Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
ffb25d7d558194cad00dc2b1f88995a5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffb25d7d558194cad00dc2b1f88995a5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffb25d7d558194cad00dc2b1f88995a5_JaffaCakes118.html
-
Size
34KB
-
MD5
ffb25d7d558194cad00dc2b1f88995a5
-
SHA1
3a577a45cc7ffbec89d8af2453881b0467fd106a
-
SHA256
217cfec5351e9e198fda6173faa49e169767b7de1c3607a81b1c6bf233fb7edb
-
SHA512
7dcf81055b650230e953cf375bddcaefc199a1557c76190047f18752c2599d9e033fe30c15c4e400d16980d561dba282eb864b8df18316e3b5e80ace28afd227
-
SSDEEP
768:b9iKAbRpv2p6YqliiQ94s4eLtFppdM1s8RGh6UjJa:BmliiQxHlVC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f072a79ad912db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000016b66177108f3b32796148101e95ed615593767bea2fce60357b1ab3ad77ec6f000000000e80000000020000200000008b805b648ada750ffb90b2b7ca766cb31b0b1a121aa659843bbb18ce1a2b89dd20000000e35eabc7ceb3fb5b1f2132fe6a4dad6000428afb0af11a3d0008a363902ad247400000001d7f28da022a021924683d19be35230cfce54452b4c4b55457785b25bc58e20b0047f9d3afccc9f0f554764cf91745d440c7a44164edb93e073ef83865073e4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4D2BC61-7ECC-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433822209" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2852 1364 iexplore.exe 30 PID 1364 wrote to memory of 2852 1364 iexplore.exe 30 PID 1364 wrote to memory of 2852 1364 iexplore.exe 30 PID 1364 wrote to memory of 2852 1364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffb25d7d558194cad00dc2b1f88995a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_436A12A0FAEB3EB0641FAEC097954DBE
Filesize472B
MD500cd5141e171045b541e0afe9bef099f
SHA1d98ecdf0cd929c533bb53c9b301b001fc9217cf8
SHA25688b919805a8b2e603cb141d0f0303c8b67b6704f721315911d73d4440c0b1948
SHA512b90f5ddfd8ff7527e191b74778b0ffb3fc4d2128eb6c7418c028c79bedf05300da62c1b7b84fe4d3fb546cc0eb3b172fddb083efc76f8c196b1ecea8b3fb0172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1bafcfe7efc5728922a9b9a49440cf9
SHA1eb004e2780363bec0ae718f3fe6689c8b2af9dbc
SHA256d8418e683a1662abfb07659642260ed21fc0568b3d504274686cb79017b2481b
SHA512dbf1ec1502df8e0a1367c85d1f3d0e524625460ef04dca31b345fb193409a746368402174760fb5118b7fa12254975956ca854fc3d9405e23db53552d01eca6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffbab9cfb3aff16d8c96de22d3d0959
SHA17da082aeb096a87e013ab78e32bb987217455a8d
SHA256ef69f5a657350f6e25b2be4182296e95765b513c6244d5888c88332fc6e9b7f6
SHA51202520c61383023b010010e6cd6ec916c242bcbe0a304dfed9a5ab3dd1d7e9e7d8ce1c5504388f6a3457253621670cb8dbdea0f898c2efbbe22c1f23800c8e9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046195a269749959386aeefa80f0789c
SHA1ec898e938af593d47ae08f045efa7356e5aae24e
SHA2569a717bad6e6c8f5656ccfaa4bca402cf7c25a84c80bd197c2726df14b11e2084
SHA512ee4b7bf67266582acd6de5aee6796b4061121a07d48a5c2f3486a63503cc093c1fb0fed5594b56ff8cd570b28cce765d067f5b379eed526b50469299f85a63c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e89358d72e7beed06c59f38fbdc7e1a
SHA1782d5e1cf9fda82edb9557f7c90c1bfd11b60243
SHA256ca0bad5fd8e435b1fea209fd5fac28fb74252580dea1fc1f57afcaef2c4eb2d2
SHA51271503a82b8ad943ac4d93f688ba4389d0c151eef9e4f1b7edb0ec36f79ebeae588c10f24670380d3fd2303fef303c9e02ff3754c53cfb147e64e21d031988999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ef3be0c2812f33b3f456b55ffff0ae
SHA1f1a45ef0886f2aea46d65e2f1db4def228cea7eb
SHA256a50a2dacf17e07bca4f782a66b08ae01172b2366f6271842125de61f1191af04
SHA512bb5e03135094f2364d58a8fde2ee1030e912e3b19742dff6572d22212afdd8f5ce391603e0b93590c493529776db22e5f49ea91ce463c5e500826a4815846444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8a7ec35d2b54350d7aa3a7e534ccf1
SHA120107faf900a5ba8cf0bfd8177f24b0b69f57b2f
SHA256710c246b6ef1547b92361472edc332eac4c9d3f2e2593ef77433e19803343fba
SHA5124683461c0b63730066aabfaa712ea2bd96ed2edf0992715a3080e8bba24a2d5a7226e864b129ad72132409732f3594bf1a2ee1a0df36fc29ee825dce4b1e9d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a729b6a8a628584d9efc9ead7ab8860
SHA15feace8d5880fa2542a4c48abc972638ef12b3f6
SHA2567739f60ea76fd8e2b5bcf883706ef671b4bcdf17b2012b250d21794079df8a62
SHA51276370e47f7e846ef1ccbd5dc6173045c239fc5df59aa3ba1e385350dd8c0bac349f86a46b902fefe4f3fed3f094e281ca1439bb6e7150073900ae0647ff17d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea8b2a3c212becc36298de28b125208
SHA14ffed190dc4d80820ab40896a8f18dff6a6905c1
SHA256cb5e661c23d5e1e9c31fded7d17b597b0d7c083b2c8ec4684813a3080497ccdd
SHA512408861d7b6f26301da1633c3226482fbfbb00af62a8af353f107b44b6225bee28c495bd50b5a6e0cd8acd05c836a7e3efbf2348f783ae73d7bf2ad75b255f558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1f140a52125e7f4f59040d510ebe6a
SHA196c47bc6f7fe25bb0c29e5b8b4f887b9097061b3
SHA256d8a68074bad74f07c040de24d08ccce3ab46b73813233319523fdc57242773aa
SHA512008983c307305db814b574b50589fd11b73db98a4ac2b8a50cf6b59142ca77bec907e025d0e03135b1f230624d75e9bee3f5c9724503fcc0a04189afe2dedf2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840414e16a5cf7c9917df2b9d8cd0305
SHA1f0a3968820584b2579bef3ac31a85ae10d9185b7
SHA25611256d1da3509644cce5523103d3b79e212256a63b04a0a2b8a1af00bf34e122
SHA51281f6ee113ea4cc61d5239059307f826d2d288e8d3be2d95d02c9f6aa904ff1c8b78112c58471d65411700f5748a77f1b279deaddc020c23a53a831537b7403a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c54a9410f0d8d487c8398f39c42143
SHA159f84abf3d61c34d17b9bf84dc4002771f301fd4
SHA256ae25c90d56212a937dab9762ac2e191422424ddefa1c2a8afe5a529d91615718
SHA512be852d35677c931700d4c367b32639e2c197c7d9c8c19d00f24c2a7d13e0896ae20dfe7e9beb6c14ca50e3c96714b743019f7780321b0a7cb322dc01a60c2a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8591bfff9bef96d7edd77f0e648d0d0
SHA144bc47ba688747c2a84a30a7d44bf2f4f0bc293f
SHA25653076dccafc9e796be1f60452d4499076ad6497b7e7d2f893372ce2c4c066a66
SHA512cdc80cff9cab6572c73801765c87d1240804fb9a535b7e967458676c581859742a414a367ba9d5f7903e30363f27459a1f7c5cec33049aba658c6d9b7f019ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce081a43298bee76af6015183a2304d4
SHA196c25ba36aed6d45bca5c79c04f96adafd665e18
SHA25654ce524e7c188b4865fc4bbab9954e700ecc26e62b11856bac88bd7780a9b04a
SHA51287fab145833f398f4d2a4fc3430fb86367c2313209a37fce9d52ba1c5dae7630314906692ffbc5d64ffdb2deaa9dceec1745e9f3d9ea4d63137f4568af061d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f089da48f9d13431f144ba50c6992b
SHA13e759780a702420f12c691b790c13dd54f9ef1f8
SHA25627fb2a7df30b499835a84707e0213f432809b85e8567334456571af4c5294d1a
SHA512883e1b77a0d055d997fe25b9b28fd97f5f326b215202cabee652ccb2db33e29915b73e7668e130d839ccb0d089f7358092adbaa27e60e1aa663ee8f599aaf81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db840c6e36b3fb26f88d79213629b70
SHA1cded259b21c8601788433ddaff12032355afba14
SHA2562ee36a17d40129e7f230088353bcfc2313b698b821b6d0d99eb6b9f923d97dd2
SHA512c113fd126c424bdd611bc3e6b76efe8035f5b4819525aeab2f514198aecf16ce98ae0e0d131899bb20cfc0faf57160a50a2adfb20762157cf8827196af670772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579be4a9b0762ece0f5506299c49933d1
SHA13c97c6ee7f749cbe48e742b5dbfb814e3ddd3afd
SHA2561df7adff71cf56ebc3e9d0dcd82bd0721af14528bfef1e0be56d3d41702f851c
SHA5120d74e01b050b51fbd19592b9f3fccbe7e3733ff0029eeb06c8b202945b0dd52839a5fa0626ee92f27b4efedf5f530e1e0c04839a852e11a0f3adb0e3c6ae5d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdfd80d02f2250c7c7793f207ae5fe2e
SHA10119c5ce9f45f314430c2d555e6b2075a596de75
SHA2569a8591cab8644ca3fd03c8a8f1e85d2ba0e24a2d77869d3a979f278cbc557c05
SHA512f8828608d141f00ce04edfd802f79cbba6cc5d18e682948b7b7df04c1ddf954c14a7b4177ff3188f7ecfbe5d9a774cf2f8d33de6f27c61e555961f4eed2b4293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53383b4b6a73794a5b710e3477974c44c
SHA137b13d40a2b774e6d4c63f3a0ab8addf2feaac25
SHA2562ead283561cd0297659bb128bb6a494762375f91a682dc5181e985344d5776a4
SHA512eee4555345bc940ee023a9b6dc4e5b1bd350cfd3913924c2aeb3bff1873f527508223ae07f639c986a1ba66aaecb127587774d7c7ec1f73853ab883e5cf4d41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b94d44e540075cb5f002eabd88cbd94
SHA1579aaf24895aef08d1409ad97aead0e54e0feae6
SHA2564d41d5eb8df42d1a9983c48396ea6d52b2c731d57efd1b05387deaff5055de5d
SHA5129713e4adf1517a2312f6a9a3c2fc44d990eefc6e16a90de434da4f02fc3480aef87f6e8f61a840072d5f823f2246fd7010ecbabcfa1730b312fb8701b45b7896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b00ecdb2644134e435ed388e85604e
SHA1a7d9c0b4eb2bee7c4f5392e06795450892e53575
SHA25678f4bdd1a1b1f140788e4cd0afbeb1930955f3b8286afa8eb69b36cb1c80da52
SHA512bf657902bf309f21688411fafc2d529c2245e43ea13a0b2759223e16e34d9dc22c0e7df4bfb46ab35e7d83b082861607afb502cff839b221c3be27072010b959
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b