Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
bfea1edbf5b6464b5c191acc820e9e4f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bfea1edbf5b6464b5c191acc820e9e4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfea1edbf5b6464b5c191acc820e9e4f_JaffaCakes118.html
-
Size
271KB
-
MD5
bfea1edbf5b6464b5c191acc820e9e4f
-
SHA1
824294155111e7652627ee5d77ac590c92cda51e
-
SHA256
2a1de9d13f02dc62e6cefb291511b6765fee00d4e6a874e28a70ea4116528a08
-
SHA512
3a418c21b3833866528c9afefef9bbea4c0b4c5d9981e4f54b58c825c5db2415a67de1cfa1508026622cf3c4ad2f0cca9edad2408a15e66b4484fea65de1360e
-
SSDEEP
6144:8S28/XAOYwTuwKMgjrdr8anmP14l6pk+Mbw5eUl83Z2algiC8osmUPjWpvFZgWb+:8S2IXAPwTuwKMgjrQ9UP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D37BC731-628D-11EF-B062-D6EBA8958965} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000007a04556206f84cfd9d40dbe6c4df0e1caacb2f4c1af9368cb5c1339c7d9e6c64000000000e8000000002000020000000b34af5af8599e8420f9e3a6bd45f4260636f329cedb298d462f19a7f179722b7200000005bf0a336f1f1c04f16af16e6634ce85784de75a34af4d29e5e82a51a32b3276c40000000884430ae8c14e74362d04b5354ebe5fb60230f121c4ff134e0466e0a97d8dfa2b685fb385721f6a2d58fe994630603853c62f1e370a7f11bf05258fe84604ce4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430716545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0de35ba9af6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2300 1732 iexplore.exe 30 PID 1732 wrote to memory of 2300 1732 iexplore.exe 30 PID 1732 wrote to memory of 2300 1732 iexplore.exe 30 PID 1732 wrote to memory of 2300 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfea1edbf5b6464b5c191acc820e9e4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD580c93207d0975eb49852aafbbfaa36e2
SHA15dcec067083ab436227200851af355e7e10a4762
SHA256b9dbc2bb705bd751767810a0a8a96843798a40fca829745af536f78b40221eb8
SHA512103a16b0949cdca67d168be3cfed2b4efefebc68ed590933b84cf79c88b1661a51d4c54ab750733255cf5083550ccc3482b4670df5ba30f22fcd19fce92cfede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c97d7205928095fba3c326760ec3bbb
SHA1c1efc753a7ba67f3b2d07ab50e308d203c2d20e9
SHA256e4ddef385b02666bbef82493a5c1bb660beccf8598f0d42e9e06a0987655198e
SHA512c98479b36a400495e2ecea6455db6dbc0f42732a83c88cf61f8d20a07e7c44163a3c2fd05b8086f0f7fbbae7ce7f262ffab3924a4f6311b9a8c2fdd64d46d93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2d1efad0167b4654c59f5170cf4088
SHA1e4834bd72420726903a81145755a86ea8fd20717
SHA2569e3f150cd2b7796580bda316af795c20de6af9f6299833043bde3489654cb5b9
SHA51256f0ac45807297dc8adf6d5dd6cdc36c390e96e468e7b6a443123f973c932e188342d79db3430418d059afd2fed46bed4355998c246af34ff57932a6dbedad4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce00d88a48e41ca64dc48c8daf3aae86
SHA1b5d82a5f5b6d9803d7a40fda805bdc8ac6c8c5d3
SHA25623cb0b0625e31c663212b8579617b472ca193a9734fd777d1a0add60d01ea7e6
SHA51223844b8ee4bb848ba30fc5ee6923ec03a11d736c7b3c8b76ec89c3d608fc0965073c44084cdd67c1074154a57a2f6a5ab247165ec8ab1de87d35c6f49769cbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3016fdd10136df8e4b407f05f54590
SHA1b9e6d37fc985eb3ed27b4547b6c1ecde065a51a0
SHA25682dc7bf8f51f60a1f949393803e813846464af6a2af4700aae269cd0cc4bde68
SHA5128a13baae205d78d1d3ce147ee796ce65acf681b9b52049667a2edeac7ba436f33ffd15c46e89fe01ab1dec26e4c4c5dfc9699d22535062b9e1360bbeb0261749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f378f4da637033ee5e9c9fe88a77972f
SHA1c13b6bfa89100a5ee8a6e4a1c89f13ceb0f0986a
SHA256a4660a6d8875274d4af94296d95e572f009a23beff6dfed7db0015572b0bcd06
SHA512058739f4241c4f1f28e5bf83f6121e2f00e90148cdea018dd425bc79aa65cc4e4419cff14b22a5c7d752606afd4202d6de67e8e2d778831922f3e03c9eb9adc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e50f8e098c19bfe9d6cb1824b80b37
SHA1690fe67e8bc8190142a3b20625fc60ec09667ec6
SHA25696f8a7a37b0374cd671350948a5b1579251f0327ef1211bb033187e4b0359939
SHA512cf268d26d0573af119efbf552aaa71dfefee8e87672967988992d4c12fba95371571ce01552982f3c978cefa43eba639de30bc540d3b6c6fd38aba2ce97d773a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb0afc51699de8b9a9676d4e7abf8c6
SHA1dde711e03d8ddec1d3dc5428efa4ead2c6ae45ed
SHA2566e55342c7b9bf8d9a62f9e26760b9d9827e6b20c6409e2f3ad15b9665533a35a
SHA5129c4b2ef994409c4b32ecd8914cc2753d0380661656206f30469ab8d9fa248fe99f96084e3fe3f18257f866b8d6e9e8b26d6b439e66f73827aff681f65ea47c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35223c774903983f49b08399cabc2cd
SHA18d6d4083c4d786e11ff1f06660affc878686f946
SHA25661bf7e24618ad668cc679a4992c749e5321ea3efa2c18d4f631a51e0db09227c
SHA512a82d370ce43eb5fe8adb7e1fd251f751f83673d69223c057f299bf2b5d38fd297042750b4011c36d58b2a6cf7ba99420e7b1a0fa873ecc611ec0202e68bb60b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e6bf7e0f399261337cd5dd56632161
SHA1a9cb93d470b610f9aeff2683087fef7c53f5b588
SHA256297b1f8fc6a55b7b7dfcc776fac2e46a54e0dc223542ee379f7b523569a16456
SHA512369fe85da3755c9c665d052dbd9a0703dc58f6ccfd8d63dd2c86fea7d4b370f90629904fa747a15aa6bf66f0deaff35948fc20525a479ace45c1dcc47127a737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b9760d8ca7d934cd47c4da50784f5c
SHA1788b755ca7e8652fdf3b0094f2cf470e6498c61c
SHA256a4110abc2380f9ac5417760ff801eed0d452f7452140d88fee0eccf3af5bb040
SHA512298932abffc8e66d9b58dc4bd5abd9b297e2735cb708c852cda9a2a9019063233d72122d5226d4a723dd259a3e7e189cedf505c4cc428cdd4fa05ecfcd5c1b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587229699abdf213b51ee40dd41862dc3
SHA114e1faecaa51e1ec858b6cb25fd83b5f19b9c39b
SHA256778a490534b0a99187cbd7176ebe89695a45f9d5c31af2f09c636e98bfc12797
SHA512f037893decab9113783ba856f030f0c6b610a4e72d7fb0ba39e4ea87286733e990ec92bb982ba946639b842b5ea96be29296b0082f3402c4adffc00b8c674697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c35442af03bccf0ff7fa04bc9b20cda
SHA19ba1df3f4d579e32321434a35ec4db76bba353cb
SHA25657b5466ab676e53ae271919a5d2b3ccce5b6ae28645b657acc96172fb85fd6d2
SHA5128d422097eae0f54e520a103ffe6151005f70310a1b4abb4458a01fb8fa53f3fec329bddef24f68115321539e200e460196e1d13e5556f49d5e2b5f100b1e4a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73bde0e4ccc1a1f636f762a97a0e0e3
SHA16bd04763a6cb8139ae881ef15e6a2be65efa352a
SHA256e3f0636d4e37af3618332fd37e78c43a339257c7ac1fc333faa128f8c80b95aa
SHA512131ed866163a94b75f7093c0d181f1c9b796b1444bad24fc0ea47dc64c0d28ec5eafc4585ab4461e55f56fd681974a4b65df5afd6f5e8e949ebfe8f74e6c03e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782c6a926744227c95a455b1bbb83045
SHA10b92f30c34da8472c38fb616d55212ce039895e3
SHA25635c8c025881e3c1523d441d42ee3b8cea7757f083ab6851f0031458f008c76f5
SHA5126c98334a390ad5af81fe852acadfc47f140bea56e441a5e3f21b62c5ff90b57520aab90515e9011e07a0f6149fbbe400824ac6ac76b3b5a62424d0e0fe53c6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519688dd852f3f1f1e945372734cf4ac9
SHA12bc9a85b73ed10ab63b0063c683434dfb5c6ac01
SHA256ca6eee96b67d8115aab10d3864618d78f3216762ee579556a0bd0f4374c936c4
SHA5123c14438bd5831bed7853a0ad809ce1c65acae656931ed73d0f7cb643c3f5ff96993dc133d146830fc63ce199704d6ea6a19daee36ea540a8c6ea9b77c561e1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8588e7cda1672e69d979f67481c8abb
SHA150b110e51771632bdb16fd930def7e60f25f84eb
SHA256d3c0eb26c72e11dbf5451659bf2fcca5f0592d7239d17b00d478550781295e73
SHA512483667002adbb2f15a72fc9f7a21bb4cd071a2455461e6e8b7379c995de6b5909a1cf690caf7dbc7b82df34a76634f0d1093f8cf7c06c8590ceb601916fea872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ec4759e3409f90f83a33afd28e1789
SHA1aa7ec22918637fae1df8eb9af9cb0b74339c5de2
SHA2562e004ae6dc72afb0d1f43f64f2f03095bf507694d51a2b17e177321791401a15
SHA512640a0f83670ac342a545aecc75a60daca74b59046e03964edd51780c7928a140781fcd349157fed6d577adfd7da4d8ce2977c48e5b77fa0a7dc81adf878de18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD530ccf54c4cb736a113c3ed9a8487241f
SHA11260ea63b324ca1ed250b82f04e761bb6eb4c011
SHA256cc6bcb951415a642248a94e941c782eada037f055a0eb790159c8292a1c6beab
SHA5129e64a82f93b7b51e96cf6c9d396ea0a01b6388ed8f0d44f88cd5ed3c9f1a0b535ef0cc6d598ba8d5c41b4b3471558e3686fd540e44715e1f885533511369d7dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b