Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
fb6ca93596f76eb8a3e76ee543747032_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb6ca93596f76eb8a3e76ee543747032_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb6ca93596f76eb8a3e76ee543747032_JaffaCakes118.html
-
Size
23KB
-
MD5
fb6ca93596f76eb8a3e76ee543747032
-
SHA1
5fc54bc7f414c766feea15191cc4756cb3e0cb51
-
SHA256
2211df921eaccba3e9e72717d747ce09e288a70604bb49e05a0e1087b3809e5a
-
SHA512
f1fc5be4428fadf6eb897cb786e9fb4230ac3b41336b8f17fcc004a6f94b9693c768ef4c061c2dc70ddf3dfbdbc4a97098a424bce8c3ecb06e4abbfda02520b7
-
SSDEEP
192:uWLAb5naenQjxn5Q/NnQieANn2c9nQOkEntXjnQTbnRnQUCnQtiwMBgqnYnQ7tnU:HQ/EcBSh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433656486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6036ecbe5711db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA3EF871-7D4A-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000cab5053f643d373f9a1a7ddf74c8869664ab210ea0d268fabf72fe612c039811000000000e800000000200002000000011779b9e65d1e6e12588ba12e56c210eadba621aa470ac7815146a417e25f07220000000a350df129c7dff9aedba8c7926d9980c017c8c18c42f68b4675817a8b4c91e8b400000002fe2448af85bd09c7c16569447dbd0a5af1ef5ace4ea906da697a24041721910d0903851fbf4fd33cd1589a0fb32cddd5d42fae87cb12296f9dc8b5af2d0fbc1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2824 2708 iexplore.exe 31 PID 2708 wrote to memory of 2824 2708 iexplore.exe 31 PID 2708 wrote to memory of 2824 2708 iexplore.exe 31 PID 2708 wrote to memory of 2824 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb6ca93596f76eb8a3e76ee543747032_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352bebf5b6ade5a4e4128fa3a1c95634
SHA1e5f111358ea431f98ff47c925b08bcdba429d89d
SHA2560d9621eceaa92e3a5cb5dafad9607f76e02428f2d4f59c67ce65233fa4e76c5b
SHA5120620188c2ccc5a895918e532b7221531cd23f6a22fcbb5c4b5c02db0e287682288f4fd128d0f026e4bc3f895c3a17b1734745776de3aa18040914d6814f3c94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e1252b67ef204b22362d098a645d3c
SHA1a7dfd464fd13e38249325d65563e3dd7ac736dda
SHA2564a4f572d0577f98b1a89a1e6eb977a27dbd145d3758db52890d5cd5bbc190d9d
SHA512786d050e3c21dc91ddb4c80ae9a0ead3faee7289c7e722517352bd2d3bff6fa2eb09138ca8d8aa79a3be47b0da50a723b41fb4c7196c0f87d6c4bf33ac476554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440d0398974b612c85ff94f0818d438a
SHA1e2e6a7c5058b888d82b53913049eb5d89af3eb9a
SHA2569b23f692a2363539a891a8a08fcf8a98701567b6d5017d4c08939e362bb09129
SHA5125cd2d55b25508080367e9fab6508f1e191fc4b3bf0c246e055ce0dd1198cc876a964977e0608bb0a6ab78169608c129630fe3305689b5a7d327d8d7c825dd570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cbd144267d2da9e5df0ae3ece5eec7
SHA1200a376bc5cfa9887f9fe79bddffdcc4edae17de
SHA256e7a5c114d41cea2d2a78b327e2b366c3ed030e3c4e4c0c493c7e79c98e9dacf0
SHA5128c882c928944303ea235fa05921d82e32600a9714eccbb87d59c7e30a9519982c6bbe38d3ab38c177fa301e6f9d2faebab22bc75a46c0d27b5dab6199c40913f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049caea5e810950ee9164226bb46a2d0
SHA1512b79ca28d38807e11b61b6357e56932e9aae8d
SHA25658c84b86a9a31087b385d581c286ca914560b9d3d1a1e65489b5a92678fbaafe
SHA512a4356a3da3e7fb06e5e024451bf98f71e04d870fc4b76d5eaae17343d31328a650c01415b91a79d8ed58805860baf3545d3000f21f68a18fcdd671a0ff3bb9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b6765ffd9b3d5ed537bbb864b4e337
SHA1117fe8acb9e7675adc280ce97b7a9a80ffa60342
SHA256d590c3047001a728f86e6437912105dcf2bc569fef9c3adff4943299b94773ba
SHA512ed47c709465c2cbe1543baee008ad3e3cd818759557103856670f0d40741154e237fbd62b8525f99cf960d5b9e05b93e30f698adbc8ba3a3217277095fa7ff27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c10387ec38ea177e0aa8e6482a5b3c
SHA1928d44b59a4eefbcf82991b7e07b8ee3671e937f
SHA256a0c967008fcd3e26aa149dca02adadc82f1131a70b772f3fbccec57286b46cdc
SHA5128f420b5095d124c3b6dffe0490051c65b046998601c576c656716979753c982b83bd06ce6923a2e3b2013858cf6b7fa4bccd425c28f11512ad3c053e8279c319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db478f78af8929f8b4f3f1ddb37dda6a
SHA127a8aadc8943abe88bbe7511b1cce0e50ec87a07
SHA256715fffe52b7f962fabdf7fc439e7ff36aaf0d12ada6655ae88d231d2b0e65898
SHA512592aeb9af4d18e6607d7d0d71f1e8de64fca7ea9b4f56c8443754c4879c4784f684b284d4493b0ad9e6461cc65d8f20364ae7da0c943d751883b14e503eb1f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a23b63d69273fdc4c2a73323d56ef7
SHA14693ed332e611081feb52f05cf0ed1fb08923ba0
SHA25600e8a4bc3e0435d214dfef013760226cda64103be641ed4df8a3fd724d97e9c0
SHA512ecf96fb44b6e72c2f23f85b7deaf8754d9b5bbc4151a78909e69c43d651d691f21b4c47feef10633be2ede7e010dd68d28642ce9724a9b57baa0676a60a23c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce645528f4477e21296dee167a4fc65
SHA1fb98ff98b9e468fb965a7a41e4159b7338f8842f
SHA256c8db4b24f9071f9269e253af9fe94d6a9493db0fb95167f91b71e48344e66761
SHA5123793526b5ef8f62eaeb9dd49895d5f37b26fc2996e6970238df020f4b773735a91ca001a532a7deb2c7727a21adfb8d59d5d31995179168d5373e03f3a5be42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213763898596344c81406226665f882f
SHA1d59944451f697bef4fbba082fe369229f4cbba87
SHA256d60e17821ea6319e99641d5f0d581ad233c84493a7e142324f7e0a769512a569
SHA512b4dae0969ee0a832d6bad527740fd19c2eab0b2f226d4d6793d8e5824844fcb1adb31834e77b4a350863f22072e36b85e49402d70ba404184bc5e6364ae88a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367c13657e64858411bc368fe5e64711
SHA1a73905f7bfc9302016d905bacc516e1dbc642628
SHA25621e1fb20e42562bf4fdfd0096b8b8dd7f1cc24efa0f77eae086e1c9d8cdd457d
SHA5124a87eff79efa12727b184d2272c91ba9a81a4b0e682e268e6dcc6bf2193e9af422cd64e0e7742fa2975fed74443c83837955c1975d71bc31b486491b203896ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772ed0a0ba3bffa9c4e2a100912f3750
SHA1c5f3d8d3d1bab0f78e1d85ee60585a6fe1e3bd49
SHA256aa508b0bb19ac4dcce0d3d790d16fbeac07e8f3879ecc88a8158602c933b1006
SHA512cfbf395f67f85eb9cd7b2de774ae5bcacb114edbd03ca1e1315aa7a326b4411d097b8b9de1083cba8d14be939f283b370f2d96abc44fb027f8aaf1d8612fa578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e4441e37398243c21862d0c6b6fb83
SHA131976f9b55e37aeb43d6106bb574473631592a80
SHA2564f8398e87d17297916bfb16d605431d0fe03b5f8e57b0e8756a709fb4086c394
SHA5121c99fb1660199d0648d9f3c61e38c9de4a2d55e42a52b94563b24a56ced4f1acae6aeb7e0629b30755298a3dc54c78ecb90955037a40738a30922eac739c8b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedf1db302789c40191dc84b2ee71955
SHA1a4b2f9e75dd15abaa304fa0ba786fd43c0c5e85f
SHA2569bcfeb6de8ab0d3418683e8166c6f34ea2f55f7c455522b57c3e7b775b8ad0a9
SHA51286ae7e373b0ccac3578a2b8a86ce87d440758de0053c1c7398ed617c624a040e6e2c3c5a1bd56563964ed80d5c7ca328c2db612d7c1942d5c27e9f0b2e0b9913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60064951190ac1d14aec887619cd555
SHA1dfbe45ca2f11dbdb74f9557bb366929c6eaa858e
SHA256603cadda0d16cec4ed1905da348195c50d5f20088d413cfb7217292f2a84cc53
SHA5125fff75ef2fe93dda84310ee54ef7d7fa69aa4cc84b9f45f222c18cd189521dc070d469ca9cc0afe047d532f46f8621236779446729b957196b87b7b13464d445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3b72a885a5035bd4468b91b92c86c8
SHA111b6a2c72db31e58a0b94c1314afa466ad18f0e4
SHA256be573e680f00f43df1c73323ee0720ec84ac61ac38167ea836912702c2bbebce
SHA5120e44d8e929681a012f7e9f9651f89183a5c70e75570233f8bbc5fa7398d6d7475a0f5368c22f1c3464e6413a209c8fe5ce6cd2c70ab2b95025635c33c6d68c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b305cafb7d4d16d81e3db5a321ee7a5
SHA191acc59d4f5dbb2b77986b67d4088b2cbb40e2f2
SHA2568a348003ed3e0b6fe17515fc8bedb25878a8efc28103a3a81e19aef57566de0b
SHA512464ffe2d3ccf29e83015b2960da1c317056d55f4c7033935b756d078a4ae517f3a5dcb0ea913ec14be028cbe6c231e854eb20fd8e200d0ebb915c055a50e1254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8db255bd3a0bd58079da0882bbe7f1f
SHA1c6384bf1060ed3b9f972df5d3c5f18e7e29580c0
SHA25626b867b99300998450ea641d93d6a7658383193db698d76575144a364bca470b
SHA512ffea73c2bbc295f49f62e5dc042791bfe271a1b3ec04c828229f7df504d39b83602a013ce2423ec9fc28f3abd4ddf17a0185bd20c903ac0ffe0ac79ae42e13a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b