Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
887714abc2034e7357c64bed4f4067fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
887714abc2034e7357c64bed4f4067fc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
887714abc2034e7357c64bed4f4067fc_JaffaCakes118.html
-
Size
76KB
-
MD5
887714abc2034e7357c64bed4f4067fc
-
SHA1
bbd1f7ae1e9183b5eee0bfc5e92b5625e4a2df66
-
SHA256
461d6096e6e9a31760bca2a456ae2f99f8b23ceb01b22093fa6835674e7868b8
-
SHA512
2702d0b86f0f9ea257951ce3e201039533256147cb7482559be0c0241855ce4538092d3f66721f2f66772f4b2c5d657d4784892dce04c15484b7f2a1b6ae6bb4
-
SSDEEP
1536:E3turnNZNy5ZbdKfIWuPsOfrlkGovXc+O/Svx1rn2t:EtONZNy5ZbaIRTfrlkGovXc+O/Wx1bk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C254431-1F97-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001be49ba97863844eb1a76104279f6ca700000000020000000000106600000001000020000000e754139764a87895e6bd90ea93de3b48131d054d54b385bceb5920174b9a90db000000000e80000000020000200000003a24c937088c9857e2db00d2b11f3b1a85e7e57bc46af4abc49149bd565fe6a12000000008a3529705a506c5aa164948aef60a441f032d76acd0dc52ec123418464a1171400000000c78f4b013a3ff74069edafa73ac478e15dad61ff44495eb58300d113a943d19622b53fde03d1c495ed564b76d6adf3798e7c96483c767f10140b62441322560 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f8b060a4b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001be49ba97863844eb1a76104279f6ca700000000020000000000106600000001000020000000c7725081a2e2bdd71a494b8bd4ba61a8c57a5010af192d04fcfb434f83d19161000000000e80000000020000200000002013a89b5fc5339fa2acc2cbc0a6eaeb65fb22f68a6d7ebcec0d482620da97e190000000a4e66f23dd4034e72e0862ad5225308cc2c2cb83ce661a89d5051b8df15eaf7720ab3dca8d3ce3db5181d4995c4e2fc74fd5c67d691c79b332dfb903fe3fe97f4a58b11335b2e2b9c6819ef19dd8f33ed3561b80cbd2089e0123daffd1314faa7bb4680edef5f1cd90a87418bc5aee7ede152456796b262b09281bc6c34215ce15c310f83dd36872565c05546a75124a40000000d1c0d82a068e8c5a1f32b40051dc36b7bd8d79eabd382e0d596b6ae7728aa7205c49f1067572f5c9a9e70b22ea6c73f8a1f4a4ca45d2b6460a8814b39ab3b507 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423353990" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2444 1972 iexplore.exe 28 PID 1972 wrote to memory of 2444 1972 iexplore.exe 28 PID 1972 wrote to memory of 2444 1972 iexplore.exe 28 PID 1972 wrote to memory of 2444 1972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\887714abc2034e7357c64bed4f4067fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530bc77fa576e9dfacd42ffd746f95e2b
SHA12519449de3f133a069c8f72e47c4b20bf6bd0663
SHA2565cb4a2b17cfc9d02054a90e6f10edc68abaf0d29a2bf37e7706f22de9e2aebcb
SHA512753155f9393e70395caebd82ff19f09e2ec40c886ed68a8751eb08df7974a1dfe3c7e2e14651368b457224293449a6ddfe4254c9d5e4ef931521858090938325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f710332fcb0c87e5ddb15626630618ee
SHA1d34b3fbe4fa4253f20385ee3bd22f358352ebdf3
SHA256b11b41a0c8b20116877ef33a6faab95480c084015d71f3f26f06b1d4665a5e3c
SHA512a2fe5ad3ac693574033a4184a285b4abfd1c106020e9dabdcc95d4ebfb8577b28386666e0101eaff7900a9936eb9964d31af50ca978a9bfd08491c499ecb7c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbad6d909ddd1952f8efe3cf5cab5cf
SHA142af33b057709ae98fefe0b217dce7ea7bb39f86
SHA256a10cefb9826fb81c9e8433475e0faaa002c2255df846cec2980ca4feb2258c0f
SHA51294be12ee406fd65b4d5cac3c06979759b98c25444abf4010041e961ead4ca15bf852b88dd231d814c9ce070588c7768d5b5d4751ca85e6ba10da1faa7e93b396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536747d39faa8e339f62aca4919b1f886
SHA10ea13c27a5e923ef45c067ea0eb3796d64d84e31
SHA256080000211575644e28e867573882a569a91e2ea11d033a39dd0697a2493ff19a
SHA512808347cca49c9392fbacd4d54b6fb7daba108a83ef12414eeb3c0dd51c6533bf84f13898e1ca2dab858004e51e7e1e37a5272597acd83758c0b347614b171b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c5bdeb469f7d1cc4896b01e491dc7b
SHA13678c2c028fcf78ce156730f410a89a3bc9fcf5e
SHA25635b7ab7dd1f25022a4a69f90beef78b9de8cd90705b9890152cc3cc2a1b06b2c
SHA512b4c7ef4c513f8316439be96518676465b9f6d4557069c0c4a5afa8c01c97b56c62fcfbc7902361b39cf6a5582ddca44c10264933a59b814c5cf73b400613aef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c70874e89ba62ecd6d729f968b46e3
SHA16b185e82396fd5dd74a271104b73b8a9d0713df8
SHA25650674773185c58027d1e193d800f15dc4ad0e493dc44f90268cc76587084df77
SHA512c69ca8952a35bf3d0e89fc19c7efee9d80586d692571dea78ed3d3f30017cd48dba674c60797514ac64125a066582edbb9b5a6c8501622e2b3675f50496b012c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bb01cf765cb897298772c72150a9c7
SHA1afa3d27c76400cc0ceebd02fce29389f8e9e1ed6
SHA25699a79fb55898e286e0ff54a3b1e58767aeed877ad63a1fb44b2db2af0f2d11b6
SHA5122eaa2ccd1df2b7eff34ed7d052855826f20335025fa6078959447b5d060344616643ae8c9c5585f3494d4f01c158e895607d382a0b9a28f0f68c35383aaa8237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0fef887a1ea5199f2e82acccf90468
SHA12b50f36f3ac4e18636429f31cc1a7ef9422c35a2
SHA256f375b01f32e856abb7a287d601261e54deedc6a09fe281387a62d47eb10fa623
SHA512fa4a2600f48d95e00006460b00c267b9830735d1ace821db68cc036f3c5bdc237e1eb25a02a736a06377fcb2f2661e8d75bf8e8db42c2befed8247a4f5eab8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566858549f43f78a0b4e3a14a09664e4
SHA19aaf23860dee4d221146c9b4fad21679972779a5
SHA25617f31a15c1684310012de929c8bdefe6dbcac5f824931749416f6cb3790b8835
SHA5121712983a456e41ab9fc964c6fa6c64772e0c04cdf6c969b8ee218d74be9b5791ed08060e3186aea0ee960161ebda38bedf917bd0dd2cdf46a2bbd4cf19f17bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e018f8f221316c8c3532cdb9217e1e
SHA1449718e5320c006031a5abbc52129f00a3c3ea5b
SHA2566368631bfd0fb6f88d1cce21421af9c8c5524d2a0a6128f2253397c76c034696
SHA512434659285983606cf31edf52777aeb4ac1f5994b1f0a2a9aabd8b2135cee43c552d7b691cb34c07d69c085978628ddaba61d6e46b1198e4af324d7bdf0d6c4ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f736308cab27d4b0089875812504b1a3
SHA17f10a16f674376af72395fc6f39eb49da7bf0f2f
SHA2560802f345833651733e7fa69794dca16315bbced05b570233b5676e54088ab778
SHA5126c45993ed362bae3d673350fd9998bcdccc0b5f5f288ce211729542105ba6b56d8519578a88d9be2bd647ec8d735acb33c523e7079d3aeb59a121969f402e538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd14619ac0b896f28f9a49087f9ecbce
SHA1248b8bdbe4ae0286612b81654ebbdaa2763f5329
SHA25637e51e09067e2b387bd4880391f9bbd1b157fa4531a4a898b8e2b1aa901ca0f1
SHA512318875c06f45179a656c435e9c19e59a36ce9b4073e87747cebdd704c9b6498386382946f2a93f8fbf2a2bcd984d5c10602d12716fc5271589c9fb52c89c07f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54ae5396db0a1ab8a0d87f6ff13356a
SHA1e0f7a876c8d156f6789f9bea8c05d5243b53fa28
SHA2567ed1a6c6624409e7c3e74060028d3ee345a48ddddc92b40675f5545469e1829b
SHA512ce19a3075c9e97fd7892ef1ddf2326ae4c7c658d1aaa058f3cbe532faf5462fa6e6d44d77fdb9f6a4ecb7f0ef08a45c8cc81bcceabffe1f7c68e7a385e41814c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a93d89eca415a1380057ff64af4652b
SHA11f462285ed165a5dae6c0128f3f6a90a923e5659
SHA25617c291630bcc2f8dd9d00397960d9e30bc9ae0d9a5826a993e02443ef690edc1
SHA512936b9dcd0b1416a6ed9136025484d16541d042a801932f8e05fe2df6551f602588a63899673d8ec6aa89aa6a76ea599b480cf7d9f34aa1e4b22786b31b8c79cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771d3e1d799fdd538e734d37c86eec2a
SHA17c3b12d0e87ff497f20d9452b869e9ca37854a8f
SHA256014af9d1fd7a55bf7c0e0df6aced788bb35025ad99a7c38d17487157d76d81a5
SHA5128b2ed864aaa9322659438591ecdd762decd7f0cf2fa322de2910fa9ec18319005c143aa1f6e71b31f99f1ebc4ffa34012a075cf784d1008715e2de0b62d2e0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56628aa7bfad593ec7ff7497c04e6c348
SHA1c59c7c39ebe57e07e5c2e481d0fc0bb242ed1a4b
SHA2567ba1bd345b7a66091ef733c70e77d7299f67b2a3b378febe5edb497526129d83
SHA512c4593c7b4e4b0ed7ae26650236c3ea15a4b46beec4e89a891baaa202140f039eb8c5a08dcb4e89c1995ccc365b886f7f1539c78168f2b771b1bc5446ba25154a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363230b3d0c74c35a78eac7a783c466a
SHA16088b0382ff402210e158573d1e1dd43f2ef8e1c
SHA256c31b0d645a1b5a2c072fb83d578247e618b9a4a72f61a57e73f2942708fe3be3
SHA5122a748dca85bdb80e7564266fd43fbe808c4ba8560c5b7902c5f526d6f56ebde08bc2495e06c68830fba52a4e2d9a74bb093da031acd45c6528445f625fce2006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112fb7db84bfd39bbb8ff0abd717599e
SHA17ac8926f1c61f3db27bf1ce98c780f10ea9ff3af
SHA256990873da28ec80d4c50d9cb9e4c8e4f465844c88b0734032249f97548bcd468b
SHA51296472522fb9ddadbfad48e8d6caecb18d2c104916633217583f87cff53c9fed6af5a94ef6a3905f79f9e224a952246c5ed967fc74cd2709d8f776327413bc1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cca4b5258763fc6ef9ad914a506343e
SHA13fa4821969c1c708d26745662e1e2cf1443bb23f
SHA2560c967a5ade38e07893ea70100ea1294ac26afe176e5734b3f260b12cb6925831
SHA51291fc7ff7ee9e852a6a02963b2314152d91389d07204cf714f6de6e709afdc1a94afec63c076bd5b966128b5f0daf9af747ef967607703178ecbe9faac4aa103e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b