Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
90cbef5c5a94211fd385e44875233a97_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90cbef5c5a94211fd385e44875233a97_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90cbef5c5a94211fd385e44875233a97_JaffaCakes118.html
-
Size
16KB
-
MD5
90cbef5c5a94211fd385e44875233a97
-
SHA1
7b440e25968cf528e17bef5a3f07a63c9bf816c4
-
SHA256
89e1459373d765cec9c596709ad1e250761ac036ef89d8b122b1e31709d01535
-
SHA512
456a48f880db8a59b253b54f2880048583d9115f5c5ebf464a989ee2866ecb1d6fafaff45775bb1578e418e72106cd9fdfc7a50285f02111aaea81fb78c5479c
-
SSDEEP
192:BM/obBzfrpvQ+v9DRulNz1R5rmWBA05BAKWMP9FukSCp3NF7zS/9tzwaux:W/EVfrp4u9DRu7VRA0XhF7zSnwjx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004e2f62ec82ed7ffce2a23a32580e191e0b577cc6387bab326b433997b917e2ef000000000e8000000002000020000000cf38b4747c3b379b894a3d3cd23d6dce91b14efb6f74566a9cac2f0bf1e906c020000000bb1b1142999413d6febe8013c5b972d9124771dd984ff186b46824ce3df4437140000000db441318a21f35151cc0f9d8e039656d21ebfc32bbc1eaaeb1722e77e175272b91020843e536c4e1c427f7bdc900f66b43760d56c9271eaec12b51faebdb2dc4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cd93797db5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423557183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3FBD211-2170-11EF-A04B-4EB079F7C2BA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2600 2084 iexplore.exe 28 PID 2084 wrote to memory of 2600 2084 iexplore.exe 28 PID 2084 wrote to memory of 2600 2084 iexplore.exe 28 PID 2084 wrote to memory of 2600 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90cbef5c5a94211fd385e44875233a97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7fc2783a8a8c4ecd923c5783e3a891
SHA1f6f856295cbfbb57d93da684ad0708bf2b556f13
SHA25648b959ea5c868b98224d20033cf76602558573d259eec4980fdcd37b97637a6e
SHA5122042af45e260280936d831dd945a5373e146b72cd43ae41b2ef366d7c26348748a5c3cf1b76328c7b56c2b629c7ef0fb6a515b56907471d220ebdeb20caba2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e7f1d2516ee656b3f86328bd30af20
SHA1003f682c34a92cdb4d37b83d82412ee929cb4d59
SHA256b8e6171a3c3d6e9926202015b6fbc148ec0f6675491a4a617820b9de98aa790c
SHA512adddb8aad2aca8411897aa97c334ac8475b7a9483dccbb10d21365023af1a3a58d249e2f9fe02625ea444bf30cdd09adb4b82a4e5493859dbdd37b6dc6f814ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52593435f6a1202f442e3bb0aea683376
SHA1d0b7547a487db9f266430c51ed28d3c37554bc55
SHA2560fa5fdf58e1da862aab2f969c21b4908aa7633bce0bc037b02d500deac2aba2e
SHA5126d5a26ae7fd597bab4ca50b37f4f01213fa94cd906910a3b0c176d4b9d6b931e858ce25e4a3605befa3b88496274c5f674a7d8b3166712d406f02a6deb1f871f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49b004bda76e1f172fdd9d35329a19c
SHA15121318dbb24bf15060d2d594b55b947e1f7d72f
SHA25682577d20d186e8d295a17c6e541c05c604536ef9a2177a2e1ceff2ae3499c6b1
SHA5123f83d7908a0549f5cc6e3f72b58badb9850604519c6ae40058c7eb54862e7260cdeea440577b9e73e9b55e3b3cdde81f84bfce34b5bbbe817248503a336fdb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4054c2020ac53aceda9c89a8953716
SHA1abcd90a02744690cf69fe2db9785b92c20fe77b2
SHA256ed99bd5c61fe68db67d824bba696c8b85681d62f9d06b85bdbc3594a56bd2bfc
SHA512047d97cea90f3b8f50859741696b5808b9428d070e0e3f52afbb5cb6631c969252e7fc3a38023ad32b7ee037a09e55d2110e195c072756596fa356575f7da743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562def69e0e32a6dcd8f00cb699c60c5c
SHA14a4110f7ae17c8d8b0e0ed422d9bf13d7dfe252c
SHA2562f7f55e14b1007c3a83f860d4ac674af4388f97de31e43d13adbee7a16c3a203
SHA512965d542e33f92e35cc1bdec78a91859e48aa6d727c1ca2b87daf16b06d6fba9385265546d6c67ac8c617b5a7475c2811367d5928f0c3dfb4de7170ca1b2adbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfeb0887f741d064cb37f7ba4648e7f8
SHA1d2f70bed703bc7634c413ab433078f382b0204ca
SHA2567b4f942f21d22ee04f5b3551822dd8f95187d87d08fdf990202d28978729e16b
SHA512c2d1f044b2ff15ba630e0f835a0872cb92964ebe179fc1b02507fd4f5146c5ea09bb41fcb23127f0baa01c84c852dc02125ce1c22e3a3cb1926127551450008d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ee8297f3641f91e14d10f7fabfbb33
SHA1885eec94f277e8ced1c65d7cdf33de0aa307a677
SHA256e4cdbb01ff80a4facf02bf60c9def19281d24479edf96bad7672c7ea80e03fad
SHA51267931b7f3e27625f7ec5e91abb3d3e14277b11bc8d7ae0439282ec6e5cd26834573b5525e1df63721a3da5b7b0a9ef9354ba91baa1c4c53b0135ec0c20469ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c108818cc47f24885ec6c8814e4f2d5d
SHA154b7240e873b81e32763829e6c0d8c3216128b48
SHA256f3eebda889674a11ff535c11f7d1b8a4d6962f258c1c7190ffe97dbbccd50d15
SHA5121756fa47ecb744e377c277275e5a1e1a0f692a94a90790e54b3b38b4b3fd9b5512e74cde219505d46f35706a090acbcfeed2e4e170f0a0cc091eb4d9e5233dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddac03027ebe95700419a2bd7ba0aa12
SHA1d9704b3c30a1965a882eb599268bf57964101118
SHA2561f6c1e2594ba3218b3c520d84fb76a3a217d996e99c0a62cd6426e1a0ea0daeb
SHA51211b4ebf47880a7226a8c5f5c45ede7aea2e8a74d8a37bf3e231f830d6d29a0f19a34b46f3e595368b088a177fb9535fef37fe8f8970660e1d29caba9e3a00b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c04cef1d48e1ebafd8305987721aa00
SHA154d0db1a229a1767b3939bbaca92c6fc11972417
SHA2566c9444c29d82678c676983013319451b0025675bfb88c751a77081970899a739
SHA512e6249d25781367784bdc897f6c6e47f295895610357bb4ce6ab1f1d144e07c74b0f51697c7ba82c7cc6423fc559bc60bf4fd378f1985191ef0b9d78955e16882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4e606868229c43539b0acd74dd60d4
SHA1e21da64ac0f61bc240f3b0fa5ac7f2d7cd90f84d
SHA2568ebaa66b306ef5f4d86c0f2506b59bc2c91fa6351caab7057aea2f77a983838c
SHA51292be55317cb815ed61ca5ca6efac59f1de8f27e217fd0c7bf2a00badf202f68b8d31493e961c7cdd102601ed411c764f8e7689fb0f25c63b582767599d047f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f450055f92664b92256428360e858eae
SHA13e8db3afa477dbe6631c1aebaccee4cdd219eb8a
SHA256e62a41ea7b03f77eb8bf5302c1b9a140f9a4d7092c3ca93f6fe92222096478ca
SHA5129c8f37e6c6bf08d9a736384322d83859e3c0bb8130e98d4ba0517d6263784b8e76ef368660654657093c949fb9ffa64592ac61003a294e5434c1deac0df6b6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d69add938812f3bf73edd49e39f9865
SHA15d3ec6828aec219ede05e8fe830a6cbfaac9c9b6
SHA2566b95a273c817689d4676d0899d9441651224404fd5bb024224d5ee686d7e23ca
SHA5120386ca139f35340b000a31adb9478f43490a675bb8ed201c410f10615c0a044b884046b5bb8c0a073ecacebb5d4a24f7fee5bbf68a9bccd8454b19cc69baa4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305f9ad28d296d15277107e92f8abc2d
SHA1e50d74d539a57f82e01bf8e854a2fa0222368dfc
SHA256ba4412925577c9420c2a7c6d3e5f75e1e6214754911d5c3a57d1a9e82f1b0a41
SHA512512f96e080dbe99e62a2bab66b19381d990fa7b5fc8c10eb83b3a3dbf0737142e5213cfbee4eeb3e65aac4a43d97ad63d2be8219a2dfbcc1e84c23bf8287a88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878272465311bdc9147f682353e53048
SHA1d1ae105d71548ffcb507d57922e43668ff2f20b7
SHA256b881466e25d569a50d83e5ed40aee9c994a2321f1a3eb1b9b1fc5e1dd7eca488
SHA51287b7848901244efc6fdd99a7b7d3994a6e8110d57a42270c068ef922c282384d645522047a388bc54ab2280372d046b6c708e692b559e793838fedf687e508da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65ce85d493cdb9572c6644fd02a7bd4
SHA122072160deb15fea0878fa046dc2e976d3183aa0
SHA256d2a46f987ec3a80f613768f82c5dbab71c1b3629ccdb286cfd620eddabc24d73
SHA5122f164c4762d5e87c4416e51fbf643290008033157a847f112246f5a58aebd119dab70b94d74f0dd87226b0ee5ea59b20a1a5008d9876ca773fb491910e628a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b703c345ba5fdb392df91509329d7479
SHA1b2a03825fd338022fa7b9c3245dffc718eee960e
SHA256bf66f93edefcdde1fe655d6ef9f983e87ebe5d74c298fffdffcdae82e18a9eb3
SHA512d800bef89475beb046bd964ec637d9e2f8f06fdf8a7ffc99261522a949018ae76f10f49bb34f03d3946f9a43aa120883d5ed970077aeea72125e25044e7b6f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e745af7b7208e14693f7f3e9e076410c
SHA187ab9a736c53a8a5c52928fc9edbc7afa11ee8c3
SHA256dab171f6f962f08b1a8b5e8c3e4ebd2d456791faa12920677c5fca1d916d72ef
SHA5124db745825e7428bbcc71ccdb0e9de6b56bd69d70884937a3f98148daed8fb5bcfe2f34ad95c38dc185db667e4b1f7ab36e795440ca34e148420e66f8e251fc7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a165f0f1e09140f7cd7282b979a35285
SHA1a3b1fbf4c28ae3f217628d898bf651f70b84ae5f
SHA256367c38800462d744bf095d9264f4d06445525eed49eea88f7576a5ba33e5fff2
SHA5122015bf4baea5b836715173574b245dee6ed767ee01fb58aead334855016c62317d0729136fad5d78c47b37d9f2a3f456df72ed902b076095caca5e389fffd187
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b