Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
0072dbdba64828a9b59d6a8a5eb46437_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0072dbdba64828a9b59d6a8a5eb46437_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0072dbdba64828a9b59d6a8a5eb46437_JaffaCakes118.html
-
Size
138KB
-
MD5
0072dbdba64828a9b59d6a8a5eb46437
-
SHA1
707fcbe351b0130d1f17a6e762fa4b0e945d7f07
-
SHA256
cf3d462319847d13c600eff03b513006d67dc4e545541d01b1ea50c85bc4a412
-
SHA512
3dc6021b02ea9427d29c6e0fbc15a721b3503e08eb0d2a76037f219de062031c8d7e277ae0ee202a38769c5e6db20c5a503f58a4e8b50c7fdcbe247bd8b1d771
-
SSDEEP
1536:Sbl1CiS5y9+wsuG8O8iNlRHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SblyFyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d9f060958625e9279b5eb45a4f13a2480c4beea7d6c3fa6ec0e2064707836fcf000000000e8000000002000020000000c7339125b5babe1f0baf7bb6efc95d900966ee7d09edcc4da9097a7d7ec0ec0620000000c10c9366f4452c95edccab0f27a87dd19954abda6dfda94f939681ffde5daf19400000009ed6ef5c0ec7239b950f49e47b4a550be270bbb336a0494deed42bfbb6d4353735ab87bfd876759d9ec7f496de4f402ce98222765d4ce30fd06f9154a8a4309e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04b70941513db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433847863" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FD5E971-7F08-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2272 1292 iexplore.exe 29 PID 1292 wrote to memory of 2272 1292 iexplore.exe 29 PID 1292 wrote to memory of 2272 1292 iexplore.exe 29 PID 1292 wrote to memory of 2272 1292 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0072dbdba64828a9b59d6a8a5eb46437_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59154c32255c7b4a0deeb0e3a0cfbc335
SHA1a955350b154254b3f1bf76491a907435159bf6e3
SHA2561d4a98bf6bba22356fec2409613c096454bb1d9a487351d183305a83f36879ae
SHA5129a0abf14c639d42f418e5d3066a0fe23f78291e2a7a79293a6bce7e7d46ba83f04bcc54172241c35cdd002228be7b7b4bee3b26883d7b772c9c68467b56636dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52442eeb68a1a6d1f5a567f29ea8c365e
SHA1813c9dab71b33d6d97000ad835fb50f01d49816b
SHA256373be911205ca727d8534599dac3cecc0b66f4fda9581b7ebd3e95cdccd6c914
SHA5121e6ad85fd2c91a9267bb1c82777fc37748c56ebd699a4351c69fd9aa419800d60351c910f1e4f9341b77461a9f7b0a739ff456832307c76d0c48394e756a075d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50354e7f1ff4559a924931c86eebfc508
SHA11e7d269e2ef7c18d3fbb1dd58a946f57b553cf98
SHA2565c2460bb63f5b191d84b7bcec07adde5458ebbc19c56ab8e0eab34ef551d4504
SHA51220f889b4b9fc5aa562c43d1e3b6f3c027b91120f60f5108e6c8190449afe36754b34a9620c145537e17d68bddb459d270293e82e067631ebf30d0f5835c51984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e236a80c27fb829b6773dac07e60cf
SHA1e97b65112c72de1be7a809e0b043fd3f5ae1f9ef
SHA256734260eb6a01b15f7ca0996cc0592abb4fc0beba481aba55dab1e57233377d75
SHA51232e5e11af231af2c5e09a9a4986dffb355cd07d4d71162e5670d4f6f95fcb18a05b0ebb30b34c9726790476c4d9e9948e61062358b3ddf4021f8bd23dd3a4e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0aad4ab3afc94e6af37907f2f7dafd4
SHA19feaa3527f3700f2bc3f06922380ff44a1c0537b
SHA2563f4fbc0d9f6049dc69a4fe022096a44707b7633d7ae76b9baf0cb750a90900d7
SHA512abd714b85ab24c08ef948e643693d10886dcf9d266cb7d29874896379947ec97d09305c7fe351313e6997065e3626e8ac6e64b14372223e9b60a0d9f8eb50d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775a4bce0bed721c9199fd079e46483e
SHA1ff033af423a5378438cc83930a7469082ab55efe
SHA256fa6c5934589ac0e2765ea000450b868fa4df0b8898323f1cfe6c2e7ccb3b0147
SHA512441daad9338fa5b7ddf5529241a92fbebb58a1faf3403c186d6e543fa4aa4f201d60af658a679b8731db3e18963da12c04fbec325357ac37af54d23feb6aa067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3be6baea40152390070f80ef70912a
SHA16c03967553b806cdcf76e1f54f397afed730fc62
SHA25634bcc802a5a50fd8852124fb122215481299079c54e9f54f7d7819615bdb373b
SHA512fa11d95364ce75b044c80688ac7c77794ce5f5abf12c17b6d58d2b2c1e41b5ab5df68911af0d10e4c8a00f4a943436325cf4d4dbb6be419ba4aa19db42a02e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b20abe425d111ece928f9a10b7388c
SHA1d8d31ef36db486c0fd96f8cd59898f61c607356d
SHA256cf301583e4659831a032b5b8cb8e429572765d0b4cd39a488f246e1cddc9515f
SHA51220805b12763fb54d636da2cdddcf0d993c9870a67f96a99154444e16c3c13120bb04ecf98eb30c0814cf634ad8c1a32012e53c0c81486fa31d578349003c64e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540561fdcbfb615a8f25b7f1360920170
SHA18fb213f0a0061e9ad953d63494f786a9b7a178f1
SHA256b9296ba80ab7414c125a8c53e2ea3ec31d5e1490f77f0cabea344bffb5b1fdfa
SHA51285949e5da813bbb90bacd8763fa676a39e76badf4d70521227b2fa4434efaadb8f67ddab6dac0fc1306e021f85071118ea9c992f9d4caaa6309bddc5e0def7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eaacc95892f87f38c874a71369fb33f
SHA186ae8e2bf1be75b1022fbca279cc0c7dd5ec71a0
SHA25648e7471b9c14f3eaf6bba4b18508b93c839b10dc82e9d418925ee11c84e30d33
SHA5121d06e7d161c51543fcf6982235b0b577d6f25035a47a05ce4d4a6ca67ce83e2038ba6a68167e3f1aeadcfbd10e881b5dc41235fdb7a88ab7974e0a8999a46207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25a87e3b9fcf03029c38961a922c23b
SHA133d145141e156f33a4017f62f553b22c4a3c90c3
SHA2564c4fe333cd8d62fe79ecbf0bf17968d8b76fe7758912942a71c2d06de965c40d
SHA512118bc860524260781b54d71afb7e81afc5119dca2b960617b3dfa7a8d07207d2d67535c307e8a3a5ae77f87e7c0c31df7e8cfb72f0df0a320fdb44ac27586ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed13ec3e51f62f62608a050a3c642958
SHA1b628649477ba3a209db1391f7478fddb9e93b5be
SHA256ff33817229d2c595d393ad74c363e1761567d0e1a62f864731634a3f5d1c7427
SHA5122cf66a1c9da1cbcaefd51ad46155718f7f295c4066f1f5bc29e2a7fb0b11bea0a104f1b2255c44807a27a7c622871ef2c6fbf9e4a175eb4791ca672b0b9a5e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184a987ab3bba61cb61ffa02ce0da295
SHA1d94a552cb1b2f72140064099f8c1d9aa330a7f63
SHA2567838445c6752cc5460e16ddb0bac0519560c221248a9a189d0936b45e5355ec6
SHA512db6845d720e051ae0da9e802e2ed0878270bbf9cb374aa433ff8fa65cecb0d8e17b59cef633641606f166ec2e34fac02737d92b2c569b3e10f1cac57af5c3ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d288aa831b32ebe8b648172022536e91
SHA12549b999bf3b3a9baa9a58d1b113a349dca117c0
SHA256e561a04bd1b24533a77c3133192ca98013ca11791e2fcb0e9b64bc8f57075b29
SHA5124d800680bbb418aa836aecff2313013b1f18d04b6f126b06ae59348edbadf38abe951b9a2f2523dc1e8606cd8e29b084386a5f7cf8681c514c699c359f89fef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638aacdaf05b3e10b1a6d88558fee5d4
SHA1448853b972a7268e9901507d54b9b28c8df83dad
SHA256e788acc9e98ed1dea5c5dba9335dfd0e387b4cb4cda7a492810ffc7d291d9632
SHA5128b19dc82e53cac7f9fcc7c9a70cd53eb8278c6f1e7ec1214624e4f00800d1cf0df5e329255ec0c9b3c0d803ff230a47ddf16073188242840c258dce347e8bf64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e44bc0125e5a3099ffda8696a5e00e
SHA18a9ef845274d3d9bc99fbdc719fd5f5c501a9a62
SHA2566ffbd247e503e8c9809e511a748a53059109581765ce2c44c6fc348b2d5392f4
SHA512313eb8e128ee289dfe24c8d1beb475bfb737b02585fddf2f971b3770f8e09ad534f4f5cfc7c15518509916b0ecd78f634be36816d6f0625dbfd4afb0bafffb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eede9fd8b30c08b60bdc6c2d254e5b8d
SHA1bdc3d33f7e5542b9f3fec9300153a69028f7924f
SHA256802511b09a00b9357cc479f8c6792caff513657dc21b3bae2c3f77c8d313feb2
SHA5124175656ee47803f23defc1d1da8c02735d1fa251648c6be73f3d2b8870e593a411e34e1294e5b783d8e102ef178a4c2a5ec32ae55c5ea602de94848d1370fb0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58825bacbcac3d779fe994e2451c9acdb
SHA105dbe6949258fd03ee47d21e1dad745aa5fc82df
SHA2562157ce5be4800af728311b127d532d75358015c8b38bdab623c7562a83556ea2
SHA512de5bd53e6ddcc836002bba340395953f8758c2ea54eb3bf754ee30d36fb28f04a4a1763fe26cc4554c5d149a480b9bbdda7ceb3cea15d8a8350ea886a2fba2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a954887613fae1c350a99e42aeb95b24
SHA1128d00f310e6c42a7604a8d6b90249d8cd19bf10
SHA2563cd8f7c439c465232f43bd70830b36aa5c29477f63cc753fe8faef660498dacc
SHA5120d2e530f0c6f8838422e5ef4e4ba017356999f808ff55c9d512f255ad58ba56a0892e80c98a79b3c6c2ba532f21a8f71180a11c41cdef20f919ac51b477cc9fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b