Analysis
-
max time kernel
133s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
04cd5dc66f626fed06e3930fa2dc126b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04cd5dc66f626fed06e3930fa2dc126b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04cd5dc66f626fed06e3930fa2dc126b_JaffaCakes118.html
-
Size
37KB
-
MD5
04cd5dc66f626fed06e3930fa2dc126b
-
SHA1
516318149015eaccab5c6cf4d833d0e9c521c4d0
-
SHA256
7c76b0db724c0d96416faa30ac4da0c8ee45943b4fac08c33e53e1f484287cc4
-
SHA512
1653ea3e354ff3cb3fda3dce211bc1267bd8f525542d6ee68e44a01605bd8ce7a67055e84bd7ff5b33b0ba8a6c8f16804dbcfd08b8746ae2ef7d7a98d2a44729
-
SSDEEP
768:jTNsRsDuVxI1XGbD3Gxw8p4j/Af4M01zSjE65Ert2tqvZDgJiDfJeAVxhj1qL7FJ:jTNsRsDuVxI1XGbD3Gx74sf4M01zSu2L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433928342" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604802f3d013db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E10C4251-7FC3-11EF-8F1B-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000b3ca49003c03f9f8753ae582557ee6f634cccbd9290069e602aeee382a00e546000000000e8000000002000020000000c7e8aa3c731b98932a03bb5fc37b787c0e843c69367b11f8be21b5505986a8db200000009fe8987f852ae6886cb4a30e96084636f0a6b8b0584d899e8c52ab8d3ad6fcdd4000000064cf84931fcead47ee28c925974c53bb74d415d788e55f4ab61deb331678b7eb4c072e45e8075428b354d9efaa87772c688a8372d8d9dabb3aa66e73e2081f18 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000868ec029648528beee1fe7a008cb4d4437c4d354bb3e23567a0c35dd5ca46c00000000000e8000000002000020000000a4e31f03ec40d8fd2910983b35bdf6dd3bfa1ba3838570aa9dd927172874cef6900000004793009e20354b7a233387d3fa3a6309d9c42e9b4e6cd1ec7dbfb741c5b04f8e01ae0a3a3a1d6e312c8bdef9a6df6c6144c850f45e5dd2a84fe72dbb8d6d7028072abfbc9c7063ee4fe6b97d91c519c9cb4ac4732a2140865a9afd059051f826d2346ca2d290592fa19b87816365385373bb9281e5e9bef5ad7ee5dd8b2723d5271f6216b3f69b4dec8b05c1863413d940000000cc42dc1df9b96e6c80d04ed9fe4bbb3adf30e63325ac32f599bde94da5a68fb4c8a15d590c0622f403efbf66a89680b2b5269fcce961c78cb24421c99eca3e46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2752 2616 iexplore.exe 30 PID 2616 wrote to memory of 2752 2616 iexplore.exe 30 PID 2616 wrote to memory of 2752 2616 iexplore.exe 30 PID 2616 wrote to memory of 2752 2616 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04cd5dc66f626fed06e3930fa2dc126b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50278a5ecfebf071f65d60bfed9521861
SHA100dd22b16fc9c8ce83ee9fa39733e1079a1e6f4c
SHA256bbc361532e50cca140cfdf6395c8d996c2bcf00e5069ac2e666d5766f00ee0ad
SHA51263a879206104ed8b7d8aa352dff7306a5e02f67b5be43e8416f383bb5f78e3efa7f0991a8ebaf820cbe123ea39ad2a1696cb48aad923f224ed99450248bfa357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9438cce4ae9408f7032d97e8227cf6e
SHA11ad669b04ac2a8abbf9131a8f262dd4539303a95
SHA2567c79ab011f146d2bc0e30244f9c7117f2705cd679944514ed9daf436770e02c4
SHA5129283a6053e7d6e2b81fc3d459efcbabc036648dd2050fd7b12c8119cbe829a0db910dced70264eb70039bccc7329e193038a277eda7f05a99b263fc9979956d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c7517c3feeccdfdb53359f2b82168f
SHA1c6319be36b8c41f1aa14bfab3462f39e91614b99
SHA256e7cc8749e887b48c15d3d053b03d18bfe7a5139cd55776986d8143228538775c
SHA51212f314175b112ee426f1474c06b88ca4f2d881f776a26e80f5ff3b6cd8af081addfe3d2299e868cdd5a06c92dd96f297f0f7aebcf94199310021049c8bd63f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ffe2f3a450e9e74bc1f757fb430975
SHA11f6b0a9dd0997d95afca5da8950fe4fcdf49c1ef
SHA2561bed2d07135ab7997cb0b6c8aba91053e19b7520721f740097d5f284205b8050
SHA51224ab36d5a32ccbef73f391a454c0dcb4e9714f08dfc02b41dd9027e2882585d9107298b5fe0e846955b9e0a76c909318f3fd94e679e363640714b6f343a9ee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdc7f412428f93c0df50375e8e0919c
SHA1321ae5125b78c15d1a2d28b980a99b5678b4206d
SHA2568aa19210dbb898bf96e9ef4736eca4408248770d5d1e9a3a157fe9795ac004db
SHA51251f1390bfcc79f2fc8677f7ec1d989bfa87ceee262a43e68c3360f4fcf98987c21d5445eb115a265e06d40ef199814f7b7261c1380ca927901f5a7573dcd6451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab37ec3bc8c349681aba48eb73891e0b
SHA1d645207195ceaea15bd1a725f95d4040c913097b
SHA25697a20e6ff783c318d92442c033e71dea2bd385da058cb416bcfd7b8e70578b96
SHA512ba7f3c79f7b88fe6f9a03fba341223c219d4bdb06c7059d6488244e4c2b1c732e64d7aa60392da052cead0e67258d1d1f242e66191de1600d276da64950faadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc8eb1e845be559965b95d9b94d3724a
SHA19cf17cb5f716d29ec7803422f76ac702f4f2a36f
SHA2562e93a43bafa88b2bcfe6bdfe7ed1a481f24653a5ef691892525f245ca294961b
SHA51252e2fdc30fd8fc2d5b189d2745835a51435a35c05b77f5cc131190d1d867bfcc1995dc2d95e3a46de3bd26b5300b92ad6e2e508b16a7ebc88f42d6989ac649cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5f991d4d9199a2aa9f702a080a2510
SHA1356b52f6f2ec4b6d43c941c6e523fd8f2e0220c6
SHA256331bdb1373dc64699623263a49358e9ddaef26dd56b97cc559c1f6784a295c20
SHA51282fd01164a85a08564f6087e8bb0401ffcbeb73df4a54b8603f07fa1131fa867c82e9cc26ed6ba457364abf924b3661b451680b7288edfd9834ac51dd20dbdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b20cd3a338d926d12a65fd2262f9644
SHA132153fef672364184c726c137288cfb5ae7f4d1d
SHA25604610074e6dd3ed49a57cabe31f5c9d25a9c97c22e996af842bcb270ca40ae68
SHA512cb78b749cad031d1147f441c7c19941481c3e3590ab6abd996de28788d5e1600ac7f0c181c4f916d1be8643085af48ede13e5847cd8437265b88c406967cd74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c3f6b9e43f3c4cf40aca0bd6e5b87b
SHA19f19dcd8cb8b14f3c43f8c5168c0b74e651663f6
SHA256a019f6032bc05abe0039a523056ac4aa439afe24a71a47973bda9f6a2bef703f
SHA512e364feee1b8d18fdebc3af016c5fd33c9faaf63a528c661684edf0fae111c9a7313a6ed5cdcd09be8ac0ae4d230cfa0941b361221f6455771d6e80f57d168ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567291ba89d1cc2dd9ee228025460336a
SHA16b4c7ae871312e0b87411f874c1a30967e27f3ed
SHA2563a581d06e52b86ce1820ddef07f250fb64bc29441eb10990c2b9ef97f6613b3f
SHA5129c5cf021a436bc0c6eb117582dfddbd7e1f6e0ec54d21e479e89c95fe7a0b38171f741553c7b9571116c53fab3dbb84522de01c8139e1dc0a38aaa1c8dc1e1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb380db81e60bd0b296ccb7ee49b1fe
SHA194ac4b849cc9a98e46a52fea6c09bdaacb57ef0f
SHA256ba174615666522d90e949a7478ed1bae92e1a2015d83c1e57fd61b577f2018a9
SHA5126f83fc95d80cef7288550ca0d807baefd1ca8221e89623eadda4a091d23a44bec50e2f43dd5d69039f39fe98eb4f3e84ec839c48045aec3dc05d6e2c67f26841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c26b29c13ce5493dc2a5b4d3176a140
SHA15bc6ce3ad2cfe129ffdedd43c3d94bd936b22ea9
SHA2565be0c51fd1c7a06122f1eb87afa84054ba3865d2e68ad8cfc040d04451a01645
SHA5125470966af7f9ffa0b1a94d36f9e267fce79685faf1ae223f4d82361e854039fc7b0f40fd2c928eac550a1b2651037eaa47aa106467a5b19f5e0c1a1767b0df3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0acba740caa9498796eccb11cdc4bcf
SHA184159818884bcebdd6a90ad5a29f4e68ce0010e5
SHA2564aae186ce8c38ec7833d712baaf21b59b0678069ad8cdb4b97610dfdba0d51c4
SHA5122ee1468bf9ef44ee3d59dcea89dde308f90b2f2bab1a5c3da0feb3d1605d799c375cd3728849f7e72c7cd945bd99b7c8b0a2018026c3817e701fd6e54c31e32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105f55bdaa283f4b0f25559faa2892f7
SHA1cd4a9ce3860901f651dc8be3f5a7c975c859d3e9
SHA256a6358edb27c76df976acca3879d94ce336a85873fb18a43388f9f2171fb0a2e4
SHA5121d588f50d2da36b11dc8dc7e0796a0f7b007e25cf879525976bfaf05df20e50ef09532dd830789b6d5e7ac77c7473a627edb63b52c5edc871b782f90e8fb1057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59585a368206c6f39a617f8486f77f18e
SHA18e590b3adf884b36656fb906990158a625761837
SHA256e01a1fae958736ed8220295e064db154a740991a4a25530eaf9162f9d2d46dba
SHA51217f7c0a149053161e2a2af3126f7980e0f4b7a60013c2109e16e7c186ea158ae2e45818ececd3b5e1c493f22146495d9d0b8debbb19b2b88f198e1f5765ce483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5f18dee66b3302842c67f75e1af2eb
SHA1914b941e8d3000b64f0e5beb8c2384284afcb491
SHA256a0792c25650337f68fb601e32a6eaebf13f0dae65539f15a55ed27bc528a5d7a
SHA51212693dab93ae4361e15d6012ab9a62d04a7cfdbd58109fe3ee88f672b6b9355c7ce33345f32330ae1b025b49e9d1dc91c721d87670a275564a5d519d83c0d329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ddbf806b17e1280ea5eb887630ace5
SHA11f84f43ffb4aac4ee8d27f8a8e44337b4c7009c3
SHA2562d419d1cd07a10293b6c39415883efa80badaff6968104c5bc12541793a7b07e
SHA512bb5980e832b12f4dc8640a5f7e5d2293046fc11c9b93a880b11441936c6052cd07c811b9bbad4e0ab6172edda69035a796a430255ff1b3a62a8e8d8944cec4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503135905a7ebdfc7b4e6ab0d7d2df8a9
SHA18f869c8a21d135d137af5a935a80a017b373810b
SHA2561aa0ee7c0ad05fb33acc6bee5b22079b03066494d4ab394257f1394c5299b7df
SHA512760f47ff890c5b8e7f0f9b04dd7a850126ea660ff4abbeb7b01df2a2a3a0e371b736e050b5ad58abf65f09e2bb89358be813f5e7c367bad52e871c8971509e0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b