Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
a4ffb97c597c4a91bf885dfe8b47bee9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4ffb97c597c4a91bf885dfe8b47bee9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a4ffb97c597c4a91bf885dfe8b47bee9_JaffaCakes118.html
-
Size
4KB
-
MD5
a4ffb97c597c4a91bf885dfe8b47bee9
-
SHA1
c59d408bf124c456f75c0dbe06799b465e0f1870
-
SHA256
4045f3b7f802ee1d49fe131f22f1fc11c4c6256ce18866264e0639468e39b3eb
-
SHA512
a64201fe6c9614eac955a2114f68562d165066edb19fb7c03451ab939d8b0fb71de58ecbc81faca8df82419a1d113802ebcec5468a7cb7d437dd203124961590
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oO2R4LMl:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424435029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000371cc6f24b44464b999d3e12b12374c2000000000200000000001066000000010000200000006ae420f99e6bd3acf14fde0dd0df88151be8897d928121e77393fa94b2ec2696000000000e80000000020000200000002356e6c4b3d4b8063d5503fbba3a6bce3198d3759dc4d62fc34b9bac58d3069e200000009818a377258d983330d44e121bc82c7591c56ca83dba2df28d48a4479837aecf400000001a316f8a0e12d8129ceaa84048eb193730d344061192cc4d638519c64a27f2bc5305dfc9af7cacc997e7cd88e43893d54615b29464c8acc6f464e27347df582c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0561e5e79bdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000371cc6f24b44464b999d3e12b12374c20000000002000000000010660000000100002000000006b9d2608f3c117e1b26f1cd9caf1c98997a43884926c27cca7fc24b447ed506000000000e80000000020000200000005d671246f95fbe69de0a1a292f06b3b0a6f35b506f6d800f892a496e8d5f2dd890000000f5fcae49c6f75c4132e6ae83eb11ca4a3ead8ca7d5075610027769b49984373ba67c4796dce1476f439d92a3585fd40ff9f58a7b07b1f5bdb2de3c3df8db90db1f45264719d854f4cf06ee03fdd4e85f7c7f0fe85ebc9af73e7dc1a7b308d56feda37d5f5d31336b3a94d512904fcf9fac909f4da6212c7eef6215d6ccf68a94cbf792092543e57bbac939a5068ad869400000004d24fac6140dd5a344f8176f46633e941dd3097921ccd781afc8168a13c16852a3f6bbf41a2e32cd2bfb2d800c6d691d965806ff55a26141c718f67ef45aa5d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{899820F1-296C-11EF-9387-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4ffb97c597c4a91bf885dfe8b47bee9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ed89baa70ad38bd73c44a092554540
SHA1a65adfb334944d1dc0fb641ffbe0a0a90f9041f1
SHA256dba7820d79ec98b6e770ce657f91d71bf5899b42e4aa62248b5e033bb65b2fca
SHA5126a6a8a1881d49fa16b1bb935ade7446d28f9382fd44f3d6fc36deaa1718974e2c05e0eb28e3c17b4eaa0c758fff292f58e8bc004b2cb08a66d1d2840345c2a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b1427b54ab0fdd0e4f2fbf91b43c68
SHA15037e5da28e6efe03851ffe779feb7094935df28
SHA256e4a19778c085d662f775c8187bba634db1a79eced74f90541a73afd685d74252
SHA51257c1601bdcee2743cff722450f52f243e32b59741d35551a8131baf1af30b950008f4f9ee52a8fefe51af3af4b7746625b575ff7988f7258c77171fd153c7a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fea6104ee93a97218acae16b837cc17
SHA1f862a251c76c8e22df85cf56bc1ed028d300fd26
SHA2561b6d433be2b9255500e3b4f8a464fac315fdf70de937f804ff6afdf050aecaa3
SHA512bd23aace99070ba15d064d9cb0bad2256a3bbbbc117efec308a4812bc99585c4aa6ab3b587c32f9b0811dda9c9b6826d86a8989f96ba209f5e6e91d56f41c2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03717b9baffed1178efdb8262e9ac81
SHA12244f5b263e5c7c66a2bac54c921146d3eba65c2
SHA2565f0c36d9658d7202f45285276547cb4de0692e08be3ed69baf39e28b1b77158f
SHA512ac5dbb5e40d57d774dd9d8e1f8d9496c0cedb83aa00746c7000ed2bf7307e166c536f839d8274d4ab08bf1eaab310e82a519254124d1debcfde9e69a2eebf7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745a3f94f533c5fa7f7cb7f7cfc72abb
SHA1217138cc9e897a649f7682ebf73a1884ebf1121e
SHA256f398f912845407eb35e2d4efdfc64dfac87994b23a98509c3f7b2be7ae51705b
SHA51261f9ebd13dd13093dc042b9c82a76c772fc41b10bd18fe3894f9197522fa85fc15929229283fdcd4ef7048595e1902e1e742234191bdf3e8b7df1d81b1e4cc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272032b49d00eba7a56599f9dd6e4515
SHA1a54b06feda44035b3a217166b6d63390670833bf
SHA256b45413cb5a2e60d880f73d7febfb8918680f49506016d55781da1fbf6deedba3
SHA512e09a09e5efae9ac14444b6c1241458808d3284720d0fa23eb3fb05c9c07ccaf0cd4649ee4ec275726ffc04e81703a4360ddd56704a4bb803715deaf968a629fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508df9464cb99983f0b9613097f77a18f
SHA187c2d4b3777f301a2b30eb9b39956eb3c083b768
SHA256f53aff5eee6b4aa812ef8d99130cf71c34103e71e85175b7def978f0eadced49
SHA512e8d95f5b7011497a375dfcb00d6437d38bc16119b96d1e83b8dfba7feff38fcb9c6b71bf44bc39b7c9b1a5354113a3b7c0ab6924714d496dffe77603e75897c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b45ea0abc50d066a3506107e2a8100e
SHA1310adfb16041a06b88dc975d32392009fbc2128b
SHA2562dccec9bd0cc2d71283151a3f1e0690a48c795e1b85fdca7049f88a10c34a91a
SHA512757c2b3490d0b72b5d69fd54be51eec33053d5a14fe48874025f9ba54cc2f470be03a888b5fa5e4bb243f2736658af5ab912bbf04042acb24e58e93f45c129a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbfa455084a5c941910364156efbca1
SHA176f001874fd1ee75c177f493aca466dc797e88c0
SHA25622279393e47d2c8e8d9cae96b5cf193fd8fa9c4821796e26ddc7b6d86a4baeac
SHA5129e9d61c19f98417006024ee2b88a6d772e129c73b8ed443d22b4f9ea8e12fb2291cda44212fbf1ea2db9b70755b425a72f3fe82492408f42ac89b69852647bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d2e6573eacb98e984843182354526a
SHA1bd866f00d84131e050eaef96d65f55a19da5711b
SHA256c6d2809516ba15f9a7d7e1f3d22f67dce57a73d096357e53e48da91adbed6479
SHA512c65f13cf61ae32e154c6a2b4845dc6937763c3de6ce89b865a51af57bd75974484640fd528ddd9ac4848426866291b3b75a86742a0bc8be074c9f38efb93e0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1fac53d9ac60bd1386633616f8fb81d
SHA11e7b55f75b7aca52eb28b935d9b13179a19623d4
SHA256f476d2e491a398a0ab37c44ae1879c78f9d777d5dfbba396ad61f00b754f662d
SHA512b6cdf8ab0927e983244579c7ed74ad74c23e4e565831696c8b7e82016ebab77de1850886f83f9b38c74e4a46219690d0e7f235669174c1169a2d80bfd7911e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b78b4b782107534c43a211c999c9910
SHA115a67d2c473ed1a010a8d82c7ad55961b02139ca
SHA2567ddfd5a7be2e818c17a4c19dbb24455e525264d4ec430f82d1cdf9980362e93a
SHA51272d6844018b54353d45f2fafb3f6c5357a6a50e73286ceb4b277fb3e646fc440b29b7a00f23ac2a778490a21d473887dc6c1e202e3fc40d9a1f639f370972a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dea73f2627f28a4484a660eecd52945
SHA10e0bb50608bbab43a219229667e49b371fa8e4c0
SHA256a87613346d4e4187c0c27a6eb6a534dbb21a6b38e64aeaf82dcf341f0be1adb5
SHA512520f9ba7bac3a77064ec69a34c6eb2164a83f758357246d925252a16306f18572c9bb8e738ffcb05f6926c2f4d3207699892ed2078347f1d36fb3c691fb7e8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f31dab7cc33bf389b2545b3efbce577
SHA147baf65c38eaf3803fc354c50e40d39b6fc1df30
SHA256625570b3d092d55876c0a9bc4f5bc76073ecd6455ae1224e6721bbe7e47a63a4
SHA5121be0f6de2ce84458bfdb1b8ea11145f4460b8125fd166b35be0fed1012ceb9265d0b629755b23cf48b48b325983ce6306f7d3c1bd9517c1eacad91859191c89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b2fcecf9f5f78799d143f437c11c09
SHA1e6096d727b4493fa51472c44b194dd44400db489
SHA25641cc1e353a64cfe353f0c44c9e25d90a53bffa957f303614be5b28d7bc475cc1
SHA51219a13e63fbf544bd08c352d1afa533341be54b36f731ee15a0b710ea0c350c11e440634a8510fba02013a2cc72e554c0c92b73f6f44d46799338127275a203db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b56a5f6265bf2d4c4edacfdaf29abe
SHA1f6f4e9e2590032b730049c266e5de017b4668da4
SHA256a664c360d2092544f0aa60a012e53f36b9d3190d92b777d7c25a79a592751d62
SHA512929ebf68ad67edb43c609c456066e2d85436ba6451e4fe1c9b9cbafab37e46bc66ae695b0c2ddb26a315bf549023fdbc731e4a7e190030210b7fdfd7c0854592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bf35b6fc97e7033cd30596db876d29
SHA1108085666217691e783fb16394030ddcfcd8cc13
SHA25644bf6666cb8dfa1a696dff4c0b2ccf597859ef403cdc59a5bf0e52b6512b42be
SHA512d1b1b9b747e1b67922bbc21999979a308203ff54cb6d554fb07246356decf2964a02fe1d96fc44e0016fd7de1a965b08b7055e49caba47eb026182c673eeb644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59036fd447be3a668434d38a825153122
SHA1ccfd48883ddc460084b23143ab66f946c0a9bcd5
SHA256f84c4e86dfacdafb4bd6367face8358d16bad6740c531c41a5b2d218ddfb6943
SHA51258d56d54e7690ac5ac8a84ceeac2054b7e8ede582c0d2556363945d8f9d369e89da8d6b326c30a7d736d81761038c614aeff3e505e00e8f009721956f446f199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50929650dad90070abb632da7b4b7c977
SHA14202dff3adb21d9bbb586106e0118c48140e944f
SHA256f1ce1cd346a2c7a2d1fedec2ea265bbdd9466f780304d4836f058605ea2d2aab
SHA5122bfa3273469ef769868ceb302f22a1a0163d96b2f36eb7bc8002896503230979252a81727aa58ad948d641a46a79a346d73fa65ce6500f54c4fb870cd2790a70
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b