Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
255ddb0263ef30b937f78e71149d75ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
255ddb0263ef30b937f78e71149d75ac_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
255ddb0263ef30b937f78e71149d75ac_JaffaCakes118.html
-
Size
25KB
-
MD5
255ddb0263ef30b937f78e71149d75ac
-
SHA1
ba74740d7ec0c8e8bde6ae7f0f2cbb61e319360a
-
SHA256
af15240823a8e2da6eed199ea2adeea7680521112487b9f5cef8139dcba36bb3
-
SHA512
a0e39ca2ae60d6caa562ddfd721e96a259df1cd25a73f9a16a0d8c6d431a57f4efb939be3e859510d7189472a860cc6449ed956138f01c799a270f151a0d9604
-
SSDEEP
384:vdg2H8ofNGwoaCOOUtxKTeBfKTpA3yHMaDILgWQQ/U4yhoy7jfIWrYc51IlSAuVS:1g2HlfNjltITe0+CsdNG9p6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000329cee0ed8094e79590e3268a773474089e91e1f9c65038c8b46782ba32f44b6000000000e80000000020000200000000f6909919009d48e0b94fe0019dc3310e5ca25410afb8e5736e0bbf116608096200000008fe16a6ed0aaec35070ad4de222160a44b081acc4f433a021069aa28f3ba01ba40000000a9446ebd9f6e239546905c9acaa25979e8894503ff8d6ad2d74c677b19bf5d2e002ec01c9ec1bd6cdc6cba4c654f29a8ee808ea0277af81f1ba07cb263a881b8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e31844f719db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434604608" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000cb3ddb8d321d0cab5a8d642a5d5cdab3ed1e93866a1c7433ea66b2eca144ed81000000000e80000000020000200000005467afbdf1f49d5fd4a84859a688d442677a22345f0e1b9794aeb92564ba82db90000000e6398b051a80345fc5aeb07a714ae16aca2d27e81b675eeceeabb53f0d703f5485bcfd3db2a57559e966a6837e00ff0e6540e0c708e53bcf6396679ea894f21f007d3b91610dc34cb5611045bb4ec69e03b940e123c393571f3d899dd4c8e964b0b7a8662060e38f9a04cd3d749402e39ebd0af4f3017e7043ebdd3c57132a07f0fcf43c291b2b62ee36a6e832e145de40000000315b4c50317c5776b8a436df5c370220324e236b54d0a92b27196e810deb92d1b7f3bd4c9fca5e44b946299ab1fc78320d176fd6bd4d403be0505edfd040edb2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F9A2061-85EA-11EF-808B-E61828AB23DD} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2028 2276 iexplore.exe 28 PID 2276 wrote to memory of 2028 2276 iexplore.exe 28 PID 2276 wrote to memory of 2028 2276 iexplore.exe 28 PID 2276 wrote to memory of 2028 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\255ddb0263ef30b937f78e71149d75ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564dcfbe99391be3406a29f49b459e65f
SHA15f3145aa70b40361661e6ba40587e29af92eb30b
SHA2563c1e144140a8225febf760d7c669c5c4202757fc729da47605a3ae90d820111f
SHA512717e3a0b65d4cca6d6f9177826a5474f17b703b8dc3503097d12e66484437870364e8e25b1cbacdbb49f4d6611dfc6c1f50da33a87a1fc536610949bd1e72606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d4473f006f328c5a16fcc67cd86722
SHA13f454fd4aad64a7f172fc698b727beb95378eb9f
SHA25621d6dae02a60a7e5479c6f1597010bfda33364511a29a28c483eba1f17cb95a6
SHA512336f3c249ef6403f2f25296dc639e0e48c52840c4704f8a3e566a355d31cff39ac22c13c74d302dc8c7ffd23d8e3a55bd30a918aa9f04ec479aea5ed1d17e046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be0e931a36d345222eb0ee5f0e61a19
SHA15fbc865f6ae380dcc47a3a0f9948e35354df51b2
SHA2568e926ff8a7a7e9f8c599154e745fc903b322ef4c609a17edb38279d67e6cc996
SHA51233e5c0f09a3e6e71a59148342ba4704644ff4ad6bb0752bbefdf37a3de49ae5518ce06ef207bab8cc0b6cd7b18536554b063a7dcf16033194466a4faf7b2b601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551579bfe19e5e70126e463bea183d4c
SHA1442c1281d1a62149149ab77b89fb22c1043c8a7d
SHA256d29aa9e00f957ff2fe5d4b3f33d240cb48a2af5bd70e1901d0253dcef5032ddd
SHA51251fc22fe067c2c48ba51750ec0585ab12cfbf5c95af1ffaa1944f8ea814dbb5fa48e3847835072699311192a518a647b75b6296d353155d94fcea9345d160f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e74283fcea59dc19472e546d28c93c5
SHA14651533d222526ad961250b1b5350f804ebb9223
SHA256cbccc96323225a90be566a91b89f8e501bf4ae62037a6d4a8f39a82b6a5ea189
SHA5126d88b86be9401258babcf0ba9ce0b91cd567b8cd0b8f14bfd79c02cd3c8ac3c849e3cc1964e3f5b1f24ff7b7ea5c141db3236a84521dcbfa1fcb7a19af2d4781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86940114fc70c2ff97eef4eab1a484c
SHA1b4f3a57a741b3b3774805e06f942b0586221cae4
SHA25632e817d05ae734bc0ef7b81f6445e741d53d4a6ca3a88d047a88db2755bfd7c4
SHA5123072773e1850dda0350eec94fccacc9ad7fe9b1c731bae9fc1e4e6c068bb0a16bbed4deb9666594f7f4cb56667c3903c3bb5ddf35b4e000c80a2f31ed0a65fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0fca979d5896256a1ff6fdc4754ae5
SHA15693d7d9f2d29cf5e8e2cdf5a564952395ed8918
SHA256a3e934b46de5c9141987206042f1ff3f71082dd931d79d391e6e64f1ccc4abd4
SHA5127a89de07a7f0911d90290d8a0c5e166b2297abf7cd5b3059cf1958f406ac10688e3805df6671e34beb9e9dce5f78537f361669e981b02f3ca35e71ba3611454d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f25d51ec60c37672d82c57cb1240a6
SHA17564a2a9e74eef6fdbe2412c1bf08946f1c6d94b
SHA256617ade4492b81f0a8508db855d0e3e8de959bf937fec646d6dc1718d043dd1b8
SHA5122c2c9f080da7f7416515321d4511e473bde6261496bb4ea8ecec913badd7d2ca41d5981f097db26f051b22589c365ad21643b581d3aec69adf965abcaf17c791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec4c30110689980753e9b21a2f0ccf3
SHA1153ca3b7584afe9c1df4b47ebbbf3d8bde5bad4b
SHA25629272c9597de54977ea111569b036f66555644f6c98ca12cfd5c2722e8cc6deb
SHA512bc4bd05e5c8fa7047cf8115abc81536163c3c2a8e29c96e6afd9977a0b3e1957665699604d1c9b387ff3fa90f1dea0b9bed315968b6357d1c5f1fef80458c621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0af3ba6dc59de296bf3be83a09fd45
SHA1bee2255887ba038a113af1c0c1816f89d9a1832e
SHA2560b2011b73d95c099ac47944fda49b17e4e29a8620771e6b7993e93c8416277ff
SHA5127ec4a54ee7efdca0b5ff3cd7adc18d0fffe46e920a016e5709de9d48cd2a9bf6251dc2d3ed961ed3ee0d0da8f26586b64c0e0a09e473efd8c791ee43614d49a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85cff4bc8aa1614c0e367d969c140a2
SHA1a5730ba275d00cd91aca63925f24be50206e6d71
SHA25683c74c3c826a267600d9008394456bbf682514ef18dfc0a19dd51955bde4b6cb
SHA512f5806a02156fbbb08c9599c45e03b1a72328eaa9d60bad38bf6add536dbc2dd04be3582f09afc87e6c71e47f0c21d036d2b3deecf3f5a94bdaac9a4bb75c596d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad23e3f83858f3fbd910707582da8ead
SHA11a770e4d14c4661b413f414ffcc2a86ebb8946ef
SHA256eaa73b369e7b02fcdf3d09633d34486cc30fb831cf068738ccf25ae41a31abef
SHA512c7e87ed118413c2b40154d0a34f808493aba17e6fa8019296939c7e31cbfb7ebd326febe07d244e482380b4df9cdcb35b66cffdcd4383b44ee561d0e0f0744ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821df2c7418e0fe82cf8a99189f89424
SHA1ee30e50d234412491ab571c7e50471445282cb7c
SHA256bf05dd413bc1b89a15a4adb5efbebba8d2419a42a79df58f27655f347a9550c6
SHA512ad8a45d6d22c7c7502de5e74455da694d31ce0b914465254d72da37da37b209fdcef67a6da9c430949fdc2216ec7993b010404ca18b3a8dbc0fd0897977a1fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ae9a555081d3085ddb509b9e6e3dce
SHA15fb8056eedb7368d12c0685bd3428d98a293e5ce
SHA2563543dae10f743d83de6d58bccf1b7af70fbdf932e4dd64627019e9484c60e4a8
SHA512703f65644aa0cc128e1ecf70e8b9640e691cc1f1e4f6bd5c2f155d6f715f671d93b5d861c6bb6a1b4759ef350e6afb68db895f6f263b7c77863630dc17d75965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f891d11ec01fb4ccba0073810bf76243
SHA1e1d01fd59732c8642c499b9be6cdeeac267b7b19
SHA2566f7e906b74dee69ddea6a7e540b997a2d6a303cc1e5fe04b31bf8a94513fe078
SHA5128210c1c5462382cd6375159459e45a39a7032a520ca6496b4148a4b227afbceb8c51f5c1c9c94521b747d28eed695c099c73466498df92617447ce9527950fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3169d70a754e5e725ce8fe9be0bc68
SHA1b791a761db12946753d4786b1e474cba1be81cf0
SHA25635846a70d285485edac414de9efd74e7b3fe1a369052d6bc3f7702c753d08225
SHA512b149a48e0a5788e99182f24056ac3fb181b57124f9835266f13dd8744688cf7a4ae56fda7815499eda50b0bcf6fae1d5cfe7719816704ec6c94582245c0c0460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f7dfde6ef33a82dbe90d0345d973ab
SHA12638104448d0c1ecab727fb2e278aa11ad34a541
SHA2565c5293f1d4d60b8154398ade56e614b7f8d68b2ddc267c7fae97c3c1384faee0
SHA512495c5aa4a7f4468e22e4df66fd1ecfde2a45efa81e3adf6f7519741dd5579f54e40b11637087c7b98ee71e9153ef86a3c13ceaf5d8e85df1da047746bb330969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6cee1fa515a3d08cdbead0419b2afc
SHA192cb4800d74e9eced0172fbce7a360c74becbe0b
SHA256b07e7387f2b570ae9f8e7dfd18c7b5c29cdd11b0d4c0025b1fa427f411fdc6c9
SHA512ad5ea5529fccdc38f21eb7092bdf37c69d7a791d984a822593f7811a9dd75bad064d0e4e9664eb955cf008e9685cd38b082cc164f4bb06a764f2d57e96739737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae2d012c18eb5a101cbce1e105517dd
SHA1f763e36ad8e279358bc9531a6a95f4b8d67dcbf0
SHA2563bff79d1a56a9f03a16a9f40ceddc51b13f66575a96b5043f5f4ffcff5375b91
SHA51210c94e5c1a3dabaed07d62a25429d921a9d5b0285587695f4cf02334da4e3639a1f5f0f69a505359fdc77ab02b90f86ea5db1ca3c350f2c97cf37bed6a52b8c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b