Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
fd68df0a2bcc5eb47d7021c547d3a2b8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd68df0a2bcc5eb47d7021c547d3a2b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd68df0a2bcc5eb47d7021c547d3a2b8_JaffaCakes118.html
-
Size
139KB
-
MD5
fd68df0a2bcc5eb47d7021c547d3a2b8
-
SHA1
2b8db509c5ee99e5cdf8842f6d810f8bf5258846
-
SHA256
fbb2d828aeb9b08d20fef4e73051c72b06e69093c86701f4b64394bb05a20ce5
-
SHA512
0fa973d6f7ac8ee54422874fc484f0fad2123b13ca269875fdfbc91798fad3a83b62e6c82a85e6321c4e1b55cebd66f0d5bdb082b4438b1ff39f5c8dfa16b0f6
-
SSDEEP
1536:SAhNH2mV+rYIl+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SAhn+rYRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433730065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10929f530312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A343EC1-7DF6-11EF-853E-4605CC5911A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000089b7f675b01db4d573321be44506b399be8c872766f569927a77fc4f8eaa7ce4000000000e8000000002000020000000f13a17b96ac1e5040c22bb8bd630a50d001140ba9731e1451e961eb7207320ba20000000e89ac9f72ba042f5e904d0d1a66ac309435bf040973f12786c4c0fc1f72558f94000000095b6fcedad5ce8d38c4106e245b4004306c1d358be658d2e4d5475904252e7812495328e85912a85e42b2c102678e7c568427107741e945d9d3734c3e64661f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2896 2384 iexplore.exe 30 PID 2384 wrote to memory of 2896 2384 iexplore.exe 30 PID 2384 wrote to memory of 2896 2384 iexplore.exe 30 PID 2384 wrote to memory of 2896 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd68df0a2bcc5eb47d7021c547d3a2b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e2915816faf59d26125a065696e577
SHA16765e55bf341d980a5a5675fcb307500e3acd9af
SHA256d2dd7cd13a899a074f5951caa2f644dfe363ef60d27dd6107a05bbabb0a99b98
SHA51283a9a831ab2f6d5a50b6ee7f5306ccbe628b23e633d0df5b924a272866a150238156ccb37695bfaa24ce0d019ebbe5fce07f8054e2da8d890eb1fe733645b5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a0eba40e50aa48080862bf6056ab7f
SHA11227b6bc2b6457de901297feefb4083242e02c8a
SHA2560b257f7d873922f6fce0d0c793eb97faa1a4183143be2c0898e6e6d3cd23ff7b
SHA51212c88bf78fbe7166601187b2926f2dedc21278da3478f1f8857e79c0dbe360df93d558498e51d5a04adf3d8645cda22dbe7b911ac562d130346087632593c9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d897d8cab6d884d1dfe102425397f41
SHA110021ad77ee1f75e310262a6561ff86e503340b5
SHA256d157efe9663cff58f31ab3e5fbc18f176999801af6f14458307e1f40e282a800
SHA512bdc37c2efa5c4c50abc1b8ec08b7a7460cbe9c62062333ffb80041f161dac8b358126cc79e0c469b28db4493d4c827619210f88d11513bbecfd73d13584bb13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e47e7ed88fff0f7d152e56fa8f9cd1
SHA15a92adfd31cb022a92879708c241284782ffd87a
SHA256fc2082496272710209c06d6482d311dc4f32e5edcdda1b088e9792a387ddd151
SHA51212c5617b5dd642e2ca1709c61b7e713af2afe0adf7d5140bdc1f84a205f8771fb55511a849247c4eb159c8236ce0ce4537984d4c03eb0c28a59390b200af7773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b703df7b4e813c56c3b73ef7cb0ac6fb
SHA128e196f91e7e531ef642a6b03a7fce5c33e5df0d
SHA256258f58f0c70caeedf1c98e9eee4b98f7187b77eb8ee3136edf66678d22b2fb53
SHA5125478093d9b5b38ea96b920903e6472e23c8d729f19171c72fa1fe71c07ec461575ff9c97937d7e70b8a180d45648aae54250a6b941aaece22a63d3ec07445d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2c4658ff65de4b6f7074b5803ad85f
SHA1bab1a7af6400f001210d767327ff26264353160a
SHA2563d7f69d51de00120ebe90f194188d2367578d1eb57baa5cad42b5df4ad1d9caf
SHA512784c051e92c88c2a8f9c836d8b8a022c8a93f351100ff9fe4660b1c8aaad906ff91b80411f99a1eb2b1362309060c1fa6fa8c3ef311cdbdabe5f4570e1f1419b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526aa174d0f7f61eac1a9dc5d8c4b6f74
SHA1e5982dd00f1519a10db10665b2d370929ff348fb
SHA256bfdfa2f8e98cff73a4e184609027d0bb2b66a8fc6d879f69f4bbf989790e58df
SHA512431960a905dccbea45ef9dea40950dd9d59fe3dc30ab0caf6b4c3ffe16b72637043d66747ed6c32b7ee05dd637d455dcdb50bb2369b653cb314a5898e5acf56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d40b58bacb339c924537c42d3882a6
SHA1542dadc81030a6cd21548bcf2c500f2721a6204c
SHA256ae90b5f6164ebb95dacfda50f94d5e77b6e9012d3260318a66f5f07376fcade3
SHA512e47363bfcb8357e7bc4eb4918dd2b475db0b6cd4e1acd458f4999ee3dd8686bbab40d2f0cce9416184eb2b40c46ffa12f11b9def0874110de76c1b4df43780da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d1a21c3a2c1ef10f10eb2fc3cfe5846
SHA18c319fc3e0a4708eee133d63e2af07417619117a
SHA2560095048544f7876e927bd5ffa6028c6e99abed56593de94f567ca53e14cdc595
SHA51245cd677684fb7d2aee0db4140bbcd6a0d319043ea37f5319c8b19dc51de544caa9c6b1a36fc52b4ed0a56cfd688dfb8563e2a0b4a2418dfb56d0afb6f6ce38aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de71fa2ec8b1006ceceddda97967ee0
SHA15be42fb94daedbfe851d44d80f4259aae3691ace
SHA2561854438fa67462d3c9da22e86aff0b65bbb4360993cad1ee84003edc1d87c282
SHA51273d5b6f1c4fbf7ff2820a435a3828327cca7ddb494b83cac19edf3bc4dfd3d80b6cc87ece57bc4cfd9f38d533b603a07755053855bb3b52056fc4926b98391d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4c87ab18303820c02150b63daf79cc
SHA176505a1025bb2eb1acde5407b8eaf52674a4d9f4
SHA256be09c63001e9f129f254506913ba866f51afc9317688ea486ab9a85bd4c0b4bb
SHA512fa3d0b372ea2109e278e99dafb63d6324b5fa5549f1004703c6c58ff71aed4d3e89a3f5740d49eb6e370cf921d82752e059533d2ca5338d0e8114791caf0d912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548369147428985cd7d940aed586ded49
SHA1fc066009eb83338f4dd87cbbbf057f8df971d80c
SHA256193de8fea79d8d1747f5eb90fb396d28c78ec94afd22537047776467c222a5c1
SHA512ebdebd73a0ea8aacf6e1c3b04b08598047eacf8d6e9c15bfa67b009537d487b825dde14f37686d819089631620882934149b1e9d4c3362c2e6da2df4c47483f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f227cd8cefa2d4cce2d0db7bfdbe1a6f
SHA13ac4e4597130dcb818b989316c3acd5c10aef9ac
SHA256e96c98d4c7bd5969d0cb40e726299e2402f15d0070138bfdcb75456a2c17c53d
SHA512f7a37ea5af02088dbc671df78cee3033674e0f881f41d9a317441b25b93c5e89e736e6ed8e3328d0b22a7394dca4d05f8e77564bd1c5c5aa86de5015966a054e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552222177ef9819ccf83edfb05f96362f
SHA1e2dc2434c3caed8e146ffeb5e2707576f00882bb
SHA2562fef162865908a4d313db376b618f5797d491978ca9cc3b927a0cbf41b34d028
SHA512cee0113a77434bed1bb4fc99bd2b4dde491d6cddbb1d32a292fb2e0288b8aa2e51e7d17448b182267451db8873f2d2fa51956702fd30678ff25a94c507cfa1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec48ad10072b7b6cd513faa7805113b
SHA16581a4676d3f7d0aa7236faa7134a1baed615145
SHA2564b54055789667eb20ad2c26a2eb2f232cecbab0305d5c23b43c13e0dd8d1f2d5
SHA512cdc9402be315b0c6b2305907ad976e547c7cad264c6f7dbb0fd7175ef6d11e872f819c1c3509f4506b84a1c7209a3e69582cf7a8e972d57e77c0e2e6d0adc15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396208600323da2cc547085e6149b5b3
SHA12adb7b1392fdf72757345935a082dca1f3582661
SHA2562774a54eb824acccbb59d7f3c5b9051b7233e6658519b4edfe8e23e34b38943c
SHA5129ce7f6d6d292cfcdf2f331054b9ebc1ea8f9a5a244320797625e17c0a3b8b22a5bf64ce8d26385724d042f3613382f162491fd788f3c4a429dd5f1bc91b514b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7498072ea6db944b271b64e4c7eb684
SHA175686a93bfdda13049219e9ce4db14ad3158690d
SHA256e7cd2a2d47f68a422559264ab529ccda66da299f9d35def69f507449eb00b0c9
SHA51295051204465b3bc31d489e372eaf566eeb1b7aec57abc6581dec2ad3d13c41a0a7e18a96cc75541a0be39ba405275fc4838fde586f9d7720d4628f79fa1e3a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f18d8804887f43cf0b51997300d2d98
SHA1378ad22073c2411f7575d004a85c31a87ddc62ef
SHA256fd1023a19bf5f39c3562f209a620b924b8add137473406eb3036df6e6a42ff33
SHA512b51b58cf23d9252eae6e7352e9bcac698981c017d8b054cab9f0ebfceb2b71eeece1847834ecc6c78e2dbc9d6d664b673cfe0040f57a809630db7482d583d381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740cfc45b6df6eed2727c1ed6275a3b2
SHA1dc17e3a5e96ccb612b33b86dc674028810aa6ef5
SHA2567ace108e092be3f25c085a8ebe64a65e383a0c3510b95582b325dc9b91c60052
SHA5127335f07951d7cffc7b1f142305af3d1484e6fdc80263735599eda2729087dd86b44b74041e5884bfe6dfe0fa26826c9edc34bdf095f7b7212591699708249f1e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b