Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
41332e73f36c431f036db96400365049_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41332e73f36c431f036db96400365049_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41332e73f36c431f036db96400365049_JaffaCakes118.html
-
Size
139KB
-
MD5
41332e73f36c431f036db96400365049
-
SHA1
572ddfd81f49adaa586597c85b2641f739adade4
-
SHA256
d893e948db59affead97743d04ba31e2acae6c72c48e7195337fea26a25ce4f5
-
SHA512
22b918ac0bc712caa52141bb1de29b7d531276a3963687813d977f1ba7aee0c28f26d0619623abdc1fd0b7b9b314aa118bba83d3414d70358bf75ffb374ffccf
-
SSDEEP
1536:SEN3SDZ71gnOrTlxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:SEMeTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000716dde2c9c54cb7eefaf116c9448261403a874f3c0b3a9ae34ecdfa70a6737a3000000000e8000000002000020000000f211782d50c4cda482b0add548884b13e256dfa53b65e2b3af9cbf0d1c94659c2000000038e3a34915a1792d4a11ceacb864d2c81a2b0c320c9a8dad7dce5094fff808ab400000005cf6a63ae8e1d1a134eff1d720cfb29eb449d8d60a6471c6e500a8925ca1fd0d1e00ebd23fef9e9b12284135907d2e9583a9e24733f8425d6f8f2ab1886e84e4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000d705e3c3fc696bd3a01c442f800d8b09b9214b142c19abd6e6c801d842f287a8000000000e8000000002000020000000b097e3372b061d3bba9a0c5e594fa1c9e477ad6d19d22b3c5945f08184069022900000004350790a3c6edd991c9c48a33495c5154bd1ff0ac417a853503e214d8fe8cc653a9df37d8aa58633b71c7e50f54bf28991bc0f4682429b77fd56d63f42fb03690f6d295277e4454098333f30edd9c0df1e237deaac4bca861dcb4a2e7c09a0f529d9940a2fd6b99195e7a80e56c9cc17984ccc69c361433c62146dd37b7440cb84aac124a8292150f1ced4edbe569f74400000002e34b5780e9dbc470f5a17b2ed608c484195b670adad0916a4ff5fa0134949329e3196483cab0b488f6faa9ab06921284b2900cac1293ec2ba8bdcb38c98b586 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FE602B1-898A-11EF-B42B-C23FE47451C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435003075" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403ca547971ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2472 2444 iexplore.exe 30 PID 2444 wrote to memory of 2472 2444 iexplore.exe 30 PID 2444 wrote to memory of 2472 2444 iexplore.exe 30 PID 2444 wrote to memory of 2472 2444 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41332e73f36c431f036db96400365049_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8083a57c37474d7a0fc80d64460d1b
SHA15d69d5ff5e2494c8c7b115dd254bdfcdffd037d9
SHA2565dfa89d2b1bf2119c97da89952acbb0266573b9fb1ff6400adc0ee9e8805ca39
SHA512b77f0ec91739321cbd08a76f52432e4194b48533bdb9f58da011981cb1d9a80cb9c747143bf23113d9be0a1b3110a59ce0a43f8038a35bdeeccaa60ccaae7a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37d1d335ed65e4f889fe428b39c042a
SHA16fedade3c5ae74b45a76f353f7ec5d56bfc999bd
SHA256d8515f46bdfd8838d1b153cfd35e7217c5d4ceb25aa9e9a343ca1c6ee91bd346
SHA5129a83f5d786e42b6dc08fd7dd71c8076719a89ba1df40ae1f840d7458ca98b65b92cd9442ee57009dee39bca060ab8262f3fd71afa01b8f205758a811725f3dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a7d51befc268fad8e2e6eec913e6819
SHA1276c8e1e3264c71877ed1525dbcd56aaa6e4089d
SHA2560baa91987b6e2b655613206bf2bc16691cfb4ada3d3df205ec99662ea2ca28dd
SHA5125fa293b69835aa5277a480cf83177c1d0545fee5c738656ff6313e7a639e3d7aba53198c9eb9cab64ca8cbf1886d46b1c963b0bc086184e02c6b8706cc852c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf824f540d65181e0f86360fde2f429
SHA1e2028caa09cefc4378ac72289dfda4597b6c8e34
SHA256387a76d47801b0968787c044cd3a3ad9d5dd0e899280ff0075dbde487f8dbf64
SHA51215c359fce57762509eb8cf59b645fd102b026cc0306521ee979400055fe3d172ab0a68189ef6c09a2be0731e54fc0b6aae4892093f11ffa2a45e1ecb3c90957b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d38c5e484b018c3d20a39e7de05f3b
SHA14f048bb4776fef9726f801205359aaaf14db10c6
SHA256bc41c16c4e9e729bd43e27eab043e1b67a1d94f5e4bbe8a1c642d52849c31c87
SHA5124a37a987e765899fbdb15e2c81b0395f28644a771545032d8ca385e7582a422c08808906324d9b37e5b561510bab708a7f1154d468af9b03af699f2ab81fbe12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da071c80d8a76d8035f213a247dd056c
SHA1dd04482090a61be7e7bd1192399726ab2471a836
SHA25680217144a09b4760ff8f19c183bcc22a1146a7920499b216cb8181f0bd9e7c59
SHA5121ef1cf7d4a77c7c1ab611eaeebe00aea1d0ec414c31b124b89027f4b0f23bd41ae02981a22b30329592470aa28c8483858bcc1fe6df50d181a372bb4af15d12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583320336cada45304a5489b3019fbea9
SHA15ff980e6ad40f677c97f39e8558276b91756fb41
SHA256b2525142fb0abfd17796ef9be4b0ee0135a0562266a072257ff6245d436b5dfb
SHA5123bee75f8a1eff29925f6b5424f1339882fbeded43c863a8ed6bdcbc486acb87d8decd89adb4487bb95a426716080e428c6c2f832f1a6d91b995b128e105b6fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584fcacc776ac938967b39d38212f919
SHA125529801aa22cb584f6d668c398b583a5b55835e
SHA2562dc61a336957cc9b184b738441f5acf65e7c2494e8a2a3a0bfac26bc1b1902d9
SHA5127e444aa79e7b19fca2854ced29209e1248aef5fd08dd9fafbb5125d74cd1ba05188505f70db841ba54ea2477c410f3bf4afaa6017a3317fc826af00ae848b772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78cfd621716544930483f6dd0896dce
SHA1c01d1f5d7b50b1fcd1a6f3929182dedb951af8fc
SHA2569bec25a503c2f7140ae9fbf4abdc8769ee709877bae64a537b923429f058c947
SHA512b25e482b38a425fd60e25b8517d1cc8a8ed2588fdbf35dc71377ce2d4dc468bc46e8fc72c6bc09a2f8bc9de8c3afe4b6370489d35d527ff5f4d793cd01e394b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45dd93476b6cf41777efccb5cc516de
SHA13a2371ac0d428479386b17fab3dd147d23166912
SHA256d632a81d5ae57d12059c92ef479d73ad4c7e9cddbc46d326674cddbe26879504
SHA512d13461121e9b59f298cb5f656ea785f7535bfeb2a42bab1abe5817f7051ddbae961d23b87fe556d446472713cb84131ad5febcaec11d8de4bcdbf1c69e9d566b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52081aa4aa92cb297c247c4e8d34d71cd
SHA148c9a6a0df52662b855cd2a09f851e1dcea63ef0
SHA25665549e5aa24336c1e9d130e7499ab7af128f7c002f534baa172d1d11c7461400
SHA5123eaa3b49bd45b65aa9e032a24a33cf28ae0e93d9df5c916fa16994a385da1312d1cee0b4e1141d1e1b5c459f51d3b544fdd562af3be7d88312d216946f82b614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580c9d5ec10e5c979b63020bc1dbec7d
SHA1eea64cd6c7d223fe174290c142c3b3369c9a2384
SHA256f82360004dd7f1d1e83abd1f17de54d50b6bcbe55eee48d87aba6745349c88f4
SHA512f3df5a49e9d5208add2de45641cb2686a9672680bc15c8759570a6e84515018021c31f28448c01207fc88b157c7f3404a6c8c4d615c4345381c624f60b7c14f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd9517ebe832750dd313bfe3ff4124c
SHA119d4d89241ebe3b9b9eb374e2be07706105cad29
SHA256bfb41c309c75963953722c3519aa522eb250e84e2e333b94296c858bc5f2ea73
SHA5122b216d6046682bc4a1297ae4a77432922633ef678c08b898dcd6808b550e762495d0cd8acfdb604dedb0364ff28e56ee6a8db2f789ff4498a44dd4f14a4d49aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc05d56b8e6afaa358ce87ba941101f
SHA11f81a088bcd0093199f5705c76a3ae1db719b69f
SHA2560fee8d31babd3d9252dd18c99783345068cdee5e68a68bd79312e231414a4f27
SHA512537564c614e44ce9068057f7dbfe3e93e32a6be82e7b37ea3d310365c5d209cd4902437a8478911584b31ce08504f81258d8f8ec069215a0b6afc6d53cb3ff10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb473c248d4c3adcfcb952aa079abab5
SHA153da761e46c8c4b1e989f17a1909bb97b27a4691
SHA2568e999c4610db07072cc4b7bc06a0681be8bc955554c716ca7fd5440e6939cc22
SHA5126d692092f87b8a4563e36fad91395003e23479a040b1d1b8013d25b4e44993bc8d42b5cd1e09da31b19a23e71bdd3c5ed7e335c92c9b6f3c5a59a6774bc1f6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e381df67f42b08f4d57755e4303ce6
SHA1ffad415f2d917e0bf53ea666ab55aa95f212a988
SHA25666121421589ba03a1df5912bf06cec8ae0274a17f599beb01c6f0622072a67bd
SHA512f9d7ac75edd086959178a6b4e84f2f6778c3685a65c794b66c4ae33673e9c61138e129f09ed030d7ea6d3fb677170d6ac8f9917f6f2d1a9b9c26c66d346e099e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f816dba6ea756f86ae6f6c73cf88f579
SHA12b43a5563045a05269cf70072b816428856c8e29
SHA256d49cc292badd388fd79b105928bde2eaea1160fa45a8e243b6a05ff1248cd4aa
SHA512c43856678a294c29bbdeaef89d825da783010440340dde5599a13eb3a67210300108fb394df74985e279a4bfc21a4a06bc327bf2e6fb48b96f7615169a817454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7a61b1fb821df92d0b4d000d5a9798
SHA17fdb7a509b383e482f4352d3e794a99509664b34
SHA2565852181b0b11d3e2860c87c376881bb2f2f7c6f542ac875ead16fd04cc16a3a3
SHA5128791f07241f27f3d31b4fcda4420c1c4ced74371c44fd01160756dd8bd2969801d9bd1ef2fba69af5bc5df6f117e54f4a49b1f64439d920f2082eb2f73b1d0c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b