Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
084171f5b9145f9004857dc183b1b4b8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
084171f5b9145f9004857dc183b1b4b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084171f5b9145f9004857dc183b1b4b8_JaffaCakes118.html
-
Size
37KB
-
MD5
084171f5b9145f9004857dc183b1b4b8
-
SHA1
069fd1bd539badbed05e9a227dfb8510c25da11f
-
SHA256
a43233afce637ad62aac86d171e2d0aad0d9155df19eec4b9e1fc950b77cbd44
-
SHA512
ee3305a5d0fad9a5b5d29041846f0dd93617161e86ce93d753cfe5fd59c133b822afabf89f3856e9fdb7a835a6d91e713c0fbabf9723b733b915ae667fe9b4e6
-
SSDEEP
768:HlLlIJbVrV9x1/LCWYOXmQ/oi8coUCOc8copt5eO9Fd9jNQsdWuw:e1xRXRfC6Auw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1166721-805D-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30592a876a14db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001e9d13d46251057ec96ceda62132532733464f58db9c0e200b5657e626774619000000000e8000000002000020000000024dc9fbdf1fd035878f01f36d73e9ac04c6bff65dc22fc958e5a7f6aaf2b8a520000000eab79f5d48770ec943b16c7881da445afa23136a475531a848e8ecc0eea002774000000050de1681920d1884ea7ec8f835dea60736c81215467a0ceb67bc6d4a842e5ae2de0a66d1e6bd8dd9b89e622af840f0cc1a0f771fdbe872c6b40392561f772aca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000078bf5f5dbf24881fa7810d8cae5ef19e7d47568b993b1c4b778c12ff5cc78c6c000000000e8000000002000020000000cb369cc9664523164be4c7986d3dcd63e23e0e5b70d9d244de4238a24e8f785790000000c2da1941fd5187bfe7773530375a601fe45ba8d68cec00ce0fca91a3bc6dc17b579d0de6f688cb1676fadfdb4eaa0e4318ee5fd71b6685248b4c8206140073ff037f34eef8a2cd95e7f5120619feb10c36e92504a6a7d1802ea245dd153a91392e714c690d9674e525f2268e518c118f29e269e4c0f9a5d09b6361a0c5e971a503da6631baf3984c553f25446f0797db400000000a8b77326462a1bc5c5af896e2b7ae26cfa9fc16e2327b51ba12c7d4ac4703a5513b75ecae22c8a192064f66618e062561e1197b711df090bae33925f8c6cbd6 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30 PID 1452 wrote to memory of 2376 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084171f5b9145f9004857dc183b1b4b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a3ca57be06bee93d0043732e2e997b
SHA10f598963463c658ef9b0e04370b258144e6c6c62
SHA2564e9c484354477d694cfea60b897ee262846131a90d29d18cf636d449dbdfa299
SHA51267b43c1acd9ae23893f66499914b7f1503811e7b548e25fa70f283f6597b54d1b740e0d9831bf001f06b7fe402056130d7de5af8c9af40b0eeb401a505ac3d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63c1c36183b767e05cd9d3121dcede2
SHA1c8eaeb2dc132996fffd5edbf5a5d8999c3862110
SHA25697dc492abe64d890bef45bec4c4e7ea596ff0c8e8b49a281cff020457d8999b0
SHA51273f36f352f81e1dd9a28ebf19c9d97c4d47b2e96801ec4684163f85b2b82941a410a6f61ef0f98aa270c1fcca02907a40ea127fd00f4cef49c4aa2af357cfc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1c82fbde8da9ccc5c52385ca11cedf
SHA1fa126184a6b1966cde89d9be109779314632ba21
SHA256c26d05cdaef898f4efc1888d452dac794bc41395d90f31e5776f9e0f68f79c1a
SHA5126b14882655682c9109d1eb0e08c459b5fe89b1700e21be97904b25a78fafb9e45eb4ec97b80d6bc69bf957c6861619d7e334302967800c10947e232d6237c7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086cd3cf1405e545611994421ee1e5a8
SHA18bd2a053119b555445af2b8445a65e4d3ee4fee0
SHA25634994aad87ee1b61818042b32022b06d6d826798a10c4f0b84c25074c7dfcbab
SHA512f160c75caedb951f159922c00dc27bb6a56c0591583ff7f53fdfda41c1dc45c3106646e6f52cf98d8024cdcf8f603b5caeb7627c323ef9b0505bfa3dea7c1c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5500a5155f616065dbfd3de25c02fa
SHA13660c3c9fde255dac76daf84e59091f227e858e3
SHA25610d3f255ebf0575897fdcc69a6d26fad6237fb42ba55beae689367cd48eb4faa
SHA512ce1b6fa2bd5138c1780380ab6987c80fb89319bb535dd8cc131617d5c88077dd209301b8dcf7dc4f065b8691550940900a4c5d96fd06c4fd3e99547498256926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a6142974fa4d6b804600df383a7c6d
SHA1e90af5ac34f757e46570c4e543a8ba39c90a9189
SHA256d8122bafe00528340037fde2abc8c9178a472bf411b311a8fefcaa8109019a2c
SHA512eb1d06fd0704abe4eb7c57574aa550ae03ead4aede855e2e0b5d317bc6819ceb0c31e7ed3ea69ed7d3a1d9ba505f8929b0d93bb753c2b9d7b49e802dd78ed0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00a0d7e83468c7da1ffe9bffc41e477
SHA1a8a4228c04810d9989ab1ec874a43dcb2a95f997
SHA25613ee49a4ce0bea86a5102e1c68afea9baeb54c8f039e9c2f3e340da9bfaf9cb7
SHA512229ad8dee8ec7b83120fda27cb15d499d88db88312fe5cfe637be5759444e0b1c2b96c2513a01d30cd3067e3a414bb917ee94a14c475c51b5c59973754c72efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cec911a0ccfd46b6b5a374f9efb25a7
SHA1f285aa908d64b4ae060fe5b4b1008a3baf30d657
SHA25624a7dfeed15ee218d141da48efae06072d5af8ab5082d07d18e16dce8a1ce7d9
SHA51282d9f3f73c75b26994933f9b7c3ad793f3bd8b9b2bf756f3b5019a5d379b17e9f1e7cce81f0abff0c5af4a3d0950eb83890530ac16e7baaf2a6452d4d1e3b25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579da75989593fba037e9d37f5102e8e1
SHA18247367f6692408e16d64728809cbe5b43432f7e
SHA256d3dfc9d199ca79fc6da83c53c4c0eb111ab8db460a18622267404c914c2a11c5
SHA512e4d6d4d3267f236a6d7f28de57964f66d2ab846f4251b5f425e426005cf5ac2e34c584f20bd251b5c2b553b04fff3db6e0cfb4fabb4f7ece2be700ca8a9626e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2abc20c0d82e5a4a3a5d572a4892c7
SHA149bcd15d41167c6722c6ba1cd112056362ea0262
SHA25624e562dd1e52bec43fe4c6c1f3e2108db396a8a53cbeca13de444a0ebc4b9c44
SHA512f92c30df083d4380a9dd315ffd935fba88dd7e91d4b7ffb0d651589bb792b8bec07656cec54f3eb02930edec9ecd2a25a559f54f22813956373dc1c0297c1e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f6f7642d6fd710a0e954dd0d4e0667
SHA1acbf59faf801c218f892c6d31507028798480541
SHA25601d2e87f1a3cd53cba9bcbeaa87bc6c37f85d9cfac299c1e1eacc31d12e5f4e2
SHA512929a807db68de7847d55e37efb97709660225a29db3193b76b1454a5c2d8dcd297ef60bf7cf9e61238e2af7496d7ba1feb7f8c6a6e525719bf4e680e17024f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9200c133e7c81ebbbc1a90a7dd9bb51
SHA125a45c49bdb3cfea966f1defa3505cfe77002685
SHA256475e27834a8d409641a66a48ce36996d4f1dde9d2402a99b7ba3219097ff2ed6
SHA5120f4dffabf279a3a2021f25ad28b592cb2368e21e66a73c3d6a1e1d7bcd44d19e9ffa387e17f608a40a6d33c8c105ac4f0e3f46e7bb6e5ca69e44732c2865c0ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf7f9e0c88a0e1d654feabfd5fc5b69
SHA16d10226e4c0618ba5ed263cd0ef02d40092aa3d5
SHA256fcffe2e3ab092e5de5ac8a16aa2a2e1fa9d0689e18a0ccfd5497dbcdc29973e9
SHA5123e26bc921dac40cac8a60cd43950645041c653a2506ba59b26b8bf053bce62434557e99d7a5310869575f8a6340b6e099b7524d133e8f3a85851cc547cb1d57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d681095ac9364a430cf4bfd7e057edba
SHA177182a26ff1a589447758eac676f76ea353d4a04
SHA256a24c24832237781ee4a335c006a095701b6173b83a2b6f4a6a897ebf27cd3f3a
SHA512589ad5961a405d5ca14c86af86fc27adbba1e1d4905e72b5be000af224e59c3a9e351056fdfebbf4848b3fb4180be3b47c686714ad14450b75d0b814d2202c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be27c96a61c76bef44ab7fdada2e0697
SHA12995cf841c7af769b70a81372dde2e27dbcb268c
SHA2562706ebaf609a600ec0906719c3eb7d31260c66194bd3cc05e521064de7b8d5f6
SHA512561f52b192c29f4b8832f23e086a3a972fa4ab2a19d99b038f1b834b66ffcfbdc94ace92c28298627e84ebb75591d768755b982db7fae29a569f595c3dbf2d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6498ef51a735602eaa3232ac1e07c29
SHA1fb786ff7ed634dd3b1222b11cc281d07dc4e44c4
SHA2564f759c555d52ff8cbb625ed669f88e1ce27e6af923c5e244d454b7f17b031df9
SHA512ed05baf25e4f18ceb7c77690389179d082112d486618bdf63942884f0e7de7b491a4f4713781813cae0b4b668ba276cfec4bea98cf7dd0a53ce9f79f15629e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839d3a3984c5214fa999f5a08e925149
SHA1bb1d27aa231632b33828a8749450138386eea080
SHA256bef332ef6488cb25d41c26bd311f26f84f56a2431d071d89362348f0a89ca3fe
SHA5127fd072201f4ec0094141d0a27a3f720dba44ff301db1ac47cd634144ce7835cc22e6d4442624e3acba2759436e7b8ad81e4aed8831bf08fcfc2f026fb2f7cf04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542567a8cc35e6ed34a6319a6f01834a4
SHA19cf084702eb0ac9bd725cc2c05344d1e4bfae01d
SHA256b41bce9ad3186f54972e576a4626507018fd6ded817594087d1472a2cf81af2f
SHA51260b3451e53513fa5f1c1d619101e819cf37944114d2ab6d6909768ca313d48211d2c733e5645a696ab133b905ddab40d0913ad62fde16ae8eb326dfd1eeafe7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6e2b44d54eedc4d2ec35d569bdfb75
SHA1429e09deb50fa29fe018a3e0464f5b4f4965f2a0
SHA256f8d23c2cd29a24c3a38a6a6904fdc30501c7cb0430e065a1555fc7280f2c7f0d
SHA512207f1d623c38f344be13dedb6aff2630b268b84d68f0e0cc5caa3c5789c1e48d9063cdca0a5e4e88aeb1ef63d83b768571f2c40d1e274f710fb0f16cc62ddccd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b