Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
efebaaafbfe8ef65292733bf015e0e3f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efebaaafbfe8ef65292733bf015e0e3f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efebaaafbfe8ef65292733bf015e0e3f_JaffaCakes118.html
-
Size
35KB
-
MD5
efebaaafbfe8ef65292733bf015e0e3f
-
SHA1
8a2280fd0b0ed71dc155cf126436c10cd730cb7e
-
SHA256
ad5f17f5fe3a35cfdee72b6c3e066a685c0a467ca7174c207466668eaf45cb1e
-
SHA512
e44c7bb72f95476d6a4529dec84833111a48723bc2b8e9d42ecabeaca932f33cc0443255a08989853bd77b4f373e66abd328e1d98eee8e71791bc831ba634fa5
-
SSDEEP
768:7RpIeXl0AP8x1d5wX82JMQ/gtUqs+nT49wmFawAh/wXGrwCN9hwZ1HwEGtwrqdwC:7RpIeXl0AP8x1d5wX82JMQ/gtUqs+nTR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFF78BD1-781F-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e08fe303b344dc3e3fc63f0de07c5c1abfd2297939fd4a1ba87db9ae94accaa2000000000e80000000020000200000008396fe5fd9487d9d808adc32f277c0ac3cec4df3f7595b6ae9c57126aa3f97bc20000000dfef2d1e777f3c2b9fa5fdb6c0a482eec326d171c586a52c395a7a40a16aa6d240000000b58ecf5e22c4644acd944c0d4f7a1e01df02e3ea14b389bc6c5902e984a2f44723e8f8c72c3a5d59a023977e2a0fa91d8c88029e0ddaabf6ca411f23e02611f9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433088164" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04992862c0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efebaaafbfe8ef65292733bf015e0e3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506848034016e40dc047912a11f6692da
SHA1dbf5b293b0da6fcc21b1465c9e48f95f225df4d7
SHA256376003733c297610727d0abde2af7d51d8d10b15df8b3cc7c719d144c2f759c5
SHA5127aa80ec14b27c3e2a30c58033768b4878c3c515d3b2a45bbfa8090e987eb90ebcd1bef08aff3916bb5c1dc8980dabd7ab5c16ec96f7f60bbd4f53ddd7f80a7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06b9820228b5552cdc189af58722b1d
SHA1d1719b8b0fa10f733b3ecec732d9473641b9ad87
SHA25637c5986b2123d09237f1b34dfb43374a3c3a0f09371ae7c59aed2155ccea06d4
SHA5128168cba5dd81a95d6253675411f5b2de9a8eceefe511722f780ae202f5cfe66ea862ea21e39772e4a7db49e3edab4fa04126f0ac813bf53dd3e9a1c135c14310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af5b71f53313c16d1e312c600c258fd
SHA12d69fc008c7b3c6b30d5dcfcd00760018ebc85ad
SHA256deb738f0eadf76784c3caaaa50bbce8be03b5ff3209495ad62eb384f83a7ba13
SHA512d5ed33afefd9c9435d960ce2fdfa8bd4362edafac7f62d98f207770a4e5413c4e2124cf80ebe9dc63b17e61edadc3d437b82164cf685ed0eea08ee6cbb56b184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c081076875ffda6bd36eb119b01cc18b
SHA180f805aab48bdce29fb1351e2c86430b7b2054ce
SHA256c42574eb9b7c5a7feddc1aee860fe4a527f956ccc3cd4b36adbc58e52d89c81a
SHA512c1d95c7b1aa34f54c1dfae50ad2f6ab47c0404fba127069d6e81ceb3e63fea9c59ea23c0d18e45ec466f543107842fff7d38ebd9c3aa314b79c61aa09be3d0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066da33073595a11a970529ad39029b0
SHA1709c1bc4dfe5c1c15786463f897cb0aab6e125ef
SHA256cebea2c98daeb99fffd7eb59c769283271a10e412ae52bfc623aa03ab701d9ac
SHA51208fdaaf7aeb28e4dbea47b3b6eb31eff8008a3c8780e9cd84f9c8ee8750f37f59a013ad27241cfe4460ce790ac9a7bd87d929993df9d62fbc85e86ae7bf43b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b90b08bd823fc4aa65a1d683911bb64
SHA15e0468c6365c70e1ff6e2879221e1ad50f781073
SHA256f563cce33a6687b7afc2bd65bfca84c51c746d24798e3056a429ac1d513d9c7c
SHA5121a5fb60f12bd13c1fc4cc0c2a6e3f64a0e7e8e32834c21602eec3e820d3a0d0fd0d7600da8ec067e4ff74605aad529059e33cd701f259dafcd0fb8902743b1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149b796288777697c09b804b29505c9c
SHA1632a4fe3600e9f60659245e0bb8bd340f1f00591
SHA2564bd6e527a3a8f86c4a588736d5dcc8400eae62da6a23f586fe417311b74c4b73
SHA512d01fc38cd027c62299d15c8a2a1fbe69ddb623b8293261116ca5815c2c1c9293649758a45e99b8a2f480db8f42c78acf674c29c7d9a94447f27b29834c166834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c852dad876ecb0931c49b93e840718
SHA16e3e2dbe8979fc1ce018a327af39654e47d46d07
SHA256981ce06aac4b86771ae009ea868bc9655fcfa8b8a5caad0e6c103cbb5dc587b0
SHA5120663e2e34c4ce4a72bf615e5be1462071674929cd847d5bff89883fc69a63c237479cbbf9f49035b7c8e98987b2fd6716502eb671607ff68e00e590ec4aea51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361f263b46632d1851373a3bcd0d10c0
SHA189a503239b43ef9db8da2916ca751446d8428705
SHA25671ab2e2d4b97c4b1e14c8a28814429db9bc63586845ba234540858b5d35158d0
SHA5128d8c59ffe0cc187f8523d919805505da2b9d69161d1d53c9b1402b8e9a286c46e39c0088a8d592c837e410da5fdc432680798cf893e0e7fe0d96460b04856517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2bae6d70d3950a37abe5130ef930b7
SHA1dcee10712fdb0d10b8a318bd00db6420513e9da3
SHA256d28bc9b57316a8363feff8fbdbcbc8b2b4d8a8b2480ed69fd26770f041e5a3f2
SHA51287dae214a1ab165bef54f850c79ee6a0662c506e376a8a47359673294d9f7d68303e9e2579f76b1e5b3e2755da62d86e61cb4c14802856452be830e65e454198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528dad049ca1ba174b43e3ceac4c210b3
SHA115dd749230fa58f6fa8ad8e8d67ba9c5bb561b6a
SHA2566591b4e84a48f610a1dd49c1588e80a2879a71d5c50d69bd33350382c70b221e
SHA512543696bbf7a2c0b58fd779dace8b22baa22e0cbbf3daa9b04a8c1fb59cead0e4381bc618f5883f849e178bedbeb674b41444a0fc31c212acaf4f11eb877f3c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5491ce2ba1bbd091b325178cf9588f
SHA192e99668aa23d02d6af20beff10d02bb465bfe63
SHA2565084ebd17823e5a78580ce45836fa3d3c056412209976580580f2e8af11b7908
SHA512abbde762aaf8b5c0eb63c11fe494a2af45e78249f32dd5c58210aa33ef7886a90550609c1708839fa2875e619b48b77b611b380a23ea82e283e62b80e46ad4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e778043eff70d5d4d9776ab0575dde7b
SHA136de24afd23e19940d2d7a78a061d0e4d9be7616
SHA256cac9d79deb7abe08df580eb0406dbb7efef7739bf67143123efe12c71d1c896b
SHA512f52d422e46b54f84b1c190bca79e2684d0cf1ef217fc8d9081375aacd0b953f828dc32eb82d218335cf0df968699652ee81d20acb500bcdbaeb41186d4e5e43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51091d46fe50d847e3aa63bb73093e494
SHA14aac814433a5f45d0b3b292e8b81c835ce394262
SHA256c309b75600fac81de5e4b589986a2629ba7a641460a8b96711ffa4e94c04d6ad
SHA5128d256b27c56c08c187b04c2a3267c10a460d66a0ffcfa98b2513f771c316f47bde01d0c1126177f5405135dfdad403873277067690dbbd03db59f4726bb255e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fddc6a7901728abbc872402d9e9225a
SHA1fc7ca1e4ca7242aa892d7535b8002a5de54ca23f
SHA256f50a2b955400d8f71b4236531232d523bd2052f3ad1c962e5a35870aea007cc1
SHA5120ccb0adf8994f63f2fa6844de4dfc46427de4ee62119c56abe59d0770a86615c57788e9d94809f8778ec2f3dc8be4a9437c73355f896dfbb0716b1990b71358a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a2f2099fd0d182111ada8598581062
SHA181d7473f9624ccb28e1d408103b110cedf016258
SHA2561a8e760d8dc14238d75d0d20a89458fe93a0956ce4c770ca73693b97833eea54
SHA512fe032386fe1c46a5086c0798329e632e683cbfd83ef91c1f19179d510a272df91093fc25ee671ca7f762f5e627584029f399b6feabc80d092a35e9d403efe407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1745cdab7d130421204573c6dd4dadd
SHA17e05c25e534ea1fd390f15136b00abf20904792f
SHA256737ce22865b15590e979f2d8bbfc5ea9d1e27513f5cf990ce32291d6f912253f
SHA512b2fbb4bdc9e009e6397b21875a13c6869e79e40d038b24d52c963dbe47007d6f322e2f44dd927da6bb538cf10badc20ae96c10fba33b30c5b49fc849c7357b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca53cf7c9bb71dd88f23a2cc1e0ca04d
SHA1891593b69a7c41be572affa32101094fef62688d
SHA256b9afe389dc9ee6348cb9293b55763e961ed4a16c492f4daa0745e82e1ffc0188
SHA51231c078395a7fe3d83b33ee064b4c818f974762708f5976de9bab54007d0607f90f236420815680263e61ae9e4bdf673013acc23d4a31768f48a1dfc5c77354cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ee87c5624cafe3dcb01eee71b4ab81
SHA12741141255367c3a18ca6cb5714ea347143d685a
SHA256d35df7cfb548316a649c18643c27342d565c654cda8367a2240d364fc7da9233
SHA512ca52c7aa93ff446ce3ea5c33738ba2f6f298a15199996fed837c6319dd277f72746f1738b1af28d8ac42d5715cd5a44491399d41042831b131f2e3e164b039e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b