Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
9f2364600e5dc5231177ba91c254c103_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f2364600e5dc5231177ba91c254c103_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9f2364600e5dc5231177ba91c254c103_JaffaCakes118.html
-
Size
6KB
-
MD5
9f2364600e5dc5231177ba91c254c103
-
SHA1
2ba32efdac6936baac61ddd011da0c19500a6dee
-
SHA256
3fb8ced93c599c562d8a32fc7ce50614efaef10f55c7f332d4e541215b5f6c62
-
SHA512
dacbc6bdd3af531786f4d0e7fcccc7c937dba3b41050dc629521737a558fc5a9fee80af0bddbc409c86219773bc92ba97ef881ed8f8d814aeb5ef8cfdb9b23db
-
SSDEEP
96:mhM3sHfbuS7JSSyLum5kxzmImFCjGnWhWJdo2n:mhM32qS78d/56SImAGnWoz
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424292293" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3447EC41-2820-11EF-972F-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001ce9248ac783ca41b7b7504b3725797a00000000020000000000106600000001000020000000df68cb1d27b23281975279c53b3b5be19ff37ce0622803188bd6e622ae88b76b000000000e8000000002000020000000185890c7d4e0ef21e1bede87b152b14d7ecc92b8be478b93cbe5f31b2be64f7a9000000067f637ea3fb80bdf2b568d5e2548386f480860ca37efcdb2ad369230febc6525bccbb1dbe8fc11f4be004cab4757ab7ee7caa294fd56bc2afa3436b73c78f4b1c137ee9e4ec6eb572dcee85b4410cba863dfc693bae0bd0f1250d35a33de78cb368c9f00461efc425a6e68fe8df886d49c454e5cb9fac218676b5acf0eda14a188f9a445ac2517065dc092889d37ccd6400000009f594a38b038e0e1d6a4ac479a8b5ad2872a6139cc15ea369308a5f16fe3a8a6a2b7f41c6fbdc683b029bad399ce36ced5f2a4f58c5cb8fa590c14147fe2c5b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cad5082dbcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001ce9248ac783ca41b7b7504b3725797a000000000200000000001066000000010000200000009a0cfeec1d4a336c0b57b9fbac10cd95e4d20e5dbb78bde7439dd14cd7e6cec1000000000e8000000002000020000000b297e5a4ac6cc7125fcf49506072daac177f2e8ca1ebaec5d3804447d225f621200000004af187fc7370a91b609ff52c40b1fa0392153c65ab6ebf355b7022e690f1539740000000d92eb0f213c5c9eec2077bcc752456a8b247d92ad42ec359c175fe16f24aa5f6089af20f1cb0b0fff2143d2e5ebefcc842481072191438821ae9ba17386744bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2100 iexplore.exe 2100 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2100 wrote to memory of 2964 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2964 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2964 2100 iexplore.exe IEXPLORE.EXE PID 2100 wrote to memory of 2964 2100 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f2364600e5dc5231177ba91c254c103_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de08fab45c13bdb33bdd592ce8ae49c
SHA1691826a55e12aa89f7b185a2956a509e638f8fa1
SHA25650159618f478f9084d1579a49398c7657c9b65fd336316fc4eae06d67db1c256
SHA5127888f3642f91a371237c116577804e7b8511c3338086fcd20f3fefddee6762718e1c2ad9f9ac909119625a69632efd140f604784fc7df4b6656e67b4af4edf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee4359107dff72b8e20d087b2ac6cb5
SHA162914f915fd782c1e13fb23df8c6a5d0e8934c73
SHA2568d18218289f3a9d8ac8e7dcfcaa99ce97fb95dc7aec943030d4754017c51882c
SHA51228c511e7c4583c5ffe044059030dcddc8dda9e6d69ca8ac08ba2e728faab086375e4fbabc3cb27a899563d6f9793e14687e8a0de1cf1111f9da2f9126ef954c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51816ba5c4e465f6e37f8f4e828d88e30
SHA12ffba595f7823967498b1c39b10ee9ca0d13dfa7
SHA256563bb7ab6719c76bf4a0ce74cbe1bcaa91797e7f12f09634e7eb0e12dff56c22
SHA51282a0bbc6ae51a4518eec5367fecc59b42137730c5226a66018a9c2e2fc1248ed37d54be2b3fd44322087a396f72c8b9b4469dafb7f0d12eafdd23d0c0f38c3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe185006fce6870e49a37686dd2d940e
SHA1252fcee56164b6b946e65c1fd5d1a24043a44d93
SHA25642b0c714c834062c3a177ac7bede247110aaa2b93f43f7957563119f3235b320
SHA51218455b035a6d27253c9cadf05962759645c76955517bcb0b17077d957da1a1e249df1984d40b5e72fd6b15dc35b3a837c90595d680c6ec568d7a03ef81af69c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b04c8cf4976f2bd2de3f78821907103
SHA12aa515a2bf1752c9273dd3f0dce354623ebeb806
SHA256ba8c7ee44e3cff4456c344ec4324027e748742f0d15ebb3888e7de656582e03c
SHA512c269baff5ea7a47b48b8ed91ef57cdd3aa011f71eb997ce59277131d25f14046981bc78d3184588e1e565ef298ba5398710b59a30a17dedac3cd380954465c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bc2691c444b5a9a4985617f6d9c834
SHA16fe646d30ada4f8088ee98eae75029ea2497fbca
SHA256a33062dd097517f2e01c8901d48c52aec747d96dd4454151add091a66f84a419
SHA5122e4821da43b6935263fd630939f629e86e98c747c3222f849ce3eff41a81a311da5723b471e5e61366e57fccb83797884593b5dc92279d17d5a1d4015cd567c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52088bee0f537b7a07be5444857c792c5
SHA1efa1783fec8906ecd5bb943f5c4e705c65f2a0ae
SHA2561cc22f130cefa068d349e9aa3610b3c114b821e9832198ac20db71c17761d026
SHA512f1611ed7a6936143708c84a56ebf6314c8d7f7318e3fd779a76bb8f87d234788ee1cd7a66de09d3f6528af3d6bafde049c71412490074602fbb80e9ca965e1a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b12edc36a0d97c4bded42398875b39a
SHA16e8d1deb45d3dedda5b44d4d3e93256134f47854
SHA256d2e98444aea5bc32572d015941d8647ffdf3ffa07906bcc25f441ae492b95af5
SHA512f437fcf3218d1161b8317ee1b048d95cfd59d2b0fd57f7ebaa39317a07791608dfdc4f6d0788400cb1a926bc296103091b2f62026aca27be9c5c37e9d8331780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56212680984fd53d60dad1bee88c33f32
SHA1c670ba7880fd62178bdc88dc992fd5170706436e
SHA256079b4702f1ed2bc27952ef67c540fdbf99573baf6d86df0ec78d3397a3a6bb3d
SHA5126adbaa24359f018a910f0d476f0edc608e2282adaf3cafc0032184799fc324538f516f0edf386f07ef0bf98bb360f4c917fe306ccd40cd7262767ab36d2af699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562518cd1c6f7cf0745a2227b75f50f64
SHA1e605346560ef08314b75c0fcb6090d7f4edd631a
SHA25694f0a62862a3745e0b11f25332d2049361adc7d89e14e3eba4bef9b8c0630582
SHA5125059ead92de59a6fc5487e147231051a5e59011f7fd1ecbad4204af948698773c7da0b764d4b7aa25ad22ea7d0801eeb2df266d7ad14abab9607252306347ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8e6d60d11f6c391b559c20be50f1bd
SHA1203b7f9f3560e6c79213604724c2082f7d5ca51c
SHA2569da301c5176193545fafe94bae70d852b67b6ef7b1d1cb86da28deaec4922188
SHA51259e324466a43af4b9c03c954bcbb037ab77eca684ee48d630c67d3faaee1421e93d81b85cb6bfdc144c82a1c96dd816594fbf9e7521b97a1b7f7cddc804fba10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563784e65386261d0f27bc1aeedd1c93b
SHA1b99981c6270b75e86d911e300db91eed5f8368de
SHA2561ac0eb15b7690fceaa3c08a78ab89230170bd55b24303d7db187b9f88da6c802
SHA5128f45d35726640dd1c1fa859531b193c1c9e41fc8142c7032ac41a4c97116cb05c912a44d53bad1126a17b323a7f54d5d7085a55b7abe356282344468ca8aa376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58506e1b5d5bfb9c543f75693e5710587
SHA1b470a55eaf958fa3edd4878dacdb5a2f6ea0101e
SHA256823c64ca9e83f9356d66679f3eed9b3b6772f23ec313237842125bef96557ddc
SHA512ae5a8adc525de1f02510e3d6542c03367a135c7ef7cfc5ade951cae7d6795732e2cf6cbd0e5578846eb175798e57a53bf7dce9df793ec7a37ba491d2b22ee9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad31e38108edebe45fa477e3ccb9087
SHA1f12242d45f61d037e497b58db20fe5f46157d67e
SHA256b235d9a835c5be35e17c40f95850a333606fc39151ddcfa38918bd7fb22008f0
SHA5123da1631bc4c664480e04e0241f1b063224fcb3848df0b90b6a2fc24b93cb3dd9ce6a5925b4a98e5e85fd5923a92755593bf25b02b98f49eb65da7f3e6e8d5a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8aa3c33c2de774d4b7865b845e803d
SHA162806d590c0189eefb887cbd8ed9284eeef20bde
SHA25628341b8c1dde434aef7c9be9fe1f5dc8071dc7030b2928e09653d3c82f6694cf
SHA512dda3726d98de0729595007756d39599596d032e462f273f1e277280de0bc5a5ee93238d0bf262fc15f3d355bdad11c4ac5ba8660c89a6703ad5f33d8d79cfab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514267c55cb5065c5e62ddf1219276e05
SHA121b806ec47722fdaa21d4ab014a7930846e735f6
SHA25669247974adaee0a9ef16298e4901ef78fa97cfdfea061e3111dbee21a7de6c94
SHA5129bcdd1b247b98f73398936d49721b1c77e96257aec5332105b5bce2ac1df6501e14f48a9c569d3367ef507186d621af844149bb94f6b006083370bc9114f8bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd32419a7fbd0289709ce951ae27be0c
SHA195dab6e8b05997e29a91239981652dab2b41c5eb
SHA256589f616ba579c48c420a18cdf5e5d170bdd07dbd3180e2a622edd38c666df1d8
SHA512e5c04ce4107d194b529aee214fb0f378a12e218eb3961553e09d5c4e9c47387760c43acf6f852688a892835266f452a791c5c9230df8c772ed48be8dc90ae2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980466e03c88a9ece91edf7e109032fb
SHA1efd935551ea3da1066c9597726ec2d2d6adf331e
SHA25603681ce21e832a0870d092b3a80f85189a956f5d8642003802625da6af6f059e
SHA512b663b6f532c04fc4f64c52682a4668e84b6667bca45027f762d760f5300f827d0b991dbc0faa0d02e41334f088801f0286551b1a4e42c743745ddc6eb14ca082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7d2c0bd712a4eaef23ef8c0a5ddc8e
SHA1255e5d2f02aff5d360fdca8e29808a4256ec618b
SHA256e3a5cd0efc175b5bb084074628d349ad14bd1a3f2e3b468405d528fc9d3a6c99
SHA512e6b0d833a13e874b89b878056384037988d5b3a627b1276a59d0272e1150badfe162a0eaacad18a0d472673c65d5e65f34a77b9db63aeb875f81675f23f1c865
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b