Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
9905edcd603c30a5a85dd5b1b7cf7463_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9905edcd603c30a5a85dd5b1b7cf7463_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
9905edcd603c30a5a85dd5b1b7cf7463_JaffaCakes118.html
-
Size
8KB
-
MD5
9905edcd603c30a5a85dd5b1b7cf7463
-
SHA1
1ab69862b867c564231276c2c99f2ce5e73a3b75
-
SHA256
9930f92ff312d98af9c652f02c48f8c621bbe2a67122e57e4351a4b124687018
-
SHA512
7cec4ac34eaceb227b15e41dd1fc90008f4496302b27e6e1248aae691d86d2911cb172e353351cac3847b8a7b05a6d6e849ff5c8d8992096dfd1a939c47ca3cf
-
SSDEEP
96:3UiHZT/fP7vQx/2VxPxbVxEeQg+6ZkmAmR/uQDglXVqM1yJxWDs2FyFVrT8roUMb:3Tzn7x/Qf02oU150nXPXMEuAz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ec7a707db7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c0dc37497c12a740a10afa7adbcf980e00000000020000000000106600000001000020000000c4f2896d657f1a9fef1d0c4363544cc2b200b251bc6a8f52e67f0cdc28984f4e000000000e8000000002000020000000cfddfe549a7c69401c5225e2aeedeaf28553d8786fa5a61a5c7f556c0532c0a82000000043e7dbee8b89ebf5a00c2c75da8caeb12e6e4c904306e2876a4f63d917a6809740000000bf7f0ed8b4fff803993822d361c67d960b86736bd3252cae376aedebeb93e32794157fc25652afe0faf19b7772870f2b628309d0db6f4382c71b3ee8578dccaa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423777070" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C0957B1-2370-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c0dc37497c12a740a10afa7adbcf980e0000000002000000000010660000000100002000000059b6eb274de0e652ab65ac9176a53003012bee7c48b846de248d2e5c7be7a203000000000e80000000020000200000003849a283a998976ba06f0919af95b047d289db50f182c70f5da1a8ae4346309f900000000f56d9e4f5c1fc3cb552d4354e29aa447448aecd5cc939abcc724d82dc2cfd5a7bd6dcfae53e91b6feb997316feaa4898b657d429779e683b5185a7c7ed78e3b14dea245942e73918d4c2ebd7a5325697a34a1435a327cc577a4567d6d166edc2ab4a6d12acb02aba3065d343bb64030503e0cccc780c0a4136f928ce3ad5375c66934e133c1a72ca2cdb22a98b03c1a4000000005ce6b555f4fb884abf4760cecdec381ebe72ccde3d3a451f3545924b1f224c042a9461caec843b832305a0bf397ed56d59f5e40b1e6ec4baeeab1c6cb175960 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2272 2248 iexplore.exe 28 PID 2248 wrote to memory of 2272 2248 iexplore.exe 28 PID 2248 wrote to memory of 2272 2248 iexplore.exe 28 PID 2248 wrote to memory of 2272 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9905edcd603c30a5a85dd5b1b7cf7463_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bca86c74a9f9c85e5566e1c0594b5d6
SHA1e670932d3a222b18debce94eccab57aec5ad1552
SHA256c7aa1ec49a0e276df9e676559bea8b675e95167e6b94f955920691d2ce07940a
SHA5120cd9789124453075fe34386b57aac36e33e1d3b3efcfac1900929404ecc338be48bdc184750b15ca17afc765a075427c6be4801094a52f2811a584ebc635febd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531371d3aeef832fd3f48ab9003a8a8c6
SHA149634fafaad6e6df6cb7bff545802140274b3b35
SHA256c68a5dd50c92d2fb5c34e6f6c8c0062efff13bb6c14436e85e1fd56791eb5d39
SHA5120f207909413337537e1a85c9150891a398ecd04039126f8335fe61d34eef02dc70d6e65854267ea8a31405bd1477ca7937e601942bad3bfa81c9077758db95aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f5cb9cfb851494c61c64d15b9bb457
SHA13a7bea4dd56ece7d9075c9b2d3ae552c0e9995cd
SHA256b47662d8bb1d0335bb680c9e1333f1874671e31b73b658c7e6fe49fa8ef0c788
SHA5127364f605d8f7ee77d5674d39642f7f2e4547dbe6af529688f4f057752eb8e61ac84adfe4af737c34265f9dbd71d7237fad6551930bf65b19faccb1f6ab47afae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edfc3ecff366fea6719f44e557f6df60
SHA171c9184a6ed04d9b19f79fba2f8fa40b44372634
SHA256302f3cd5b81c51631be432ddce5f7e1886123e00a24e90f3d24f598929951ba3
SHA5125e14a41e7ac7d4e1e96c24968afb485573d2282476cd8deb4013f199b7eb367de86be92b250f8c75fd0345166a9c818fcfe7a217c189db780826dec706dfa20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db33ca9190a0538af6e286eebc01a400
SHA1a2f1696d27857cfaaff43fdd4b19447a7781872f
SHA25671f27de5e503e7e90e1f7f9f1c1057a3c40cae482cc70dfa8b1ab2f3431c0d76
SHA512de5ffcd302bf8219345881dfef029c9f2d27832fb622cf2ab1d5037419bd1fb4f794182758cef26e062b57846646ffdb41c6c55c90425f31faf5d5e49590ad3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c928fc6080791173bf14e94c3eba831e
SHA12503fdffc68b72a81b4992a02c5b03512d8c6ffb
SHA256a4951041ccba8fe39f3fb70ffd3379299b5de1282ef296bb4c2a48a9b815d744
SHA5120f9b63b1427b490ae197c67944509b4b88226858fb30f16aae07db5f3b3c45d75a453727e6c6ca375e01607e32f56eb3dfa9a8909f2f947321fb1e69f02e8c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517edb3bd7db8f617e741bbfec22e10c2
SHA191267235babd3723e8b892839cea212015a68ca4
SHA256d07f1ffa983e8cc4565bb93473796ff39c382a0f5cb6b82436a9c09c015ca4a8
SHA5122ad724c0cf67b21422ba6ed58a399a3bc902586f3b6908a96447598e83ef904bc7818b15595e4bfbeccf4aa2e80e8bacce21d8af2490ce183b9985670d89b018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5551668714cec819fb193430d8b3143
SHA10468985689b7b135eef7436cb87802bdb70ff9bc
SHA2569f37512f97fbba1a24899369e40881e0a5eae07d3ea811bb44c2afd3489befa7
SHA512b90a6c327df5c5ff532e979160707249e806b66002f814024aa5f564247b1fc4b7f661c11b213ef3151e677d8bb1039368f8f731607d491c06057dcd5e5b397a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355947388aeb05f127177fea00c3962b
SHA1a954aca2cb2a8054aa25f05bb3d0e9fc9d3212c8
SHA2563296a7980b6995776bb8147daa357a7a0acc061b7f0be594a3bd01d8be4fcacd
SHA5127ca1be057807488e30fa3b03d9ced52b5a7f1a44f549ffb90db276a9c64e53f677d22a968b409463dba465010945ddd3b7d5bc2bc5b88d4bb75f3ef6e1a483d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c26a3a9fae060eda07f517aac43e2b
SHA124ef4d945182e54766a693c3976ce123ed46facd
SHA256c4bbf1106bd5046a33fb110c1794d687b4523dedcccd7c2c45e8f15238bd0305
SHA512992ba82d9afa7307742137c98d7beef89c70a1a7b35f2be55033b89f29add11ae12e5a97bdc0ee03251a8856786fa13d0660d9795db067c232a7331e4a78250a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565833ac47393c1889ef6bb5430e3192c
SHA109e9964d4619a7dfbd2943758a1b867aca2d41cb
SHA256c027ac1dc9fec689c19bba59e8346bc4b587df3cd97628d8a6be2ba1aaa79a11
SHA5128efdf0053647c309435cc1c4318144a0eac529cff73b4d753c5421123b2723b64e774ae105babe53ff90f635a71defeb5e5c4c7e844d3b028076aadb476c5418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5e4cc49e471efd77f62bfecb4a47cf
SHA1e2e4ba0254f85c2118a067e005c197137fad56cc
SHA25649c0a398ccec0550720fc5151888c0a814789cde735ebd9e6bdc544b7dbd907b
SHA5127e896ff6b1960e119dc39093fa48754e949f5f4b73bd0781a1624f881bd1a8b8b88cb0a0097d9b8b9498e58fd8b8fe3b19bcdbf485353e6514a4edecb99f6e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b037046c0f16e2c0580d9948fd2ff7
SHA148a253ad96461ed077a8f453f8e1e99f6ea22822
SHA256a1acde67381a652f825827466f070868b0b4a7bac89a4d6f32fb34499aff798c
SHA512021ab40d741e42bac9178fcf544a2af02d810bddd62007372aa76dcbcbb020cea0ec3b9ba663ac9bab778743280cd5d003a74e31b1b6d03423aba932bba8c146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563737dc389359cd68c98cad814e15b7d
SHA1af4f38e9333f07872806ebe2ed20c79269e57dd8
SHA256a3d28d3a4b8ac4394491684b4153d8773152274c3328e09c065332893f73ed1b
SHA5125378f1ab6c38b92df07bb1738a8fd8c4d99447aef7fa8b4cba3628bdcf60b9d5dcf253368b63f4c88392d0d1fb31cfc4bc96001ce6f93d07ef050049bac14966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47a479de8a95d1c2ccb91265526b389
SHA1436869ee57c34c1c4ec215f03d0c18c6c3045f55
SHA256ad5878ee2623a4c391ada41eb9996089de28b9443eb5fdf4b098025761719f91
SHA51212fc02c3c6012e9ba1965717d0c606e8738f97ba3696d4d5e33d869ed8b79ecdcbe5a8e22cfd349018c0a05d9cf19b3b8ea60ad14d7d04d75a97b0746af4444e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f7054aa0113cb64d0078c95e9b3d2d
SHA195175af080af136880b12b90bb541f69ba849baa
SHA256a012b53d1861376d7e2ec3ca4f7e453a3ac854bfd68a6cbb7ccb2bdb7ce9879a
SHA5127a3dd77c917d8ca505e802993fa64a89d1b0b53d910e136d55a5afa6cbf28da5c31f68409423f8dfc24f198de27c5e2741bfea01d08c0aaa5185b20000aff84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd507e14a4fb5e83c6deb5afe3bf4d0
SHA117420fcdd1420467a7870fe99dc34ff9e5e9224a
SHA256e6170f0af65da1b6e54aa119db1d88e3e4c48e98691c454613ad0601c15cc871
SHA512bd09cfc66eca497341daeedb95d6d05fc5c853e92d16e59ee0141b21d918a42b83fb1495c50f6be43bdbfd29328f29541f88cda793ff0af36f5cdc77b38b1b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8ca860432efeae2334286b69e466c3
SHA17c813693cc0c21968e50d5aa8338a2d5487f0c72
SHA256e19124ba20319cddf0fbade67b295227ef690e971f0e86c13651b1341ad48074
SHA512526083f071f5c8d02c8315be5e8629ef8d2337785dfba60f43573da35f49ba7368d5d55927ff9bf7481981b76739f1e1931a702d33f1d6d5dffe15be8c9fe308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54f5cf1e9bb9f9efe02aaaaf41cfcfb
SHA1760fce781bc2fc02b9eeed056ff73ae577a6d5e4
SHA256da4eb85d076ecc2c0ed81c3329fc1915e381024d66d1fa99d8247389e6ae5eea
SHA512c29a37786e3f1237ef40662fa699948567c226b705ab1d4eb541e79cabd77481b9c6a1fb2b6f0c5df75181a28343f4cf7a7909d3c66c9ce766a5830a7d5b157b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b