Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html
-
Size
201KB
-
MD5
eaaa18af33dd71d4c3d0074519728ce5
-
SHA1
ce4c35c8c464f7068e9d040b1082aebe2a3518ca
-
SHA256
4ee1adfa026d6e1718d9c6bbd6faad51d620a31dabdc336349ccbb38ab8ca0cb
-
SHA512
321ac9789d0decf8e3ce4300eccc080a012f86d38468ef6af8087c27f894980af016e6d8d70259e701cc9f571a0448a877fcdcea5bb06ea75ecfe60989cc055c
-
SSDEEP
1536:kaaSDMSC7zNH3xi5pcZ0YBoOqIJg76m13Cf87epqGvM:da129
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885293" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e4388d98c2f1000d6fc9dd8e3e979404134d2e4901b33b4a76d12ff8088a4715000000000e8000000002000020000000d8406b34ada827be00c92e86273f818b19a271e1fb568d7f1061d0773bbb17b790000000d6186c7b4c4903c02120f6457630cdeccc3f70051ca1833128f05cbbd873caccdbdbedf59e7c9f63bf7d791b56e8998ee2322482053e1a8fd23f6d844a31d765c0429a4fcb369b4ff456080558de44260a0d3733aacf000dd4566796f990430593acea8b16d71b2bc9eb99c72195d507e07f0280111e128f8b7a38b281cb01cbd4d1d27ffe73804b7dcaa943d445727640000000f7e8554fbd73a4fae8e968fb218b1d6aed14f9494f47e2a1dcfd0999f004cb403010a3f658dc7257a70c59ab89159193d0e2c115469053752b791a4478a97ae9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57483401-7647-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000acaf45626c107bf3cca83bee166779a9c06a00a5071c11c73dbad101df1fd16c000000000e80000000020000200000001610aac1548ced43a451b66fea75a6174e4002497edcf1202eb875614ff6ead520000000322e85f268e49210029b670cb5ebe27e3460bf2d6832df4f4372464f87254048400000004f62a6b536578cd2ccd3a2b0f2e9d9ef081cdb103a8d567e7dfee15e89bbd231857793d28af5e59487371fe7f6cf05b6ec31a7ac28000a8d05d6adee4c1abc8d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f97746540adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2672 2256 iexplore.exe 29 PID 2256 wrote to memory of 2672 2256 iexplore.exe 29 PID 2256 wrote to memory of 2672 2256 iexplore.exe 29 PID 2256 wrote to memory of 2672 2256 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaa18af33dd71d4c3d0074519728ce5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68c133d248f298197a0ff3fb565b4d0
SHA1159bab6723b34507f33e77efe71ade9b628ab3ae
SHA256fefb0336e81fd74f55218cd12ebb49bce414cf619b3e67ae9ffbbaf94f933ae0
SHA512d64cd8ae257990eff2fc47705b99158821f0451450f63e71e768e98b84acd84400f8f38533012fa2d6225b0caa589d893c0761cbdcc6e1a94f49233e25170407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a259c690cc19f41427a31c7ebc67a58
SHA1ece8a06bf43ea02350e88419d72f4794ed5031e2
SHA2565c8dd7e3a7f3592c476164bb4c518bc61d26aa2ed39e45bcc8d8745f09969b90
SHA512caf77776808fe19b4990a290ae15f287390fe1f97d46b1914bac7c0397e0ef652c412a5a9bf4e68ae1f78857745ed76a3622bbfbf5e7cd7409bed937bc8edb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ea9ac8c905619c8876e3046aea6bbb
SHA1d6ba4a3d13e7e6ed6c35ac5ea6ba8a501adaac4c
SHA2567bae50f52ed96c7ec38a4a75dd3b9afa5944026651765034a3f92f615b548cd8
SHA5123bfdb68a5f83ce1529bb2893c5e10355ce6493c2b569bf1340ad0ddaca82f01ff4690b562c42bb8bf25ecfd8d07fa0e8570a4d4e0917729fe317d9b028bcf808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ea6e6bf1787d9fb3cc9fc51b57640e
SHA1b6a83d889173158d3a0a4b0fff1ad001b52b7f23
SHA256202dd1357ce8a5fd4b0e8c17ec4c15a882df98bf6409a40df579a8b37e7d6f7a
SHA512c3a9980a737ca133a18f79976df74c756d977a32f5deeb2318b639975a5f19db7a58f4ba29d1947dc4fde7060426224040ac940d70d42319705b284dddbef5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f41797049ae225f98cb6136afd9828
SHA14506ba9c50985b3eb72e2d636d31f999d4879196
SHA256233649d769343d4eb0258bd4417fa491f0e4a5fe2dd96912031940cc5697ca9d
SHA5120335bc15ca4a35f4e8c10049ea4934fa2c6a02e3015ad3bf6b32ce30167c42c801e0892c59a78245e1941a2d1e0cebf6ac17fea34dc0c361a5a8d267424b733e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1499d19650253a38803d1f1db47372
SHA15653e9e72905ab375089866b92f66241ef56dde9
SHA2566f068d35904237bdda986c320357ab5656fc387abba9d24cd0467d80a9d6ac96
SHA512923610612efa72dce5362ebbddef870c0423d046f0d1eaef8ea4a92a6c524126f01deaac4685895407154049693873be552fe1d294fe3cb822afbb77dc997293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2739d95f26c5ad78ab3872ab09ff17d
SHA14a5c818002c1e296bd226ec6cdd345b1e7a0ec5a
SHA256c1120162c5465253ef5e8c2d871e41b8e76562188948acc55d3881fbf2126994
SHA5120e0b045dcd45417eed45e31aab274fa20591f3deee185b22a362c976ce7d17d7fb4169db7f9ac5da86fe43c8bd7b812307b3bfbc1ce148029d6d2dac4d61dc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d95f8d91118444be05449099f729c8
SHA1a6052a7fd55e663e45bf71ab5b645bb553d55b35
SHA256549869066303a4aa0a9d6bb642f53de41b7b0d66ffadb0dd45d4dbf38939f8c9
SHA512635e2a332e9bbd94d52c3fc9d8250dd3af6f78314fb1d7597e0969bdf6dcc5071d0a03f6d4d8b810c38ad6e1c0207e8be457d73db0ef79781f48ddba34a4660a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0514cc7bcac11d689549d3016da6bf
SHA12c93161ddbd3ffce7f9771f2f1b78e93759ed41f
SHA256c28ea6edbc9dbc4db806e87a11d2dc511d0a9d84c2373f873f0b77fd9d4d18dd
SHA5125f3c57d5de3da767861b54f64de32aaf5650a2ae1d420e631b2c4a60eafad08be55834486286d902176866ee6060b27223836dc9449cefc0e70d7df7a6ba3d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595942ef856070b296061b6e6b32e90ec
SHA10dde3e9cf5f2e5a114bb9899f797340d362a1cf6
SHA256ad446ba01f85da55309d7ab86b715473dfe66735b61fef662fcde04bceb938ac
SHA512ea483161af0740c8f27964b06b44d8ec8859a16e243a21c9989d16a834c681b4221aa6b3e349f8b6953faeea966df96820dffa91d113477f8ac5c33a8c9854a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568459eeb8164c69b9ac9e5ded115489d
SHA1593784c746eddbbf9c9d0a464c53dcd396579e32
SHA25632802bc63af76007392e560a02d2d2df98f5d1fcf864172898c98332e510a697
SHA51255eca196ddbb0a749f0eff6b297b796f89501adfe5d9afdb675c606db1ea18ef451c887cbf95c739820751d245cd9647d53452d115c02a7c1abb8c2212c0829f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54289bfeb0d4f49acad5faf2e20c5963e
SHA1a3c35c05fd5253e49ad17e5290cda4690b41c509
SHA25683f0477847d101b2aa4ed4b3491e41f522b241e465fc8ec0387558e78351f408
SHA5120d4bebe106ecf62b50232787cc731156983a8fb2bb456bf7b607d39ff7ca24323e727db1abe8dd1810f5f0ba5c51b37e688fbc1c60bc62b1411ea13bc100e35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933888dfce806352f42069b8d723b144
SHA165bebd2df629aaa46f7a1d6643a706c52c7424a4
SHA256817ca5361cec4743af2ea855f2aee1f34a9738286c64dce0f07f6407f48b4189
SHA5122eb4c116451030529f9ffd52863a3b1b6d896778762d9670dab10709abdb23faa07c6fc21dcbba7740661786d29136bcb2a040f4ecefc1206b87673ff99745f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba308f58b3dfd605f6f854c0d1e2932
SHA1f91b2bffb7a61eb58e587f380c37048571a74b3e
SHA256939f8d4b166931801a465680265ced35fc9bef140c422d1ac2d314b433ab75c1
SHA5120aa787621c5bd5977afcf7e46ade822b5aa072f0af7abf509ded73635941d68d518b87e1178eaa36c279dde0b05662f26173c6cae7888bcf8a24ed171c82ce8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029118fb61447ea46c9a8f3a432a4f9a
SHA179b222b895c023c085b05fd0cd584b3c038a20fc
SHA256cbc2fd59763e0a4b6ee0f72c476e35c221a5a656cb5f9cbb20e6dd89586d4d0e
SHA512733caf87f85c744e6ae217725a2d424b875182fcc734a8364d3f0a11dfc56cbd34cf236c4c8dde82140773533aec3e90157cf60258e9a7c509b23bad632c3c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59745c2a13bc30d71ab77fef68b94960d
SHA1846a56f592d76f2465660c79b83a1d9afdc6cf5f
SHA2561dc2ef0fa22461be0157b1837226b1f16fc6e54735e45d8df0ddb4a3ae259fa5
SHA512256973261c4334295efe34ba650a39d918bd80d06628a0099b1c55c8dd90b113dd500b9199b81b283741bbfec856abeee75d45b7227f12f36af72a9e7e18cdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ddfe07d855edf9ac913114fda809d8
SHA17a52f002db20b8dde74aff836ee81d549710f4d1
SHA2566d0fed456464590fe4552faadea18bda11626af172b1af5989226e3d2c223bd7
SHA5128fe413f4c87aec85bb4875ab2845596c6c8f68337d9bdf2acb3b0c8d847823b3c156128dd3cb84eb59ad7dbe400843291936dc8fe2eb9883891e1db5173935fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049fdf505170c5c9fd2d695c99b01106
SHA131ddd0aea5b455ad7dca393d8e97c98e34cc3d90
SHA25620fab284803ec1790ae51725288f521fb9cfbb2ba643179abbcac089070a022e
SHA5129f1496a2b1a038616a7f2943ad8828332e0f56050f3134754781eb9d17ad7d6a3aaec71c1393f9ce90a4e46385b762ebe687e3886cdd5095e57816388f0a3bdb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b