Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
a65524475b9f15c37efa398332fdd228_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a65524475b9f15c37efa398332fdd228_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a65524475b9f15c37efa398332fdd228_JaffaCakes118.html
-
Size
68KB
-
MD5
a65524475b9f15c37efa398332fdd228
-
SHA1
00287516af74f9e78f7ad6037159359bedd20ab7
-
SHA256
80c68b49d0ab645ca0f68449dd32312f28fc90678f1d91c73de0a011c69b443c
-
SHA512
911574ee9f20d7a93d41df825b7bdc3eaec98ac2653de35121867a6922acefc1139fe2dcccefb98d27dcde3390805dba959f8f762e3015d6dfa1b9fd8ff81a36
-
SSDEEP
768:JiXgcMiR3sI2PDDnX0g6wANsXTzWvTrSoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:JTMmXmnbTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{160D92C1-299C-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424455451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000006a9fa700967fada81dea7e4db479f3597e0dbca403403739eb5db8289a00fc60000000000e80000000020000200000005c754d92325db2f6be6f7b0ebca21abe82e7cca923a2e05b8c6ad6d4eb7b42a8200000000961183e012a7196e867fea7c84f3d33fb13b67164e1b710afea599218f4bba6400000006344c2dcf84d01c9436289068ff410e80fbdb0e143c5fc59f955f4e5613cbfd83355f8b2a43fc3de1371d5ebd413f6a17c0227b5b55dcbfbd7a86cde49fcdaa5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b12aeba8bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2236 2460 iexplore.exe 28 PID 2460 wrote to memory of 2236 2460 iexplore.exe 28 PID 2460 wrote to memory of 2236 2460 iexplore.exe 28 PID 2460 wrote to memory of 2236 2460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a65524475b9f15c37efa398332fdd228_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f8aa1a291d20db704aff8dcc99c0782f
SHA152ce8f8661c98ed78ce5e778da3ee0a6063eee0d
SHA25667e07cd7b225a0c1e39e6977f6c9605db430dc8bc953f619b8e6576c0bbc7d0e
SHA512ad9c5756b501c2ab332eed9f82a3d8ab1efa36c1163bf875a249071ebc3ca12866c470396b42510f73a86117d56e074bdb4e82e55d8ce14f7028168a5a350cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f615f8d6603ae645f3e4e123f36f7d8
SHA14d094de8f594f0e1ccbd0de94c0f31fdec76b573
SHA25637c1ec2525c274d8ea5ac0329e523f167268fe76aea04dc16d144bbb21a378d4
SHA512b01621c8d9fe59d84c35595783a84f9bfe3d4752d97f3f9da95c33c0d704e98064b80ba96a63a4186c65b59d43390c8fdb4d9f510fca9cf86c4afa67ef8c79ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85b8e915cd521bfcc31dc5eb381481a
SHA1576ae13c089e81da70c9d6772734c11baa3c1880
SHA256133867774db6ac7de29a9858b67f0e025f7a91bf4d55257d925e060088077765
SHA5128b47566b188feaf483e6e600aba3e015644330c57adfa66fbd7d295ea4fadc8af7397a2e5a782c737f27e58497f22aab3df56ac9a8e157fcdb048d00ae88d235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573534cc98eb35a1df651b201b2cc4062
SHA1fd5fdd4dcaffd398ed1c9d7b071519752f73f933
SHA2569b0fce706edfcdc022f31df5291bd268f8879bd72e42836591183e24571e023f
SHA5125d0d8b518bf8b81cfccc6ed4a5fc3c3da028755e6af19a0c4899256be97adc96d6d7dc3d76549f9e3e17f0af6a0fa7de51a4e50d8606966b49f88278088a2933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cc7aaa1b93580b7e35a7cec24d751e
SHA19f45539157c3f6670e2353feaf2526290f2cf578
SHA256248e539c090d3cceb74599d9d98f174bf476964a36c0f16bfbbc32ef1f4f83bb
SHA5129176ff5a3e7f24bdc8957d46dfe30ede7259bae9b3e9ddffd0602255d0f0fe2f0582d6512a2821a39b6ee5d152fe428e2f29710a6863f5364934a0bd8c80d474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cbbe3205b2bc1b937d24adec3eaa0b
SHA1cc89482dc083b4cfa2fac57c319275dad12af844
SHA25641afa34b34fb690963da826d42819dfdeaabb1a2c2cb6bee8bd263c66eadc2d0
SHA5125ca8f5646eca62e60d26c96d5619b3c1cd0251e4321394ce0d402ef3ca25905199305b20f6af7880f318b96e5fef9f651dddfec148e5459f7e686b2d36e63bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b498fe237877ed8d82b4075fbde37a7
SHA16adf613b9717bbf73f649e664cc8294bf6ea752a
SHA256290bb0497207c20f96fe46ccd3f1801ddad6a6da574d13824b1e5af2b59056c9
SHA5128ecece6ef1037e1c9b42146ff3e4f62c9aa42bf91aaf929f5485b27c17089ca950cfd71bd8f620808d4e0bd4643429895e90f859791f1afb82570371f2556986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e055bcb8d1908df271ee0c93e69ee6ae
SHA16abdd539f2d99fedd5ce7a3a83d7f512ceae620f
SHA256a35c4b2653dda666c5bd285bd408784a5e99dd6a7872218a2b93cec24a9c6466
SHA512cb0859aa925cc990ff064353d7b3ff8bbb5b25d676476c28bf78e48d3c14ac163caa14d4a7ce2dc9514db445cf9686252136648642027af2d2b5381d8a2f3c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bf618e90b1cbfd110adeed2a229b6f
SHA162a663fd8ac9fe7f466ecdf6f1c93527c3810632
SHA256d67fea5ba041a8b468da4e486e8cedd04758e05cf8657f5e672cd48233cd0f0b
SHA512d4ebd074ced9fa79f015b1257db6ca09e05a235aa1ef33c4e57c728752e9a11c8039d7ca469f3863a3ba5484a902b30acae8489c7136420164b3f9f38a90ea6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b571dea882162bba2369dd0a5ce582f2
SHA12a571e258b2801d7413d1cbdc4d3e012ff93eb68
SHA256313fab1db954b5acc8bdfadddb6240b9d2c03600a9b417902f479331fdb173ba
SHA51231461ddcfe62537428efde06ace152d8b3b815e0b183148517f94779ac5cf99d0a48167a1dbae3ecc500a97d6a66b98bca0b05c93e1187eebb2242fa2219e1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54613a903dfd661bfc89b25772d80b400
SHA17e1b5ec126021136a45a1bb7cd5907957d65d0d1
SHA256f9914d373c93d2f73f23b18aec9b3f71d7d17ef0ac5b698c2cac46c4e1747647
SHA51250cde93a2bd4a020a54c8012ced28e7ecce705d348f3e49147f1c7832566adba0f8bc4b3781cfd4edad28efb88aab050459287d3d647016b6f351e21fb24a517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4ff6f8414e07a040b60d3b7a523c31
SHA183c992deab1218febbb86421868383795c75349f
SHA25691759129610323f21ed6078038d5445dde9873ec0afa91a99ec73d35fafee41f
SHA5127dbe90943d48112c757e11dfcbd1c19f5431268d13c9d70c1d1cfa32a12e08375cf846f914f8483c014d18e727cd6a61ba70961d5103ad949ed08102edd5056d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c13e9984cb157ba6826d9653c4eacc
SHA140f8f72b1ec825138c69ae10722f2ff50f525ff4
SHA2560dd77fef8249a0f45d292f2b969874d3a14c8734bb8c5e382073dbb3f3d1bb1b
SHA512dcab5591a06ac2ddb4bbb55d95980ee4a0a9949236e9f846ac84d7d6e85d7af72a881018a8d44643cd9c9315a0356d0cf214350bb6e9bd0ac61454f1d32de4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17291e7ddb311d70f936ecf0eb93e9a
SHA15ee859c14ae84247521123acfa7b5d515c0bb55b
SHA25668f7f1bdf4b16c1bfd0591105d78682254f62757725b19e4d9f628de0648f3e0
SHA5126cac78400f083c4bd46be7eb2e95e3a379368bd83af88af1275b58bb0f92f8e057074a9ceef3fff9c7029bc1e5983d6c7ce14f482417f326983a35b4434d74f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79b4674dc599e08ef63be92802574ec
SHA1fbf7d34c18df93e194972c3f36c4b379e95d892f
SHA2569e32f92b150184ed7580363f867c4ba57dce5f2372c06d70021d535db867d881
SHA512146ad7cf92a0bc7a421c33a9d7321128a0791a3b1704d1c2cf4f9c1e1b530366ddb5a516c06ae6273a2b0aa5e64ad3bd8ee517a2412868eee8d678fc46d82c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b71eeb4d5e4b4ab05befcb2aa0b700
SHA1752fc0b6d78c0990c09efd7674d271c31cdf9f20
SHA256f5716eae882d10b8768eabc9f91092e1043d8c0daeef1f10df21b2fa8a6f3dce
SHA512959f232901ca7b206a642802079ddb162a374bc1e63efd7e2a9b9262fce13d736fe72282038d73b3bb764127e686d45c21311f9f866be0a0d44b7de5bdc5f184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb411bf5a67bd7bce594b2792985e6f
SHA1840a30f0317a3163e9d7f8ea2a5d81b00d5a468f
SHA256b79d8d914a1bd10493aeb0a4a52d632a8360fd64556ada88d73277f589a38e5b
SHA51244ba815f3404368c97cdac4c0ac20277165247e5a1c8f1fcd92d28ec93e4610300d7bae6f39909f2a0a915b72d0fa0f298ea22da90fd42dec60922332d6254b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6a33dc046b7cee2fa569be8420ca70
SHA1331194922d2db52d052a12f09c8416c440d2ef81
SHA25682afff7dffd9f024e8326b4092bb0cae90ba2c7d5aa0392b12dbdbfc91092543
SHA51264d3e648b0257608183ed3b63237ab7e3e30c594df6e1a731610eaa6788c934cc6d998f693fa24aa84d1d40dd50e82a25f6224bdfc983c667c72c7903e204695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50249acd00b0629083b7d4a090fa1f392
SHA10388ee6b2eff2890d06960feef48c07bba5fa1c6
SHA256f09ae057e04cb80961652125546b58ba61fce43f7846c8cb87d4e18a65a8b1a1
SHA512ed08baa13603862d06066816ec4929aa21bd7a2ae1d0d6ed59f5cecf8df161ee15eef6b76b1cb9f25482db6bba23e1d80ba601696d5135d79d24750b21845c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47bfbcbbfb5fea23bf4e1d47b355abe
SHA10e1a90ad848cc2a8c67338c84ae7a7409602abbf
SHA256e9aa45adbe4dc287de0b166c44670c62781db2a0abf689163b172a8304ab5a69
SHA512e087e7522374f27e2c4b77d6c45ce070c76938922773801d4fb7942f6d40c8624bc15f4b81360dbeab5df07d80dda4fd1c8bfd84d628adda44e8bb4981964517
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b