Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:51
Behavioral task
behavioral1
Sample
JaffaCakes118_961f18f59bc81a16f4a89b9ab044a819.html
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_961f18f59bc81a16f4a89b9ab044a819.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_961f18f59bc81a16f4a89b9ab044a819.html
-
Size
44KB
-
MD5
961f18f59bc81a16f4a89b9ab044a819
-
SHA1
57c1125709df905aa1256dcb922267b978833473
-
SHA256
36c671f11e2ed73f203ce4e7d38e3488ebbe29f8de0234c8727297b8d4c21f9b
-
SHA512
2fdade064eda0435338a978c422fc70a275aa90ff4ab90deee0a4271560cded90a4b6cbad5ac97c299a4bdc057c2079f977ebf38acf90463cf45fa550d459b71
-
SSDEEP
384:jSV0u+0L1tC/PYjamXRM9ULJtZEA0GNSRYkbeF0TSHoI3Ur0ktOS+B5TQwDd6mbT:jSau+0L1fNGBubDC3ffxdzbiHeY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449476018" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A228EFC1-0D2B-11F0-841F-4EB06247029A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000596298383b88f045b768ac3737055a0400000000020000000000106600000001000020000000b31b30b6395f67e314c8d2cd21574dd4d8a3392bc5ddde1a6781cf11e4f35590000000000e800000000200002000000058418814910ecfc7649eb8509feb2bbe06fe80888ae708d17c786b8cd7dcced520000000cb5e7a05a43d198ba88b3a2e1493cf4be8011a063a1c168c51b7dd9607e87417400000001615dbf97c9665deed5841d1254ca9c51a69e61125ed6ee0f03625c888ca4da2607a6c54509e866a5b56a05c6570745006c4ef8ce3e6634d2abaaa89e38bb2de iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9059867938a1db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2932 2116 iexplore.exe 30 PID 2116 wrote to memory of 2932 2116 iexplore.exe 30 PID 2116 wrote to memory of 2932 2116 iexplore.exe 30 PID 2116 wrote to memory of 2932 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_961f18f59bc81a16f4a89b9ab044a819.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565341bf4d7da2d9af2b7755e0d17b865
SHA1f3fddee1b69d7e3b1ad7912dc7adfa4ebd6c2e35
SHA2565dce3c97e2445591f16aae1fe9ede9ea91d31931ce6c2b69a7cba159e52f7553
SHA5127dd55a8f8244ac8d31323b7dcfb73fff636f905680c403d3aef43acd80f6d59b7d323fab3381817879b089decf55eb84ab19f448754c581aad2ccf5a100f9dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b80fa326fd2a3e1a8fb15ce5aee078a8
SHA1a68d0154672fb22e6eaae274a43cc40b6ba6f821
SHA25624c48179fe594c20d13a429ac508b5d3f4d380b8fb94272596a1d532b02abec3
SHA512d408de323f5e86ad61ddc49a2a4e963bf63e0140b825dae69ffb38c4f8e31b96ede4937e62e7a5769456ddb074f2d44d714b43ce997d4c76a1b1e0569f7d3ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f9005592fce2597b4e7b6bc0c5d2aba
SHA1f19be9710d7d26338316f9a25aff2835029dc9b2
SHA2560a64abe985bfe0fc381c66ad072ecb961067431938aa47c2d01ee5c8fc445fbf
SHA51244a871979d9a520e259a852bc4a47f9e55cb22c922f5c29dc2999101bdf918fd509405eae5584f1cc85654634312e7486af7de7ff943614b15e953f1db19d718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f34009a9bc87ae9c136ba21f9164915
SHA1ee600031c2664458a3bfad5c3358bdce515e1b97
SHA2568b47bb2608c09b2eb5d8a62dcf66608c1b1e6979accacebf7affe69fd389e416
SHA512f2f4bf21b6894ed0b6c1447504fe5cf53404929f70ca03e128bbc5ce220caf8dcd9972b32d0ffdabd26e7be92e7cb4b65728bf8990cf318cb1489eec9165f336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e442a103b26c85d68585f4b4b7e671
SHA15435bc10e71c04cd91858e427b973f9efac76bf3
SHA256d465eff18a80dcc1bab8e36529966a8e56b4e1bfc3ed3b6d8cd59b36b1e9290f
SHA51238cdc15f51ec3f5dc31faeed4af7ae241b3554a56d756f932adc3656a6e0155e3a91ada7a0f5e42a0bee21eae642fba5bfdd4c969baabf900268fcdfb9e6a7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e6d811debb779396c7cf0875405b28b
SHA1e379578be67d4fdc9ff2242d1d55ee69e2da73d9
SHA256465160ecae1610cb0c200b2a6be1bfc9955c25c6042df3ca9e6ec7afcf9c492e
SHA512f8de906874a96dcdafb477ba24b4e48baa1d438252d594c0d50e105e2cb8656a20b5ce11949643f2e77738c6d9b69c7c80adaf645cb6c0a1247f289d9a46e89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f33df684a1123e6243078d9e1d0d5fad
SHA14f444376ca684fec1338211a17e6762edfa5b037
SHA256e9039a7aeb3fa0d9f8859a37d4f038bac9674fd35f497e4ce05c36b4e958cae7
SHA512df96b72862fce8be0a391aa876b25f738950db3a73b1be040a26a87b786d8dd8dc01a6aaf2341d73db601d4de8f29cf427d88f47a5cd21fee68d313ce50d8619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505dd0cbcfe2b15df4493fc8f9e8cd917
SHA1e2587b994996ed96b9876ce5c21a06e296f85c72
SHA256cb644d5ebab9da3bbe21a38e62713578da78e61adb09fae07d16e221a4c2e4b2
SHA512d6401f5744c2d1bd3ab8c4050a27c961b319b4e6e60c1b0662342f3f417a0ae93cbe40318116d49e1d1a4eaf608a3e22ab8c50b946e67aa5130b6d045f9aae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed16c2419fd977693e92220eac63c74
SHA15d286d1eabf2da8eaaacca1604f87c953d2c81f7
SHA256eaf043844f3e311d0a7bcb76e34ed139e3c3cb39fc8c2163e4e5d444e9e584eb
SHA512dc14c552b6938a8965aad8c32f5cd4703f558347a7ece957f91d3660c99c93697da02a0ea9aedce6517df482b11f43f3b5fa5628c2ad26fc81af4347d52ffc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93d0b86d4e990720591d6cdafbe000b
SHA1168ef2614a3dbc0eb1702dd2b4bb4c47006b21d9
SHA2566f0bc64d68cc60a5ece41f4de126abc83d29f2c6e92b1f2b817232dd0153928d
SHA51276ec9f9dc78a589c314de17743b0680a815043a2174dae2c47799c9ce7f2edea549c6a6f18b7ad4c54a00f6a03622f1877067616558c85726cdd27fc1e89ba80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb04bdb16b9c5b9da934a7acea1c88a0
SHA13d8351d776bed63da6f07aed0dbd12d78c9ce7f5
SHA2566d20275bd280bebc338b55014c0d0f78ffb4ab76d3edf8ab3536549eb54ccfad
SHA512cf3c9c611acb7c9710dbb499aad94c793c69ba15907cefbf01f4ec6e85c7ff9f19e8d366422b8ffbec9bcaeed6b7565ac010633e16229085176ffda450b21ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288b98f701fc6546e869ec4079bfa946
SHA1aa12d8c505c8ee9e9995056fca5f186dc398b3de
SHA25696624f5d45b2173eafcb0d81c43f74babd0f54ee5dad60dffe3db5b3f3994879
SHA5123c24f6528806ee6ccc0d849d8121d4a1ac36e938b57b729b9784f6de7494b70e7f3c0d0296a5512938128241048b189787d39e21ec8af1832950e9f87d1daa5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d18d2d0f3e4067fe4100c22fd960aa09
SHA1a761cb57e4bb584f76da3a8e948a454de805e931
SHA256154f86619b22a638692508c4c49b65acd4a6f962fe3b96fbb23c608eeb0ccd38
SHA5129a4761e4d79a5b9c046c88f522cf235a6496990c44659bed8b6372e8acb4cf59bd2b6f96a4fe9f423413d679bc6429a26caaa62a205547b9d7551945921360c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae6cc1baa860a91e9c49407722289f44
SHA1eb9ced2d29f197352d1402d3aa41dad86f1e0347
SHA256d991e2d81f2d2e2a3d1dec337a087b257f72cc8ba3dda31c581f5b88d384f3b0
SHA512c7b3c756de9c8dc8942ea5259339673039841e37c6536286c8600528667171ad6fc9a2df826f71737c22809e996f744e4e78f429363bdbca451d9e60caa0e877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc33d2482cbe2bc9a6b0efddaa196590
SHA162e6f0ae9e301efd3fe385b02fe106a1d35fec0c
SHA256531eabd84baa5803780c0cfda27739d249c96656951bc81a2ca34f5d1f6e1798
SHA5128cfeb54e02c2c21154c4b92733ce2d35421f3d7a2e4222afb903339fca5014ace41456a36a6aec5246d7e49a6cc9960369151e64d48ec2ce44c9ac49e32f5afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59312084d839bbdbcd268aafe33836303
SHA1115671284854290349c6ca366298964598ae4b0a
SHA2569db8e93314820f34e16e6526765cd94c77616a195cba73bb207be8650602826d
SHA5124d472713a36e26987411c7d6dcb13bac8303ecc1fe001bc66979527a868af1944a8361acf529b382d72ee5b1db9ee89994c220fec3c79dfe9fd394c1b88ee099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a98ad139cce22486d59dc23603d196cc
SHA1668ce486c7f5399c4254c1ca5af5a94dade32eb4
SHA2562e5275ef98b61153fa9ae26ed923a46acb4f315b20a9529c5b0a274800e17121
SHA512258f54e63a89f7768f5eab636983f5b24eda5d68d29082e46f9341ef12eeb56723bcace7203a892363cf6b913267bba614321d9e72a39850a09f616c3f71907a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5092754953d3315904ccde938541b25a5
SHA1ecdd73444bd1427a9c446b16493e105ef47e45e1
SHA256db2a67b7e32fa1cb87c7656db8710aa77d41352766f10ff2bffb3904b5b923af
SHA512461b290dfdcd58138f765dde65ad210b2eb704d29ac8c94eb2241944fcdacacd292b3cd22b2d0c446cfa617dfb2a0aefda24dff17e6545733e0993c5291c20e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667a557cbcb64460e681de87b8e4db76
SHA1a34c0932fa8e9d3542391b234e523a5d5464169a
SHA2562db4ae701d46706f5a7c17d8f8a5f6a942747b47b670bd902200f67a0f806174
SHA512de4f4098ef0b7b7249aa885f3e974cd8432ab4e21de880fcffc83c918e30a3e9c647c509836688fa83ce7c3497128ef91c3f784c6dffd96c9b34de674ef4a1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532096df8d5b8d4fbb8928de8305b2c26
SHA119abe868a8dfaf9ae2cb45dac092717e24dd4268
SHA256327b5e6f728d0cdf0aa41e3a504e9e9ccccd21cec6e17d0f1b9f56fd6c2f15e8
SHA51281f982f0519ceef89ce40781b85307444a6070ac081967358802f9772f919806915b875b250f2d0ddfd5e5840ed1d4258da07be4552226c93ac35453a3ea5a55
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc