Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
12ce961f5a7334adb21a0b1495c9b9b6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12ce961f5a7334adb21a0b1495c9b9b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12ce961f5a7334adb21a0b1495c9b9b6_JaffaCakes118.html
-
Size
25KB
-
MD5
12ce961f5a7334adb21a0b1495c9b9b6
-
SHA1
84209588cc19a79df70bbfe4eb6e7830ed6648b2
-
SHA256
905cc2078b0b60b1b398098fd404e2a9af2542a82969a2fa8c1d4f5c4028c8bf
-
SHA512
02d1e8a3ab0ebf33191ca21329f8e5208b9b7745c5f91536e22ca0052ad79a6fea75a3e51612a05d7d4cf089395075478693ab9180ff503e076d915acc5d0d7f
-
SSDEEP
768:SmHC2ujgQ9Xd+x6M6io84S+YSi4DvxvbN9KlVa6a6tFTbkB9y6pcWzQJC:Smi2R8vbN9KlVa6a6tFTbkB9y6pcWzQI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434196623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85932CE1-8234-11EF-B20A-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a1a2af3062ac1c0aa5793da19eab13a08a7c96bae7ba54719c9ec84d36d7aea7000000000e8000000002000020000000e42adc3bb242d3506037c51a85ca42b29731ebd8552be2754074021f93353a0f20000000b3a7a94c29875409621de8bc5d795e7571a848621c4b864ca7f2e3cbf28df7104000000010fb0f41fa0afc58f9819d340678e776f3492672d635395c50a9554b2d4eaf869bc0a035702b7edd9677ae04850fe8aaf1e7c441a018419b58aee526526f4cd4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6076c65b4116db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12ce961f5a7334adb21a0b1495c9b9b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb19cdadc65551fca97f501cc5ae4029
SHA1b015507df62c6c3f81bc57e56146d9d3219ddbbd
SHA25632a568e004ae37a17a9ea0010d3e855a0cf894df0155fe18bafcab63c796bde2
SHA5123795a2d03f64006c7ae6465dc6c5e32e47eb5dfd404d0ff7acc0200ce47a938528a3f778fb31a3dd666165bc0e32167aa2681867edae78969057e4d0b8ed83b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249345c7ee7d92b6c52f06672166f870
SHA1ae3b9edae1d5064028a5bbe53588836901b8cc93
SHA256ae6627fc98ebc43cb6c202b22fb3429a315e0d14992b4a03c26003845f090b9d
SHA51284101e20aacb983f06a39172bd73a78eeb405c7010f304c820062b22058a57782c10923eaa7eb86b8d51b1f821d631ff24948ef6456b4532de1197dcc35c27bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f37f91219d147def2703c2df67de219
SHA1245159e99c281f30cadffea1f12373f24469df05
SHA256c70eab55d67eba7a6d5c9ee780a37ce82c368c2f13f51511e5faa84665f7b67d
SHA5122586f1f64614d975d9037bc322f6beb5bed99da5f8ac279439f88888d91c69fde7962a4568c3ed54f7ce76736e69605c96742c5a910b19f3b928ca92695040ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e1b54bc3d6d4d5c128c340ae80dad2
SHA15fe7b87f464ae4f4eeba37435a6548dd012dd08f
SHA25630eccf6f37614e7a505a668a8153d5dd5779efa1a1edffa4ca7e2b1c8d2d13b6
SHA51260e9b09e06860cf2ba52b65e9067c93f9d55ab71a907edb2ae8b2485d2a6aa4dccd7a48707dca2d854a328a1dc1d674271b776ce3093856a13a2783d79075c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f749e2b76258c43acb60048889f7943a
SHA1bc7b290c3742bb9b8d3a521e0347bb43433eefee
SHA2566e12ec9023b6b56bf9790fa09dab8518ce17277a40027ebaa46b5a0974e82840
SHA512851e0f522b8c618493969beff50b389a2e770dd290a58a53029875f8840dd40216e46004739cd263c59d1edb77f8c38fcca3cfb9ad1ac9d2fd811d19cfd54255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53937088af0b090533b0e833078845ed5
SHA146d05131e41feb541e91e4b126d3597a4b5652fe
SHA2564fc61cd60880b329f2570cdbc2eb7f2f2db7aa42c2fc3bbc667aa341ede6d660
SHA512ab7bd7353b6b95c3849d9fb9e7e81d32d0a6511931467f0eed093f215cf90c9a97f3833328e0f83277388daaf95aef59c2841ae6804c020a26bae824150d1908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0e071d7dacc4f38c09901f866d65bf
SHA1a4208e8b386f8a5b1aa6722422dfda784466aa23
SHA256878ff047fa640a35ff25d3a69849bdf36f17c02b13ecc3481071c61f537ddfdf
SHA512819ed289b630dca7ed6733e457f1067ab9fad174d3bc92cb7efc33ddccad2b66cc629a5bd5ddc21c4d1548e7a2a6456db6e37fbda3deb170a68f8b949ec57ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6e7e8c768f8b3e905c4b6222e87b22
SHA1def451bd9bbf409bbff825f1d3696ed5ad5b54a7
SHA256e133cce9936397dfa244f7fe6a3e4edbf01c0b838f32d70a353fe5c90f181b98
SHA5121e9b72c4e0e328fbd742695527fe7f1f5592ac4b558ece9f96040c04ea67fb4db31a2c0cb276bded00ee6ee65cb55657261b65ca09edab3cce24108bac304043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d8e2039e08ba48c158b6ee077326ee
SHA1f23df2715a333024afc39a15b122314f0ab91903
SHA256b0968731662554eee82899730e49effaf074f63ab54e7c85611a6adb1732d8a7
SHA512068860e79cafad40e3d9c650635971b03ed83037a4ea3f07543818a411ff291c29850af164fcac13f584d91cc0f6453e051cd007f51a8f02f2bfe60e25f826bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4353209c5b4b26ba398558cbdf5d6b
SHA171fb0252a9c982c57b8c88427a827b416e65f3bd
SHA25652a5073d5b8133626ee43b62302cf592471ffa859d5e1de87630f4c98578a354
SHA512b6250905e3f5a362dee7f038c044703c3d352326314b06f183e60ee34b24b052ac5658cd28c9d3fd04f1f79fb1e300de5748022785ba9cdd9ffe89d9803a5b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b032785e74fedbc110256e94d05723
SHA1a07a2b120f7726decd5eab756d2c5f6b380896c1
SHA25633038d0d8e899866365c8b003c403f89f821b24d5a4d11ccf395c49172105f12
SHA512dbbc283904bd5736749c6ecab28cf0379a59f5a9aa626e1cd8d9644ea0dd529a40b36a0adb8130d11097252060f580673e7f50a650eb8db2a7f4ab550a63189a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b72f508c9cbdc9126277638bb4822be
SHA1b04647038fe5dc0c3291c72e58f7eda0562f6c37
SHA256d9d2f6f570b6ca3d992d95c726758aaa1de58e20e3c011f64e5b8ea1f67ca967
SHA5126cee9ee71ed2deb63267b9cb832077b50beda621d8480b1849198f2cc2f0f802226ed6aa78d400fa0c8ab968bd410968fafd63408551aa506321006efe725dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c307be21eec8e5e64c88a185814b72
SHA106763decfb8ed52017c93c9464d6c412405789c1
SHA256901ba2eca0c78ec25207403e2478d0b4c41f84c3a6298d7c736d58446bfb72a1
SHA5120e3e8f5676b5bd4e9fad62c211d7cf2af19e478b6ed24eadec9a7bd49c5761b0d319cfe59e57ee4c7ec8bd62388c8a1340505c1c0f6ea87b3cd65716566915d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51839408724e4fbda2489d7bf45fcb1f7
SHA125743f335480e52667bfc43d8aeb7864e9fbe2d7
SHA2566880b94f621181102a0d57da4016a4dcf331d202642ec1dc8ceaf1c985a16bc7
SHA512b3b16462cea0a5bf4fb24020bdb66e8a29b2cb2a4ee0f3018d83ea040b699d8e1366a765c30b4398d6092e699344e7bf26dd969c03e24ef6992fc90ab8b81575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da52d6de3b1dbc9152e23278825abb0
SHA1883dc5c80bd1004c7d352ca5cf1679c43f04a62b
SHA256c80607cfe1308ce168ec86646a2bd268721c361ed5ed2a3d01e1ddb2f8450f85
SHA5122656216140f9838bac3a9aaadac18430764259d71e5f6b9dc6bcb2788c4ebce7b3017f7297eb7a67e6c4ec2c9033f326b1eba1d8bbce8e019f0eebbbd8e830ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3e29349b906be3a2a8f33a6722a08a
SHA141d925e60f8f74866c8ac1d970b98a3ba6a1fe74
SHA25642b7dd0d00ff76496d351bcc5d857e6578025bfa8f6f933cbaaa6a701c2c8fcd
SHA512a381107edf36da75cc1fb41fa2749c49c625861adad321345ffe2c572a0e652214dd5c4bd9a73cff65a913c6ceb339ca24f45e91870823c5c6efd04f61fa0bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553faa823809bbab2c26e85d52bf40215
SHA130ac17c0f5786724b333a5938bba3e32aad6b757
SHA2564e69125d56e4892cbd38aed17349124c349c095b8176e2819b33665840671271
SHA5124a137df75f66ff49aa7b6cf0131ff3729a1cd7bacf1442f490a3d103fc9b8213fceadabd0aa7835cb44a0a8c15c39a80582f2ef359b6c2f90b15129de0b0f9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b7c8e83c4a897a6acd80878c4d4558
SHA1efc544d64a6214b7ceab4a5000d03e6eaa937770
SHA2567b89e4a428614bdd1dd81082dfc42ba0a3483372fa52e53e0d9c53159c9daaca
SHA512542a814a0e84ff94f7d093684074d29757daed99202e05d450c626fcbba1a980a6d33820629ca7e53d66ac8e28fca5196ce0bbf3f293f7079fead721984d26eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff40e6c731b842e6ca73de2ca0b10acd
SHA1ade7048017ddaeaa4acf625b455750eb72ee1c0f
SHA25635224d1ac108dfb454500a2ca6cade9eff7e47542372c733ddac2328f2a14cba
SHA5121dbd1fa1db47a7246b3c8a8db8b739672f7aa6532e58406bcc244eb9329c1d61288bc1b97087b9f5568784c6970cb6b27376651ad32bc4e2538525bcf4bc608f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b