Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
d43ed70ef558bfbec74697c8c20ae49b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d43ed70ef558bfbec74697c8c20ae49b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d43ed70ef558bfbec74697c8c20ae49b_JaffaCakes118.html
-
Size
1KB
-
MD5
d43ed70ef558bfbec74697c8c20ae49b
-
SHA1
5c92287542c9e5906860492bed9121aa4f734909
-
SHA256
1de61ada387ad1ee7afe6bf46c8d75f33d442830d05fe7300f5038d17e4b12a4
-
SHA512
dff2d816049baa0bfe55f2427b0fc4b18102823d25f0a231c9da587ac63ede4680f6f19dddb91262bcc291ac0c138138d0ec47b576a449fc3eab9ebf85f2dc0f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c563c345e279fbf950d3c0ab3de104de9b83f2cd5a682423ff68d88ab51df65a000000000e800000000200002000000067736584de42cfd5e334971de6a1608996cb93507eca9181d485b1168a6edd0990000000abbe7869e9905ded81b0f97dd616f458c0763fdc881eb28d5e68a7f253b0bd40f098e87ff6d8b0923d1d94f89bc9765ca8168f68b38322eb26c6f11138a5c782730221d41a6427fddb06c7f16c55c0c73eead27a918e3922d2b55233d9b42d0b04cd6c9d83ed348e0fd557a11e152044ea5de6861eba8b04db6b6302cef986abae6dacae6d5cfba6b1825bfe8b0608fd4000000083fe8bb3191db2a3c220233950731f1ecf84692fc1d16b600c0aa2f747bf57502f0cc07e1fcdc145b26073981b04e7820d0ca848704257af6203e8ffbce3a39e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50101589e101db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000002c8a3eb44aef314378bbc19dfd2b245624257e835f79ee1f0a4217b59f8d03a6000000000e8000000002000020000000073aa25a39fbdf8c741ab45a4600ca026b9a3c7303fb9bf27eaee62b6a3f3d322000000048b1bf9ff1d01dce650448a99404764c4de115ee74cd835db669116ece621c234000000095e84f54d46e02d3095dff1bb5941ea716597690a9f41997dc67a05f94796eb4461efd2b63f4937d15ed9962bef48d924f811a043059aa26aa84c0ff7f935579 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4ABFF81-6DD4-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431956448" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2332 2180 iexplore.exe 31 PID 2180 wrote to memory of 2332 2180 iexplore.exe 31 PID 2180 wrote to memory of 2332 2180 iexplore.exe 31 PID 2180 wrote to memory of 2332 2180 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d43ed70ef558bfbec74697c8c20ae49b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc3c918cd8ff1fb6cfe2efd8f4b4272
SHA10a23ade2d3eb194b3de7dc457be4c5500761605d
SHA256cc93e01414ee31ff30441e84242198936f79d41c5af57c40549253eda83f9103
SHA512bfa87998d2024806c868dc97627581cef357456cbb80c41f1c0242fb494c4f9a2bb805d1fef29213b29db9299dea5b0dde88e05f348af40b527681cfcfc24e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eface23fd6fa26a9840a061b303e54ad
SHA1bba64a8fcec232f5fed5b30614f55fe85603c9fd
SHA25667be2abc2efb602050abb60068821140ff9352b693b48d9531d75babbb6e993c
SHA512b45c4e70fa049758eaede48b5a14dd2035ad591693822358416497fc97feb989c04d63a7e49261422b5a3f8a09bdf3c2f27fd13188d93d8445c2b5b14c164b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59040e556aa759825bd41701a4b66ee66
SHA1da74a49f5040b39a5faf8582af1c05fa63872d47
SHA256fba0638f140390471a006ea2b77a58db6da8dedcdea812d2a44af344a3b0e55e
SHA5129d258e2085c9cccde62c0ba87bf5d3ef77e8cf5176304101201691a44711aa68ac22aade2e2a8a910a6b57b4b1b784135ad55bf722d18b96cc356660088b85f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e255753d536f38296d4a6588e32b14e6
SHA1fff0c228b43265575c4ce61d9e4e2f119967d5b0
SHA25644d18434e84fd4a2d4af7a0caaf13cd8c92816e0ec41976e7f29bf1777fb1439
SHA512f460ddb8be6bdbf09233e123c373b80a4e00e8729ae02ac5453699e332cd8bc4a930f8a8e84fc88d04e5603df4edc7ff1ec450ffb7b2695fef34a4db1589ce88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52389f4d9ce290c88fe9ecb690c1df320
SHA17682af659feb7d8f44fe438713159db9ab39cf45
SHA256d9d6ba0158b498b0839a6711032cc679870da7415ee1dd5212f96f81cc334900
SHA512704a27a9397d7fb9b1af9ed35a02a8e79c012bd9c7b7efba98ab51c9e27af3362415f9f0d68922781dce6e9a929d05e039ee9a0a457316d778631043b8cd7ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aed737117b0e68dbea92c4852face33
SHA1d724bb9a6473348f60cac95a69a0a3fea24d1b8c
SHA2563aa61612270510ab6a1ade2fd6ce84c07266cb98dc549efe867045fa5ceca877
SHA51200ad46e956edd3f1f3392a013a68f8e15b2511b264a018ad36b92c74c987f46726c0c6a55e8c2f8769d76b3b32207f0e6b905ea2d807086aa909f4cac554ec71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204d4ea653bc9bcc378b718e493d0eae
SHA18db31d9905ae593fe028fa7cc618d53691523965
SHA2560fb0ebee6c54fc1c82823c8534af224236fc35c51d223ae1a9fc39276136385a
SHA5122868393c5c575c5c31076484f5dca22024011aa52b89927bb5c0effcb4b234cc38fcc1d6bf55d0b7069fb1a33a375a128fdcd3602a9f78da2fce2a09a97fd6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125a16b6e8f141c66e3636ae6968bacd
SHA14816867ef6f50390cf9a58415b0af06fffb717c5
SHA256274cf2e31b5bf10e65e45c6bde8a5a5ae00d14bbea15e5eb9cca66694425f0af
SHA512fe4980ce4df27fcae467e91020406e77c3d1dba7a0610e344ed70dace0996afbe47bc8cbc6052751d0e567cefb12df6decbb14785ce4e3cc1133dfd612529c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b3d09f80ca1746b6320f2284e8af33
SHA1205658a8391729846596b14ba6410ec2878c9062
SHA2569ef46b0f2ba84a82ce27aa54a4604e29d8efde970a3b15866f44058ef67c2140
SHA512253ffb572357ce2845854759da20de622906bfbf43db28cfd4d235a4e9992380396def4601d27f8bceca174bbedc2625ff94fa4163256483bc45dd859278ca42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957199789474159b53375baf1cd19215
SHA125deee93f06a24d11984a47be8b249f58e812483
SHA256cf0ab6cc853c07789e95829c883a78e452dd8218a6f5f3e91ebd638631f09500
SHA512d880118a799bcb9837ede780d3e884eb658d2e83bb225952027a210a49ca13bf9ad03ab0efd3c52e1b361806b07bab92b73e4293ea7598a8cf9e7e4cd96ed7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4d7ee3704a21decfe1e695aef9b28f
SHA1f73cfe7591fdfd7222f0ffce04555b632dcaca3d
SHA2565b298138505e61f9c5d3c63efae4dfc4b77422d2d73880d36a704079114e9881
SHA512d0b5636169bd5e41010de6bfb45cc63cb7bb678bdc6157a8e9546e3f1dd79bc5c13aa044902c94c7bfb0958f261d2f5ed876d2104cf1c75078e948923275137b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa43924b9595ec68e68c95073991b51a
SHA1d10dce81f7596854ada323d37054fa77145be141
SHA256bd38e3314ce49b21d1a6f751a4608e33624be3bd90aed0a4ebd6826d56781da4
SHA5127dc32c08563f7a64f028cedc0ccacbe60196b85b44ca3bf43cda87b74669366c7aa48321fa6d2906270df9363334f32916062e8e651539384119aa20fdf87264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5f15c160764c22b82652dbd2f144f1
SHA1a90194b75cc41335ebf15ccca52292c86f050065
SHA2567403c0b9aef364d71cf98adf08c4ffe85de1ecbc4deba6d5d7b4d55f729166f5
SHA51256d561243205499534c1534455659215033090af7c869d7d36a43afae371c4121cba2a1977723ef309d7b546452c59f1dc8383e5bb7841a1671a01e4e24dc54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5f4736a1a51deb6b9da52531008a4a
SHA1bacc37507eaacfe55fb9665b078dd559366a739e
SHA2563b2f3fc5caf8af65c6b8a4abf3690429b57d868fe41b51178062b5c40d241cb8
SHA5126cc9a43dab5d359c2f07e5862ba13e3cbeb9f932a261c337a1272325ffdd20ccf7bc0fd20d9f935cfe908db48b489757b75ccf29fb37bfc2c9f6b02359861b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd46909553b17cadb089cd629b73777
SHA1403ce334c5583725f703e76b894310d91509e01d
SHA256c52592f740b2493a0381be998beb52068c6be95212ffeccbbbc2942a27fe8655
SHA512dda6885b6c1f31845073bc9be2342280afda5a5cd99a61bbb632aa022058ffd9c0b3cbd572212bf6b6e2d19cfb4a8b63c82c8eede8219e514292c098ecbc9f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa017621fe15547123079d585f738c58
SHA1a9fb68e1807aaaeb9d68b49a9a31292dca479639
SHA256a9288de713f3d422572b0baec88d64c4189fcc4e141745ff9edb6ac3c4b5b9de
SHA512c55bf49225082cb286fd9501687c95e264c02ce73ac273b87e183bb8c876fbe9535c44d48ea10eca254ef040592806f4f723150696c6bbc94985fa9d3f175c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112801dd01c0c0ba723594b2edf42369
SHA109cf637e4238f722f5f740d1002ee4ae590f67f2
SHA256bc155fc1fb3594de5c1af31bc862edd4dacd4e69581860828b0bc552d1f33a37
SHA512e31d0452861aa47c4d04f0968d183bcbde136188fb6e7b1613dbd14eab5192d73e4a1c077f9201351dd127e5a58618456d6bf159956a65dce61289f4b6437a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442d166c0f6eba3361b306758bf1b8ef
SHA1f418e89662903f51ea382ffb51560faac8333887
SHA25644b0777a1bca8e7b187992cdbe539fcfc2ac6ded4081b21b07fc2d8c30a100d4
SHA512d7ccb3493378f95e38f5571a4599453a907c817a68541398ca9aa1e6d2bcb8a7f09f5561199c9fd966c4767610646379e49ce5168fda374d06c404a2d6f09193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5c7008a6be26396ed2f440b3c1f0b7
SHA1c41aaa329c36ecece313580f7c7c5ca89b524e13
SHA25687cc714f9ea406050b91a73e5d31dd253a389d259a4b6c4285a1619177336b0d
SHA5126ea6da6975c9e88c8ae1c849d438307374f006765164030dbfe7b573c92596de5f6bd347afe73478e32dc365b06ce46f5b43e98e148eb262493adcf57e5999b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ea24a5e6a1a8e5946177093884668c
SHA188d8015a9accac1b8df9dea58375bebdbf37e4df
SHA2568fbbeb3bfaec5344a5fa09e43b3901c13883b9e39b0b8cc2d3bf36536305e37e
SHA512ecb9f0858fd8d6283e580479080772b043da008a317adedefd03a659c0f6260638f253a49100d59fd74f75db63ed466412ddedde0e555fb7f95891c0b09560f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b