Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
b6f69ddb9c83da6edf19215fc87093b4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6f69ddb9c83da6edf19215fc87093b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b6f69ddb9c83da6edf19215fc87093b4_JaffaCakes118.html
-
Size
9KB
-
MD5
b6f69ddb9c83da6edf19215fc87093b4
-
SHA1
81313b565ce3ec1c4879b04d806672f9d6b693b4
-
SHA256
f5b3315de26d58c36c3b1236d3fab5f74b0bd0676eead50250852b7fa51310f9
-
SHA512
e9eda394b769abf726eba24e11623a37302eebb935146dc8e06485508acfbbe46fa2ea7eda4046a404c1b099c5cd84411109e895e740910e5cddadfff271fcff
-
SSDEEP
192:x4Z3wSdAmkbvhK86ubM2ZPtf+GrzzrX7HABalY9YXbAU8Dj/ms4jZz3ooS703K3w:c38flrDtS7m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8473FC1-605F-11EF-987A-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000a754c39fea482e2d12ff3ac93ae4ce1a59a4317cc9e028004a3db89980c70386000000000e800000000200002000000038790109cc13434d71bcdab59b95c347d2250b2811f86299f8ef1464bf48ed93200000001eed285c4fd9765989a98dde4895ceb9e37b8e59a8b52d4e6896d14215044427400000001e4f1d09ad7ae02f578f10723ca0a7d74306b4200d251982655d4c7ff91e7b2288fd08fc0b7bec4f32c5bb937a14840dacd4ab0d80bcd9496dc0617661196f30 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000a63de585b2143609b25c06dbaec66609b680aebd4333638fdd91dff7656d6b10000000000e800000000200002000000019e1dd42e638a0f007bd950745871bc1b83466b5976248cc7a90e3c47c9f38d0900000000c6ab86ee755b809704f4f4a73a5b53a066d1de42830a9c1d2b1dd12fd88f44e780f778ca9590f89322bf45a4ed49850bfd67861e365e2a108417334548450326d6614f7078f9bb510d196865071fd976a791572170e24bc92e2edcaf1cf80a00487fa873908eb2611aa49ee7aeba7691039a0b444e7391e1925c24a95721249192ffe71edc563ade37de5f374a1b2c840000000b2065a329a91ed163ad332273201790946b078911606a74f35f0f3198a9883e35f53ae80e456bfc6f472406e127f6eb8c29069c9645dc345fdd9d6d2f6001234 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430476810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2011877d6cf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2944 2696 iexplore.exe 30 PID 2696 wrote to memory of 2944 2696 iexplore.exe 30 PID 2696 wrote to memory of 2944 2696 iexplore.exe 30 PID 2696 wrote to memory of 2944 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6f69ddb9c83da6edf19215fc87093b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c9df31a1d3216efd0f3fdfbc6065be
SHA1d512cb8f6ea5d25c368aaf8c13d4bea1c78ef094
SHA256cec3607618b65ac6007216928b7cd87e03b4959d93dd40d898086751a6285919
SHA512e1f86c26a0d8352a6912490fa9965769a582c7df4838f4a58a0e5e37fb2879f6d2a48adc1963fabd869231ca8458d19ad7cfe0d03f3114e2a18e614919981bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0eeeada9cc8b8836f64d9b0d6a79191
SHA1e99ec802b912ae2ceffd9c2c9d42a2e38b6985f3
SHA256cf3522ce210707c2dbc11733d0ea7e88750f131635841a7c7fb14d9730d71807
SHA512b910acc5f4540a3cbb03bec72fe055c465e30e4781a375e8894edc8f1ac6b78afbd135e0cbd74f41849de625af5f866d1a496d8b90efb3b94e1380810b76c58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a75a3fe212a22fbfe9596b1f623b654
SHA17bc894d9ce60eaa49bf3d89670c911cd01bbda79
SHA256941a7b7a13b5fe3ea1944ced7251828223d8138392647f8904ad79379f100e50
SHA51293da41f7404c241237060b981af900db83a3f9e80e0ca4961dc6af9fe03b4ab7a3128d556565a4af94829f436402f07a1913dae39dbd294bb96c5a0711c6888b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea2ebf03222751ab956ed2420fbcde6
SHA15092f00310057e1e1db4d71de95252b89377dee5
SHA256a2607fa79896e6807fb504a6418294818c24b53670fca33d580d60b108ba78eb
SHA5125b7b68238efcdf62f58c87f7e2054cc247340338f627372d55346dae9d3c3d52828097a0201d3defc9c2c8aed18bf5d805f7822cc264010c03500fadf4783a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0239ce0f5bfbc9bff1dd392ee2552d3
SHA141645c37687db51891624bdf2ba03b6af8072d3a
SHA25651ff7492645a7a0b8577eefc60848f5ca675d056366ef6bf61c0aa17c3fd0b65
SHA512bd7d003f605e0226fc66f128554a52dacf1b6a6d4b15f5c1a232492bfad13719e36efb3ab276a4c1f2b8edbbe4a5bb993dfd905bea244339d42fda22ea77c918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3adad768be1f4423abca0010620eaf
SHA1bfd35b403eae3b31274384d3455440def09ee7cd
SHA25649daf6955a9c69d47881ccb8dd083afda840d7fc633b953bab0d1f8e1e03ffd5
SHA512dfefb959e0fd3c540e6d21d670ff0156864b06b1680a8eb05c39b54e12e0066e173f268698a62dfe85ebef4fa668e39703d5b41c9858c3e86de16af4f90aa41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518f05b84f66e7b19b44a25b920ed6e3
SHA196d30c9e5ad8bc24257ebab6bb4d7fa6493a56c8
SHA256c0be3e1ec38b1739366c04c923a5861f73b8f8ddb0e246f8879e373821d856aa
SHA512b9b1b2c197c2aa193ff143bce3eeb2ed326a452096bb66a1ad19cd3f5bd44e65baa909f3aede3c3ea7507985c863bb20c909a27023a432ef296192c19047800b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d518016dcfdf9afc97157e870f025b
SHA171738319cd51cb109988044367256280bab1a48b
SHA256f6e2208a4a2721978e0971464ec600c2e48e0669206112032ca307a79dcf8572
SHA5126f3dc38c960fe2dd96a7e9bdb924bb611212305be420f64c2122568c4e88deeb8bd4c0c59a428a68f06cbb2a3f449195d5efdca33b88270270c10691551cd749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990baa92a0695fd2fa0718ff4213886f
SHA177996710cad9e338e8e23f26aa3cda61326b7c9f
SHA256719e59cbfd1b5c23d739cb33d6a9a4f6b7e0bc6f16b31c65cafbf2ff51a1e7ae
SHA51285d5ac154071e3548b99bd670d413d1a4879e93bfab3feae5ba4329ebc1b24e8ac3a6fe13bfa95f2593e0413eef3b335ad2f7743b3a2d304fa2db6cc9a80c45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd47ece332336ef40067e1f74c625f7
SHA1e92cb78462caefc1f875e0024e5e721d3d0a5ce2
SHA2568defc83c307899a0446f29cd7c384b85a491311d9e5789280b1cbc5199777c8f
SHA5121095c810c25069230eaed916d0025cc15d9592bb1952b70fc28cd3075bae557b0c237b0358279f5b1806489e223b0a9a14aa28746e17d0902e8de8a1f03b952e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bc674f35877cf13030df14d2557737
SHA14742d194a4264a8de1aa238976e88003579f851b
SHA256cac60fcaa9e2413898e1b010bea044dcfa2b6e61b1d3a77da74b28f32406ff26
SHA512448c44f3474f10b7fb5c4bd341f4a00c154b454b7ab5129d8b12a1af2fc63028a7333a852474f47a0643afe6ffcd4960a43838f147fc675b467908c726233d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8c15a7a468daed21585879ad9aa846
SHA17394cb2650792c0b4da9b0fd4bd8759a65477de8
SHA256ee5fe4005e7a219beb14fb542402a2feb904b78315984b52d2ee19b68b2d73a2
SHA512fef4a1daccbda64f130b773b61d25f8c0e8f3b3ab367c6f2bfff676b726ddf178925a7ee5f1daad5aab467aee6e9153b668472e9eb6979f026461c212cc7fbbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb27c423210a7aca00986e29aa20ad9
SHA16b7506d6fd713f249ab26eca5e00a686b995765b
SHA256c7eaab2cfbb8ad6836eec8bff7d42186ccc2f4a3fd80cde9643e36f05e9bc828
SHA5129c0807984d03f9a9c19107ae674a36a01d371ac690b2b07ea8686128cd231c8d7928d360da7508523b7733f08f9fb519cd62ce006ef9ee6ae55fe5eb860b7c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f791902e8d150cdc7529d1f2e29b5c
SHA14bb807318720cb72ed7af3a4d67732893c128a23
SHA2564f7fba38df14cc85406f12268054a46bf21848d57031d14964eaf78135e9f2db
SHA512fc3cde61f88432aa48b59ad2cab4bcbb73c87a44c39c130fd8aec0b30e38f6b976e3363d110cf937c53c1cfba0c965e9cd8da0eb87601b0b75e7dc81b6b27ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37fea9f800aba97c6f218e6df51e403
SHA1aaff6a37b3042361467073804534b967c39f6660
SHA2562c170fe5f6b2a1668fa7ddf8c81c5e6388352c66ac1380e71ac05c06c0cf620f
SHA51208a96f4755251829a853828673f56834b6dc1ddbcc6cc6924e02a1040ade41ed29b13c04bbb46cf45b3279d2f2b7616d841845a6c91393324227abcfe8fb129d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d604dfcf551625c15ea92d473fc30175
SHA1ca90efa0b9c6ff2e4ab20e4a21b314aed9f01d60
SHA256cdd90e60101b4c1100b79cb6ee3ec4fef53f8896a7f4bb0e715367f39f567306
SHA512c56763328d8f6838917dbb385bb2f5c48d384601de196fd191da7b2a49d8c9cad403c6c6753650cffe03a3eb8c8b9433c1bb2df8a2257fe045d6433927726972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6caa5e1fdddf06250ef681235766e4f
SHA16e0f64caef3e025eca329d1fb0fc3e57230d11ee
SHA256f02f7a699a977e4c128dec3d84a044863c8285369f1b820a88ffc6dfd32d4b6d
SHA5128f7cb615bfc79012a4760ebb44cdbb01de88e235db8f12ef5b025b978e5f4c2bdb5344e2c792b0fa9d382a2c43bd74e7eb304c1e157a00876fd973cdbc875be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48fbe1edb1fc51cfcd8802eae57d11d
SHA1a07cb7856ad931ba66d41bc8ba8b3d0b27ce3242
SHA2566a1af891da52bc85bc176eebd8eb0dfcaa1afb431ac9e710870b30467c9504e6
SHA512871e9841a00a716b7da20bb1f6cf7e370e9fa69049f976d69721404dd4af232702bc7d8f8f1ed004b054e16ac235d71e768c6bc99c09dca1c4f56bb641b075c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b908c4d82351fd0a3bef5cf29ad5d3fe
SHA1f7963c5f089fc8e13469b30d5931cc96253409d4
SHA2561238baeb4b91afd42e87dd1c2f55255867b5702cb19a39b1f0924d36b4274921
SHA512f474c729d517f543f7387d1fba69ae2b3a82fabb66882aae21402ff4ffc97d637ff629952da3b588b2fad43ccd0fb8315a781c3593a3910b2d5988434145f6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adcde8a43ad0ef8cdf7d3ffce8285da
SHA1b2d27b0dc7746a5184d674a3fcbc13358977c3c8
SHA256ea14e37e7166ec16693f3feb7d8b6ac1202640e560ffba55ea20d02e3f9966a5
SHA5128e5c706139f2e834de59a013ebc1d23a1e78ed3acf4dc6b49fba79987f44bf5fd5f289f78e3b562bcd09fc7e91be7b82fede60e09a5220beeec29556724c92f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b