Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
4181ed17f97894a38cd406e153071b9b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4181ed17f97894a38cd406e153071b9b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4181ed17f97894a38cd406e153071b9b_JaffaCakes118.html
-
Size
138KB
-
MD5
4181ed17f97894a38cd406e153071b9b
-
SHA1
f8a224fe0d8ccf30c08bb8a4e1632bbb19a2d6a0
-
SHA256
423da339c4c7084a0e2b362384af020d8b1ebd5c1e1ba72b43acfb83dbb44f87
-
SHA512
24ef86816da9a3732f67d1742c8e38dd61ffb5f290fc16a928c3e75d315c581abb6595bd8ef698556a8ad54779dd79073eec2981d450a1fa74a2e813350f0a98
-
SSDEEP
1536:SW3g2ck5f8szAH7s1AlEyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SWPtyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005004e3ad0be0f441b3a988fb2c1c4c520000000002000000000010660000000100002000000067c2f1d6fef09ed070ed535be9e0f1f6a39bb2f38db84a08f70b9de4a5bd3487000000000e80000000020000200000000eb24829954a4bc5279f5ca837f3fc6ffb3008d5e08a5f5676a1ff626dbc152d2000000029183ae93cd386c75b4ed114baa69da8f9bb4a99524d073185007eae403f53a840000000638d86de47b53b16911920b2df5589acb0864be7040a20e06f28b4dd3c42f58dbdba5cb5c1de48c6892b5f85c7b1e719658f8320d0d6615f4306a37dc0587868 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4004e65ca11ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{455433B1-8994-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435007406" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2276 1976 iexplore.exe 31 PID 1976 wrote to memory of 2276 1976 iexplore.exe 31 PID 1976 wrote to memory of 2276 1976 iexplore.exe 31 PID 1976 wrote to memory of 2276 1976 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4181ed17f97894a38cd406e153071b9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb07d9173f44d2de393b655b2107198
SHA102719c5f46495e1e6ce823e237b5ca946923311e
SHA256df691a5e14a3156d54280f85e5b29098ac6cfdef00b2fb942ec011b53ab49ba3
SHA5126e8a31df97e1162fe60460f127dc23d6c58cd014b00ef4e17e100d4df2541ef510dd44dd9f2c98438eba7b03bcddde097374d5e453b28a0d9577da05f5b11243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59555090d92af0c4f2912f45eeb080241
SHA1f33cc6eb8ca5b2fd5233daf7a850d805b54a6550
SHA25619955ab4ff07b92b8d57930976193eb6224a7b9a4d8a7cbd43c046a522d41dc3
SHA512bbeb09a0bc6ee61dd2c9ce1690cb522519d15ea662fea73b6ab48a36034582ae57d754aa9e785ef49074e179f2bf634b007c25c4c4f883b0a00658ec7c8e3fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec17b7c6927bb5a3c62a9c7509c6eddf
SHA1f6a924ba418b5422a8fa3932c75a6beb05135b58
SHA25605fcf7491bb8f2c793e2da1f6fda51ecc9a79ed6bcbec7f60658d0774aeb0d4f
SHA512d19ec9cbc3612b7c86c76dbb20b929636e59be69d53f20f593e025505815932708452d17418220a4d86602d286c3283a127864ac4382277111def02b195c19b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63749670cef3a6602d781b74d69666e
SHA19c0a9c3781b091c063997cbcf0d473524feddbba
SHA25669ce651d2a6f47bb61746ef92ed17680fc39df2b5f4e8d4d8bd6dd06652600b2
SHA512d180a41e6abbdee31f92350f663802658ea415379fa832aff69dc63ad838f4924c9497c1cde55157e3c60c151b14580547fd73c1b14821c3e8106f99dddd876b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f166dcc3ea51bf11c7b509bf14ebf6
SHA12db3bc41cb72531f3577c0ce84b1877e0ae7997e
SHA2563f5e53b8c56dab59d3c67bea12feeac00c313d9d1e11bb8f7d7bcdbdb467a4ce
SHA512be2bfdae9587647e9cb7b06ef7d2ac2e8e9390aa700347aa511e933f73b8298a56c0b9d3715f242b2fcd547ca32737a0008ff06a0328137a2b0ce9e7a3ebf40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f3f3fa42ad19f6ea23d5ed1afee5d4
SHA193521b630c0ba347cd5ec42d48f41c8d18d2829b
SHA25605d847812ee5fc6411ae3b080f94bde27b27b4ac1aed030afebff036ad42ce00
SHA5122717597ae1983ec25d78ce07ac8534057157376891d5b1642f93801d7e8655c4e9bfd90388a7da2b32d0069858f591894a99524653322e9045713c780f632894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004e8fdb71c25f1da8e2aaf6a8edea0c
SHA13efe9df52c6c1d87333c5d1a4753a7e60fc03dc5
SHA256e2a017f172467b03fd19391ac2bd2fd6d0ea9726636b1be54f5dd1fc286e9c2c
SHA512c331af9bd7a5762f678be2ee41be08b29ae6943754743ee4ae57536927e07e4e3da7fed5be0371f34ae26038cd894d1eba3b5e669e21a17a99d0eecb9fd812bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4a7372db2ac219d63e5b1897c931e0
SHA1b1343faec7b32a7ac943901662b83c7edf1e4d5a
SHA256f4e2818e3131aac3923283dced92fac7915eb05fa88f2e68b6767301f23057d3
SHA5123b4cd19e22ca0b670acb2a19eaf2612aa207d203f5234229ebf4ed0fef9b3983fa3c882f77c69251a71a4c7506ebb29eecc2cbe173432a0300a02edb1ca2165f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0884e3853263ec5b18516cab2294f0
SHA1d2f40e1e1d494002aea24eb83bde4b01b71ce03c
SHA25670d137f628a50fd8b70ea0e3470cd5d895bd0bcd9596f4dd458c18555e9d2067
SHA512816d3b68ca9c3705077e82e9a807a82726c2d2434d3461843cdf6229a0222479c973818345ba7db1ef21281b77c515058345ab31917e415047ddfe297d5be9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c3fd3f6962194f7020b4902887a170
SHA13d0851dd7d94c2a2b7131aca0768dcdaf8813fd7
SHA256071494ef62119e8cc7c0e578174d8009a7c016674f72a80ff931f6135c9bad8b
SHA512b095b22e9c0dc60df603da9272b5667bc2a35ecf86f86438c95ec83e26daedc5cdaadf57749164408cd24f225eb2a405ccb68276ff90a0c2ecefc045eb5577ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583e4985280dbcce7ff512f34bddf019
SHA14fd7851cb1bbad024134c9cef10142725603ff3c
SHA2564f071b5a7315f3f73f8eac7aba5494c1a155545bba62078b93037446b6622935
SHA5129eb9750dcffeb2b342218e20f9e83278068202b88eaf934027a0f8eafe146cf5e4cf1b838acbf74d36dcbd140435d1a292fcec2f78883856e79388cf905baffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645f46d638410b0928fe83d55b4bb459
SHA1c3ce39e5850ad9c6a0521b635f094ca4933f5264
SHA2566e7c632cbcddac1f6f96df68836c6b1d832d72ce9d4edf249a6f284fb65d5bbe
SHA5127412c6bfa0fd31f3d621293ee6f4dad18fe52514c4b2e21bf960f5ae250c407eee0de1489c071897f3fadf53ebc2490e96f77f0603f533fe1b5aca1afd848518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a97083392a98e3a6248c2b3794b544
SHA156de877bdafd2e33de59671801ea40871664823c
SHA2560376d9484f21bdca58c11ee57b353a5f883c55b3fd626049199d90d4c8ba5701
SHA512975ac26fc0b91877b436bd2074d9a249443c13180acc49ded2b260521adbb7615e39ef0841cc7d4ed1db6cc31df70043b369e9abd52156091826336480404134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc27d50a29fbe8d1d829d65921d8d50f
SHA13ff4050aabf9a76c3a2758909af1bd6b9e236610
SHA256818ab83f9ad017bbf86d391137b0420b6ee78cb0a0b65f6c69f3bd8aa691eca3
SHA512534de4fd727a08996779ab01f77a4b3fb0ff0bb29141501667a82cc2f5d3027e523047f21eccff7fec35aecce4e7fe7932e571ae67baa007dd17d9d0a92a458e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d96d5a9ffa9da8e5308efb360e7c64
SHA122e3976e2f73a15b8d8310e6ec5a1626d087cfec
SHA256be5def823328dccabcc35e15c89d4fd9d99a691713f08752405271514b31c2ad
SHA512402feccf95f66adabdf17218907f87723fefc560ef97df7ad8abc9d40fe91f98722cf701d3a4b69632b935b61a9158df0a3d89a0960957c64e4f028d66e540b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e7b4f3dd478fc0cd4a2facc510f581
SHA1e445a2f4d673af5a3317f1ce47fc209912214601
SHA2562df1ba9fd274b952d382a50d38e32c7acc0214d83090af5e22b3bbd555f53474
SHA5129923de4eeddf071f5e20153204b241713a745629c9a0d35f23ff3f3a9a90072fe927d86d26952e3ee8982c5d22a5541bd34ab5608a2c9fc6e4b6dcf89be4318b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04281e698fc1e187945a7d4173c75db
SHA15db73bd1690e3293a3679dd1aa858e6dbea89f33
SHA2569174e480b352ce4e901bcbaac79d6a4266a86f2cfc95d7a2f9a0c7ebbcc774f8
SHA512a626a548f9676c028e6a5db9e61e9f62ebb25ce7bc4306b0dc66d34640afcbc21096306e0b41537586f9da8a3c537a3692b66b77e571b19f31f07516acce78a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0a98f6d43db5946c1cc54c96613da7
SHA1a43d53e4aaf99950b6a63fbcc53c7f5a15b60145
SHA256120873e719af7658f38d1efc763932ea439fb02e384c2571e48b20e62d6da28f
SHA512215af1b6d5b21761be67c74e17a6f6aa0a33010a5a261bb11c8cfb80309eb084c73cb6f8492528e6365aaa6e8ce2d863d53add2a85868f00cb03d7764eb03e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a817d163d8bb463b9501ebe15c90c81e
SHA15ef5f054f0d5c6807c86897eb5cab756ebf41315
SHA2562f088fb873595a7889370d42c00a0d6f4dc9192f9a1255a68d2443d2c3b35a85
SHA51201df017172ee8defe4d91bf2d1fc206458f213fd97c3f130aeb6b38f321e9945ffb65d80956b4c61a36d97839f6b2beb54a0e80e83267cf7e894f79ccf84c131
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b