Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
a6a9305bb23a4b1dfd96413bd41d9153_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6a9305bb23a4b1dfd96413bd41d9153_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a6a9305bb23a4b1dfd96413bd41d9153_JaffaCakes118.html
-
Size
19KB
-
MD5
a6a9305bb23a4b1dfd96413bd41d9153
-
SHA1
f9c947535d0adba9001db0fce75cf514b29b14fc
-
SHA256
f4f3279b216e215d899942fb88836b6cd82fef2734989e975f1decaf49e616f3
-
SHA512
6360e13b13b5a18d7b82da22e52cae09dbd8db8f5c6f1fb69358cc4e5c1382c72fbcfad887b55cba36e9603932510a1e3f573abe41e5e292f238e846d382635d
-
SSDEEP
384:zikKhgESZVBD8c+Q3R1PysvnemLxXucfIk99hebsQzVc9+l:zitSZgcR3WsWmQOIk9Sbs+q+l
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424476192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{609DEB21-29CC-11EF-820E-FE0070C7CB2B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000453a52a4eb9f41d2f8d455b310d043c1b8d27c0c3280fe4fbd5d9b8f0115d7e1000000000e800000000200002000000073f7213b25a1a74a4f77454df9580d427a8e3635cd6eaf382f3d3f486bd240832000000061fdf85faa72a5d1b4bf7ebd2abce27754f4d5268d26e3d7e573c17e9906d2704000000023dbc82fbf90bcadb1ee1654cabd7ec210ceb60eab29eebdadea573ca10a3078a0c0d3888340e6041532b704ca0d5c1a106acbf3432b2c8d2bde84b2827d40ca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0db2f36d9bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2432 iexplore.exe 2432 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2432 wrote to memory of 1700 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 1700 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 1700 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 1700 2432 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6a9305bb23a4b1dfd96413bd41d9153_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d20ffccdb59ea25089f9d1ba04b2002
SHA187dc26d93f0b0185672efd30cc5b2dba2442b599
SHA256e4bb555e776060d70eab3b9c00364fe0fb97b6c63d4589273ac7055dcebbde9b
SHA5124ff9b4870a0910155dcfc39181dd86c66016010b86a0895e5eb1bbdabd145b14827ef06f119809b321642d6d0a1bfdd940b01fcdfb56d6a91dea1636fc2a8060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c13d6a7b16dd5e43e6804fbcfda3e72
SHA105ebfc6191f9d4ec12f9542fc6de619084543da0
SHA2564ab2fc2feea4e8eb4c46e1ca0e09150513d05183e68af56563f6b192c8ceee82
SHA512cb928060beb0f4baaefe222bff7b4afa78901b83f46bccd5808f114d99532a5e6afc5746fc8366f2617dffe9d6b2f753d14782e227d314ed1f1dabb8c7de0dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf9b693c8a7aa230ba2104a1ff9466b
SHA1cac879dad8633c7cff171b578aa0bec3968ca45e
SHA256651684e58c25b36897efc31731e8f324d7c990c6d20b4dc73921e76f2f72c3ab
SHA512a4d1a87b78ff39acbbbc02525cf7a1a9e178a94acad4d03b1208b23850f9db3f0d3d18fe3db24220d785e4575645ac75eaef0fa46c216d02cf9edccb6ddda28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb072a6620fea2e5a437554c556c761c
SHA15aa992f90669567d5cd5c484982b0bd3d0607c42
SHA256b39269abed20bc191fd22fe3630497d740f5d1cba0cf3428ea9ac25430356d17
SHA512c089ab8f9cb8b36b8f8ea3d63c308db45943774e2390ff472387294beea24217622bb31413125504d02f7a19f7c69a27d9cd4243df3476b5caa16ece9bd58f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee6d64790541fa5d25101eed5b669a2
SHA1799a9f3978957e431cee8b1a92ff207059d28ec6
SHA25671430f52c7f754f9664fed4f776ae370bf6f3b6b90342294b0d17902adf15cb7
SHA51245d84a0539284852dd84f2b1a32b2611da3b79d1daade11a04f58f7fce003f4f73f89bd6b4679264ccf7937d90af9ee72ded2d7d02af479ac10326e23022d1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54188f8ed57ae6b5aa8ec8d697d09bd9f
SHA191e3d838076d1ed034cfb4ad6c6c18b8deca7b90
SHA25683873702b8364963a149faa326c5fd3dfa2436f23da39f78a224a4a2dc6853bb
SHA512010ca46ffcc0aac709d50f118e82d893f1b792c2a5da3a9993640eb460556f2d8166443e610280e166b57bfd5a5333f8214688743a0307273fb2bc1cb675d2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515be08106c4a5479c7b8bfdd2a95ef46
SHA1855ede7992133d538e411420680fd4ddd98f9604
SHA256afde68adb3626e9bc1ba57b0f1dc8f16ea41727dc26fdcbad7361c201e74a373
SHA512036e60718cc7728c319b1fd01066c0002585f7a40f91f696645f67418b94eeb81b33e52625496df540291627c57c1f1d328bf8c01356ef39568214ee5822fa98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579970909646f5ff100ab44d41b8e616b
SHA16a7d2e8b6813c1f30d041de6c984c7b34bdb1c54
SHA256544634dac5eb3af2b384e1c34332bf0d2ce05fe0dc21acfb9719f7db7c4aa66e
SHA512567741adeb28e40d5c60c90eb0525ceb6c22f388394bced9d436578bd77032e9c9c6545fa7c74f92925830e9b5a7f7b8266abc0cf1623bb531ca8daeafe53b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c7e5a67fdf114aae87b3b047948069
SHA191b12f757cf248a662e15b143df3c081b6d03edf
SHA256e6e64bf25d1072b1dd52adacf8de9f1cdfb6be9ff97c6383f22a3bdf7606ed49
SHA5123d6bc16946ba77e208bdae28b457c2f17df7b769707d4b27ad55157444b24bd2ba33335e46a45f94237b2f2783fa34cb6a5831daec4924b1c54d74c3553212a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59021edd8b6a37f1d5bd7fde70b65eea1
SHA1fc32b98b8982b06a8f137d06b743dd2173d71c05
SHA256af8e346bb41acc25189436c144694896236e1e5375ef7cf81d0aeffe352382f1
SHA5121f450138ba1402ba5fe26e0cc667ac79d63a1fccf06f4414c534422ca46934b5448cc0d5596501c5520a2a3e8703de8fe3a53d947c9e77648f9db5194b28c94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c133603f0f2f5cd9f936f9e636eb6fe
SHA1159fcbc3e19cca4ddc3122bd65d800de54b3d22b
SHA256d3942b413755a6d6802c51f74a85828ceb82f0001bdc24d6ad5d97802741f82e
SHA512daca27a55830affa2a2b9b551c10600b6e60581a272e491d9e2d7d3eee946b6cde22dad6f131d36506d3029ffac870033b1e96f9f60cb5b919c426d23019248a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ba2199c03be211425db7496db0de93
SHA1a493af4c4193582a9cb30080c24f59a8a394fdfe
SHA256c45c1b82a309a67cf11c41f5d388ced25905b35f7ae48d585241e13545eb285a
SHA5123cd9fe146f5befe6c40c7b2fa5ae7163cc53e169d1689c8f97590fc2d93a39dacd1bae2f3f64c06d1857025dc6170e90edcc2a46b63ae3d4e7724a42e53cf5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625c859eb1f571d8b2e3db4ad47d3030
SHA15010e74f111b99b8d01673942f4d794e7e0335b7
SHA256c8d4379182fa127a1ad5cc681653d3833581effdfe12e7791cc8bda094c03ab3
SHA512494fe25b373784a9f2617c15a9115755275790836ddfb891abee385fa5ad3c1af6c51f938f1ace39d9b51c78e13b3a702ec1929502423d90d63d111d7d464d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a755c8375af85a0b466f69247b1230
SHA1c3276314c8e83216b3c9838aa9c01babe80411f5
SHA2564d89a6fb7c54db1760d2e765969b2ebda991753068d46a03ad1d46f513ec7998
SHA5127539c7d0883049b14faf11c8aaf78933927401ab2fa012e71917783681c20bdfc0bb9f544c6439d3a67f85c5de1c54a4cfe038164cb3c131c8467f41f353800c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc91234ccf1cfe09c7b4ed87ec280120
SHA10176b437e932617b9d7eff5ced217a819ae76f6d
SHA2567f7feef01aeaa52275d5cc9e6e2ea2d460476f13409d2b36d598a45f849c92cc
SHA51285c1a895726ccd8fce30ff47f7869a6b624106d92598f2bb6b3b571bd5eb435901524da82ae69c51adf0403525cf9204c67bd3a3f85cdf4075e95cbfaf6f4216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b3235679cad7a32f63ee6c473e268d
SHA19b950e8146f10fcdbc71a21deafa9e69fd62ec0b
SHA256f4cd3958007ed9c34d316cf8f0589297b0462f9e8b268b99b8a64a69fa6f7f6b
SHA512bbd9a3050e1388ed842a969f6a6669f53f73479465b5df0156bcb40f99fb9c4339f8fd48084f718221ebedb06a1918a87d8ea2298d2940ff1c77017885ef1c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3f37c82688c800ea1c4d6f8a6e6124
SHA10950c22607c6352f3360c498b35f327420ec4c56
SHA256b55fddc3d3276d1b1c40af4e1d003ecf91058e293ad9336f31a5d4c4f3dc82a0
SHA5122bb1d1b9c15ab5766a29a3821310a068d9e34bc4d4e48fa6df6824abf2623cc911e7413bd8c5023b5f1d97c14d136f0af3d098409ecb18fe30ffe2de93ca9902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cd9e96724667089da6bbf6ade18462
SHA16768688c8d389e2ec5d4d3b7a637cdcc88c175ee
SHA256d54fb2d3532881d3e7f18921534c15889ac0153064d13e4c653180fd16b46d1e
SHA5122ec13dac4e8df21367b253b3dd0132277eef639bf34f448f676eecee66ff2aa6558c74fa52f08cdc746a17107f49f77b37b168c1c7547323218311e11a58e0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b482e1ad7b4cfa93d64680e48fb2b8fd
SHA12cfb13aacea3ee1fd9042c113bdadb0f08670103
SHA256d417a7b8d6585471585c682436c1a41dd056e4c9d944bb2c06e96d2dd5a5cf90
SHA512e05c5a3f995657d05267f90b9eaa3a6199a65d1fa9819c9bfba446094281d7ef273102f406e859608e53b82d4b216d1d74e20e17e583c62d83d1135fbc9e5856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30021c5992976b8ed4d65e9a8a8b5a3
SHA1714ddbf709a10e3a815fe32389b9c9def507617c
SHA2561cc8e74faec0646d3b904c1403641f2135dd22ea4a8913596b790ed7213c3e9e
SHA5126f7e8cc78d9e5df6bf91306c9f268cbd952f47f0a0e8719d63ad04de42e1e4e255531300a69c4152d728a501fb2e0f9e55b8736327f93b1f942229115bb38991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5959631b8f46a995aa012365f741d89a4
SHA12449c82dfe7c1b6c8643eddf3bf3ce62829fda62
SHA2569283ae8065c62441759f452cba44e209fea648b6d1f039107ed709f885bc0f5d
SHA512f423e9ea6801a467a2afe75185552d0a5297ab3c9be21e0cb529f025cd770bd36c8bf169832136e44279d3e0d4a2094681d9e5118df4a1a63274e37ae177eb4c
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b