Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
8092a8c456237d31438380044ffb1c0d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8092a8c456237d31438380044ffb1c0d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8092a8c456237d31438380044ffb1c0d_JaffaCakes118.html
-
Size
460KB
-
MD5
8092a8c456237d31438380044ffb1c0d
-
SHA1
9b84ecb3f46522aa7c9f4f88c50eff65d13e45b6
-
SHA256
f427ff8f757430f4dc747348ec6dfd3fef3ac34c498d3aae526540cf639fdbf3
-
SHA512
725db78afc5648fbead1cb2489b3a7a1b3d121ac7cca909e21244124de718941e92c76ea09979500516a8a0fba4e3917f84ef1bb39732b8c7a079d71abefc74f
-
SSDEEP
6144:S5sMYod+X3oI+Y/sMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3Z5d+X3F5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B90D8F21-1DAD-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000062bfb3c96f3883ac997bb6da6919ba2fe249cec1f6a3647a7c72381dd8f24584000000000e800000000200002000000047fa961193ce3f1bd326523bb712e939e17e39fdb8db86221e433a8881b1fed92000000061ffb562986944899b033959bfd2f131d9efc4fbb12f182f66aa287ee9dd0f0440000000c0a10870bac356658951f5c2db858e8e18e8de9a3ebcc7026d6f2f4d47f79cc10f40e19a4001400d01e44af53319a3c187195af5ab7d913fc948ef1d345ae20c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ca8ecf20af72571d67f5ccc64ee18bef929c6c4b0a7a83e4fb194466fb6f915d000000000e80000000020000200000001df9cb4568dd4b2be378abb60c6380a556aab5e7bec213c4a94baa8f2b7d772890000000280f01fad65d7c3dbe96580b2601c22a596d5d00ed5272e9ae671b76f02fb257132eae5163171ca82ebe2440634eb8ce74f73c2c8e2692afbc9a9eab762a95b288b2d00a94ae2510395bf668458a7f8b269ba2454dd0f865c60cc551837cc55b6750f225bd5f1748f29f8ddbb83fced7f9521cf9ce8f735dbeb6e4e4b9a79577bf019537dae015d3489b7581dc176af040000000f942c6257e44b1e21ac198041a8b429be86df6beafbed4514e5a63c75fbdabb1c0d2c6fdbe320d804edf16478f0c909e70085ef2ef3b9240856b948a117fa4c4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423143611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fb9591bab1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 620 iexplore.exe 620 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 1964 620 iexplore.exe 28 PID 620 wrote to memory of 1964 620 iexplore.exe 28 PID 620 wrote to memory of 1964 620 iexplore.exe 28 PID 620 wrote to memory of 1964 620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8092a8c456237d31438380044ffb1c0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b7e0e750956652303bdb731e965676
SHA154b6e2b26a84beb411b78e6deefc17f02a0dbb5e
SHA256856555e9f3f8b4d20a8153f20847401e3454d70327d9eccfa8e7e8f1837cde91
SHA512cbaf9a856fe6490a3d81106c1af686b44e4f8d3096852d3193645bd70dbc862a2c9f0742c461bc9164be74b13eb2db1e49231a9f1554294afdc01647e31cb7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f0b1936d08ff6d3c29ec8f5dac74f3
SHA1002ba7b69feb0e9e2cad7c7f6004d58daed750ac
SHA2569cda6425f22451199fb46aa0e6b521b7755134f9a3f9060f141a6283a3c8e3fc
SHA512d3be96cbc8a4cf6b98343b5b19f265be6b98e5efa3911516a25c1e6ec6280e0ef272420d1e40fa949de6329ec1588e06d61bc360665cbb061d39abd83b1a0552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ea9f9b89c1d73bd152efd56ce34247
SHA1b3802b3b78a5956c454a18689c7903d3f04cefb8
SHA256d9eddada341ef2a7aa2dfcf0999ce0e84a6654a9d4a705b96966e55f5dfa1a56
SHA5121fb9d7e0b18930fed72448fb6bd6045236a7fa4f3febc29bed2ff0e1c5e3700c2e84de04eb2a85e48b7da1bed379b6f90087f23a4fc30c07c3341fe84625ea6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372f58b3b706fcb0a483942d749e0922
SHA19002848ea5f41e21e2abf0965fce88ed242eba8e
SHA256180f434f7ca28033b5eb2175015d36a414f3784044205b1ed8baf3ce9bd9edcb
SHA5120bb94989df1760e26b0fa4bd637f78237bc988de9065bda378b203cda3885c6a3f0ad2bd7e0d01c9091bf3e73c593969e91ca8604d7f32c124ec5a76aa8d663f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19a8fd903aea73b03119f3e1b5db44e
SHA1dc25caa7cbe28cb8077912954c9741ffe0a2f66e
SHA256b2c8177c00c0bd7b35ad3579c7af39a52787a6253c901f270393c263e20d4e1e
SHA5129ad6c9cf464a7e60953c5cfdb1171fb1101d7022b06912e6904f6d1cb962748dda6ab7791b2e1e384cc17be97d8a872984d60409136d2528c20b7b92936dfefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d04c35f2a9c409f7c5231c0016d442b
SHA1ab66d653fb0c6b874c4d97bd43a603f69cdb783b
SHA256ebf82cfc90af5928f2b1d645774c9926afa41647aaac815b0b248a7457edba2b
SHA512fb131525997be7022ab05012f3783da52b91bcda264baf0ad9b3ee9fe1bf44b7002e5d1ad5d34952cb7138f7691d665916777da00f06f50b7f2ec0c57305e9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ece31a07c8b5fbad1b1196ec3cce4d
SHA120f5a0a6866985373ae80e64ebb4c484e05c5fbb
SHA25673d5956e96b8ef403b94666dbddf6d1055404cdced67dd3168ae9c78757dde0c
SHA51239759efd0d69204c8d10483aa24465752f78083277512a80290b42ba73ddd5e93a7262e3247d2473c7beb7fb43edb88de6f679524b9662e16a65407324e40465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c5f00a6ca63ea96850a398ac981102
SHA11fee1b5a5623ed4d42c22ec1f41bc2c0d269bf63
SHA256628adabc0fd36630770e2e149419b54d06a045ab976d7991273b1dd4adf55bfb
SHA512e8eadd5603f977f596f699a0a46f2cfbb155757d08f310a3e6eaf922aa9a85963347a3f9df5ea15e3ff8e6f69dbf062cc479200833a5a0543fd91dbcb17f9e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b46a23f7cac50ade3dac40f04bb1c4
SHA17d79c5e40781aec210d3b1512dfb06351d2c6965
SHA256f7b91251be474953107f2ea10c51971f971d70cb4ca6a64ca403dd66fee46d9a
SHA51231e75ac0e6bcaf83487cd52c386b95bcb685a26043d07a2ed4476ffb3d1de6b7384ab373294b31b1347331bf105936aa63e1f29d8aa74f9446be7203c837e440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6b94c09c089d5f3d2a8cc024bb00d8
SHA153538d6f909c1199fdab0e720a88ea5e4324343c
SHA2564697eafc284fcf2f408916017fde5a54fee45387c559d212e6ed958f4a62a38a
SHA5123e1488256ac523cea172ed349ffe6195a201a11e9ec4d29e087cb124038935c87c3d7f678d5e4ec2295bcf94a617e9da87740e576fc70f948573e004d64c1116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a350bca660568753ea22cb88cdf256
SHA1a7a588e250767a4b424bdbb0160d54a607cf500c
SHA256588b3b07eca6d306d9a2c7d2eb7a5c6f42516610bd1bfed12f7f4821cc3e9477
SHA5129f15f2bd824170bbcfd05a2d0468cc3c374e24291d7be77ca69827ace5e0ab9ef8b072a31648fd86eb680d1f4e168eed9362a8d5f138a79ca421def2556153d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c579921593bba05a133bf9c50b50cc
SHA12eaab4cc856496a85bb3450e676715575bacba0d
SHA256ba535658d346957fa16088cae153c7c804c8e3946d3304bf22f5cf9eb1ae954d
SHA512dbad741e30ce8e57e1a53a5180e8b3de89f641a15ba6e26692af1c8f7357a580b5ea2eade7d8ae25a8f1a612e32e68f8751a2434c16d7bc6c7e6cf5e42eb8499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21f9c5c24ad9830731c7bc9927f63a0
SHA18f762c95d3f97434cc8272f62b2c7d0f0c6f4aff
SHA25681b44165eb435f87ddd6f53a4e59ec26ff2ae10e85787ed8574223637203ab73
SHA512c94e7c6d0becdfb9922dfbb354617200d00f4459f609bd9051fa1efe70251011f67e4c06a2c6391e143060756cf24702270ef0ccca5f9e93000c0ba24e19573a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86b1822b7e3cc7293e31e8ec4292430
SHA1619e6890026983a1b0109d1a6a9972ec7493ad7f
SHA256ee83535a0b0d74d7fa2a92c304d8b3f6c606c30e7c516222f48b1c6420bf208b
SHA5125024400f4767d831f18e9321b2b6df83206409892be518b43a5934d4a3b4737e4afc6ab2794a4f01e94141683924d870d26e2fdb9f64cc72edff60a42e134280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50184e6a5be67f6c2f7b4e8ecd8099fa0
SHA1bea71c351aee3fa52bb096192aab44bfa9cd9f26
SHA256f0b99cfbd3c5f142dbd2a8d348ff75d8cefd457a1419111c60d7841cc2f8fedf
SHA512ab793c281e894ac7dafad618d90adc74fb971f221eb0e2e32b71b8bd3e5e1d646acaa41f49daefd0bccf80a0259d5de49a6dc3edc45f41797feaf0857f3ddecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba13ce2ecec657307fb14afaa81b513
SHA1ff211b2ea965a432ddf02afdc4ae2de52df5a3a6
SHA2561a0ec9e954c3feef93a87cfb3186c46ca4f4340989f2ed014d81fb2d2360c9f5
SHA512da105ac3954c9c33ae5167a5423cb33820a77adad098c9cbac5f92fbecf08d100449a6c4e718f7874d888614c22ab10b1fb6beed1118420c8f88c749831a8b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41c6a245afeeb56b6865c0991018970
SHA13c1015f71d15c01b67583cbc8fa532073c3f5029
SHA256946dcc96f4483f9ad9764d988d2685339c78655b21ac72899bab3c0622289684
SHA512ff54728acdb75b562d4d3d4e534fecd9ee23514f2611234010ef2029257e757008a82186cfe1f8b5bf619d26f65ac80dfdbbcb5604aa152ff82800580bfb9473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763f60ad0dfd5f54df9679a2dbc7ea96
SHA1bfa7d5a82ac0977ac959950f9aaa1c245773e757
SHA25600d672583bba7ab5b32d0227f4cc8d71e591b14fc86e5b6781c28318a7bebd30
SHA512b8acf25ac5652100c842a98bd41cefc5b3fdc2761941e5d913af64f25610637e29f1f01ca662a404e667f4007da803a565a4aed4bd996d4d78bf40e45f11b541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9e454a225134f3bc073f89852ac034
SHA1ed160ce6d181d597621e86f9be279ad349524fab
SHA2566327150feb5e9e7d172525483408b6fae4381dc6e006644d5f773c109d2cc45c
SHA512f84709b41d527998474ef10ac9998046a34a551c0cfae70bd38c15c98870a415c39c5982938b4bd42eb556843ee5575e9728cc778586887b81a9c9c83602f197
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b