Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
850487e8b1ef010ecf0c6ae1f414152a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
850487e8b1ef010ecf0c6ae1f414152a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
850487e8b1ef010ecf0c6ae1f414152a_JaffaCakes118.html
-
Size
53KB
-
MD5
850487e8b1ef010ecf0c6ae1f414152a
-
SHA1
f411e05a5acacbd1e9823c71be10e0c01a8a6f5f
-
SHA256
92b8b1e5bb46849081bb6fba63fcab8ab8e5d12e5392b4b3f97c0080fb9eca50
-
SHA512
8f67f0cac342957bac767ae889e378e4c6a1aaefda297319501e8c661c82446f82ed0a0a440c090a218a38836aae79516dade20f0587fc9f18b48475c58507c7
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYv63Nj+q5VyvR0w2AzTICbbUoA/t9M/dNwIUTDmDi:CkgUiIakTqGivi+PyUXrunlYv63Nj+qp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35450E71-56DD-11EF-8A1D-72B582744574} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429431222" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000061a865b101bd1cb5d3b1043cffcfb17afd72cea225b22b3ffa6187ed011df4a6000000000e80000000020000200000007188ab4bba13145aacc3c20d9bc2c61d3ed8592d714ab678e4215079831e51d4200000006f059fd7365ebf263a2fbec3e4e3ff85ee03f248dda20048f430c53ccfccc56340000000fe810d1a8f9adde539bcd123b2c7f6bfd079f957070246afdbad407a7efa212876ccc07130fb2b8b134d758bdff4b537a21f22a20c49f14f9c30982f0e4d1064 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c074300ceaeada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2592 iexplore.exe 2592 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1612 2592 iexplore.exe 30 PID 2592 wrote to memory of 1612 2592 iexplore.exe 30 PID 2592 wrote to memory of 1612 2592 iexplore.exe 30 PID 2592 wrote to memory of 1612 2592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\850487e8b1ef010ecf0c6ae1f414152a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52431643f4e1531e631f791083f6f262e
SHA139de6d6c615713923f43d51cf158bed15e108d39
SHA256bf08bc42d57542a42f2c38aadb7b85f5c4b1984d3a632ca36674fe6c2821536e
SHA512515fe032e4e8426399e6ac018aaff8929104093a5f29d93fcd5cfc2f5822adb39678033fe231ced88403618955ce78cc1f394a51966aa58d6ea72d96398fd548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c048fc9131de21749a430057069783
SHA17f4c43864a273e920fc6b569c2f7ce4eece0217f
SHA2563e7c2106ee27ad47ae19608cbada7f18678774ad715d76e3c6045e443a8082cc
SHA5120d3e0673afea42a52477f66c840daaf7f7ab75b31e7bf1ba581e2807ea3d87da9c3a01c08bd51f6402c98d0a0c41c522ee044aee07449963bf62311af8a6016a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff9c78b9e6b46c8cd6a36ad992330f7
SHA10b1bcb7251a071724170c14cbe789a6d0c87376f
SHA256e46a61158f22e6f1ad579f924b9e50d47debc7fef84b5a40bc14744a602e941d
SHA5122cb84442c39d8ebd4ba0243b299b72dcb4f754e2db9573fa819d75e2c1c6b7027b6606e6a5235c278c3cd40cb65b1b018b6c10587d4e8bb24a3aff67e2d39bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cc196622a55543d461aeaf25d3073b
SHA1f92b7e99a47c59b006a6a9a50df5ae0db63af26f
SHA2566615c9627fe0f03b69c0f8ed710e32d5d207fc09999caa3675d957d109db6a0a
SHA512f3e39e9a2045bfb3c41460b27f9bebb74669b3d6835724bd17a22f3fe6e98da881dd2062fddc50f58f7aa9078a450b635cfe262551322a186d67124b56260ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee7ef6029330f99c1be83c1e914f82b
SHA10d27abb35b211559b8f735a018eb78ee9be79b53
SHA256a6c1e7e08d5377a50ad6a15a0eb8bb9d1ca886a5732df9e8675dce26d488c853
SHA5121e29219e40366e358deb193e70e3f8d1da8a2595251d8f1b03eeccedb6a21165546e50775d06e5435cc54aadaa920fdf1cde8aa1f6c37964b6eac5957d1931bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121dd4065847e4309d955e2b3b6298da
SHA148d8d903bd9975bc84c57c34529984ff2a462b9f
SHA25637a1550d2aac98004213105eb6e2743e216850fafa7c036371955de58014b78f
SHA5122a48362c3459996348a53e9c2fbcba2c97ea611c5648a27d089bf6ea86942d9365b412a997aac32a60e2cc93f89e927bc3b68deeb5314ba42b3f6b9c1be8c8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855c98d70a4dd422dd362b1152b2c62c
SHA18c3fcea77c30258aa1c8a5277bcfed1ac8e9f1c9
SHA256c6e253c0cbb64a0d65985394759c204c4dce0f93db197b2d84006e126044132e
SHA512a44dfd130c09d305a2eba03fd98a074d9f74c127264a9ca34dd62ddcc2b77d030b105e3889fc386ddf29a744891df468a7ec76ea2c331a5c19b84b63d473b750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bffc8b8b6892e7aaf5df3b01a30cdaf
SHA15000a43b0af301984c3ad348c939ed018f63500b
SHA2560c84cd9c24ed73089848f2098393684d6738476ab18cfb92c9c85170eb83fb1e
SHA512d9aa7984d00257590496fd969955cd06fa60555703f9134c9147c3180d266bda20ad8760508094e932942777cbc7395767c76ba12212e50e7a74058d2a3392a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2340115ed69425a06eb2576fa9c047
SHA17079fd19f2c158c6178484f409023813d07dbfbf
SHA2569929134f5714db01cb1d2714923d8f3bdb93878139fb3e43ba30a64e69882f10
SHA51212996afd1f03baacc6a218d655ff2d02c6c9a2ba0e1252fea186921d074db79e7b89af968055d52ea207ff33f94d7b6203691c124a7b4f711d5d47b6d7b22ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e9772eb1ac7845000f321db1a525f7
SHA16e7e966acf89436f78d078b80e05d5da1ac135fe
SHA2567304c78e61fde463b1112bbaf97f27799adb71e7496665b133fc1e95904fac7b
SHA5125bcd3a53eeff2773d79b4dcfd9a85d2cfba648191f16e6713ba270009a87e1a6674c66ceec06d63262497938778992c5efbd71bfd993e919ee731ae92262ba4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1cb4ca53cf1b3d31ae65e1dfca1673
SHA1ad9e8c84fd97c90cf26e883af08aec9d626b6f4d
SHA2567e7465da75bdb915b9d18337b2cf32a9e33c663fd1cd0dd68bd99ce3379d83f0
SHA51205e57c51a4222425a89d58b1264d8ea83cca718614de43414c07d27cafc8d4a31f15b23e234c7bdd90c6a43c743d5fe2f6d11582d3075b339f964d08bb7bfd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e3fb67056b4c774aca84ba70140885
SHA17c9b42a77fe17c5f69a302d345b479b5bc81d343
SHA2568b2ca7459679c446c280007548493d2f54b83ac1ee9dd5bf301c2f3e40b9ff30
SHA512cb4507ba49af1bb2f76b829f08670c4649a8aee0c625be8baac78acea5e87d8de22ea2544631c89a1c2cf3606e3a673683a37e75cb46af9b650bb4bcb4c2a01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c7c696682dd2697caea4b53c214a0f
SHA16c1a49ebc301c9df801737d2f99c756a0d5c48f2
SHA2564412dbea19a8273f08c112554f5c023d9c5d0cf7982a677163713717ba720b7f
SHA5129c149332877fb0dc795a4647ea818bb61f7268d3d749586d3ce87fe0aa7d7da2bd8bc597158073fc2aee4d432f432d10046001d0dc68c5036cb7a47fa2e66ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb8358dd5f7315bcdf818b3ca5efb9b
SHA156415ef2d946de54ac54fc21c8d9d9069f40d895
SHA256898eda8a26581f5498354aa3c1b1a1549d20e1290edabea471847192179ff8c6
SHA5125c6e290b8460c24174a52d191447747e78fec96446848e6b19b5e759c91f221af167bc3594b800a649941d1a3b82529fd800b55cac2eda68b65775bf6b0695aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68e053662c7ecd1f18945be3aa8a33c
SHA1d93402d27c67649c2d3bf627888e9bc70c3a6a48
SHA2565dccba1071dc51b8513f9b52664a10c8dd349f1e795c51c49f7b7952245beb29
SHA512d15addcb40297c046c5c946c210e45b9550cd880e6c42e59f2e371640d9546a50fdd4e304b489ad8ac8226e6d4c0eae4d3d349ea00dd3d45de8757b6642f6296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce21966d43ad31c6edf09e2467f39546
SHA18a6c1242519599ea042395794ead44f268a2b184
SHA256f4fe609a329e4009ecd16fcc1b82a4d29585fb862ad15aa4cd400eef0ff280af
SHA5123addc69865700df5f69dd2fa0da0345654b83c284f0132b469a9704396b150fcc850159e6f5aff289960395c32ce58a9c15807483947e83f65705daaffb4b141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599401f61c4b450f279083ac442fc5c3b
SHA1d64a0e7f3e816bac10dfd7b09cce0c0ee5db8aa6
SHA2562eb449ce2ad1eef56fe28e5af19338712541fc3aff798c1beedb9db07d92df51
SHA512a2bdab6773095a82613017aae886e75b6b03a366e3a2c1dde2512e465fb8465c4fd16bf789a056f19549a840e294710837a2bfada04e2316807dc7dca50306bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443e76628d8393777c73d50123f9480e
SHA17088847e26959612e61880c8ba5314d3fe70f946
SHA25658cd6f01ec6f39e4f3e694c0f68bd26ccedb8a97e9c565dea7c844f08bb16807
SHA512fd9106a5aafd66ad1294b24dba30faecae20dc883651491d24fd4e0ae128d96f66e692d08306341ac5dbc37c776b6697a4f0bc9be32c3553320a10ba8b54ca9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118a3c649b42597a765346d691c2aaf3
SHA13eb2f2ca2cc13d792b8669302a6af744fad56d93
SHA25699db6498e8d65eb33ef197f2d2c69cc7efb1d397d59654371400849e0e5748fa
SHA51286d56cb94a294c2086d8bcdad6022d0b0d69df14fb74d23ac4c0d054f07b438eff3eb3af62fea178fabe1fdd38b2d743e64863f57286903dad218f665dbd381c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a170e84eda9cb14c027d750408a347
SHA188f613c57dd90455f2783a601537e3cf79b206df
SHA25662d5933eca2409a564e9bd651ae28fed11a7bdaffbb582490e670c3e08c372ab
SHA512a9b573397473037e8d0ebb3a110b100bc6ca1a50cc9d7b5f01a782bf5967bea069df7177305c13b6518eb777f946ac70fdb3c0dc72fe8f69ae83b8cd296d1732
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b