Analysis
-
max time kernel
137s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
ff84d54fcf26876921ab563cd3c4afbd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff84d54fcf26876921ab563cd3c4afbd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff84d54fcf26876921ab563cd3c4afbd_JaffaCakes118.html
-
Size
23KB
-
MD5
ff84d54fcf26876921ab563cd3c4afbd
-
SHA1
19b0ed1994145da7c2e9cb572d2e0ec22d998d7b
-
SHA256
40e3deda70c333795607e0ebdc4cb610befc2616456aef41342fd6bc35a897ed
-
SHA512
aff2507a4b1b9ed3ee2a8dac6f543ed541289f579b1ba6b3476b2b5ce4c17ad14d17a2a4db4df91f977a10b27ca80ec9255e1e57b11db1c7476f23686d4a9cf1
-
SSDEEP
192:uW7cb5nq+nQjxn5Q/9nQieANnAnQOkEntrPnQTbnRnQqCnQtywMBgqnYnQ7tnGYI:LQ/KyD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000079e5fd9ba0ce9821ccd8cadfb2b3d91c505520e330c422a0f013f0907431d03f000000000e800000000200002000000064fa7df7810303e9f96940424404fb9875f4308ceaad7446a2d8d4e2600e7a362000000023e26ff3e68c870a9b6a3e9dfc53f11ca16c4610cdc28276ea595e0f52fc6f4440000000ea7646aead35275ae8d1704e3828241ffe609eaa197f553e0b9e4e89558c95a897cf43b43292538d541eaab272303885d90c33006d265fc3a7ba9b1ffda7cfb9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCA75541-7EBC-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40195ab1c912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433815380" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2692 2668 iexplore.exe 30 PID 2668 wrote to memory of 2692 2668 iexplore.exe 30 PID 2668 wrote to memory of 2692 2668 iexplore.exe 30 PID 2668 wrote to memory of 2692 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff84d54fcf26876921ab563cd3c4afbd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8e6112cb10e3e59af7cb2128cc80e0
SHA1e694ac3aee56e05d445aa414d6320edc8de01bad
SHA2560cf04cbc348aeaaa982209af98c666b1156ad014c6708b06970d01051633f1ee
SHA5129196a1b0fa15d3872644decc33cd018dd289b03f0e8d2746e08fd8e4b9fdd704ccffbc6e7b3daf91967dba207f607b4b71d87421b15034e5e5f506d5abeab9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556703f9db3dbb7e68e403f6f3b74e9a9
SHA111181c99685608433017194174b6b1ba1b7b276d
SHA25655d15f7c8443efffcee89ba959f67e53ef26f21334a3e31ef1ebbae560151546
SHA512167aeffef7f01cff0009437a8f0c5109a3242b69da3420d61974f0fa0343715861d9f40d724206027556c1474f16fd2ed56d8d8be0b26c2666d9227002906a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952384f394a2cac4fb8eaa5f49ef7f2e
SHA100cfa13e0b5dbb5a8933eb92ac0c5bae1ca18d96
SHA25612801b5d2b5c6d88dc4300db3dc9dd81e77d713e99249225ab85f76b52af9037
SHA5124eedeb88349b007c9258e672962386ea4c5b46df8dbffda7f9dd161d5895f9b7e3d516301b2eb87b7203f78d53d6aa15f3893066b5701efa4f91048d41cbcfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb986ee8f997553fe65ab3547810494
SHA11fe00935d33af7ea69b801027cc8f054220b9c02
SHA25682027e7f25fef8d13a72da7c090db69322a8f1eb198998da0faf24ee9b52ff9f
SHA512382911241d8c1e912f38f51b6d66c8e87097ebe71e888dbecafadf4e0fa22a97d325f0577db314414dc8a521ef9e7b67c1af90656572188c7f75a60f7f5ab95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5b63814599f73ae265e4fe09288093
SHA10c7cfd7aea87cde7014d87db8d89edb61aba116f
SHA2560667b779cf79ca0d2fac4ceb6622cc9be7a2bcc3aebe7aa66479cc807a1c886d
SHA512cdd4d0627e7a4230eab708c9979cabb9e7badea692123925e0db38436f33f07425bd741d202d1f586b6f42f4b64e9ce823dad0585a2ae0be7f843b819de2c2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c48eb9c440c509074b64747c9af669
SHA1eec2e8e4ae8b57009e24501a9ad5af36e65ef24f
SHA25647e19f761d3770960c77d7e78ee7d5b407be065d0a369121cf56eb0961ffd482
SHA512fb4de1044a072541f55b70108334017a92c9f556f6929d945097557c3d85bb5730daec966f6172fe64230e7468d25b068fc4d0d3dd293683b012a9bb3a0425cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675ee821c497c2e4a53461d2aa401fe1
SHA1a06f6f647cbcbc8b8a3378965a7b32e568993237
SHA2568d19b62649a073326faf813317bb5821cec0f857f1ed4740f44e75f050cd7ba0
SHA51212cf503f89d66eff7be0c29b77dde6111d399d74c39db3dae587c3d26ac1f3bfbff13fbe292d14cd5de9479c8af640a0077f6bce4051b784226885a074f5530f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a6fc8ee951120c3f085943d66cf272
SHA1baa0ef88dd2459994d7712f05fd4d621d4b00510
SHA256f6fa160479523e7ea3cbe7308b0f2e598ee0f8bb77def465c960c4da4dd6ceb5
SHA5123e7ff7709d5f03d1a8bacd9f6e840f589fdfbf4b2cca007d2c8a444542796f4f8fdfd5d1cefe327793084efcbc43a63cfb4678c2d3149bc3150f1bd4776aadb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce544cf0cb18ab54163cb76556d25b63
SHA1ae94db5835c5dec9aba31f3622b9f31251669844
SHA25631c8458a63d90da9cf47f0015436d88ca66c0b5469667d1d8a944a6af1bb0044
SHA512bb003d56e5741217d912d5f9f3540401c85bb3ba440dcd897c350a9e1a7f44f154c861fecf6818588d8d6539a9939e6fcf22363a0215fb1f06540773acb8eed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f64235454b8fc45c014280640e1e0f
SHA194d8d11260ba0be78b8fe48457a24ad936f691e4
SHA256b8ad3254e7a8b42f56c9b64836352253afde26945ff0518012b18c922dc63efb
SHA51225199b531a0f44890691eca02c44bb08ebea31bf838adfed0d5bdc8a352bc9da8b8ca7bc68d0a4b1bf562de213c091ad441c5d1716518c2db9b622fddcc2d6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055518eeac47ed89fec559d58472f9ad
SHA1e4837a701437b9c70a87238614919e032e87d3c2
SHA2561ed6d019af42ae2eb163b1ef2fe09098d7baddbc0ab345b43885f9cf1c4bcffc
SHA5122f1fc21ad257e3153f8fabaf46cd17d3bce6c223b09797be05b01b6e8e6b0fb6765fe77560e2a09a242afd51c37ab830ed2a2bc4ac9ea713168f3af4eca52b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d119a592a76138def22d1a13a844ed
SHA18c9e597937ef12db93058ae7738642caf3042919
SHA256a3030db0667039239eea35e08f43c5c4e0fabc75b18867bc63fcacfbb34a38b2
SHA51225a753978f45289ebd8b49d547c90f1575655ba4818013ed214879f9db6743ebb9d48c8837ec4e3027adfc3f21c330eba8a018620d8fa11c0182c8420af1efef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f30e700dc72b756abda277a7abc6e93
SHA1f3c5b144c3641aa2097114502fb9f104f8a45cdb
SHA256fdb4096204192a632968e48194d4fd79e9707b36e2d4a1d5a671bbfd3b9b609b
SHA51278b1c561d47311d6498c91e6ce4e7af9340dbb59bab9367581c7f8c383aa1c7189af23ed9c3757c36e6dbf4558cb2ebd4f12e8ffb8a709a55ac5cad2013ec8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7e34bf68e359567ca4c18606d139ed
SHA1eb85078aac983ba5400128479811d7d48dde1bb2
SHA25632eca0837a7ee383fa44aff766555ed79b7ee03b0545e21d4c1e26422cc60fee
SHA512272d3cb3645663f02095a1438bf887cd61919b0c3d686d853c2f3214320e1af5c131a31f96110431d76c9a7c5b116f98f0dc7d764b9cba1bb0887a8d4cb0432e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c334aa6e2e1c2bf2df68df703e15c475
SHA1b0cb5f60df77ac884104ae7b86c5c03a90222e5a
SHA256327414efc3763b5f29d6382fe2ba7750f72950c0b5aa87833be10a0b43e1f243
SHA512405da19a85342e720380c71e99cdc4888af1a4c6c31cef232a1c191887c1f67aa571aebeb3416f3bc8d5b9cfd78c48b3ea20b1cd23e37ec45cb7c2b18d61f601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701e32a7d1418a0774c97c1b5653cc6c
SHA1aff47263f477ab1c1ac95d66c7807c8abe805a7d
SHA25673c9e7c3f1cf4525fc26080e4551277e78094b580bc5d9ff0b3edb550fc5e78d
SHA51230daf56c6015c7232c50f0b0803ba62d1a3425b12d8073ab320a563dedaa68517164e636724b1391e28fa36be7f3270f621d8c14fde2dd25829a89bf1fe1fb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb0f8f8163edc2149b1a22142cae8d8b
SHA1c014ed8367ac458a473b745e530db72c3df8ac44
SHA2569c1a47388bff59d4ef7e137c257199e129033fa893c6b0b4c8b84911b4c60163
SHA512e96e063d52f19f692789e72f7e3cbc22317a63351ba597c789ab4765c95e0384e6b5ec31d8f4e23b27810ef41fac357f66ad103b8be2db978a0ad65d4a0528d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75ec2554f51965a7362f468c760a375
SHA18270b7bc72c320cdd72b158c762cfef26e29465c
SHA2566d2b56a928c1af8b151cd9eb74f5c816b6c03ec3a9d64ae6dbc3be4ea575597a
SHA512da4d23d5757cbe929d3e49f5c9498e51f844ced8a39368da68c392fb31f3fd09f18c2e2d7a866cac7f77b473da6bb21d9c1f5ba2c4a787a96fba004efcaf1243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ee9ef20bcad467d8ab721deaa7e1e6
SHA1941d4a8e181319ddcb776fea25c8f922cf58b4a9
SHA2569eca124d4ab38a45b71dfd18defd5f83ae05a028edbc6a348fd7dd3cb9a148ed
SHA51222bc70de06e62cc8cebbf4b3c8417cf1566e8edd8ec730becdda36a130bd4d1018b5d2f7342a3aba3bd63f0fc84f1d0777ca5cec751c30b82b9e2601f41e922a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b