Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 00:15
Static task
static1
Behavioral task
behavioral1
Sample
2739cc1b35532211e55058af9b5221b3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2739cc1b35532211e55058af9b5221b3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2739cc1b35532211e55058af9b5221b3_JaffaCakes118.html
-
Size
56KB
-
MD5
2739cc1b35532211e55058af9b5221b3
-
SHA1
0e9f732d77c678a537a52a90845669b37eb4dc6c
-
SHA256
13b2e6b2a8a102934f9e627957c202761afa8547f503d038f7bccb92b1846d2d
-
SHA512
a791d1aef4abd62e488611e71f3d865de6f40ae7087be36c2ee07fe8dc35c0815591c19f482c11f51e78aad35f938b436a3b4fcb7b179057c01fbc5b98314817
-
SSDEEP
1536:gQZBCCOd10IxC7ZfUie8aQ5s7RBAbZco9dfHA1GMysKBExcoeyI/tSghqcszxovC:gk2P0IxWUie8aQ5s7RBAbZco9dfHA1G4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000059c8a9db1faab587da68f2ee7aa624951dc148d49bd4eb5245a9a23ba7f2cc6c000000000e8000000002000020000000114caa2883153227c99b520a1cc68f38bd66fe0c43b888a2dc652eadfebb927f20000000621c9eb06f4208ba9172cec2add31a9a3f7d6a84f5999f00fda871ba09ffb0cb40000000e41ed02ba37e2c362e5b9a98cebb6496155cb10a12b66dfea6fb131aa4474da244fbe6ae7441ebc6c84c7cb8c43c70df10c2b7802e22145dd7558a3312ecb745 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203fbfb039cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000089323b2876d91263ba12726975fca72b976d9689bfb9c43047f0af04273df7e4000000000e80000000020000200000006aa1614d8a4f82756288a8ec7a4010ba5dad3a08ad97569009ef72835cce195a900000007ce1345809fb3cbdda9d0bef1dac0fe6ebbd956ddb00d25d6509c251f7765d3415d8e697b1856512789925a7804d90bcc12867f3b51a414db8e39d7ca8b8c59579f2177f7eba50eb0c8d773ea2c2df91b2a45d61970d14c04c285e673e54ff09693983cc9e98a51f8039d843e5403cefd9e52aa9269fd4963b2408fb67a9f2ad5284896837c5af3acab36fbbf6cac0fd400000006e4abd7454518ee47f8a282f275f0e6d90f609dcc1857bf1a7e0fe89783c740d96be3012bed9e75941f27743e67fc52b875e115179caa1ae16da131b72159603 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426386799" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB26A731-3B2C-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2808 1620 iexplore.exe 31 PID 1620 wrote to memory of 2808 1620 iexplore.exe 31 PID 1620 wrote to memory of 2808 1620 iexplore.exe 31 PID 1620 wrote to memory of 2808 1620 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2739cc1b35532211e55058af9b5221b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdba2889b47614418c33bb828e8f01cd
SHA144621d629294be003a723624597cab6b995d7044
SHA256170264a1b21b18fef6a3626855f9a489821fd90ae25c986b4226a4b5b5a11a54
SHA512ce7ed88de73bba0efd251bb930588381213f1dc124da5bb572c6d7fb7b4ce5879272bc5f8ee6a4e57c9bd0a621ab34481adce0b84bcf83c9995b0c9a999e2c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573e50b958c06d344f449d60693e2b93a
SHA1f9ba53eb152c24a7bb39fe4480048761c60e4e2b
SHA256044136a142978bfea63ce4fe6473312f64dcea59fde9e6c095d12b5748b6ea01
SHA51254f6ea92ca800e464327a5a227d4f38b14b920227aa943344778d4c5a521019083b1428b916e0012cb559e3ad676e98cc930b1b9b496a7e2470b654002b431bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee076cc0baea0cfb6116fefca69ef4a1
SHA12dd99661dbf3bc2ef7903839cf73d8cf2c1fe225
SHA256215d852a73d7dfa1c7b71601acf46e9880a5807caa96253b58e412da95331d7b
SHA5124b7d2f67b140a8569d18176d0436ae9fac43dc16aaf7cb4fd1f576af55a475cb003783c8bf6388b1672de9d5a7bf9781824040e2e791033a2b0d12f688822f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a99744c8d01519494d350828edb9f7ac
SHA11d14f23e4a3ab59224bce707607a3e7d10e116db
SHA25670e3c996fe2b5c9050d19580c08f78542fc94c4058a55f6474bddb4031b1fc24
SHA51255da8f10ad5390ff93b560c80da905141cac9c37d23534ff0ff55f963d105c52ab4d2fc53414eaa871d5c6b02f0ec08ccd27841633fc3daebb54e12b233fee3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bbd8d4213d221c8cd5efd0b3c31852c4
SHA126cfd3630363ae6c76cb23c80b65150b4b0cbea5
SHA256f11d2db4210f9e9f68ca5ab1dc6518b0a788a6001375a41e745a6ae93a01e206
SHA5129195724a4f91c9a97d8419f05dc74726f85db4dc972ce16c004374fd65447390377e8dd3e7f53148bab1f7fd476c04fff6c74a238bff6cc582ade9a19b7bce26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d0e649b5fb6448a271daf95c5e88709e
SHA1a22ec122989037be2d3446aa9bbb4f28caabab97
SHA256eacfa99df07a814cbc00ba91b39684ac420602d846d833d2fd7f68f4cb228ff5
SHA512e72d57af4275454626c71e5d037274ce5b0e5b963f5e72c6f37acd54bb78a41472a7920fa2527d92f7924c16944e31bb78a8cb15a48d492c623738477108d682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55de3dc8fcc418ccbaa71d70610721665
SHA19ceb6f7bb278094aa7f13ad33865be192bb44e88
SHA2569eb026c246e1a7e37da709328ae2a5f065fffacd443afcab44069b838a648cc2
SHA5123fbe75a8cc20ca199149f704512723b70b26dc0c661e19508171428932ceed2a82ab6a90b2308839eee01fe6de9b4053571ce9636bc3c6d102dfcd6a224fcf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dde0cb77dbb399742a73b08820f57832
SHA1c0f20799c204f61f6136e68b4d17a733a6b4fccb
SHA256131eca09b36c25d1f5f9b3285956aca8d622be9e17dffb7a5e4403adef561e7d
SHA5122ad304d63fb62202d01968889076c7926b4895cc96cb45ab2b4fbb593da8ceaa1374f1920bd1b5aaaec50baa974a2629e315796f7b8dc4345318299fed0b8b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0295fbc46730f78641cd3b5d1398d6a
SHA19b67d9a3c934cb5504b7f2fc34df0bb45e2c0d44
SHA256519868c277b5b0379a11f38a5b961810e3029839b4f8a28c891fc46da637c534
SHA5121647cc1f4d3bf8a2715db8fd9eb55a4b865369cbc6cc0383eba8496e6bcfe2546f96b2bbd8c9824960958736bf6791fa5a514256fd68e5103de35360c7ff90e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d48f5c57bb03d161a70f6c4f85d9800b
SHA14226a8a0661fc1be101f918c0a4a491d675e04a0
SHA2567f96cb55f4729fd29eb43bf774ab90a8fd76c36e260d2c5c9cc30fe8b22c3419
SHA512e40d200c2cb772c23cc339eedcdb66ffc5e2691e1c8b9b93c757842affcb4ca86a979fb68281f3c74ec71ac19044098357ae3039135ee59dcbae147ff5a0170d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a7a790f8574c6e1be5af68e8ca39167e
SHA117230878a95e5f8f584260ee4e0c4362e7f57257
SHA2562300e2b8d75b7f09f2d42ca444df720558af4d278c7f923972eb3a13d2e77a19
SHA5126401902d5de6a914f822b02c57b43b11254bc9c24dd332bafb5e56d92d3a97317963bbceb33cca1b513928f3ae40e86145a1bdc6c03857f0e815e8af68465d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b72d6bcd3a98cfbfdcbe70de361ef726
SHA1de6accd821effb92e17fc80aa929a48538c3ef3e
SHA2564a4fdc657a381dae715e185b5a2ee2542c94f1650c22f576b679b23b0e15c89f
SHA512ef85a68c37a02888cf6fc08857187afa0b2343d301bf792d49ae25cd601499818c70a518abce66541e54cc1fbd51212e0f3baf9ce595618aff7fbd6efe1bdac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6f7a87adee5ab7d481e3a3192c3c871
SHA1658f335096d6ea5357077b75d30f85e7e9ccc9bf
SHA256c8d4a01e74ddb157b3bc0301a48afba3254b816d24298ce9d8cc2ae24fb084a7
SHA51273b5b9f219b05bfb90f920eb0846185d3871302b20ce66cdb4e654da47946dce67958333d1a19811ed27500c9a7557d315a0804fc7c0dced02f2a5b7a3142da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f37ae3168c4564d7b9d90c54df55a550
SHA19029e5dc8f6256564ec7283bc88d3214926d10f2
SHA2560ce2e126ad9352be3f2251f655a7139e964772a94d2d19430d48a6573f55f38a
SHA512020ab16e02690077c882f0607cf941cc22995a7f41f878be949f0f7bcb59b8c9854ab7e85674928e6c45544f3d36357b1f0297e48208fd7230219928208d43e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be9b09a3cbd6f1a174551d5577f9e8af
SHA13cae38def8781d6ee69b59f393fdc30ee2000262
SHA256326cbb7b6f6abb2be05f67e3743b79c934c1f2ca6afba8055e07a959077732b5
SHA512e1f576ae5a6ad933753b2cb6c1ddeae10512ad09b9a565ef6b759f07bb156f622eae439766def4f7ef261a31fb713f96e110f32f81756c3fecf82f8a96b4774f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51206d519e1aa5758ce743bcbdbf9e375
SHA12fdce93dd86873792a770f06799c7444502add43
SHA25688e6d5964dbda840348c0a98685d6c061e59cd311e95bff6d7e2de3aa3dc88e1
SHA512f0bf2a7a3ba2da3eca72a87285c388800e7b96b078f5a9e1d15607bf0c9dc46ced60db1e06b0c61e6ce2813a37a48d7b1a078c309e2246216384f2cf4eed1b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8877305d3c508a3dab9691a0b91bf92
SHA14890c119a8e6a619055336e53eeb150c9f87a104
SHA256fbaf82b3436f1cb43520e0bdd4bc9f667c1c6304eeae1d154f87dfd987fdf2a7
SHA512dc44479abf8341759bbc1c14c126eb5f64de19ed1b4ab8ec6318ee49098e0c025f6f4c47a6c9e48821641ff7eb97595c005feba1d0640e8dc641f03b71a2edaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f189910d01d623d06748b78ffebeca18
SHA1df8738061361cc42b595c982650922c727a15e48
SHA256521e34af337534f8aa75429d44c11b3150ee6b4c1667cdf56031e2612273b252
SHA512ab29dd52c990aa4123175265d9df42bd6af2df9d2966b13e82fc10ed181a82013fd58aea58f21f40203c6e9207a68551f54291766e681a952401f8f0bd4da6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a88eb811dce010e746758e59602e93ff
SHA1368c58234fe149d4f70d6d9fc708751c179d661b
SHA256a43f57e6b3470f4611a275bcfcaeca06a0318913fabc07a4f24b1f458bc41e22
SHA512135e2c7e5d5366fb0f58a34d47358a04a5a59c2c569963e447bc4daa2c5217057c29160baa44c61b837c7bb0033a1bf4db7ece0e6a462d2febe36511392db8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57229dfbebf0db777b06d1c576a570f33
SHA15e4b2a9c8a5ffd32bc0ce50a28c05d386c3b721a
SHA2567566eae6955c6615c9a367d4d55f48b2877a22b97cf81e58e3e386bd367d3022
SHA512a890a96fd7c011442be5a413b34ae9bd0463ce753bf11c1750004d31057742862bf33948c2b1881277e4a4aaaa3652a4945a46c56aaf06f76ee993f8a76d55a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b