Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
a1be42b76a02e1d98d83c5988cbf05df_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1be42b76a02e1d98d83c5988cbf05df_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a1be42b76a02e1d98d83c5988cbf05df_JaffaCakes118.html
-
Size
13KB
-
MD5
a1be42b76a02e1d98d83c5988cbf05df
-
SHA1
4307d776c6e5c7be19243f7b267b483a36cf7679
-
SHA256
d945a6b91e6e4bfd78434e0b0e7be4c71e5200c434d430b692f5af64c7510801
-
SHA512
7885d648ba0481945a929fa41d83ddfe24b98cb12d9fc411b430d0bd875fdfc88fc0497d5b251d61c7165e8a17022aea41ec69e207faddc6cac739bc2526f049
-
SSDEEP
384:3c6qPVfPXnu4RKSrBLTwtOeqxRXEzuEm8VjmFP7R9k:3cXNfP3ndxezuwkQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4FAFD51-28E9-11EF-9684-CE8752B95906} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000046da942beeb9cd85e3b64f4c1390727fe8acd2686659433a74fdd86afea6b4f000000000e8000000002000020000000a969cb55a9761af5536912b304c55160d8274a290f19cbd4e8ed13eb5509841420000000ec52285508ebb557e6152d8312befe47441ceda00bb1b77460fb562eed82eef540000000cd2de3ce17d82d7c186d528920a0ff473e67cd7a28032ef4af1ec7bcb439f4161a2b258769d5a4a885f08b79ea6784739a6354ccd8fe813370540218782c21dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000001b134a356e695b556829a76b50092595a37a372238418cbac2b48425708ee684000000000e8000000002000020000000fe88496f5841fb648269dc7a6f00497aafa9d8d6a53219f1a3f912090e95fb24900000008ba923243b113bb777aeca7013f91d0f4d03763148e03dbe09d81be6bc5daa754820ce38ffb27812410a4f2e13cc78551bc21cbd39814c7ee9b47624ea42b9f28937373ad989980c163592b5875ccf85653fb82bedf02d26c7476bce517e1f0ab50f64e2cb3e2b47b1246693a3232918606399f1f4376df1a67d8769543b1809d6ee272c0e3f7ca021c5e2449d666233400000001a730b29ceff458e7b5827f11c1080379f0cfe8ed8a9072191c98e1c2837019c52c68b38e98a1d66447117a4de0fdf060fe3b58084ace8aabef671967dd13d23 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601cb093f6bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424378812" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2360 2240 iexplore.exe 28 PID 2240 wrote to memory of 2360 2240 iexplore.exe 28 PID 2240 wrote to memory of 2360 2240 iexplore.exe 28 PID 2240 wrote to memory of 2360 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1be42b76a02e1d98d83c5988cbf05df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d01a3d0aab95c2444ea2939f72ba36
SHA1259487a8f10904a710e1d78c282c879d8913ffba
SHA2562916bba2a63b905c048a280ec7b0ea2081b554cff584cc26ff2484c02337e58c
SHA51237cb1d2f2dd479633fd89695ae2fd8f05bdf2efcb42caf71f0ab5c0ded4af871ff4a800cbaedf19e5e8a70529919f6201a72ea224a096163b7f7303a7312ca09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c0901d56203a45f2c320b7bf856352
SHA1956dda3f13a1733976acb269f779b5fbda2055cc
SHA256ddb0024ec636c8afc50673855328461cf5ddc2b874138589851aceb2702e561f
SHA5123b0d14b33abdecc8b69f148000a9d4f8a509b8de82005ad5f021582d71e65211416a99daa66d5cd060aedbdec72e0a732b5769d10d129e49eac67d9440536bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efcb16eca5bee66db4509d2fe95f0bb4
SHA1889fe4dd58e73d9e6c44574be9e07ccd363cf1d8
SHA2564722f155dc8b0c2f68bc500cb5e6e9920eb51122ddd65e0b5699a3127516d593
SHA51204790cdfb9ca8dc8b2a0e52d5bfe9fb32118b35ca2bc8aba598efe5201423164c4cdaf943aa195744be6238bbe8cb19d98f45fe365081eb9dcde331961058ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cda8ca3c61c6b9f6d2e77b814594d47
SHA1d09b3cf67f653a27e30f08fb1d8aa9d23fbc9fb6
SHA2567af0c6bfc95a489b4f5bd2ea2be2a499ca87a873d1116c87057e67177ee33ee2
SHA512010c942bf71ca765722d2b96ac78df86ef54257e7ea5bd2997d84e4ac0fc972529dc348aa7ebe3d38aad5369f5acd72fb4fb2cd53c1bc685f748a22bffef8798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be60ad1ef59d995d93892159a577d1a5
SHA1648c36a47cbe84143ee0aa77e84d3d6e8c59497c
SHA2561a154ef611d61eb3f2f582269a65bd7ab761a5f1beb5ca4082a9ffec2fa81e90
SHA512fd2f1cadfe28263fc6b895de7372086a55bf6cf64813c03a0dd352cb54934a4ca831fa68e7b2e1d9471137e411ff00faacbb6e7d97cce202b100958d2f2e7af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11fa038bdfaf31f12d6b86315ab3154
SHA1393fc2f510acaae23b9a9909d0d83332d770a452
SHA25683c7690f35512e0b80b2dab8948ef9dba7816aa0ff73f73fa4bd59b2b75d7ce7
SHA51295cd29dbff1007526b772744359732e9511fab115475e2c43f0bb8fe9d9c77a5ac127e807412812ceb707bac6065e0c3dccdd1fcda4e9dcc2f47e6ee23c23482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59405e73f236d42dda6eb79a4ab643232
SHA1af14935646d47af40b3b1f8fdd11545c692cf669
SHA25613b840a89d80e0c81a4caa1cfb24b5ab45180acbd5bd42fec449c2cc7b7aea36
SHA51250176192f0feb1a77d3e0985c96fe90cb4bdc7e22e37a3358f818a43d75c209a60fe8b484febc434f5182a6b436cda1e12850a07824fd5f7015ffaa4d70c24cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db6bc3f8f4d66e8a81f522616f18b6f
SHA133df09f24a8348b2ab70eda830ead48c85a6e02c
SHA2563da5dc2891ba9314028ef5f3acd0d24521e90a6ce4d4664b7f2b00c1bbee2a61
SHA5127d2bcc705375e3180d7140db9a0cfce34a5e655b4d811edd19d27aaa02a48e2bb804a29ce62dbf3ee06a2ee8626abd0b66f1a1b8d9e4185811aac5f3521d86cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4f8d99ec5246071575945af0b5c39c
SHA11548759f510d732d793cfd68cb1adf7fd660b9b2
SHA2568b06ec231d34cb7819de0b4180c78dd7273ff65fa1c4a68e358d96f037f98724
SHA512aeb1851ffebdaa9e1eeacd47a9fa07947bdc42dd2ecf82b9302bdbd07b35e93b5451fe506731f3b1288ba1ff3adfea43b8a2b4419277080a100a1a230c8cc2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9853ed5c3e5b469697721540fdd18f
SHA135b4fcc3dbf33cf57876b666389c842eccaa4352
SHA256e346b6e15dae14378a723a6be6b164bfd24497d9a6f40d66cbe8e3c69c46ca29
SHA512b7b43d9dda4c1af5588e05ee3be12e138172f6080890a86003f03db0c6ca7b17c6fd7b96970c596e1726f261ecbc72931a59525c617eae6f213fd8546ce0ca01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dce37b44245bcea86e4afa1c65781de
SHA1e40f79b048c05659cabfdac7519e44af0e23374b
SHA2568fff03c74491f05344a074d05630abe6c76c1fb4f48fba094488de4530f9128b
SHA512c43769afba5e74a25e72c0b88a9ed58b6ce01063ec9b24f55f11694989ad732b06729a9b4b738685234674705b1c1735b4ffb3655337dd7bbf58ebc07986f627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59acfdad430413086aac00fa3e9f21faa
SHA16184ae69f6f93be1bb3b6ad4000ccd12c849af72
SHA256ac04918e18762bc6e05eaf53cf145093d2e8fc95e9b8135900c49452330ff1c4
SHA5120c65b3b097162fd296af47fbe6e99a819199473d36e8c5751c5c004346b214c0a9af26c4e6d15d513a95156597d6a7639797a99d8668cce3b5fa170df2dd4587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170124ced2b3b3b6449114c501644942
SHA12a69a69185f91a70c5485acf76d4c0a007f4137d
SHA2560b7ffe2ba7d7aa98650cd2470358ecfd25940d1d87e4689a20a7f5dd6c0d136b
SHA512dec95eeb5b7eafc466473a246967e7231020db5faa039bf2f7b29423bc2c5c68eb2266608d121b4413cc90298f6082c937b656fe82d9372f3db3321ee245073a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd1bc10653ea183684c2b5de42df59d
SHA1558242673dffc190b14f9accc69c34501311b946
SHA2563b9bb7286ec710242dea2487e6ee7229c476ea6018dbd9cc78235c26d626bfde
SHA5121a38f00b1118aa26074651af4c7b9ce3611e0fa726ce357c5e89288b201e8860be91bdf77f332e876d211ad0ec74a4a0a30b7a5c1d10a28e872ba76bbf812f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967a26d08a65889ccc98ec2f31f84219
SHA1a446861f4f3ba826debf61bfb73dbe8989089ab2
SHA256c83a3e0231906cc2e6593a0923dd330e925c1c3a3a4eba019620461afec9c045
SHA5128f13b0c58bc3b07cf652e0919220b8e36c82e3c248d737e6a1750e05c475cff7a35ba3098d7be648c35daec956576c8b1e46f5e6a2163b1de6a41a61d9e668ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202ea4ed5d01b7d4c20e35e61e9dd21d
SHA1be14c612a2a50b049140435cf03e165cce2a29de
SHA2561353be0ec6423b9c86e11d7dac45ff5b0df370ef552edd5bb98a62c0954bfb39
SHA512b94e466f34913bd2e23a13d375b2a7d2e09dfe2e39d12782d2635711c73af7f67521ed4abab30cb4e2e1018803646e4aa0c004307742e6aad1b5c87f46477cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b07432c4a9db5529d531c897a250add
SHA1ba3eb05a4791136e98c703f2b91e00c567691b07
SHA2565334b0d24d3e47d48aa1c3b3b58be2b6c1cb3cd4a5d99c5c190545bb2b3ed40c
SHA5127e99bdbc58a94bc6f756f3dc222cae61f6aabd8d529d8541c6c41f89ece74563254e6addae130ce3de18a594aa640cc9c5db23dc6317605c4e6a91e56dd62447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3b9798135d2c47a7d20ef6fb6dbe88
SHA146ce49a7d16198ec92f51f7f15f17f787a10ee3c
SHA256543266b0884b969fcf91ace5ce65432be8685d9846256d6b8d74a32097926bc9
SHA51235c6fc6caf2d08ba2d48a602fc31e87f12a9dfe86f8131f67e9085e9dc7291f2780569d121b5809f75c066e997fb8237ce1c474926b8e98d9af611f498c96039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca761dba6e9a1c7f3d03ab3e5381f93
SHA14cdc9188a5fd125d239c0232618f8b0fdfe81512
SHA256a7c0a0943f857e0cea8aabb813d608ec1282a8da1f000954750c0f4a82db9cc2
SHA512444e2e22828254976ac061bd80c20f74c702b4c721d4fe9a02c7662b3dc51132a316aeb4b278d566e48215ea4165745acd21968160fdf3bf37ac7863578d0c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49176d023f57da4bf06da712d86120f
SHA1cfeb20e362f8e652d196175ee2276edeb77d475c
SHA256d356aa2b2148c2683bcf4365c6394fc625f621de97dcde489dd4be1e8d20ef24
SHA5126fd1189963ace6e28fe51387d4f909cca1c15394d85405013fa0d7f8aedf9823d5f97cd0632b8844f80c02dc4df6674dc1f6215dd02b72f892b621e587634bb2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b