Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
db8bf677fa4198a11d891e28b1843313_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db8bf677fa4198a11d891e28b1843313_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db8bf677fa4198a11d891e28b1843313_JaffaCakes118.html
-
Size
27KB
-
MD5
db8bf677fa4198a11d891e28b1843313
-
SHA1
1e5b65dfde20004ddee33ba85d11678e7378899c
-
SHA256
10007edf65943b2cfe80696d3a0ba8ca6f02b8bfcf94e53825d554b1a70b66f3
-
SHA512
2fb298e4eca28ae7387158642284e7bfeb137efc2335f415b52f66240b7e30e1eefc6767f3f24e797ec1655097e07275af0bfffe051c34791f24b4989515ad2c
-
SSDEEP
192:uw7cb5nYLenQjxn5Q/NnQieQNnInQOkEntrvnQTbnRnQ9eu8m60NcOQl7MBwqnYH:HQ/47kicpSiND
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000077775ca1cc8ccc8b090a74a92aba2aa58db0ec1414d6f3a9ebdd360cd456dad6000000000e8000000002000020000000431daef7a266daec51093107e7ba2650574fa7a3d4ed38f984c171340c2dfe93200000005239cbbc15124531b277f3812dab04d149933f8d3cb60720582cc19586623bba4000000005f40f03d63c2fc82d92b3f015688fafc20563d05d0f1b0c23f8cc3fcf5eef63a858924bb35be6be9a7b4093d82b6e1bf9ebb4b44539001297feedfdc62c83ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30CF0AF1-70A3-11EF-913A-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432265035" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bbd505b004db01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2704 2816 iexplore.exe 30 PID 2816 wrote to memory of 2704 2816 iexplore.exe 30 PID 2816 wrote to memory of 2704 2816 iexplore.exe 30 PID 2816 wrote to memory of 2704 2816 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db8bf677fa4198a11d891e28b1843313_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517739457b26f2c740cab96786c516baa
SHA1b8db9f871f20df7d58259b8686f7ac06fecebeee
SHA256cedb3ccb3c265bfc7a969029ebd2f20c117d356f6230ebdea9a491453d323926
SHA512093aa1b3ba34350e6622e7a64375120159bc338f8f3a1a479d1a2228fc2408102fa02f190370831160e388cab7363ffd4fb587a156713d07299ae3a1d2005abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3751edd2efde5dc9bb29dfaf0cdb4cb
SHA17f9d28c1d62e567d92adce5d2df3aeff2d3ec0ca
SHA2563b61b4d8f337653651c8d74b1cd77f6c4c0a19dd2e445512048c88fb4c8e1790
SHA512366ad8dc2b1959aeaefc1a63561d5d25250f9db6281ee946579dff28aa506b7c9086c595a6ddb4925c0511d7065b01c3622a6a3e3908062bacb98ee060a55113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207a79f9753b327e161cd9458947daf2
SHA12dbda042459d7038657f78f3708d63452b61d900
SHA256b0589500f784c9187f5292a9b92297ae0f9c51ffd57cbee01f6ee076a59fb8c5
SHA512bdfe717d64d2d8dc1be5dcbdd47822a59eda514c36624fa1324f84c3e4fe8a37e44252cdcf2843cb071b0678137014ffe3792807c6aa970d7d165d8d6064bf20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59243d443c1e3d69c8e763339668ac255
SHA101fa6465bac6a4ec7613ffc3f52d90cb1ad03175
SHA2566739dbc774ffa650b600da166d0f6880fc0b815418d85df6537b9b33daf56ad6
SHA512717bd36877df9340220b443701f834bc1b964ad4b67fbc1ddbf0359c1f6fd4e9eacfd6c4e38e9d6be0ab140641418d848100dead9e5cab9a05233016bada400b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f18d50c302954adfc9b507d435d174
SHA173c60bde43c5c2005bd44716f23153123ea5a4a6
SHA2561bf3d71191926072815a890a00a0ae0d1f8415f38db4af0f89c1855e112224a6
SHA512cc9145dbc1594ee2e3ecface83643bed4deefdc5a6924ac3b70154d4f48034dc7f59b03f67e1f11a51d3a3a38da0e74e4f0b3eb10e9a3ac401cce9fad7210eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db07e9f1eb94301e9b67e72c6411f37
SHA106e46cbe88e0df3ec46f3fce8bba40db5728a913
SHA2560ac2771d843b702c1353d2aa474df2877d01f278dfa661f1656b806515470385
SHA5128faa7b8344c78d757ab79f6331c772fb46a19f4b4fd27ad034ddf488f60465970f899b169178234cdfca18219a5b9444a0556331e38809d27b7849f443e1605a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a7051f23957ff0689dfde28f775924
SHA15dc8d5631368f91f46f693cb7ac7d909f6a75b38
SHA25650608d9266d97238aea65beebf2e39f538e29c47ffb555bd6683c4264b34a20a
SHA51297984a8dd1b637b11e9665c538a207a9d71e5e76c2d4afe70b2fc2d3f7ebc2fc111c825ad42d19536aca5d1f17a63c7846260d66e090f97a700df098ae4a8bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573682775008cbf1aff1682ad6dc9094f
SHA11c932b0124948df42bf8d70494ab3f89ee6e35f9
SHA2561fb08712d2c0f488eec5039a93f7c57304171d43026541d9c4076f74fb466d30
SHA51216311eb9143847c12ce2efd8937a5e26d2a1c5dbe66b359b9ec460222313825ae2dfe7129ebcc4ae07cbb7b6b40932ef27724266956067cddc878177d34545a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d11ba00250d4b3b42cecabc9b3317055
SHA1068df2eb3a146a045c02acadaa4c7ae1e4a03d2f
SHA256a4c5d8748fc92474847e1a86e6d5e2108e1e4987a46efcb73b63dc3d530fb141
SHA51279e81cda8ea21815a3fa2cdba071080cf4f2c2b3a1471c2ea85dd8f90846400efe27c4e58735833c1fe26f0712e0cd199dcc76ad123a64bf9438b8b922144cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70e9b8a397c28542554118d35f0382a
SHA114d1eb4cc6f666dce01ab0940cd68c16cd47f8f9
SHA25626dac5702e29ba87267d7b276d91ff31c50e066ac1a0e0a6e48a4dd067e00f59
SHA51245b5fcab467bef04547aa56a4709c5b0631d5f143c2efc19d769f356b789f08d47fc2d61cdec80306844bf245643139614d27aeda60f946ef1a3d0ac9c0a9764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02fc1919424e4361a0f133d41de9487
SHA1537e34c93a6bea3aa756cc750018f3ae91620a39
SHA2564e25f4c9660d02fea33b6665cee00fed98fc554be0360b555b9f90f20eb8414a
SHA5122d44a5e6c165527d2674dd8a9469d009a9160eb1042cb9c885a37ae557874d1ae423f2c2ed479b23dfd162600a2e421d45f41f0a37063e6a094cef3efaee18ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9efdaacc818796c5afb6a8e042c62d4
SHA1ced96dcee8373d9798d0fcf6e3c52b7dee2f95c0
SHA2567d601a3f98c1e8f456c9d757d5d4b99166a11d4c27fdae0992bb2b328e7f2c30
SHA512abe48924a2836bffdf59f9b53c6c924ed869487aed1179930744a1fa07387c8a2cdf07023e875b110ec44cf7228eca03d526f62184b368906f3ce6447305660e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352225d2aa671b2ce273579dd329872e
SHA173ff2bbad39991bc0ca0317906e875efacaab8dc
SHA25614337c1ad498f5592b1bedabf545f43ad8f711693c58b220f85a6d6a0e862792
SHA512684f7cee146b47326e103c3f6449afed2495bab268d62b70239ac1ed9d48358ffb536c96099e934d382b67e469c9cdaf98475fae1bbad907be4ed1c11133acc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909df7bb466bef8b870a6425252b1df2
SHA1f9564069136cfc10f3a695052ea266b9e66ef55c
SHA256c88ade14f071925207bf32c6f8897cb49116608d23fa893381ee7a3bb518a6f9
SHA51262bbfc7216499d4fc131ccbd9266bc92919dcc7bd2fef5aeecc4e821e536abcdf03aa80cc4f78354a05e07a557258f23fcecc359713b6d65908b01f431309557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b977ce013a89921f0d36af9c2040f02
SHA138ab17668e4bad6b2f4f38509b807b1f65ec3413
SHA256b7bdd762d8e5f557d6ec82d2491311fb1433e0e15213af01188f9811754f049d
SHA51291ac5f5575c848a2f7066efe16e03834c8da6d780b3611b8378c02ea2456a7b29711be854762f7ee3ce46818bbf724c8c23a7f5ae77eb4aad9d988933ba5ca06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c46095d2af8e082231ae2d73e7fade
SHA1498f43970070b1fbb5f61f08a6d01274801f0c24
SHA256e08cc8e080e1f4c6819706513b76fc9d58050e2496572d61b6acfcf49c1600bf
SHA512789227de028b3017a53396bff08381d1ad1276007b75b3567520b19278fcb7fbfffebeb1b3a2c8a60f16646194fb70c05a507024490c57d8c6f3de3e05537df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5ebb940a3975d3034acb5993ef37a1
SHA1d7a2c96808a983eabc4eb5ae66e7a34c07bb84ef
SHA256258647d71d58b6fb565721c45221e49a4b8a1ad2f3807e89a5003013f5ddf211
SHA5122d026ffc6b38b5e7c11ba136e9452fd007302970edcb40d456d0dd5302e1e9955c9f11f5792c8299d026288b5708b304aefe7040e93e1919c09e9d93a7540ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31bba990f98641ad106b272d82a10b3
SHA16a5a1ab7e965872fca31621f572068f6502b41c5
SHA256f0ccb802f9ff9d4f63d955ada45733888406fc701cc4574b6b007f1ffb1f3ebd
SHA5121047191d50244b16369d1f643cf1331731d6161a8ed52429178726b670718472b7f2d0fbee038c38987ff512849d38dca86ed3a6b44679e4d43aa7cef1a91cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804beb6c23c2bb7d2c9b8eb57c54923f
SHA133dedc83088dbaf5a786b3bf232e0fd5fe1a088b
SHA25697367bb996011b0330f2d834bfabd0f6a5e462d5a45d08daf6d8c52f9fb763d5
SHA51269c340429f0ad07e55bac9aa2f9fc065b74c9354e7a8c85cff5c66eb3dbc7a0f2fd7fabe8f180dec9cf839c1ad1f671fd1b2be8d7b27bc0c6022cc7c342f4383
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b