Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
120abc70c6756f5f447b0f347c4aae07_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
120abc70c6756f5f447b0f347c4aae07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
120abc70c6756f5f447b0f347c4aae07_JaffaCakes118.html
-
Size
53KB
-
MD5
120abc70c6756f5f447b0f347c4aae07
-
SHA1
dc297af19e23723262619fbe402e77094e2c778b
-
SHA256
b0273957c1399c053c111071659a5e0c9c0129dd514781bc602d61d236e69d8d
-
SHA512
e544fdc845a40a0d3f13d0c442a41d86906b7d9c8d7982ab6a0993a1637cbbedbff9bf8300684821d07e68a86008648015023ba68aac3892b471b3ebe9ccc292
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlYZ63Nj+q5VyvR0w2AzTICbbBom/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUDrunlYZ63Nj+qe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434181943" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000085660f525a54bb22f36550816c15b865c4f484d7743ba677f235c67cf5cc50d5000000000e8000000002000020000000acfb0af3dc550f2a6e1bb6d6f8483e76037b1d01cc3c8e0aa7558c7d12a6fc319000000067de6ffbeffc87ac4a7dedb70f00301afa377344a9dbea54c572bc24c3694a4c21de96eb13cfd55adf73e52ca6c04abf00afcd00d22a3ee72ae9f6eed6827b5bbf9e0d6b056618c174d901db8f4043d23eacc50a94e43f4332d9581af1ff533fd9673cc7d5c98fbf0e7e03e568917feb5b8dad4ea4ec467d188957d4328121e30c78589acc7d24da6f8670cb6efc26eb400000003c48d293ab56756487c6e1a1de825ebf0329f5be5de373565a656ebb21f55886d308203659ec6d49e827486b001f776cb141b9b4aa1d5b95231c87c5db01d9f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57149E71-8212-11EF-B467-D2C9064578DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b6459d44d0b3e4f293064ed4061b2eaa9285179d0c83bba6b3f7aff3e3222dff000000000e800000000200002000000037dd53098268d519cdfd72027425811d372bb1019f16e750765c4c6d82a94c3f200000007cff4f3b208d8d76c0288f2436ac6f17d48e852952682fbce17d04588a52117540000000b85952889b7e329e82f8e59d02cc4600890985ddc319bb0fe8348aa0ba9034d6187178af2c138cdfdedd292d8a2ea47857ca729ecb1cf3326c8b306bc3ddad5e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a0632e1f16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1412 2568 iexplore.exe 30 PID 2568 wrote to memory of 1412 2568 iexplore.exe 30 PID 2568 wrote to memory of 1412 2568 iexplore.exe 30 PID 2568 wrote to memory of 1412 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\120abc70c6756f5f447b0f347c4aae07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9217203139596b48d8fc79f7141ec3
SHA1296dcc53a44848b0a9efc5620be9552e2083cb77
SHA25666412d0a6c94e2e48de37b83f967d697e18ccf3e4d345463f153f168806709ea
SHA512d1997f8454c9e17a8c70ce1b05b5f58890a6252c9b6d8536630e93cef19043d8089cc69ce0390285b7fa2c542e98701b2d907fffcd95912eb5f67079feb23432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bcf223b1f8b57a7a719c5b5e266fce
SHA1c81904470712fa3d16f7f9be7d6df0f7ec823819
SHA256fa187596371f3bdf2ade8ad957a2a09a4311083902ba12f6a6a047cdc93eb828
SHA512e2345ca54985b93e4c87dcb7e508864ca4c9fd14d4b0989e8cd2adb1d3cd95417e4e0c2e2c10fc6bbf89e4da9cc5534f950db1bcfff447d194650200390399a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc48ceb75efa1f06cc322a4834fc3e7
SHA191e51e56b6cc3c645a045491a629e7e7d2f67ecd
SHA256ba329350673f44585488b0c67dd80256efa12c3b56d71dc9b15e53c60b852761
SHA512ec6f1c7d18ebbc927fe1627057563e54bae4d92242bc02e33bbbc3355dbc89bd9d3444dbf746274dc6a45d5f81856743a16213f2319e6733ebbc8d1de149044d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566cc0811ae20edcdbac87ac0040db17e
SHA13c720f8bf899d18e1c9e5534df1373a093f04c59
SHA2564aff4b629614aed342df2c6d9bd9d4d3f54a1b3bd0d7111fdae87ebae285ca71
SHA512f0db8de0e97f9693eb67fb6a47bab848fc6dc8f6ab77cfae83ef3f00c7c2f919ab9c53267431dc5940fdaf72c381894620fbd4cc969dfe1bb36cc5be89f439eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a90e9dc3a0f413ff86688b23014a01c
SHA19be2c57b1d1e8b4f88b8c21db9e908f2f3269336
SHA25619153c9c9f311e667f47185920a4c0e789e33549b2415ec26676414b5e75ca5f
SHA512dff7b00c3a5918bc62491acdaec9a65c9816ce28e8367bc436a28d28bbd0aeb6029f07b39ee5d681a869ae4c98218cbc1e6d92ee16b3a85c2f781d5d9d1b8377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53433b4e1a729aef41a2bc6305fac0d73
SHA1070b998a8cf5e21cde5763feb208f6b00d3f7454
SHA256ce52b03a212659a7fb3d07fc6b1a5c15c56c3a017bd9471d6952258ec6ebb69f
SHA512f211d14f99d5d7368ef3fd3965a015951940fdac4e23d77ab32e59e6bb6a9a4a9cfb3a6d7fa4dc679b8d6ccd39392aa1c907bc22f7e1a1420c906f97d40a962b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca028faabbcbe7a51befa8e415f96b1
SHA1da265978685a46f0641a0193139921f51f1de171
SHA25658a3a67360a9a08e0300caf9809892d9a5737cbf8f50e5b59390da85fc1bc69c
SHA51206246219b8034400ba743ac69e77dee5e069884696ca71de61c8ddf160b08d46966f7c81f3ec0a8eb52dae702aaa4f8937e11c9adf1df7b8355fd6ea70a1ac8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e801be30b8e68c3015dcaad4a1afa7d4
SHA1200430d70b2cfd4e5a45ea17bfcb345d3df55591
SHA256488d3dfeaf30c8bd90606616490cc53cbe244bfdf9c6f61b0b244b17dd08094f
SHA512fd98340cc870fcc4c5926718d4b5376e8205f8053414467ccd18e16550bfd75d218e9220167a7e1aba068ba95bd7a68358e5ba27abb2107c49b30a28713d180a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b19caeb975cb19d56a53c87ebd0b29a
SHA1dfcaa08ce0bbfcbc7c47095f134160c16f28021a
SHA256660cbe9fbf6ee0d09bc01e358568af99c1fd61c3c73b7adc920494ab973c2b91
SHA5129cd326d073098ce140ada8dd4746c5eda2a8c0f1db7eb256e2eb76e9dd267e26a320e13d06f1e167823576f9109b34a35a8f95de2b146a9b8803c65355064861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c02f412aa7d78f3d6ec775ba2f6f865
SHA112e1e3c0fae2243b833999fafcd63cf563d22ab7
SHA2564a7debf92c1bf20c74bf943e56b729085cc26c496fcf9d1efa9ccefdf02c8a0c
SHA5128311e7e3c6c13975f40a23d1af2cc4b3030f42c4eb96ad3daa7fb505f91b2a6803aa50828161f69a152cf344c8cd8b8e74304cbf2221ca0528153d33fc7823c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1c20ccca0601d9efb40b4bde23d56b
SHA1a60a18596d6d4ae7d5bf60bd8f0ea7b2263fab0d
SHA256ae3efa3a5ac608dcad8a6d75ad7e92554292ec486530c5ce0ebd251ed2b92627
SHA5129d58c0c53ab0614333e84e9abe826767c54836692f98da29b564604da4bebadbe300196e09687faf7949264a8ab8d4b134b3e07ba67618a14d0875792cdb99f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e8ab63c5c4d276cb5395eb0dd179a0
SHA1213973f39566ba881a5aa978dc8a9466dc94b772
SHA2569b7d41fb47f257ed30811677ec0f62b2443c085beda202dc7bb28da7c3c60686
SHA512812140d2ab17bc479f240cc0a940e6350fdd96226d6108dee75d4469bbaf2cf21d5a0b7966aaa735844ace99f38ebce4649520d313b47ccb7fb0a565d61bfc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac93da723a281b3b0bee3173238da00f
SHA1e84d6078acd626209623ab660b2f2cdf66bb8eb7
SHA256b7e0492d160b9ae9f10f89bddade953588976479c2f2335837a5b6e419355d17
SHA512dd90be0e6f14145078b539a0f2b0970a5ab7ccd3067e181b595e97e124c79e0c499fb4e8b26f7b8be6f0e41651d735985436c0016c8391a411af7f9795008bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740b811b40b7a4aed7224ad8a856c55a
SHA1739f118ad37cdac5b15153d60e256670f833369d
SHA2563170ac6775bc03e4846f2fcbd6bc630add1a6e9d9614a214d4044f13e9b4e367
SHA51202d197d7a1a30ea76b82d71820f4cdfe630d96cf9bd2f50c9db602756cad59262492af119450372888109203bfe4067c37504c46f2ca54737bebd4f25143558c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6a9b66c65c2e691207fca671e321e5
SHA16978613dc9ecbc75a13b729e4905eecff45c3c08
SHA2560254b956b55c9a44327205eedd7fb1b241a7d2ddd9709df25ba7f2be1a66b758
SHA5129a7bc8016af8398be965fef92eae18d91322a622bf4ec7ac82a98b000ec32bea374a07baa82c867f412d110fab6de921f4a35abb17acb051aa9ac8d696ece446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f49c19d76d112b4651f18297fd9461
SHA15ca5a855252b2f765ab4756211621e0e27aed2ec
SHA256709881a0db12417934eef0ae34ecfc732d903ff70e66abf138ea3ffc1ad37924
SHA5123b91dbc801a0be09257ab22b602592ed52f7af82de38d768728dbe012cd24a92c8f1f21b033ef4c86f96f8b446929cde562b200b20b62e9f0e3e6c80257371dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c707d5771053ca375dfebb6bf2525a95
SHA1ca9de776b20c5c90198572717d893a649ffc979d
SHA2568fc7a987d330cf6a64d07dc018b99e4ea560a786f88eee2cd9ab6317a0ff1462
SHA51211554fd54a6659e86eba70184e4dc4a9852dd33d5c2783c80d54a3b6d7eaffcc0d2cf2191fa2c8aa160e414d0f4465b2fbce5e35aa3c5312f2b6a6b449461fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bde5f9086c850c0f81918813d6455b8
SHA10be22c1daa2e0bb66a7b7fcdf21559facea365d2
SHA25640178692d52d3c4511af44f5734167e96aecd09c72ae9699dad401ef2e1dbe2f
SHA512446d81aeeb35db1f22156501276482fb4dfa38898f04bda2635fb5ab20507e61a2b2eff13b678e857a02477e502b98782c9c09b87fd77ef8eefa4d3a0941ae57
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b