Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
f0bfd8716ef0d0242da14ec3b2d3fb52_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0bfd8716ef0d0242da14ec3b2d3fb52_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0bfd8716ef0d0242da14ec3b2d3fb52_JaffaCakes118.html
-
Size
47KB
-
MD5
f0bfd8716ef0d0242da14ec3b2d3fb52
-
SHA1
d95019101fc4dfc32b98d927d0ad01e35a1b25f5
-
SHA256
2bd6a72d876b363c3a8be983c730aee775dc87513812e33bd6a2247e675de4eb
-
SHA512
a1d3b5437233a63fe88aef4305599a353a95bb4d780681d22a49005b66374a34a25554f9407e94ea3a4601b20d84b86fe42d34450a1a0c56e8f71f6641e42ef7
-
SSDEEP
768:6yavg0Opgfbp2stL1tPk7RsHB7p1nvzWlVxCjW2hfvCWNM2zyB:6yav7OpgfbpdZk7RsHDhmCVpCWNM2OB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ef451f770cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f23891d9de6e42c889d3c513045a58a07026a24e20ed40b9b49ff3170bc247e3000000000e8000000002000020000000da89fdedb6e13790d4b55742399eff4652efb32e79f8f9eb4628615f51f6a36b20000000f331c1327845286e21dcaa979512c776e32f6a5e5b970c99092d704e269dc10f40000000c5317a63cc0365b9e6317e7bc275997d15b5a615fa43c19684f903196079f873a8d877af713327365e7b1ba4a7d9aa8b985c05f9517febe68c0c24a2de534527 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433120099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000e2c7de8669436f63e48feb4733c4ce6c8e656a43d4b50e1cd9dcdb4f928b8adc000000000e8000000002000020000000e8f1af68dfaefa452de1e09fdddc37600a798a165fbe00c246af68bdbace72fe900000000b280233a9f9bbc880b65d307cc09f9121c6d19ae056910eba0d17b4532c8da1be9d386115ec2cd5f0c23c602c0f7f075e3fbcd8163f4d4d3ec661a531d7c0929983724c4307ebeb8726658138a7e5a05215bd4f994960836f2513268bec9e0c6612be37547ed43bbe42b8828f134338b14d0f51e0b626db75b64559fcfc8f75818c63508bd3976f7979381b73430247400000003e7c6d7e403518aab4fa467e1e866ac04db5d019ab4c95768492820fa5ad1a58aec4cbc03ac2b0bee7de759c8243874af8bb5086e8cf244ce72d361575424d03 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B5AE721-786A-11EF-B0B3-6E295C7D81A3} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0bfd8716ef0d0242da14ec3b2d3fb52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523aa6dcaaded2972a674c0f4ad85b934
SHA1c3ee18b185e4a66049643c18780b364f0771b65f
SHA256219ad5f9a396e5396f846cf4f903bc9f55f2d8e537e8f6c78efd0354c152fe44
SHA512c8785a1eddc25b6473eb53f59adf6afae23303882a450279ca9ed36203d2764e3428bab1019deb56d97465f2263633b3e8a9940de911ef571895a7315cc1d6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da36cc2ddc2e9a3c76e770fb33443a1c
SHA1742c7e01b24191bd40fd0c737584056cab74ce66
SHA25613446559788c8abe6e4f6716b28901d2bbb31ea9c08be685c741dd48615fc7a8
SHA512af584ec13170f555908ac4bb7d11a14bd8b5fd4a77ea0eb6eadf9387b4c6b7756775c642e6c92876bc0c1f319dcc7c96af9ba81ad93d49f27d52163bc497497e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55401514056825ec889630f1e86a16103
SHA1297a9d1ff6118257764dc119107e50f98a2e612d
SHA25620f92961dc413d8d565b88502bf174d0125dafc38106a80d7adb1e2237557b17
SHA5126a484cd29cb9a7753c66a0e307fb20c5b38a4c5b2eb99c35617a76509fd1ee18c7adc8143e565a1f547633f78cd385f24a8f0633c55e6e1b05b4dbe82dac4d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbc65b043d76bddc4fac7570bf0f4dc
SHA18399b60d6f65d34790020f3ac8af1178db908520
SHA25654a40a85844299cfb57c12e8056df8a190d7af1d0f7c19cdc5cf1c8af248d4bd
SHA51218b42634c4f33f7745b7632904b5527be66855669c06926719223a7696c0222fbce147c57bf1886d4eecddac28f3c4cef3ce15d61b2dee2b8eacd589fa67889e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91aacb77dffb115287d46c58bb344af
SHA1abcb75a11becf1b4a863afac04acd5a0add72f44
SHA2562745d9414bad61f1fcc8b082ad661bf6e81bbd8969f38d7637d8cb30d78a39cf
SHA5126bc04ee4a3b4a69ddc6b430a01b4ce734ad26b553b09ca0209ec8e5f7a4ed28a9365d965ac67d50f4099e3658817a539196cb32b0d342324b37b411403d0c591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afcfa430ae67977cda4974e27db46e46
SHA1acd31f878fc63cb3e6f3feaeb3cafc37dcede952
SHA256dc97596ecab389b5d6fa21a8db455ea88b7b3108d34ebc162a880508cb3b208a
SHA51231346400a86ffc447ab5875418f2465f67b336910039dd737a716d5c7d9300a0813c1bda676e6e5dc3485f1b7befd8b89d306d213fa29063402b566b3cde55e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52067bef1b4d63d3d54e0321f88a71e87
SHA16e14473dfa61ba8b58ef87a659ab1f42fdfa60cf
SHA256a7e15aba95f7cf190c06806aef138526e2fcc7962c34c352a87ea5fc0b7513df
SHA51283cca5910ca1e9395f35130fc17c650999fcc8b8ea51815bc4565a1f5bccc0baa97989dcff2784e896831f331027bb58b909695e71e33b8a2c9c64c6398b649c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56460e69a58d108b68fe3956277a89f2b
SHA16c5189cebff09d4c7e69b8d61ec6f7dbf4c25ad9
SHA256e560c734d665039de5738047478e9bf6a956ef330735d50acca8e61e649e54c2
SHA512df25e9439cade82fd1263c2d1da08c642614595293969be65ecf2a47d70ef58bac623c4521b2d8d98ddeef73c3aa0ad71d0e32a06e458b6a3678d2a11d5164f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef768fbb9c46a0c7ce78b4541e296bfa
SHA19ecd2e0133bcf0f6210acd54ea55e9c8a2941430
SHA256b7fec25bdfa8b595d7735844b23642a323faeac81fc166d5751a9bf019cd3930
SHA51247da2d3ce5e5e2cabad98257669604f1c9e7e2dc1ad61fb86c6e32aa770b27734af9400fb6126e975d89e721de4a9aec0656704cbd6d9a5d00cdd868b1b4b7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d824afdab561594fc36fbf9f7d0179b9
SHA171c8a7acedc640cf5f7e6a97918443e7d08513fb
SHA256472618199e50f2b4b5fca55b30233147c1ef5d9a591a25fd7f3a910c856dc687
SHA512f0559dbce4c678bec132e013bd6e677cc7b9c83af0f272386bab0603111eb3d4bd3f6c54b1fae349e327481b0dec39510d6f8473dbc850025784cdab3757975c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae825e61d76d1285292248ce23a16d8d
SHA120b9114b9f36dfb9cf6dfaf41bab048c05483bd6
SHA256508d2033f33db6957fc4d34ae30217924a6feb203729fd0d00aac9a2d1b868ac
SHA512122bd3fa68666b1de322ebe824574d4f39bbcd8cb258eb547687f305175c99fe857c78cbb0143c822dea488746b6188458c04a54a6102400323c2b236e5ba984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142f25dfd50d8e81ae0433a79b2e76ea
SHA12e0d8f7fab100025a96ce97f897df6450cb1c79d
SHA256aff026cd3e3b1adccb1c54d8cb380e6152d9cba73e3920b412575e0939b49668
SHA5128d3f6ed6a7f0823c6d81f266f59a72b041339836cd72f527bf53fe1f4148c7a3654ed6ed7053a4faf5f324edb22a6a46772943894716320e86b5081692c28a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e28cd0ec9dbe5b5e165013ee1ca7cc
SHA1d0174493d8ec3b5a71eeac7c9d049b5ea405daa0
SHA256a3703327c45e4024749ab77c671aad66cd6f0c332fba066a6854857bc79b1cde
SHA5129dc08eb55d2b6f757e5a536c6ed78981929fbdb4d6f1f11d01dacef1ec9df1579d38e0d44558da005d3ee8120a6290bda2a3b28077737517325cf0ecc246f9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336389cdd48070348025458519b4896a
SHA1ee173cf4e8e5ad544770c3935dde872ed8fe9065
SHA25634cdf2a302a5343aed93b9cb2983b2ca2496e3a463e6883a600f4af910c1e955
SHA512d8dd0550897f3ac633cf89639257994e2ec2c748e6e83fbfd04ef8a4e2be2c78c500a828ef9908b8f7e5b7683272fb0bb8fe35c20a782cae3500234d72fec1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538629ddb781893c70619199a26340f2f
SHA1b4c224b1b3ee927aedd8eac4d9bbc8191cc77886
SHA2565cdaba1a795089b2f2d47133e3f7fc1bfef2e7f3e5d4abd93a3e7f28cf632161
SHA512c6b71eb41daa8c962eb466741eb74d0a6feaacf32d23c8e9fea07ef50ba15eddcd31fb5bca7745789d7ea12aae7812091922124d1b93e7ba5281d2e249034c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545dd358fd2ccaa2c735e09b056ed0014
SHA1a9b798b2b9d97d040e1ad87feef56e3dfce4252b
SHA256b29a0622930eb5b72a07d346ef55efba38965ea06f30cd6030a1e0fba80706a7
SHA5121c9739116e49a0ba5d034325e4bc4287607401fdb08964e3f6354eaf1d9ca6b47714fb8223cb4371c1af5347503cdd062d6faaec17da657c788465f12f529f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf90ac4cbef284d6efb669451ab3193
SHA17d4445b7d1691e53a6ab987ccd78500c3562f94f
SHA256629cb278de0f0cceba6ac0a7a32568a7185bfaabc8cfcfd34efadd5fdb2d4686
SHA512f7562d77184cc328e8ac8428d7fc2aafddc95368b36515b282e07b65d4c7063194f44a68ffba508df465cf2701d950bed970273b859e68f1b097e4eacab96377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9d651201fffdc297a9f70f6d19c341
SHA18cb2e90fe9fcf6b43498c49e6dd438ee6742ee1f
SHA2569ac30c0eb1deb3cb4f70f9136b5610f3ebdca2d4c5bbaef4e8d9ed96ae211478
SHA5123e2671c2b39e2e93cf06c2d434737f2e26c718e089895ac8baef058d21f8b7f54d25705564224c36b2f7bc6f6977d6a654e3931975151e11b5ba9ad8e69543e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e398b9dcf14bffa0056c6e60537e0a0c
SHA17de9d71b5dec45dc7b905817b5bcda48ff0e97be
SHA2567c7b639498f89c328f79f1a1db9a2f2ddc1714533efaca86a625e5d9c439dc0c
SHA5126ac4e2a68899424cccbfa8ce7f62e8d97710b85af6db1cee116f5ae959b9b98361c9a8bb065ebe6357e6ed627a2db810738f4a47b94b48cdd9c28ed467156564
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b