Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
ef5ceb8d6bf3ac59fae329ca16504753_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef5ceb8d6bf3ac59fae329ca16504753_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef5ceb8d6bf3ac59fae329ca16504753_JaffaCakes118.html
-
Size
27KB
-
MD5
ef5ceb8d6bf3ac59fae329ca16504753
-
SHA1
16c29b9341227fc65643470f1b703ee372a0a984
-
SHA256
e9dc67344b81f4212deb9aa77d2f3e4854260070e7376443439188115b1bc697
-
SHA512
09e19494136733ec500c7ac0753cf4f4d31c9c0bade48efd5927153c792896126200cfb395680d4f10011c0c17f2fa8a6ef758921aee9aefa142291ed5474677
-
SSDEEP
192:uw7muXncb5n5mnQjxn5Q/EnQienNnznQOkEntYynQTbnJnQ9enfm6ufJ/Ql7MBH4:+uXn0Q/zuBCJ+S5iB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00978ddfb0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{072F9A41-77EF-11EF-9A84-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000000937bf88d9c3da3809a6108664c6bb4004b5220f1625b199958399d4592ff25d000000000e80000000020000200000009f24ccc5c74831187f8107ff7cebf8fca0deabb2bfee700d2cb7bfa3138722c1200000006ec81aa4cad6437f32738a9d458ca988f488a08476c0bf92d8450a160fc7002a400000002a0e44596d49ee673c547d14e40086530b2c358e2d85b38a6bf9531f08606ab0dc1a3f6178caa45433dbe0173d77303f3e1c95adca2b0f0aab71cf0089d45a3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433067265" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1488 2400 iexplore.exe 30 PID 2400 wrote to memory of 1488 2400 iexplore.exe 30 PID 2400 wrote to memory of 1488 2400 iexplore.exe 30 PID 2400 wrote to memory of 1488 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef5ceb8d6bf3ac59fae329ca16504753_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e1c433f75687ab567c478703aed406
SHA122a13d687044128bdf62f6c0bad8658b8e2f6306
SHA256e561faf41893b18df672576cdd7af6246290a60c07bca64a1ca7e25af7d66fc7
SHA51271efc6a002ac4689e2d456ed6774206aee15735baae3245ce085f38e4c48469d2746b266a2d968ffd3f68d6649f702e5d2d9a7bf52bf7ae3c16a31dd7b2ca98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73cf9b55a5f617eb0bbbd042ac72a06
SHA1ef6d2baded3391df033c647aa04458e6352dadc9
SHA256bfd7bbc7f4f9d5526c3561b5bcce746e38bab9f662374bdbe69417c12db60bca
SHA512ff84c3bdd3c0a62f44da630b082838701fe3e9ebbf6ae578097e5c2e6f8053ce254bbba22f217918b8b4d9f81e5d673d959aeb065277fb626d8de4db05d3e458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498213e27610ed3d8a2e18894873500c
SHA1a2e96fcf2afb7233d149d9f73ea724c8baf661a9
SHA256a33faf5f61b901cb33dee69cfff8e53f108a7683d2b3c73146ea260f32f925f7
SHA5121c6b3f66849ef07b4a6250c5bd85a964126d8a58442bddf443a1b57eba9b6aa3006b7b3b9d6648027f8b08e343d69599a8c5ec2a34741132ea462d09626bb8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b5745d9d7cc165903f3d72a10c49c3
SHA1b8e68efc645490f688cc24c91829b8ad5c35a88a
SHA25623654345070ce628e52c9c844824317a3cccadbd238ce400bebe4f0224a0f51e
SHA512141acb8f780c1f423dc1a3c37e5bc410b32168af43fbc1523f3eef2386186c6427dc1bacd72fec9a6facc10c23956653f199aa8790d0ae5f66551f466d107085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57447fa9c843b38759f8fe2a6b669e1ae
SHA1179a48afbe061990483adcb32f6f761f1dc1300b
SHA25609eebaf607ad906b125fd8e213c7e54980a56c3c858a45ea57b3616ef6738457
SHA512b7aca6044a01450cc4bfa7696e2d986666b14f638102dd392385666d6811d998de6f8a8aa94d2b0520d2e6b32038b5600228a1abcd25b7c743402c9d2b177bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab32dd42d6cf0fc8b2ed37a9bb64fcd2
SHA1810e85b0c6630f626f4fe2a2a96b69a95ee6dbf8
SHA256d883d5f1882aeac764e52fae12bcad3fb169f6abb20475b7877a4baff6bc3e17
SHA512fc4630e8506227e661081f760eee95dcba730716551650762d50baa657eeb211e59426cc097101243844881128b645a4b9755e159e6873d7b1215a80c65bc9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3e236c979baa3267b9916c31a0b5f8
SHA1ed70894e02be5327a759819a1c545a30a8f1f314
SHA2566fc8bcd954ebedaa5debfb64e77c4c1326533b729867feafbb5242df6ae518c4
SHA512d3802247fb0bf2d0583d19f65a7770a5e4e371cb1e995a5d50a129269e382f84387cb608e6f1c4968f3ab3538fda3dc3297cb37d69b6f17f12322e2a2db592a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49dfe02a29ccd8644516d9351b1e5d0
SHA12c908d602db1fffd68ac6ed52c2f6f00ce41c497
SHA25626519bc71f158fad7907d244890e9ddb50264b01aae86ab4f9fa4a19c85ecb33
SHA512b894b25640426a4316fc0ee9fb7556cc6f650e5e4d607c57ee5c4aa41ceb8f232d0d67bcaffbe55222922691d20570f21e7b16bae641f27f2288867e3f094508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537af0c100b21bb98890832a18067cf3e
SHA1b71b83c08a7e1e7af59052c990e90ac1e1a2d3cc
SHA2560dab0bc77e42e70888b3fbb784034e8bc8a61a614bc531279badb4205c001b86
SHA51239224fb86de391e5f086fe72867bba7066d39b06982e001664610e324a5bffbcbdec6cc6fcda4dddd32f02bd8a3c699d4ea1486f17bd710c2c4ba337642f479a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52688eb3550e1cda7098dc80c937ab36a
SHA1e4dd6ca4eda06fdc971dbd6267ff94e5e9248bcf
SHA2568f395f431ad32c69b08bf5e07aa22ab3c7d2b2c1d67a79bfe610d344fff718d0
SHA512f83eb4b7eef0eb77a40b57e23998f2483c4a96acb00b747defe95b780865a69ebd53b8a1659d347021eb6ea55925a691986220ba24d68725301ee3b82a135319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86fc386c845266b5b7fe1034d65e096
SHA1dcf11922a95e5d7902a19cc32f5d52e0d3a6d095
SHA2566cf7805848d059125c8511e5a9a85dd64d356409b89f550428b139ec92cc7464
SHA512be67a9c94dc2b3c0851842d11bbfb84a375bc381cc006bf136c7881dbd2bb13dbe23abdc14b7821596a5a62f72d4b97bf0d19a7e9e2e4392ef8aecf7106d50b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc17e48178def4a3b6692e61fa5f464f
SHA1ebf2642c73205424f1ee98d6cf469ce5d4b352d0
SHA2567524e7e3a58d2889055417d0769b11027abf458232601ed6e1237acbe8dddd4a
SHA51228c9deeb62d361dcd143886a7bf4b773dc7d6126c0475a7fb3f3fdff8be51e3d951b36a0d65089890643e3fc69a32b8ba40d4207891a2e7ed2ca8c8b4943ee63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb28cbea21426220433a279d5eb810e
SHA137e9f85ea82ebfa2f170fdec1d794308893edd3b
SHA256f9d12d1b58df8dac89e52beb2600c3843239d9df486ac8a51cb4f4c5fc7d702a
SHA5124f42224b46e147396775ffc66434f7065201f67e3b3e1d90a19b8604744fb0620e92986560122771df6bb03fb09a5bf9e4a688312a62b0965d845659ffa63b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f17e8e79eed6f8ba99c0d0f0340305d
SHA1265a9adf595c86203f6e6cdbc06f5a8ae4bbc412
SHA256841feaeca18908ed4c9ebce8a62d9fe01de3dd732f3d7fb1e5448189f9e39f1d
SHA51282e3dced163cd62777bb1b79a138379bb9165f5566116a9cadf13dabb36ae5d817342a834d77900acfa6bbe746a0b899362750eeda2e8df542d214f4359b2913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b1c07f48f0f14022876c418d73b9bf
SHA1c2900a73f222265710f32479e38d0615e03fb369
SHA256acf2017b8def43f018c5c6125f1a0d55f909980046c972470e2bb86f530730f9
SHA51245d743be8f8c2bc201a2acaf1d1a44c9073180a984e142d7a9ae99b607189cf2f3d859bc228b525f2758a1c6b9d405fd2508446dceb4940b353960565641c9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8e61296b437e9cd8e150fdf4931895
SHA1ed6349600d0f677fbbad37ff2c38d817ca7ea9c8
SHA2566f7bb0e7a8cd2c213a070782d02726f9f346f3b9d3990558b8af9d154b59e177
SHA5126e9c838cae929870c804c5064b3a35971a7ecf6f4b7298d447c526347482d2809986e28f1b507ecd9f0da6dd4631714858ff8009ac0ec1608d543c69bfc0ff34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507077b510b624260e9238446b60f0f89
SHA1a3f0608225811b7330323704baf761891cc1ce1d
SHA256ea28a2810f5959b2649ff126c4dfddac96dd9828e61dee5a97d872220f01f70c
SHA5128c1d6caebae349e723bab6a4179a5d7a903096fda091ae06227050eadc9a805d2f3dfe1f8120f8ded6f931a8c016f931bc7e7f9ae8835d941ebaadfff2ead98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3961c8f055e0fffd0a8d853e7fd1ea0
SHA149413d42ef4061605759816550ba53a1006ce5c1
SHA256f2e66fdd68dd793dc1efcc08245d4b9d9c42fe2b43317deeab0b840a5a7b238d
SHA512ce0cbfbd5f39aa5cf03131bbd93fab9e06eeb5fd7c5bd3585f89cea2ce2ee11a9a699b8ea3682031c78aca4af8041e13fd846b57529b3e839d5c24584106bda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb158ad37f489a3375c6fd524392220
SHA119330f10c6c9fd7b0d35325292240c53842916c0
SHA256c5da2fdc405c08e6f89847ff866527de8fd5c301e1e8ae3ee4c7f3fac970c543
SHA512fe029ad786bc1f9eb7c640b9725fa322b64bd19437387d51b37ab587240ca4d93d10db948cc38784e9dcee28d9c0dc905dd6e95fee631dc731ef1e87aa18f60e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b