Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
884d44d6d16e59bf236ccb67e94a3e13_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
884d44d6d16e59bf236ccb67e94a3e13_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
884d44d6d16e59bf236ccb67e94a3e13_JaffaCakes118.html
-
Size
463KB
-
MD5
884d44d6d16e59bf236ccb67e94a3e13
-
SHA1
32de428c0ab17617df9fd33c6968eb8776a691e9
-
SHA256
b3b228940c7531d918335d2cc7671abdbbdc6963ec868aa6f973c96b66e9ff3f
-
SHA512
9308304f2eff9b0be8472c186493687e3df186ae5d46075bc868a40a603c31c31f5668126f9852d984237b97ee8271d4f7ed172ea9497c8b8e74b20c530495ab
-
SSDEEP
6144:SJsMYod+X3oI+Y2sMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:u5d+X3C5d+X355d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423350377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c823fb9bb3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0128445bfd0ba4fa03d86032add62d700000000020000000000106600000001000020000000b013f205946d979df948025e32a76ba26e844884580c15ef864436206912f1c2000000000e8000000002000020000000413ef6fecbe11191d2954a24cbe61b82f4f9943f53caadeae9435c1dd938d54590000000c795bf9f8ce027d1d6d7c8229054d47cfecf81cdaf86737d9c6f38a4822805d0e02dfdc461fb7dbc2e8bf0be465ef6cc2c421832ecfd1204c0a1f6087e148a340d897aa40578f2a25847dcbf862ac94d147217697bb227e5a18181a9b519e2719d340a3ee54bc2a0d13d5738a4d3e4b546a6cc9b5e534660b64df66a5075bd7fba745bb73b83716868638fd9176af2d140000000d7cc9f356918953cc27ccd41d1bbbff3035a79eaaedfc12b7f1b3cf600023070a0f85b47cee9aac43aa777d0473057fb05a7bb90c39eb8e6b78a04a11db5ddb2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0128445bfd0ba4fa03d86032add62d7000000000200000000001066000000010000200000003b6cb94d5f3258e819f412c02774c86edf016f849ed243319aa867cf63059214000000000e800000000200002000000040606fd58c91a392c9a46025a231e08b7d4833770b3b285a1cdf74ef5ea80df120000000f7d50e8f9d7299e42b2acad8a689f88b584c71bb3a82adedbeaa3548bfd43e6240000000fc64d9e0b65cc5064f8ec86a399be988afbe4c3d103d25c277284f3bf44190e8523176675413a4b96ce948f3487142257b4fdc5affda83b12a063e81ce2ffb9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{229AEE51-1F8F-11EF-9034-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 912 iexplore.exe 912 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 912 wrote to memory of 1788 912 iexplore.exe 28 PID 912 wrote to memory of 1788 912 iexplore.exe 28 PID 912 wrote to memory of 1788 912 iexplore.exe 28 PID 912 wrote to memory of 1788 912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\884d44d6d16e59bf236ccb67e94a3e13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef1eb25f71b85ec2d7a0bb1b9c171dc
SHA171b44b6650d0e0b6e63bb40ea1115b1fa3d6dd5b
SHA2561ab55275e8e2b1d22746a3454ad8ae5f3b482fe3db5b146b71b8709207c2756a
SHA5124054fbf1b9fba59c55f1965a101de3c7d25b9046f39268f7a0ec36582531364e33f9303cd17c32663a448d0e967608c6b06648a946362510a7ed6be172837fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9a00c5ea78d2b63165b187a4dbf584
SHA139046d706b5ab2a7b81cda25a00ff32a7582ef49
SHA256d925fbc21f369d521d7cbd95c1961e5f6f20a18c5750772bd4bf86e98a4b3272
SHA512b87a2638264e5907ee05c144b291ccd76786aefa23c1209d30479b94fce950c4a5a6129e6e2ed51e0926d78b8f9e5fd1511a499fa40e30c5e2213cfb86e402a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be8821fbabf8971fa4a01f7b2d89f62
SHA1481c4dd4d00ef6d93f58f914054f9c51857865b5
SHA25663a3bb0c4ebfdb0cf9b20839c2b6b64bbcb3ba395e95a06e06462de114dd7403
SHA5122949a8e00af1edc14f6a92e449367d42c94208856fbb7166bf44381077ebf448e2dd11129941f6633d4dc65e4ebd18073c4b4b125877578fd13cf74d5abf934b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c703055c2c60039dd1a3090620209ce9
SHA1d49479007d280d4b92f29e579346113310fd3faf
SHA2563ce682036f0b76f63839e67ad5901f8581c8744572b0bf2e8e516f3e450cce2a
SHA512dee50e69a064ee8cba5c2d5c801d78e6a9de77cd3e5fbc6f393583d696771e4261f8e5e0e1b71e128edee5ed74268497224e22ae762cfdfb4f7b0504236c458d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c582a6d9f530037fd8bd7cf59fab8e4d
SHA1dc8f29fa6734293f088e7a140ef657c5393f750e
SHA256ccea2bdede3cb26af3557568f1e7da194f81fcf9c4777737d1e01b620373f859
SHA51245711ed7e469d525d1491b832c2674d9101578ab07c090f0cd0e3a148f730400d293a4f0e5b7d34e1345042117bec21f57486bd674f3ea5fcfa6ba277865e559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309611aaa2e768541f53dd79abc8d833
SHA17e0a70d865de7a04736b0a3927e524cf0013c1a3
SHA256485b84a04554b20afda6a885c29ebecf07072a247882e4f2f697dc6a9ef91499
SHA512efb94b3ef11859fa6c59f6cc74b13ca31983d91383db231e099c3c9cd68df2230a30ab8adcefe53c7ffac6753e70fdd643da0fa5c3edb8f208791cc77a3d42c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da9c9469e802970d02c0f69348b8382
SHA1f1ae332faf0e9298fe9c3225685a406f0c0b0d29
SHA256ed2e1cb4fa8efab61c1a0cc62ce4d7f07238de21c2e905bcf8cf19032f026a4b
SHA512478083132498c127b60913fb074fb93452577639927d6cfa5013b28218a9c486c8eb5d476533b3262ded8879a3b98d66a199aef60497ed7212722753b2dbfdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759c1ab4b810593805543e78adce64d9
SHA1a52c2ac8a451058784c292142861f207803b6471
SHA25662b203e11bfc2a59e6438ed421e03f5d64a4ebf8ccccf2674803924445ae83c2
SHA5125f18163406d2acac1df54f5ae1ad02957cfc02111e2ab18eaeac3f1e7f4d0086b2202fcc60dc5ddf1a8b16f907d57a672934ae8e323062504613385c604e6054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896c07a7623a1ab5a45d32132d99c0f7
SHA16df0c09f0cedd266941f575384eb9c3bdf5814cb
SHA25669441e52a9161db92b9e5b32c6c2e1d68ded831bdd1225dfd9a6dcced2e7411d
SHA512faad3b6e5617540b394a20e70618e948b0b2ddcd41b899c619200a88ebe506a2e62ab1f1501026222086f8f5667dbf448a6ca2b70a5d149ab8e2abfefc44ec59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e05621158d2c92bee314c9c49cf6d860
SHA181da5039d424cdb03901b8c7a445b0c1e96b7baf
SHA2560c8ac25374e8c1c15456468c81af79e3c726a0c4c1685853b5edd3ba573a9ad4
SHA5122d80180e959f254a38190fc957fafb7e64bdad87873cdc31b35f177667d3faba7fddf6b17d86ffbdcd98778b3389353fc2b7e354875a30018e95deb69fc805e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1a527d4cbf6d98052217f807eb31b6
SHA11850723e20ec6c312e55a9deff94df22c8efbfe2
SHA256a925ae107246f5a656810b7e11f34369e59f4171864266358a2ee41a3c74b9ad
SHA512bb5797618e650aa250e162a619642de4a0dcdd3468d547555b9a5c7bd6a0705efa53f7fc20da17a3669d8ace704b588a8a91ce77af1859e7b8368883b961c925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564570e26a564b1832447ad0cdd6e5de2
SHA162fd349d72a260ac2d60e6a94d5f23f6cd7c6439
SHA256bca11ae3140499d2294d85c97b01640be33b77c392cd5f5c51df4b82624e88a5
SHA5129147ea72044ac6e96c62f7cf6948ad87b80833e16fe08b24746f6348e9650c8d4b866459e393e05097d838e48c00cef2f31fea7ba4874063a297b7028d6eb99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793ad0c5549d66b77160aab00e7d0542
SHA10594d9662a04de90342ea638be2f9dfae853918f
SHA25673598fad787dbdc9acaa59cabbbab8cdc777a3908e9a4e17b36ccf447e512c76
SHA51227c4facc85c9ab6bee712b348c64cafefc08167d05ce76d161e53386eecd24c5efe2f3666b032888d0e9e694deecaf00886f9dcb6265e928d9dc2b1cfbdc778b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbe3f4436bd25dfee0828ba47ba81ee
SHA12a371c634ba59544756b3bb35ec310095f84aa97
SHA256f79bd3f1861c2cfdbcc56d442cd47bfb9bdc8dfdb7341294a184c0f21b2fe7ed
SHA512585f236375b411e7efbfc6d254bafe7b015a0ca2b252b5258073eb7d65bff8a857a413a40bcdc71366ebfffbb72fdbec99aef9c3a29245ff7aeafd68e8f0b56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f617ead63bb3c5928c265a9b222bb382
SHA153fcfc9427f76c114cd8ff278380eebb5c61333f
SHA256a1e994c6c3f7ae222a8c0f93aa3071c0467b6d1849e411a05e2f04de835ef8e6
SHA512b60fe2b317b20bacd1d1658e8a30fae4daa1b154a3816ff63c54c39216d3f118137d50c3ff3dbb1eecea73fe848bce27ca8b4c2b130c22695ea6c92bfd39fab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63dad5c7d4d0a99416f17944502e6bb
SHA148883808f5fa41f3e651753c077b86ba76ad74bb
SHA2567bc695d8c99527f38fc984e405538dac61738fb452b8f8bf617a3a09fbf481b5
SHA5129250e08f4f916fc3b28b263d19b948ded29487df3d89dedc20ed8b0930c47c377eda498d4dd695fea2d8e1cfd3a4204b28b792ca3fff0cc375481ca2f9a7b029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd5c349825f94d1a4836c2c18627c97
SHA19c5422673324fb5c7c5d076c58c7d2789a856bcd
SHA25609af650e700e59ae0bd0bcfc2fd358941831d0d9b708033ac93d8215fb7fb5f1
SHA5125651abeaa1c04064004b55ab14fcf924e86daa73e27b46b5a5b881d68d7fefd6512a7b99c3721de06385e6562a59f22bda75a672c0d087f7f6cea792fbb06c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba95eb044f171c7d48c3707235ecbcc0
SHA1a5b9864f0c3cf590d88994b8df4b519e4e1aa9e4
SHA25656c017baaa81958912915a290aabcf1933f3d8961a29d4afe529d5eb75eef957
SHA512f1e7fa7b921f08ebd1082d91de7d16557bf72e06294b8d4280c90a9cd55d90c825af110bbdb62bedf0073d042ffd73de657f3546162c96bdc6e48c4dcb51d3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed4b15a45b605331a38e2c90c7b4c04
SHA1258a34fe27a632c20d43182b98ca55b3c449d1dd
SHA2565d3b9c785019181b5fcce97fd6e69c3e2073e2740684b75d7b00bb419f297802
SHA5127c5e37a79bf4e6c0edbc1e5a29267fa67f519510718c127eb18e1b017841eeb89063852ff9ba715a142fc8e5a5e89e9c2bdc70e08281647236df9f6a1d50fefc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b