451e
SHA25626e7ca33656d839c5d950574df85c4b21e9ea4573750e36a0a90f84770a861b0
SHA5128693afbb21120f93ede2c0d2952dddc71219c211f2d3bd3abae690c542321292a9194f4ed1e41d49f9e5618b4f68e7cc84f7e18c123debee337b94b8033eec9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf1ef873b3d1787f0313e3a75971d1d
SHA16b2ff5b91492d41e488bfd9b2acd01e093a3a3a6
SHA256f5a0a8571d1e7df2a740a16c9759cca2d63b2e4e3d1f87c0c87715c129670f82
SHA51203e01622b187519d03f9c246ef8799e78d78bddeaae820d7247fb490fe2baab21edaa1bf2faff4f7b5751adec93921ff8ee3e3530aab8e98eb51c243b2a35559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd103fa36adcf14a9f5257c3143269df
SHA1f172ccb55db7fd75afc244438ce22615f1723387
SHA2560ae8277523ca9cd1d6afade7951bf8804a99306dc689ecda857cb58a47be452f
SHA512215192dc8e1b9f8017ee56f4abb7ef67fa71bf923465515422707b91cbc4c1471444622ea3bd56cd9844d4a37b3d43c8820e4781ca13565e2fb99ff34af06f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96f5008bc4ab9c3e6f8674c674e75a8
SHA13750d8d93b8500f6abc0039d52e16c39312d62c6
SHA256b563ae1b1865e1a1730a342d394c32b673bf58f90b0e47ea4a66b19306363144
SHA512a7a438202d01d05a834227b2c62818a1589affd474720c1fe9f29b2d03ac46cfde50ff099c993c87b2bd6ad85708b4cb7cb0adf43d56bdddc330e639faf131b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda8defd759be4c6ea8becf4e9aeb942
SHA11e6286e8f49d81a2739b390a630dad964686f278
SHA256eb8b84d8613c347cf87d0fed0b15ad73459e5351ae19bd4ad7468c71bc23f506
SHA512f1839e2843d0d09e46c879752d3fa8b5aa36930125e0d65768e567c28ad1be8ba8f78eec941af8d130a4ae802bd1dfba46f8b1ac94ebece5d9377138a26e6950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e61343d7337bafa09dda9c6dc6d124
SHA1edca25fdd69b0b3213496ff64cc4b2f61ee1a986
SHA25608e7a75552d92dd2220a05caef19d607e248a68c17015aea07d16174217e2a48
SHA512ab116a417b54c3083ab37a14ce4fd52ea9217b907a6ae7944c247aacdb59b59fd47b9f2851f60c098eb806bf5b4b2d232a4e3bbd8cd27e58f21d51747ed8f838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded265857901cfeb8be43d7d93e63639
SHA1401f2fbc60656fd0ddde2ad31a1bd1abd8c39fbb
SHA256ab3183fa96c5a86d8b36267860ef2b819297ac5b1bd564ef20ee31e98bc77c51
SHA512ad5cea131f264d0deaa94ccea6b97ce8310d5a970898463e8e8e98dd25085f9475338310505fd2502b12ca0f52b858cd7b8d7540fba3c49bdbec464c4099730e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b0dcd48761a84d826da9c85c4cdac7
SHA1ec566afd2fa919de6d110cc07c0bd052ed7597cf
SHA256a3a2fe79ac57a10a58e5b0553a8057d4cd86793db8d32a65849dd3cc8a82cf28
SHA51214d104134360d4854c879cbf7bda204d10b4115dc1b68d12592b7d1e7ecf53a10d9f9b4c26252a686dd6089045939f5837da6c674f8484e5ce97f7025ceb0b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096e12adafb0aa9589498f27e1a7b951
SHA16209ad961ab1ae034112f5dc18119ce7c351007d
SHA2560d79428f303cb116a2335fcc67dd552e29841c53c1a1aa8c8dd6bddfb6dce08d
SHA512a21239902183dde934ce530f75d901513ac5c8d234953f5176e3f367b5016d4d2d25e815829bdf2758350087d397fd3775e874db2ccc5817374099cbd9e0164b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd01a9bd70647c62510dca882a3bc64
SHA1c97d63ef3e22bde22dc2db22db43d00d00041695
SHA256ad17ee929d610d3f94367f9b4c321988a6785b3afa943c1fac0ba795e966a5b3
SHA5123691bb95affcc34fb83da48664c4157222161db1ead68486fb0a59e63269827f8121a5dee34fcf91676671fa57f122b25789a0ef741cc43f521b16f8e3fcb115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac03308eb0b397d98596c4a6ab11ee4
SHA157cb5a5eb84553bb620d0a5a10d020f726dffb58
SHA256ea1dfcad19e82686f02ee70384099a1294ae98c1af6e542cad3fea7821b5c65c
SHA51277429e7006bb88cc8fb5abaea2b7b4e8da5f41c7896b539d1e02af3dfa60a95e5c0ad1176f6cbb0007d855f792df36f698a4b2c258cd7d4e346c922885c0dcbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce66f0df756ee9fda7aca261daaa21f
SHA15d458f9cb9683c9706029c37bf772d8c1abd72c9
SHA256afb47d968fb9b96016e75baa37f354ea3dab738ae04bbfe3fa30ac5d9260d8cc
SHA512ce1e6c6d81014c0dcc4fce2b5e10735b0f4f53741accc84f1b35a9ec31111c7b145127d4fe2921782d285ba234df6df6d9fc5a0c519dd1c31a4677f15e8f42c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504461a1bef9670eec1580f6cdd4491d8
SHA1d7b08ad0354c67c1e82547313c366027d066710f
SHA2560844428e277ba09e810a13de7df370cb2332b18ff4febbfdfc1ce9009b2291bb
SHA512ba27f935eddbbfbacdeae31a55ea8fe31b9998efeee96b7e6b38e172760d2c66ce25cbab02eb422df88cdba191857345b6f0fe3dfd6a74cc501894e84a4691af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656e227578f024ae47b7e5929f650712
SHA1e539e21af6bd51f4e5f77743ae54655ad4fd7473
SHA25604d8ee3f0850a983151da60336799ae0426e472641fd35c0d09e6ced2ea76d6e
SHA51240c561f34b9f03e2363e9cc52d1a0abad63ded50fa3e3f400273c76c9e93082ca7f6007f9b59e9d39d282627474c6a88b06290c586d9ccd16470fa6d01e10fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ea89b70c8cbbba97903f7b41180359
SHA1c22ff6484d6e45ee66ce94a25491ad9c2573b591
SHA256b3acb662cb907590e74102d3f380ce9e24f4ad310aa19e1501b8db439da40f6a
SHA5121000e60b6328a3dc6dc99c338e5288b3d47282540ae1c15981295bcc6aefefa889c6c9a3c3809cf54dce2b0338dde86f152a4b9d4b221b14b35726001467fb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d02623260e17e2df6d2ba0d6d96a517
SHA12b28da9a11b9f15caaa6544a2c3a959c375a4feb
SHA2566d5f91b16a32f8491d34748e06edbe8fc6f5ebe67cb1b0989c14857830a4a52f
SHA512a3990d9a2700947bdf3bbc033450e0d527d63b00059b3158d5647a9b8a94c44393097af7a7f3fec380118001d9b1ccd627245ed6616b64f13d6d5ef6e1eb4bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55765bb3bea721e895d8226e28b5c4af5
SHA11fd18e1ab9cd37d73bfe238a8873ef93f0604acd
SHA2561ae228cedcb5f60eba3853e26713eea8a7410c3a56c48e89897ef79859745818
SHA512c4af1f8729a8ff9bfa0ac203f8793dab6baaf4c4f7654bd2480d0dfe5495a0bbaeeb14c9e14df3d94e316d079d7a3684b4e2a221fad5d8681aad3700d00ec3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cedb73b0c557073bacc36e5d34458e
SHA195913ec346139a3bb6250297214cf70ce521c8da
SHA256f8bbcd40d649e96947fc40a80b4500df856a9d5ff4cba58e305b2748a40d77c2
SHA512b3377e2da18fde0dca7e16c9e3e21cde1033740dd644b6b60dc634c34f71eeaaec96e9fae314ede63e83a4fb60a2c855fd30108fc73bdddf3ede1fb86e90ad82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b