Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
45a020497ed533f83adb53a4aba933ff_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45a020497ed533f83adb53a4aba933ff_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45a020497ed533f83adb53a4aba933ff_JaffaCakes118.html
-
Size
58KB
-
MD5
45a020497ed533f83adb53a4aba933ff
-
SHA1
867e54f59da45b76c31c0c3e993ed5387daa8c00
-
SHA256
c074311f15d5eda4852212bf1a07d48609270da34e677dff0c01ad8418dcefe3
-
SHA512
e3bfca0a5ba2a6c7550be44ef9a1c36bbf4b5fa7aa17af4edc334f61d27b5f46c209071aadb2b972ff2d9ad634eaed7bd742198a0b2791f8b15c74475358ff08
-
SSDEEP
1536:gQZBCCOdD0IxCN+cDfJf/f+fKfIfpfpfYfMf0flfaf4fuftfAfGfnfAfifGfnfMO:gk290Ix2hnWyghBw08NSgmFYu/4qefkO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000009c66a0142eb67b0286bc1c4092c4a0101ca25ed562f740907fd93b170a27d4b6000000000e8000000002000020000000c4cc1e9b16fc16611927e1c520c43f8247b0c3a9f3ed12d048e4a5ef8df6b6d22000000037f49b6cc3747cfeb5a5f365669dac8b02265e831a1bbc4f0ffa8dda1e8001004000000030ff0e3de7e66c7741f36247beef6f2018cbe457f2d7cd202f9a94e96be88927622115b3f1d537ccfa9ecd5b6bcee7e32b912a941985cbdff10e1035c30cc2c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88A3E001-41D4-11EF-84B3-46A49AEEEEC8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f8340191e8c06bbf3452edb931aea76f7361add1e593539e0fe3e30e264d420c000000000e8000000002000020000000ce637790581be6f4d3aa813b923f7348b905c1bda801e586215da7e5cab9d26e90000000216b59e87848049243635641fce43d9d00c235d845f75b315fa37714e1b6e104b73265a5cb6f3aa5bb15e7e459f6c77dfd5a97ae50e1e314810b79a042c1eb64eb8eeb7e2b1293eb89d2f8ac1f1b104e2e723dcb9ff03117c2636f54d269951478e1d1b531ca1ecfac44ccf298d2b339fada26800c26368fa9251b4b128afb57b1cf695bcbeed074c65b42bae559751640000000870e0e4323188685fe8f0a10058f0ad10a8e1fd220bd230e83ec4dc13499f960b1d34509d952e76e04a74b36a0a072bb17d5c508e90b7f3e7df526445a3f293e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427118523" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3016905ee1d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2824 1968 iexplore.exe 30 PID 1968 wrote to memory of 2824 1968 iexplore.exe 30 PID 1968 wrote to memory of 2824 1968 iexplore.exe 30 PID 1968 wrote to memory of 2824 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45a020497ed533f83adb53a4aba933ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de876748ccc899068c52480ce07ba1e
SHA10c1283f551a45866ff5c7e9312c5f5ca3d3b6407
SHA25645da0397651ef4fd140c77dec9ce8061db954f0225b089337e957257ee059f66
SHA512398c175bbcef1fcf5bd50cd86ba28005ed26a400c3e2f68811d9931774af84c52693bb72c0aa980b8c5ae3d7adc93ab2923b8dc3e87570b2889438e1ff0ea45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a14ed53711a289d8cc8138f825c1f7
SHA14c132355afb31c98503b326620ed23e8001991ad
SHA256474adb18d0733b2106ae54ab3661b112481b56494ea3b05d41a21e826807ee97
SHA512362cb74c10692faa2c79fca330df24fa9908bb6095a0b9b3050e859809b6a1287311521051749d48c45b2c560a181e3804c207dc6bbefb8d81e46ca538df92bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eddbbffa59d399a8ef714bab3e0a942
SHA1de1bf516e39114da0f76322ce75aab85de2f0708
SHA256ee0aed33dc73f6aa961b99aa5a88cf9663e5bda807e14f1c98c9a735a602704b
SHA5128a2e12bbe847f693a5eb6e983c324e0ed2c2e070e76f9e165b0d8d747b722c1c7871716e5eb378e9915e51a4fcb3577dae0af6103edde9030c8963d7a8a6f929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159af018ea5f4a9a6989c75ca9f87730
SHA1e0c958e93447734c57bf720e1c76df8334a139c7
SHA2567753e97e1c5d5e2da0b9877ba92b3ddbc7e942476bb019fef2463e2f04902cf4
SHA5126ad9e50e75a6412eecdd6d4f40a84831ee5b6100b690b75aec33f549ce2b8497bbc0a0f445820a1217815ab4a214e41f26bad0c77eb4e821a72647a78ba882ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581df5d826c62835b12446bc9ff5738bc
SHA12aefe3f43c6919380faf86c54016be003bbcff47
SHA256f506a5503e1a536e5a87a756ef3a98126ea0f86faf1baeb6bf8f5032306448aa
SHA512893c764f878639b4824f0caefcb94dc45816c3697ec423aa8ef5d517925741661fc628e10080f5a0c426dd4c5b0251e189733853a2c32b1c28ac520adc4bc7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5948c04c051ccf87f6f0b5c7f3e010db8
SHA11ee481729d971aff2ede7886c0f2deea84928415
SHA25623ec74824740fb1e90687c82aa48a1ee43db54c0391c37520e579b003dd4ce3c
SHA5122a6225d4e15c01d2f6b3321f6b6a558349458cd7c5c232010f054f96c51293feea815b5c3751182a00dbb3ffdfd53f01fab2cd94d70aaf1a925f0e3684cee2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e654b8aff97871ec2eeb3527ff6b78
SHA18e385fa44af8a3a92a39af7ccb3bf42cc0fffc29
SHA2562d879d3dbd706b98146b7e37dcacd0c8eb627c1bcbc7a4924f1d41d214c10835
SHA512dc26d8c6e5f04936610b631d72001221880d864208e99921da2b82a2c9c53573fc75b93d9cf517d8e8197bcb26bc832bb9263de45945f77001a1ec4d92ab2145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49d94f938adcc21d1f1bbd597645814
SHA1748516dde964ba2a294a539a660858f9721e13a8
SHA256dac3b14978cb19cde2a07c0dda32312b40eae515ab2ef09074c2c9ac82951b6b
SHA51281856efa4714fdfb64baa11675031fdd9b82d238220a69c6e77b71edb4725831a3cc548a6cbff2fb9c1ea05d2db3e28ff57608cfb04131457b9d8a054553f0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55445c7e3f588ee413d9feaa45cb9be82
SHA19b3933c3991e549b81e5f2a9db0e8010414b205e
SHA25670c51e9b1dfeccbd968e6f82aefba090967e0efc1a98d69af9b4b9d9af21a089
SHA512c6c6b811adbab79724f4484bd6483e5ed75aef33a550cfeead1019c14ee330ea997a6aa5765cbb0302dc7566ded608526676aaf58b6d5d4217fd2ea1ed196ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fc5d25aa6d9f32c4ffe6a52a09e3c3
SHA16504dd9ac9838ddc8ae90608dfa4d10eea4061c2
SHA256977aff74760a8de9e21c5e31115f218cd09dc4796dfaf3837e587cbb6508b4be
SHA512b406f11486b71016a5224dac40ce8d5e4fbdcd5160f9acb035bbec7e307c90d1683a41f1af30727977ff58e47965063c776dde055d56bd4a95927794ffa5e845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab12b91ff42a72f4b9f6a316c7ccbd44
SHA13fc3a2b054a307a77778f472db001eefa7af9f8c
SHA256abd1bc475dce259705e7a3cb4616559125870e5d089f5073217379a07e406f65
SHA512c7938a60e453fde76e1fd993c611b9724c9d439a83069bcb3d49c7a1ef52090c747ac06174794459d59748356fbf1c22354e05d64904280950a8adfe00ce7995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcdb1a1728269ef817aa8d66a685eca
SHA159c6ee508351837d692d193563bf54efc8426cf4
SHA2568b431e8b56a5f374b825aa1dd7d5806f318adb9faaff56ad4a4f36eb81a55021
SHA5123069e3c433770bc7079558c888726d187ab76c672ddeb52bdd914d02dc4bff258deb6dd503788d3a929a4bf0d65bb8a2effa427855625e482a46a756d3ac32de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048d54288c0340fcade0543a604c3e3a
SHA10f0330b922676e757a2ab376dbbb2cfb57dd70de
SHA2561255532467d702da20583309862cc14205fe222d9e8d803689339f9169a5b156
SHA5120bd1d30d7fade84c975048223dbe320fee15d17d4f949173f9b54634475ba0e14d8df7d943a38a6d99060dfd8ce042660d05013a3891bf3a11de14ba66d507d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac61c8a9cf943428a56958b147fded9
SHA1fcfc7de9e9dfff102ee1509f48e3bea272cb04e0
SHA256dd419ecddb405cb1c3eafbd8a206ac26280bee72050838c484a498743237b86b
SHA5124b4efae4b68f1b670bf73a1a53c1a967d80aac78c5f2ad43f68aa36cb7b6f27814eb415b70e7aa546655cb820a307979de7f9cc5cd4daa416a3719261c7f3159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf629c4e1b8efb7f3ec7c0eadb564b52
SHA15cb91c6d6dee3631094e6a9cb5910ec158fe638b
SHA256454bf239c744e4b021316d22d48dff87d580aaf298d8c1d8f422b448425f056b
SHA512130e38fcf58fab4d2431a936ad117158cb22a43462aeb75267b6b2cc7e1e294fba27f5d439b7e6a740db0984672c5ca7c524cd59a61f39b508a7d19df52c6e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1392a06e604239b762b908663792e8
SHA1f722fee20b1bc59ea3644847df4f49fc9b72d06a
SHA25625788f2bb5f783af0405085fd32d9f2cc6354f7465178b2e642b4b8bba32562a
SHA512d2c78325d3b806d6cebea4512846534ae71c4750c51d347e3606983e66a4616cf928f34708ce06576f1950a5096c912d3a73ab18252dcccadb282bcd3150e9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc16358dc48fe7fb59d81687ec47f6ff
SHA1fe6d23e57bb013455a9491bfa781288b73c0659c
SHA2563644996ffa34704a9c95624a942aa773c95892f11c5c265bda57a5474355fa11
SHA5129f2d824e59290cce3d6a03f72c8f91472fedfda81e1fb15436b5aeb518bfa17be2b4b514fa53bbcd3297311a8a2cd09c4c776fca7273850c13d85dcbbd0be9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab18bdb255884ada4866dfa2a688dbdd
SHA10a884b650709ae338571899de9e05b9564d46f1e
SHA256f6ad6a1024d54ef957f1fc91188a2cb61ee8cce13cf649a7af4c68dcee829a55
SHA51256283e59269485d7693fdafc633873e714958881ef31d1da53d9cdd583e67e820c4bc31476ba9407e26217835639100914e6351c885eb72c0a18b2c595c8219a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b62bbe4c95b40a29606f657ea8343e6
SHA11df169fdee88e713cf007b6751b5e30a71667bf5
SHA2565cdbec0c746b0fef6f99aa29d7492a9a54eeacc81256bb47ddf42f372f79826a
SHA512ca8f5d18b6062ede81d60368d8b92fa931b01c363b558493ee617eb9b993d4ea346cdd86b45f136104ec1d4cd45d64a2e74511540186b196622661524998af4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7a54cb0012befbed699140516a93c4
SHA11832a617b734bc2b48e79cc9369093e8aa4e68b9
SHA25619bcf6e527e196ec78249303544b0440eef73cec221f2c68081715e96ad7a756
SHA512ec2330726edbabaa01d4a5df582df2f8e8c3a9bb96e7872e55faad807368c26576aa4e55776fbe0ad153844bd9927fd52c10ff40acbb5cd8fa61686cf42fdecb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b