Analysis
-
max time kernel
65s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
936e42405c371bb83187eb92136ce713_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
936e42405c371bb83187eb92136ce713_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
936e42405c371bb83187eb92136ce713_JaffaCakes118.html
-
Size
19KB
-
MD5
936e42405c371bb83187eb92136ce713
-
SHA1
ac0b583b22c96a1a592f3f5e9626f2c5eef80f56
-
SHA256
09244eea03853448e26fe34145246599cf6f7932f50894d373c0ebbe8588cd0c
-
SHA512
d3cb82af1fe9acfb074493b3815e7db44befedb755184df5fd98c39eaeab11d319eecb16fb9ad0307af1bb0a65f56dfd88899cb6b50e4184d31aa01203d0973c
-
SSDEEP
384:zi9KhgESnVBD8cYQ3RgwFia/emLxXucfIk9xhe3zVc9ufbxZ:ziOSngc73ywFimQOIk9ejquDxZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00debdc529b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0A0B7A1-221C-11EF-A1BA-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e83bb68d131da81e4f40eb573cd93b1754e53e72af50159b384338cd4920a47e000000000e8000000002000020000000f73abb4f3135f2994e1934a873c5ed9ae02a729144abb6675151ad803669cb1520000000395c55d12f51b75e60cd3604daa31fd322061187ddd86f10f87b56725e21eba240000000adee7b561f41612fcec6207ea55ead0fb0eda54d753352929e81d28ee089aa6fe41d90a30a850e40cd93ae85596cc557b07aff93264d0d38690d41f0873bdd92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2716 2916 iexplore.exe 28 PID 2916 wrote to memory of 2716 2916 iexplore.exe 28 PID 2916 wrote to memory of 2716 2916 iexplore.exe 28 PID 2916 wrote to memory of 2716 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\936e42405c371bb83187eb92136ce713_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54e4ad6abfccf3566ffe4e928383f4b62
SHA12ab81959d40145efe8fbdf9cebc73bffd8793619
SHA256a4556c2feb8b743f68393645e435297724e38639032b0c8d3e216ad8efda0cc4
SHA51217a21a42afd453c6c2acbcff3b09c8215bc8ebef7f72493001c37ffedab59b7136dc6b0999d8427919b758c9a10d59cad0c604bcf2bc67b9b14ca59af1db68b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b9bed0fe5528b21e834e75a7da0eeb
SHA1ce7051e082215886cca6df110bbaf8d79ae8e184
SHA256e12747771eb022947494060833abd5d1f4b11b6839f9e300bec859462ef575bc
SHA512ce3eacb58ecfad6727a1685c9c334f690d48abc375be8b27733446954ba5da7f4192d072da9780271f396cd429da7ff452607cf463c4c384ab2d66fca61902b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4db755855810b978a111d5dea34d969
SHA1da8856a8cd2907ad65f3790ec699615827472614
SHA25621f5260670d120967edb75d7a5d8c3e752514f2e4e1f8a44366785cee24ab50b
SHA51241a821e0f12942037c3739c9f5d13d9337feb430eab38c2207cfdf49a7c78be8fbaebf5a256e5857f6eb2e493d6df9e8977f3750ad67bd69fb4b7637dfeee5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53235f77a573d7097931d0c702634b447
SHA12f8557075a7d318ab735db7ad0a04e15173f1c30
SHA256919739de99d923212a900b106064102bfdde64c7d625034c72c48f132a9416ee
SHA512a374e17ce051a5fa69527b578f5e6b1f7ae2ce826b528abad2f59a8b2ea99b7f0f1f0675b131f27542fd46477fa043e59ce7631c62067d30eda255a7bc297a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f94bb36c527bf6e70c027031ed0c1b
SHA1962e7ed73ac34d18646b7e39142bc1443e242ffd
SHA256deff03df49e682226daf2b1430ae5e3d1cf896f9f2f14b0f0e123a682ad9c076
SHA5125d078f47d11d8051ce76d36f6bb03bc12d20b1826c363b68bef056a55c30257dfb3d76c2b3abb9ac7eb1d136da11cf5f4d7664da7c79c26094517834c9432868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddef979cb83ce6b6239a584be0212b6
SHA14c0c0c8697aa907f313462cd398cd34b1b37224d
SHA2561b02452bbb7b8fe11159f3bbfd70a625f0a46e008b7f8c3aebe3c7e18f96fecd
SHA51287caae93e66b56d21961c747ccc537c49d96818bc059439905215e5357b4e4e47343a17212e99edd990324bd509cfa44cca957d568c050ec3793a770cb37a347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6f06d2e02288688dad95d00803ad18
SHA190a76d3852699bc1c90c1d09a47efed99f08e71f
SHA256a9a9888e612a4af804f6c14b227541b011bcb1cc56b44998952f1fa6f99d00ab
SHA5122d8aae1a17a138eff913485f5af35fc8d16ea27fd7eedd66c11ce8fa264aeee0b6d8caf28d3c425dd2a7e3df9c75660089930a22156330f628c31dc60e78fbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2e57514ebb8320cdcd704a0c31ff70
SHA194c0dd30ed3ec737ab65077571f16f88ff4c6b29
SHA2569e8a453b4b3275551a713044d0859179a15e7923a30729ed1f4d403972048b6a
SHA5121fad05f452f2c43c4256883a47e346305ac79f3266ea34056c8030d73865c8e7f74683d87857eadf0866d83bd53332ca0efa857550ae58f104691b9545b2f697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523be7c2086e1cb484c6d970dd341a512
SHA1f38e52f18d18bb353450b55ba52ae5e3fe692d20
SHA256067203e805a2153dbb5414a257daa148833fa07622ccb1a788a4024ca7372fd7
SHA51260299a7dd9a43b1a3da71f1351a7977570250003ede98edf1c313bf64dccddf0112776e030765ca56fc71ad3b44f73a9196180d2173c9afa9910be79eeaaef92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d720b31f70156fcc7e57c57045477f
SHA1d8fcc0ae976a839e02b90346befc3a02f2d7a861
SHA25619798eba425feee8ce75d8a2b28bbfa105116b9b989d0c0d62af61c20e099cab
SHA512469c5113dd286ec0b573750aec3206956b9a2c5e09b9d10dc0113eec3f771a4f1b6d50b274a861159223496124abdc73e672d804d39c51649e0ca68338f355d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b4bbb9fe5fbec77a2a78ba28952982
SHA1d8f5956812f43e4a552ae331530ac384616c4522
SHA256a7981619e9b7fc1b011ab6aaa1369d0584d80ec3bf6242be89a34fa4bd7d0f60
SHA512b4d889a2223c52949db85817fdf5c1f10992df0447bc630bebfa89fc50aca77b08b00ec6ad5d0450c8d3ba99d78575100762dbd71aaca7c3fd3b22eb0e10365e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b284427f76e6989dec47ec7d67bc62d7
SHA1d3447c66cb75f4fafec8d9b624f9e3b8276222f1
SHA25653dc912325516c3a91663d3a66862b2d1b0ccf6c5132d89517a92231ddec26b3
SHA512869469b6ed538b9c7fbea290fb3bbb5f70e4005ec5d561de8d5752653f6b9dd4e8c87f8cd4a15a12b92a92fb6241117541d1468e38d0a08253c0529ea2d9bbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505356e3656c1195b5d927fd42a42d772
SHA13b8a7382e9205340fbee35213ab2aa4915bdd7d4
SHA25618bec52ec680a0cc871680b3f27e3791e65d53c6ce4642d87a5b988ddd6e7caf
SHA51224a2461240c185be4b1ac56644d0f884882fa3b6f24dea4610b8e98d30368dacbf4413ede21ff69c648f9eac3c6180cac09938147dc9fdf9e9be24ffa621e289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9f6ae8d625310551e8073a63ed6c20
SHA181d0dbdbf053d970ec136d365eed794a7d4b9349
SHA256f71a7d5334d71524b46f2f6838da7515510795948f70e0fe309f8a2b963e0067
SHA512587a4558581f3d3723e2b85bbc30398b37ee4f4c84dc7ff6dec11c9b784726b0f01bbbe597b09a3168c9e7035ae7040988704335f3c8b06b46c97994e3c5d150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2180f4586c34955e6699786b736903
SHA1cc0c3840a7128b5caca818a9c3446799ef001e92
SHA2565d6bc82789f8504c4098cbeb6f96c0ee26e1dde56b81ed948a686172f63434c5
SHA512b0083fb0f0fe78a336a42cc213e56dd29dc29b849757c94cb22c2d13a963c26d7e4b995830612c451fda5b94c2f215bec7bca55ade8aac76e9812a45d5cf20fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc81796b76e57d7f9d9d3f7fc5528b46
SHA1d85496f815db195c689c6c6c3f62006b61296c6e
SHA25688e094d4ad87f2aaa2dc862ead776740ac1dfa41e89ca39b158ee73ed38b07c9
SHA5126cef1f5d35cd5f8df00ab548594d0350bbf1127ebc9692b409928e7475a449f5c6978add4e981b158fb5688d9093fc36718851f18cb0546bcd59a39a137d6fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda9d7b9120dd3605306a8d2007e3f0a
SHA19e6c2abdd011a52aefd43b246d55995a91f42d5e
SHA256013b12e003cfd82a9ca6791b2fcaa78b28fa1c9aaadac242cf01bff949961aa2
SHA51205c210cf369fa92425b1b2766b42af64e7ea77a0ecb81cef67a10a279c14275345cbee3615a19d0f7cde12cb8d56142057bb7475814294c915556a6369edf026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5dbe2f12e6160e71accd22746cf8c01
SHA1dc8fb7de8d60c32e667604dda9ee43cf6132d4a8
SHA25684dbcdc03d3b8a0608095cdee3712459293eea7cc4edd763e2fca97085290a44
SHA51234be314aa82ba94b0d79e914d95ff9ac26318abef338b3824844eae4bb0e51ca2fd257c85464242000fcf54b5b52fd22724366a9fa6b2f04dea082edaed884f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a215c52453ec6b5be0f2fa42f6b0e41a
SHA1fffb93c29f56799ef4675385c247a2c086dd86c2
SHA25679ba82056888f4c330024a540ca141229cd5fb6a3c6e1efb3db5a33e4d2dfa4b
SHA512924e874b97f5bf865cd0bb627e59705abad5229979a32becc0169fbc803b296a4a4b377aafb0b011c64df61072a086b2e8245d09902c1b3ee93db3d79e561705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d558aa6b85e64e26c451d557f5e5e3
SHA1aa92b56303797990c72b25a03ad2b8a7c766a440
SHA256af625163edb8f6142db86bd77e34018baaa68238692f66827880ce42a58e3756
SHA5128b1b793abbcb64c593e13f241b0f93a5d3086a4d830f3e762b883e4c5b72bd4b46b376101d89cec4ca867e349568022cba967ecef534d1953d5722de8659fd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD58e7d8d1816c305829758e1fb0d539a0f
SHA1e71031cb9b66949782ad3ae705f144b6217e945f
SHA2566709a68844aa1a1581345ed278a95b47e5aac500ff0296bb2be41f0c30fa0173
SHA5121200218465db756303121054ae8e0787263c252d98d7d6980f71d12e53c8e378e5677b0cac1a0e345a708eb94fcd2eb9c26f880678944a1fcb9108331c68046e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b