Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
ea8d7d08861ca2151269a5e38c9f0960_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8d7d08861ca2151269a5e38c9f0960_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8d7d08861ca2151269a5e38c9f0960_JaffaCakes118.html
-
Size
23KB
-
MD5
ea8d7d08861ca2151269a5e38c9f0960
-
SHA1
71f8f9e4c6f0beed45c92c77aefc8fdb48360fc7
-
SHA256
20292f7008af65c12154e24ee0c91fcb32c362c57105239573fbad77eb74f036
-
SHA512
fefa6cb30ad70ed85ea1a892e00b790ac3f8634f6a7637199bf2f922f6e4850467df79d29290ca4dd08413328f5cd833ec686ebd3430a412cee578669f576a3e
-
SSDEEP
192:uWTwb5nGunQjxn5Q/hnQieENnenQOkEntDHnQTbnZnQyCnQtOwMBkqnYnQ7tnuY0:rQ/Iuf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609619fc480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{276451C1-763C-11EF-B0B3-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000008ba00d5b17a3aca1532e2fc6e39e32c0cd69c20e8525dcd8370dbd78ca4fb862000000000e8000000002000020000000fc62a4765cf924c4ebf5f23aa9786102cfa72ac64cfd2159d8812b75c9c8c0a220000000d2d6ff97aad5acb9d296573b13f5b4e045d882d809670cdd97065963509608d04000000080167c55c4f29ac4357449321b668de0426e465083f33e0c07138304befa9ef0a4cc6ef322e4da9f924571d6ed45d0a08c3da0550fd5f409b273b4ebaa2ddc74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2684 1560 iexplore.exe 31 PID 1560 wrote to memory of 2684 1560 iexplore.exe 31 PID 1560 wrote to memory of 2684 1560 iexplore.exe 31 PID 1560 wrote to memory of 2684 1560 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8d7d08861ca2151269a5e38c9f0960_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fa7d5783532bb623001010385a6934
SHA14b24c6d3d4e6169d910bb94cee5940d8400698fb
SHA25684effbc0c5b315b27c8eb45f06d7ea8de4a3c933838871611c833d198513df8a
SHA512a65a909e13b3b8285847423195830d75da6a95c0d897f776c689f0570e56629bfde7a3a845664e90fb21f3fead07a52a59d2373e8088ffdeb67a5cb074647320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596062e0213d08289dd2fbfd85e0f227b
SHA1f2f07140a37b3410205f0c74762aff93e5585f4f
SHA2566fd4fe3c9fa53c8dc1cd00be3c3411e84d5bd9026ef95bf4259c257077f9496c
SHA51272d901c997d83c308bf17a26faa285d31460a1f46a605cc96b8b3a32c44f82cb324fb8a6f3e986b51541c1b04c4cfd2feeaa1e8e43aa068d540510e1929a78cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9baff3be401631ea2210b6b5edd8ad
SHA139888925cf1a5799095429cb1925a0271205a5f1
SHA25609de3ea989cc2c0cc26d00a29194f0696a0f76b143cb57c76f6700637f9d50ab
SHA51207cdce0075f637005759a70f0a6ae6d9ceea566c8d9ad6d8acda7dc691af0fb200f9daa30c8b1836c165fa9fef086889ba58311d43f3263b963e27b54481cb40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5072411d6b6858b323dcb036563d32
SHA1281ae44a0f41fe3b648d44817a66a59f5741a078
SHA2567d72e45a54ad8826a277e3fc2c3ff027afab69fb87d6a39cdd0727ea989b1dd0
SHA51250965da50fbed93f8f85459eb51935d79c9bf65ab77aba4b5c2f5456fadd2a168770ef84ce5d4f3ab1269d32324a41646ed331c4f16f085bde3d9d035b4fbea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59660ef105542f84aab6192d4e24c946f
SHA1e58001a436189f29d87747b4ca305c6791de6cb1
SHA256975910d82521b0860c682f1b73ecae83c48f76ac770aa1c53ad19d430ab62447
SHA51205380c2a005a2302dd7aa35c92a2f97eb32d327ba247f19a13bf5df78d6b9809cdf3090fb959540d9b40bc88d468a0c82fc678662c4f1db52911d001765ebcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baae5a5c2fd8c95c334adef3cb524b6f
SHA1fb0171a9794d9476eb738e258d8b661170bed63f
SHA2560d7d901649a25b0f2e6ad80f8f64bd5eecc44791234381be0f9163ecb2d89e0a
SHA512c97ef08b35c542ec3305bd6c6b40c1f51def52dd647c7cf5d39baf2a980d592900e3bba345eaf9268d24d4920d114ff2d3f8b07be5203786d4187fb683951541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686523ba8935334637ef5a0e7c4b2d04
SHA19fb8c60cfdb843e3ef8bd6b28bac0b7c8a6f43b9
SHA256bec8ab8317c171afc4864c425e00d312c9b9a4a19b70e6b590001701c55bfc5f
SHA512edab6da6c1063b3cc190039dd54a512cc2ab0601121c4f92b93ffd870e3083597b7288f635cdfc78bc45523dc6c8591c37e91d0c10b0f81ef81af7693f01a07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cce9f10f0999d0363d28464fbb26688
SHA1ae5251ab74acf5256277f84fd7ff18cca399c080
SHA2562ef4d097a7c79d1cebb4c689050cbf2abf7d8da2a7f9229d50cb02c0222eda3f
SHA512501e146b9d8789f41db43ec9e594a3598ffa558e4c939816f6b8b3d91f3284c6c5d0f8b64b38883bf22e439f08c912f3de8935ee0e773c9ab5828a040594c92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394e44b55a9d36f2ac7176837d4a2be5
SHA10535c84fc05d27041a0ac9c7bfb0ca88f64fcc5f
SHA2563c37d5c3b3ff3f3c5d7a04320dd3c4184049201c7f01c492bdcadd556a5cf5de
SHA51254106cf2dbb6665ad9601e579254f61bda7c097ecff28dca07a5296117db69377ba9c1c94da280700c5f1f6d69e86728a0bc2e03cc1701357e99cbf52106cb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee776905655eeae515150ad3df1f728
SHA1be9c112a04cc19f2daa381734b7e7a67a8721dfd
SHA2569b8d580913f2ec1a2027c5ce3eda113dc502d6e9735f4c364a71d1affed0e03f
SHA51280c323eb8b353d75b9be4d91edc233d850ef0a7f0554c32637ae6ab24370bca11f95a3a47b187ea8b8563dbd95d50622487fe0b9ed8e23c2fc487cb90ca0d065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585485f3fd9430b89c16c1f0c89eda494
SHA17e032cd4f781f672a7a8680f6eadcf64a4a40883
SHA256e233826f8ef9b861c1e5546b3e9411aa127446dc3488bfc68302fc02691725c1
SHA512db58dd2c7f2c24b883922976c3f838e03cf9e570d482a62583816adea579d4761a5acc184591f7e80b7f9d7f9b236fdf5a017c2199aad2324227cb749566eea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52651d3e699aabbed1ad83ec08a6248f8
SHA1c112c43012ec664bf1f7046316690bb3f79ad3c0
SHA25606a4a7bfc8ef4d649a287e64acd69a4a09032f6bcc56d209c279b7f3e1891ae7
SHA51204a680638ca997b27da2047cf9f88d1fe2799817d14fc0c6893941a5b9b4d486bf61c6199e2a85a98aced0ea1d3fbe14353dee00effcabed5d47f8c0a59e7947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c9445bda6970ed51014eb58a07a29b
SHA1e82499c009bfe55812b23d565c5c162a62fe83de
SHA256996d85a7e39f04dd539b1a7e85c21ab7a8b2525d36753c4c76d7caf89a626ffd
SHA512cbea94759c353fada6fbfbac95ed0ee2fef74bbf988fe53aa2d7bc0c955f33199bcc5fcd17e59c7554f48dab75899189460f1e8005395029463fe1966629521a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0f0fb2dfa271005ba4c6353a998a33
SHA16ba70728442753473c32bdc4964af39c82509761
SHA2566a41489bd495883910f1442f953757b9b01535d7f4338d8e8d2a5f71c38c6ec6
SHA512a7be3292ddbb5c95007c59cada9566e45bf9d214c830115e73e48e4a01eb8f9e9c308ecdd67021cdb40ea323bd5cd3595873ba359355a4d882e73bdcf7c6edb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565398beb9ba7e08cd4235039e644aaa6
SHA161dddc7beba9156adac982c8813c24955484b432
SHA25609f5f979451b4388db59638da23cd23fc0e4fc37e0e51260f45376f1ce210c57
SHA512f20b6a208ec4f6b34950dbd6c651e3b3c8f2d249d24d77b275f92189361bf603159402db7708754e7db1a2f1ccf4fc87955c4f78f7eb16086b6f9f352cca8c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ff2931057b7381f08b90d8a888fa57
SHA14126cfe3262edac43f1ff49a2ad52ecf3b792fdd
SHA256ada931d79056a281d4952ecc1840f6b8867c6d1659c0782866d4a7f2bf3c864f
SHA51251660a8c875aaf39c64b9b3120cb15f2a53439ca80dfc99582ade0c86d9529a9a1e84514c0c6ccfdc15c5fc763c8eff6396c37d8bb56bde2f35da8bcdb59b57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560edeb65a2199485fb08014c15384fdd
SHA1caba033397495497f73b93f3b20a205ed9bbce1d
SHA2561315f29b1fb8cbcf4e90b4bacbb71c5c75c5cb237e1f9f4a4fea5e4e0e70b44a
SHA5121c1a12a3e030d49cf91fa5d9c973658adc94a201da2bda72d642e605f9f2ae9f6e55cf735eddc52d7333328441ac2661c08aa02f409fa43073a2557381b51ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c663d9048b7a876537ce9b170a5b06ee
SHA1290cee79f5270d5d9b8a0c529b533a90bea096d8
SHA256ff309b1f04b237c2ba628135f1dd52d799e4671401b101c3e536d17618ee08a8
SHA512759568fca7e426c54a72840beda5a2a4be112c61d279872a90cc0343a2e27959284411bf5440c897a912a2e6ecdd52ff18f2a178d39ea3720c0fb456ea71c3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4386e877ad36f267e0f7a72659a93ef
SHA1948f49040cde3089e49c92e1e80045887b1d9ce2
SHA256d615a8462cd239f14f6b509d4d4fad78acd644b51cc7af7698ae7d1f5027837c
SHA512b72169c78424098d9d7f640ac33c6f1de00f0c4489669516ba89bed0fa0d6399837614bd87baa2ebc18121b10691affdd0a49d88f3aeef43c2571381854169c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b