Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
8333dfc5278ba5cc20fb809dd65412f3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8333dfc5278ba5cc20fb809dd65412f3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8333dfc5278ba5cc20fb809dd65412f3_JaffaCakes118.html
-
Size
69KB
-
MD5
8333dfc5278ba5cc20fb809dd65412f3
-
SHA1
d048bad9911f914c5e994e73a99bae92080a30e5
-
SHA256
5255bccf6b558da295183c785eaf9ed08f2fa5e2b245339b35f5359d9b27af89
-
SHA512
28d59dece7b1a8ad87a27cb51897c151050edd7b1bc9cdb513f68349551c0264157b05f1082722d8e0dda9e230497a7310d9591c8eaeaa31b8f0c52954bf766a
-
SSDEEP
768:JirgcMWR3sI2PDDnd0g6s0MRoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:JtmTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c862d154b2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b83ed5047d602ac377547daa52b4a9f475562ba05e94816447c7f295ea83d4ee000000000e8000000002000020000000d8d9bf1a5d039820dffa5c80db3102c4f6b7c0313afafd36ef58e7dc26f8cbd620000000c0fee9b16ba70bfd1afa46f40f427f68b1a63446a8d00c6f396be73893515e8d40000000e00fcfcd8472a83f7fa4a303c1aac219801641affbd317210fd264154c39ddc4c60817e1c967495b3e2561b652703028791313702852c6ccaba8435557ca788a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423209867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCBF1051-1E47-11EF-91AC-F2A35BA0AE8D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000010cfe066a4d9156eb7ac7ddf86cdb2cfc57d39a417d949f5dfce3d61b16b7405000000000e80000000020000200000003a1f1a70978895f144c5e45c21622a24c1ea5eb7e3630efd48e2a88609f2996e900000007b2bf832148391796f00a9061a7573943721e0b0cda72ad96036c6cda80a0c4a3562e8b4fe82284bbe7bfe1dfd16b962ab8d6ffe650104a18f6c35766770e887ead331078432b5eecdfba068de26aceefc83fa9966953e31dec917817964d0c9c71fb56b579f3eb18227a25c1e8daa052f6475f00a67e1573164fb68825abc3bdd83c51e54bfc1657e612ccf78c18e4d400000007d3fbc926570ac3552a7180780962e4a14bd5aa9e6230e74350b22b68ae554e38ed97113d799fa918a8b486e9f6e7c7ee6c27c356bec0b2ff607962acdf4ed95 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2600 2748 iexplore.exe 28 PID 2748 wrote to memory of 2600 2748 iexplore.exe 28 PID 2748 wrote to memory of 2600 2748 iexplore.exe 28 PID 2748 wrote to memory of 2600 2748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8333dfc5278ba5cc20fb809dd65412f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52cdb84ffd626dd9f49654a910d4ccbb6
SHA12cb21266a1bc9f4b0a2ba7bb3604e607a4345ff7
SHA2567737cc34407925d3660f2308dbc274c95b4e0aeba4163922554c31b1e904248d
SHA512ea867ee67d37e90136d5b23b55462e2a8e348527468d3dd827e97a3e1a3f43c9492e4c2bb0249515bd237821bd77527f2378bb6ee0aafa86cb23de6be0972ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a30450bacf1ac50f8bff7ebacf0114c3
SHA1ee1237c4d0a0e72cb0157e7940fedc5e72d3b3d7
SHA256620bfbf0ac680d388800f11730e4323789b872cbd30e21d9036adb1c8023f2ee
SHA5124dad18344404592c40a54c5e7a1479d2598cee1a8eacc3752bc055d7efcbe6ac173ee7485b066cc56f5b78210a85b9f1107007ab9edf4229e1871c9ac5d91b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db963e26af587bc0ded3bc665970851e
SHA18d8493c656430f07a781fa7cf95015054acf2c15
SHA256bb71d1367ce104b4c73c2cc2003a32592f7a6507092b42fc1d7bd32dbd5f74fd
SHA5127dc4e84e88cc1055462f548a3aba51e9aae8eb2f4677c66244d1eb6ed9d8996f72f73cd8ef293b8a30699c95f337e15854d1d726279a66a40d2e268bce9617e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c5133469c833ea65d64f25c9565fc6d
SHA1402962dcd44f7a6d628ac861ef147dff5d0cf277
SHA256036a051b733f8db56a5d5d13bdd8b4228402b1d0511e03a0d2d5734903eb3bbc
SHA512fca725fc14cbed0b5dac2ee44e758cca7165627f51b113c55c4ba0e63d16448545e17f7f8ea1fda4f874055f127bd566c824b07e9dc04b56fdff9532125c20b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543ebd28ac9a5c38a4408fd60cf28360a
SHA135cf5024db278196d744183cdd1e63d338688c1e
SHA256e39746e68c2542f992169f77e88dc9e0d778f05abcc172f78619266b2979287e
SHA5126611dcf1cea13477b86fb42cd8cfafa5b14d18063e95eab06aa6a449144e82a91b63308f0c2708b7ea6449cf7dbe51e25582145ca7ec75f737e7e19d122d559a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544585f31fe00b3dfe9824f9496dd7f24
SHA10de1bf8b5c8097b360d0e14dab69765cf4e93997
SHA25621749fa307f86ce765d0a8389fcb286a29b4da891b6a42ad00d0704433356e5f
SHA5125bc83faa8cffe09631df0ccea5f7585d5338b30d3d3a6ae7a704d99ed6cf08fe2799f61ec5a7fc627d7106e625df4402b4f2b6e510ebb04e1758410c587b1512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53eae5204ac2b5bda88127ce6c2edfa1c
SHA185875b4491469cdb55b0eeef5cd01fd638f51dad
SHA256a20edf059af4c3aff65a217e0e4acddd1d3dbf3161a8318afda1219a05d98e0c
SHA512ea8727974e4cfcce2d0625da90d4a1ffb6571c3060bd1ec92be9a4f88e9cc9fd680c5a8f8933b5173c90e29e1136075e25250ea73448c3e6802baf9e1beda0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5373f3d35628c8663740129a3e45eaae5
SHA1c13c76b4006e337adb44260d914f617dd4977ed2
SHA2561e1a277bc3a94f45927c2beb42e03cbd5075a1589922bf6e223f8a18f80dad70
SHA5127f6e7313e98ef756129f70c3153906e01da22a238935a7dc4cbb63cebb98174b2e0fd1c9185912f4902f900ecc747b81299ae183aff26c05218d8236489aeb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5599db1be27dc31770499748b8fde27d1
SHA1f4627f33bbfb28b98a9a1e3dfafe8d2ca6ae634a
SHA256fa015a11066265c64bdba896f4371613f26511767b291f0dbdea45ef72a5788c
SHA512a64e6f91aa05b5abb2cd74eea508a89ba3b1ea96fa26af0f6954f21e02f2ac7d5201615064bbff2664b408db378a1349922459c03cc69c4975d3d4c73fb30e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9ac79cf90c81300b65105fbfb420d02
SHA1048fc5654b3cbe0ea5e9c4f0dbe10b64ffd2ab54
SHA256da7690c8ce31f84fc3e0d70920365b1a1676a59665a94583e94346fd53896cca
SHA51218ee17a8c50d2bf3f748743ce1fdd2b3b4c2747fa219d47daf003bb7d882353f821ee7628067b413fe3baf28eb8f35ccab08ae4e6a955b494824ffbdfbf83d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f2d5f073bb16348549eaf2036be3d81
SHA1c8b5e4b5336717c2be2e6a547bd1df9d395e68f3
SHA2561d3f589f3d2aa3a2c9fbdffd44ad3d332bb8629470511392c1ec15aaa35b9716
SHA51206ea0df3f9ba36b5834c59b5b1a7d831d640c85d5367dc04ec79934dad4a82f8ea2dba6c49f13d2b46b38a6ea515db5453c6ec97391eb66bd74d83efc89dab40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d1520eaa8e95a354278d2ebf8dbcb33
SHA17353c0310a2cedd4f6ea1b3f7d7a380e3c7d81bb
SHA2567e8b925582fa5fe871cfe04fc46227f56e0efa6e8ec049998a919a0d7f2fccb9
SHA5127aafa584a995e6a3b72c0beaf24b7f4936417c0daae4589d2312243bc8b3eea01deedfd9e1ee71ec6ebca1332dc342892e532ef365a8c6b70b0264f38c1ef23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551f00487645f2a339570e0ec34d703e9
SHA1d0775b4f092c3b35cf647fa346718fbded5b7b61
SHA256e17a03f9c3e0e1fd211704bd1a068fd4cd96ceff9a8e8f8c2235eb4bce7061a8
SHA512c34b13d707e6cdc1ba5dcd7aa5cad6f504051991330e29725ddd3364ae85af51cca0d66b0be7ff10444bb44f5f55a3402cb1952f3c5bccfec5bf9eb308b144e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3c29b2304a4fa38d93488d5946e366a
SHA1ac7979342fdce76a1fe46c9c02bd366a2184637f
SHA256d583335736c555f3170c0428341635dba76e3c4fb8038448cc6b7c2cf719eece
SHA512d13463946cdd0791d11be03ea57ff1834217a7c0f5d64dc5ff9673405df47258ef2a35043719b55760588b2ef1053dde409c63367902ec4de75fa6ae8d3a632a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9400dcd36cae6d9984311e43166fa2f
SHA10ff8682e6128b24e650db1b71638ae9a20f4fc05
SHA2565ecb3f0ffbc1cc49deaf433facf3c6aa219eff80f2f30d963716f2ee41b8d3dc
SHA5124fc37002083b7375b119ebb5d4e1dfe0c378e6226c348b0b858cfb31083b3743a0b7c3e4ef92dbcac4a4374699eaedccf55230cd06b8c14dd49d7bba3d5858be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f929438fcb4ae52f4c7f2f43f284280
SHA1b5c6e3a9eb8800f6b0f0185948fa46aa917703e2
SHA2562c6e0b5e6af303ff2d9f4b597b2039aa713af3d5f020d347995de4780a8c9e3c
SHA51219cc427b3924ba88af16a6edafcc308069b764811f5d3dab6d38d3c239cfcb3d0471c2c614e47b51da834dbcaa55e0de46ba350eb8510f48707a8b23a76b39f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a78a860a6d880e643f446a586d4e4be
SHA1d73c74381cd9b1811894e233a6ae769eae47ea31
SHA2567f9098302167acbe3e2f037a46248908575bcee0fdc325ce5dd1a85340ceaff8
SHA5129633818b8c5a04a1e8205eb9ceafc96c01fcad4a314bd245a9ccac7e00206d5038989cd6c3e15aaa5d4f82a191d7c0dd853c125aecf78cc4742cfea3ff0248b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5966e1f4a17b77fd93480e2b0d6e50ccd
SHA1a9fccad484035dd4be7ccb62830e11e7a70cefda
SHA2565e1d32e29abb387cf69d6c0584d1c5341b95a565e6f3757618f5419dd4b30102
SHA512b17e9dd100fa27b2e4a0aa3193ba92144aa95b9f7500b1eaf1375f56dc5ffe1c67b8a4b56d31d24ab0fbee1d532a2b7950bbb6a464b1416db47d5a0887c4584d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3b7bf21c1d73377f78fefb161a60357
SHA1d645036cd6e507175d885e25d5b4205fe9755960
SHA256cedc8affa20638e9812066030bdc60edb51783aa97806e0ad41da0fee99d64bf
SHA512531224c24e0b0780a76fd3cf44acbfbcb83367f0fc4d6a193cb7e04c0076437ae06c1ed7e4216f2be73dec97557602e52437270f257d91a4ddffc9038756768a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b