Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
4051c8cfba171f3181ed1a121916d9d0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4051c8cfba171f3181ed1a121916d9d0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4051c8cfba171f3181ed1a121916d9d0_JaffaCakes118.html
-
Size
53KB
-
MD5
4051c8cfba171f3181ed1a121916d9d0
-
SHA1
46b70cfd8fa798a3da1b7b73f9105c72fb01d676
-
SHA256
1ab2290df75c99e0aab7a1e9342b23acaa4edfe932b4a17b9ccbb179777fd0ca
-
SHA512
8c2d400f250adfab50ee577be9ff51862ed323d41dd6f16c1afb9bea16a178e1249b2381d68cfdb885072954795ec5e70ec009722f19b6e71735684a9d380a09
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYK63Nj+q5VyvR0w2AzTICbb4ov/t9M/dNwIUTDmDJ:CkgUiIakTqGivi+PyU9runlYK63Nj+qj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427009396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04ac149e3d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ccfc71f8be3ebeec35386b75b6c4b282cf28ec3ea2ed31acfa44dca38366bad2000000000e800000000200002000000069f9049495b1940b7d75a276444b0ab83ea9fad14b7a0dc9eb0dc8ef7d5dce07200000005f0337f506371aef31fa305ed2b3dd917ed544b78efe6ca84dea0a74f0e60d34400000001947e41a9627dffd5e7c64c8f759aef033f756437bd1e27762d1072d9555ed31cf0a725b59af77a0a5d49ac9c08ec092e3995c19c5cb3c2b0824a540a642a7ba iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b7402ac5f2c27b8396572eb6d86930709546f299aa3e4c2902f103c1b89e3db8000000000e8000000002000020000000c52dabaa8cb757a94c8c618602df423026bd3a3f1a099a89b93b41b430c6f83190000000000d8e40f7fc6383ca4726833dcbce58418cfa0e35387f78d8e7ec2292b2debb05520892e94e97dadb08325d461d3c701cc123d2a812c48fefcafdb654c10e3a5198173e03d57ce400c4a8468a9e2b283d5752947f34db1b69f3ee9887bf1be649b2da38553d047ba44222efecd2b23c2b092e8a79f426b5569d7c4f441304bc866c3265bb024a66c563d57e637e044f4000000073e2ee008a8c27f2ba40f317f07acfe83d682cce041fab8a4671e9a4a5c518d5bd2b0da69ae08e297ddcd65699d8f9ef7001805a9beb351c302f426751eeb1ac iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{747991F1-40D6-11EF-B170-4E66A3E0FBF8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2804 2180 iexplore.exe 30 PID 2180 wrote to memory of 2804 2180 iexplore.exe 30 PID 2180 wrote to memory of 2804 2180 iexplore.exe 30 PID 2180 wrote to memory of 2804 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4051c8cfba171f3181ed1a121916d9d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed443fb78d4d4e19630d4899bb6ee289
SHA18d625cbe0863f1ef40578916f69c524ffbcea14f
SHA256fc1c5426c5ae3a7f628bcc3be231842822bdd75ceb11fba77aa5673669afd3a4
SHA512a0f12a7e26194658ad24016a2083cf6755cc71b3f061cd81ea8886b594f1c6b75a357f6380eab51df1361d865d0041988cfca81167192a5d6b66d9977e353f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d9bb01aa12f334eab255be9678a3c9
SHA1e4fdb7ccddcb13962d32b3205552aef38172dcb1
SHA2569769b2fe7a696f8d8eebb6dd375005b5e45d5277abf62a78c85f7def0a869a1b
SHA5128321ec139f46dee0ee6da51931ca281b1f74e505922d838cb5947dd53a29b33635ba82f7a722b95cfc89e9eae499e391f2f95861de144087dfa194dbab1f22c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b83825c5770b06447d490ed1c23b0c
SHA1ed69ee2bd006056be200620ca1495740da774810
SHA25668cb9ca8a8702c0341735713a1e90bdcba9ef815696523de22ef0387f89e2644
SHA5127aed80cb6f317a5df849206c12a99f75b49d9b32a2267aa5fc8c4ea8b4ebe4b4467e47a382af599a4ced10dd30a6bec9ef631a88c1ed1758ce62565ee9cae3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2c855339bac4675cc51b1958264895
SHA162b0fe2f41288b1e86c98824887e46ad65e0a93d
SHA2566eeefb635f274cb36654ed3918d8bd781f47e58fa458a1ad34da8f6421954b6c
SHA512d142e806c6acb193650ecc576f12d52f60fb2ea015b48ca71bf95ba3e99e5c5195f4cf0389959905b4701d82ea6f5494f9067c8a974f56353a883375fe84cfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfb9f18f0f3737dc01e23aa75149e68
SHA1a510259af50ca78b8b15c18513b7c94e92b24737
SHA256e02ce06ce0d267ef85d4f35c7ee98f0098f6dac8223bf1c0d32417627a9213e8
SHA512a337b0f7323c95f539bdce090b01737e88369417ef1b53c9b25bb2aac22096e5b2d8e31f7f6a48614519bcc18fff01c7e1a8cbaf4cb8fb5b8fb504f61ed8d678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f701faa6e8c030c0d38570b6d2639f
SHA18fbb1957631e63b49320534a5913810003b5cc12
SHA2565b69c0f7577d255ec0e2748ce024e7ce4f23211131c4ac933f3f6fe2665c3690
SHA512b33d094bad4a48b047aacfbaeaa79021027193b1ff48bdfb6005c3ec042e06bcbc88a01f68e00d9e573dd32303106d3eb0df07c0c41faa4216e41e45df4c9397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56082ca499ddde1e09e12e60a8bcc63bc
SHA19711bfb7a5094414d62cf95a00b973092c0242fd
SHA2565d7ef292eeebcf54ec9fcb02e606af28635becfdf9cf2ad39590073dbeb7cdf8
SHA512d558ee2629dc0e6b6c460f1e0df16f4bedacfea67d576ebd5713b35521750ac149b9d1cee681bfee2b890fd02892e298c4007292c959a6401e3171c9b7a4d33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506feb21ec995b8864202bfa7e138e2d5
SHA1696dacbea89f8c4f6769db32de4868faa222f4df
SHA256a4262f32aef6fde1c51847a8cd6aabbc16604e6edffa63842b4f7d016e827f33
SHA5123921c3cd884aa61bd925b6e879780196bc0024a0e7205fadedfaee696d17d226d10c13ae68ada28d2d51f3de14cc50616ba135a722883f9add1d4cb76ce75032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673ca6216c8ac373143b99acbf332cca
SHA14af6d83bd6adbcc71ab46b394065930d17d6a3bf
SHA2565cbb018c23207627efe2a69efa6c47b3d70c32ecd40c5077c9d7d9584877b46c
SHA5120735ab9806c5323206dcdbee53aa540150fd6042eab0b09d98ec2f8c0a5ad92ed40ccb90e813da196e78722a9ec034755d86366045cbce27766717ed6a49506a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54224a89862c574e3936dbee21756c95d
SHA1e7bb4b35de0d4f4070323c4f32a9be9feb4f4243
SHA2561941d0e4d9581d271ab30104b8772794012576e48b2435ac36d4a59bb83d9b50
SHA51247566a99ca591714e3e1a74712bf04c9d989ee19e99eb15b23c1deddb97519a6977340209b7307d56045bb3e24b11dc54bf86c430f4f7216b37a52c1e6bd1168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015ca134d481602d9b09538376f339d1
SHA12aff2c5a8f9485559092a95e908b7a50658be511
SHA256b4c83b683c38aafc1e06a43e7467f3cd2d028e7efef36b32326411c82e333f59
SHA512888901cd5fbaceda137991d71ec153c2fa74d2cc8fbafefe3b01a79ce1df714fc658d8291d422a7cee3d159f3068b0f84ea47fd84bd10fee16310c5f22637f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597659f5753b14cbbc95ff01c55f6eeef
SHA1d7a893c517231232e4a9f144cf47d91e851dcdab
SHA25671eaac99bde2a492f7918fba8ee7787631b282ea61911c5aeede3faa4257c1cd
SHA512abde43bdada5decf669e9eb4ef224d422fa0409bd9ed89b7f29082a92d5056d78094cbed4a06cde8e44ce16cbeb0c095c4eeeadc55df59eb07a6004dd584cd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fabdbe65faad03f39bcd6475f314365
SHA1f5901f55e46e7d1e9e00de696f4ab01be8b0345e
SHA2563fae7ef78281e5eb7d05f415b0597429eac73f3acfaed151596c4e8af02a8b4c
SHA5129e275d1e59ab36c5e078b3cc057ca482654bce7d7facf648bc4b027707f75c1567c508ced34c4d0b2bc0d97bc6ae205671d54cac93ff319c381bc6a3c0405539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ccf767770ab041fc2445df93b051a58
SHA19cd7af7a462d25865917f42eda26134e4c9d213e
SHA2560271c1411598af4c4d3e691d4dd52fdf5368e22f558c8cee9bf6d1915144233d
SHA5121246762692533d5543567324e91680f873a30690b8ed4eb0a3d46eeacff75755f2a9fa7d9a58dbc3d3676470419fc65bb21f2d80cfbd6704edfc6d0f1ee52b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb044758ec4d4e95cb158ada520ce16
SHA1c1326c073c38b5703b193c3eff4295f21edb116f
SHA256964f23cf8a959c729c6b5e40ad0e6b82888a34191b5ce326c32c3a3fbb4b999a
SHA512150863af65dffa2896ca49f520050c86451d4b8e42f1ed1fe38987dbfbce264e4ecb41eccf1a176b4bd1fd7abf707d1ad6fe1b77056f5531fb798abf1bd0b40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51546012b06f39ab3478b5a34480e5148
SHA1d70d9d6ce3625c3712786c335ee972303962ce14
SHA2560ed0b2a0f366c792979e78fc99935e1a9f5e0ab3b8514d94e5150763f303e361
SHA5122502f8c054bfcd2a1477c736ec4f8cfb612dfb3459b23538732586463282a137ec663733a126186fbe725829a465861a63c7c69965fdcaebdffe325e7daac366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243cc68196406f5228d37c962099e9aa
SHA1d6a541f63f681010f8cf19665060131e5735c16e
SHA2566fbcce69f64d98cf869f181deaee8553aa3786d48273bcc506e148632d605337
SHA512f5d7a6a91a898bf412465f6f3ad5cd0dc81ec8562444867f5389a61efb6d5e11a9fcacda782277187c56af91e880e5ed5d26049112e1d32ab14e7427c9ae6c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9546b60805851cdf342c9c2f196d307
SHA174e7d1d75988748507cd9754e27f68f2fbbb9c9e
SHA2568627f6b680a82a730eacec866f61f563aef704429bd158f8fe0fc20c8c72c63d
SHA512f16e2935327d91fecdddbb78d9b75695b5983023c511c4322f5fac20e5671877e54123071cab6c74ad53b76e6cf88178b9bb2e1cf4597d7741be51cffc7a1846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a92a0b5ac482ca81e2fdb300b18bda
SHA1309de7742a9ee7d647182358b26c4eced9d202c2
SHA2568ad8659eaf2144a7c2efa6825fd70237cef210e98d138a5b99d9b872dc9c5cbb
SHA512d86ccd0d9c2f5410f1a93ae65aead0093984b7072333cabc759bbbe007dbfcd856f96b96014f0a3371ebdc8bb35ba1cc0ac076c74b025b3b970132c484a28e3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b