Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
0fb54b943ddaa2d122b57b2d0c528f6d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fb54b943ddaa2d122b57b2d0c528f6d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fb54b943ddaa2d122b57b2d0c528f6d_JaffaCakes118.html
-
Size
214KB
-
MD5
0fb54b943ddaa2d122b57b2d0c528f6d
-
SHA1
fa97d03d0dda659f431f5e51800aaa127d88715e
-
SHA256
9509763e4d996979737eccf871c9aafd4cb6894bd0a15d7d2dfa6cf4d92e421d
-
SHA512
d919a89c480e7d454caff0706749e60aa155ae0269b67ce6d41a6eacf0a5a7b49afb3b42326ea45c408101495658c060a1f6dfb73cbc10fcf488ad5cf3f2563c
-
SSDEEP
3072:erhB9CyHxX7Be7iAvtLPbAwuBNKifXTJA:mz9VxLY7iAVLTBQJlA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EA1FB41-81A7-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002fd9e9e31f196eeb8e20fb1591f65ee9494b0010ad463399ffe2d45b6f0faea5000000000e80000000020000200000009a5ec01079c5c8dc4fe7de7c67b19c9d752d181e7b1b75360714fb169da869b920000000e07217408f564f3c03916de76a5d1bb2ec7d4a308717a6276f3fb8768015defe40000000a3f308ff1d9290cfe13164f414f0abc6d69996b8d56e6427ae2da32a6d98ddf4da130e19b0ed2b748ddf178542167eea370a0ec088bb733b8a6acf2cdd9f6840 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434136109" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500eecb3b415db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 280 2016 iexplore.exe 31 PID 2016 wrote to memory of 280 2016 iexplore.exe 31 PID 2016 wrote to memory of 280 2016 iexplore.exe 31 PID 2016 wrote to memory of 280 2016 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fb54b943ddaa2d122b57b2d0c528f6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2896c9d124609e50f95f997f72ca48a
SHA1d2049c3b31a6b34b6cfe8d7a29c2dba08677180c
SHA2561051af24f2317e1a63ad06887b72b641790c1aeb3be7c8e3c536669470a077a0
SHA512c9fae3e0a0a9266cdd6c0f7f540eee604c022aa442971ac7ac59fdc8c0770dae47728b67c6e508db3145330dca4d337a5ad4c220aee99ac9669eb4d3da07fed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c53379183d35e82d1a90ef41e1cf01
SHA1ce5f41bdc8baf257289fb16c05eb86bf66029c7e
SHA256f4a8763af3573694022f9d6a1faab5c8c2596cba43ae8e0cf9c5ba93df7c3e41
SHA512509036b5fc62dbd98b6599429e448086190719f46f6d4f654fe656b3f41ce2867d4d95da4a38fd82f68e5b54dcc107b80d7d8b8bb62d594dbe9059a245f3a6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791e9813032fb70dd00f560352210353
SHA10ebdacbbe7262b89dca7df1e6a85d543c2cf971f
SHA25696ad1ab452f0ab28f2d98c2a216006fc51bc08d6341891221fc929ef72173ec3
SHA512e568005e94ae8fe07736f5f89c8d05cfaadf4b7908ba00276d41e518cdb3b6271ff6672f30865da9da8e95b1e93c5cda09bca0eb18d91f0a75c4b425ba63a833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94e1f020219ce6caf273a1bc9404db7
SHA15e7d3b96054ab4ee54c282dc745d0df0e8709a27
SHA25638bcce1f1e559bfb3a5f4b250b590981c90d6db6b204558afab57ea8e55bd0c4
SHA5125f20797e767804cb529c2a67ca7ffd586e9a2da93c19d8d311166133b1686cd55b87f15f2aaeb659c91d420360f69d363e4246ab1a343c62eb73426b0cce81fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5754415c19aa3808431914a6c4d696
SHA16f319e56340bfb7256516bd40f9c173d5f4f5686
SHA2565af219bd7c35a0cf5af5dacd8837ea5701b8d5332a22671574b9913866e99f46
SHA512236fdf0f528c0c1c79d1d9b4317e95e081c5e64ba27e410def804dc983ab51b1918170387765729ed89d5b1ec1a3a3b435e43fec611a23fc003108e151cf597f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13d2fa0aa91a73598c26aa3c439c755
SHA13a142bb4371a31c036c899b5fb4cd01d9f7a31b5
SHA256ac96280978f75f6f77c909b39c7eebbc23ac5c1d1f05df8e795535f5e1b3cbf2
SHA512a014a5139177cb0bc2e61bf27f21778d40c34f85d9c94d0fc9d57a0a804d042636e59bcd6ad51adab9568c7f09279364aebb563258a9d345f681ac8e21711aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a907790fa7cff7caf56f89b530446c1
SHA10d100e6e4cdd8109e88ecdca5951dafcf92e1618
SHA25615c4e8667064499e3c7a26d8159e49ef91f5979e3aa94bbf205498ac4e0fa7be
SHA5120b26b864a7d0ea49e73d00923834a262c086b1d01e521f2ded00a621b381d527de4d145a19f68ceb47784d8fea1cc1a1531c5d3a340cd1a0fa4646920be50be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7753a909439c28e3a3e2fd14da0eab2
SHA1bfd094b03ea1bfcd88989d12723a18b0fb5fd50e
SHA256be921702c4d4779677f86ad467dbf61ad2a76a91367b16af10518985b4c65f51
SHA512db789e0d875c5ed80ecc26aed9a7b96a03a97419f8f6e0051a0ebc7737f2d420b4a3621de0de87cc29ad6628641a75e96a2f51fda09af733a259e7db09d58920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e4d1738cbea802fd82d15cb1e237a2
SHA19542ed007be19856ee4111ec6c5061b1ca115d54
SHA256fc985b0927371c3ea04b07ddff8a16d6956cd2bd4a7d1fa2c407b86c396c4183
SHA512cdf09475124f8ba9c9c7a5fca00a4ec185d4e6c6e559e58e825e77195548f23f1b1f1c53656b7ed0b694703346dd9734b49c80d845b6f726410f0bd35a2682be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffb03239d6f95b98d33ddc802751acd
SHA13ecbe788717d497544092964233c7e79961c0025
SHA25689b031409a9e529b996c4ea01fefa9055c09aa222bb6d203f5609c57a1e5cdd3
SHA512ca73b099018496dcde7e8669391a7ba41eaff998eb58c30d51f353b91439893b8a421d4c4a3a8096c124b4e3d187f434735a87513b1e8256d1a768444e996d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5441fb997d907610b5e3883ba38f172
SHA1e237b5dfd3249befe81e55e594c662a908617d00
SHA2560da4645a12f45b48e4de97eeb65da99a65e1ca66599b1028df29d0ff3a1d7981
SHA512cb167d017a7c1bb9bebee0d62f2ede6dcd0eb12cf85d270a593fc05dcfadf2d803a34281d1f8cbdde1087f856c8cc2a46b2b5afb6aadeee68e8b625cf3590dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5308ad4aabb1642ab91dd91ca80af428c
SHA1485f013eb8bd37f91eac201a1475b27cd373dba3
SHA256bca27b55968d1a50ddc93fb7090014aeff03588a915ec7ca41b7c0def7cd55ec
SHA51243bef82ffb01d29bbed556e4ea9dfbae40b8b84204ee758917f602d1308a1866f4bd16a72e07b9d7e1df873e7f8f8164c4f10de5ffe83633d249def63a38e14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c541bc02d0c6ef5f0caf2683270bb5d
SHA187893a8648e1dc608a0014b80fd2dcc3722c7dd4
SHA25652d959263180a00eb9efea2f8deb9c5e1d38061263cedaf4b0fd9b0c07b0624d
SHA51229e8b171ab1526b28e6cc18e2eb81ec26108742329433be1d48a9bdcc462664bb2fc63bbbf45fd9cf607d438f35ac40419926b606ecec3db2e78b1ddec51a171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57791fb64e3160fcfb2685f73a520dd30
SHA1bbc53ea4546b4e72a87304959fb6ae39e9c8a3c7
SHA256078c1529a243c7737ef68941fc66e2ce16ce290ac137e50f83f59fdeaadd06eb
SHA512c2f84961ca152160172be2668e8c7544e1fe083c6d4278bbf8900dd87582c9c73493d6846d5f3ca1c62d9f99fb8bfb455dd2f418f203eeb846c75dca2d1c0a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244c1b16a93a1284eac524666cf04f4e
SHA1118ab805fc0af23d0087f932f61a178df60c2c1c
SHA25680e8853bf577fab92bd1bc4e596a6bde6f14f96ec0b8f3e5b1a3e8fb4f2d4536
SHA512a635c662a8e207452da5ad300257ef0c8f040f867e51eb6683dca8a3f84bae032ae961abcfeea860857b7037b7a0d92cddcd2493561eb0461ee5021848ed4dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff2d66e33ac81e79c5f8f30e06f94de
SHA1f9186d19f3f821fac505e10926f5f66cfa764832
SHA256958adfe030b3abaf9c5c7848b32270aa959804405fd750c347cfea71096bf63d
SHA512acc7d847fbf2344a83dbc45bf784d49e7ebaba70f152e0c51793bf7d5f8e1ec48b45ab30bf4928ba557b9e7421c531975ce5ab0fbd4529bc2e7b62cd02396c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122420130822f82af3a90111894959cd
SHA1b75577da9dd1eeec5cbb3e91dabaa3122d449b02
SHA256a03ed70366afb7ac6e1467e98f87a8c45e8626430a94307df3e788f563da3c73
SHA512aec745a4e6802f83b75b6aa47b9975b37e0aeb28a8a1048691626580b166c193ca785da7fde91cb8276eb61102415fe9c930fd5bee7094fe625e561b7c9fc742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cf63640e469dd3f75acef8af2c6ca6
SHA17bc3f3877389eb8dcd1239d03a956f21d3df3f09
SHA256633be4f745c44f8225461cfc8e17485ffbcc5eeb7bbddc43f615a4b4e58b6cd4
SHA51285fe6137b141e23fa36db14c18c990568cb389bdc6a1cd03da07ab694dd274476ad4c91ec68be5e2c41e25187d22a0190fab42fffc3c4e4bcaa8ae8868dd7960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f694edd07810505dbd8c5af956fe11ef
SHA17136c6570bc9efd1fa123e2bb4e871aeeeb6c204
SHA256fb5088b57d1328a656134c72e3f4e60f5786fb033e78166b8aad0e995f0220e2
SHA5123a080592e698f65bb77d865cb8ed8bd0b963b8bae082410eb93a196700a2a3302c04c2fb3a339f4b71ce7ee5e428a733985386b06e25ffd37b0a834a8532db78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b