Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
30af6abac2c8286f1c1de56a1db4bfef_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30af6abac2c8286f1c1de56a1db4bfef_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30af6abac2c8286f1c1de56a1db4bfef_JaffaCakes118.html
-
Size
61KB
-
MD5
30af6abac2c8286f1c1de56a1db4bfef
-
SHA1
0d8b88938df60fe9985cd48e8006dca4eaba3d65
-
SHA256
767e16353b2af36985584d03174d05c44dc60f68f46daebbd7a9f7bffe1ed836
-
SHA512
90f26348a852fffc16eae35d824f5f870f4497fea61b322dfb217d508692949c9cfa09db4e9b1336335b35e5a076950584564087a5050c93af3a0fe5aff8e36a
-
SSDEEP
768:NuDChpHfu4WLGAWwgs7K45D1BvG9BaRuDChpHfu4WLGAWwgs7K45D1BvG9B2uDCh:04ovW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000028c9f0bb92235b4c8905fab983bbf2f30000000002000000000010660000000100002000000000251108be23b6e0e22f67378bf06da5dc3e7939ed554a2c94ee32db0d2b16b7000000000e80000000020000200000001d3fd5bd0e704c2e8ad26d7b6832ac64b738e0ffd0f901a2475e987cd2f89ad5900000005c260d9e831da3ba9e6b391327ee85099899c73cf920ab0f8446aaf95418f42d14eea920b10aa030c73993d330522c6ba44934fddeaf31b7a4dee798df9cd6e91560be76a9e23118a0f6824d334bb19f95a7fa48d62c0bd5b1c304d08dd4f8cf784f2021a4bae3da6f50c4f47c4f5af613045c2fc6c1b681637968fa4d2776c3805a15c5f8cba7ca5a1ba9cf8ed4638640000000c6cb0349deab4336d50a57e470ddc00765b8c14204eb94eb8e5f917211ed3f8fb2ecfd16789d06e95772392ff6145222c56a3bf4d78d0d27d1d92f52ba2d9ced iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434737455" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f78d922c1bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000028c9f0bb92235b4c8905fab983bbf2f3000000000200000000001066000000010000200000007cf1acb43031a2a38fbcd1c5e30a544977a3e735c4c970ac39dfe1c3109e8f7e000000000e8000000002000020000000d645bbf2b575e435c6fdd9963e83def40fbb1d0824aa56ca86b9df6b5ca28a73200000007ead09d5c405e971927b4227b3ca4c2181f55fbf2fff0f8b78de76297cdd3860400000008cd0ff1a03571fbcd94ed9b106ecda43d14fd173e9beba4bbcf5577cb97461fe2d1da22a9aba1ff1b7795df6b3ce9555128d9e2eb52578d6fbb60412e311ddc6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDF8BDD1-871F-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2824 2668 iexplore.exe 30 PID 2668 wrote to memory of 2824 2668 iexplore.exe 30 PID 2668 wrote to memory of 2824 2668 iexplore.exe 30 PID 2668 wrote to memory of 2824 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30af6abac2c8286f1c1de56a1db4bfef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbaacac23073e13215139489007f3d4d
SHA1902d811f4877b0f2bd4d6a841b15684f138b7d3a
SHA25664f164a6459749d70882ead8056bd0fbb75e544acf10ae587dce0c69fb274f02
SHA51203a3087374c3a7643579f708b29b42dc122689c640d527ddfea4e012ccff068ade1365baf828fab354d1b2f7a1f37dab11bf33d0e73e4a02fe90c3cad34244d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3daec1226b48d69cc9b197e124cfae
SHA18d5fae09d433145b4f3412df69f84da9a09296b6
SHA2561dfd84589c2ed145a23bd624a7fc20636f7ba611b8f56dbec7760aa2a138cd43
SHA51239713216a1de28fcce19b418de91e58dd93979c0fe7478c4b7d1e339435bdd85243c231c106c78b3da6eb34a093ca2ad7641016538a3189f79fcbb08ff13244b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d451dd509c4d95aa203b2e69758f4562
SHA193f70fd457838e2ef25ba650ea1cddb26c4b9c18
SHA2562cd87c6fc5c9b6fb0e56414f5d5d538d5aa9925aab8bce583820d0c530068f52
SHA51249ac34bd1a4fd2e4e5ad52917d7691796f0c569e6ba683cb6730b15fcc149d24998b80bfd2b247f83f0fd2d2b17be8fa77542de74c81b88872f72f4998b2eb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f0b2f393565c01c0becb771115dfa5
SHA14e30cf636560ede55f9df077de6bac4561a0c371
SHA2569ef35371b24f8ed325c2dba17220939d5146f380679794ac6360fc0a55389463
SHA5128b7015313c059a71070e234521c0298d5c4ecdea0354cd00d3227e4afd481a5731732483b5460025bf4478f6dfda5bcf52e9513e09eddb0b472b0a265f7a2846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dd6ae1c820158f05d21236215c1ce0
SHA1c89d67e1e13fe7158a3a1611e89dc6aff7a7ea81
SHA256acdbca57443567ef6ac87d2b5ed054a048721eb05ab82258ee6abe5c46bf2731
SHA512b014a216873f60017fea10873e9d8f4c6fb4ac029a6293968f930dbff318c269d0d8c1132bb0bbed04f5cecc92fd08e6a32c29421b7419cb23ba226a5a20c2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e11bac1e303469cd5cdffd1237bb664
SHA13d1c98b04f742b6120060d871abb1d9163a35523
SHA256981899fb20a4c5093fd21ccd0187d93a217fd0a2d844d6f68ebc9dcf86acf945
SHA512fef26e34b0e80d07b8d2470dc85bc2e3586e4ebe0ef3e0ece7612e0988ca86e0dcc36e0bdce240c8cb0b656656c329afc0f8e7cc7269e3dbfdf1dd7b4a55e510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd6a0fa4221124026f0f7a4443143c4
SHA1335c68cc820bc8f0098be3bfb890e256baea3902
SHA256ff2caf17e2d56b9096da2afe16e442f244c0d360c0595692e50015c0666667b4
SHA51248807a1e992f1b881cc5eb19ee6f307f130d2c255490e1387e848edebaadb8b1cc3b8eb850983d4b917c6c4747213bc38518dd8ffa3416b532f7cc4132626c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dda981a2e75c9dd1f182db246790e93
SHA1c55ca4eba62d4140a15badddd5440538a82f92cb
SHA256d329c95a6b0feead3094812e14dc336ea6d6f9e3f9bfe6081c2e24b8352ff2fe
SHA5120c6e919b7077b9e2bc3d9ef3e9565d01a9fdf482ba2123b9523520328e37ebde16b70026d6ae7f03df93d00fc7daac3612af3b85de69990849a4f71aed938b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee14a7154acb2436dcb3806458bfee5
SHA110e11431834dae6b39cd99f34a3ac142415961cf
SHA2568607d71f998fb74c7956d02ca4ce4dc886fcdb7d84561a5d21dfe1649abf9dd6
SHA512fba02828dcc060781bd9a7981942fdd81898593dad8abf59199e11932dfb25b7e515b58a9a6a07dfcdd1c54f7e3396f1e3e5adb24a7e5d56cc0aa471876c4f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e59e9f9f3ccd88d80d375b9da014e3
SHA16de5ec61832533427603ef346c300ae77c0a96b0
SHA256280bf8bd1e66a47b76ba96e3f11aff61fa8a4ec81a14e2a3193b28c05900e4a3
SHA512de9760a4bd933b310320f1bff8336b0f0f77f2fbc929d434c40595ea624b10bb66fa841883109aa5b4883156f577fb14cd021cfb6ee9d59050259f218207aa35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2e34f00a00b8b537ba48fdba93e309
SHA1e7f490a0d5750c689fc7d761ee41d496107bba7a
SHA256f2910527573325c785f4fa5a0d418fa2775f1c706f67a7d108fee702ec524f08
SHA512d566126d373e66482dca0c4ea4ff1300f84d011d080e57ed80f85e2df3eefa1ad0bb8677546e1e1aa3a03f3e42c322aad819f8f85d61654ee217ae6b5d6f948f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26535f77b385af8bfb31a346302b0ad
SHA1f5c065b199e2221354eed37db152fc550e57a17d
SHA25605b4113cce7849bb94c55088caca5d704d1242b012171947116df3c6616a1967
SHA512a9f39b42a1a50e295e73d900f226f2761386634fa3c43361751747b0fa37ac1a19c88b91767c711e76467d215a7b489bb20d5e4eda4b210372e77d2414288b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba871f28cd5e23714e4f6f565261caeb
SHA1f17336dd357d4a4fe394e05cdbc3dd6df3a91317
SHA256a92fe69d7325ce5678126787ffe655d8cbd21936e0ed31bf710c31693ab77b02
SHA5122678c30821c8bf07b2614cb183cc5b683a8d2da4b2a46c7f2ba22f51d1c66c7f958e485fd4f6cd60d043de5ad4c5e7fc716ac573f019df659cfa97f1cabb3afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fc1190feaabfe4a2ebb2e416783dd8
SHA1182d41d68bb8bc7d1f7548225e7eaceb69acb8b9
SHA256de6739cbd54630aa9409e7333f7fb6725dd7342233547d36484b8162aeb98436
SHA5123ddf3a4301e0741bdca26097adf0ddf74cc9fb5b452ffa14a3dc04affad531c66a2149ca442dee081a64620b6eebda4136a3c7ea13ff8b97074268d55a409280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e950bc5c653b7025a98ddf91ec6ffd
SHA1d83ed0b8c9b66572ceb160da8789481dbd915203
SHA256a7b2574693144fe926fff0048f73a45d419f68983a61c3abe84a7a6a9a8e5660
SHA512a5be132ec5f9f0295ffd6a151d912c335de81985ba28e73f3f5034935a1afa56888119e41e6d10c347e6af815d1ffbead97be23bbd2db733baadf91458ec54e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878f2a17a64144adb602e355e1939897
SHA157e90b8ed7c2f4e0d07edf1c907d8b244c105bd9
SHA256c3e924eb4103d89dd4e232d64db5b91d144c1005ccc806c0b4d9e984f428efcc
SHA5124f41627a888d705e2c4bb669c38e5191ff1469b203e26284619af7a1921aec5a1a036ef5fd6ecbed79aa4a7b7a6e4073bec1b00da16a6a52140ded5b79edab88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f01af0fb5351120f0af2873c037694
SHA1aa73afbc14a4d8e7be319df63ca8cb97dd52860e
SHA2561d2a001615cdb83477747d010f289d5dcb089f7c5adbe57a64122c52c1edbe1d
SHA512d36bb6c9ef0442395659896dfd1bdf4c86b969586ca78c2a97e8c12da60a8816f1b8f0e033fc84073ad580c41b922c778776e170118a340ea815313f3557effd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346409de6582484fc35e08c5d59318c6
SHA1328928b13b333a94cc5ad1db715b906ce404611f
SHA256a477317435fb93bc61c9cd99b3605f5da993214b6d47541eb19e8ce75e7b1e02
SHA512fcf46f63918d20030ea6d21c297d6f5623fca92510a1ac923fb76f8e2743b20ae260eebe65e7df49eb0ed8d965dcb261819d4e71aeaf28fd4ae2cf3502f221f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbe445766a38fe612de7c9baf2d44c1
SHA1fc536c4edeba3c2c4d5c05cb1b66d3a2601bb596
SHA256bd6028c164152ece06577b8b1f843f0c36ab4912880864a0bb12c9769d6d4f5b
SHA5126405c0315b4eb75fe71649c568b8de2d65430ae59f8d6254a75d6f1a676ce24d4fb5ea5ec02bf7c3a4fc3ed5193e61ac0c8c1df010c3f2ec42b91539e0163f79
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b