Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
434e28b808bcc7dc79a40522c23add4a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
434e28b808bcc7dc79a40522c23add4a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
434e28b808bcc7dc79a40522c23add4a_JaffaCakes118.html
-
Size
84KB
-
MD5
434e28b808bcc7dc79a40522c23add4a
-
SHA1
c618d0fa807a571c1200bd5048f8583aa1ed6076
-
SHA256
347dc9ea6697797f33f53d5cbfe13fb5621c472347b74d201e5a25b08386f208
-
SHA512
73f56c13e0dd0655ddfa26190ea8a5fd368ce631a527a033120eefccbeb8aed4f0d4e7d74f097ffbb2df15c55106246c2a5fd5ccf191e58ea8c6377c0a6e266b
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcB5xHA7rl4L806gcZ/euMKp:s4GZ4LpC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007797d67458c68374870edfe223f795d6ea148c02d3f71b760ca86aa96843a633000000000e8000000002000020000000cb7ab6036b5072ffe23a23b93fcb9aea7f616619abd40096041a1aa1be48e10120000000f8375fd682e4ac818ef1ca73ad52ad676b90eb4fe020ec5c4534ca1f833f557240000000b616f716f2ac181b82dd8b0b357be94a51766e3f1487d058c9aac8da24ef117eb96eea9f063841791419923d55113ce24d75c23bba3e4280312f75b78bfe6b0b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427066003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E4FE91-415A-11EF-85CF-667598992E52} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604c0a3067d5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000000c187a9221530b5aad83d1337d492c407cbd387576c6d432f2da467f71ec2bb1000000000e80000000020000200000008450719f466612b76a468a5629e8324f07999c90c23fc8a5fb2d2ab87e37b00d900000001942b23f0b9ca465689d8bf5091d4a16cdc08cc790b51461510b1c420f285414b7f1e14201847eed7b35803750090103e8c995583f17973e3f998fb06c7a32f2c33dcd5f5e4731bb2b41feba02955abee546edbad835d1b4ca95098076532ea2aa6e2e120abd97e1d3380ba0f3b3641ea1ac9dec0c72f95c4703ca5509fc637a6a3d498635eee488712e24500a557fcb400000000620aa68821766b81ad9d5711231b78420b34abde53c22c9ba0a884bced73ca6cc295a39af85a2938b5c9b03afd033a28bdbc5a04cabbbbea05b9b3b3f278f0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3064 1712 iexplore.exe 31 PID 1712 wrote to memory of 3064 1712 iexplore.exe 31 PID 1712 wrote to memory of 3064 1712 iexplore.exe 31 PID 1712 wrote to memory of 3064 1712 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\434e28b808bcc7dc79a40522c23add4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817211cc484803d0f07cf6dbba278143
SHA1ea731481d89a2995269ec8e4a18197c83cce5cd1
SHA256dc2bbefa3e1319fe7affa798b306c6dd57642feee264a36aea0f2b8727cb2026
SHA512a1ddbe073a5b15566aa64779f6d8ea85323b93c74474b078e0674b92cb9e0c569d6bc3df0acadf1ceaf6d57a3f75d51c874287ad0ac414a7adc1e609c313a990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d716405c444adc1ca73349576e291f
SHA178f7ba373a58f1e3c0334bf6836b65eb55a0d763
SHA2561d1b76f156165780df54abb24c61fe3259bc09d2bcef4f474e6df16fc7c201b5
SHA512973c63a240f02adbb3daa4add6519aff2ab6b416a02b2e983b2dbab40412b8e8e3a3ce1578b5b1d651b223beade9a496ccbfb6e2d5d588d8f9c860addbcb3274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8626afc34ba2072ddaefe488b60ff55
SHA144ff433f1b750c6ea3038900ca5a36f776ef7670
SHA2561b67b3ffb64613068df1b3b5acd2e2fb5321c0997060df027806e12048b71d55
SHA512b263d0e47c215aef31cde447e7ae9cf2e245ace92d36516d3c424c6a084ab581116d1963a901cf7d307ec9cb70d5a4d249b9df0ac91b1ebf1cc3217748787245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572684800ab36c06f83eac94ff6ea67c5
SHA1a125be7e8a0da03c5aac6e4e69f6fecc285cb170
SHA256ba4106381b369aac51a5a970ac87b13748117704d10a3c3a94bd871f9d6d4a27
SHA51286a0fd926c16645210da4ee57178894c88d8f6916af71919341e6aae932fda2e6f3f082f5bbf3e865f5499c13072f3f6630147a1b10b6adbe5ad4e578b9a9476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8cb6a69c8855cdfe5404e45c02f5fe1
SHA1f1dca83d9852e8d85b91a4f8ce31ba173f220189
SHA25688ec792051cbc2245d688b08b02def91a7dc1217d78aff0b48bf201ca24fa041
SHA5123b3bb7cc567d7c6e17626ec2c807c19a368a512f6a138a0f700f2e353b4fe41772b3efaab811bdaed437665a50695e7c4d5535a69dbeaa062a9c1fd7a6a6fada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0298af50be0bc0279e13e518899a882
SHA16a5b68f08b437d389bcff143e7057ac202e4fad4
SHA2567beed88e8edb91ac40c5f31954008374efc3f312c1a8985d30729154f434108c
SHA51252945d301356aa69d089e485b607c27a62abe3d4751b5b7b929076ab1982ba80a27f3402e7b2f5cec196f4aa06c02af979cf199cf03b8978b05c2c6ea8a1e6dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed0efe8fd2cad0538b292a64cccd812
SHA1d31c292d424f7c1e8c7a3f448b320a69e2592d02
SHA2567e64c1847c1043b48a91dceba2dae393026276008ae9bc0736738f097c8cf52a
SHA512b6f3ae9a83b05cdd077fa35755d1d1e994f3aa92ba106b8be171e26f7234171bda5efded187efb0938a7a84ad2e4f717ab65a6aafea7cd7adf0523b73929a875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5f5a423ed3e410a8df1880c0e0adfa
SHA14f0ca38fcc2399a491ec68f66d48bfe048ec5ee9
SHA256ba1c747fb8b8f070298adb88da0236d0b04e0cafcf9e6cdd38b1db6b084a3add
SHA5122b98d1484de08f2aa1cb57fbf6696009550682b8d39ec26ceb5141b44b217504a2f259deeb77c2ffb08e009c5772cc98db7e0df5374eeff7f45ead89d31354d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbfc1ee7d6000998e450e558b4ea3ad6
SHA1beb3b7839680a52a3b02367bcde3bc2ba8d64234
SHA256c142cd2decec9de5646d7dde1d2903b9946c19e0059fc01e658a048d6b2dc150
SHA512a2856670f11e072388bdcebc4edf2b81273e60cfab5b5565844e9ed80f18d6ca61b83413bacd553e442510a112e5cb9bdfb06606dc4b7d49d73a2d5612949e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf4c06e0ddc8ded0c0947e68626c174
SHA1f406854be7a4f47fed3d50db0375925a638399aa
SHA25617438e63d6f437fda7e1e9d264c541826903807679d6d3f5f7c9ed7afed4082a
SHA512a0c52cca766133a23eb886eb4fd758ef138c3b034a816d938bf49d566be8080718d70729a00a833ec8cbe746a1e8078699a8bcffcfa223386048e96b3af38098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568161fcd2130860768deb767f6a83cd2
SHA178cdeb29adebe74ce6572dec0a94b2bba9ebf3f2
SHA25686bb9558886dcdecc9b9368d53e1021e27a13b554efcc073e1b1a52ae4818c00
SHA512cdf5417b6141de4138ce545631095305f206b4523061b4b44a3c96edbcd218664e8d83d48814db7c93018f500576bfbfff473ad6b356993fb3a07130c14ead71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b024ce118d2e8ce23d0136ebaeed2abc
SHA1932cc6d6233b5806d86828d69cf4be12e0b2ea98
SHA256185f1a5fca0926f5e40f47cb3a57cf4fb04fe78f88c018ae21523ebc5c6c579e
SHA5125c250d257d14a1d78ce1bd69c711034afb099d8999261e1ca25a879588b42a1a544dd32829a33ac57f11e3c3291852306f869e020b74224a1a8b92e7cf4e59dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abb521c52dc9697fc8a4c676abc9b79
SHA165838db7698a904e34136a8d5514dfde2eff00b6
SHA256054aad18b5ac76d8bb745f6cbc259b7db3c8e4678e8264365ebdea58f826004a
SHA512d8aa7aebd1f5fd5f8dd32ee1c50f40e726b0e3186d452a8d2eb359e453bb7a372fba174cae1f7a14315c1df68b2a7560576f1e54b7c5c39a461477fc3325ad74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505badcd1c53f993b3b739be5734d0806
SHA10ee954fcda3979c1a29a1ec319efb9b45db388c8
SHA256ad0bd88031eda5aaba97f611dd5b66b48b35c00721fac2774ed51fac2f7582a4
SHA5125d90b31b6f135ebed65fd68163488db0ba871cf603c6e60c9258a40234d3bff63569782bc00e88dc06fd23973db2ad3b7f1dd5bd77d4107c2dea4674277568a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d57ab89826f3fc1c00c85de3743fdf
SHA13203ceb9f829ad02ff3a52171e66379188cdd327
SHA256b2764d550886b37f8d1eb8aa5beb16e5e9b5f951a8d5e07c7df0c7a43178d340
SHA512e987d9957db4d1ce19fcc5865cf600c6667e4bdd3664a990ac90776adcd70e457e978a5e4716a6aa136b9999d4b52c86961e5c5fb24451b8e225e717b9543f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39bc1ab3ad32c8c461cc4326d34fcf3
SHA12b7ccdb17de6ef4f02362a9adafd9dcb40ee568b
SHA2561e4a2df860a5c7ff6504043e7eb4bb00526e7086bde4515b21a050bf1076ac65
SHA5121509c1bff8ca4dd9db241a86b70d95d7dcc328dbb978894a6293ee0eabafa5274c687f5f82b79a1db63c57a8f67e1675c6fa1c472cde9e1eabc64b4c900e688a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7869ff8b4951249f2e464ebf36f75ea
SHA1926b18924e710d03f48667438460e36a8b493caf
SHA25675af8376dd151b8f3b8d5fa35418eda37c7526bbd8cbb482c2312feb5c455fae
SHA512646133be986ae266931bf547677c0e3238a5a65bc70185db30468e2df6da397cf57d7eb2bc2b5f1b2a98af93ae6af06c3ec9d2f7f5d4c2cec482e4c5a7443248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e069e83b7055c94ee5f67f835b6a3e56
SHA164429a149ca6fab677e6f1933963cfba67632388
SHA25641dcd3fc8ec0ec856da623e30431ab96067666f519c82addd3b37babaced7a46
SHA5129401fe3f0200b2f83b6e861692d5181bfc8ce397730c00e893a1382d864c6676b17fe07c5dcc2e1754c758c3667473400c3542068c5a5d8ce15c8ccf0c4fc496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6053c148858780ea5ec3725c135acd
SHA134fb780385ba8d538cd08fedcdce44e4d65fdd1c
SHA256dbed86e8c1160627d0b2ce081c76dd878e914f1da69c75e8e106c8ed816fbec3
SHA51207f980be35513795766ed16eba9d9e22bd5ec293dbe7438e51d2405c3c9740bdcaacb60e0965a98e08bbfec8beaeafce08442cb1d52ba169270ecd67d50e0af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58231b16c1760d432ac33c3c7e8d8e310
SHA1b783759582e75fa0b377c7455b84053eb6e5624d
SHA256c5b0df8579327f94adf6686325903faf8ea872d4080c85b8993c80bdfdf74c74
SHA512783953af70dc62cdeb9b1bdd9713e0f376663b767bda4fcb00efa3ccc5181d33abfff08fd822a991356133e972ecbda17d948fe209647f2d47702348363304c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b