Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html
-
Size
5KB
-
MD5
ead05ad9aa2eddf14c42b93b279a2ed2
-
SHA1
9bb1ebd46166f5a2be042e0150c340d335b8653c
-
SHA256
49ab4241e76e87ea35ad029f7731d3cd47a18ecda49f95dd0769bce335d6f5b5
-
SHA512
3f0bee878f285ef97b52d10f071a8aaa69ce16a26a196f001e9a0af4c1db1fb6bcb0588d3e164549c03f1be7b92252f25302f12c55c8ef719129b0741f0b074e
-
SSDEEP
96:SA5soe2M47Ky2mHZbHaE66lebCx/YulX3d6MVKcv6MVKkvW6MVKfE6MVKmSp6MVz:V7e2M4Wy2m5/ZL0WSCXdpgSgrR/3ZELl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000069285d3775a6d3103fbd0030c60f1a3e5e3c678a5564b4875aedc24befdb6b92000000000e8000000002000020000000b12df080c1f39730239cb7b31f49f5d0b8761c96fbf859b67d74c02f190b2fbf90000000e73cbe617729e3e4980500e1b4c4dc4a37eea922e117350cf89de3dd42c18ee1d4d6d768aaf9fe7719bdd7d564ffc14a1ad527108b2f92c7b56d10f38eac78a5504f1753a0bfdd69b88c030e3b976edd87b31743c7e1d2f807b8e99f38fcb85cad954c36111e1d65dadc5ef4037770ba03d5db919ef78ac174cb896b414a5bacac21be6a9db63b79b031a3cf2f8bc1ea40000000bdec7e503b585627800186af7956bcfcf995ae4dc6a67a662f2af3c024d3e4ab825d58c6fb389482901f836cabb9a7f4da1df5f8c9b96fa1adffd48525219c3c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f95b45620adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ea7d040bf3d10ad0080bb004931082fa88a4cbfcbe27d586287bef090eaf3576000000000e80000000020000200000009eaebd7d73a67ae32a0910e3a1d8d967d6b39a8898ad251f362eb46aa2e3f36420000000fa4bb50352d78774ea9dcd9d2b5a0b2c9defe2c95dc17dbb4fb3212777eb2fa440000000fa9b199845486eb31358a23152e42d78777f5410bead113383a28847a1aa5b779174a64522b7af9c8809113c992150e2d5b2f14b29078dff715e821fb7ae1566 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F42C801-7655-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2972 2948 iexplore.exe 31 PID 2948 wrote to memory of 2972 2948 iexplore.exe 31 PID 2948 wrote to memory of 2972 2948 iexplore.exe 31 PID 2948 wrote to memory of 2972 2948 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58ab9e32424b6326ec71025d0383c35
SHA1e4cc2c5b56b07c0c8b4d0024de0d6f95aa430b67
SHA256eab09dde923970afe287b16fc9d8947e75c59cf7bc1fcaefa24a423484283eda
SHA512152ecaf275daf8e3c4d5990d4e1574466eb975574fdd48711eb86974c83bc8c9d8ac5c51f8ebd427ffbb7a76aa085026a4b21fa08f5027d60f004a9ebd39b0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79346b78a7e8c96aff7ee4bf2b63614
SHA1f0fa45b435cb8555ab5b17cd627955e0f3f7cbe0
SHA256c30d0a5c28c820458c2fae3c7554a69431b4ed82237819c3ecec87dd085f17ab
SHA51239dc6923293e11025b24fc0a489a74994987c3fcda0228847a531864b33280269bcde52cabfd3233e615571d6d161c17518f85715e11af7b8a2ffc630822bfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97cc52f0fcbd03053ef9f44c64de898
SHA121eba9f61462b6e32004fa2e2e6fff5e8064427f
SHA256cd7dcbb7f9e418f58cce5ffdab4311edf0c1bd9cc38bd8b4f95dc79f77ef1d3e
SHA5129bb807dc552920c80ac10b75e211ce4fab87101714dd7318ac7b3f12b925feb816da76691799a3bddb6e2da59db9570f7db6fe7e17192f6c1bae0e7a5bf70207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c836d41a1a26e5e2f764c6f76dcfb0e3
SHA122dfda95b405a9fd52385be812af90c9a946051b
SHA25687801e27cde4b2e376007a4eed5e3fb63cc12ce1db2c9b51fff0d90a6a42f3c6
SHA5123ee57dd81ac61f49b292b2d0513bde599aff9edc959226ad0388f379fe7c077344ee5456789164a6fcecad4ca8a1a6456aab1569c59d6c1f3414cb44d626f8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e5d5fa04e8b8f295847b021f396904
SHA12ff3a826f8b6048a650041ea54908b312baeccca
SHA2565e8af0b34b6122f258ca5dd27f6bfe49ac1d0be57338d1cf4ea4c08c04aaf5b8
SHA51210dea04ceb52a005f180a6a5ffd6bb2864f29b9834d70d3a3aebf3f0d462ba0f376b276a1b51f30574d6d80ecc2ecdd1f6dd9cc79971a733790e874770d972d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e49d29471b1802eb94a0013afa85ea8
SHA1feefd880acdb2e18509f683fb428c8a6eb76dd28
SHA25616ec41f26f1e0909b305120314bb9676a680beec70862a829a1075b60dbb2262
SHA51223424c061f2d851db2eab9e6fe8dfa14837c6e19d4d0c90081e445b038e428b184199070c0dd9116b97bead5bda15b6b8369202f54c9409bd99ccc2c1aa27aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df60ca8aaaacd1bcad3944ece1700d89
SHA1d5a88dc9debb0de1110bed4ea986246d54dce69a
SHA256623ebc4cc2130399699d15a8b73659ffa7a60796fdc6fcfccb70bc7a9b3fb307
SHA512ae84a8b34d68a5ae0138ab7e07006d1c155916c16bd340f6e4d9aa086ff0cfa0b59b09d1c151a6beb7998fdb1870c350a4b2ad60931d577d2f4ebe75d59f134f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b641161f2aa6a7e22b143d2ca696914
SHA1970c7b10f457ebd37de18059b5b7f0c757f8e9eb
SHA2567d4296cb830b896c2735cebd9d8c449267e9f491ed2201bc43acaea636346ec5
SHA512b5f43dc5435703c37cf2c1c978cb57defbc6662728118a708b5ce2fec6d8a1c36275faa9f5157810b0b029c4a5b574de9cee323d1cf60611997d8309670db7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef271407281b25e1a4123daad13be754
SHA132e0722b550ecfc0b284251f60fee2551fb0fed8
SHA25663f6b7668ba3b3a91c37dae27740f8b7f506f65c443a2b708ad7e95f0ffc2174
SHA512a6be260ead40cd62c081fb21432e51c3549dee2db486355f42a2d0fb402406c0eac0691692309a1c76ff06e7c43529b67948bc849a9142553efcda91a8343a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc30be37b05376f00fa4f60501dbb22
SHA1226f1b4efd48b6f393e2de87a0b501c7cb068cf4
SHA256c414d5884e7b401db199d73399e57725db2ee2a75f8d9ea345826f6376e9b3bd
SHA51229224cec37289896284a8dc4f744b8573020092d1bddcc0b0966b404d2161d48d9295c6a34d678387a24843444f1ff218f8d2c66aee7ace55c886b5a7bd7b1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbb69613cc689dbb1c36cedbb848d56
SHA12334c076b9faa46574f31e5715e51a7a094bb84d
SHA256a72a45b761e28819727b52e350f803567d3453d015a0263a10c843c557629866
SHA5127e9acfbd8bed705cd097b40890fbfa69d5d3d693e87a44533e21c47f204aedd9baa9657f085354b09f93a68037d0ef689cc4c87d749a7bb50196c20cb9b45625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6cb11c0e24176d04386541d1b6853a
SHA12a21948f673c37a6112903adb9d2169f60eb09ca
SHA2563ab3ec6a3f28caa7e5bfb54aa2d1b0533467d6041268acabfe0ce0fd9d0356e4
SHA512e18774c90419df47c6b84d5b20d8b932d79a29b6625285ce9518cfd56752a29fdd93d400b100af3544d5e4ac4da7f6b07ec717b864261c6b5fe2154dbf502324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eeaa61f09738d3a368f1d664ea4eafb
SHA19be938bda764ba900386d5dad5e3aa2c36e97f87
SHA256b3ec22413ba325e603401598cf8d0ccf3a8e01ab7fc783b917ca43e3882174d2
SHA512311de7fe7942e4897b18194262292f346937f402b16e755c553dec3cf94dfeeaa95058772c6e70874c259fcaca5a35bc578060789f1c8417717cc058dccf8fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403e7e0aca37f5d9c216cb83542840b1
SHA13d7a4e91f339d902a415dfdbabaa5fd08da1a967
SHA256f992fcf6ef2666ce7417910ac26a83de082b1cfb1406ec8db11a18c6832e2cb5
SHA512484aef374e21ccb900ce77330790f935eb0327edb2ba777d04189eac660505dc6deedb9b06e78e2eea9609f18b956301cffbc17aa4ffff45e3cab9c503932a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6ac4388e64966f263c9821028654d7
SHA10c8e3296a4b19393171427a4af60c9eb8ad96a80
SHA256750eaee6aa60f1101256213fb328405129cd5934078f45acc92fba4397df5a26
SHA512ffa48abb721fd760f47669bce5f01fa132f160a6b7a41907690c58828ce40e195e09d5a9e97c901b510afb50d67a78aaa716ee708d41bd4eb6bb254e91765583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c420c7886ec4a8fdbcacda0f4519d580
SHA15e79f8e181f3e01afabea9d54f7de660593f4734
SHA25603b7acd2e722795aa52d2efb5e3350fd07e3a88a347984fbab610a754e86c1ef
SHA512d9475549c5c018cf9079ce13583921f507565323018cbd19b8bb5d01e06f5b6843da787ffedaf348d8192a0e753f3d7ca91a15f5eb4515f0c08c4e529d339aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554dbb4abad418183aab769df1ab43a62
SHA11e1556fa97e918ba6fcc330caeb123655ba90725
SHA256ac2067f8b8df4c1d030c3bc8d00af0fff9e18def6ddb5db2a773be11a8e8e410
SHA51230ebbeb335ebaf3303ccb13931aeaf7418f2868be37d34e38a9eaabb99dacf6161d6a11bbb405978d26f2b855e62a922713f726d0eadabfdf3592dd0b627e923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18bdb6640e241c13017d75901600062
SHA170675ef7e0653fca1d8cee1d1cc71b96af5ec81b
SHA25641a9596d4852f88a2cc0f68a64cf4f887f04b232d408ad910b26fb20dddd9e03
SHA5129f44da1ff8f9d6f84090f9fa21698e1b1133aa0c699121ded557fb8611bfa020dc91174fd6b5b04eebdd2d4119f5bdb79fceefd8dccfb557c87bca8555c51aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59839700b372d02c9f22f3f8ba4c38e34
SHA11c2cebe159c737f4b628cc52232be4c004000a88
SHA2566581803515c9720bb1cc3a9274fc50e2f7e0476a6d2b0c67ee1ba4518cd18454
SHA512964470fd7b371632785d5d01b2576457e262aec293339d75b2b0b62c7097ed804d4c858e131368a99405d0425b64c43a8e4bcec89281dd0c60406a881569648f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b