Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
8304f49e323b6dd0e1a54a7a0dfddc15_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8304f49e323b6dd0e1a54a7a0dfddc15_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8304f49e323b6dd0e1a54a7a0dfddc15_JaffaCakes118.html
-
Size
4KB
-
MD5
8304f49e323b6dd0e1a54a7a0dfddc15
-
SHA1
d6e6f945339dba0387c6becbddf7f0c2fd0e268d
-
SHA256
a59c6b4d21ec6c13be2ae200176141d3d6f3f0b1bb0a209583dd09a8b5a9ec78
-
SHA512
1c95459756a53c3fa1dda2152dc2a09f901b3640035a00983389d969b58eedbaec7cc0a8593fe168c07bc1eba81194a8234840ff39ae7e18482818678d9a770e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o9xZ3d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7476DD1-1E3C-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009e170ed2191e14ab9842070fd6cd11c000000000200000000001066000000010000200000004ff80fcd58e628a4d883af386961f969e8a60366c2375134dfe714d03f97b6bb000000000e8000000002000020000000a4a93cc909c6297428ae978bd6327149455c0ee82f021fe8ed6fc55d98b02696200000009807c3cc22129e7a4f9c0ff5a9698a07b3407ed9bd56a825c5c55320c64fc869400000007f4f48b9a924e904cde3745b779bee996fde3830164879708423c0d40f1078045a0e9d42972862f04884108312c50a418d0f7e91f20b4c20c134f033ad5f7d9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ce2e7c49b2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009e170ed2191e14ab9842070fd6cd11c000000000200000000001066000000010000200000008811bf11c59d6183a7ed576a0f195decb1c98a2bd901a00e2b9f2d54f45bd0cd000000000e8000000002000020000000a9486b2e9c0fabef6845671bd5a0fe8266cd13271fc31c9788db4b569fc9a06c900000002d8fbaed370c13e3738f656afff8788b4f591ce5bff07a71937ccaa432565b06e0e7a9d221300ca52f6a09696e6b0a404f7b41a1a14c00877821f0ea772b03bf9bfca4aa0220ef49ecad38e16e02707f8fda6ded97c27662e08e7f0c01cb9c8259e8c50e7f741c7c33cdc550d09712af9a451ad4ea080f4d8bb7c35b31ec60caae3a6b78b62524dad81f7fd8fc0890df400000002bcc00a8e6f7a12e76632edafee7ceda3cc19bbd30a4d999a348c462cfeeb090e8636d538a2ba3844045d0664951d451dd02e1af2543bea886dc0110ec7741f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423205001" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8304f49e323b6dd0e1a54a7a0dfddc15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bc77aa7258d22a9f3351ef06f3a645
SHA1f0dcafced7f1df3bf501eb17fecf3a7f28945c81
SHA25633ef825a17cc1ea253962be253e67a1282fd8ae1a3daff4d4fc06186c896d9bd
SHA5122c46f8f3059b2bfa929cda5fae416027e6a8d671609768c16865e9abe029dba8c28689e317cbf24939362a92dbdfb988156d17ed07628d0662c472b258d3755e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f165fb5ccddd22452dd21506e4ea9082
SHA1b5ac4e62227547778d33c1ab9cf7b71adfd08ecd
SHA256b16500b54beaf0c47efbdf9fdf69fcda029e8e72348d56ab054a0a626779a7af
SHA512199ba6b3f9b8a812017d3e569710a9a64c0c5fbb4a1f5b49af66099e53a2e74d0a7be097acaf821e777511bab95e904cfa08a53134c66678300bb3abba9c4e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e57f6644aa8626dd0b5746bc7753f6
SHA180209cce24720be7f97600416bce8057ba111e77
SHA2566ed8487f7d878d8747270d76a7cf3bc81a31c03264adcf7b6f6a72276bdeab25
SHA512be3e6bb4348ab880f1abbbe7a0bbe1f18e744e67bf30b655f94aba0d6222d2bb7562df16e26a63a1169b8f27378a25bdec8102c6cc93af73f18f9272a01dc1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59153af35e44639c051e1a3523dd20078
SHA1892054c774a09aee0c8c03509e43368363c2329b
SHA256fb990a9634cb21c543c6731b811c051b068038fee3c94a98ca6328a72bfb3e51
SHA5121881a04910ae3a38c8d608d93d4e3b18f8e073a31408a69a7b68eab3fe74eaa1ab23658e7f561d558d9a352807fa6c6e354176962755c896eb3c7ec5ff0ac2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f963a71e11c82ea07b96654760e093e2
SHA12dcfe79e79c6814b8843ecce19d3fa6214325589
SHA25601ce64693cfc13b375b44585e4f11da34c07e9ad7d87a94f27e9bab2a473987e
SHA512465d4b98a6d4721f53798aeebbfc51a85eb4e308e9edc4237d4486e9f8e3c463d119037358e86f51c7f1aa1aecfa16ee867f794a2062bab9c8579b45fd2f20d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf2da3c8eb65bdff62b6568df21c18d
SHA1c5143f0f18b17c68af37a8f17236520257cffd06
SHA2563248af7b05f14e56aaff0008d616797de5894f2530aabd882e4b8738df256bda
SHA512c7ee3e7c218fe6310230ac5a2fdc3be7e4914746d3e10e3c56ef7e5d44c256bef2474804b0165bc585e93b7a6dc6c8b45c7814abe683cb99324c3f1d27c0e69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e141ab5694bd5306095be3abeb10ff59
SHA1735facedecf18a136f760f7327bb1ddc155aedae
SHA256e235efce5e6f80694f855585324f1cf191225a6cca6a01c9fd428f5605558002
SHA512b195d672fde53db9c995057194649bdcb76acaaab5302ba543bf4f167ea5d0914d147da10fda0927263471a6b631898ce793f0e8aa73f1a81e0b29f0f36f0cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251c1d2bf6e859dae8eae86252574bdf
SHA18102e63cd1fdd9385ec1ab07be835411b238fa38
SHA256c2fcd98c8ecb3c2f95130275004e4af9b7a43b6b680613bacfe20be428db16cb
SHA5124974e5e089ab169ea761895c7c864e314fa354b435515ba9b517be600c1d1f0d9cb7942820678f22a909673b0971562b5931e2ee796ee31baf558c7f5b74a7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b5d8008ca595a57491ad4db4210bbc
SHA116ed44aed6dadc6cf5bd17baeedb071b2e23a067
SHA256fdb72a9232f2ca6a8fbf85aec45793c06cb307aa8ced4ce470d8281c2f79833d
SHA51299df73847b876ffe4648f030d7f2a45190aa10c80bb6dcf11fa188dc00f3ab5781ab4f209ab54d8b882b5b895af3df161274d9bc486febe3c0af482e98f0228d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558e90d2ac7280d5a7e96e3436b4f526
SHA14088ce7c73207cbe35c5a9ce4b043594f9039192
SHA2562c96ef6eb7fbdcb495468618de49921f0021001ac946dec34a73c26eee1f79de
SHA51261d5d13a85f4d0d4ffd3b50bd6db40a79214400d0a45e26b626993196276379af544a503e80a140b2c72671bdaa4ed38a98f3dbb9848785d84c247a18f75b012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c41d6aa34cc8bcb4317a3b7af2f5c4
SHA171d0fdc4e498f548abf2c2338c181e56f17935de
SHA256bdf5edca09ce72187a420152cf82d7a29ab327eb91017cad28f50d29620f0f4d
SHA512d28c1a078d4c069ff76b883ae467e4bcd1a7dc7636609ac68851c8b1545a4d7a71f24cba2cc8358fab2a147241e1823836bb10c0b602db88e32610476fedabc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d54ffce9457d8c1b03f3b6e47c8667f
SHA18323a9d49a45eea4c32e5628b7f4c9ab2e13d76c
SHA25633298ad82fa6e7a3a2090a9fa42b6bed0822d885716d373485b56d5731c4b32c
SHA512df1c47c62a5af4b44b9bb405135091173bd1c410fe8a1f0f257f14000747e1825a71f760a08992cbe3b32d951cca755afcd3e6b24780ef4c27715a4c1b3a8f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f9643a001e6dcd844c7a6ada985ece
SHA1416b699c031db2e53e0b73e171deadbcd482728d
SHA256719038d64828dd1223b3298e6f0a8f928e990c7d6753f51b342f56b795af5b0d
SHA5122bf84bf8e7e4dd32a10d47686a16baa01cc369bdc48b094518acde21f83cda46b2b4f0c566144dd6e89544c45b34d2fe8b5ec76633e116579d3e2d14dca37d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3872d509dd2e4dd9838fb9ce2424c0
SHA1d03ea5ba484c375b8c5e160832006efbc9471935
SHA2566cd4847c55609cee84fc9be698b9ef781f7370019cf33ca00a7c1a7746b0c7ba
SHA51286dcf60c2931fc03ae477727ee7b85af8723dae8f5283823849367fe9b1d3b70431bb17a79ac7e54dd08e1dfaef5e041224e9dbc4c84314f6942f3413bc30012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab0f0d0366e90a80d2bab45f734be86
SHA1f97c91dc9bfa59253f0f02b1db66afb55122e4b9
SHA2562d184980d6119d4d866006f553620f5067b8ddbf974d1d95e8ae8b40964999c7
SHA5124b4613b4dd7f5262ada34c124f65c74c5c103d9684d533a14d7ee4bb6faff56f4f4bee485436fa143ea24eeaab780638cc1d98cba29581eb313d9895f4509140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd107fdc87a2dcc2b16e0b4eec25fc3
SHA16c3439aa36289b7c25eb48ff9148bc4f78a297a6
SHA2566eed830f755dc0819ff9ab3865546d4c63f9b0e5cf9a3f45953d376aa5eec9ea
SHA512508556f7f422e20ce55043aa4cead463f659f2bf042ad68629e3e9a6f99fa28c1c4d3a458bb1c8cfec9561e9da6d9ae20950f79dc49846132aa30df3870175cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b023f60f8c236bfaaf5b25ac629709d5
SHA1baf3943f2e29edcfd7018b06d16f71471ea576b6
SHA256fbeb0ba0dc50802d997db98248e0e8041d8a6020418f56a9c26acd2cf1379ba8
SHA51251534c1dc1bb10f808a9d3c60f621e4dd006166a204e731d3283df7c1f921ffd2a799ba39358e8ec8ea78f4b067c73d05f29f70d87224525228ed106f649965d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a9bc4977f9210cb1ac3d4811d4a285
SHA1a9efb0c83181afd019cdb3068fb153cbbdf1e239
SHA25636d470eb8ef50554a1d7ef5b9fa08994714c7945b12e07991bc04c50ed3e7f92
SHA512b1030c47dbf3440fcb02cd1cecbbe556db9c525cd3d5f2c22289b8d0e4b20a0269d986a1453f60ce2d976ebe8b00ff26194e3ec93edd72f1df92f57735ea70ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3437237170f2c96f03d3411027f993f
SHA14fade4e9517b1d713ea0722bc9b9eebc3fe210a3
SHA256945d77d694251de5c7f4b329bd40f35f1b17ef4b62985dc34307661ab860a27e
SHA51264275207a0f61df2d0f62a2fec32a27bcf1bcdadaea5f7992bc99578a3d5bb27ce71d0e1a9c77c498e1efcc23507848393048571fc26d18a23ce3404677dee18
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b