Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
913141fad777fe42532a5d6c0cdff539_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
913141fad777fe42532a5d6c0cdff539_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
913141fad777fe42532a5d6c0cdff539_JaffaCakes118.html
-
Size
3KB
-
MD5
913141fad777fe42532a5d6c0cdff539
-
SHA1
465c59bd18dba5e3af57fb6935ea19d6d8d589c8
-
SHA256
3c5303088f984b8f4a438a307ce333601b6c8da0e5b5ef0309d7a84957dda4df
-
SHA512
2b1e7aaf266bda0c67c204633192df81f5152022b7fe5425b7e848007af3d3cfc6df6f4550aa6f33c7d91b8ad895acbf4ef8c8b480261d52c7f7c0b1c5ed4917
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423566704" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e529a493b5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003582209e168b675f1f7e584966d7ac696af037f087fbbf9982370afb0b377286000000000e80000000020000200000006fe704013c1626e047a35dab88836ec783e1d3a0ef731c374f4a2b127adf4d882000000052d3c3d7a51ea6d6652cb12fc31375a6dc27616465f21c53f39e1c9138c9e1e0400000008923ab93f6051d51b2b1d31ed8849f019e622d776881ae45ccfc71a2485b9ac46717607c5579007aaa7b0e9f5ed4eaa2f928243d5d9bdfe73e06f24371fdb8f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF8DC621-2186-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1332 2204 iexplore.exe 28 PID 2204 wrote to memory of 1332 2204 iexplore.exe 28 PID 2204 wrote to memory of 1332 2204 iexplore.exe 28 PID 2204 wrote to memory of 1332 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\913141fad777fe42532a5d6c0cdff539_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b74faef63fff466bb47e477d6bc14d
SHA1baddb0459779cd67df5ad021a65ed4c1c6b9f042
SHA25622a694a52c9458101d8cc7571a5b4248a51c0b5868072ae722f16dad65a83fb5
SHA5123eb7bb31b273a2ea692f17feebb50133eefc5b8eb7b9711cdb373e226da5fb38765258038b0d5222816f8f53e07298b485dc5eff0b15c41a5e76645b2c3c5d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59528ef535e2a851087f5135411e90487
SHA11849af76a69681f9a418330e392bf4e4241d7238
SHA25650b5054b39e128e5909dab791a77acce3e07c46e9601d3eb42ce943955acf56e
SHA512d77e0097ef63bb61493da51a4449c1b6e920729422cc6703524f23be50b226ab08682869958e097cebe958663adbcc7652f78621d8149c39e0550d49bca74306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee726236efe234c2209ec84810f7d1b
SHA1d2fd4461cd9591079f54eca756f08e6724177747
SHA256225f20780fa03bba3ca48a653ed968f6069a200ca6190256716a2d5de95754e1
SHA512df4cdd4d5358697a59f1bb6b22f2d624643ce5ebd52359ba916545a5d9e2dba8771d0ca00587d06ba0e4efafa69db366a1647974e4b0697c6ff53a032ec76aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6deae5b4e3efa2745bfc74e270272b
SHA1bf0956fd2391b760bfe3bb1b66bc3b945e04c74d
SHA256c2bbbb823d8f36b3e9dd16223df6285380c55491b1aa155074b33cc9553de3d3
SHA512b8fef1edc4c6e13eb09749d85aed8bacd70514a805b50d49d98e144aa2d8c8d82fd1cf2c8fd41a4602aa85fe2b086a15cf17588f08a4df5b6b8cfe9da2e0c12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bc1616b1184dcf9a4731b0ca00e476
SHA18b603230a179058868390b2729a0dd3e03f3784e
SHA25696a7b7a52fb855e42ffa71f341880920434ed09ca14d9fe9cad11b4603476e95
SHA512b019167081500fc0dcae340a3b6ce71edaa981b6bbc11ae8e93dee5c6747f475b25a128a2231ab27350be049141feb3bdbee2d1074f3a2e1a41e0e1c4cd8059e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a7a8d1f9392fb240c66d62a3c8bc2d
SHA168d0618869ec3005c51e8b2453b6165e807aecc8
SHA25644e4dbfa5f5e86ad7eaeea4fac202bc9c9237a3d8281ce90b6cf6d34f5f01c71
SHA512429a6c44d3f625de18107da094e96fe7aceb8ff79946da6aa644fbd48cf453e9736f48f82d7e104d47cf2acf756eb12d525884f6da1c1d8222056fdc05c63c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff345028e17ee6e4aa4dcfbe39561864
SHA1ccc71007e9d744ba69035efe6e8d43bf99895328
SHA256668e7de648d21a71b7e1b3dd0383994592f6abefcf1aeb269cc5bd0f531ee29e
SHA51294d8548b8f04f09c25a9a0dcfd99d857553a6ac07a3af0b9652759818ef11be04f2b3add184564b515a10753677d282694a47ee35042f9f62a433e60480cfa5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01fb01012a5534a0644ded0b3532436
SHA19249309022ed83a0774feb017559cbfc317912de
SHA2562f7619afe8e91d7f5cd109880d8e00f31b909b5fc5d48c4d350808b0b4ed3f86
SHA512a02fa05a0994c558172a7e5488b52955a51ab965308950f80a7d9fd6fd221270bc40109e16dbcaac747a6a12856df8893c3f4c8205005ef9e17fc035685ff5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859405e200cbef8c3760b78f9854d2c8
SHA1c881199aecdec95ebf8e300af7985b39f79c52cf
SHA25650ab2180a177d8cf13bd34e1b51549fd451b2a4bdf51e07b5a0cae8fec3928c0
SHA512453673c65df8528484c5d9a55f4f6a1a6d93d4549bfddfb1a5428d1c9f0fde5ca92cb35a097720557700937d5ef0e4894ce57779eb944526d1d63ceaaa2f897c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef8a03c964181ec7d5bdf490f7f26b0
SHA13d792b6a9c2da37c83e0464ee5f9017c35f027d7
SHA256e6766584a3e2ac4cd33c55364c9676cf30214e176ba8d4c34d1f7e257d47d2e7
SHA512ff9f33cfc446f0574e821ecdf50aa06a6bd1ec599a33883119420956b8544867c02b4c8f49de60250171bdb71822d536a3d942f13e85355f40d19189b66f3468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54508fc5fdc4b594cb060e9dabb72b39d
SHA1d3f7fdde244fbb3e9e0580b55c2466f2b26fa83f
SHA2567e721b999bd7540467ea933f851c26ca119e78fafa2671994e041121478000ac
SHA5128e85fdd1aa5df5d2dfed1d319561309b835048ef27461aa1bf1c3dce8170d970fdf69909db0c36cd2dff5d3608a6a91785326ce99bce5e4f3aa214f842c90f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a875c683282814db8341072e15945f71
SHA162a861ca04d9c67c5c4f18218c3ccc4a821d4452
SHA256b6fdab95005b7992298cbb65a771aaaddcaae59f0aaa16ca157b99dd5152a6db
SHA5128cfa590fb72fb6df09db463f0d55f084e64bc5bc9d1fe0e1d0e5e1996593b007f58a007f624ba1cb2b33f482f738f01248f77698e7935d0a30c56cae75c91ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ed1d18d24415a959f0daaa4254090c
SHA1331ab6334becf0e09fc5a20633513b6cad8f6e60
SHA2566e9636ad94427761160e480a9ca49262f53b778956881c1f82a9c48e51f745ca
SHA512ead6a3607a5330abf0974d36fb6a3c35140516d3ecc8482d59c06f1c71872a6eeb450b25dc63c6d145d7cb3f02b09636bbc6e5cd291010531c26db63b5449f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557861dcc85f8ab074f7a6822d7231923
SHA14f6eb51c56cfc13acb5453bcfab299677d8156a9
SHA256f94211dc71fe36e62af9289d2736054fb83653e676e1fe1beeebba4c87fb080a
SHA512b65472a3f035993a726241712d8c292c63d8482ac658368f73acd53b25a2797df3212c72b97055477def55287e3f3aa38605ab3fdaeeddf8ae24e304e9a8714f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599047b483f266bf42029180b4f48b83b
SHA12bc9328b0ea7a2af85b01a55a7aec032c18d94d0
SHA256e1ae264f0f7624d0d03bee905dbd46a36a33fa3a5bb111614ae191dd6d186362
SHA51214d217efbc221a1afdd61b59393ddcaf99eef9afacd0662fcd87efa37a0ce046403430d7d3107a83c772eeabdddd94a8ab9c4afe4d349e8f0881aee6cd7812f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622b3300c6929aeb44cc10263a96899a
SHA14e38f562f493f6c9653efc16665c9dab28019730
SHA256ba29d55510b659e813980479b3bef960d5c6e1f4a422c25aeed3625fa6c97791
SHA5123aed103660308b1c8e144350cf843b9a2671cdfed2e50a813d7f65284e5a4d4a9aba6c5cb6e7aea1194bfa113755de1647bf2a18f08f636bf1daa59174137f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541289ead152590c1e38cc8e5cd77fb31
SHA126cef70efea7db30a296ad068f854a986270f214
SHA2560a41576a208e07697607bbb2996dfe7ef973994e87cdcb1d506fffba5883dd0f
SHA5127a8238ce5848743ad97960116d0c3dee273dbfa506fd30a1384865cd7df91442ed0ecd58319b7b1078c25845cccd00ff7801ce514964f36832c7cdbdc822efd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51839ea5e944fc106b31ebf3881b043fe
SHA1a29afc5dd6f4bf9a0949a02e4e3cd01e4f691b53
SHA2569cf9a78e0445bc8d1c29bbfacba7faa06b4a7d3c8a82d95c228502f08a527139
SHA512f67ca4e209b7550e06239a8b4ba8678a20a711171ee1d28bb3ee82e10493e8282c7811381accca6cd2304766889fd03e9bdad7ff398ab9ffeb6e9d3acc41b5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8fdb35e2099d101bf45033d92b53b1e
SHA112e8892ad8f248236cb69912f91e460432c40cd5
SHA2567d44dae03901ee50ba3b360713f6027184a24252baa9360bc3d2b8a939489554
SHA5128e580c05b76fad9d2634488a8908a821f4063b4aa59e10ea3885f59ce614218bfbbc74992165f3b1fc82c950cece58ad36740d1cbcf60b4ab268bd2b9816dad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ad2e4517f669c4e4f56a90e36793b8
SHA1b551122f107d4fcb7a93cbecbdf0c84838e06fa5
SHA256143b902f72d2fd290003ba1018dd8a9fb46679c7aad99fedd3e67b7116cfc82f
SHA51207b5cda957df32e5ec8cd0ec28b8b46157a624cd2077a1682d5ac0f546526b6217ed8dec007643b1f1fcdb326ff206769774ab6850b323d8e22ca8c1d1efe399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d650f2ae15b9ab98ef3addbf858c6cd0
SHA1c7fbc8a116d757141deb861bd6bf6c2dbfec9ff3
SHA256a4dcbca98f451d87fd398caa0f77051345e9bbd8b80a8be157353184a91b2afb
SHA512918b9bae2362cefc1b7fd74fc35dd170836320187449f3c52cf25d5545ac1336eb661bebc42fe058f83555f25c331b954a7d9ff17799f7525b7a0f5ed4124176
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b