Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
877a3e1ae95809c581ce5dd30d357c72_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
877a3e1ae95809c581ce5dd30d357c72_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
877a3e1ae95809c581ce5dd30d357c72_JaffaCakes118.html
-
Size
21KB
-
MD5
877a3e1ae95809c581ce5dd30d357c72
-
SHA1
6f0b21a7daa820ba553ef961fa8b335f7cf43ebc
-
SHA256
37c5c9c496a5839a70b39368eb6a03dbcfda089e0c721e1a2039b2120fb5fb94
-
SHA512
812ebd8f1f58e168e2ec4d13deab27354e4a13581ea0b5acadd06a0f301a4b5dbd1cf54277fda4a0af9a0eda6b9c34244fe419e3e893753e7416d015c7f12bb8
-
SSDEEP
384:UXuP/TyFSbi40/e6i1xzotI1JxPKfHsiH7Fe:UXuWFKH02lDotI1JxPKfHswFe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423331135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000027f3b448e1e66fe34083eb83fa6e1d27f07cc6469a118b68e0d46aaf888e5fa1000000000e8000000002000020000000e67869d3c0ea51f97a98dc303ae57612d44c9c2e7466787b3bb408f6443306b920000000e4363a877e38e50fa307f1522f7dd2f3ae7c5d8ba82542485198bb99c6a1bc6940000000b086d3f680db4de0eb05a3ee074a79735bb0853c0868f61bafe9eba527e84e2b9db678519fd6030186f02705fa3dbb3b288a54470d0ea5f47d153d44dcc54b3d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54EBD361-1F62-11EF-99EB-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0067fc296fb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2168 3052 iexplore.exe 28 PID 3052 wrote to memory of 2168 3052 iexplore.exe 28 PID 3052 wrote to memory of 2168 3052 iexplore.exe 28 PID 3052 wrote to memory of 2168 3052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\877a3e1ae95809c581ce5dd30d357c72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571dd9f2a74f55a0e802794f5aac20279
SHA1597637243f15a959f1c837ab0ec8eef0eaf5fec6
SHA256aeb88ace02c0c5c34bf6aa00b1fceb747b802940c29f846eaac2433bef924436
SHA5127234b03ab1cbccc476a5947cf9091e7622cdf0ee425df2edf3d1e28d9c1e59d545cf133d57b4c32184a589e497c40773edb4c14e41d487bf869cf908c7a4ab33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d021d67ca58c6fa3121ab868eb735f
SHA18411079c82505caec53a439b4eaeff815fdf9b93
SHA256c4ffd6b35f1c3ab91ce53ad3046b2c9bf9ba142b205c007a0e9543363204603b
SHA512d3f5df698e7c4f8cd778713df3d7efc2da68c12cf3ed0d675df3e5c3d9e23c72921ebe46ffda16cb409801dd661ab236abc7a34288ec8fd316f8551db93a2013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc44ff910c7a90a82a3e4f541e2f072
SHA17983f5e67cd6195f23d203d2c31911750e400a42
SHA256a65588277275877f2462d0f47da1a5eb25a69f3e7bcbc08c7c044b9230a4888a
SHA512a8d94bcfa376a1e2df4c1305e343d349a910e754a2bf391424537f2bf356d23e78477608eb5cb2d8ce0e02d6ab121357214ff4f46cc6c71aa1e877df71a5e36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5efc54a85ca2f3d6e3c8e4172a2263
SHA101109daccbf623cefd2c03fc544aab4827b05dee
SHA256c04b9564fd4478b297d9d14f90a4ef4ad2f274d89a11be5e2bb57cec7e85d25e
SHA51295ec2e778f47da1790c105b63ec7f68b45a2a59f135fe438de0070f14acc1ffe0c9695a1eba84968cb0738d0b8a8833d99fbd96533e55dfa5aec3fd5cca3f913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55057ebf0c1b72779d78fc2a67cc486a5
SHA1df4a7c30e4dfb9d37b9b4ea50f616d52d7e83abc
SHA2568987225a5313960c2b3c3f15a5c2fa2c5d09e2d1a62b8ec7a29018d5a83a6859
SHA512eec87a5d07bece813018de369ac1094a75b721ae685cd6632de81d174b050ba9b5b9a0f24904b647303b361e85dbeea0ab86868ae76f8d90833e5bc417f327ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e64fec67e6fe5e624c4dd3ca0a7215
SHA1865c172160aaec5e9d4a24e42d9cb41b80a49706
SHA2566c1237a5a6eadbd99adb760345360a05fbf3e07dd8ee38028dc871ded83c6672
SHA512065e542619d3f2fa981aa35badb6415f22d412a3d188eacb99cbb2d8e7837d8a8923533b38340cabc95a6d8399fae3d26d7ffda53a20fd98b5aed9f773af4466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58782c7868a95eecdeeb161028fc3c120
SHA1f832ed7096516e3dfae72c6f13a702b057f10bea
SHA25601d672f88ec53752f2e3e8a34e9dd75f902bbea417b011af16cdc1f68812bee4
SHA5127fcc9c955c898e8b4315b09cf855900dfc2f352c9c174115b7e001667f3d9854d17f1c79fd34564281caa81f52d5efc56e665ac874cf5a3617f9d1a6f5998fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186f8879439ebffb5dba17ce91ecdcff
SHA1a94920a2bb3737182c623fb534426be271772b70
SHA256b5eef76eff6e7515e6a95efe59eb1a9833174654872cc33e71fd229d6a44988e
SHA51248c2fee72fe52821911cbc09ed4dd8e0adf851407f2e8c86e71052a882a471a27fcf1450dcb01f6c26137542a0fc882fcda4b69ff0748ce6ee022d0f3c809d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54790faca5fe41440fbfdedb4947322d6
SHA1f3e9d580eed54690c40155070269750dfaa1ad40
SHA25642c3a13d1f7bb10d1902788d28e9c9a23a5d74975db1bcf2d2a68145ed10467a
SHA512a5e891b9ebae5ec83f879b8f4c8c42d9a84a29f5eb1b8f26b352588e9c89fd6b9d4353b423c2afb246e9728de5aaecf3b7b00ce0710c93e0217464c89fae4251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89d47041e740c71dda618d3bd7c1100
SHA1905832097088c1b3b259fea0e928ebacbfb987af
SHA256d516779d1345097305d5535c974dfced34d7a964436859167106c0f741247122
SHA512d62bc9e4a922beda30116b0093e32796c1f6edda897f265303a66006106397086b95cedbbbf3a6cf0f3b8ca79f900f92452244e46114c37b82616b1b8c67f247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ea5b3118dc12d43b07227b43cc0e9e
SHA1b1c0e366740d094550f462856e31923ede130684
SHA256a5571a33a9978e7804b042c622ccc2c9f86b3ee2e8e8f9d4d8afa56391e1f0ef
SHA51272de423a86f449ee1dcc9437cbb883b5d8af3f54824a0c503e19264b4f4887cb3cac003bafde20d4a78e7020fd001a0c40d682a5f587e822b750f7db746b614f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54504bc6b7b786f5b00114b1b3071fd71
SHA14dc3ee216d8bf909594f9903c11d16093c41f41e
SHA256b2a015fd53ffcdd928d561aa42dd7aea23213c75af19caac6a988d5f24819c97
SHA512a57d991b6021b153d11f9b848b3f4f085ae1d5c1678023430baed8f841437f55b8ddd1e02f70df49cc8c035f01525825c8afaf24fb431771030e88651a6d7d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef72efa11626d4d65080319760cb6d16
SHA1e13cabd808a0c5ff2abb225eb65bf49044175ef2
SHA256d9d1b216c282e18bf37d6ee3e82ec98f43d598a0b436158c59eb070a9b67032d
SHA512658aeef885ffa8f364e07f8d2844c8cd2cced1a51a740843128b6d104c0493f0e98019c4a36ff8967787c4e7446b72355fa5fb55d29348edea5a1b32e8e58183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc301ac2ece4b854957ca87c6d68e8e
SHA13efa41be36993cf1b58a0ee6b46a25ae35b0d3a2
SHA256e889802aa4547b92d1ea89c537742856dc18ca7b6e00a6d662e48d1d0d102869
SHA51291969965735f1976b17cd3b56f2ec63677cc1b571b7602d9b06a5594b29041c3b4befff7c6560290bc2a2070e07478f38fba0b69fd341f13a432d2a744aa220e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d6d621d153a9d7e6a12f19eae4da3a
SHA129ad4a458dfca92a03fb0647814423a96b785bd8
SHA256eb399a3e1720068cd8380319ec003d7ec9e7cb845acc01c1401c387be19bd934
SHA5129b0331ed8a23e62dd60f07796f11f37714755b1773fa56654a81d4f45c0bc624a93474cfb5e8efa57a2f7df1bee68a9c791a03f760cf8977f8441f59636cf42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b1d13b1cef6a0b1caf340490e7ed3b
SHA14684c1fd599f8c46838e46503b2db4ddb1df46cb
SHA25606fd0a4f6a55d86bd2013d14b446eae4ce9e0aa45869df577a18f348bc8a530e
SHA512b08ab9e40d6dea2256ea0416609bc56a080e075e7316d61846c59556fdc7019f66f881b4cf906d95daa6a173ce8240aa6e90f55c7be828f247240c68bc75a445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f382caf63a5e3b205387cf1fcd22d4
SHA151e66e9ecf2be41932499bafed91075b49a0cefc
SHA256bd85bb4dae28b6da807f0cb0b9ed124d54d529ea78e6d68f134a4616f1d9c593
SHA5129d1ea1fefd13bca7fe01f655de4b36d81d43fd51b92932e0daac519ba758f6ee6fcfbb993d065fcd44e0d112d0e50fb483ef49023517a5ac0d5fc34cfe2c3338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abe436e237dde9f0ee58e9e7951b23f
SHA14c00acfb6a69b6553c1631a50536a66fcc235461
SHA256ad68cf84c442a4a1577150fcdc46950dd0dc33df91d109c8c526147bc236c16a
SHA512b4bfeffa1d0f89107b3cd5fdaacadc66227c14634cabe70a6f4f257ec74a5ccc0272ad971af01dd756247dc45eb5fd96a7e9e8279c1798a4ebdeda64b6d40cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373c1a6173daf412af3043757048b4cf
SHA1f524fdfb1b5005c30dc3edb6b3cc04fb75314215
SHA25628bf519f66e90d68b84d6db03305c22f60edb7cbf71ad68705ef0eda4954f77f
SHA512f4af70c58335ec21d807436a5445172f0f14a2194d3c5dc1a613039ef9662185c85ebec232b25c552c6b9c6fd4ecbefeb9d6927f9423b2172f34259059d213a3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\comment[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b