Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
d5f61deeddf2fcd0553babeb8c12971f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5f61deeddf2fcd0553babeb8c12971f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5f61deeddf2fcd0553babeb8c12971f_JaffaCakes118.html
-
Size
51KB
-
MD5
d5f61deeddf2fcd0553babeb8c12971f
-
SHA1
511a918bf52d74644bd9d19d428bd9bc92bf476f
-
SHA256
1c6addd831fa7693f420334b70b4950fc52c7b3f005346114a9f131fafaea17d
-
SHA512
fa43a9a6103468b0fc26dcd15e086005e6268d0368a91072809da5949a1c75859fb0ca8c9937842355f13634f30e212aeef935461140afbdcd145d0414d2eacc
-
SSDEEP
768:SUYR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:SUl9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000315fe9f18819d9bb57ccd5a79e406a5b55e36bce6351dd8fd1dd7cd6f208ca1f000000000e8000000002000020000000c2624148e194efa8b6babca1091b4ecad0487d84b5024416f273ba5f65fba47e9000000011d23dfa2bbac96553b8ae56f150f0b916e232fb0d84db4949aa294d0c2cf957bf3019103d8cc1d5fe4ee3e2374bc16b7187bcf92908b734a7993a15a099c36b49f62df17fc8175c3aabe4f9f4b0593cfc066e331bc25290e15862a62f9f3ff270682f8e520065d2ea19e480de2d91ca251be329bc98940768a31078d73f9547370f03e9ad5334113e10ed49860e4bc74000000095c25f522b7b5e3dfc554a5f178e8fc4de19b0430a87b1bbab2e61ad849e56f2d0cc2a2ff8fd3a52801ccdf91e79b4b36a98d9a0211b9712cc0719185b7bcdeb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000948779616863405b547b895dd046f2178bf3108afac0287ebf7e230c08ed6ca000000000e80000000020000200000000fbfc7bcee59b1241e1005a679a5dbe9b171e4cc253ca795e8c5d46f2d47bb9a20000000885d63d803ae23d19707f36863e8e7ca63e13855e9ab6cb9c839c0d580a97eed4000000066a7b23ff7241eb4e9817478c53de7170bcb0a0557f7f6adebe52bbdf0fe09cea7b16829d5f96778a3db070b6a9bc318a50e6d3769a1a9da9fa32ec485d55c19 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ff1e049302db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432032697" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D2A9A91-6E86-11EF-8C85-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2524 2148 iexplore.exe 30 PID 2148 wrote to memory of 2524 2148 iexplore.exe 30 PID 2148 wrote to memory of 2524 2148 iexplore.exe 30 PID 2148 wrote to memory of 2524 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5f61deeddf2fcd0553babeb8c12971f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b3b8284ef5c2d687a3f883ce0ef710
SHA1329750f2a6d43d3dc61fca75b2247aa77146b38c
SHA2564c536f95886d957ae11f39ef672b013d8909e344d9c55bd64e9694ce82a236bd
SHA5129b1f66d63d5c8d075c37f5c8eb2a968a2b2b86927e001b220e990af631d0c45c28cf45167b0ec19c0f51611aa78bd5486c4e6f67c9d47f390d41050351dc978e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341541d8842a054d72c27f8bccc8e3f8
SHA1fcc41f75f5123470292623b4756587094fd936b4
SHA2565e24da4356df2261bd32e53481f56e4c5e2a2669b7650a9af6d8767631903d3a
SHA512eb21b83073cd76787b37903fc9212f5125aafc3261defd5669c69449da09f35787b668557d23353dee0b9116783711ce58545d3a75ed1f836e4cd79413ce7ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff57ee749f62ebfc5ade55686de54cb
SHA1feeba92aa5f2081b8c9691dbc63931679e900bee
SHA256e9cc5200a3651062ed7769b614576f342ae1677dc82a52e3ed0f8fafb07d2589
SHA5125a252912124c5659053e00857e14d2f3a46db5d1c24932f5adbd7e897048a64ba3b80706c6c4a3461ce6cb97e206d09369fba1f9daeb028ea7e7c4ee719bb877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3afe341c82d3538691c856c4bac4de
SHA17e704bbcf7ff17c1d40409dc0ba1c5c0f9cea0fd
SHA2564400623b1f4f68f2bbd51557d11093cf5c9ad15e10bd381c06e8c0bd9ddf8498
SHA512d3e3defb880f4b304bdac711606a77f9b037d975ed4eecf4c8b50a608ed0b45813054bcf341341adc7475e3e7b2ce5b0fb80b34a479e84d3373ea05b04da55f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ebc341e457a4230921b63826f9074d
SHA1a6652fecaee71d8c3bad5d9c9a6587355eba02f5
SHA2563f280054137ddfb2fa54abff4b4f271e3264b678cedee7a9950ed1de007bc8ec
SHA512f0052dac997be1a9c1e122ec35688deb2a5ecafb65ed70363ac2a6ff406721a13fa92a352fa31c900c1be61ce666528d9b70ee1f77d376c8d1c35550c4cb862f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d746aee1b3cdb1bb2710b0d4cba294
SHA1588365e0410029764a5808c7c7ff77e24a7691d0
SHA256611c133c0e243aa5e9e2b133a123c2089c8e9af239457fba0ddbf9ac0276ca01
SHA5125bf1b5d2111df0b60014c84bda7bc7325b8f83ce0b0ece64dae7932484e4d76944b0a94d9c2baf3508b32c1db5a610a3495fd1077e19c2244d1e64d6ae326323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e238c95f092b3c32fad115d750d9e9fc
SHA1518dd3b88499e7c618f97eba7ee7f57f3adbaf06
SHA25656139ff922d5363a4a8b791bdf8c1a6494da37d846d9f241636157b0f30261ca
SHA51249731b54539332d6f44e588446b4830a74c5c5ef71e0840885ea12dc10ee9685412e8fc3cf98eb89f06c1a03dcf3ce7afd6e265beb3130e6ef28dc882ba8de7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56add52b6546afaf640953150c02632a6
SHA16ab65e1a5224a4a6d3d660897c37e0de10b31664
SHA256cd1b9dcfa3fb67cd2f97cbe7d5c535ea8d1954797bf9c2df0c98534f8446f565
SHA5120997f6fa3e3d8dc287d6426aeb3f14d60be2507a494c7a8d2a11de00c2188970f3bf96833e2d02ae0a393092491aaea91c7f0ba8fadb18f0ef3871a5ade2d3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df68a00eebe88168b00c4c026fe1d2c2
SHA100e6ad49faac235cc645ef54d1db4a1f3d41e694
SHA256aad52ec8022430e03a544ddea956453c74434a92260918cbffb2fefa35ea261d
SHA51265987745f6d97cd7c3cf342c0e357564f9ac945afff24d89ced5da9883b1d09818528453e4aab766a76c1d08276a038aae737507ff2fee3139f149d0983a5ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860caf8b457604a8544f98c17cf4e1d6
SHA17436afe73dd964f48cf1cc6acdc72585932b9178
SHA256d1e168b33777e69be18a619edde096358be5134b4da61bf016f71910a53c4b88
SHA512f893e8a4d6d9f9d9ddf911bbb975c8da15ff55a88331e04fec72eb0e302b6594acf44243f939c6e38fe5c02f56ecf2f0ba0f77d042579c3704df122b0ca5d806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab03944ac24d11a036262ba441eb6cae
SHA1687e7671054ae469e1456f552c9b9796da7eb8f4
SHA2568cde614650add3a94d96fc25c17315f4f6789a29988e41cdfa2443ae0b9c5429
SHA5128952b9c462ba6f74d43b8abdd420f6fbd73176db295b405ad517326fedb545ceb6acf0f558a070631240e1668c69fcd39c3efeaa6dc8737f621ca7ffc96c351f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee7b8d759f4433e81c95507af3bcba6
SHA19d4af602bb1a5674029f08168d4ccf46bc9dbd64
SHA256938b180a1f8f92eb87abb5045c2ed1f88ef0b3c0fd4b8ade4aec11dc1fb5c428
SHA512798efc206b7d31a49832e0a6002ed790fcf5e7592645798303b4b4405bb5aaafdafa11faab19e3ed003070c3bb3134d1a8ebaabcdfc7e9cd31818ddb6fd445d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ba4ae58ccd927a12541c9c199c1eaf
SHA13f164769ce9adfee4826a6ba659891bdebc512ee
SHA25610450f781876d156519848d70115b64958a45b703780f21a1c9323b8e0eff4e7
SHA512482fc8a00bc6fe49a7ddbbe6365f284c86bb62189133ff38f4e01eee4cc0834adb2cef80422b70b991b2e05b377ed6aaad687537bf1e39acbc70fd51c0ee628e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad46b882b6ed7f98076ea3888208266c
SHA1cc565e23bf8d4bf22a3117f93749092c8c9eba10
SHA25679279388fef355baaca2dcaaef93629eb7d3caa86105aa8a6f535f2b4d35b618
SHA51298898a1d7a1ca4a3361a7771120967abc87e116ad3611cccd4dec1f76a9a2f0d15a1f5d14ef78174e99b7c05246572c22ed89bfac20246e41658b18603e05e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1de2b677ed57b46ed6067907e54e812
SHA1de671c7f0a36e351c362559a325ef3cb14e53fb7
SHA25693f3baefcf04c6a5b55626b1938199e46eb774d6f5d18295f188a2831cc8ce95
SHA512ba235bdc07f7f8cb91f95b0c3798f6c522b31090a761c0445d5f0814fc9952615ac1cbdcbcc753284dd684b3695f46c8defdf67c8c95a65e12b2ba9be6ee88da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b558b11c7c82edcaf4a00f0f2ebbfdd9
SHA1124d988df0a96f22dbe0eb2e165a8b9d95cb86be
SHA2561ede9acb0dc1407ac8b01caa670d5365f371d83ff31ef62b18594e339c223646
SHA512800e875201f75887a3d26353a5c8a49ca8832cfb0faf3b70942d1060cd17331461736841b2950d50519f9d2a3d3dee90aa1d6961d16cc5480b4a41a1fdbd0cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9707fffcf57e2a4855874138f76a102
SHA186677c80cb1df59abca588c51fe41428f39cc030
SHA25615c4e29c268b77e25b77799c48285b63a96d35e57f9418e53249754e75680f85
SHA512d54832943634ae1ca478e8e3af61860a764d425a23f87214256de95431c654f52f0ba575f5f62bb5dc47e0ee794ac0550040fdc9f5739950fceb889538a6a642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f703fa7d2268e414ebfe5e5cc78c9d
SHA1a5e7c6a6f91ef449e2d39ab24fc0b56e8e65a11c
SHA256538780459b0d6f9bca2b55a9b2e5d7af74549c0a90eda669d283a5749fa7db05
SHA512e2f961dbf9ed937f4e6ce7520e762860745275a6eb33e12e6a4345b13036e1d50cc6c87ecd20ecf8275c0085aa851797e17f5741775f0be75e310d7855ce59fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947c13d40c1b43ad149814d6ead95f67
SHA1e5b07aa1923df9418b5477cda72c99d2a0e9c8ea
SHA2564931f4b513928ba9895918715890c9436c4cdce71c7d9dd5d69e8cea39fad18c
SHA5127a0f8f01829ac970d76aec2fdc686648ca96d73348c7d0d94088b717e44f6dff947dbef2a05121fb609f0ea51280d5789ffe1621e1d2bedb3a68baae3fe3bfda
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b