Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
8b84c5bcac5a074d1b0446b4a5b59308_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8b84c5bcac5a074d1b0446b4a5b59308_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b84c5bcac5a074d1b0446b4a5b59308_JaffaCakes118.html
-
Size
129KB
-
MD5
8b84c5bcac5a074d1b0446b4a5b59308
-
SHA1
d30329f9e209d579d8adb42763ffe02271bf9d80
-
SHA256
1eca410cfb00ef6b7ba80b7fbb59e23e9aa866cdc93aa0646f2efdd92b069e18
-
SHA512
7f5a1caa1ced24a67e730cc4b9a0dd0f204362104cab626258782b242766f403ac71d10999c35edb439a2093c2cf4db5676b3b63da17b08dc9c74d380e65033c
-
SSDEEP
1536:3yyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:3yyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c97d53cf03f884fb339f2d03af98ead0000000002000000000010660000000100002000000039689e0000f722379db8d435d8b24f16bba89bfa5fd2a011cbe346cf3b4ea225000000000e8000000002000020000000641f869a3129289938a3c5b3336225034f891f3ce7c640a80d0a2ccbfad19dd32000000036464bed705dbf6066f47aaf605275a70c9291dea7f65cfc6eb67284bb770921400000009c6ef567dfc592e741cedfd55df68312c672d9cd32a9f9169d60ebda370b0514f1e2a293a07457b9367cc60e93e9544a15c289891302c853d4494ffec3a8450b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423432038" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44632E81-204D-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05709195ab4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2492 2912 iexplore.exe 28 PID 2912 wrote to memory of 2492 2912 iexplore.exe 28 PID 2912 wrote to memory of 2492 2912 iexplore.exe 28 PID 2912 wrote to memory of 2492 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b84c5bcac5a074d1b0446b4a5b59308_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5eb893fb85cdb71cfd7cb7e8bc25b16
SHA108b58209251e74df9e27a087a9722c15d8803ad3
SHA2562e5c397159db8e8dd25b1f5e6aa7e75fe23b8326fa518720fde378a1526dd1e7
SHA5121dea4fe7005e572ad30515ff7b7ded2d52098f402d8d0530f0dbad7672dc4e59c1e8c17b583a4176d5946edb5d34f7edc008b5ed16cce233c37ad2cd92a78e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506313a27727f4ffda7b5a8f4d532639
SHA13db64240150a88ba89f76ac2fada4b35bcc486fb
SHA25638802efaf6fbc882b2b2f17d020abac4be9aed462169129a16ddb743f30de4a5
SHA51249858e72f448868cbf6c3535178f91a1cbce25a4af6c74ce5d8d1c65e87d7c97eff14872daa1760ac233bd73f97781d3a70bfd1e3daf23f28ac0dcd71f92e0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc935501f2a8c65ddbdc8bbf0ce838e7
SHA182860a7a0cb0b864f30b48ba8d5c690891bba837
SHA256b2788ae6979da7567429dbdf159a271942a8a890f8ce2272f6a0955d8eab6302
SHA51226ff5cc6c220463a8a7737186d5cb25e8184066e1ce33632f32678d59872781797056df920dd8a45930f2b55d2f95e6bf345f101bf5e8e1baf282b05b2d2a215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469dd2fb85230563a975282d32db5a6b
SHA19a91cfd1b110f0f8d79209bfd34dd24edaf540a9
SHA2567d601a174c1ac1a378aa77896fe24e70475874a4ca6fe8961fa0a98aaf45e35e
SHA512b42c3d213747b59579873ba23e06a82db46d6d4a9214c73791ec151560cec288561c3c6f31d3dcfd83752d380c0900104fa2129fc7cf1297c08e42e416ac8b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb84e9fbbec4d8e4ac477beb7c456cd
SHA16eb9a9f20fbdc590113283e4e5d8099525784681
SHA256e0534ce6dab42d3e1d2a414286277c3658c43113d967971cee060a254bb4fe2a
SHA51277159fc0f4b3dde4091a097afe236654eb19bf4f17dcd3d735f4f97b9bb39edf9868038f5f0fd3c734ebcab8eae4b4aa3b27f74aa23028cfb64d4735d4d2796c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a110817e196fe861ce70d0db4a72474
SHA15303bc95c038737dc6a21019a992fb837f8b774b
SHA256df12a0eae7598c101ec890cc3f1b9a2b329839516e2184317f474f353e2375ba
SHA5126ebefd18267c553bad0df6d4f8e710c79641b1a3fde3a90f580faddedc71e08d6fb72fd48b223bc2fa58459ec41d43c548d660a6b035aaaa1f2f1d0cf57bddc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b543ddbd15291482de2a2fcea613960
SHA1b83686dec43125d6ddebae0d92e21fee700abb02
SHA256a41f311bb4b92f537c078d49cc636ba3255325e6ede4f5b96da691a7d4d9d3e7
SHA5126dafa5ae62b0ee45ddb1d2e82a63136a7523e1adc8746d4c59843081717beb4ddcfdc8d8329d9e9ea6ac5dc1371d720acb2b012c0676ec1edd102e6194116ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596a54d7784120a21f8d7e0415eb8bd1
SHA13cbad38901bbec9fe0dff7703807ee231d349ee9
SHA256e64c9f15891e37953637589fe0c42a85196bc96a7e8731b7286219fb0dc6a858
SHA5122d928144b394ee94b886833683a858cfc4bb8a01f558e168cd086e71bb19c64fc3cd6e3bb3704ef90e126870b8549a6faf008426fc67532e9173e5ff49b472ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565469d72c0d3a4923cc62758c007f920
SHA18c2e73806645abf292073d0886db924a0fc0b23c
SHA256760427bd903e74c2e0a2fd1ac85d6a223bb2729621da7944d3e3b1461fdedb16
SHA512c07f09395308c11c46c736e18c93a3675aa6e2958a89aa8519f1b91ba26dd7e860d2ff0059468fed464b1c335cba838048856799209394102227a627e887c048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b064d4e0f409d95e75734e0428a1bf27
SHA16a9f3ba53f2305d8ce37bb482144aaadb14fb0c8
SHA256ab23d6ca77d27d1a48cac5bb01a9bda9157e08fec1433298ddf0240bf260960b
SHA512a65b05714899c513ae4e4d733049bd4e8a5bc2790bd3ffd9caa0f533200ff98c0a9fdff6301bbb6dd616cd2534cf8888973d6d9023801305d87ba2f6a606046f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d395d53f396db91343f3f398de799055
SHA125cd579c6fe7c40f527800ed96f82a3e7511b0ef
SHA2566b00463aac7d7602a589da48c7ea902413b3b03aca76f5101db4acd0a4f78184
SHA512ea232e6965d4c0065a7f26209411caeb07985700e80e75ee436b84dc513c515bb733384fa1ddf248c3c4edd3801e84c569f17b710dcd2d7eea6ff82fb2000331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b231b94af7705972434d197be4bd8042
SHA167c99cd667bd5b82035c4106ba8188ff5a47dd7e
SHA256b6b9f35efd9e545da3ae954edc980a5aa7497712914fb868255dad43cb0c08c2
SHA5122d64b1608d39754db846272a00946e04334ee901f48eb0061b387871a02252619eb34cee40425d3fa105fbd3d86c3fc8731c3d6f518711e129c5067c200b5d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea5054853ea3862f0cedb822d6066b7
SHA1871d49d0f0ddee2b0054030de19e287ed7653998
SHA25668a5f2516ee46a68024ab97f2fb972e3bda4fca0bc009e3e6d9012ca5c04fab0
SHA512dbb9ceecb55322037ddba51732ca1f6b2bf4a0681fced3cad0f87ebfe7a1d6e9aebbf73a53235de2bc1d36b6739a679a832c2a02af5d1e6b4ffa6fd30f1d0195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6488c2583aacb738702aba4ac95279f
SHA1b25b376a1163cd65b7552335b09e743d250d35a3
SHA256e63cf06b8a3e32c58ac90ef71cfdafc925a07032c312c33bf7a4211f5adb2ff0
SHA51288b73d3402065541cf9a05e5b5a95036df7194aa055da3d53f6274624591f9a166d97a849cfbe43616c0b952bc332af2e9e0d6ba0beacc43a10c7844b33819d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521cbfa0598de53e6e303547fba1edfb1
SHA178786f86fbeb6dfbcf2651acf918ba5c4161d5f6
SHA25606b8b173786f9c6381be86348f202a68524aaf1d5e74a88bfbe20f64dfc27943
SHA51236fa7cb08db132117f6fcf7a05db6b79649b389063e3b40dc695894b870b481f0c74dad7456d0d6848c195c6ec607f1e75998cc0cec5e8910c4fd8176dc3a04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c968aa01acc9526caf8675cb00d61564
SHA16b507df1d964bc4019f934d390d153ddee03ea14
SHA256c180897b8e239aca34782bcef1fbf0710ae3945ad7a30c694a33d84cca8c94a0
SHA5124f23dd7b951771e8361d232bdc2e33d4a3a237584cd17b87e21d837c3d9aa10432f3d01f713bff1f1a9a2cc6f0989f44b1a3cc497efae1037d450251f2cd2370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3b51d8c920b9f6a3fb75aaceaff825
SHA168962feff193481d4399d797d7b9a5d8aeb6cde7
SHA25672b6da87a03a1422acec2f87535c89a97a8672a218f28ed2abc385ef755f61d3
SHA5120872ff7e8ef4db8c1ea3c9b3a73981679f229de3c2406d44ce8881bc0e4b94220a88bc0a9e80ee00d3f92e0d54263d0959623a8950d1006ddadd484fefadbb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae2530f9d2ef3f5bd39337f869ac1ad
SHA11b9feca7db1370fdec27035ccbf16053c0fa4318
SHA256043a495a57eafee0c2cb1aebf99f8ef4202433c61ccd27ac9976d8994dfbef0f
SHA512d2e4d8b78c290af9b1cccd01818663206584c9369702f1ae235a9ca36b6dcdd3bd96a13e82f5beb77a75f8cc652a6bac14818bfc40006edee11b6ec544839bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8717a6de06de4d1f89e3cb8d68f770
SHA14267959e87b8f09c33509c986aa5b1fd9367c849
SHA2565771e6c8467ad8ed7ff31f88c58cb16e0c03e6bde3034480698f9b72d1fed441
SHA51247d8ecd056d11323bee3fb86aed68780cde0a55eb3ef54be16ce2ab15baf49c99664787e01751b68609900900b35117f470915942e1cd0f77151ab2dd71a5274
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b