Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe
-
Size
852KB
-
MD5
eb784f224b2a3a748c402cd9888c5975
-
SHA1
a3bbc3b7d0d667832cf85d3124464d811737e9b1
-
SHA256
b1a3c29e2fb81855d6bc540243ccbf215d7baa75b3675d306dd4937825e83267
-
SHA512
48fadfcaf6ac62b4ad4913d6b5c41f87037f695bffd6b07feac832ababb2915c26824875708d1ca869103677dea1a030529699598a68629fa025a1d948977557
-
SSDEEP
12288:wVCvN53f0cwbd4smgNf4ItP2q/J+fjqrxKyOsnDgVTFqCncSgC:lf0/d/xxU+7KywVT7cs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2820-88-0x0000000000400000-0x000000000051B000-memory.dmp modiloader_stage2 behavioral1/memory/2820-81-0x0000000000400000-0x000000000051B000-memory.dmp modiloader_stage2 behavioral1/memory/2820-80-0x0000000000400000-0x000000000051B000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1628 pzpA0A3.tmp 2820 pzpA0A3.tmp -
Loads dropped DLL 3 IoCs
pid Process 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe 1628 pzpA0A3.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 2820 1628 pzpA0A3.tmp 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt pzpA0A3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzpA0A3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzpA0A3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 901df0489b0adb01 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432915869" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86743111-768E-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" %1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\shell\open\command\DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.swf rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.swf\ = "swf_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file\shell\open\CommandId = "IE.File" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\swf_auto_file rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 316 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 316 iexplore.exe 316 iexplore.exe 532 IEXPLORE.EXE 532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1628 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1628 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1628 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1628 2388 eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2740 1628 pzpA0A3.tmp 31 PID 1628 wrote to memory of 2740 1628 pzpA0A3.tmp 31 PID 1628 wrote to memory of 2740 1628 pzpA0A3.tmp 31 PID 1628 wrote to memory of 2740 1628 pzpA0A3.tmp 31 PID 1628 wrote to memory of 2820 1628 pzpA0A3.tmp 33 PID 1628 wrote to memory of 2820 1628 pzpA0A3.tmp 33 PID 1628 wrote to memory of 2820 1628 pzpA0A3.tmp 33 PID 1628 wrote to memory of 2820 1628 pzpA0A3.tmp 33 PID 1628 wrote to memory of 2820 1628 pzpA0A3.tmp 33 PID 1628 wrote to memory of 2820 1628 pzpA0A3.tmp 33 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2740 wrote to memory of 2620 2740 cmd.exe 35 PID 2820 wrote to memory of 2608 2820 pzpA0A3.tmp 34 PID 2820 wrote to memory of 2608 2820 pzpA0A3.tmp 34 PID 2820 wrote to memory of 2608 2820 pzpA0A3.tmp 34 PID 2820 wrote to memory of 2608 2820 pzpA0A3.tmp 34 PID 2620 wrote to memory of 316 2620 rundll32.exe 36 PID 2620 wrote to memory of 316 2620 rundll32.exe 36 PID 2620 wrote to memory of 316 2620 rundll32.exe 36 PID 2620 wrote to memory of 316 2620 rundll32.exe 36 PID 316 wrote to memory of 532 316 iexplore.exe 37 PID 316 wrote to memory of 532 316 iexplore.exe 37 PID 316 wrote to memory of 532 316 iexplore.exe 37 PID 316 wrote to memory of 532 316 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp"C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\\456_6232847321688.swf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\456_6232847321688.swf4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\456_6232847321688.swf5⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:532
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp"C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"4⤵PID:2608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf223c96ef228184b6c00f3ba2baeff
SHA1b5f90cc75f20a79675ac4952ee7e9a65ce89346b
SHA256053c77428396ab1b2f94424b2255f984ca3f62b3a2db3046102eaaf5d0b164e5
SHA51220527d36afa0343338a2206559b19b95bb05bd2d8efa458fe17b07617dc46d1797cb63be97df537ba4bdc4c2718ffd32f7c693f1f969beb53283ce8d907655be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d921ff65308fb17dd2bdfe7aa8213e
SHA16be14067f4251a9ffa409ffbd621437e10261298
SHA25646ab73d64b501ba748f976968bb17ec4881eebc49d0c4c9f36f28d5f287a3c3c
SHA512a3a150211b1856be748ef7ac86c1681cc732c1fe1aa1d8fcf553882c3f071f1695d05126f681fe30d1f4617de82a7c2930709e4ce4e49143c4f757961ae63b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e876846b0c1e4f7c6d4cf07c28772e
SHA18f2d16e01495f352828e1f497c68a5cc49f194d0
SHA256c359095e267516b0a56d0290e8f63537605e1dccac8cdcd37e5d12c2b7b9605b
SHA512fa8299eb2465b2e2acd4967b37e0cb1970351a28a3369ec23b72b23c782dc1f1cfba1253070877bf3c9165351ea074431811208f80d0c574e68c060a35ab1b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59093d67ccb308f3c0d809f9797324303
SHA19ac9c7f4faf9b87566cbde067c4673fea990e92d
SHA256de619158c43fd10dda472db2181f822ee143fa46f15ac414e21ed51a1ea5fab2
SHA512b315d1d4217cbba472a1dd7363b4359ae12aec218703d2c6245979864e9b071d84d0ea0e37b09b5b0bf3b1a582a7b684d5b5ff96ac9fc2f0fe2951d8fb3a768f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504de06114ef5d4d69849953b728d8833
SHA13915090dda8fdcad9e34af6ce003a7b5172b5f60
SHA256bbf5b73a6125cb56004de74119165c26368ad09b6e823b8ef0e6a7c993297f26
SHA51279e3beb983959aa3be1afbc5a42e6c14c18ccd9784de94b95f0ff7bc87c2ac9b431e9b3bf19149d2859b880cd3a7e6f63e3ab5773623e5b494524527fd7e123e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54150f7a9c9aa1598e9cc5379de857c5f
SHA1d1a7ebada27d5b9b5edec0fcf3ba028b5c2824a8
SHA256febab6fc6dc5b7742cd6a3662f2265b44542f356e8935ed9beff52e4b8a8b0b1
SHA51224b3ff44d1159fb50c2e3d7286a29b42f16d7b0dc0ba0d24307ae211f24e2d44cf77bb0637ae8ed39692d6d1ce0205653ea3aac4876f52cbfff30ca9b5cf494b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb574a8f7fc9dc4b0743ce45eb114a9
SHA13e33e211d579267378c4122cdcd00cf068c59b0a
SHA256e5976bbbbd2c96b9288e5f8e964eaf2a0f2f539018e32d30785ceccb3325b671
SHA5120a823148c46fdb402c8670c1ceabcfb81f0f6ddde33d60202618a3e260033206babd4f73bc208def9689a3b29b9d12bc0d21a6f73ab451434932710fef82c484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dedd2749a38d29cd1ec4ee15453cf4f
SHA1a9c0ec9a6afb7c81d25c527c28ceb0ad5bf9e8c7
SHA2565960b7798ffc479e35c98da3422e9fb482d0c5c3388ded2d07fae99d3f676d68
SHA51241727cc9ea636509d60fed6f75d4607221e42badcea699a7b8268b6a4219597d064bc4f2fc76e13a38462ec74fa8fbc41ba030e3ae03dc4f5d3d7d6a1c46340b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6bed4c9ef378858aa179f04e774034
SHA1cfa044cf05b4f26a7dae4977c43f082a6183488d
SHA256d4c2017a0a685fc1cd1783933f07e26d04acfc732fd6278febdc55b0ba5c55d6
SHA512c475e284109778a4bff2df063afa594dd971b93517789ee2419ac1335dd5cbb046e24586474ce43424cb2c3592849ba35f02cf178ab95b833f1052a59cf7e11a
-
Filesize
86KB
MD5bf1eb89e01dea878a8a06b09db19818b
SHA1a00289016403355ef3f4d2ddaca74d24736352d3
SHA2563a4823432714f075144a508a593b8082e7bef2787e55476811681305a137cb82
SHA5120e6dbe227ecad140d3d87bab2315a251cd6eae5bc0dd0cc5cc63d03c2b5befd19a4ee4c613a49e85eefc9c78ce711acabd5cc8305a0a87e50b28394588180573
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
829KB
MD5ccc8aa68129c9f080c3364b5b494e860
SHA113b5c71a97239f31532ab189a4459a1fd99c2b4d
SHA256e6ac3f7257ec522fbce5d0dd079811ecd340537f02ad3358a47562af50eac1f7
SHA51242a1ba54c1f2728709242af6dc9fafaab06ad084f8a9b18880c8e3d4c420095c3cbd988ae7a3a3d682fded347e6c9f728c4c29d093b022f69712694c64b13167