Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
8059f11d1a9d3a31978bf15760013db1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8059f11d1a9d3a31978bf15760013db1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8059f11d1a9d3a31978bf15760013db1_JaffaCakes118.html
-
Size
43KB
-
MD5
8059f11d1a9d3a31978bf15760013db1
-
SHA1
42353ddfcfae53f73cbb0127c350c6de3f47b936
-
SHA256
ae51acfa0f775eab4bef74320a9022dfbb71ebb30a35cb44a4c2bcde333a19bd
-
SHA512
5b29383285a28212463ad977e56864f8d659d8a8a3cc52f21f71065119846890ecaa0168cb488308a1560e365eb0d94743e81b81b5e8e27130a808bf0e8223da
-
SSDEEP
768:boPY5kJa0Jw8taj3MOulQBY+a92F99aB9f0xg9LgE4uPl7eHwN2X:boPY5kJa0Jw8taj3MOIQE9cUB6gp4uPA
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a072fc76afb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D51E481-1DA2-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000007bab1fae3422a7ac64d935e302a8ec6d3e13fa89a46edd2ab9b8a7f7b407c8c0000000000e80000000020000200000002ff9351c2627aeb52fc570d90d1913db4e230ab1ed07389ccad6b21c123b56552000000093b2eebd41581742b1888d7286da1fa8a9ae016b082248bb2432b01fc543f50c4000000003f38af5413713e7b2abbb41370c34d8576cc71a477c4d14056f80443b7663d5aa7d8215b22cc6f7a864c6e0da948b15b80cc4ca7f4b2cf8bddbfa5f7a85714a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423138841" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3024 2976 iexplore.exe 28 PID 2976 wrote to memory of 3024 2976 iexplore.exe 28 PID 2976 wrote to memory of 3024 2976 iexplore.exe 28 PID 2976 wrote to memory of 3024 2976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8059f11d1a9d3a31978bf15760013db1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b29d426906357ebea60e30e2701365f
SHA164f780e58011952dcd955e5af516448fbe9791cc
SHA256f63ebc94135c21820e004672461b229e66beb1a890045b5372889483789c0b01
SHA512c9dd5822a42ec09b719eb0ee3d9acbb42742a207fe4632f0ea21b092054816ded4e368910033892fab1e14b4f8a760f2adaecbd4517794c536272c7a36dc3062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9904dfa3f92ecef152b5739e590b09c
SHA156d4c5780a3bb02cf6a42897e4b4f5e0a1ff333e
SHA256c0f608bdb684342b1c2c7dddf52497a1fd168cc8b489caa74b40090c9db7c1b5
SHA5121431d238b282c090f3e5d11b1a5008cd938f9f9f39f84e4730d39093e16af82b5ae7898f9c59c571e13db55e5f9270832f62af4b2bd0069d3790b6fe4ca98314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b75591dc1f6a941547c39067445ead1
SHA1c017df497da95961b3d9a08b74e44af58089bf1a
SHA256a1edadee8da6c178ca4cb549fa151b64418dcfaa798d049aa3cc8882dc5508d1
SHA5126d223cf169459ce92883287ae28ad63256ec877b1936df261ef70d871ecd5c81626f493bed89dd022bf3461ef0178b3519f073f939f79bcb5f827a7b25fe332f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f3072fe6e768fe3d9a5366285f4ee3
SHA19a1b27a6cf520dc7e4c5ffce3089b3fe7faed099
SHA25670c7f5f028732f1df44b626628d45f0ebb04d94f2e589c7fd61b01c3efef6ddf
SHA512535eca497a428472b1d9163c162985742a2dd858e91963c76b40560788d78ad717523b7b1a9cf3ea5e71a6dc1d059ae0555b7bc04c5d45f558fceba0092cda74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3d473fe3ecb9e1f0dd18608f6c665f
SHA132d5107e54c1cb2b7186e278362169e965d3eaba
SHA2564094968eee275cdca4b9f29ee412288896ff7e5c7a744617cde6268e689ec450
SHA512197e5700048e4510cd2c42874c9654ca6f546d0de276402aefb9f1274807ba380ad734daa2c04bc5a10193c8d7c167a64e9c0be2a9c492a9028401c144a380d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81e0ef530e8ecb021c098491508570e
SHA137b7389422c0ab0bd58f5780d91be34cd4eb6f9c
SHA256afc0e25753b66e080ef1194cbf2c0bc25e1e8c8fe675fa743299c134ceb478eb
SHA512e04a22269d2c9c9c8d2c593b2bc0eb202b8ddce3cc240dbe2b489ef81dd099b4881c2afd56687ac9ab571f3d21ce020243a12823bc3d6de2216506761e90b2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52672b692943bd7a2e0a4fe25c9190615
SHA175e401d155dea975d75e5a28db73a89ac07fb9f0
SHA2561549bf912b624a51123d03467ac71748f9b222df15eb01def5e7989f0de0cfe1
SHA512fb1f30b37f8cb91231e081c76ca183ed9604508ca694f89da0bd80a2280cae02dcd0735d17a2c9efa45254c9091e672113a50bf834260c78b4ded7a379b95113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42e888c4ce9947446eb3f180b6d07b1
SHA14cf3880669de1e45664a21b4e6b24217935ea7b2
SHA256356551009e2f91d72eb15a14cfb9332a7af76c2fa7fc232334efa151927e420b
SHA5129d5daa15c0bcd09a7295e1809fccfc7de8ca333a20ac64bda65de4aaed2298f58f5207d2081daac485dd05f3419fb8e42790ae5cb8916d2cbfd6461e88f0745a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391cf723da5607278134d0e78e4f0b2a
SHA1b314d3e66202891b4f124d70a40d3fbe6d57e475
SHA2562b8891020abdc11d7c868cbf04af45657e94bb68daa13763e7c2af0edb5d8915
SHA5127ba8b0b81bd72cde6c4be5cf1ae7088fa54e2348cd13bd923e9a6434767e7975654fc046c4aa683be5729d209bdc6cedfe4c904d2aacf552f6ac7b062f8f42c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ea7c0922907631f6a1383f66ad41ec
SHA1b0f212a141ba4aa95780402fa1fe064fd47e0726
SHA25679229256042e8093171166a1122f3818799fdde1b10d4c6e8ecc5d3f2e17fe26
SHA512c74c5dbecf78ea5da1f3f6a3a3cd3a70399afc06c1b6c0a7a65b3e905ab46c95a2fba9902801192fc8c80cbbe901ab3f02c4e55a3d3179ef70abd0b80fcf7d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f4526f416b8288723d71c0878414b9b
SHA1d69fb86cfe07c1d9c36a3ffa138237bd9f400dfd
SHA256c6d1351951a6249436fe335a77049a0d43cd77341bf1f5fd0c3d078776a5f58f
SHA512666867ad99f8711bb7fc1cc96e4c138c144a34258151c7e9f925b69fd224fb707d47411f3b3de2a2d9579dcff907bc1bb80ed906761ada21644035262173c734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb9d0fb095451d32c593e84dc54738c
SHA1a5d562f41ab3de82f20cad6605074837eae27b0d
SHA2568eaf4f3073e355b3a726a3cce97fabb9457198ad25ff5738f3f565952b1ecc24
SHA512512c93f7928e3041646bf6b1efa01c0645e054def483e671942a957b18709bf43e3d1539bdc7637f13278e39dd0b33389278576fe8869e9bc13ad7f2c05d57c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579fdcaae62b81f127a5f566195eb4495
SHA178c5e397fe0cb9188e4ef63c96c5a427dcc1df11
SHA256210f542669b0b7ffcff396fa59e3c6f68aa758abbefeb0ed11db54aa8e3aab38
SHA512dec3f9ee847ee31d7f288b0be3e4084465a11b11d0e39bce7eba4da1e80d1ee8845c435185be37c701f02fc745507e8faa75d73ff3609aa428daaf8e8b58e5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9930e8a47ac4f3af492f7a267a0a0c
SHA17f6787e4f4b7242901557ad31ba0d4e09ec62c7b
SHA256221b9964f9889933fa4f8aacb6276b5ec42a41d8b7ef0866138f014a4177fcb5
SHA512f9f1eef68b57cbb7db98d0b88373243ba31f5e50a2b86c845e36fd1b75246136dcec68cb2c74fdc0db4f6989a28cb6d0f2ca27126c881a4cda4062a51b51b1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d746ef33cb67d76fe3ffe7220d5976
SHA19055affca3e9e5bbeb070dc221b809e70d4cd744
SHA256a5c1be4a5d819a895900df6c2ea1dbf76bc4ef13f9a5c8d79196c3ab429d2d71
SHA5122ec63091a5cd517be334c6ee012d77f1e11d69ac7b76a7cdecc6ece89f65841b1022a7539495d03061cb731570897302e214de56605d118863e43dfc4f000f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5037e6566cd509f423a8e29a8621cd483
SHA14ef56cb52f0e5066898490b85bc52c688e0da4aa
SHA256052a44aa479923ec0c200c869672def9c5d4ce5931bd8504d077b820763c377c
SHA5123ecebc89c17b00802e90a36dfec7156641dc0b744ac864e8eefeecd9296be366d56b53dbfc87ad344c716636e63dbab37b15edf1e1ecd5b29009b837d89a226f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4914d1e1863cea736fd43402c5d255d
SHA19fb705c03a0c8149f3f03ee06c2dce5cb297b90e
SHA256fd94b638dfc2f5ba6659dfcc7b3837bc447fb3037ffa2a35cc3dff03aa26950f
SHA512343fd0a37f64f9be8d89534cb449be864d24d01be3f2844d7bbea75ef16bd47d16840bd3cbe4431cf46facb4edcfccf94501e297262a1ef46e5d6af760bb76ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671b15adac4778c0c0ccffc35faa716c
SHA10a3d460f987366d036c33f320ac9d6ff66f3ea34
SHA2564e18be9c782d127034728eb9aa7119d21afa0a8c0ea645446305516f29f48c61
SHA51251a310402c36402b72df92a18e36eea7a3e80d1c6a59c071db8759b034df6aec4884c6b9c0af7216b74ffb039a6c2c5e70effdfe82c551d1232cd30e4cecc6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331154d025ce844f25984265f3234135
SHA11bed7a57de3f906bd8d0d2e7d00f85cd3ac7f42a
SHA25649748961595efff9cba736900796d81aed9101bb7ead39d494822121103030de
SHA512b09c2573b7b543cd0f550464c6f01e5381ca4fb338ac8f67f29457f848e0c82a3f819e333ba88e23b08a1e95e59457f70920e65226e447d6503963667c7927d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7294a561ca04fc7a6b01e27c91049d1
SHA1387d3b232e5e7e9d34b73806e9bd8a13bd61d74e
SHA2566cf395613f7db18a032ee38de555fa4f2b2f3e91311be6330304762caf903c82
SHA5129aa94069141efdfe1c640ed65f06900c2cb6a1686915fcf1c8d0b68846998febdbaa27148515cb043fd337bec07c33510e236f0ef3dba7d157a0c81ce0d17bbb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b