Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
b91912b8b63ce657da7c607413bf9ff5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b91912b8b63ce657da7c607413bf9ff5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b91912b8b63ce657da7c607413bf9ff5_JaffaCakes118.html
-
Size
26KB
-
MD5
b91912b8b63ce657da7c607413bf9ff5
-
SHA1
f2213414217eed361a4ee85e9cc39c5cf89544eb
-
SHA256
3b9b03e3b8f2678a6aa6ac835e850ba49dd617dafaa677fa84fca29102246cb5
-
SHA512
d4e51721b694cf312c9066cbb9231ec52196c174385d8c2480216a0318896e6c87e9bd9e8754ddaa03d3f7999f6a2b8e7c395079b3d6faf0f0e883bc4c2095e8
-
SSDEEP
192:SWZbmJnQ6gM1F/xnQqvt4W+nQInXqsfXmVUNmV1PmVHdmVFQmVczmVaQmVynQr7d:SbltzVrVQVQVZVbVuVdse1Gk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000eb61c0ae38de9587f13b560ebb9a55da8a90529d91b9862795ae75c26bf0b671000000000e80000000020000200000004f4dc40a4cce2703c2849f9a51544c4bd05e6de83c18e1a2600924673adbe30e200000008c4a277ea2282c342ad46cb8f4f56e402114b298a8dda4da6a8ee755a20d2bd44000000061527b398f2d79a8413aaf5a2e540cd73003a083d8383d8adc80ea91af9606eec816b05b6f947fe9921dee221be15239a2dc153fe4f022d28d65451c5154e12d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0089a9ed4f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430521527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5AC3B21-60C7-11EF-A248-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2192 2328 iexplore.exe 31 PID 2328 wrote to memory of 2192 2328 iexplore.exe 31 PID 2328 wrote to memory of 2192 2328 iexplore.exe 31 PID 2328 wrote to memory of 2192 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b91912b8b63ce657da7c607413bf9ff5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a715e68ddf8714de19de16ea304782db
SHA1dac44181e211872f46409a708c1d77402ae9e94d
SHA2569067522c1a8b8030ef5bb48a45183384e3af6ba28e4c00738c0d8197f9a8d137
SHA512b7ded5cda151bdda0419834a9e751d7f79fc5d4a98615c66ba4f9a18a4a1ea13529d245b3f5af9ac4e662601ca4f2ad21481638b2715d3bac28016159f444440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1e1ce06d736edd6d686d88bce7d406
SHA191c163844c9b79eae260367868472a407b0eab6e
SHA256f3a00896d0f198fc26315069c568e4ac41b3dac55e6940ea63f4363a624ad7d3
SHA512bd6f4759970dbab6dd5c06d6efe83909bb2352ea9d26344947d428250ac2ab20dfe44e769ac336a21de6852b6c6a3cae724c627682cb8ebedeae167cc4e5ba3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d086751186b1f695a90e297fb4228c31
SHA16292b2d9860ac4cf2f3d20ca03236306728d05e7
SHA2569299d1e0b8266b84362ea6b0eeb2519bc29a331f9013675dc60366b8c25cbeca
SHA5125def6cbd2cdfcb5cff11d781687b4f11dcd273fcc19e934a6f40e371b5c42fff04bc9bb70066dead9cce27b348cfe93cdbef33a49a0fd6636a6744c3763b697c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f162dbe46d109ac012175f78215b4a2
SHA13216730c9d92f2b62160dcc7c09c8908d9f82116
SHA256252516903890b2c370b9b22bee6ac61a8b1d9a04ce58ccee7f23d23c6457359b
SHA512c8a41dd70bbb46b53f15903dbce0af2d19e0fd05736203afc919d0393c7a4eb9ff185700ab9ced273ef40b4b476eb8cbae295032a84e222cc76cf2e4c6ec7e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af63fea05892fadac2d1907f89b42a26
SHA1dd218f4003700fe2d9f0bfd23849abbba1dfba31
SHA2567c11c1e062a9d2ce7c15e12be4b436ae29ffd9b74225e0defb23b2da2ac66c73
SHA512243a6a1511b6ea86b26d88cea6a844d3af7174cc13d7fc6413d6df366b2202d58a9bf00ea71af304c5581fafadc4e2292dc50414d42ad35a5cbe22e09a471271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c20be43e6a527c334f1315b3481c39
SHA1fbaa417c05875ca7bfa67c845a75152fa6d5eff7
SHA2561209822ee0a5c1febb382906ebcddfe6155cdbd6d8a98d41bec848e31e9eea38
SHA5127b022b78f348f7be42a8d6e85df75ad6182a5580003e62712ba118e5fb06f70310ea048b3af35935b3a94cefe0df771b2dc8224e82e0937e94159e8837ef8dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473cb24b5d3a3afe20f995a9b90a310d
SHA19dc084bec2db9f995d00e90619f8006c7fdee9af
SHA2568d677e03bf94e6e42edf56225a66b3d7812f62479fca7e2d5912ff1de659fe6f
SHA51276fa3cf6654e4bcb38ffbbd8e8bf9988ccba9a459d342d605851840b14ccc7875bc134086b6e253b062dea52344ddad504325424c6bda8025e32c9425532c25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a52db598eb4e33d2b3b1734e1ac4274
SHA103fd2d3b32a0e08b176f783bc02501a75389108e
SHA25638eae475a774576001ca8b5706e4bf243a192ca31485c218eed3fad2c1d42672
SHA512acfcf730b59fc1a41a894375c3fc199a79242c061968392c3dcc46c386837da409c4835fe0bdfb31fefbeb23fe47c7a61e3477319edc44d0ca7bc3d2f1bc4208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d772eea544b3dcc7fbe4e23cb517240
SHA1c855bc5e8f7779431b0e3cfa2caa8753381129f4
SHA2564abd8c2be7d2a23025e09efaeff708dba1a7d7b466a0b6d8f2d5cd7b37648448
SHA5125ef1a244217ce257c815daeadac5ac133d89a6769f166ea3f76a7c7cd10b2422b78da32f1620a602f0e393a6dec1850b161349172a6447daecf27bb548c02e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34df4eae41b5ca416055643ea9a18fc
SHA1a2658277272da14a3d21776bfcab24c56f56541c
SHA256a0525f2560174a8322787e6d011ac0f2ab5b8c142b093fc0481e83e5fc1391f7
SHA512cc828beb09380fcdb3df4b3c8a80448ee6791bb74a879c68a90d0daa2c52f1be9e6dc9e0f900f057ea77e4ba49f72647a13a886ac07392a2c9d24bfb2ddf2561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515009ef610348b99048d01ae48d9b627
SHA15bc3bd4ada91609230e0f5af82ee9e21ddc9f18a
SHA256a645d7c37dd9c0a54cafb93182ea6201b0ad249a01a220d5d67e8664bae36dcc
SHA5127e0f3845eb1ac6bc388e035ee54467908f3b02d5c8c0319082094cbdaf8576fef1ead1392b1b3b998326add2bfe3c619044647d58cd7df1e4004ba79e943f8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af83fa3c593035215bf01f923d0ec21
SHA14d757373e602b590d59618d634eec9e5036b8f6f
SHA256cccd0484f3082c25a54e17830da964c0ef8c6aa279a62983f510980ecfe839b2
SHA5128542b130e62bcf07b14110cb6a7370b40ba588ad63548f4648e020b552a7844ab74b735d8e9e220747057908ce11ef1c26a8771ef9644207e1340a2702d6e2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598c6b033c286cbd2d69464d74ff6839
SHA131a4a00255dc215f2ddcab62fd3d6cfaffd80a38
SHA25607c6291bec49d5bb7bcc77ceb438449e99c931dc9b46d6b169a361aff14be001
SHA51287f724d75c6aeb0d031b757ec56b832740d1c68a32c2f78c61dcfe8af58f94600538754565bebe48e08bdf154a7acce39b58ba339e81ecbaf11eaa2a261dd0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a86207582b347b6aa98e77362c9352c6
SHA1d4eec97c97fe88d7408973d38afade8d3939a2e9
SHA25666f6f66f212f3654c93ffc6672708abb41f1a4586c664c9740dfe34fdb5843e3
SHA5121a7373691a62b6793ebe391a3febd91a9b3a84a5abd0106cb68850dac40e577c5e026291f15b7efadb8f7db259a06f142fedc8c5458685ad5d5bc1be0c0fd89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f732baf720eafc76c0f79da1e61e9b80
SHA14a16ba8843083bd39d72707d463676e97ead9264
SHA2563362c4449cfd41af26ae1c0a2898668bc3ab01f757ae89e7540cb66b798523b6
SHA5129c4cdc35f7d55df4eec09cbbc097c9b7ecd502ee973469e97bb6a8f093cd2a04302265f52e43f060b3186704d5e52f07baf72010994f66d7f648492ab97bb735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326d9175ed366343da01135da15ea64b
SHA1f053bdfed674570de2e88019163f1d9b04cf6a6d
SHA25697c9f1c55f10530c8d1f26eb3677586d350ae4ff3e8c1e5d8dc8d906a59818c7
SHA512bee8abde360f05315fd8d0c1837d277e459d2642734e2d041db01d8fcb58ef6b950d69dc073d4cd9dbc963797c76c0ca4dc77c1e5ce3997064a2fe6165433178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298c9e2ad7794266039fe297dcc3f0b3
SHA1ec7c4cb23b8817f7e0083f261fa892b0a490a5e1
SHA25618aea8bfd8ef5d63fdcd6e34adccfc9fc11420485e8d0f140b53bd6107c0f2b3
SHA51264241dfdab341952a6a28117d7108471a87b4f2623100f791ab91a54641be999b2d59cf10f18ed873f376ab12ecb5846c3b80d77774acf7d9d06a6bb86b5787e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9b098811ad5529b7bf41ea0d5aa56e
SHA19e34153ba53e818cac2906a38b8c8d638a6650c2
SHA2569f679814c60cfd0330f319719fc7a6200485e7d1de95b878be1142ca64d50ed3
SHA5122961707032e0fa67fae60e6652891b6eb93a0879459dc67a62cefbd39cd24260d23c92a0eadbf1627d6b104b4eed681849e4cc75d1a547a0086beecf2cd7088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f88f99102e33a078b2bc3e9d5a19b6f
SHA1f72ab6cc195aec4475306f5b5fb995171515a69a
SHA256c245aa2b9fe03baacf38c9b0616ea70b0b024b20b031574d29469039ff1bf10e
SHA512ff56fcf9be1083783564af1e6a21f8d7939893502d7a65f0a9b2da424b1aaaa4b9ef8065ec61c49279fffe294b44a4af1e931f9cc498c535b8134b8ce06d011a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b