Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
e06c68cfd478ab312a4624f2bd08d634_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e06c68cfd478ab312a4624f2bd08d634_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e06c68cfd478ab312a4624f2bd08d634_JaffaCakes118.html
-
Size
158KB
-
MD5
e06c68cfd478ab312a4624f2bd08d634
-
SHA1
97f78d13e17e6e4e616f1726c6fc7bb580650c32
-
SHA256
ebf37d60787582a3be85c9e00aa3adffaa3de3212f36f6ad18fb24205bbf1fcd
-
SHA512
d74f2e4932b3398557398fb4fe51de1ae55eb19af00d583a50885ce4574e05a22589b610de01183acfb9995a175353f00f948a0cc62c4eb283d85784a37f6c5e
-
SSDEEP
3072:SnguLWKgR4+QyfkMY+BES09JXAnyrZalI+YQ:SnguCKgpNsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000035f5598a1bb8ce7a3f6b4f6f6a9c98f6567b34a31cca6705029f1db3aef701fc000000000e80000000020000200000008a713a9a77371de4ed66c5b4b97e5ac8e0be6bfb2f23e49f80b5c234a01abc8520000000fb7a2ac94e05aad7681a7be382527fa2b171fc0b7a6206e7c074230e70ab35b4400000007079435f98a038c0148c37d16e977ac5c3102ba9bfe25b1a98f58ae99a70271cfeb393baff0a37325ee3c385413b7d7b454de832c4e1c6096f61270509a67525 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72D11FD1-72A9-11EF-948A-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1009f787b606db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432487624" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2428 1964 iexplore.exe 30 PID 1964 wrote to memory of 2428 1964 iexplore.exe 30 PID 1964 wrote to memory of 2428 1964 iexplore.exe 30 PID 1964 wrote to memory of 2428 1964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e06c68cfd478ab312a4624f2bd08d634_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be90b921faf2b11d55f92bca726f55a
SHA10b3f66c4543054a90d3a231ec7ea24969daea94b
SHA256d86f976275284f505e2ad67601175a3397156273da65f1cb4147ed4c97086dec
SHA512f12abb5cedda5378cd100aefb9edcca1cc6e10c909728b07c3f4a2ee469aeebf6b1b524b1155a6b4d51a22ac1e8a376dceea38c14ecf5b3f851a0be91c91d7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8cd75e05d50afbac8fb71697f0a7bb1
SHA1e1d2c13945737a1dcee38169b01a39ddd21ff62f
SHA256ed3fe750fe1e5ab6bb0c0de1e2b7e642aa6808ceae3a71a2f77ba89932cd0a2f
SHA512f80015c9e1cdcfefb69332bbfb538e0c3ba41c5f5adce77bebef31b6ba0b9a55753018a48d95233669d5e96e73033a4b49556340e5988f03276158834d5ff796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53953297dad46b70afa6d2c1fe4024033
SHA1829232484baaff7e9fe7b88af40ec5f124ac500b
SHA256f25c2c5dca5e5a51b3bec8bf60bfdd0b533a1f5d2f8fc2c7a77cc5c63afda891
SHA51217d07c4ac493c6348e449a38feb1c97abf22d366d289f473dcb5defd50eed3a65d8894d259bd699bf4409257fad0ce7b891efdc68c20edb9b097916dd81118f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3af9b7deb58db0fd65f49ea66343f8
SHA1bdb4fb6dbd7fe2c35ba0d211cd5f1431b5ca0f68
SHA2560341e16d2981c8c2d154e919c42b60001246e155d83a684d49ee5c0d817768fb
SHA512211c41249ea2a0026b09e4f29ea52a7f368bafc3b825924d59063b6ed99c3d4d0e373f638223de93ea3c84eae3992b76e3b04d495b0a5d54eb4d8a680cb9c0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553c8c87ea011de6eade320e7c355359
SHA11b95a0a2de72a2765162d0e5cd58dd1d6d5be593
SHA25600f906889764376f18e382823a4e4cd49c1f1daef2142c8c0bd9f92f10f3ff23
SHA5124ba2a34a59a6e6e247aae9f38e54d1173a25ab77a573ce7274d82df9c1257ec4fd0d23e95a85dd4f551a20cf5c87edae8ce228c7c5dff1d02bbecfc6cdbcec0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d36c36124fbe64c5250d19ec770dea8
SHA1ead568066e7692cae906b966dea0a7868402084e
SHA25656835a2420a8e04c76a2f595398399e911c5f312dd3d537faa7f3fc6b5126a8a
SHA512c1ad10ef258a8e7d31aee19cc30314fe7c550963587880fa04251f721f91f1c5af1942df96e75137701bfbb4a6982e1bec2a09f5ab3b5be5ab1b50dcce84cd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d545f5f9085df2a0c799a95c20fdd9
SHA1d6242077edf1e44530aba2badd170ed7727e1943
SHA25645a7c534a3a7bd8eb0fcc6c8e44cf283087241093e59c9c2271a5aca3a090353
SHA5122fc8d2ff8e31aa3c8ff1b9fa43bde0c1b1f45add744d138e12a20f30a7f93eb0c11ce9b5316e66f52b4038add1e2b65a02d6395bcc6852825f1c9eb0db8b4dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b2f4db8f457fb194c85615ee74e8a2
SHA17f3b7b2c4acb3af8ffb9695c6b825ee86741afc1
SHA256072e5ad4647b1afe5a7da8416b438c75eac2ccb2ee8009b1015c1691230c3f4d
SHA512a7cab8aaaa4a32187872e42f999eb6cf63d51afc32f61d8345ef1932b8284b2e489c1f973942f5227283f748fe00fe533f845f2ed8227b680e9d4a7ac8f383ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bc277574cfbacc1fab3ed6b111a05a
SHA14bb3cdeb930b2066db21636270f05434a970734e
SHA2569a88d66272c2fd84ad4f40806cfddf776bbc9b2d5484b95992319f990c4bb8dc
SHA512ce72a0ae84a34716daae6dbd4d45413f3471137c9c0d4448f944da01b90978a83186c83a37526b4f86f2895275840e4cf7f32f7fcfcc534a457c559e859642be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9c73819fc6657cb74e62eacdf4f0ba
SHA17d756ad8bb0e369aa6b8b76a3851b104f0914196
SHA2569be7f2cd723986e5c2e0f6c08d073a2c5b539bb534415c5734453cb52376ab09
SHA512a19a5a6654730248b639dcdac5ccedf145fc8144326405bc57e181ef4321d702211c8c139890953027e6f5ad3edeb9d071dc30b7c8d94ea5afcc490169b873e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c87a327f87684432127e7884294306
SHA153ad4768a369123121f6e1abed86eb846f379f58
SHA256f0badde515fcbd8f5550e002464e9e0f16d3fad49a463336b6841c265cdc44fd
SHA51289476c8ab69d15e510405421736c8710d35c95258e526e8b6800d7091cce3c4fe371129baa4513267d7b2c3b01d938044259eaa533c1b57e377c4ef8355b0a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc490dc2b88824100a14e6d5767613b4
SHA18c5d5e824cf654670da0463d2a53aee0eae69385
SHA256b8184463c8b7f9c909c20ae07aa8f218da13d45aefd3c2aa4ca708da23ed2408
SHA51273d0199f84bf5a91e3c2ea7b6fc05e98064fbf33b723f45781bdaab265d8522ceb9025194aa695dbce5b298f8dc97a7d97786eb2ee5160c6d971c6c263741687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df4dab197e64f1950aca0d0e8912b2e
SHA16e804680255201abcf79ad2cc4f15d576e7b3b46
SHA25643a5802ed5bb82a6b757b1b5baf4dc6c6a67853bfeb5797e116b366d270e6276
SHA51284312c17a84af152b1c1931e89418c8b2677e6eb81e112fba6e86b8edcc3b0ac0c4c3e01669e9591bb0c79771d50e9dba5ea351c1e1a3b9d7e9a8b47d822f628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e4688a019a30ef07fa4a03616a3693
SHA14b9fb2b5e4e17a32e1ebd62670b41711caf465ff
SHA256424367815f9362dae89a6fb9a912aba8ba11efdf63a438c98a7e3b660f5bb45b
SHA5126702dd06ec038172b0eeadc3e2e5aa24d5570a74e4c0ae078eaeca051cb3cc82d6d1b9795c38f97a4db0818fd65b16ea6d0ffc60ea1ef138b09defb7d86974a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507eb0f639b854bea19cc19677601f085
SHA1a83ae9534fbe6e35fd228ad1f3ae50e4b017fe1f
SHA256eb21c7c779b00658d2317074cd825f27ea8f8f092cd73d19436377712c714860
SHA51258adaf54b4d205eab26364b9156177ffaff98144a4b297bd7ba8a22c6332e9431fd55432eec1daa76e9d9b8126f1c6d15becc7202601406fb5d60017648465f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583faf0a2f00f921403655829d69a7aea
SHA12ed5821ff5c296c90be3ff86c7d7e64a338a977c
SHA2561b5cdca1d61a1be13019eaaa71fc02abf6d04a8402156913bfb48ce45b3815ac
SHA512cfed3a58daabf354220a9b6848a563d992150e427afae8396bf37dde936fa6161606b122123609344803a1419c92faf1646df288c056bbf593cd293891e28266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5786bf123f1004ec8234d458f3c7be28d
SHA18dda75d3afd52068755695df36a93980b1e7092e
SHA2567d9cad408b614144f9c743655f256a3e03194ed79c3f8d91746fe0bf02b9f8e9
SHA5128a15bc5f7587a698ca795be2ac324958986e06c55ba43ef9178ac352d9efb3f171f99dbe1d5d318bfcbb590be2d6a6f461fb7370f60503aca052c3b2df9f838e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799a06009b453cc6ce1ec672e07e52a7
SHA1d065568aa844084bf14d451566f3734d3ae7bb49
SHA256d91c73cbacc838b136329916c860377c13a6fcc6bd6afa5a3707a033de0f2835
SHA512f4f27da3791a3a4cdec7e8040fcf680fdfb860dbbe33dc78bde1c3fb89d28151e25b4c96f270fe3c355a6e50c02327fc3939fa01032152aaf6f1c722aaa5988e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dfbf4686cce5a45058b7a5a673e7f88
SHA17f2a7f75e606a7f068a6c020b40bc07b988d35f5
SHA2567b4728e7d135985d8964d78e7653c1a2c2900e691e5f3005c4b0bae15ebcffd1
SHA512da97a33915ddb0a135f4ba7453b567d818edd616fd1d3b4655fd84bb7d69469ea6bbc2c50064079d0894c53d9aaa476a6d5f882010049e38b6e295cfbf25e2de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b