Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
91db319d5a4e9188dd121ceb16c80970_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
91db319d5a4e9188dd121ceb16c80970_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91db319d5a4e9188dd121ceb16c80970_JaffaCakes118.html
-
Size
15KB
-
MD5
91db319d5a4e9188dd121ceb16c80970
-
SHA1
0021ade8d49be5e7640301b5bb3eea8d3e770a29
-
SHA256
f95fb4d50ac38d8272a6ba4ebcd8ccd813385f5338ddcd80e6be8970dbc7f8b1
-
SHA512
8b70118b7b1de9f57e88941ca66cc033a6dffb300e9405d139b60eabc281b21ee995810ee9ddc7410b60c47d02e933c62b0bb2751d23b2add21e413f991f1326
-
SSDEEP
384:SIHBRVQRiJDLSl6wwDLSODLSfTaGbIxsq:SmVjJ6i6O67Wxb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005a064c30f7623ab6d2502feeaff8314f033637e9d4c0ec5f206da41b8f18ee90000000000e80000000020000200000004dbb62d6cbc11952048d2bfbae53479ffb75f28e806224fb19ae151703de51fb200000006e1bf0e901b69b8f89f9257d04ed290e46595ec2fcd19603f9688363e5c70f0a40000000ddc44d7b77e6d9d50165c76d4795e74b964e153b6bbee94382cafc8508ed9f56c94f9831297083670c7e6df6c1de3b8c9d04a4287e8f83460f4dd478c9277dc2 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fe1626b5b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{514CC231-21A8-11EF-AB01-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423581094" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 844 1424 iexplore.exe 28 PID 1424 wrote to memory of 844 1424 iexplore.exe 28 PID 1424 wrote to memory of 844 1424 iexplore.exe 28 PID 1424 wrote to memory of 844 1424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91db319d5a4e9188dd121ceb16c80970_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51720cad9083741a4b8a767a8ffa3b2f7
SHA16b6168ba455dfb2e85aa1677fd19a21bd2954a06
SHA2561e3bb88effe3a6feb54058b08cb6ed11f4d43c0f5f61f07fa279fd0951579295
SHA51271710bcc2b3b6e1e0d0c160125b2bc8ade94d1ea0679e12e789940980bdfec601e5f75782a5fa5961ecd2be1946ebf1e4db3ad861259497711cf28c366e03696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e069e5d747aa8755e5bd350c2ff3869
SHA1b76a17b45cb733d678fd732c12f2b83c35dd844d
SHA2561d26b98278c64965a89c472b6f88a08466085c9b35da12082162625073ee1f1a
SHA512fc0c9dfc6955164cb984ad5ae172f0c001ce0a97fc53f6b278c4f7c5e9903c6185ca3e8bb797b78b3f522f6d1595833027abd330dc51c6bc8bc9780589a928ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57125f67026318d5cdb9598f7129270d9
SHA18c5722ac231d7adf856d821e736dc0503a4fda8a
SHA256c4fb0c77e98040e78114104735fdbe1989b05d3d3ff650ea4e5b4f52735b66fd
SHA512bc9f82ce0556706227b2e41f62f2b016d70c19024046a0d134ea3af90f36766adfcaae38c02020d96a92757ceb7e6613a5c439986e8c3d4d89a2459f6b56bc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d2682bd5494dda8357754716789254
SHA1827f443d7191afc7474c362bc698f66e68d57606
SHA25609658d99e3dfc2b31642dc8c1a49b1684d650ffc48f16bfc9ce6351d643df0f4
SHA512f2be00d901580e6498bb5affbf333b03dbb889613cfb6850d10ba1740c3f4486ab854a3e61a1fb07234036d085d81414aa75826d46ce4dc5042680b657c10268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e4f81860670beef84691c036776e93
SHA119f474aff21c8dcf1ac03a387297705b027fee53
SHA256dd79a38542bb65db698c8fec50ccc1b041041c6114b36378d9eafb8457550829
SHA512c1ea3bfd2afa68b72b3e678d88de42d35f5ead21621e781b539927c1d781034e28ff07d2c2e89be3fdcbd54c93d6948ef414f8af9d45a899610bf3ee9b9694bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53342fe17e827f2f969335012be38f8f2
SHA15abb6b680476fcda3f4cd8b86ae8864b9d34d308
SHA25604298ca98d0ff5b7013f379138d23b535311fb8c558c0a1d7faf319c2621b34b
SHA5127d7763ce0ebd95ffab149452063c0bdd30b84cf8f6081204b2aef33463540c9b7c98eec9fd9ab7f3875ac3cb5f35a00e11c384ffa905049b8ad020a1461d0861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07a6314c682f3f4d07943876f8f74c7
SHA103e727812747ceaedf7c142fd078289697c33936
SHA2561336ec53372241d79a152a4a779eee68f5efebbb7a1b7135bde88e94f35688f1
SHA512034a8798b7c16c9d8124eee3625c563977f68c9b944f3163d24de83afe2b6046d9b8a1d3a77731e54bd2fba5591b727fc4f14127a0fdf60019e424fe56f248cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cea86c91febddd4ead43fbc9122fdcd
SHA1e3504cee72cfd93f6003b5be931c3fd6f8aae335
SHA256d1c8f68bf8b3d670443b8ffde6afcf05814fc1c2d122451fe1c2490c9df5da6d
SHA512f274cb60452ea75f1665536c94db82c633dee32cf77ac0bfdb436216e7b2dee584bedf3af1277a0763dbdfd66668edadf5a9e13f88c35be0203c365d9ae64050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c926574d90cae971babc9ab078bd767
SHA15dce04643b406735b90b173a00a1e1d15c95e2b9
SHA256c7e81fb4e68bf65493899f024c370ef3f3859b8764994ffccf44be81f6d4aa66
SHA512bc4a9d3532d0807d931f70e59c03e08138c0a1a0cd0d83f42698fec035b60ae5f1fb8929d2b7df09098626063537175ecd816dfb7445daebbd7c2e414d87e273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57352eb5a459395aa469ebf84d934b66d
SHA1408ed765a34fd5ec343024ae39fea9156edd4bb2
SHA2562a7534d5ad32ea8864b400bc6d536de0ed199f4b7ac2b36d2ac84eb5f8f154ce
SHA512308d689c7d2f20c2504683431899e3e325f286705528c74c218a660cf62fe8dbced04ed354ab9a125d63d0256c0e0a44a6e87fa85a5bfb4397389f911fd2ec4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef34692e34e37b31575bc12fdcf3f7f
SHA1a1ccacb4f0fe849a6e49ad3d2800d86b04cb447f
SHA2566660aa36ed0ed6e4830605614960145575fff4518686d3bfe266721001a11fab
SHA512d620a210f160a893ebbf46a43f6967f6537dfe915fe51f00168237c4ef3fd69b8921956ca6440df6cce302c6ae2598949105d52ea11cf5cbf7b99a1c2b636afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f15969ba608d9ae9f56ac3a9fca3d26
SHA1a61fa1d8d4d177a88ed02529370a86ba220ac690
SHA256c2e3120eb85b140465679229e026bed083ce3217c0e1909a708f81d71971a3c5
SHA51287bded7452dd3370d0cad9a483da212ece4fe496402998aa3e6f2250ece0ff151cde1e5bd97f26d523760b1fa27845ffa00d884db341552e22c9fe25eb6fe3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59849d6959da60fafb429e31e43f9826f
SHA1805fef58a55e403f50cd28c7aacb738dc34c2f7b
SHA256188816d77cb57b822bcc05b4f43e790f37fe32665c0423e29ef56e8a18d755c8
SHA51273c05ec32b6f62c6f4f48709ca3ae67ec5d38f3832bd5c643ef3f1fbc913fd7ffddfe69cfccedd54aad39e1363cfc43b33175dd3380ba9c270a6b8c978fcb678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea52e3adacd664e8280f3bf73a58753f
SHA1ca3a46ec467a9ffaf3967664d016a8b100469151
SHA256ea455ee06f281e80712ce05aaf7d044fa9d9705614e4944f721161cdc8d07619
SHA51298e8af79afb9da683467783d6ba2ae3785f1229af4ffd023a4f0d42367bbb388ef245fd99f033443ae17700db090e2d507b38652e11fd8c7ce2376fe8116fd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc3c7d673b12cbcf46520db77aa45a9
SHA13cd9b576c1abefe25e378293685772eef10f52bc
SHA256d7a2b75bfafc44112b4bb44035aa2555549c7dfa7227f390eb487afb8e876265
SHA512cfea8f225323e084d151254afc7dee053863caba1e54ccd2795f06f0966f97ca0a5a8c8bfafde7a56efd35949f8e44abb3ce7e6acacfb66bd0eeeaa5f47ebb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6baf99fb63c2b5ed5b7703f50bd8c95
SHA1b954ea8ca52be4e72b8c7dfc0a286f8a04c9adaf
SHA256c4d2b53347b639b9c9f2ca7d040bc03c01be9045ac0a34ac0e4998ecbaab0983
SHA5126cc8012c0e400e51ccd8be935bff2ec81fe7ab92e61b97734c37e2903ce3b1985acc5bd24d96af0a07a37911711f6517a01293f1f84e0d79a0c7285de69c0cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993da7c6463a7f9c2545897b2708109b
SHA10b13c9574779e14c0441e5710c2355a787cb6c42
SHA256d76fa9767a8ef19d48c08a9a20b4a3205ca15977cdde50c6589af409520dcee4
SHA5125390111e4754d63a9c6ddbe1ea3036595176be8d9215e3bbd2ca64a9a3ceefd81ac334c7145e316479b7663e35ddfbfc5a3f071ca6e6c21b2fb62209594b513d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5737a7e0fd560c2f0e61a18354af41a
SHA1356ab1be05a3154eaee9135b78e679c15a3500a1
SHA256ef272cff7f9355b52cdbc820bdf4191b99ad77d95c53b56d8c16f99930d7b265
SHA512899b5545ae285a4fb13ff458451e85d9ee07cf13bf3e3ede78114c80f9b3a764ac6462446881069c43ff845e29cddf4f7db4aefc9ca322eb3a9647eecd92971b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa656b08da88f9682c9014b134f94e7
SHA149b47c47d4bf866dbb3613b49366822355dc2eab
SHA25621c5cfa73ca51ba124ca14f262da28515519919a785f8d5aa7fb71acd7d1dff3
SHA5125cb5afeaa57573b395571e3ebaae08cad4fb50308ec3fe6b4f00222c93fa140901cbf4fbefdf53606351a6559aba61fe600679633c147f5cd6735a5bc4066bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479380d8e7288004bd22e71ac5740575
SHA14301ccefd929cbfb9f85aca9435e2681257db61c
SHA2566c46fbb4302591767560f9e90d8fdec776be8e4460ee8f66295bcb60880176d7
SHA512487cb8d6576e6fa0c626a02bafd806a03c40a6767f71a937bebcfc607e517b28f94c1e21be1d31e4d7c50cf1244a2b7f116ee3895b97200beaaa53d41edf07c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d40f238a782c7632669974c0fd34c9e
SHA1bdb99ff35d8eaee94996c74b5cae90cf53f09a96
SHA25686439bfc15969b97fe2988da314a9bbdcce3a45b574d416697fc5100ced293c9
SHA5127e60fd0110d28d87b8a04e5313acbb9ee9654dadbcaa4aab0a38eb7b5fb91135e3d5f0809956b88cf96a4481c7056ea4d7ff1a29cc9fa31cf921eadee9e421fb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b