Analysis
-
max time kernel
84s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
feba6867efab08f6b4251f70400ae987_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feba6867efab08f6b4251f70400ae987_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
feba6867efab08f6b4251f70400ae987_JaffaCakes118.html
-
Size
27KB
-
MD5
feba6867efab08f6b4251f70400ae987
-
SHA1
fe4f781b36598c08fe93e37b5c5ee5a0d68b24a0
-
SHA256
83225317e880b2b529f0a641c7559befafd8f89c20ec016097d11cb31bb5cc98
-
SHA512
e109561a0e1fdb231ead1fee572638a3dbb1bd226a9613f035c6ff6508c29024bbd40a2db5c2913eac06d85e9375807885608889d2400b2346c54f974640bf29
-
SSDEEP
192:uw/wb5nCOnQjxn5Q/JnQiekNnNnQOkEntvnnQTbnBnQ9e+Em6u5MaQl7MBEqnYnb:jQ/b/cgM9SmBz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433782276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01b5c9f7c12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA254AF1-7E6F-11EF-B956-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ea81334dfbe62b8bc54c1831315289344b73ce2f323895b15202dbea6c06be87000000000e800000000200002000000005047edccebf96726fa33f6c1e78299f83fd48c8d4a1a0b852020d581c2dad3720000000870d55650f1046ccf6d05f2fdd2e047045fe739c50fddd34c62e3869094cfe8e400000002474cb4070bc071d739269c14f6c214da623aecf161ee5de8b21f74599adc821bd8375f88eb0e311fe8301f26b3b310b1e3f74f38684188cdaa6fe29b0d57d93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1120 iexplore.exe 1120 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2824 1120 iexplore.exe 29 PID 1120 wrote to memory of 2824 1120 iexplore.exe 29 PID 1120 wrote to memory of 2824 1120 iexplore.exe 29 PID 1120 wrote to memory of 2824 1120 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feba6867efab08f6b4251f70400ae987_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4c3df7eb33a8ba17d9e48af337147c
SHA1e341e687d528a485255a219b0b755d6d3d21856c
SHA2565154dbda85c937dcbd072593b7a5f35051bbebe263b76a47e5aa8daf3a2bf66b
SHA5123e3c5b2f76ce6f9b220fdee4caef1b9ad48e51fbe683afb35a020002bfe5b89f8158df767e11eb0f47275c59ce9b3d79c7e75e29f529fd8989fbdb0e6e8b307e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37d648806148f4166b5570165e14a50
SHA1b1d061b5e812583af84244fe4e81409169dc0186
SHA256ebbf74a6b764ea3aea88b140ef5c8b654007d52da537c7d275b8978321793162
SHA512a57c9a7ef6ecd1d717dc104b7b74e24d45dc374cce42231f8afd0a77036ce409037a986714b548cb5d9cb442dd3e7d138121caf3019f9654877e5d23b92bd611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511042d20373e0142022b67b3e00bf6d0
SHA161be8f2ef350f6ce2288fd4280eb9e406371a3ee
SHA256f529f214e9f8460d1d9d542e2e429bd4e4f16379241e7ef0f08e049f4c3eebce
SHA512ca58518f77903fe81f687ca66657ad6cddfaa92371a36e584ca3f1b0bcdeb5808637e0140821f9f0457ccaf751453c463c2964edb064a9760cc4709f6053f729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527fc346d50efefa657fbe62ede5ec855
SHA15ed4ed37a9ddffcf77cac8109bbc10d04f7356ae
SHA2562def9dbebbe1f454019beb982a23a5f8749211133125903f0f93f335cb4c7d18
SHA512c750fbaddfc9716e0b7c9b5b45de0483200aae4cd76b0b247a3da2690354ac0cd627b3c77d97e20a3e4a8c5f2ce2062fd4a1b1bdc52ba81b1b5bc261f15a9e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57971b0e8d07c6174ef9ecf3f8e9f0c
SHA1650252a4e4fe71e6ac71e8c73d7dd6c58d4f0679
SHA2568144bf7f615891d376aa15527e17b17a7fd97e4497fd1fb9796d88a2125dd132
SHA512a59cea2ca869c164e18dd60c3aaf77c118fa1062aef51fc2d299cf713a36032cc9dfdcaf32c7baf8e7513a2502d13d70bb452777566700504856d96d2790e02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593f2bc8e8cb951f36bf710d36176d2df
SHA1dfcea16974d5369d22e0364c6d6e5999eba71f7e
SHA25694359a46dfb17d632dbf5c8a84f689557dbb16206163bbf2c8404a379cd7eec2
SHA51286a052f70bd404666c46f6faa39edcd6b2dc4158c19cc51f3a10e5acfafc2a34b76484037d17b8ae1009460b6a0860b931efedbe38dab56bfe444c6f77826567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7e47dbbf9799e8ff4daa8ef990ff6b
SHA12f58025ac53c53fd0d64be5e6dab96cd22b9c102
SHA25611626d0d7bec65b07144544d9b31d49a730f1bf2cce22766e4c8db351dbbcfd4
SHA512f2d07e6c284da768f8719fa62600befd108c5a3d88ddad9ea0a1a114621310932f157752ff871b6a30278599e75fffa6481865d9d19cd604ccc193995bd4eeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6e06916a80778a45e530296f8e391b
SHA1376e58322ae21895d5e427f3011bdcad82fc4766
SHA25607df65d57391fdf305b7657185ac8b211121224bac092663016d861d3e053a9e
SHA512e52bfa2e966f85b624aa910c8bc689b83fc1c7f79f92342f2270af8d62cf0b1aaae97322c07220ffde376d409af9c626c0e30ad877d106db93bec1c193d231b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54720b512ca9b8ca5c028a5b1f095a99f
SHA12d1fc0c26f1b7fe201439234018ee3e2546d39b1
SHA2561270d55b919c996af9b500c26f9479f98cbe35722c47f79589951ea563430e54
SHA5128bbf567e53446f9271aca9aa10defcca0b6eec9d9a084151eea96040849aaae032eca132025309f9037178e322b7a4e1202d89431b0602d5a6ae3230388c55cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a81658cb8d8c742e5c42a09638f7e1
SHA1c6feab9e5d6549c14b921c098dbcb4b5b6cecf0b
SHA256785fe5108cd8b013d37375f876127fcd322f5856b88f58e3e3e5514c4df222b8
SHA512fc698e71b7cb67f8e53e9ed610ec0be74e0dcebc07ce82897d752fc396504bcd7bfbd95331b36cd9a2f78db2eb93dd9c0eb6b32915a6904fb029c746403b6290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abe64a71f9e33fd7b470977557c0e6f
SHA1134b959476de2884bc5102f5a790de26e14832aa
SHA256d1c78bb8aa65c828f6f7645fc803064e61cd02b48346049ff0e965e5af4ecd91
SHA512a7dafd182db68275fe1923587331c1d63b06600b6fcc8e93eec5ba39299324fbc167241a87b1ddc229164c8965b54975e68d9406228f27199b94f924b387a791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623773b8859f52111960395b989f4963
SHA1097f025d9c58fc7c7f09a789dc252f535e6c7797
SHA2567959f69f39f760547c6cb71e327df96ebd1cbc08c19e3f8f9714a73a5a29a400
SHA5121df64bbe1af44f95bae3fe44ad55464576bfe7aae80b552ac06426eda4872e83ebeea4f80431863642eeb20aa390fc7b5a4ec7e9285d8767bb43794438771f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587053c127aa68d6edde5c56310604076
SHA190437b6388c9dba4bed1a822d57708d5f0ffa91d
SHA25692276925f9633867b540c219a977672f73afd1c8d90bff88c73887c18db18aef
SHA5123bc2f031a5a7411c52860f661f752061b1a048eb2eb61efaf0876aa976de4bc7902b5a80e58c66772f5f8444330d2dd0446b8bc44d12bcfc155c541f904f36be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59ce167f3b0c201d5ff0e4c32f2255f
SHA1f0d00c13f73fa0ad921d4ac4fbe7553dd680c9ca
SHA2562dd346be45a496dba1cd63573606d82bc1e4f9e9cc86c4c0148226772e97b08e
SHA51269fc933513c777d62bcf50f800bc3439e344fda6f94be3a3df2d5f35a3ca208f9acae5af9bfeda59c4ac206306c210a3aa18a1a6fe47ebe33f3814e9e746da9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8421452a22d249f66d65c23d7788d0
SHA16d5f0c2826cfdc67b99ff723c88efa8be940fa4f
SHA25674dcbf1cbc12c3d81a783ff230bdd6f4a9d6322361a75ccd3aea98ed5baacb50
SHA512a70e8f0fd3bee2061fdcaaf419c5a3998d92b8dbea2fe7639473cae3acc06310071f198d683ffad2fd3f0e8dd81083d8707fb170da982f438404e68941b498b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19f4384f0aec70e3f2a728c899aa474
SHA1987834d296e071b1fb2fad490b3ab15b5515f0c3
SHA2565b42a8121ba8c9e3b2bf52df96b552c4bf2ca8d9b182e35d71c599f9372be529
SHA51276364663e3893f0e9a8c0a984fb48d01bbb718b687d2951a5acc1c98473f75bb47f18e9b7d6545d0503573625e1d9d927ab5f8f9f0ac60259450ad4921d7719e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c55e708761b551ae299678b66e2d82
SHA1dc576e9bf50ee34d6ac890ce0684bdea55b4c390
SHA2560a0475091901a35c4b2b3454e0eec70c31d633323cd255c9f34f82faa4952a85
SHA512a3e6b38c4ba24c6ef1bd23100ce47a842cdc138bc774fd886179d200c9c640bc35f73d45db6018a38a7a44859e0cd4e11aa95989bfb4ffdce1580d72631c2fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c01e9d148c27c505e932378d35bf5be
SHA1525f4b2d4e1ce9af6c47c9b37eb03e446351bbb8
SHA256362be555b51d486508a70d81c120cb791d2a6bb35b11f5b5a0f436530f3fd7b2
SHA51220a9af02000b3d469ac0042d9eed8dbbd58134ac47fb6e1b381e1b78ef20909f06238edb5944c3c065810bcd21d88c1a96b031c51421c4c22bb330fbf79b61e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553212f8b9e13c6f2298ba0959c6cbb1b
SHA1c2af7bb305afb5e63c5d2146641bcc4d94d72176
SHA256b638e47cbce95b86c3374c94a802748e675830682134f28da45a1b550c4c1c39
SHA512bab017ca1e57397e5876a92d2e7fbaef515c66cc404ed84d13499afc5345291aca1d65828dda32d6ed3d9a1280c24d0daa728ba7155f188a2c7bbc9fb23f9e16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b