Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
63b2f196aa9416d555449a774f43d36f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63b2f196aa9416d555449a774f43d36f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
63b2f196aa9416d555449a774f43d36f_JaffaCakes118.html
-
Size
10KB
-
MD5
63b2f196aa9416d555449a774f43d36f
-
SHA1
176f960755cd531106d458059fcb2cd733d0e219
-
SHA256
c88142e090ba7795472f7f76516e8d4184f0199cc904a35a85e22d6850ec4137
-
SHA512
0325633d6dc3d51ed2393bdcdd3f63255d2c12c9c40a3831c9a722d2a140d039f22d6fcbdf4787b18f18f89c5fc5e65265594a9cb5ab42a43f01b2766af4829f
-
SSDEEP
192:2VplIsr03RS8k/w1wvqLkZmB+FnjECM/Y01/6uBuLbdU8d:splIcuR6/gumB+FnjECM/Y0/6guLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70666d764bdcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001b419f9d2fb15060185fb34cb92163a77c9b4c1e6055ac6b620e29233bf1ae3f000000000e8000000002000020000000f96f8089290d9968cf862287d8867d33e2acfd86d1599281579b29bd341bc8bb20000000b75ba864b11ee1f3546834a169a05035acc70ac3c9924680e701e56ee3cce9b64000000056935e2fa42869fc25406e0bd87dcefee962afcbe0172f295ec5abea209b4bef7b1015305ba11c5d440cd237a8a3eb8e12a0ed189f7c4f3392be22a13d6f8545 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{778CDFE1-483E-11EF-920C-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000002aa4c7f4cf0ffb40737f924d316a9e7c15170184a0f38e9389774b3018dc703000000000e800000000200002000000097b255978c81be09555bbff1f7017a6808e9b44014470909ba748d2ad045d97590000000bf831cf90b689a06cd33d9c84deed9a4d31104be4c737a93b305b2c4bd277d36172287d960a27e917f90e07e6d5ab162a1b34b1b61677fe9cb8623f9c7548c30c5a9ebf8db4a8e3182bdb5f5e844753c16b10336a526fe657d2d41eee6b4a2a261307aebe4645b31d779d503eea69e41cb53c809467697c6a04d64721c073c5cf5fe348377e604a7242beb6a1e02916f40000000471172a493ec3246f4c732bb7d4090ee9346be92eb04a6c7c921b55abb7b287c2fe77c4bbc02a632cf1eab2c086a48b5cf12dbf257f7a2249e42c479f974bf8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427823729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2700 2064 iexplore.exe 29 PID 2064 wrote to memory of 2700 2064 iexplore.exe 29 PID 2064 wrote to memory of 2700 2064 iexplore.exe 29 PID 2064 wrote to memory of 2700 2064 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63b2f196aa9416d555449a774f43d36f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df4df8e84601be989d99f7f382d0846
SHA168928ad18756fe005b404d9b68f5627a5f53e834
SHA25672ad88d97a1aa827ad48594ce9b77a9c966598c0aeabb4dbb1393a63623ac1a9
SHA512333b3fc035a11df7826f61d46dd3cc651b2f3c80c53fe8d5a4cf219abed1d0c76d0244e5ae83ba584310113fa9d308666bb09309f2f614f19ba0d4a7b6ffa385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525646794a108186ab7a42f23434c085d
SHA198ced326ec1ee0a535d102ca02d8dd02560b9ffb
SHA256bcf8a29323a1e60e2c7409a79afcbc41af4916dccf27455f53cb4a84c9858c35
SHA512e6d7b25390053717f53d9ed1a4ab89c5d1a6f27d9908d78462c66a2376c0d0128cd5d33ba2998c0dceaf83dda8a1c8bb5d48b1bd5a5e961490eb247f67f7222f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504bbebce2d1b4ce765866fe9ddf945e8
SHA188eec08bf0dabc7c83f3800164d93d1ef90e3060
SHA256d051cd437b29507a8bd80b89b3d3126da24c75980b9945ca8ee66dec0b48baab
SHA5123c8785abcea6b4a213aaf7cabb7711723cd15d79f7444a0fa1b59167e7188ae4a18ba4ddd25f9420b61a65b331f786d54852834afea607514479b616804c7212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009ccbaeadc06be6bf3dfa9fc193c5f4
SHA18301063481b62ba3b6c40c57f02a74d3edae084f
SHA256ea4fb6815a719ec55da802af720437032178bc3928ee4e08f2b1affb794ba831
SHA512b615fee4ef055aea76fa409618f1aa9b5513356113dc30148530eb51c3cb767b9d909f8739ac497f5527b89c93ac794b5b9b80a68a8c572adb69247664a7c01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7203ba3922b7773fcfa45572c8d50d
SHA18ab1ef12dc6a79fec42832ec9df9f49d5720c8d7
SHA256273c0b3477277bc16e627b5bf3a9540d72fa7cf54fdb20dd6d6525712f7cbcec
SHA512033bbb91ccaab439cbdc98aeeb9d83e2b9bbb15d55532c2a08a0e80c1e3761ec1ae3805761027ca3554a9c9d1c9730b4c96550138bc59ed40f7458a546af4883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b04a37cb55f6aba02ac27ac12dcf2c
SHA1523df7d3350bdcda014c94326f035f131bf099d7
SHA256bd455d9b09b3439f2c70223b7f2dbb293cc65bd1983d78168004e11abfad15e2
SHA512cc98ba65af0a9c54d5103ad728f76e67d542f2fd73e194553d90146db5a08b8a13c2285eb47f21e3328a05a83ce4569d8be5bfdb4dd4a583bdc7bb78600d4292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745137262d0be1d076f8b8b476931d08
SHA1de7f9ef1287ef7e40e16ce9ddaa91463e8c39995
SHA2569cf63083e5426058fa6f771717a8a072530bc8df682ec979c48bfebd03688b35
SHA5127cfc96e9140ca52b17781889ec408b83110aac676fe9ea32f54bc4918489098192133f042d4bc36324f638906688f558596a75fb51469e4770cbbb0f75185f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51518101740a1380989613e4545dc32f1
SHA1fd1ee5cb454d7a750fcd8825d235fbefa1afca88
SHA256835704a1a4981d1373b6635b5cdf171aa40a459d4c763c336e0d79b205f63213
SHA512d6f193377fdae3d55a9e9672f7f363188c6972e298420c8765d5e42d83fd4bf2ce2de5064c66149d6546df71b5cf7eb59caf0db6c98c4a80217c0a01a0685181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a0cde01c485de8a3acf10fe945191a
SHA1d8a8c9836130af373c2cf48a55dff9a1798124cd
SHA2560e3ba4711870d50fc812fd298c8e398ddfd1c7c8182841ca6f0c79f624025a38
SHA51293afce309ec57eb6de5af3ca099ffbda2f0b89159006e48f69cb61650bbc579596f3bf52e091d2b44c1c0ccb2a57cf7433a0da2a26b886310555eff14d5ba9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5037015fbf3759dcfc9e9e535193ad76c
SHA11d9dfefb874bc209ff10318dffca819136b30645
SHA2563dfc5ef8c26782c3ec1ef8e83b5d940852189b07ba36214796be86ffa180da13
SHA51206e7336cd03770f8ed2a953d49309d0c8bd6410349fe049988939b36fc493d0032512379a29063604b20cecbd6a5101386731d8b0a1114aa2f49ced62fe6c3a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d367e8d2772f24ded03d4521adf88d1
SHA1dd7041e7542c2be1eff9f00e203ac0353f67a5e2
SHA256ae1fafe40bbec9d85a135e588d3056a2f4a7430f7fca75d5b06f78b9f9c09814
SHA5123af77c4763fd6c1d3af3d5305c2f04e87889c048cfe858e8d5fccadf070327909789914aca6546961239db9f19070f27f8ec6f177772041c15051f637249b580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d552021c4c5ffb8e63d282ece075dfd
SHA1be61be99ab550ded297c18f4dab2afcfca5c7845
SHA25659dd6a6c6ae07e05ea59038b779828e623e03c19188d2f3c0cb13fc263f0138d
SHA512df1520cd0576caf0c17f6e494cb7e79515357267a882d0a2b07ca9ecee465a9ab3a60c9e793d0766e4bd67d72f3d6a9e6a4a54ee73c7f54c47026d52adab6cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe6b8d510e7cd51c1b5a26c68dd10c6
SHA10570e3b9b92036c446076c4c05dc21954e3cca6e
SHA25632144e0ab5bf1f9e82b0d77df76f786025a8e56e374e1d46082cb815c8fb9257
SHA512d8310cd60006900eeebbb1c422424cefad224810eefdc15df149c38761098027f14154b850f76cbaffa4a498d6f31d1b63ad32f98240661e7d96f275c59b73aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982eb7aa461f7720a6f8321d5de856da
SHA18086127a7b51ddf53b4f54ef8aee18044155d373
SHA256e3260fcf71a719c4f4f77551120008f5e6cae21ed0c46d696b18f99136978625
SHA51251d760ef3eed6b02d18f568935beacfb718b4c2e020b361f03420dfe563130d33485d8b4a7b7f3a06eb4109b5fb409aa62cd74449eb3654b570caa83b75abd32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac55aefe30993262e735125103f3522
SHA18c535b3bbc30524a981d88db03f8c385ad924eec
SHA2568e2577bb57f89d19b1c0d0a6b8dafdd889e0cc9d92d144c7df3b4d845bab9567
SHA5122a172d52e7c439df2d43261f337a181276787aa268110e3865f19075ecd6f9c4407ab7667b36f5e37fee53495d18249b974709bce7bdfbfdc346dd1f81d5ce39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294662f116926aad063f4bf7258e6588
SHA1c60b93a04bfad8d0b955f5bcfbce4f6abc79e745
SHA25699b9d69bcc09cc2a4a4e651155c2e720dda8bbd942ebe370d5c9ac67e0ddf4ec
SHA512da9ed9e07352bd3942a2f26bbd3bedb33c3000c46896f36e740e89254134f7fe4cc1d3505dcacafb1ecca51632809aa763daab96bf48cae19a0a52a2e14313c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c771b6c11d72a519df87f6c344ffd86b
SHA1b7af54508ce3cb1b30da776f4cd0916f3ac1c3dd
SHA256ab89ff1e7d6ee09c02eb37dd4882ff259ccd1cb0dd86d34488e6ba2311921a2e
SHA512cd53182a6d0534d012a36c16ed7c751700f62eb82cee8b7cc312fdebee2a4f433657a8a06d3d80afefc467ea1fa22cdc561da1084179f01956a674c4ded8076e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0847e6383ea1cae02b5a2e07d588cf
SHA11adc155cbf5efc56c78d4f957a764d6804b77078
SHA2569fdc676cef20de7014f83463a7b27f05237d6154e329e7d9326a97526b1d0651
SHA5122e0e494f2f389b8a0daa41cc534fa795c6423943cdb9a2b8024c93068e04dba7963a62870ffe7217cede231a50409d1d9a7c7d3021cc9c8211a64d80558d4da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d492118c46c6e9bdedab6cab250dfbdf
SHA13e011ad64969727b0449cf9c440a88ce62c2a865
SHA256075c6dbef4931692ce23106192b5fd09a6f02be86b5e67ae355008a2d59291c9
SHA512c7c673e6c7eaa97caeb7af17f43ca3f324d8d100046bbfd1065da3af3601afaddac44a3760ab51ad298ace9d651cb95687afc25ae398c363bedf9f15c9dbffd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530aab5d69ed120b35f53a19fa2d62339
SHA19dc9c745a6f6f54da98c6493301018336523a54c
SHA2562ea3916551943788b2e4e4ff8a5179266bbd6bfc89c38d4d90d68516de5c9207
SHA51204a4bb5df863b1bd0952f417f3579fb3732a5764523811e9963a2c9b8b115b5d3a6194297075f0368b81e70ff569b5a9bc08c3ceb162811bfb28bd37ebbeb298
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b