Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
0ff2f42c91416a9f40ccabc55c065be3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ff2f42c91416a9f40ccabc55c065be3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0ff2f42c91416a9f40ccabc55c065be3_JaffaCakes118.html
-
Size
56KB
-
MD5
0ff2f42c91416a9f40ccabc55c065be3
-
SHA1
f93e1e6ad6888b30fe0b9e81a3f6b690eb064260
-
SHA256
163a2fa35c0b829736d12d0c45b8ac2eb7adc27f7ba383ddceec4c80100ec4c8
-
SHA512
d126073e398d00a5852e825cbdb1a714dc9f00df4be81845649b057702ee96f3e3321a7e7e081be4c7eb72cd4b47575bc5eebff22f63be897993bbfbcfc43015
-
SSDEEP
1536:gQZBCCOdS0IxCrb+fb/44doX5S7JT3LWbR4ZlKYG0tEl7JvXDrDNi22a/M/a9fvh:gk2I0Ix3fb/44doX5S7JT3LWbR4ZlKYW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425520553" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705c73cd58c7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000001d7b770df398980b5ba9e16b2860d63cad02898067c92c0b7bd25ebac3b6901c000000000e8000000002000020000000109c8a63134679c0c219360dccedab16c3935d83f56ddbcff36c2e2a7f005cec90000000c8cc520451ef3552f6cf33a58cf631a3534fda61790214be9c69c1dc1b01c351eb8c992db5a3c2f9fd1ac207e332f2427e56a3148d233f0f28ef148867e7da45f0f97f84085b36eda355b8eb2a63341ede3c16f2dedb3b3114715d3f9bb2bf8452212bede990fa691da657e25c771fdb5214bb7940594088d59cf17ce8e0a7df61a8226d404b33be022dd45717489ba040000000dfce5f5076579682bb4a4bfeace57bc103ae831886fc420c13f4f2420fd0002254653cbb8ca6ca8be19471928144ccaf062fe52f7dc566e0e0ffac78962d4d77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7121581-334B-11EF-9E55-E6415F422194} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000ea650dfe8e8e88e5e21b87655169613efeeefdc5745dceb152111d56875e007f000000000e80000000020000200000003797e66f057899cebce1bee2c3737b341462cfa2a08120c4c4928ec6c39039df20000000783a74654fd0db3a41e850c35e91ae756a9871e900119852839bc6c87264abb140000000e4215e7bfdd21713767591d473dd93b13a688b113e1ae7fd261286b2c58d00ed3928949f09c43591ccd9f7cafebbb9f40ae518e1a21aa988e89b4701e2145c8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2124 2200 iexplore.exe 28 PID 2200 wrote to memory of 2124 2200 iexplore.exe 28 PID 2200 wrote to memory of 2124 2200 iexplore.exe 28 PID 2200 wrote to memory of 2124 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ff2f42c91416a9f40ccabc55c065be3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92b8899c38e463f36058bc407ab5a0c
SHA18ffa5453dc042c960380eff5e4e35aaf4ee69331
SHA256059e29f86d18be277071014ccabbed60127d2adc7c64c70866578b93ee86302f
SHA51276099b7f057fc893b98e7f188d220c4bf907ea102939324cda43d27e41c1efd4c522032713abef6abc04ffb8933e5a758c6717f0ab19e2aa36040db9d95c232a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5f1fea00f2be1e01c7f9aaccd3477d
SHA1f6e44e3ce6880c94e86dc59a4e22007297923efd
SHA25658a15e8f478829b7bceaf2073132c5fb7391e89e1407cdeb45314c57b93a2032
SHA5123f822f615264c74bcd53ce4ff27258c9d0343d5f638cee463054ebe157aedddc214baff5259fdf29ae6eb3584f848a38032b9cd8c0082df8514c4cbba144e352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b1002ddf3976c693a32ee50e345af4
SHA18ee61fed3f30bc8c6e8b47d212c66a9f5ee8796b
SHA256ab889cacfe086ec5e58d19d60d5c1ba5a7d21ba70e94dbfd56e264503b16f0a7
SHA51289918113fd88a702967a676b0a60bb377211aa7bec9f50a7565f6bacffef13bd39df4b2deeb9fb791169f96d83fa1dfa22635df9d91112a213716afe99fbb7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f78762d4c667191bc0100dbfb30112
SHA116015937a68a7600627c9be55a880eb0e1d3f4ab
SHA2562854b48854a2fa04fe98809135446317d2e2077012a023ca0f09858d942abd2e
SHA5121f1029a919167d85bcc728d401523aeb0a602daef6b7a3ccaf4d5c8c61e1482c926ce18a20e572f8f412d9f08d8c8f652cb0134d513c4da669c6a0a3a3122607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b63458749c911b531525c6986ced1c
SHA13daedbd9ac435ef6a4346ae36bf0a1ed77caa45d
SHA256fe5182157ef80ed959a990034a2f1818eb55ce41dfbe4284f89c6fa5c943773d
SHA5121d12841e358137c5483c6bc6319cee240eb429f193f5f02b75fce1be49bb47b15fcecada67e404e8b730ed24e2c9218afc534878294652115f93218b66bc9cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01ea49af6041569a8c959fe5a7a29bb
SHA1a69b4613e7dc5b37222caf77ff7e50e863fba7cb
SHA256000a1be2257de9c551ea7d153b23f2e8375ac19845411029df402e0188d482a6
SHA512ea88dc9cab24a6f1cf5cb6bb04dbcdefcbf073cca1e9cfb8d4d077fdbb4f83dd615f08fc5cb1a6975e1625fe4de5986fb53076b679f1a491b28417ef82831d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cb9d428f9d6c9dcc7bc19396597da7
SHA1026b737d23b1f76732970c83a60549cc3e41e296
SHA256ddf8f30613883d7dae6b2feea7d53d9850af42681d8a881c31127c7eb4e1cdd3
SHA512c57e3c9b7feec8f0798c8661f5f0f8cf74e4c54ab0c68b4b05a699db9349ec4ed1ae9e72eb30a73b7ab9a935dd5a6b499e860ea24e84ea4de3edfa0284136e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9f80f8ec2fb3334153ea8ed100602b
SHA1d7830f61cdf2526b7f6c7fc8ce1552a16e6498bc
SHA2565733b04f7f2da89aabac06ddfc14e64d623e709fc7e832de4c861f1ca50f65b2
SHA512673f8eabda8a5b3d4315b259529c9b2dcf10758b49de75a64ee8255dc562009c69c2b6d01c25f5be47e8185a5c1690b6ba57d379c88b0c3fab7ae90e85fdd6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9af06c07bceff2a6af1489348654f2
SHA11daa1f71d48c847f76bef0120f8db36c5d30fcba
SHA256ff0147f296288e64053482923d1951361876f163c0c7580c05422e3293ebb341
SHA5123084d17f1075bc02e1dd4c678a68792525a508fb9d87eeeee9990b084ea10018409e4aeeb072c6d8ed23a7f8d5d757dbc49ea6080c0ebe0acce74c23929318e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112a5893e6b2cd75e51600c03c9f491d
SHA1c9d9f233025f80e6a9b1905b28d4e9bdd8c68f6e
SHA25687539294b1d989fe26e9b5c476697a035cf11ba2e2c19f453b71f8e1e2cd2212
SHA51212e8832d56660e3cfa253e95ff21571e00009987fe30ce6faa4b13b4b68f17496088345f73b8c1352309c39795cf5b47cae0c19d28db8bb08c8d035e4701168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87fa496a715bd888b76630e7755b66d
SHA1149c42a3cb7a2f20a0a1d2c3b98e54979ca02572
SHA25605122ed907eb7f5118855b24f1e1b0faf091516879dbcb5a7e9cc3d0f1091ce2
SHA5121460967ff9d8d5c4f1a78020faaf7f60f54c4fbaa6ff1a0075ae2c939ad0a8337dbfd3171f1f7a1b46c9dd2853d9d4eab06b9fb821c114ea2e9391edb39510d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57838a6daddf2545c3cbea9700c2791e8
SHA11a082e005ac73808dac5f23581b76cf83be8bfa3
SHA2561ccbd399819f5d6620d765875c9fa15084233499ae357fc3bd730395dee4757c
SHA5123eac4b20da01fe1c142507a3378250ad0352f0a5a83861b8564414de0f2248695f0cfb263272fc19115cd849641ee316b83c5f6f7c0fb47288d610cdd491eac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f7d652a1ea03ae8a724cf4e38536d3
SHA10ae9e291fb5bcff3903e7254413e1ea2807d353f
SHA256ee8f79cb529fcf2141422498e9dae78291995eb738514df15c4295380075788e
SHA512e01721cc2349379e26e7695f487f43e062a84763f42f5c166cde07b71321af6a014b4e2c181b56c9705e625b963380d2396c4220c3a36ff7d2d4c9abfc7c5fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0c8c4cd83765101e97082b3cb78fc1
SHA1445b3102c5a44d5c541fd25ef54e7f64fb609dbc
SHA256c930997334c9b3522f5711c4f55942ee13c8e5065041bacda92fef911d5fb83c
SHA512c5ee0f35dea0ca097972fa0cc99f84e4a8213110ce26b3330143f14b39de2aec9c58d2480ccb9cd23d6560a773e676e00e7a689cde09e62ac5baa77048731d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4490b1d688f9030d58f4900ab4652d
SHA105771c5d29793a6d2e74d370dc4e28fb649c7615
SHA256e99b415883c5caf50b614994e576c032b8885f9df4ce86cc4d646434d457815a
SHA512dfacd3212228396212a0b91b4c8e213b03253652d98932867bf38bf6e19010fbe05ecf86dc6a68bdcaabbff3864e99c25d6a8a353985193ccd3f295ca7f96ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9edd6b0cd9a0299d47d27b2be0a5e0
SHA13e164ddfd5057fe9054a87e6c0ee71a4437d3c8e
SHA25669ae5b9ac679be96f74a7b55b91e9b77fa42b79c8e5e10f7dcaf342dcdfbc4aa
SHA512943e9f9d5c0143c30558dcff48449de938edc216e86fc27c83a3a9b4758f0308cf3fa586027064da77af6ce9cbd7b0c3270ada8aaabace015c428025770cb51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499cdb2c61eb5ca9bba0f91815f48a3f
SHA1522ed4376bdd59661e6b4da52af6075bf7098054
SHA2564fb316386f017efb1268a18fce62a34ea81962ccdeeb84a3f46ad7827d022fa0
SHA51273da21daca30a5a920c014493aa9a5788ef1c026e614234713fcca014521f060a3d2fbaaaa7758a639cbc365a3507b1026c7f0386cfe7239bf4c884c64a0093d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7fb8dbf834b5929b6da80e173b9b90
SHA1bf1598aaf7f1eb86e5f42db26ecc8360bccb6362
SHA256f2836841baa218c9fea0699b6ba0103dae8f5d5e74c1099afdc4d77173d9b58b
SHA5120ae806f4889e6f668bd4a455e577e3d9c5e411b9ad20316f0a29ce07ccc18be923614b71433940f02c176d44b4b5099cc11086da91401424bd2ea7892737914b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f94aad148503bca9dae0db919523be9
SHA1be72529970b66072813c545f7581c2f78752e827
SHA256b004258008cf9d7644ae10e7f11829a7652d869ce1567b499df5be63b7033972
SHA5127a5db2a54346dcb297e69a272fa7aeb9c894f5b4d4da59d50103a9d53aca500b22911dd97ec74b15291a1a837b311efaab3e913b2bd87c46a95a86554e9849e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01fb2a96311286c322a44e5ce10cdd3
SHA1b49a5913f8d7928480927cb608b9c651c061bd66
SHA256e6d63f9d63052e5b790ce4a8b2664e03f725ede196e835416f7aae0c9978059b
SHA512516bd82c29934d7c945bb67ae55d54ac077a8161b0dbdd97ab105e2466686e6f75648ff644987f6c24a47cf47b55e7611621370cd36fe69d5f75e0a4b5910649
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b