Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
0db916452902d06348a1bdb3d460e70d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0db916452902d06348a1bdb3d460e70d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0db916452902d06348a1bdb3d460e70d_JaffaCakes118.html
-
Size
138KB
-
MD5
0db916452902d06348a1bdb3d460e70d
-
SHA1
3d2e5258220a7b5b4900f9ae2f1f7617db1d2957
-
SHA256
adfe9259a02a9ae51144821457ceb28805499bd9f30b870c08f3d7c54868acd1
-
SHA512
afcf0960c1c4f699d9857b05e4e12ae719a3ece7ac20471dbd3e697cc1420833db46842cb50606a022b5f479acc8d23627293e78a9635cf2497b02f2fa5bfb96
-
SSDEEP
1536:SO1+AlYFvjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SOwryfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55FD8B31-8138-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434088310" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000012271296144850fccc561ef3d5de248ee55136f029e9ee9d98719e272fc14381000000000e800000000200002000000060f7f5ef8dc4ec28ea06fd701ad07a3efa9eb9e6fa9ee1b16c85405fbd9c6de620000000cace43531411574e66de019dd0f4db8e3b0f86b54397821b7e040fa675a94f4340000000401c7fdb24f652929d0f5d8b8b21eaada2235398f9ec9a33411f89ee0010560ebd6e8a5dd806751adaf7ea4ba75bcf3a8cb9e19318cc932249a42526e3618ca0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807d2e6a4515db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2820 2232 iexplore.exe 30 PID 2232 wrote to memory of 2820 2232 iexplore.exe 30 PID 2232 wrote to memory of 2820 2232 iexplore.exe 30 PID 2232 wrote to memory of 2820 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0db916452902d06348a1bdb3d460e70d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5e644431e09ddc7e6e296d174e8823
SHA1f19dc0c005c79394baaa09cd7e52ccce0aa7b52c
SHA256d354fa4645f0ac8bfb4860b62ba6b944a19b95026391dc2591ad3c096f71818b
SHA512d6ca61bcace186c8d70b9ce199f93cd821c6eb8386825285e2ed9440957424a5e791a96d56be8a9db1d1c596aa13de6fe0c2584b01153f66df8cba968a76e8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e72dfcc3d864e48c7929c1587bb9b0
SHA1aaa6f8e1b0930f82c9676aa9973b1bee599d0a11
SHA256560b5f93bc623a2d7c3b814109abb76b58054cfec908cbff11b09f6dce2c4a5f
SHA5129a6bd94a38b1a525d235f454480a8e19441d33be3ce68803f03cc17d45a2ba469bab86cb63baefd4893889fb49dba43dd402aad5f9e5eeafb718c8ee5bac842d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56941802cf4c6e2c54e634d64ec00cbfd
SHA167b7c4bfdf16678773555272a32a53446602c504
SHA256b779ddef5456effbb368dd440d3912976ef842b835d92cbf0df4754efc7943ce
SHA51215c6b9a643c656624eb3b1b16db69aff0f1129661ae6bcff6487f7904a7a346d25fa2bd36a14a807ab607605a96a10319ae8ff2cefb34396f6c2697c68e063e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee62224ce1697e53ebed87f726ae9b3
SHA1b84b691428f8d01e52d32eb2f1cbc4c8060e6c59
SHA256823e6984b087ea7118d7b5c49913c8d2dec488c4ab7228bd07a1cdf7c9578f58
SHA5125117a21f66debf4a4aec6e1e43d23a6009fac3586beead486f3c6de379c368da5a31b153968d49c1fe2a0bdff26af5e7ec6e2edb949d0a259d676359da2d4bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ae50002f8c953e3c2a90e64a4c8f2d
SHA16216c36ed363c5f4208e6518ed232de5fdabed62
SHA25694a5cc284968ce4010b4d67f37deed4c6bfce7195ad23ea0fc9e633e3147de1c
SHA5128c3c6e957b6c1e11d8a249f5145f0a3c3d36ba795dc83f9231cc7230b8af7301bac38e81489909539ec59839563fa00b96bdb9e6b0b067d7c49041d3b3648f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561547e8f1de830358f8dca4f735d57bf
SHA10e32c31f95293c579965fa97bb05652110de9f89
SHA256eb4ba54401ae76ad9043514b34f703f20bcf8c434842e7c4acc4fb4a59cca3e4
SHA512e1f675a4ddb0e74b31c63bb825048dd84569a390a4451594322bc810693746d335f4ec518f97df64a8e1070aa96d679273245c25604983f4780dbde2a9307a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0b1af58b1481ad97a8b6ab40f347ba
SHA17a4933f43d1a62b1f9c6c80250c0f8e944a78de3
SHA256c4dd0434fc210e8b41b0527e1bc8f6f6486f001a0edbc5ea754c0b4c07ed59d8
SHA512662d3972e178cf9608f83dea5fc29e11ed4ddda2127dc745a0a241eaf42dae0a4c2ac0258a6a55bd4e206b111b09476a60fcf6f15559c6a586a50651e01ac99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd9eb3377d43c7e3bbdfad6da365cfc
SHA175f5cc6dec47708e5b5b511a05926e9d0203ac10
SHA2560eeed2d5bd34ba39a8e3da0c879b2cf3872877e656740596a5e867dd637a2c37
SHA5120d55d92ec74f04842b83eb845b95e9668f40cc0d3a3391e611b2ec628bf52c139fc32c581984b8595664e7c17ba7aa14444372e7505b1f6d61888377a4dfe19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab35f6b162fb6d3a03e5bd735d57e060
SHA1cea66c796ecc8ab469c53a31fc57eb2ac4251c15
SHA25694546033380eba6bdf44a731aaa404bca2c544ea100de9aeff324ec3136839b0
SHA512b184640347d6ba56676bd38204fd65ff8f8ce9fa245f6c4b12435806339c6f7bae82a3b3e5965641077a59feeae152ed3bc944537c4281ad72953617370229a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d001234d9cd23f8fdbffd8b5965ea6
SHA109e63767273911fbaf25d0b5efe021d4084efffc
SHA256d3863704742db2552bfc92fdc9f5d1e61d47ba33564831fd76d56aa41dc96d61
SHA512fe51287cb67e832b22037005906f6e960144f2384585ed3548e6133809918f599c2bff9d18a923644d9749d4ef8938f71bc8c581e8f99939a8c6561b25ec4bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c889cdba6f3631361b44e6e3f3f58bf
SHA10271fced00895b7604ebda6d0a8e900cd18c82a5
SHA256a103182da1e0a7c4225feec5f43af9a60a5948d903ea2cf555fd3e6aaf8b2a5f
SHA512a0460e5fb8d8d01a023f3eeeddb880a07e5a795dd5e7d5cd9908280f90b408dc5fa13676cfeeace8c768c807b11e6ada1c0408997f8a0ce02f49aae5c8a889b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845ca63e757619006ceebcad3746c180
SHA14c2d43d45bbf95af2386b1e76cc5c6f1dec267ab
SHA256131445c31f94eb62d0bc95ddbea525ae2b3601b5a20369308fbb19b78584f915
SHA512eaa684e51de761d2681da25e362532af08b91efc8285ee3282c72da10efc808b0ef86bf4ea73d61039b65fe18d97b0b843bc4bde8ee8b56138062d37a6d25c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a743a524a5a54125d0d99ec7d6a7496
SHA1b1d2702ce6e7c97d0cd08dda7f5f3b409dd6b91f
SHA256f9471d8dec3c3398491847d942c3ce574a3b53478ce87f26779e67d49ca3f2e4
SHA5121d7373c49fd7841e75f931976acfe3d87f91c046ca38cd76a4a7d1dc2e4da3c16706b0934cf0929659930a75d5f6bcca9714736c1bd4e1f984390ecf2a4d5410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a0cbf1a9b852119000a8de571cf7e4
SHA19e68400aa5730905f2e9f0c02d9c7b1b4fa0847a
SHA25692afcca32c3b73a857a02ba9e1c0dad19270ee11fc871a7eebe0c5564f269df4
SHA51286e6a1850644e2e59b538aeb3c6291a03a7fe202aeae829136ceb5450395d5e511370554a1aceb021859d8129e0fe8c08f492ed673dcb047eb4ad32e3f3b8ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59609cb20ac862577e569228faf79cca2
SHA1d494ddc5713184874c26068c3042659abcdbb09b
SHA256ff88076debac85278491225d8ba5f3675cfe26ca0346d7e44e26985ae304e2c0
SHA5125e5b7aa6cf9cfc4fad7b5d69b5e654b8c21fd5c6501e56ac9d2dbf895b9ce3da0a611ead27a61a092b5837d8ae6d02d68806fa45e8a53185d7b1cf65a7bacbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93dbc33d11f3beb0410be9e3397ee5e
SHA18f4e8eecc2628469199841e6edac9404d196b72b
SHA2566921cdbb78d81ea2a70fbfe12e0ddad96b3371be2274590b50ffa6072ebb0005
SHA512dea3db2af23cb7f0d20c303f25aba889c88e4b83fb308dc1f3d3fb5d22af78ec4a98bae3db8c3d371c8799d93d8008adefc02142ee2bafa7481e50f06039a5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690dbd3a758b8bb15c4bcb5a3af82b2c
SHA1efbcdd70791b2213c1fcbb739ff94fea7571c7df
SHA2562a7280e9b38611266117957c3d68b914574b3e3579e915a532684a1c30fb62c2
SHA51249a69c413b6f1241f14b66fc7d3991f3a5caf17cee19c3fdd70594908974b6e693d03b0ed8155f634c3f5ae0ec6ae3b2824c2a7a227c7823569493b99c5e51c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3151b7645f6d7ce7c18a368ca0e682
SHA13ce574c653ddc68d2ea749961caaa0a1b57f6a0c
SHA25684e52512542a86daf9d49b363eef7693f847a899ea4ee57c9a2fa3fb7a16f6f2
SHA5129cb7a9fb5284cc178c1602d35d4bef9cb29ea46e79473e278f4aa92b43ceb457dba9c7b835e0f4ca6b8e38ba018ee4fb6ee4026a013a8ffe40f0f4aafd75ac6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e23585fd5779d4e29ff300a66cc8eff
SHA17d0d38542b7c72fb797594b0962281cc34dbac9d
SHA256cca48d3437e7560c8003275cef7cc583cad4d36635cdffb9ad5a695b2ce6dcc7
SHA5125f8001334c2094b81f0223cc26f3ba523d673e9329700bb693e1b4e7abb9e0178db0d7da18e33493eb20a28b61b507bf9f783cb0e7682adfd90af3a5860d676b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b