Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
ac62435bd6132b1906f87712e6acdcda_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac62435bd6132b1906f87712e6acdcda_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac62435bd6132b1906f87712e6acdcda_JaffaCakes118.html
-
Size
70KB
-
MD5
ac62435bd6132b1906f87712e6acdcda
-
SHA1
0ecfd3f8dd0d0f6c656c3ab9042ea536fae49673
-
SHA256
6e2e7e2b5681e166af267e919b35e52e7ad46f590bf8a0acb44bb439dd983651
-
SHA512
872092ac09f28df56db792a279801598848bd7569f95958a5630e3d9006f5dc5c883cdb56cc15887704b59ee5bb7d70dafac8ed16ec3fc4c712651eb6b47f9bf
-
SSDEEP
768:Ji0gcMWR3sI2PDDnd0g6y/L04soT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:JiJA4hTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CEA6751-2AB5-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004b0962c2beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424576339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000949b56d373ca06a438bac2200bb546562dadff35062cc98bceef7a9a1d2e17b4000000000e8000000002000020000000d6fd1ff57308d3245004390f2984683faf5997533a8bbbe6ace17bce5110e88e200000008b5c7d869766296e18d3fb5ff4ad28d9f80f90e3ad8be364866a9cc8e355944b40000000afc942229d26281d5ee1cd934952e00e7070e6b26e6a21012c092ae168524489344c7a4e28c743f72619c737979655403783e96f8e6645e261dff63de54e6921 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1720 2804 iexplore.exe 28 PID 2804 wrote to memory of 1720 2804 iexplore.exe 28 PID 2804 wrote to memory of 1720 2804 iexplore.exe 28 PID 2804 wrote to memory of 1720 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac62435bd6132b1906f87712e6acdcda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5376922dbddcc18c6d978ffcc4dfd9c83
SHA18b2a2b17cacc64e4f2ab74eb4336ff7165f0ae66
SHA256852d434062781213577c596bb605cc41d386029076166976ea805f3c0fea8204
SHA512e02c783c8b037ba8b40f17d39470e9a0b49ce50e57571beab75f0be8d43c188a4203f2e13948d7c20470b8459307e861d37f738427c89b5bce3fc0e26fb37a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a088f43966b0b56391edaaa73ad8b4c5
SHA1b6745f41875dff78f16f64fd6725808738bfb67e
SHA25674fde0279e85b66b9118dc0a71753e3c1c5e703cdf8e1d6720cfab6d39ae8d27
SHA512c2d87408dcecc4be05afb4f85699194a243c0e0d48f2d3ec038b224c18764ae76f58386b75282b14d8443c3afe60cde1d6148c3a6b670910bdef38f9c1b2b51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521419a26987c9be12c7c03250669c2ac
SHA1960176e09ddb455f8b4b19122ddc59929d2e0d1e
SHA256acae44fcbb9f756a9c5f10e7030230692579ed8ff0f82f2ca591e451ec60598c
SHA51265d20fea2847405e888e2e29cef78624f76af11590457fe2e8ac148be17d239ea5e54cbc418d93b2b80c1973f1928035fe0813364ae1ee50d90cbf847c508d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a5671d4c2880170ad36631bb3c0a65
SHA1ddca53f0b970903b61d837717f7553a7e4ed488d
SHA2563bffb95df111b351a4123003321214439be3aa2567a76fc2f78b3cedb7db2bb0
SHA5124c45fa780af924f8bb2321f7e07877613516baa66eb0835c1f96d0e30c7fb6b48d13f2291c9cc8ecb19eb525ccd4529d309f7a6252a62b7d560177180dd1c103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2c8d5205c1713562cb821f2c7e51cf
SHA1e0afcd94c6bdf88799187b5da6272db359e74989
SHA256c0fe3444cad56f8e6e2944e84a7d4e722976e2c243628ad2d2ac8a547b187e1d
SHA51205903d5d2114d1b80594e209745fe58c7480fd35d9685c2f3a54ea6ca7f6c41dd5b8277c423a9cea97f33f0aef3458e2285b9791ddaa9d464be97d3b62756bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de922ffd65e3b10947b5c04721c5d08
SHA124d5f644537e7a0d19bd97833b69c1f3f8f7fa14
SHA2566a9ed36f1144dc31f3e7ad02c36bfa0781dfdce7864e1e53c254ddfe55933ae9
SHA5122d8b80682e71f61cea471e704918a366cefef0ea4e329c908aed525162d5875c03cbc4d1c8d85b606668b72d50bb4d44d643fdf15c4b9d2afbe7715b53d65680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db30e835ec2e539c63516bd2fa2b0f1
SHA140d2421adb5fcca10c9e6c43334216c17e853588
SHA25621ae259dda83179df61f5bc8d7d51e1379b4f8376a856b72cbf0ba6a60d87838
SHA512b1e27acf3c47bdd5cc86bc6b649e0a10b3752e17f0779a26bedbdcae6cd797adc8565d303312157bfd92225e98ad81fd3e27cfb8b0083c253b1b0b13991fc573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579dc31ae2997d07f54ae1a811ac9ade2
SHA15d66050318232dc34cf11ff8fa4d6cee252463f3
SHA2560c498739d9aa67fb6c79c5ff3ffb332b92f82a6a0c7df42e99b7977dd6a55ef8
SHA512a002a134b34926a73d33d9646d642c247a9833ba4408d9638440501d040b3a9f1e7ccb27ee457b58aec41d70b2773b764d85bdfc7c6e9fd3e36b63a161d02733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58297ecd1308efe3a362f2d1eefe7dc36
SHA1c377feb18536494b4479533070412cf3b6234030
SHA2564a09039ee049d1865348b2ded589fe45fbe14e6cdcacc6e191a033ef44eea3aa
SHA512031240a010280a6e06c26e264b38bd1ec3b9d95a8b0d670a0b4d999f071da2717f6075be30f877fc03959ec7965e9d97df448151b1174972d2af9f08d816eba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59173b789b6d028002dac3c2ebcdc86
SHA197ce308a98aaa77690b09f74da1121fab12f20ca
SHA2561ce1a4f0302b12c636bf24559c5033d97d54277ddf26504878963dea4f996e69
SHA512e2aa6c532ec9fcf9e3bec1db523947a6111aa04aee902712a9665742bae7328df587cbf64c0b9e4b33362c1a2cd1e73a3efa22ad47ff519042b61e41898dee4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b352c6ab46a7ecc91f752bbc89aea1
SHA10a4a09f41c3d3fb183ea35ca39c02625e57f05ca
SHA25682c6b2e51236f8922cbc9af12ffb48dd5a6fb882120a5696c945a4db74cf3932
SHA5122bf9b2c294d2aa5b3102f22f00a8c050dd95994aab594e1de7522d5cff7cba4f6ef7d4d7f30102bd9a72749866cb955955c27d24731f796ed6e60da447571b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d176eeba7c33d9e2d456e776028504
SHA1a6e32958a7450d5ce60d6d6e553681bbaa0856be
SHA2563e792de1ea8d9529b893db4d2bdd4d42158b4e5f00d6d5e5d48bd1583b1a0c33
SHA512e3286c23e8ffcf010f4344663ef7fd93baf0f136da46e7abc7d829bc7b262ebab72de8dcc1db4a151d7c9d1de8e163203eed8b9b523bddc979c43826ef842e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de720101dfa740912a8ecca758519f3
SHA190d9d7df2116b80bd6824874bc80db4b9c531059
SHA256fac4674c72632d7ee45868e32b43c890e6b383b729f61660859c9393c070e58a
SHA51289b0c91cf80e99ea085e7da960f86ee6fbb833fdbe9bfaee4dad7fb785ecdb5eb2ab1078669bf111d7615411f1b57ef3de3791637da65e636a7c1e13dec92e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515e21a1e373853a5fa8b235f40e171e
SHA1b1e27a671030f6abef77c75dacf35d274b9a2959
SHA256bf8b963ac275bd2dfaed8e7abdcf15d4b773537fed2057724b3b8ddbc3d0f4a3
SHA512f39c3adb3e7698d8d280eb1e3ff1814d4d31f962cbb5b2c0dd5606a0ad4ddb9baa5654b9986e3073830dfa34378a8adc1cc769b38d0152b87e6495e19226f204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993e7d129c736c4a0f686cb57765a0ab
SHA1454d8a6ca4e8084a44de4ac0229e3a7c803ce164
SHA256454dcf8ddc5f84cd4276c7b0fad0952b0135117fa5586c4d6b8a6c5bb24f6a13
SHA512774ff3160de83eff808015aa48bfb48310f57dee4a7e090204245a3042ddef4a87aa8097e699d02ff77098a3244644f6e5b4430645e9cd9ced0b586329d67ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77e1b7df0445d9569d6db5853750250
SHA1e05277dd4794b6ed8a31c7f1732531b45c30b96e
SHA256044e8c11c9fa756674468eb77bc7dfb3781341e213e23ca9ad3b5bfd44d01f63
SHA512bcb3630635a27aacf108174314706a12f416faa105c093c1a72e080dde3d81fb0c5c6ece9e4ffc71c51244a1fb9bc77430abd8c3309581e9e00be5c9ddf7f771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80b0b969164606c2ac04b9bea4c2e7a
SHA183f430bf88dd1447e9872c5340092532038ef027
SHA2569326a088fbc357e059357e820db4a457f16fb3a5b6360391d8bd9aad05f64147
SHA512fbae4743061342611897cd44aac1d635a325df88ea5ce9f092288b62792f93b48e6643c863ade5880a7cab66f5260f79ae8b39163bd6532a218c6907f565febd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6ac7d4c223528d3e9352d8f755c47a
SHA122cd15cce53369f4ebf0b24dde60b2d06609fd9b
SHA256584b3fcc5c1a2ba62956b2ea62a01a78c9a33981c7f601b22a2c234538faf2bf
SHA512dae38e1980b26c89449b64d6996e33d4c501fe29a0784c09eb5c8d08ddef9f573b95f0301eaf62599b0468da51266ebe24033cbd399f227501afc2dd7694ad29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ff0e5c1e5167f9aa60463a24f6efaf
SHA1a1170b23cdd7440e4bba6ecef2b2132d88313df4
SHA25614331b1d6bdd0ea0307da7bece6bb40b9091d8ed312b53093a6dc49e2fac4f1b
SHA512c1d4c5023638abf252b3d8f53378cfea307ee1d0277c89ada84a132105b6c53884f1e7f38b2eeda2ecc67ed1ac5535bdab9f73173f0e556cb8516b41f8d52319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0cb56b059c5cff23eea49736751dd47
SHA17786da04be068557a762338e9893d1ee9710c86f
SHA2563edda263f49d7ab20a9de52dad08b7f363c2de37fbedb46e5013a3eaaf81b4ce
SHA512f6bc75f6dc41465b0ad1cd5a84ceb3f19a182dc99b03df4136476e86642596b76ef760543caac3e85a043b17e7b34ee70dbac1d512e25ff2392b8cea7ec7a816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527aa6394183a82bddb6448faff4ca51
SHA130fa865e87f0cba7c69c0f8055197823c184f082
SHA256fe27c8bcbb22619fcd322b76321391c14a9bc076187fc561b05e092e115e2dbe
SHA51268371350056ed8ff12ccfe5bdd46a7de7cb20e4683d9f3810e3416f2b1d8c7d4c4a842a59bc770d72610c4d9713537403c6cf42186886ea90e55400e37b5fbdd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b