Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
d604f79a0fe4c9587e87a89bb05c862a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d604f79a0fe4c9587e87a89bb05c862a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d604f79a0fe4c9587e87a89bb05c862a_JaffaCakes118.html
-
Size
27KB
-
MD5
d604f79a0fe4c9587e87a89bb05c862a
-
SHA1
c4a086629c3ee3b92dd54c2495b8f4b6426c396c
-
SHA256
0bddeb5b53d64c9b618e067ddef460994b227628bfd0da57703dfbabbd6bafd4
-
SHA512
36f21a633a7c3b86514d76e669e98366d800ef994ce243830efaa15f8f48f173f5b8c2bdc1dcf185819c8af65af2f65c95a900f2e60e4084462bbcc1a0f132c1
-
SSDEEP
192:uwnob5np+nQjxn5Q/onQiezNnwnQOkEntgunQTbnxrnQ9e37m60PZ7Ql7MBTqnY5:AQ/TO2N0ZCSlWc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432035192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6088d2e09802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B6EEAF1-6E8C-11EF-BD50-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000529364f009e309f02730c7dbf4a46020b6c49520e493425ec16750fc07dd8e95000000000e8000000002000020000000c7dfa6c43830b1bfa1cfab179fb20fb313b08398a4d0d5f4053da5e44c06db1e200000005fb9e66133d8e109844f4c3b0c9b2c2c970da938f3dedceea96f69f48c2d5534400000003911a40fc73bb972ae0cfd756d44fe9df86fe7b96f688c5182ab4729f5c0d6fb0b521738502c52fa9d8a3c5e3e5d37b417d75b9b1b0eccfeda1d0279ffb0301d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2276 2524 iexplore.exe 30 PID 2524 wrote to memory of 2276 2524 iexplore.exe 30 PID 2524 wrote to memory of 2276 2524 iexplore.exe 30 PID 2524 wrote to memory of 2276 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d604f79a0fe4c9587e87a89bb05c862a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e17dfeb8727748c2c28ecf9f76d40bd
SHA178bb283ccef1283158e43c1ae971354bf15e89a6
SHA2565d80ffb25f93357759cd61ad1c37820e9b14cf5876b10203888c7d5fdf378e0f
SHA512d6fe45cd4014bd7a4c767afdd9f3f0382aed23425361593bb9b5635067f360d652766462d482a194c55ada042a99be8f7808e64af6f013a969efa35c10beb14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512defec77193ad5ca13b74d7eabb4404
SHA1c88fd02a71be0b69c96320d27597705604162c0c
SHA2568535e6fabe5eb2aabdcb8ecda3e635e8006ace3b6773d970c543777d0ff1a896
SHA5129630924b6efbec220e8bd63f3fa994d5b234582ed4515af70083fad0f5c2647acf7a46edfae8a8daf6c994b6a9db972fae0f2203577d657356780dfc9a3d7c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8057e6f938918f84b314ea79a54f09e
SHA1b0fa5e7149d901868bdd47cd829d2fd7935e9a34
SHA256fd1c246ef64e4d3ba80756a021a0752b04dacaad2e2a79091700e06458b0debf
SHA51292d82632f7f63aec63147863b59cac1b664c548db2870271b1b3046e4bc41445e0d0e40614d2749d3c809de056dfba5e8de702a55c53da6f1647959744c99a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73358297db083f02b20e5b1cc11080b
SHA1b52878e8ef2b270ebae0752e1439d14b6ab46bd5
SHA256022ae1cbf3d050a51e8cd7a245969146b58d92ff8db634ad3ff972a97c45abdf
SHA512c12b0f89f80946bb28528f5a2b2333d48f686e058164496f8e0f52efd804223745c9ecd86b0379bd244ca871cfd8d5c212653f57b51d8cc26745abdc4d088a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8c2156227089b855167531472a6f6c
SHA1cda8247f010fa6a4b17d66052e5c59d2264b40c3
SHA256a3de0c922f624a2de82546134a67647602c3cda2fa40727e200af9a3039920f9
SHA51239bd8cd4ffd23f065fe7e0fdeeb28f46c14e104eb0b7af864fbccedbcb6d8e4c2c2543968ef3c76c2cfeb5e06b0960673cb51f68ffa82b69a64132c9e21d9ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3fd25872d6b3184d3a0524b9f709aa
SHA1b960698f7aa344dbb89746463288c747980876ed
SHA256ba9c194395001c2738026071f0c4166879f333fed825754dbcdd0642afeb19db
SHA512dff3aab50b236c7463310e9f05f758ba82d80a7db7932e0023be6801add1d90957cfff4ad6aecafefad41a876661685032e05e6a9c20b5fb43f0947197d4318c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b85df000f5dc36d936c00e4e8b9fd4
SHA1f26ffaaa53a053a5660c46891759f5121c0583d3
SHA256568aef256c3193b201c78f60f5022e53be5d111e7606e3ebfe1a646446ecee87
SHA512fa8d5fa096c43b134e17ed9eb8c0e94b2e7816f02cb6aead6a7187466c9573247c35bff5ab9f829de2f73576b13d4d5ab8eddb1d116e2ee3849ff5a13bcde8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563319dce1dcfc101f95ddd5a1a4ff464
SHA16a9bd731037e3506dcd4e7212e706d82bf9c9b1d
SHA256941391b2e0d154763af06487001eb5c8a5513f673dda54ac096ffe81c03822d2
SHA512f744c994975370d558d237d4c7b92fcf6c537bee7cd194db2fadb0514c34a5630cd0ae8feb96bb61375e9e861c1a32c83df20235965540dca79f79d6fe264b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c7585449a051ea03938e870081c809
SHA1cacdd1c3ae41a79ac22be23c508081a44e164230
SHA2564a95c2c1dedfde0846f0bee2739ae2ecb69f04d56e9f90f94523bfa7e2e2044e
SHA512417f0e36a5636f5183b29a0b597a314b98a2e1c73ecaac0758961364a2a6622c2cd11a7a64168cb8abe54ec4c7bc9552d8529ef2896bc1da6a884ca385ad43fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a3da891b6c389bc1e606fd8eb36ae9
SHA1a4a793bb6395bf6737535d639bae4b09518c593a
SHA256b71032723b11bda943ae3f321ff5b59bed499f2095945c331ea01f5e93fd32ac
SHA512e9fb3dbde943500fd377f7d831649b10edf704f02d0182a199a289ad29684ef33a79894736f3dab8fc026785a39657d75d8b38483dcfefe64089928be63092d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcc9813e946c9d11ecd3f73b47335a9
SHA180db8934438c3a9466078d7b116da67d22615273
SHA256229f96513cdf2765c0960ac91905c9c661e050fe9527781be3ba91c4978625d9
SHA512741c0d5f6f540dd0ce01a9c4dc6710e96a8ec4efad7295a40f87a09efa25da5e67db50859cd01b555a22e1afdf7219166d63b0ac02880ad7e2492decacd7660a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54718ad1a4b4c3104ed9584d8dcd86135
SHA1ba9d6b17bddf0b2ae293e0c31dd76ed38b4b718c
SHA2560b2156fbb396af63314b0ac7e26abd278ec15669c4f1919828309630b83b96cf
SHA512080d67b5c958205c03b03cf5adbc37f826b303b915ca9aaa95b1e87fee63fd51f574c1e3a93921d4d37c485782c71d55be0c263dd2979a7cb206771b267d1671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806c8b5a52c6984e9ba3af17c9a8075a
SHA1a21b2badf2fdb8bcbde2537972560c792decb8f3
SHA25678176136b3218689ad3edc14a62f03e5c033081027a3b87f47dc29bb9ec340fd
SHA5122055c1dd489f8287e45492e9bd67cf20a98a48d4239f0e7449f48e350d705c34d8d78bef8a28852efc863e5da1f701f5fb1b358769722d414b545128cc7652ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad51db11ea0037053c0a753b93438af0
SHA1272e48735d0d0a46d0460458296445e7e11ae52e
SHA256eb1b5bd77c53f72d83a061877add5bf1a53606b69c6506803df924e6f5bc2a05
SHA51246565b8c3e0bc1b08d4747946ae0e85ea01fa63d4cc1fd2f89d171fc6090113afe9d144a2207e83183fa9264cbe38c19e13c7c0fb479d0d91f3788cf37141b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c8363d5c12e7363e090d13013b9cb5
SHA1f61963d85bd2d3686ba46d34b0e0de3a5c7e7ad5
SHA256b6b95552ab98d7438bc9876f9a4eefc382160fe4dfabf9d5328f2f52efcf7a5a
SHA51296d0fe269a0e289f4e83d8ea95d1237f215d3ff3cd061055d0545f629320fcffd9428374333c3635f6bdcce5c66abd4409f19614d6538df66884f45951c4da30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9fc690c97da0c845b3c148265555c3
SHA193a50a0565981200b2571fb77c98d410ddc16771
SHA2568d9870196dc6a863e471866ef53690a6b0461ccb2984f93096141b24cad2c355
SHA512d62adebe3abdf40ca84cd55930744e2b4080317f84fa084ed35f6f000036c969bdf99e9cc93bd13aeafe454bccbdf307556b543de00b00bf6326890b45066b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf89160386d8efba1d964b9bcb931c9f
SHA130aa3ec976c13d766b3cbf56f473d5d0c01698d0
SHA256cb5f863a4d9b74d522e6b192f84e35f2a4fafdd4ce2c7723859157c6f4ca3da2
SHA51223b88aa9b395f2c744faad87f53d570d62a0c03f09ba4c9b1f8d668f6db2cfc768abafaec70f04992b3cc59aafb36ad28adfa19f7ee0ea334d8ee17356bae2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585604f142e01657b53dd423bdfca909f
SHA1cb39dfed53af8b2f9e498edf32cd76b2523a8b8c
SHA256f1b52c1e39b0bf5aba143511ed3b405f66fc27c39809b6aeb1d66499f08b6cbf
SHA5124fc448aab56b9d4143484f8622710ba7bc8873eb794e86fb047de8bf5b0ae7d5ed8b803977d4057556e8060917fc002c462ce0e4a75b6580ecde5258543abf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55232285d1f070b7311d143f193c2aca8
SHA1d7427faaa49c736808ca92cf1d664c094414e680
SHA256ddb9a14a8ba2689659bf7ed9ad29aac46a281a1ace3a42ca269fb0043246630b
SHA512423f6de398494a73ee660a99e0c9d8f2b2b3a4c964402c2adcff6776c051adb81695fed42f05c1581ba20be9749c1a414a3b87ad4dec24b53b051beb6822e830
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b