Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
ead1410cbe59bf1ccb8fe4d147ecdd25_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ead1410cbe59bf1ccb8fe4d147ecdd25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead1410cbe59bf1ccb8fe4d147ecdd25_JaffaCakes118.html
-
Size
27KB
-
MD5
ead1410cbe59bf1ccb8fe4d147ecdd25
-
SHA1
022251fc6f3311dbee71249113b75b821553143a
-
SHA256
f8402032349010a78dd20724a5912d70f4f9dacaba30343d4d7f78dc869db120
-
SHA512
c8fe01a69443b60d1eb63019e0765497495c834eff7cfc53448d73349c8b425d241d4dbbe5ce75409d7355c78d03a6da40fa50a711fab3e3750d6b0157840240
-
SSDEEP
192:uwDAb5n36nQjxn5Q/unQie9Nn3nQOkEntCknQTbnFnQ9elJm6uHn5Ql7MBdqnYnB:6Q/3ID6nQSrUc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e1da450e82d3efa1bfe66cc064b981f714b80e0b91bc5cf4dea02f31a74830ab000000000e8000000002000020000000c6abcf5cbc3cb87882b3f67b1ad28a17812ffcf690e2d7f4bd71bc7c444b3ac7200000000a4e1ad8a0b56a46e5dd4a31b8da67a1e093e2c274727e98be0a305365b66aae400000006befa8bf4aed950f2742d8a6029ba70dbf55cfecbcc439ceac7e7843db40be5b32977784139b4128c751e1f3dc1838da7ac9d62f4133c65ccaac46ef48f19f89 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60201e9a620adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3E940A1-7655-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2036 1956 iexplore.exe 31 PID 1956 wrote to memory of 2036 1956 iexplore.exe 31 PID 1956 wrote to memory of 2036 1956 iexplore.exe 31 PID 1956 wrote to memory of 2036 1956 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead1410cbe59bf1ccb8fe4d147ecdd25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0259359d60f68c6756633a6571767a
SHA1341395cd4a7d19ea8f06ad5fc5e5d3a790757ea4
SHA2569161d3baf3636302c916d825279546ffce235f9658fb9c0e368fdf1fd3e67ea2
SHA512dbd1ca3921604d1dab23885e0ee6f846d8883e29cb8667dab4661ce1bcc51589537f2519afdd00991d120ef18669c162c99345590b266f7b51e7d793b4422c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffed663455038db6bf7b2867704c747
SHA1cde97e35f2dfe0ec0a32bf9f2e418d546423acd7
SHA256d8acac5291574577ba93597ffbdaa2794c8e2cc2ff19df71dd66d19dc5b01b46
SHA512c69798176116c2f3698d7ba3aa49b04f6b2568121bfbd137b3e023c0063b13d84e21bdfe640cb2a5f4fd1bb4f7a0ca610edfaf89094079e956ca86c1a5547114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b42633ca7fffa29f7988aab359e553
SHA199bde01a85dfbcd12a61254b775d008bc2ce92d0
SHA256fcfb55ed94f030e83a805a30d9a457b82402f6baf7cd9e25f5a730a469fa845e
SHA512bfb42bd8166849bf054697133c613b7019ebce5f121510691309acb6075b12204644013d4c64bd0947ebbf4569f503e33ec6eef658c08eb17b4df1eaadbfe556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e24e58e429f26b073c79164f810a3c3
SHA1465b23e8255fefc712aee80acfb3a30a11a234c0
SHA25621c42db8f4cc8094fa0cb29c631755036ac611bb45439dfad35f65a08344ed5d
SHA5121389ff01dfbd9d0ce1f85eea1b36c4e6fc778bb80515f024e086c38992cf3276570118786deb3743d81545b18c940d52309f45616f8607493cbedd506b430bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab741ef2735d7318d47b286c7ffb97e9
SHA1694f22768cd2b75ce2353631766c3b01bd46ff2f
SHA2562e970086ddc01c691dacc6764570dfe2868519ea1ddbb67d117c58c5992f721c
SHA512f70578575ab96f400cb77d34b35e393340f495bfd54265c0ed89b12849914bb8806719b8a9422d8e2a5e81ae5adecc7769eddcb30ec98ce57488bc5a596590c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acf77a0e6cfa027c66d053f14654bbf
SHA17bbb2f568d7937954bf7779f6fbeedb1f1e38bc1
SHA25640906905dbed1ff2bce31183e34a6912b1fd8701f88fba79c25883c65f46ffd2
SHA512da1b923e32a50be275a8c3e15c4fad9c40fef2ba06a07f18754a2db1a469f0ea975222829b42b762bdc24ebc89a822ae0b231f9c6c8ebb5837815862f88bae4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577774535fb751cb90197c8a5d83d02d6
SHA1b883c4fc0d68c74276e9db5cdb02ee744b9eee5d
SHA256311c3c91effdf3f43c1ae68d6f3cff428721c8b96a58405443a2867a551f1979
SHA51255c7f38090bae6bc840187c67bd9f81b6809ba75c3afe57602343bd704d7605543b1a2eefa6e8e03a72859d518997c46813e0c3b3e8e25d33e371f5605fd7811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055c8fb9f3895a75d94e6a5aa8a01c58
SHA15b102fc1d65aee14aebea4b9fe035732a9943ac7
SHA256923dbb6ad9ba2b6dc39d1595df1f15a716d74544829c7ec516bb480e67240dc3
SHA5123e3df1db90732a9b20ccb5157fd6162e0dcd9ae803889646d5cd05c54f65f7f1ada15a5082c9bc2c2bf9caea0a80db36fae2968200649bd461e96567d16d4029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd69250ff2c230836329e1924bb878a
SHA1e7a3de69613207f88af8f32e1aa150ed03b47c8d
SHA256fdfdf5492293ea09afa3af55e2a03515a6147d69771553c92256b8de6790d9b2
SHA512421014ac99147a5cff615a64b04c736b083639fa669071aab5ff3b453b437846dc1e3f8ca67b1ff8a68914a82c19f95e9a17f337a28d6cb297c1468e7c90a9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6de6d9102ddea3d2a68f05e0ba41763
SHA185481b469fd479726bf5ee7a4f9740042ecd3e10
SHA2568ae755821e5fb5b09a9c5defaa9f78094db553376983b7475299da5d0da1ac44
SHA51214c81be66c8b1c08ec42dd46d6da73dfc5186443c3a6936d4a9965e1f07866a2e3f069c950b7da9b0ab7f03ab31c410267ec3d19edc01bb57db74dd537998c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb122921c828baec02ca5211949a8801
SHA1bed07849c0644d227be06a44a84d2d5f7cc3ecae
SHA25630b51ebe25c649890d96d8908c6ddd09e0954ff1faea6dafba67686cd79b0edd
SHA51280efe3a357dc805183825358054862e0ed2427e94e9c0e28ab7a7e08b4e10ca3492e8e47c79dab1f34de4ab23b4bb6813574977fcfbb8d51c32926bc2a4be100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548aff71f6545d94d045ec06b9010848a
SHA1bd2b9581357a55ef11511380be174ab548a83740
SHA2562a518f4daf37a155517eb0681e0b22cb521074ed63cd6d77abfecd3b76d95486
SHA5128745762e0c0bdc3bfc6c4559a0cdc69df3b65a3fa21cdba8291a6b84d2ffee400d9ab999f9338e2625b095bf04022d131f9c2b4855c06eb5c35cce724f353536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199b33f3cc4cdb5a9a07971349f41bcc
SHA1a85fd9fa54c09fdbdfb4ad0484ba7401262c367f
SHA256d4a5fd4386cac96ab5f8011a47c41a323abc80f55c393251654b7211a2851937
SHA512c6b55bc1a3ee03db93df7c37723cffd74653c4f10a3d2475574987948c50d0c73f8040b772cbbc936f9969526a9d93f57ef2bc23579e860c72bed85e9e7d16bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9ded62f93f71c0516f281a2d91172f
SHA160988393e6f644cf7effb085e01f1b4a0fc2fdff
SHA2563e39ed4726691b9bff636d41abc12baf5ade775d7f4cb16bc7dc506096276833
SHA5126a6788fa3d2ef0226d521c95bc1268ac7ce005215fd4f28a77e1aa29dabd817c21479fd03b2e6a17ee22bb721b464ff8af239fb89213a1eb7661b807703523f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f26d3baa4aa097460143b5924f4a337
SHA1b967971e5afe3bd56cceee7ae04265b10ca3f7ca
SHA25610aa3b90c0a0cc2e6490bf8075b40f21418eb36ca61b5252f74884d26c12bd74
SHA512ec2072cba45b8c4d6db92bb67f3571eebfd9583b32dd7eba1cfd491fa4061bf106cdff9ad95253d9c243b3c059ab1a37bd6d5e4a94a3f6b95a3be5aa432d3e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e185f6f1f53746e122865adffc4618
SHA1fc002640d70c71faf0cab6fd2de446ac7dd98d49
SHA256d8c206296eb415fbc4fff414301b7b34b4785254e5c375da896db0639848735e
SHA5124c24d36d4688ae4a2843ad1aaf75bd4371ac4808eb0b1a8aff36a8ae6ba79801d679977ca4374ab1b0d30d11798d3b765add91e73e349af9a014faf2dcd1f424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e291281e8d64d3a3542758142b5aad73
SHA1e4652e1c40194d075593f97d274fa3a622f2b1b2
SHA2564675357fa9383b1e5de594265e17a7c5c0c31f8cf73183d0392338f6e76e070a
SHA5122064748d654b7727151b1bb5b65e00d807ee8feb2393b8bf20352e2bb4611c1af39d9b0ff9e903a01e233bea2809cc1f1b3bcd8e41867d4c78e0ecc6c161f3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560837ee54e9fbdbfc2a74d48c2b1135c
SHA1c42c9ffaa230f87111c5a292567a49da69a41e70
SHA2568428eba6b77c65a8092af94c07859bf663b59124526d8556a6c50bd11faaa42c
SHA51212fcf777bbebd95221a3c7bb70f84100febeb766b09cd6275b231e1c4f09491b12c64266bcd29aca6811178b3da4ef607ab4ea2c2fdf49f1b4d960ab8aa811c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fcdfa8b98736255d89639f1a24afa5f
SHA16bfbeccdd9f007362f06892f4ca47dd256eccfbd
SHA2560e9abda723411b25ea6641add3af0b6b466385f7968e4bd219b4e1e3c7864435
SHA512bc9a22b40805c3be833ceb5b3b33ea9557aab482bd12a0ce5a9be0fca1fc100e22f4525bb7eec3fefbb4d7ebcf4792a474fad4007c1a794d525fb35dce4d7410
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b