Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
fdb4a37731f5c5a39aa1c3b523b6dbb3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdb4a37731f5c5a39aa1c3b523b6dbb3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdb4a37731f5c5a39aa1c3b523b6dbb3_JaffaCakes118.html
-
Size
64KB
-
MD5
fdb4a37731f5c5a39aa1c3b523b6dbb3
-
SHA1
77b88509273b5b553c0dba80c74616f3b3ab54a2
-
SHA256
e0f606a4b925f08066b8e608ae3a2877b173ddbf27c10bf2c7d658cd3623f5a4
-
SHA512
490dcba8e4bf4e5d67bdcb76292a3f2ce64f4036cd6c42869accaabc5330ff0b999a8367b3951a9cd4f799c6725f7a6090b92218eb650beb0579c747d1dc767d
-
SSDEEP
384:8Q/M4PP/h4JlLDSpbiF1JvmP2DHIskDln+5udtaN7subADyfntwewX4cjfe36rq:m7LubiFPvmAeQD7ayfme5cA6e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e57e291f12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f800e43aec99087ff8baaebeb0635d0f494a677ab6a45795644925eafc06ba97000000000e8000000002000020000000fa88d96a7944147c5e9fab1fcc1ac996e50339bd0e66e4541777c8faea83fe772000000071dd8ec44c45fff1399ca7e24808846a2af334e83ef80f821c921c06ba96b36240000000e0a669fb9cf8051cf783fea9057d6506f5bdd710e88b6fc93889eb961b371306bb314488d86b8005a2d964ae72ffd5afa5e73dc9520b396c674efbc6c9f845b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{533A1FE1-7E12-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433742132" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2176 2424 iexplore.exe 30 PID 2424 wrote to memory of 2176 2424 iexplore.exe 30 PID 2424 wrote to memory of 2176 2424 iexplore.exe 30 PID 2424 wrote to memory of 2176 2424 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdb4a37731f5c5a39aa1c3b523b6dbb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297f62cf6fa36749548435f22b3323d3
SHA1afdcd8d158a1db41025c13515602ac344f16bd1c
SHA2565d1a96aba5b0c6b453cf8efbb7147b7a68b5be6dfc8e09094200bcc851e4043d
SHA5122ed1c15fe88c36d7d5fc64c60f5ad85d64593784db06f30e7bede38cd0609c64b2ae18353ec11ef0d8678a222e8a225ae2695d282e7119beeb3423fe17db11f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1897ac837945d199377e4182d000b8
SHA19841db76a59039859eb1ebd2275b395de28d0072
SHA25672380653bc9f0069350fa9471007a834c812d7f0a61ae92558a923e212005f97
SHA51241ab01862af5779765c5dd4f2884ddc88693f8bdb81ed49423559d58cfe90a5907451a8210feca2143462730ddc8f6f69a3bde0c614c126f037d00e869203884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc078515c76bbeae3c70666c217ffda
SHA10e196f0c7ca9ccefe1ebcf70f55ebe737d35ce3e
SHA2563466d7edd0752dfdb73142e1d216a9e801260d831564317cc21441ae91b08dce
SHA512b52cee0abb1e4bd7dabc9abf499cc27cc28ef37c706e01d1da19874fc2f4c44d53480f202019e6612f4643d6f470647a2249f9f528f53bd1f28a33158ca54390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898ad40ed038fa3094526dfc12d2ac6c
SHA14e9c6330b76366632b493ef159e5f591063d7f2f
SHA256934cdc822ba565454679a3173dc4e43758bb8d8732e6697a671db8e0e0fad3da
SHA512afc4325e3eda31971901ca88310d4244a86a8a4e37e944e8f55c4970d314bb033ac0b827f9d00f52312b2bd6572649c18bb7cb6590d03ec3332dea7cc6ec8166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6280f27f928a67aa0a8c462b360270c
SHA122023cab19cd1ea37dd6d53759574a8fe97f7717
SHA2563b7d0cffe8c8221b46775a0372af3b5e9485b0b41822f5a7ae17ceb11879fc62
SHA51204992d73d902ed10e66a99f117cfeb7892557deacf3c489204e092d6eed447e51af5c5db8d1c25092b31abff8407727f5dbba3361bcb3faf83f2088235b22d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52332d3550bf824de79f8e4ebdd42488c
SHA199a5137c53fe44e5e511795120d48ecf718eb1e7
SHA2560dc9033a9077ce485c5dd0cc9dfe6b5b76266cb831a878b11b010c786d394287
SHA5128d277b0e2bf78904c3000e993834b60648cf8f0bd8df65e4891d29fdb80b830e068e0ae385130ae21b656bbac9dfc3341fe4307cb92c1a8a31c869486f08aed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50904b621b357dc05bd06762ceb04e5ab
SHA10b25c220779e2625773d4f39944d1d27a9a6bca2
SHA25688bb7babb951e704455021f785c8a9b3a8a9b1a7d818bd3df488641e54e674e5
SHA5128a42107a340c62e4dabe33c7b066c8fd8a0c3543242120980f4e2333b9fcee39a5b0b1cc442ad561304c2600469e4cc24d4eab4624101ead71a684102d1b5b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530563741157b5c6e6d458686e9bb6a7d
SHA1b857266a28b1cbd6001e3a90fe6d5fce33eaf7c3
SHA2568b11361fbc38c624cdeb6d45ae3a2845636e2dcbaf74d13a42b9c2f00077b2c1
SHA51214a12c217623e4a83a672f14850f946caa48a6e505c5c555cae17ec4451d63b8f42db191488f51aed53a53640626d2c60d0cea5ca423d8bd441a2c06bc452c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53876553c1517afb0784b225c87918eb3
SHA15b31fffb650cd8456e8b64e823ea6001959b3a74
SHA256d7da80c3e17bc5770b3b50024048923f8a0787e8f348709d518c8be6769facb8
SHA512198e2d0e4592a152f56b81f33f2055b8e4445eb082c05ec00c0fe512dc48ddd97472c190f5984642fae4047b1ffb6aa73001908f99790535d1519f1220acf1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ca49b56effdbd1c25ed075ad256f16
SHA1eab297cfde38bd5bbef2c1aae9dbd35679dc7cd9
SHA256e02124201936373324acc5f09ee2cfdacff63ac68471c4925241b340bae0cdad
SHA512192f46792814a20b73cdda19d168799b7265f085c911b69cfe76f0404e009b8f14dc6651768781163ac1469fd4f4cd6579bf33d9af854740d531a5efbbb852d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51700071e03d260c68d6e7b0036fdbf7c
SHA18e006690fc5377856123c8e2bdbfa7e9718c9fb7
SHA2562baaf0c0758f74e250889e9bfcfa831b41c7c14b5e8bc5acf8f1261ce0a14bc7
SHA512f852593686e7d0057cd9da15623f8973a7b05c691f75a0e85ede7984b213d1fde88097ebad511b4937a0a6a349a4712a4e2dc4910fe6ced0d6eab5dce295cd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e22675f5776bd087bcf11e9dc5629b
SHA1f1c3bc1b84f655b8a7c39e8a83263c7cb227c041
SHA256e6a40c895c811e2083299506297ad661cfd7965414d1c5389f76f356017791eb
SHA5120be33f46cd8e675add778ae48f2cc56dda55ad6b79ac14f262e18e69f93baa76476e283188833b37d010d0d6441c09055ab742bc5ceac8efae7b8c0cb221609b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571cc30fe0947409669f9fe002b93d2ff
SHA10fa5130998ab4ec14c7ff4ba561b51b10cf0572d
SHA2564c61c2b83e3102fe250803e64eb6094bae583a11fd8666035dc9f95f77d6f1d2
SHA5127aa7f7a352842c2d4d4248e6155592617157da4510b03b1c915c0d6d29ccf0cd8e111181dfcb2075eb812611b807b458f95d9756071b81a3d13bac4ab5bfae6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395d25bb7f97c3f45c0ed6c5af073b43
SHA1b91e714dea4dad9e0aeb5d8a9caf81ad36ecae82
SHA256a3da19c4336f8d1b5d3b7348c8b500101655616e520ae4acc4af8681b1b6ac8b
SHA512861d62d183973ee501a6ebab34713e0ba89b0c5d8be91782621ccc146948244c6d859a7db5181814f74e0616db61dc5c7bc5c46410221395926eecc2b5f0aded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7adfff9e80db6e801aca60698b4d04
SHA11dadb1ea184eccf4b8725708dc50e730a1ae7ffc
SHA256e51551fac6dd293af11d255ef0b3bc8c3d7186f64e351bfa3123d07107c6ebce
SHA512ef3d29586d62a4e91a5b03875ac6b7b020a3834a0b607f5962adf833ed958dd9a824f5c5573e163c7e98de5751a4f65d7f174a3b75f1a7b2e51ae81030ac13d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ade977e75be33ae198ec56e70fbb1e
SHA1fe9f83271cf377eec646af9fde1688d3dd2c6988
SHA2562c9808f48ae185bc612d80a3bf1a29b6d8fffaf68af0266eb8988033466ec287
SHA5123a864a385ba477cf2a57cbfd1b9f99fb071efcb68204c2b308efc4b9d7a30a4011697920b5f665a563324a32d2b8e19b8e5522503df38805fb8f31bb3a658bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56228920a5a9ec44e1f412339f40defa8
SHA18fe1a093c572e524edc3d84f12c0a77e997e3741
SHA256c4df03edc9f9167f3b95cd9a7d87bc3afcfe74d4fff0f9a7dc414c9e2c027bf6
SHA51232ac8a1bd5eb4c22c00f69f986b893c38249c63ad6647ca21622a8f9f786c04b4f3d51423534209eee47129f91c7b6fa4a2e761a6fa4349347a9b04ef7cbc474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f80a9cc469d47626ec998b3a224f86c
SHA1051f365420cc5eb451c84f2bd1ca13da7fb98550
SHA2560e706ae3166a8fae7f2d8bf931763597ecee59fa5ced8e55d2b0ac4e4f9e6386
SHA512f3310d990c41d07c37b1d87641232d9cbf831b9bd4ca0d506536025a5ae679ec836a7653aa032b68d6084d22d33ea2b54f30fc8ff211d71982bc0e6c7eac126e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42698e6f5e0b1db296a59dd7200c70e
SHA18adc85511fa5a67d855eef466f08768890325408
SHA256a887dd6054f0ce5261b189e827fb2be8b017fe4353c09a3fad7224c6acf21f80
SHA51230ca861e24fbceaeac19e916245698b6e39e6f0881d8a7ba2b3aa4a6adf9a0141daa25f79f34879b504a2506c9c5dcf54bd5fcc2305e50a86098b429a1032e0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b