Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
87e2c3e1df2733af47abf642906887c6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87e2c3e1df2733af47abf642906887c6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
87e2c3e1df2733af47abf642906887c6_JaffaCakes118.html
-
Size
35KB
-
MD5
87e2c3e1df2733af47abf642906887c6
-
SHA1
839c7c38b6d73af492cdcbb1f813aa96b0a15663
-
SHA256
ebff53900a42d63217d9f886c0c6bc27f642ffc3d143d953c8f813377eb2daaa
-
SHA512
d0b3f198a0949a7d698e48ce489985218853019157d2cf72c5d9b660e81eb4745b7e0c4047b10a90ece3232b078cf84dee7a78ba48b15e43fbe9c44e25e70f4e
-
SSDEEP
768:HBmxjImPo02EC+CACACnCnCeCeCSCSCmCmCd9SdWJCUPSRSrNv9Sdlv0CpsAvcb/:HBmxjIZ0/FbbKKzzLLNNMSdWc8SRSjSQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008a12beb9d27868c2c3614540e2217087d40f84c2434c87a6e09a1ccc379531aa000000000e80000000020000200000000a04cfd03aa3f0c5d18dce65b36bb88b91b66c87a88abaf090669ee79ee718e7200000006db662b9a2f67ef20a232f236b36f99498b8f5ba5ed0754d19c1e259082ebe27400000007194d7935ebdae1962377256f385879da24bb4450b3afec31af5139826597abd304db132a6ba5488732b1ab4c0ffc96ab3122fb4028cb19ef85e1f7f365ab9a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423341123" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102bcf8486b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96DAF2D1-1F79-11EF-A585-5A451966104F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000dd0916b8f88e323fef390ee7c75fd208218d15ecdf9c772c2afc5f58aacc2d26000000000e800000000200002000000004556ae9488ebade1de04585f38131f14631e38a0d96e8a082ffe186643a449290000000c6ad660f0be49da9cfc07b4e9c2d9942a33b655cbd39102b508709d1683ec80abbebb2da764ee7aba256664ed8deb564e60ea55ecfe2630a6766e5b6a0c98a8666472fc4cbc7343e3a01356b237a4e29fa14b4f40934ad898de771ae024bc56dac6d11c5ebc51380ede8caf72e9e73d844995c0425bdd2dd9ea933453e1af13fa6d4274313473f2c5f9fbd7f2a25210b4000000066f4b6f98cbd1abf80db1332a4d33142396494bd122f3886a60597848aeea157b317d134e7ceef1a72ecca83107aee7ff136b9d8d3b1f65272de3adcb08040e3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2604 2296 iexplore.exe 28 PID 2296 wrote to memory of 2604 2296 iexplore.exe 28 PID 2296 wrote to memory of 2604 2296 iexplore.exe 28 PID 2296 wrote to memory of 2604 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87e2c3e1df2733af47abf642906887c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a531eb05c6bbc069b59af8d462d184b
SHA19e5f79a8ec58d2cf83037db045b030f10980ae75
SHA2563db530ac17bcf86d2997827eebd639fb71aac61485b6c3ee85419f0cba20c95a
SHA5121e0bda9bd553868d9d3c90af1a968ae136027a03be1d3363af46ad34e79a493e9c749d48898b6c22ca9384299f89fad001d1c0f20816fd511dffe8ff67d47e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b206dbe170418c3d2e5a699b089a96b8
SHA1c92edad46bcdd3812dd76ab8d6a9a8f76d20ae34
SHA256677d8844d49b6b19d5e0fc9376f67328d6a0b8052a1be11ee216ba999bce74c6
SHA51241f6712fbcedb8d3343d60d459d4ca899ce8a82cac4e4cb92328f1240f19e2dfc278d6839e5c2a420e179c12b2be7290158fce73cc42838619335c5449514d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6fbbd92c70a379f3d4ae71044c530b
SHA19a0aefcf50744ca398a42503d7aa7b81b26da48d
SHA2569623e95ccd765ca825af23a1472f7e22fc4584128c1c5adf4ef197a306537595
SHA51207db70f2f0bca697e2fca5c7e0367a31ce32684405ddf3cb497cffd077611fc11d714686b49f5f399a6c6dd6484725f82b0b20fa6154bf9d172eb2a846e66e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e75b8ae8ddb1146325a09520389d17
SHA16f3c48a94145d1ea48156541bafe059d8a5d06f6
SHA2566d873a52e201366dcc9b6068769f9eb5700980b6eb5047959fa3e5baf9155930
SHA51287144e042fa0ecdb2f0b72c34136441da9918758c7c8131c527f6b669bcdac9bc5694031b68352f3c01dee1323f075863a561bcad34fb2c1b4a3a65f1b5c35c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51197646dcf6e507449f31be246c6e243
SHA127e650f8965adae404e24a34415ed1c9a34cf263
SHA256a40c7fb26978698ce97b307a47821889245f6b556bb273a33d099fc9d2607506
SHA512812d0bb47e32d2c42392ed5bcc806b95e0290dfb99e438570346b48bedfbbc2afecb5e7698d3124cf194b2ecb89099d1fa502658b7791553f85bbd3905b06025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72d167806ac7fcb378753bd49d19516
SHA1b3e986c2c08396ac83f367b8d5008b0f927c6041
SHA2568e9dcacccb01941edd29803646f4cf444e976ae5774dc4ef324b4ad7754f6c3b
SHA51216a9ceee6478ca6fbabf256162a77f99e8db303ee7d42e0815d48291975ee1a26c2cb739d921da8447bf0158380dc0a4843fe7ffcace266a989531ffeb647066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511017169e2f816162426ebb23c4d768d
SHA18ac0a3d977601957f4c093734f234a1498da584b
SHA25664761f7a8083d89c125130167c58a7066934fd59126bbbe79b86fccbcd71a7f6
SHA512f957852dc3f7620bbef9c906de7afb5362bbd44dad627b485555cac2e8aab25a69d8582273dbee4cb373c8f444863ab95d10989a03589c532e04dbfef89a0dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e352760656f185d474f813e272c7a5aa
SHA1cc13204a057bef7624c4185f346428e4e6663e2a
SHA25618bcb9bda553fa7baaf161a4fb90ce4c6ce7dde4a2c6a7e4f7a01e2b52abf65e
SHA5129be93b6ab8b3246e8337ce6e44ee2b9a435d7d72fc4af4d6d9244829c22dee518130cdcbe4db77ffeebc40ee113e277627568327ac2ee842fe314c09eff0efd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ddb0ea373d8f0e58dcf98d10c18bd04
SHA15f0f012314bb2ca061f500c8441b05ff7fdb2d10
SHA2564e84f1f96480bac020f11317785d2f137f03f948ddcb2515ded07ef7ff4e2ca4
SHA5127da3cdfa729bc4abf0cc8aacb4900dd58a2ac6413bd29cdd6a1c448a1363c86aba54ff9405c2c4ade78e96248b3fa23828b6d5045bac6b126b7e45cf0e776cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50706b3903185a6746b1bcd275ff7c826
SHA1c1db6c5a4e7a9231d38ee48212577d61b95a7291
SHA2561dc8ac84830b892d9185918b1019f669eea0434451020f25e339b5aa1feb3e90
SHA51204a0456ee465a2dfd5fe8e9c8e10603d8bcadc86d1ddb881a205a148902a6c99a2d21598a116834dee0e232171775471049ce72b81e1dfc42eccfb32d9cfde30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a083f1739fd5d5e76d9d73cda5478ff
SHA1f586689a687c6d4d79019bad7f55fa4ffbc9ff71
SHA256c53510302728a9f6672cd903e7a211835649064c1d1899202b7fcad3f74b2eaf
SHA5128694067800a9854a02e98c1670eab1f37657a2b14be3bb9c1d4335909bd196ef085b1df3011308e692cd7d236dd04c139a62cc223b527d51a4a5053525e2289c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b586cf9bbfd341950af031f6733e037a
SHA10c9310f5b4a3180cef02ffac0089041b27da59c7
SHA256280df6cf1076199f1d8e20ecedce7972477abde1c4758a88d5158b694189b87c
SHA512f4831af4c4f96881cec12ee381a1a980170385a685384f24b183b1b8e29bf20f2ac4a419c4afed29390f11b05e92ba3a7fec124aea6159f8023dcf9cf9e9cc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557065e5f6eecc01bb14edc3592f18d85
SHA1abc211c89a0facb7e26f08bba875942915be26c6
SHA25676668be82b4d209c61bae5b7e071474d8bc394597b4e479324172305e0782171
SHA51257bbaac0fb15c3f85d9252f0da65759f2a8c5a6caa0af4b346ab2d96cbc5465d22268c488e045fbe92b6e8b125e65a3ace4eec5756a83adf61536d2f5e0fcb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4f0d9c4e22722d50ed3adac942df97
SHA1834ec009cc4bc110569dc516b684e29a7d8fdc6b
SHA256bf643fb010f43c14ea568e46ee40d4f0a88f47508ece9c559999e1d4783db75a
SHA51267c852998998ced218dba5b2b8fd3891eaa1cb247eea67698f3a1165992ec32fb454200229384a998245b6ab2adb0b9183781181784a33806250806112fb5c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd5b5a4cac3c46bece892cbe05eff10
SHA19c9a7cbf2164c8b0c1d58527c66a27461d8fd0bd
SHA2560c459d64e33c43509a26bc5e4340262a4034fe5a1fee6739582e85058ad54472
SHA512b8cdd35d7294ed11b9cc502accd0a768074fc7d245159bec066f08dfbe42a6bba763b95df99ee9fa3e7b4e08aa3474cb3038c31341d35c79b3e7b1af2d68a58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a0d93ecd02e4f94e43516bd80eb768
SHA17ff76d5e78cce3adfd31f07c020d76866bcb397c
SHA2562822cf33d8102cc6198878c9504799d991cdf8c7f8db027214fc71c96bb221f7
SHA51246c95fa2188051cf18c883cb3a3dd8ab981a2dbfafa590716bb56f8060bc051084f6671730ab897c1f72d62c198d7d98b7d247ce44ec76044751c3763e6457d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280b48d35bbb62e39b3c4c4568b260f4
SHA1923b779fc1b6f5a51355e1d7db57f0a31d2bc222
SHA256fdcc8cc28a0241691b47428bcf052ed59f0850d29272f0c7e1256321e8143755
SHA512f1fad760d4be9df001288fdd07cbf561a87a0d715bce3a4337bf9c7efb10c8280cc5e16303527460a2e782ae4599f3f9c21ee5f3260f248afb6987582cde003a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0339d88d9f0df65c0bb175df9a2034
SHA1c46c3a95c3d18a3fab6570d8dfd9b31f72c0295b
SHA256f4c7506493060187bdf12defa306baa901e6b666f84b4d6b7b14dfb0b02404d4
SHA51238beb26767aa821dc6c4abab49044b1f3a393f55b799af1b84c112fb984c33740a9a40154b5d2043860a199c2ccbbaee904de777f1eb85bacb60b9c65b3d7a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57107ba726f188abeaa1e5a88c9729c7f
SHA1de744444d3c9e38f466906f5e22695b308313235
SHA256a8d38638e28ec431b6e2546eb868629b5df5347583dd50c0984c8593e768688e
SHA512b2b3905fc641a62af79c54c7bc39cfbef0bbe91b292384775a59ae6e8b07aa27dc85bd8698f350fbcf5b720d89374dbf3bf47eb75b5478ab06088c23099ebbcf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b