Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
5e1f2ccfa9ef6483c593da6cdddc0262_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e1f2ccfa9ef6483c593da6cdddc0262_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e1f2ccfa9ef6483c593da6cdddc0262_JaffaCakes118.html
-
Size
70KB
-
MD5
5e1f2ccfa9ef6483c593da6cdddc0262
-
SHA1
7ca6cf95013b039d832efa7731cea0ff1ad5ba03
-
SHA256
d0527a2ad034f4a4684880d6ec8107eb4ba3b97b731e5ca08451603893781e13
-
SHA512
64fbd36b9d60db477f19befac6f0a1360333ac13eeea5261a4cf673a33f5cc778cbe9c8214991f1e1dbc55d02a7a7e8b52972a65e3943853caede2ca9e1bfb57
-
SSDEEP
384:z7fqU/BJ/nVd+ttPqt7Bw/qFLB1q0SwumqMASReV4IhIruPzoxYCfUfZ8z912t+n:z7gcSgGo4jfG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21E52E41-4626-11EF-BA79-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427593374" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409f78fa32dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000b05700b90328d44127446590e41e171f5c70425aed472884eb5d113fb34463f5000000000e800000000200002000000033f117f65e8aa570b1e7cab164b8e2c60f314e2ec8a43a441dd522d80f3f7a1020000000d3afe5d4ca5f6cf87da6602d56d765e58d8e1975d4c26dc5db53c968b2e81de540000000300970b6243b8a667fda542195e864385f75ff59f73c1544f95243aca82546318f7ac25ec5014aae726bb27971037f6373fe01fb92e38b300e09865fa39af91b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000890e713187b99be2bea61a11df813839f3a2220ef2cf82c3d25a868d541147f8000000000e8000000002000020000000e52d92013b1420dfd04ffe9184348665ee9c1549b79901b95fff92127c1a7105900000004c8997d4a33dd319d835755dd3e6ddd98ff2923bf306129267114edd2443bf1fda37423e0d7a1d60987ba8f64a06f0e2200a68dd278dd6ca8d75fef4c5c1046ab6898439dad38c9a610005fb4c159eb622cf9c7074e338dab95a94b684d31b385d6c86cec51f252549250a4d713ee3c6000b88d93a2e81b1e4103ad770bc182b00ef0a01346e65e21c5d9428e4600e274000000009641cfc8f9b9ecaa73823d2ee0e0cdaf67d702d76507741089887163cc8dcf794a20822978bcdfdce3fe42d3ad94787b1cb63dcae53a72a6c0671a8ee7fc829 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2948 468 iexplore.exe 31 PID 468 wrote to memory of 2948 468 iexplore.exe 31 PID 468 wrote to memory of 2948 468 iexplore.exe 31 PID 468 wrote to memory of 2948 468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e1f2ccfa9ef6483c593da6cdddc0262_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566a1c0ab1ca05e77b8089ee64283c757
SHA1731da434c8bca4e027887804b58b5bbe9f4e84d9
SHA256c49ea0439b3a9d92cc38ba0410138fa8e2b211e3da2b62b98163822571f7fbda
SHA512279ab7ea9711d6c14018432bcc67314e4ab0efedae8b72bd77bebcc88ae1aa182a90f17a26d9638bcb55ee84a8410450c41324bc55e3eeef7d842e034fc3d970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5296ade4e3168913beb0b4f0395ae68a5
SHA14d727a512457c129ed308902a347d5b100e94881
SHA256fc4bac8408399d49c683880ceec6fb6b0bc4ccd19333d202605bc3283a0ef633
SHA51203d30929217678ecf635fc4a3b28cc516de7eb70de88b0b17900357ee727e7daad0b288e115d06da95c8c497811db8878aa620cfbc968dc10fa3ff29b79d168d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD508a8b57727b39f2aca3ec813b6c54940
SHA1ba0c385f87bda98c9fb699403ac55d90aa607c51
SHA25619e655749440f7e5caf6b22671cd6efb0cdab32ba30357539f594cffed26ea8c
SHA512329f174d9348fc9ae0d18458dfbe5c2b406d95d9a770f791c9dfc9c6c115b8dc93d42afce8c044039f2168766d408b3eff2f1654a575c16cb1ff83894eea9c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cce8cecf4debca6daefead753ff63dd5
SHA1d6292ee9435408d178610079bc19850fe898402e
SHA256b64928cc9281284e902cb899ab22da4dc63bfebc1e1f59b29f2bd22e9261cf68
SHA5129dd0e8369dcec6a2330e51c5ad28ff16aff26fa27d350bf03ec84a95357e4d483d5dd6a19c205e8e79c08e0fa054d3353334c32b404bc4ffbc7e3d9752367a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529d37f6a18dd13490283da00af0d9659
SHA1a6c511e3469df8603761d0aa63ece6a35830c4a8
SHA25697205c799859cd10e4f7e8f4946278bb608f9b0f0949882f73f6909cc86eba07
SHA512aee342819a2fe40dfcb2c312b34ebf2836088c0ac848f07bf7bda6f27c38a81976ee1e8e04437731269eb4673180eae3425378d51e16ec3e8acd0fe8e3d8c4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503148522cb0324fb1feafc1a107c4aaa
SHA1d931b57eaa93268b7e061302231055eb29f4d5a4
SHA25692f34c8d335505a1bff706e301ab8fa75ae3a70c7e625c5457d474db8a53808d
SHA51292adff133ab7fd145b333b30afa0d7a59b42c47de3e68c0b30b6ba2056a9e8629bd6132e6180d2c95a7761e37f814a1eb91a00175b18ce5c3986319d70881e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534078fba75d93ab212b54625adc01cfd
SHA15ed56f8f7afe26e002b82bf8e48ae3d264ff11f2
SHA256000298c571690f3038025994e62e66a5d4e8efff13409037122ed583d03a3dc9
SHA5127f4ebb6a99029a08813ac7234c835c8f6f78d652a568a554742b78b0f78ebc4291674d2db3b67c94d2e5296ab16fb0cf35c3e5e8434d321e8ea214eef95c3e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f19cbbfe58aec43e58cae345c9b3be83
SHA1c1504ca1d5d6ad059a4d675e9a61b35f10e803f6
SHA256b49d4c0b6daf093fd31c783c0750f944e505c065ce035df91be235c7ac44978c
SHA5124d93588bcf6a0df8e6d07f3e92641c5d95d87be982dbb608166aafe84e5791945d3880cd3c91d08b9054aaa3e214193352e32ddb31fc279c168774f53ade8bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b57305c08c8d3111094530573a661f32
SHA16198c117088edeffdf5398dd851eeef1031cc1cb
SHA25616fcb469d1162065ea3c9cdc1cf3fa004502b77c2b7daf996b5d49c7d305ac08
SHA5129206825776155a00c2b20caa8af5d63f6ac4fb64892d0c7ac0259e114a5277cab648d4e93c92c055da1185ce4dec40fb0c6f605fc778ffc710e1797166bc526a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5adaa1bcf6820deedb9a99c8fbfd9c400
SHA1fdf4370181d1b1c041e7d75d87cceed6d636cec6
SHA256f926f74ef43870237a85db3a58e7c19d2b469d939cb01c29dbf43ca7c590c0f3
SHA5126a0c2248925766bc7370f3401897601a3abe316343b88fe6bee5df8bb02bc1478d84322695edc6d739b65626e5395ba0b7024e3b57c79ae60ddb63a3ea390ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5903ecfc3a6297f49792b7d4165d22c93
SHA19d522ec2fd94b16e4247b0b8c3547cdf1cf72ff4
SHA25634620920b428708e70e2a11a0c1572d3ae584ae78420f9458864e2071edb0dde
SHA51285fe0d20946631142d0330bf7ae53ca1c67160f816ccca9c774917ab9c88a2378c4e6ad6abd9f112e656a839816c5fedd4b48a99e119c48e269a9b7edfa88ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5856694a6f75dc63c4e6c03d16ff3a33e
SHA1a559a0b4a1c5e79674c2a5d342149fc61cf864e2
SHA2561b109da6f3f727f79ebd3de1fb67844f6149f5ba01214ef9cef50d382ec163c0
SHA5126fc29a8763ca6040ce294ac2c04f27282166be0623a776eaa99211ff8a18c6acb55b3815de6b56ee4d43642ae0d0c70acdf87b6756289e0d8554eccb34fa9cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51d82a939c25ef9e22d1f03dc67e4796d
SHA1e27700a22621978b0523c0d8440132a4dacb7857
SHA256e10b9c5eedce088852e8f8da7253bb032f22542094e2e32ec0963cce9fefc8db
SHA51229ebc7b686eaa50af3e8b7220324180d8d893606711d33270981db8c77c772daeca5ca63a10bdf969eb0e2d4101849293c8b1484d8db3bf72b00e737b2422bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afcdb3cf8f5f795861d2a3db579656ab
SHA10a2ebfa101a8bdd9275d0b42ee2c8d6b7dfa698d
SHA256ab9a3fb6a602e616b4e5918506af6f429d45938399a3ed8f509bf99f488105d4
SHA512c76f36262c7db18a1d12ff6f0e96118d3d6d05a24bd8a818b1dc7c9e9045dc4529a74c7a2b04d6f929de4debea25ef414d94ef2e69b7702d4cbbd363ec183569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548720433034e01ebfba788235fdf92bb
SHA1cc58963e00a5ee72fce80ab0c273f1686b72c4c5
SHA256c5353a88b0901c46871dc8fd99e26b660008536676b2ce2080ef36c0684a7984
SHA5126ec6c47663224c769da5c14aa595f3de3b200e78dd51686daf02f1ee9d6d980170209e3d18e3ebca9b04e6fe67374fd01bf4890017ac935c45cf99ac51dc928e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523ff5a756d097ba57c9f4f3cb27bb842
SHA176da85be08097c1c13e95e73fd0ca8560b185fc2
SHA256cbc7c00c13193e10f04b8b7224926683e4d5261a5555dd8a9793ecf6cfe40e94
SHA5123de89fe165c11d5ebb8ef37ce60ac9fe3e9e420db4455925822379c4da04a030be02e5e1c1bebabbb9e62e8401eb9f8523fa53ef5191564108e41e004effc921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f98d99bb315ea35e69e853f71ab16e1c
SHA143cb192a7a5deee8e577cd9100e86cb90aab32cc
SHA2565b0f657ccdd92c84969eccf194d0c0698740d2f626cf0f9337439dd8be11038a
SHA512fc3333aae79d46476f6641223f0f98ea1623329c4ce0e88ad31a6778980dc1ddeae5559a55b6febb681c34c5fd3025c8ad290325e9f96d1d8171763400ff0223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0738df6ede47644051571d64c70a933
SHA1dcfc4d2e265cff6c79edf41a33fe3bcb808a73f1
SHA2561cbed5096de15c1350ce78b2922bd25d2ba0c8b6922860f8da216f64414fe790
SHA5125077436d56efac70b40038276183d77d4ffe6af3957e9816cb548b46126607b78b735e0945db38a10fab894737043cdfab9da14ee4b507eb24168d2c5c42b48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD515928ea451a0da3871721b38d27264af
SHA10a728ad4f7444ec2e53acd41b14f1d538a6ebe34
SHA2560ff76157ac3c75c398b7ac7348691e35fc1765acb4e4ab6d0060523de1c3d43c
SHA51297691fa7ece784da8ce78a91cbd85918ec9f52647244266b4079b63e00f1b33e700766e96893876bc16ff71bb0dba54b6e550474d76f287b45c6e288b0713338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5366f840e564367dbf1bd770d1749d81e
SHA1bb943e780771d0a2f5485c5a17d804acdd34281e
SHA256b97f51b5d9f3afbb02c21c53a4962b5e436731331484eb70402a42f2c524aeb0
SHA5125ea4b7d5c67be88c56bda8345b8e409aa9669ff0a57d74fc97de737dbc47d84683b4a8a5d80eb126ff6c99139b3e48d9f3e5bf45053d01c30c3fccc548cff22f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b