Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
17ab5086aef89d4951fe9b7c7a561dda_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17ab5086aef89d4951fe9b7c7a561dda_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
17ab5086aef89d4951fe9b7c7a561dda_JaffaCakes118.html
-
Size
4KB
-
MD5
17ab5086aef89d4951fe9b7c7a561dda
-
SHA1
a94d65c168344ad9fa406d219bdf60150c02010e
-
SHA256
fd1066e92760a8bdf3566a2d41fe229afe9d894db37b88a13cf4ef4359521ad2
-
SHA512
ed349558426b40d495299b40107561763883152f85572586179e807b7daab0e70b2f9a971b3510fd9b9647674a8861405cd9c9f0eb35edf916f48456088558f3
-
SSDEEP
96:qfI62mwJzQ+8g4DH1ZFDIKsKuI2dzsKuIq5dzsKuI3TZK6IPbmIH1dx3urIl1dTn:qfItz8dUKsKHusKHq/sKHjAjPb/HHx39
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02cbccedcc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000099be215841e83945b91604591925570f00000000020000000000106600000001000020000000457c8bca95935ef2ee89b5ef5fd1b34f7e0e6a89a7f76a84cfc93f06db2570ad000000000e8000000002000020000000d677a87fecb35b69699bfbca48d1c7a5d54cfe5f1e2b59fb7e5e3716143c9d2b20000000e9ba46340a3dfb2747e146da62eff107edefec17fbfdecb54dd5902c5296b71b400000005808d9a3df4425791a94c4d20b34734449887df63aef1fa1528b809308cfd25963a354f7b335a389c0b7ea822af0a23d2421888cfa0f8899222771c87c249bbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000099be215841e83945b91604591925570f00000000020000000000106600000001000020000000e7015c50b6e45522a57e4f2c1810110c7b79b8ca6a4484d2cac7987e7e9c3582000000000e80000000020000200000009766fb5881e38ff7c0c23a6fed69bffc2f2d5804a9271aaed524c0ccb2b67f0290000000a81616a97c4709efc217724446d1477bb70c5a85db25047832f495652ac803a071875de7f3f3282f7d6b4f7126108cc5d993cc31b155e565183c81ae78c3ec647738b18e687ee37330f99f902c65ab5d68f0311871f3d96d7d7ec1856210b9f24d5f276089fb0fec90639c8039ed900612bcea693c3edc96e7bc3ae16558a99e96cfccde472957139843b92f90e86f8640000000e1c79144239d380acc2217bddfe206fbf71f4c0d8d03257be7c3f7fbd218e50437433ae99fb3451b97fe401e786facda6a67575dab97c9594c5ca6f65765c5b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA3D80C1-34CF-11EF-B991-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425687201" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17ab5086aef89d4951fe9b7c7a561dda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509917bf5446420aaf0e0d9179204ed6c
SHA1a46f8103be83d6f4067cb7bcec3edb47d2a8d8fb
SHA256526ad9f499ac45fb8b7e9f6805636253bd81124cffc5aa5ed69818274a461b4a
SHA51213dbc6e39f42644c96757d62e8a5f4d7dce44d6fd825024a593f562389def2b3e7b73eeb2e5910f0d21c61b6d37a3fcbbe39a4e1eeea8a9b47170282bfb5c682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80fa093746b9af46c78b1fad2fd9c1b
SHA130656c907418f17d92ca899292e1dc6d6763a69c
SHA2567aac5d873ab803257dd2c8bca46d153d2e64c2845b4438424a740a1a22b4b639
SHA5128853f11836c7fb6e246b03bd0be0cdf9af81d05286b7f9595c6c81122ef9f2561105e8882fc5506cbb15342e0b74034d0f36e97650422ebfdbcc69d19ff3d0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ff187efa2246a010951ab70d122857
SHA1c68bc6c811738e45a41c3829ea663f33d72404a3
SHA256905982e100d9674b63886ac4b015b01ebae26cbbf14a317b42c2fbef5c13aec9
SHA51256b4aba71efcc9e325487f383bec6eddf4a8d7085ddcccea51b4f4d9cb7a1c96b779d136f6f2826fa94d853815b59f4f2f87857dbfabd78f669dd76435132555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa819ae332db6809d25a51c49ccb2da9
SHA118a3426266b40c299e260dde42a735c59418899e
SHA256be5f82bc8b3eeba86eeff397492824bcd9cef59d3712adc67d1fe7fed5113cdc
SHA51280c9f1abab1ad2c2b27ec92a046da2cede318bd41719fb8abc2d80792ace9049c14c47e0ecf2b0f90047d4b0465db2fdce86be2c668ab9f2ba6b2946cc7fbf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520eae400e3e7e581c8efeb7e8aac757b
SHA16ebbda2022ceb1e14d4d1435f91e6d51f4beb11b
SHA25633b491e500599aecbfadab2c7f9f4f7af3c9362c7fea8e0a085880152997b603
SHA512bbea42672b2ebfb085deeda02b4b46b18591995e39f35b481fceffd8af14c859708023b0b9ac5a2ee7203532acc0a0956c83420113f24a86340cc2387969d699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579525db53714f2e8b8b04090b4012eb1
SHA1d51dfafb496feb64275794b99fd32bc90a64ce80
SHA25644f98451114e0fa4dcf103a9adc2f9b11f4f003947d967ff6fa953e558841e72
SHA5120445906b359e3416fb70b55ff11a8b47b5096b67439021ac418c86d9d33656fa242b76c0108e1a001ee47c776247d4349c8894ddf7856368cf881a490382a7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d1331ac8f3513564e08801cb1ea27a
SHA14c313b241a5a20662afe84e38136ebd925cb67d1
SHA256d629be0b9364d4738e1c664286698cf2b0159a46bf05a3aa7e5f40ada8c32cc1
SHA512fda05d347705841bc6f4f619ee7b1686587e9f3aa08dbbc97fe3cdf8180477d5e8edbf0d9cd8b0a5a429840a3e29b4a1a23c459663dc91f7e4e9633446bb0e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f90690608e58955e7f09c98c201f6e
SHA151eb527add681a4cba1a482f96412c5237b91627
SHA25693589c82ad76cee99bdb2c2d291e97dd108bd67f0a63238e488bfcdc2885eeeb
SHA51283eac0a20926e1411047c607ae7a67634105003b4faf36ed18f4fb1c1df7127db754714a1084780bfb775ffa81fe7947c4c3d9aac8933d57be1cb9e26a09e671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56debf0ded298416fed01da09ad4d8e8e
SHA11ece0a7c6e39b03fdf2825d153a244fb73496ce8
SHA256cd914a5d76b99dea40c019c685bfc5657d0dd59bc913d22b4180b4447283a6b8
SHA512fd61b70d90550d6fc2d6d3b0d6364d9f85121f361d18521b9e037a71d3b2630f48847384d8b1f8424629f1cd218d89baeb04d624b0d7a204880b5dccca0d69ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb46821a4a0efad49827f99a76b07333
SHA1e2658cd6142ab1f137ef2fa68b2f502fa8f3e197
SHA2569fce93e22cf71f1d5dff3620eed6e1ea6d57b3a2928bfe5d6ba2878b5c6ebc25
SHA5124f4cb62af1679d9c40804acbc198d5c3112f97790b6277a84888e24321d0b886a85edbf82dcee22ceab3695600f36f662d3e75d74a8d935b8aa380f64a1df491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444855fa4753575e5833a07f435d5abb
SHA1f8bb8128755c4e8173795039f26e903cf96bc42a
SHA256a10d444144337d05cf09d97b0f709dc3a8614ecd5d4eede210d97e63ce0fac00
SHA5125af974bce6669d2493a5a125deff904e9d6f9719021a59c4ddb581b63822fe6cf9c28464c7b169a5de52583c88c180c3682523860918eaa5d81545f1375c357e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534dc648e2d060d211c5fde761591fbdc
SHA16be1650e19b10d169b4b3c36ed566c6947795b65
SHA256ea34694f8f41a762adc57b1d4ad09244e02801492e6a59f665bb28fc414caecd
SHA51268ac92287b567b2e4318b5556c8e6ecb00d3c415f7bf0005ae46138bd3a6e4b1c8c1d7bda1bc412d2f697110b435d3cee52f8ac7dac177641a641704c295c8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58996886a41adf906f4b6315e51faa4ae
SHA16fb02941c0dd8caaec93f5aac1539e74148dfd8e
SHA256ee44d13b26b7c29a4bccbe208bae29da447bda263225770581c3310d31955eb8
SHA5127abf4c2f0344ce42a81209fd2980374c9120f987a6cb6a2e7d09cbf87b546b549e943ab6c301b793653eec0c304b8d9a7b369370b9d06f7dd7db8c77fe776267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa8ab4b0f165d5d6ffea6dbc9bf0034
SHA1cf272a8fcacd8f50bb5d5a3665268e13558fb14a
SHA2560d1d9f93774ddee660fecdc34bb88135e9159cd0ebb08baefee6e804fb8c60b2
SHA512a2d135473c86a23aa4690a3369f9aaabf60fee7cc520a4f1f241267020a1bba55f97ffe20d6c6cccd2581728702eb6ff33b981e5a9189c94f098cd39147510b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef4e5cb7bed784ffb2157717b9b09bc
SHA1c9b839c54638638ff58495ca624f7b61da0c884a
SHA256c4ca20fa05f250be3d822bc53faa8831dc14be7d7891b4eda6ec047d50b8bfea
SHA5127fee0f39f9d6b6bcdaf2123ce0c49e65cff27cbb8dc879aab2aba774d90251176f21b58fbfe32509d57cf6213632ee19431a2dfcc73a5f271781306373f4454a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573aa506f5443b829894be3a7c8e23d79
SHA10df43adc084b5d0a2334a38c0b2bf6ffb147794a
SHA256b2d24f3d67d24ccc36d3b4566dc331dc4175bfb872d9c936afcf4a71ea96a06a
SHA5126d9de07ae426a31e0d4edf293a51fa3ddba479ea0636dd2b92a9ca5a91aa04d95da4836a5c5f4af5b43e6a7fcefc296f224f4120af79ffc862eacd730e8ff25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81afd58979d9177fdbb6ed194669083
SHA1c5bb5b50a909c2f6394ccfc4d855110256505261
SHA25672c3d8ce8c76dc5bab11cace59740754af480d6898e6978a6455523e6f67abd8
SHA512ff42e7cb6659cf3011bb882649b69db728c0d66f4d8f23e89a19d0a70b37eb53914a9ba43ccac14663ed50591e09f5297334813b6346cc4f59026cdea1c3b414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a7297afa5b8404807962b28441e952
SHA14a917699b7a7a566ab7d7c3f4831a61c984f3ec7
SHA2568c4af597944b8bd47f9b93dc3c04cb0e8125cf7c928a2c537a684f66bd80e4dd
SHA512ce6c62766e0ce161e25a0d4a2e38bf09f2f0e90b462852ca81105927916ac1e21af973fd364e2fd61fb3b71d3c02efa73ddfd04bb7eb6520e5524b5e4f214ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d4b43fb3a67c45bc12cbcf93af07fe
SHA1d4adc0c6575c125b6da8dd63c8b374e69df752dc
SHA256e8609023e0d910219225acbf6badd006874f322d6e39415de414a795eb6fa93a
SHA5121238af5c574823d60757a1582238f8aea2338b1ade2ec83cfdcae265bf4a2fca73f4064f8b96482b963c4ea9005961e463f4cd88a0b058df08510d4e0ef1c995
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b