Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
a5badcdbfad9c0604cd4707d2a4710ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5badcdbfad9c0604cd4707d2a4710ae_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a5badcdbfad9c0604cd4707d2a4710ae_JaffaCakes118.html
-
Size
453KB
-
MD5
a5badcdbfad9c0604cd4707d2a4710ae
-
SHA1
72474ed0cd42a74f6e532d5676198813637ff88c
-
SHA256
16692651bc3c68abc6088e92a9b01d063a597fab11aec833baf8b2d569c6762a
-
SHA512
49b14cd7e8e7a2f7384e5cc5aa19cf4e1bf2218797461be6b2903bf0a8659b388e2357c27a073be4356b2a2ad0e887a7f8c295718b7b0223da70a3e0272694df
-
SSDEEP
6144:S+OQsMYod+X3oI+YXsMYod+X3oI+YXsMYod+X3oI+YSsMYod+X3oI+YQ:z5d+X3B5d+X3J5d+X3O5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ecd005c24b108041851dd057f2ff9e0700000000020000000000106600000001000020000000e9ddfd81c839f93b6fcc287e2f9a7e4399e1f84cc983585cbb49cede01396def000000000e8000000002000020000000697fbb2ec094795000b40740b065c2162997943390ac9dff9e6b30742516ec9320000000a43cfb2b6d51565414e1c5d1dcf92a37cd410bb3a0b77ba15010ced88ad78b8b40000000dc5252175d0a3506d3b39e1494f54013ba8ccaa0a54aea282593cd875998faea955bf6f805ec24359a760677c140ae22b079d1bfcea3027a9f6266be0c792575 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ecd005c24b108041851dd057f2ff9e0700000000020000000000106600000001000020000000b66d50c46a779532c32c9ebd87722d098f15ebd5b2fe9928e5261c6907cf244c000000000e8000000002000020000000b273bf56820d2fe717295fa1a5bb474aca71252345370d84b49ff02d9a04d7029000000095e14dac493058428f04c5441bb98d5318d793b0fe11ac70b0936f722c96c9beb991e2932ff109cd4056db01b1f7da0188da137d99bad4a931cedbc9dd5d5df98437588804fd985b2d4d0822105466ab6513c1fa93ffbaf50fc79915661bb7838f8c5fbc2e5a3bec8844ff66d8104f9c9d2d304c9a5ffc496f4bb57ad792ddfbb516b8023ac3ffca8b4c4b5e42b366d640000000d476f2ee7852ccc39d6908d9d08c7dff16d2c43c7c92b6cba77f1a554a079afcf4522d6f7a4dcdfd3bee782caac31c9e082f07bb40bf2886fc577e2126c31084 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bcd8ec93bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{182071F1-2987-11EF-A34E-5E73522EB9B5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424446435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2744 2012 iexplore.exe 28 PID 2012 wrote to memory of 2744 2012 iexplore.exe 28 PID 2012 wrote to memory of 2744 2012 iexplore.exe 28 PID 2012 wrote to memory of 2744 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5badcdbfad9c0604cd4707d2a4710ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ab27c69732742a9857da68dd85c1ad
SHA1d9cf12cca388da2122ea7aa8f2af04b4cf4173ce
SHA25639bfb1704f3df37a8df942123dd3337bcc757cc98a95e94defabc31b222dcea0
SHA512f17e9a936b29c49cc16992f67653f1ac85f315ca32168b876ed9a2abd198917f8426d4d75c3595869dd4fef6ccd78bc84246aae13dd457fc824e8835f859934d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b0663b2f4a494c52dd21446d312b8b
SHA1015ffbfa3b3f18fa2d0dd94bb19ed15861ee87c9
SHA25604d9c8e7455c693bb752ac6faf42ea4033569a97807d07ff36cb4deae16d50c6
SHA5122982224f15867a75644a4135d2a6ddd01246c6058c98ae5e1a8f983badca72297c8294217afc22a69b7972267ab2319c7a92fd9ca97f0094e42595b1754c319e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166f492de50d5cff3bd4c5de75ece2c5
SHA10c6d5e9bdb788fd4f621f1b13fc2b33c557ce6d6
SHA25664f68b646dacb7620a5ee243d418e48ca8f3f3511153aefa9720c759cd96a6a7
SHA512eb7bb5eb4836744423b243c4c51d3c7eea9aace98dd0bdc7f42de438d3d97773680fb9de302031940f4eaec6973a2f2d2d3355e10f60532a7b7f5d2919cad34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53277abc9b0e16161ba75bec4fb6609cf
SHA10a598298aa3ba08516575aeef3c58757e0aac6b2
SHA2563302a169298f962010c2d3bf71e454f777adac94372081425e19be67d4c9d404
SHA51270273adbdc298d7a68ff6165cacfc408f7a50b5cd36766417f62b940923bf40952d404f39bb7ddcfeb731eb9d27e7786f65e8be18758b6abee24ef829750767e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00ed60471c0637e73fd8ae081ef1892
SHA1baf79e6790b6d56e632c4ab5840286b70bba06aa
SHA2563200576e7112e05be4dfe93334697c31c64e61cb023e1361e213fb2e23adcceb
SHA5129d2584af26e6ed0ece8cd72b3353da3909aa7943de36bbc55387c6a64f004e4907258049e0f77b637ccacea5f2e9b76322fb8a2fee01dd73607e2781777e0116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a897b7570b813782a9549091560f3ea
SHA19b8c63f4f8618e6dc77aabfa294e26af13f0fe83
SHA2561e39cd01ddb16c7af2cd8d09739df5a3a497e4cd98b2dca25659819c108e0354
SHA512d62c230749c1ae4edfc539bd836acb7c19d34117eaeb5dd0d5ba29d8a57422f65051007d83b1ff2250ff4a3834d0e5bbf05abf1dcdc7082800d498852f648f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a92a17b80996c2b3ba54cd1e6af314
SHA1623028a0caf5c4c7f67ec93066eab31f8727f759
SHA25692e84b4eda49af053040f279c8509beecf62a00395f0a45bf40e6ae573e4fdcb
SHA512a248314f968a1ad39de67306effbbd77aaaa2e50c0b6c2d5c94107c36f975859b8e8b293018de6a402ca3ad556264908c31222aeeb339218efcd6db0236e0fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be6ee283cf2bcbc60eb82b66efab926
SHA12cb434b3bb1d0f3299a406cbfff26c10d135bc20
SHA2561163cce5b8a770cb3b8ad1dc127631d1778ae400cd0fb36b5aff5878bd9d6591
SHA51238efe8e61454e456f9a4188f65e2bf8a3ade4766f0e9acc0535a32e63eeaae5880c41402f2d8a7a72a5880bc4301ed6c0f30f509c6ba1ec9194cb08a24cee6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a537bfc3f56578bfb8ca03ad7f342f3
SHA1692fe5db9563c13964ea053373a3332abb6b9641
SHA2564cd5812d8d861921c4b8b953540411af3e5f8781c01418fcc3b1e4061aebf08d
SHA5123b8df24ad4bef8c74c1578b742aecf47e45e3bdf7c2e86b2282b435fe546c8f42f2c34f324ce2230c0028bed7cd29d5881db0f5f33acac72587779d4ec8705e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0677444b667f372862d257dba69e7ea
SHA18023da2556e8f1fa994cefc272e7858bdc129d85
SHA256679b0c727bdd7dfc44c26389958e5dc8954f33f7dc9d089284afc93df206be67
SHA51283d08dad17060a062ef41a506a489d0786c85d312a7d1394f36f73a8d9711b10ffcab1ab01c1e41ed329887616423dd3d9544db96c9b951825397c3d45e6793d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4ba238b03d1af9f76e04c700333d68
SHA1efdeb51900c4339293dd95f6d9f50a9ae205eaaf
SHA2563548d467a9a976f026d8750e54f02416fcace19ce3c7c318124f62b96d554c64
SHA512d24b4b55e0fedd5c3cda9e512044dc6e1a4def25ec5d735e8d1c0efa962fb3e36b86658cffe357ebd9d2cd93aafb4a9fafd59c1598c6e6dd6f5c745b704066c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f0ddb95a63116e025c64ebf2cd0ad46
SHA16a2289c3a26192c45a7a76ff0e5e992a714eddaf
SHA25683f09af062d669de58841f4f495baa1993945861bc768a1c031f087cf5574fbb
SHA512b6bbed85db8ea12b1239f909315de517f8b299b93c2dfd5ed764e3e69585ed2cc30420c0f8f360d31fb8303b470871249aa700568514b49ff30a7193d7a95a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51daa4a8f7d54b9a3633ed159865c5bdb
SHA15e1d793c6361b8ffbacef75fea3503dae1e49071
SHA256690d622951265b74f607a58ebe76e5550b507c52ea6dddac44b1c84f11daa81f
SHA512ca79212840de2350e20b5da9635439e42bd4ff385e5edbece55d899fcc49487dbd86682c02dd09b4ad72459158626ff7a5e058c0d50eb23c7c8dc640c9026e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08c26f51fff1354c0bce5e453876143
SHA1c06bd872adc0e687d8f469782cb326f14b6a7cf1
SHA25619f3ceffd7cff67d79d58a946139bbb157801bbb235f641c318f067ebb5db3b4
SHA5125e4cf8b89c65431f1e2e2dfb0d9944eb97b90cd10bc0a9561e402e93a17de81a4c6cf7612acdb666ff5dc8641450111a3b3842c14d75ea50159ea14ff10cd74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429bf8b0caeb57a321569a9da216971d
SHA12a555f98f187c1f9d5055759ed80c3d90d8012d5
SHA25664243e60f6f88e91b9bd8ff654b48dab4163e935174f07e6ffd63600938a7265
SHA5128a827932b9d0e09e1ebac85ae14a8eee92b03f244d2e1022f24aff0e3637f153e2a88fedc40ce625eb85e2459cc62e0a804850df170050f62ed8deb0a90fa7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b234a1b24534b45e6eb1bf8ef84f47
SHA18c8de06e5a1a1393c7fc871be26111bcdd611961
SHA256431000d3bb2e56d432dcc3fe5bb2ec571adf6a884f785e3929d03a4d1cbea25e
SHA5121bf2e9799b8dbabbeaf360b0f44364eed14a71a5dc51aea487cf7a2597e1647e82c844f537a7533d1b77e8bdfd02a0f36a28efd3c6a77b385fed733b6e181284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d890226ddaee22c5f76b8be1fd14fc1f
SHA159882de02f6c562e478f435002d3cc4d5230eb06
SHA25603c3f060cc90f3a786a3d0f3283b3b10b12bb2498d089debc3f5bbecd4c67165
SHA512998d023f8c3570960ac3b093df385772bde07006aa23b3b93079302c69987e456afa7326eea70b08ae71225d1a39a61cd4105340923d13b508fa56050391b718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57030cbe7a06ee0ac91eb4db38de4a32d
SHA1a376bbb5ce24e095f577d898a4b99e5b6481b149
SHA256283b4e1cbd33c1c185f32638a3a0615e0032aa396f741d248adfbff5d2b39691
SHA512b8f6f326089a730f4c4a4c3050349f1661c28a76720944a8f1ec602bf3dfddecc0147e541f4c3a1abf13782171aa7f5258ab3ae86a5e8eb122f8dfd2448e8d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bf8018e643c4663f34d88f1423446d
SHA1869a48c54de606216db269146fc1d5d3bcf479d8
SHA2563679471deeda8a23113a2b5594b06bd3400edb62f1d6072068ac2e6644b484b0
SHA5124e13951f18527209e6118c3856127f1534e3a76f8667bb621dfeb2fc13cabbb599dd6464e26118bd762d1fbc36047a9fd8f8dcedf1ee2fb87fefc69011aea63e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b