Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
7ececffffaea23051826643c12ccc77d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7ececffffaea23051826643c12ccc77d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7ececffffaea23051826643c12ccc77d_JaffaCakes118.html
-
Size
12KB
-
MD5
7ececffffaea23051826643c12ccc77d
-
SHA1
090fd8948a3a4ef61aca5e918d25c28d7d745db2
-
SHA256
f1b858c1fcd7c23c89a3c66b2f677659983c82208d4a5ff06808fdd2048a9cb3
-
SHA512
ebd8fba2157a6f782999ca06974aa985dd0bca13c22c52b4a141424505d64299dfabb8b50b3bfa15b13891168f028db0b3720ffe24ac7c8529899720a4adece5
-
SSDEEP
192:CpYGUsRyxy3y2l5OuVDOheo6B+N4yNCckGguX0Qrf6Pn5IP16uXHQBLfdXqbjzKv:qqgF8CcDgBgfEId62CLfdgGQLvisCVj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CFD8521-1D4C-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000919c91c4dd45d94e8caf2a09862467e2000000000200000000001066000000010000200000006a4ed31f61080cc3c06d4047ee0180d285af6a4bb4769e2de0a67cef3f2bd74c000000000e8000000002000020000000377e516ee6be88ea10bff4ac69f64474eb5931deee64204663f9d21daff9d16a20000000425a2dcbcbf34066aef561516018ea4e580d37259c7e8c028238d7290107f33a40000000cb32a871d89b60c7a46f5176458cca7599bc3db8d79b4bf6ce662daf02a5e6500e3f9ec7b79ca07a913f04339a20fe67f22f42fa5f405a6e26a4b277bc2bcd68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423101662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000919c91c4dd45d94e8caf2a09862467e200000000020000000000106600000001000020000000e1a8a7d687d2852d92f23e30ff6b9fb5d54458299f34dedcb7f37259997d4537000000000e80000000020000200000007557ffcba95af1008ee27a5cdbcfb62ea422ca581511ddca3cca5648b544e59890000000c69e9da4300840b45b5cf71c1918def47d205686ed40b541b8123717cc7532dabe3f20754c309b919231cae3c4e24fce94846fc3d29f2bdb0eee6f976d3ac3aa58fe16cababe374b820709c8b51bee3df67103ce8104d6ee7910b3e65824bbee8e411504e3b3b72759f83d7b28e92b97e65a3f610d701e3f5d23adc854d01dc570d99ca5890ad6ab83b8eda54a49775440000000571db5d04987c8bee08e02225debfd95a207d0edf1c89c4f0460d221a48c6a875ee8e51ec3b8ac0bcb71f46974abc6597412c22feb9a484bcb120d2b9e7f5582 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f1f3e158b1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2936 2076 iexplore.exe 28 PID 2076 wrote to memory of 2936 2076 iexplore.exe 28 PID 2076 wrote to memory of 2936 2076 iexplore.exe 28 PID 2076 wrote to memory of 2936 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ececffffaea23051826643c12ccc77d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2bf193e7310b718165b66e56505733
SHA1b0cb9da74cdea7105571810c97c56be028160b08
SHA2563cf4b9985e71d8b999df9b753eb3efa81f12210658bffb5c4ab9e50eb3a532cb
SHA5123d213a05cf93ff07ba129d911b5ae4faccd5b6d676a81d1362e9cd61cf98fbc0c55d92337bc2ee9d6d844d17a0b0c9fa8abcf8d59710c45ce4cdf8dc5ef6d375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688420366d3d4d5a2602b1ba5d7f641b
SHA118b6f9263ef4ae4db62a34914800b6f1f1f3e64d
SHA25607305587c5ee52c88a6dd72df4a5948476075fa67b752048c5c2e9346b79cdfd
SHA512531b881b75af76163dc381ac0ccbc2fb08553ac2d5364c3957d67c7982186da979a6609be5973df13f571c134d1753abd8dae372552bd472d87324111e3e68b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1ba61a1c879c70652767524f188fc2
SHA1319b5752ccb712f96349b4182c587110f77f8628
SHA256418e5a5da2a971097f5054b3e111d40a0b2b7580892b4c38cf872449bdec39dc
SHA5124fdc0d5e71c352ca46db39626448f2ec16db3aea2e6113a4f8895f486b6b3314a4aa65acb98e6f0f617bb24f710a29a90c8e2ab2709c89f0ffd04aa5ea110e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e2c805226373c6c1cfe79df114d2f1
SHA114317bcc951cc0afbfee7eb2e0e82e3dc2739fee
SHA25655357b67d35632e0d2347e823b7e097c872f375731457d6c8a88d3283c2612bd
SHA5125703f8675670bcfa1773be116a66a0812e6a4669831f94852756b74e25e61554c48f4d4f87e1aca5ea4d98fa4109a1256111c6eb62359f35338af6285c9f3cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc95593672a1296736cfd91ca6758e0d
SHA17b3dba306a7e37c24caa4c8a18a0f80735b91b03
SHA256aca226934e65b105b656416febe324bf3667b28bed899a051e5c4ce2f1df1025
SHA512f89644134b9f361ae9989539557b6acbe479cfd7c065e24053808477e57a5a46fbd511e1ddbce9ed64e7528cb0cbac40b715d00a2c98df1c3b71aa8aeacfd81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0d5ee579d2b55eb1825f698e088813
SHA10efefb970af5fc47406464443c6faa77a8f2bcb1
SHA256fa73937e695a9de29f3119f1c01b9b18374a21555f1efb246a63707799d71418
SHA512e816d070a6a9147f97ddd58d86f2bcc2ee04d336d687382c3d6f429300a5e45613fd8927554476a8b35bf84abadb11870fe5690b66f6d008319857b4f9e517f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56247c3c0cdc293990a3d1f4756b69660
SHA17b9de0a3cb521730d3d29446d9be88a240addcc1
SHA256eacd034f3daba1eec37e0f456fe6a2dda4f76424ea59e626fa21fbdcb2ae14af
SHA51295840d0f2139afa8c108cd51f73a805fe8591e5da28d8b13526189b7e693188c05f91005b5be6a32421b1f42180400d8e47ba82bf765797c26adcb276590a3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df56ed5480fa1cf93a4717083263c0c
SHA12246add123e0b284c23ee74f88d946d7a1e664a3
SHA256d8f94fba1e55a040d8b43cb8d7a9cb630a8dab02bbc7676a18176faa7b0135df
SHA5120149ba08ac42652055230743dd20db58ee1c034fcdf5221fbb89a0951bd2d6429e56244dadb439797cf4c8e69b798231144fe3a4f1fc2dda96ae3858f6afc47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9106d8e9aeb4e3bfc8f48eeaeab54f7
SHA1d179ccc0787eee8b660c96c2d01f60ee8a678c9b
SHA25650a7a11002102ffc2b5a7e5559060dd72b12f1d654525ce8df2f16bd6dd76daa
SHA512a2ca0b3655b28a65f95390510c6ec2b57dd96abc65505fad74980ec3925a1b728558587c64ca8fc4a1e582005744258c1bc473288115f6cddacf9183944eeb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4beead48a22e6d55d47238b25d857d8
SHA115656ac83bbed04f048f0edb5da478755d30e05c
SHA25693fc17c57d5cef13031bb2b282ab8af4e123b850141b2eb3350d1aa599c7c4da
SHA5122d9cd4a1fc07ccd6ad0e5e4ac97d25460db306bfdc1864865854b748b213b5d129cd3d0710260c32d8cbf1923b08249d57d9a4da1237c6e197f095d4670e2bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ba14c0bfdd8a156c5b7760a051763c
SHA12ada20f18b6378b3b36d5744dedcb67c56b5ce85
SHA256f7eed67232ead15d9dfcf4f945598f84763efc455b69ade58a060df152f8a79e
SHA51209e9962813eea1a16ef95da9996cde7b44eeb880648cc3a6543e4fb5a3f5b1b7327f4ec15c14144bf3ff35bbf1e0371f5d14ae40e233b41107e556eb9c4cf236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f68d0451d988787d7fe6b6374b41f47
SHA16d6e5feb813d98f8fd84ad92cd3440432fc303a6
SHA25619300b91417cb37c9f902769b6a87805d27ec8620039f1f40a99396f92eb005b
SHA512fb97848f1b841052033827b95778853085f9fb57218d3d8ba320dde9eb4a96bd6dfadba00d682b627796575765231ed55bd8cf75fd652a14e23dd304d2a916c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac22f8b6a5921a4951011bcd82b92391
SHA1d91e5b53fe434ef1f91ddfc5894f7282c8140e30
SHA256f7b6d2dcebb5eac2cef21df8998ede605fb0b39b9098f1fdd33494e9ca56a9e2
SHA5120bcea2c6ba81822212179c0d43c202c13587ed9a6f3de0456b403ff66a95314defb7ddc731e6e0458381468b7abe9695f33c4aa4e88bd2075d06da61857b7c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a877f5207b4528dbc96b66bdb9356c1
SHA18eabdd94f409677a0b2fac20cbf3f30460c74bd6
SHA2561b914b3433c4587041b9778e49cdb547e0e2423c358df1b8be8f34fcad5a5152
SHA512981bbbd0025d72ca569eff49db7c12a9b5e962a34ecddb821fe49a24cd1b89caa5597d84d40395374eaa991f3a14afb173f608a6f832abe47bd77e75ae50e137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001b05df5d379da38e007f7258afde61
SHA154681df9853f0464cc34a4541ef14757c07ed433
SHA256f7c05535fa5e09cdd3801190529c846c3e131f569fb5fe7160aaee8478ded73a
SHA5126de9add5baa7368b7e9872ea256e269ec47a58b550fe63ae45cc69d008dc3c1297d7bcd0cbed9badce395f38e1999b6f6fccfaf194fb12e36baf8fe9d75fea9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c6a26dd1539764d2fa0b4bb086cd6e
SHA128678488125c1371d0b304cf5d7ee12dd69f78ae
SHA256e3dbe489718665cd0f83430c8fb53537be29141f9bf8b9aa64ef9978f4f89b4c
SHA51295e5fffcfa3ffb316b58cc1f6716880124d0a3c98c335e3d858c6b6d27667e447e13218372e428266aed2cdb810078b924e8b2c429ad3fa06dc929abc9c2cf23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b80cb98992a50180ea9a461c7e0225f
SHA18ab714584e083f6363663b53a025b51800edaff2
SHA25686d623b6c3c6a5ac086803f48505a843b77569650e30dd8f90cf0116a67eae56
SHA5123880dffd6c0268744e2b90af26a9aa05df7e480d48042e76fd75891aeb9ba4e434de4331195d2a192b4d04fcf0f52378ea1c7b80776f381cbf77e4c51945f537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d55ce4e6909a013a680f18f50b954f
SHA199e7ec4a74c3aee883003ef9bc9ece6b99d063d4
SHA256881b68772e8a37d43eab1ce149a3a0b6f41c40d4a2bb6971652d6e4ff7f046bd
SHA5125fff20a3d8d47d830b4bf6bf18b4804c1596a9bbb891f00a2afd1d035986362888d6286ce08fc40eb1eb294ee493ac4658f3b6a07f31213d0291601d92819850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37bb622c5781febd6bc920f0997a18f
SHA1c1a795e8815b3f7326c436e38860f647b7bf5917
SHA2562a745a70d7d5b33851f180fb68134e6888dd5a1e42b3ee2a29535abe30130993
SHA51230f116017feaa201c1f278b3419ac3890d6311f38a8c2390d7667df6c6ef4e202de6456501fe8768aa0c27861c0a279409ed990011d52b88d23a0799f99047a1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b