Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
a9659ecbef68fe65ceb7136913367d54_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a9659ecbef68fe65ceb7136913367d54_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a9659ecbef68fe65ceb7136913367d54_JaffaCakes118.html
-
Size
4KB
-
MD5
a9659ecbef68fe65ceb7136913367d54
-
SHA1
070db88a62e38eef1c0aeecd11a8c978f3a67d86
-
SHA256
cdca82f8151f039c5da57d755ee3ea4581ec8f6803dfc962e43b59d26660bae4
-
SHA512
1642e1330233e8bbe1c0baabb2e55c8ceb2142b43f6e3a67c3ec9f3cb8be397c4b89d3506cc32cf758fa4cbdd8329b98940fa01f11bd7c769ab2a5a66fe49e02
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o10QH2d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDR
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005939d84cc7fa3f448a52083f633b20c5000000000200000000001066000000010000200000000d44b118e7f15678f591d66b1790725d08d2110042076f74d16b7122e7cca174000000000e8000000002000020000000a27abdbd55fe4657b6ffc315c16c7d6926709b496aab09e9e4904526839cf624200000007b06a65fefcb6cf1dd4e41ec53d44d177221b1038e3ffd8c4165a850befe2d2840000000eb33f518c7b3460145db249444968568872cb901d0c5662ff2e57a08ed99b517dab895d29806e3b2ae3765be4c24eb774f47db8a68bbc53d160aa14e38e5ea42 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809ed6f04cbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424525899" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C637B91-2A40-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005939d84cc7fa3f448a52083f633b20c50000000002000000000010660000000100002000000000eee8db4fedc33e0297ad0fd904c22178d61afaebc5f76a7b7acb42e7ad09b1000000000e800000000200002000000060cef0116c1f2e8f9bbed0297dca23a34e759d9f348972d7631ec26887c11469900000001c295073585263c23f09cafb9db97db7dc95e73bc96093658987c09880fe2909a099406775dc4cb51cb68ed1e01631ac6e524366114f04ab7bc88c31607e2b6acbda29e6a529593c0c2cbb858be61434aeb3254f5b0df46f51026cf3ef98e94bc9dd6012f756d2b1256ea2920b31aea08afa2cc13d96254a4f5f1e234ec98fdcb8cbd8039c1e24589da4fdc1db73d16e400000004a8820fd6afabbd9cc0d3689043e5c69cd9dc1f3f7356ede1d7b0038f4a1c7081fb6aab8c0c758a1901681a79a13ef3988dfdad235456ad4340683770ce4fdca iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2176 2360 iexplore.exe 28 PID 2360 wrote to memory of 2176 2360 iexplore.exe 28 PID 2360 wrote to memory of 2176 2360 iexplore.exe 28 PID 2360 wrote to memory of 2176 2360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9659ecbef68fe65ceb7136913367d54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d979fe7f76fcfd2ded955fcc59d0db4
SHA11e4c22611b18147ae9a1646e891a91262fb3f3a3
SHA256464cbb813212e13184ba55a1112d2b2602eee2c8378dee004dc666e731d6846c
SHA512c4de434f9e87c14753ad8112356d72d9b6d79c08011bc98c7ca919295c054f71b051334b684cb970ebf079e4d8fe302325251c199aa6b0237628908152d6b81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6eadbbc5fb7af9841de4d3069d43253
SHA1addc1ac30eff6e74152212e1125edfc109bd54e5
SHA2567d098deb282cf6215ca052bf2d9c634fabcac1d0c7f3db62b5e28d396a29820c
SHA512d53c69a1367a36e0baa3e8e656a8fd8d3653d30a75f31d5f73fae391a06bc16dc306dcaead435915939cefb2f030995a9d8426f06b3ec4dafdbdbaff7ed860ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abc66060000f1052d2d364b89e4f2dd
SHA1a16b046241e5a2dd7226c224c8aecce085a848b7
SHA2565d8e9df442811204e00b9f8513c23976a8403b2c4c13c054845eb46ce42ef554
SHA512816ed33983a92601b7053406099520746d9eb43d9a61af588082073cc3b89da18c8dacd23c82f49a77bcdea1c6ad3d8de22228efeae9be8f8f25136167ec8f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f692693898d375b8bcb9c275eef5ad
SHA1bdfe05bdb12f6509f5d87822139b7cec1514f0c4
SHA25612805a1c5fad5a5af25ef60b9cb3b420b999073de2d6d195834a5fb37f874105
SHA512ae2f697862706ef91f025701ab3f970cc627993acfbe719bf46a3c3acdeb69c52619beccc833dfab5090b09a31578fdc7c9d71b22141d239740910d6965ef6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509da4f27ecf861a5d0008c9919005cd4
SHA1c49c98173fc73ca6aa8414dfaee6e796cbdb4f48
SHA2564334565fd502fe4cff575bc2559a25a3f95ab0b6fe975b7e99c8023af2a8d456
SHA5121b879594193d938f23425e09937bea4927bc41e3e75bc26b5afed553e6d38ab0c05c69caefa2b673918df6cd8eea6917c7c8c7abf1f89682fea36f4f461989fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efe1edd1e0374e3ef9a3de249c221bd
SHA1cb82f9e8041cadedccf5251eba5847ea543f2adc
SHA2568d45ffdd23d86482e7352e0d0e65f7d7e9f5f2f3f58a2b217d3e72860e42e150
SHA5123da872cfd691655f2d65992693c9f3fc7b1e96b2bf13d2e405b5db6420afd884c7639900606ea972ef4162c2626141efa8ee182c0d0760b35543a74149568ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952dc763c51ea5eac2d89e60dabccf5f
SHA144f48f87e0ad716ffe6e35022e2f11126debc43e
SHA256fb7f560d81d3bef25066051165223b5bc5cb6a18028f21592041e29c47fab996
SHA512391ea8784450ff2f12a8a96536f6fb0ae2c97690fa6487d056a0c617687873dcc7fb26d7b8bbb22fd5086fd4e7a8020d56f0da69d1ae210e51fbff719d9aaf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f96c67fc2e077f2218062f3fe4604f3
SHA1f78aab7cd612c3ada9891c7fb2cc69be608c15f5
SHA2562aa465477ec6d7ea5b2b2a4109b93b5c824ee3d1bab3c64a815617987918c8e3
SHA5129254cdf228f49ff633de350e40207b20f2db44e3a2c9afdc6d05fe66f9a118d795042b6c6eaeab563b56150694aa77a765cbb88c0cf6350c98feb7530ed169a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22fd907ebe9e99633d661e8f2cd4ae6
SHA10cb0f04a26fd4e4453ddf553b515f57ad5903ac8
SHA2563631b58f131af31a3a8c4e03bcf3c946d095b46ecbeddff0d3a92e7b43dca784
SHA512ae7f9567076da69853f32d8b247405caa0796f9c8fec5a524f21a396ef0481cc6189789ba161cfdf12d534f7ff6f92892e90f0fb87ed675057b2bd8cedf30e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a412525a710b7a2f279f08b460ade12
SHA17f50f63a4a70cf6ef658c8edb4f92f556ab66622
SHA256402c23a846cf95afda85fb2888a509b72bea7fa70a1c7ec7fbecf484664ca9ad
SHA512d2790b03d84737be2bb4af9dfe7b0b04a085e211be7c307536ba2eac075dd974f15667a68e749c1d0dfa6e7f1c41d9a46a66e2ec258566e6b2b2241d281c5332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52877305375c81063d06690f8aae28f2a
SHA1bd60af9414a0419e95f31b3f057e2bfad421e678
SHA256bbe7637418a21462a653654c87015b12e5a9dd3a46ab1facecdd6d837a077496
SHA512493ff6f762d9e35910c6eb42c27434f3573deb18eafb7cdde47f2c85a3f51d052878ebe6e6f0c4087553d56cc7c78770a4651b6e4014df0594434379f9ee8711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac66cf638bacf6ff8ab38296a66a5287
SHA1b1057b7b0f1cd84d3a843440e601843757bedb08
SHA256597db7d7981685e4930ada7820579506f1ef716b795f6d14a398acf3559b1ef5
SHA512383e30699b9930d0da30baf47bf888ab37d3b22dc51e8cad5d859e29b845da2820c29dc6bd09894c7c02d800aa5d6021017b6601c7529f364f65fd3788af71cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541823aa28e9b9245b110c148d95053e1
SHA1215620f0a287303f05afd6745a595dea7c0c2a1e
SHA2568b73ed39c42a29b09645f40dd62b8d72b41a5a605c04d46b21bf278a87a9cb37
SHA512b475ff9c78363db38834600e112391d629eb4123abccf064ac6938a4fa128a934b94cdb47cdaf0fa6068143a1f58844de4c90bbee94f1bdc6b006d4aafc5c8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523840216082ad3c90de0f07de707d3f7
SHA198fef6981ed0dd8502a8d0afdabcb32a9c5c880a
SHA256c31333cb75f547194a5d6fa70b3ad7879da34f562570f104057cb1aa5373dde2
SHA5126ffe079c541e78e6890399b9eeb216418ddedc68f79616a9c26f7e5990dbc41792b7f740464d205abcb80d1903ee44cf9b755be583aae5cac9d9ff08ea242586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53844a5067a7deed0b3ba61eaa2783c6e
SHA1fc6351df95c5db726aa247f4c20428fdc4b41f47
SHA25643c3717a1e685b847f89d0719cf0f44099ef7b205d92536829526fb2ce3cdaa8
SHA512f70ed17f283ae75f3239ae6bc38883dc45876b29abc3ab7e2b4ab5557c08ff4ad038e916a6d791d0df923283b0d2cd099e5900bf952f1b3680253008663850d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f9faa71fba698206127c0ca5e7fed7
SHA19bdc6bdb2c0d88effe666fb067e43ab727e8732b
SHA256f05ca5bebcbc08f4f5cc4cccd8fd9d89b5e5a0680dfddbc58eba8d84eae13ff6
SHA5128d68598c34981d647d6152a974853ed089a45548fd2407f231fe08cc1472137d46ed353e7569c813cb6c7e03cbb00d0282777c33054f8af3ca79834e7d28a272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2c866ec14cdf8670596fbb7a13a22d
SHA130d1631441735ac0aea18c0cdb4d5649b7e8f9d5
SHA256af0adfca3b82d46878b75aad3e0e0adcc83559d591faca865703368afa555395
SHA5123654c0c3a8e078d8ed41da829d4e325db42ba84171d03768d94ad74cec94eee586f7f266ba42371f5498fac061a203ce78bf0baab08d9fc6f009c2c1b4194b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdefcf10cae3276824952919a7a41ca1
SHA1a3468ae41000656713c55ed250a16ef666672ec1
SHA2568986f743141048bc7aba3a51df97dd0774d31f81b01f75afcd7a593f314c5df6
SHA51236578de1e6693f3cb539aed8345e4e0ae4a399968decaf3fbb1035cce98c1295c510e28b9fc9b07d29f40d7557098e752dead26a865b874aa0a9106786de4196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b26c49fbfd57dcd974086c3162f400
SHA1a6b49f7eca9dd7feb9684dc2a579e06721a961f4
SHA256a73843d570677adc7ff47e24f4f2f93d03e8bb28c5fdbd4c1cd1a1d56c4b2e75
SHA51294f91e5713ba44761ebbd1077f1034fbbd0aa957a8bfe851bba5836542ad6b782c3374e292beccdc61c49b86ed5e50e0054a28b8e3f5ce9e1a0071cfbe8bb9ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b