Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
25f215523a5cc5c3f0d3bdf031d791de_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25f215523a5cc5c3f0d3bdf031d791de_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
25f215523a5cc5c3f0d3bdf031d791de_JaffaCakes118.html
-
Size
44KB
-
MD5
25f215523a5cc5c3f0d3bdf031d791de
-
SHA1
88b6b78f12eb1c1f3087e4708af946282abec4ab
-
SHA256
7fdeaca8f256651631ba4172eed3b978fa67aaf53f74b9ab0e02372aaf7c33d0
-
SHA512
24a3cb7882b5bd0faf8e385557161801d7f75dbf0c775eb1b477f526c65e5bab92d3b471aabcb66579b63f02df8fd12b9723c3e421aebc64b341e3c5aa5a8179
-
SSDEEP
768:V1+/Mo9+QKjMonMQdfsFkJ/TkFj0By7t5QkeSq63tM:V1+/Mo9+QKjMonMQWFkJ/TkFj0By7t58
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426282495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e79fd546ceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a32439a6187334aa11d025f074532d100000000020000000000106600000001000020000000a11d5a98f1c27edd602e4374dfdfe6889e1ba9c34b19b7f0bd5a5339fa777641000000000e800000000200002000000056480ed0cdfc480c5ec4f390533ca0f528da8b1f463a994e9953f93a44c4609d900000007b9e66d8ef388cebf1adc201a1b539b151b170cf56a8c34cf333e06c0fbedb3b60e22193db1d90e98572c4742b977a1a08c53d79790f33a207e7e0924530df636a8b59722db608dee18b91758d57256350850f80d108be1adeef67deb140925d630e453eb629c2bbf52af33a486dd0d1c09928de0d0ce3c34c06dad0092c8a57252081d509ca0e6d15c07de56c852ea740000000f38c2c3c2cee526b5add286328be6802016506b1853bb59747e0f04329e81af267fbe93d52128dd2b66e2145dafabefa38943e061364f07d19f705f0e2b3bca8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{012002E1-3A3A-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a32439a6187334aa11d025f074532d10000000002000000000010660000000100002000000049bef79f55b3c300af689eb5f4c0416eaa0281cfd536b3b8557160d31d7f4ec2000000000e800000000200002000000068a18ed7099bfc360eeac1b4c437e92744f6136b2a76fda7507457a649950ef62000000048199ff7441b8d8b3467a4cc6214067736f43f9ce018a3b82c9689d57d1e2bd940000000f68365b319f7657db12b7f8a5a7693ce6b39d54969ee8d0b91abbde64f80d1535824113e762caf678d7ad3cc37c3a1d2d3e87abca4cd5fd9bfb8f30c9907b949 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2332 2476 iexplore.exe 28 PID 2476 wrote to memory of 2332 2476 iexplore.exe 28 PID 2476 wrote to memory of 2332 2476 iexplore.exe 28 PID 2476 wrote to memory of 2332 2476 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25f215523a5cc5c3f0d3bdf031d791de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59385b8809c0569a272d1567c69bd4db6
SHA1ac5aa9cbe70dec1501ff1a51d7131b5d971f8a29
SHA25681bf06234b4ccb7503d8b108b6c7adf3e0838466801367ef88a79f10192f87dd
SHA512a11b115b39110ad992ad55c31d3d0bb193d1ddf94557982e4c953bd1bd79b024f7417011bf4f6b24d4a0dbcbf96d60c1c8f664c2b18a56239c69b59900cced55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427d6999bf2f14ac3ad8a9d2aa5a9504
SHA13742ef2333de7da9ab59e8db389ec79615dbf32c
SHA256073ae183a31ee8828eb914ead1213528dcf8739cad4f4f38a94d7f6d3f8d62fd
SHA51247b96811fa3928816b63d4d813a022ef00e4fc12154a603fdf71468d554776b6dd366cd079c59ebd7beb21f90bb2b35f2b1664c3c5245be68110aa48e7f68a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7821bf6dbc4d00ef34ab3bda64a7829
SHA115f776cbaf7a60a94f60e0c56913d51d3a918a5d
SHA256e3de472debfb6d11fe2abe0a903e29055262d77bebc1030943aae5f9d882b922
SHA512d148c533601bc9070b1af93bf833d2b0ae22078b0e3d6497661dc406a3537ef40564552506c7dba86c190a735061acb7414fdf8915333d6f13e5ad43bb5b8f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56276ca7779fe9a9ed4a9121d8b5d8387
SHA154b34f1c4a2894f523cd3e553dafab8f66ed773e
SHA2568867548914dc070830fe408cb608f52853fdd852c9e796980ff5b0c622285ad8
SHA5120c83a9babe06ea87dac685e6708304f6167754f827c25efbad24f4c7abd2dc7af91b7ec86c281979a761461c07e46bcf499c10470c58806579ba687db9fc82ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58429e515fa9d5ffcd193e55cef1826c5
SHA1edd6b77b421ee0c618a0e41573f4552a1e2e2484
SHA2566046fe140ea1d1e60597fabc9adccdbb4452c3a7b32f9c0422af45666dc6ba50
SHA512dbb49db3e7e91a4d4a02699fe9606abafe6025c7d0f660c96abeeb4b27ed87ea468964077a90171397adc5fd0f79ee0662158562bad5c7a6e4815f7d36b092e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e247387c6d4fa340796922d67638e8f
SHA19b318185aafa9f3821fa8afaab5caa324754e1f6
SHA2569500ef827dacc1906d7e40e0692859f6a68933304d2aaaa0dcfb1f8aa23348fb
SHA5125b00b5693f9cef52f5a97c33ed63315ba0a4ecdfd2a194f561ec6483394756d2ef2e5e4fd59a5a25a9b6159c99aba4e8efdcf6c55f7e70f4c03b9b90ab8c1052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b970ac9392304b12ec5390ff9f45e88d
SHA1d121d24557ad398c39f9787bd931a486379d4fa5
SHA25658cb4485b59eb28f1dbe808ce607aa6a989297dc0411e0ced94d1f221c45d416
SHA5124b66d0452ffeb05b58ddeeb7faa50ff367da607360794898577612a2a4b5a743d315d8a87caf165c23949237334cc215f0e12488bfb33bf0daeebdb2b9e47ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575866106731a636836f58d3dbce06df1
SHA1b4ed72969f11507e763a5f3f795bba54e7e058cf
SHA25602b33d74f52a72c57d4302f7cc2f21795b4b2a125bd0df01630da8155f2fef8b
SHA5122ffa90a12e04f5122b1f5bb0e5ba6f0be9d54e9244bcebd2ce6af2c83312086bd262008279bd61689e15b7cb4a4ff0165607eaef344065b32799b9861d427484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a00fbef2078459761ff42b69b0026d
SHA1ae11c7da87382b42ce1fff8a3f6f260e8d765747
SHA256aa60c2392e699eedd925f7f8033c74b23ff3c045dd924e6b6cd5c85a7965cb0c
SHA512f5495c826e7ae7823944641b48232dbbbe2f99c2280b835ed5a184841aff887275cdc27b1093f0291e4c385c1d2f36bafe3991c322c8445bf55c590739eead86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b282f5498fc4beb2afbd232c3f3e4be
SHA1a8588e78944126039cd5798980794ccd08c60c87
SHA256b385418785f4accb34a44598b4854cf21ba757ecbfcf31d20c8441ec6239619b
SHA5125f171cc4b3eab1cf6b31a7d7e173a7172bda808ab4e2b9eef7070846a163e8462db613cfd365975c4107eeff8b416a491d713fdfb282a24a4c28b8408ad3165b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b90e2ec2eeed9b9b7ef2f5839bb234
SHA150d8052525c72225d3b0b93477f198dc53adf503
SHA256491a370ee4644c4e1c89d9b7e9d56cf76eb1552b54974f9dc4c65b92466928e1
SHA512ac968ac99076f96c01d5929d49eefd544a7668887d021448b52f32811f05221fdd6e13a67c007ab98fcd2bdb747c9560b9ed78b0be3c718fca7df8d070379083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594789bd7edbd9f399908248b5beb748c
SHA1e618242a3019ca7615c856c2648fe7074a8ccf1e
SHA256cefc0d654f1539fb1d137541eac241903fc55ff7564c01a54676ef39341ef588
SHA5126d29b899a73ae45190f0bebf37cfd162b080bbb35dcbfe8b856e546dbac4c4984887d34deaa8bec3e9e7f04ca0eb3d28cf610f3f3e6ffc9efc8a4d6014d88082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6bad894c699d365d8a062243073c6b
SHA136f43eba6ef65eba92cd566459970c562b608657
SHA256db594a0bd7c7ff299b16dd1f321b3550ffb304ed3298133fa27de6c73cf93d3e
SHA5121fedbed3abd939fb729ce72ef7e62ca2d9bfd073a7bc3a2d1e7feba92d5971956b88d1f9cfd92327c174d9194e1a0bbae64b5274049a8949273a724a33bac546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59174a7ecabada29b69b66b062e6cd992
SHA108c554ccf001558634d3c327e403ca769db7dd5b
SHA256e501347350a5111bf8f7429e46911b670067d9404ac4f234141ef662b4008752
SHA5125440dc8d0fc71671e6044677b4ae22133d18269e6309cd2cbe4d4ae767a37d5ad59168cfffdfc7ab244e26d8038456512bf3e6aeb631ffbe349d3a664628ce65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cdab2faa387da8a4b6e9e91413bd40
SHA157b51d2198e4a407fb5c677ad892f1ed8400741e
SHA25676037c4dbac1c5103a16357036c87320a27d74a9f739143092dc359a4e71ea31
SHA512c9ba84e0b893c81754c34055554ddaa665f58cc4c972aa378585dea6e600fb9d08306710b6587051768e6d1064ef12af15fdb74280ebd6b8f852d9ec07d6d5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cad5417719a62fd49692ed92fb6b89
SHA120f88fc245243567ca80d5b8bce9259acaf87798
SHA2560fe3a002851b3c8bb04e8f77ced98ff2b1cdac8b753425de1a2df98f813b4bf4
SHA51255350a6a5ce4830bb42e7032f49b7f81e69870f696b7ff0900bd75956d374598de5cc47a08efa7ad841347d4dfb9bfdc38ce5b2d39ef0e087f3f4c1ef72d36ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc2ad6cf88effeeb40b4cc059fd3b60
SHA13bf89c1d6c93f735c25b1dfc3e48261d9f399b18
SHA256e9f577bcd4a91a4191470a9a8eb2fdaf2bcbe8423fddff9f5483a9e4553e418d
SHA51238640b3430466ecb3181b771b16e5eb751fbaff84a1936ecccfc0b5dd71868de63a547b9b07b2b3b7514d27b023e1ad168faf26c172c3e28536e710f7a3fe5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bead1b235b84d5ca952bc281433eec34
SHA16f046dfb696d626c8164254ccba3cf137e544e48
SHA256301438105dbe13ddda0c4d4097591a2650a2655a642bf76cd8e55814c3825c44
SHA5129e05f8944ffe17cb46b876648bc77248269203679f16914c75652334983671dc198786c143bb4499a8e4decc180308897ebe59f3b72c02629b33b49f4e9b0829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9392f100ed4b7eebe67f8f082cade9
SHA18c07735596da2090d6ca9f2a9fac17ab2cf7beeb
SHA256e1527456424e069f9366912a32aca7319490ba539ef24a4e2208b857cda5e8b6
SHA512f7de90f13af89f781222c26244ae29f6f8d192171a5639b0e465e5acbeac0d8216724ff5259cd13265208a303b3d8f17987c8ca572855efcb01e4e1c777faecc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b