Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
a1be1a950e7ea0e21afab6fb7c374df2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a1be1a950e7ea0e21afab6fb7c374df2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a1be1a950e7ea0e21afab6fb7c374df2_JaffaCakes118.html
-
Size
453KB
-
MD5
a1be1a950e7ea0e21afab6fb7c374df2
-
SHA1
9c216a2bb4b21a39ab7615090fac323e4805c279
-
SHA256
3cd6296cc8c089bb2335971dae22f338d612b1d08e44c1f17b393ef91055d71f
-
SHA512
bd7077db32ac47bd3b70849d356f51b595074dd6fa8d853f0742803d9408097c95abba1607168f9d68823c8727b44cb749dff011283e5d1da45ed7236c1585d0
-
SSDEEP
6144:SBsMYod+X3oI+Y4sMYod+X3oI+YDsMYod+X3oI+YM4sMYod+X3oI+YQ:K5d+X3Q5d+X315d+X3r5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424378790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98802281-28E9-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062395ca36c200243bd12caf8145a572a0000000002000000000010660000000100002000000086d5de6f082e839852c8a3d484d3df8f4c4d5c26747512223ce7d6219fd798da000000000e8000000002000020000000a925ac0536ff49bd28915f844e8b579900d0ab8ea3f688e7716d64a45345fd8720000000f8439dcbda1c6bd93aba784f7febce467968a52d1d276344a60b2230dad3b82e4000000023addf221bd1ceb7d7867349abac9e383997e67df6b8da50fd1482dcd6e61f1bbc2101c96d2bcac300683449f0d26d0def128fccc45cbd0ce646fd0506f5d004 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bcc886f6bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29 PID 2192 wrote to memory of 2908 2192 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1be1a950e7ea0e21afab6fb7c374df2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52387a97c44b7bfc67db78eb642029bca
SHA13794378d67de776cf0d5df284264685523f6a2e9
SHA2563c0135e29b700a909425e6e2ad9fb839a675a10ffb3ad2a0aa905b20e5c71c8c
SHA512acc09f56f55d7fa5784334d68ddfcf9ff6371f86bc7ebc313370b016a7617bca4665860e9ebc2de57f5f3957ef2d78fc99692deb44e116821ced9d823f908568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6093d537b7213a2a0bf319d9200cdb3
SHA154578f705edee053001b507b5fbaea54fa2b3c0d
SHA2563977f1a37f6d81ded120238b7e84a78bc996cfa0d25c7bcce7a4f814c4d63ad5
SHA5128b0fdc05c115f982401b9a9e016679bcff7999271f9dd990fc8ef636a4e73c84e2cef949cb9238c09321a55d9b31631802262edc8209fd7cf5aead1caf8b1e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e34450686ba1b5466779db3ea4cdf8
SHA1a49a3daadcdd61d3b88eb41bb324aeec75231a0a
SHA256f917a15a83fef4a9107e999d44064cfd6c84402d70effceb577bb04e0714281e
SHA5120c1b2480d4b5d7c15c06a56b0252fa591b0d0478cecd874ff4bb5be7521e46d48a99b49422a7e411b30f13ce945040dd5b49f3001e4af4a1d575a50116710c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d99698ec405aa1004bc051cb59e711
SHA1706a9d82d968f161a767e6dfe48fd37f1ba27fdb
SHA256766e454dd5d98b18ce406bd5c31e41271fade9ac769efc3f99e3a414b1cb3f14
SHA512c391f927f4f39d65084c13fee7aa7d246cc151fc1d06c8767966599a2ba98c536ae35e4da7fd0abdad7503642778608469b7df1fd9c1bcb63b4c0150d209b96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c362d266c655d2761bda07782e139bf
SHA14ea494541f30fe770917a504eba08d2bede1faa7
SHA256ba8e03506c72648f29ab676b434ea9fd787bde60b1cdb5bfb2605e520d42ed2d
SHA5124118b2db3e2a329ce08f3c689ebf718ff5a445d06993a60428633e226af58e96dc395632b7fd47ec992596964be043d171772a77c0a4904f8e1967ff30a966a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53427e895203f3dcaa6d92abd8c1f33b7
SHA1d142870c7fbd0f6a4cb11ce1b68a901a92759d34
SHA256e8e9a6f438df476679ad55c7f4f09dda512975516923dbd598f2de5495a2f1ba
SHA5126f9e0aa46ada166bd2f797ff3f66b958b70378cac3ecdb3096a25ac1db7061e0ade5498fd18746e0fb6e8adfe00c300bc31d1927aaad109576ac0c52a077c7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a187b42373c73eb4e5381980127022f2
SHA1b1990a81cc937d8206e855ecd00a9b2482e67885
SHA2568c9f1b079a37e3d73149ccc5e88acdef106406da4bc69b368d863ac7cc293661
SHA512d47fc80c945c6344335791e201f38d5ae1d3376400f4e60b22d0369bbb2c01b42758fd8eef27e0a7416451c094a0fdca8d48fe159ab8a6802a152f2330914bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfd706cca5608bad6cbafd46696217b
SHA12614e5c586dd20bad46224838036613e6e603bcd
SHA256ef22e82cedd656556ad8ab4e573d66ccd374a73e751fee3406b01f220c85539c
SHA51208125add180592bbc323b0ed4d5984af971fcbc8da8efcb47f760b8a778824754897e46ec382b7d4f109900b2d45586073728a2efa3bcafa8312375de6fe0ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96269c97d4e8ff51cf3989173721e28
SHA1ff6c7d3f636e6764fcaf6e6cc53006490bc7536d
SHA256fb41d1b761b9c607ccdaa78abb9dd0c3b2311080e552d234b341c6329bbeab2d
SHA512b47b5ad3999175ee5824b9f697a415712c9e4853dda1b9daf4b48f7041ceda55acdac294101687f2fb68b58e2858808ca3ee36c28ecf32c3c993515b91cd32a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa35ed5243a655f58828accee4263856
SHA1cb7510e69ad29f875631e0c718dcfb742a7e10db
SHA256e924ccedd99ed4e823ac2c9b6aeaaf72861ee2edac7973d9ef767a85420f151f
SHA51285186113d8403816508e0abe20c69ca15f02a340c78f0b08d0e5d2aeefcabf05f2c3d937dd02c93cfb60bd5e903e0fac00ebd86ccee4663cea3370e7f91a4d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862eb8bb8c9cbf445a1a0bf9b162c683
SHA19825af8ede99a06fead9ebbf2f0322f3f8a8661a
SHA2565df358bd0a780e5800038595badd261999acd7b395a893c98a962d4ff957f4c2
SHA51273979ec5468d5bd5b3810b2d06f11ff152978dfa8231c4219d013b76c4d5cc260895e33e2cf9d408a9b23160864dc52a5ea2b7e17be3da1ee4261baabc416696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb41b025f961454bb73b37d4cfd88d4
SHA1820bb9ff36e3a5fcb344a13fbe727c2891fd5b5c
SHA256024849b0e9f2fcb1b5d9be890d5a2127b93c6fd46d304e7daaf6cf5827a81403
SHA512be12cac6c80b2ba5166f07296427c6c2097f7ad2966f8858102e585be4f3f9251eaf41c198528d1646fcb8d99bcca3e9f265d89b23e2222fd510d9eb93b1c6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51388ecee3112e053ff93bfbbee0a70d3
SHA1766679794d48aeadcea8e6b1e1f6af3083213f0d
SHA256aab0436a3f44f4d49ea87809a220f4acdc8e8957689e552e83c48cc5accc3e43
SHA5127e86cb0f4251efa42558ad9a0d4363e557b14cb4fbf7b493f90e5cb90b41c6d004dd6a279633d7e13b8750fd9bc28aaea9307f775b573fba6d3e10f48295397d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679687d13784ed7d2c26e4e2f95b18b4
SHA1684edf958bca927b9c9b9981626c2e022628214d
SHA256af88d74433b53f101d71b001efd95b6f6e1e78ce0ef026988f930cd14976a603
SHA512a35322d3c95df565feeeccf1c53c8de3a97023218a956ce3f8f17182287ffa845651cfffacf14145edde122515e82da7001f1e886661bd89d8c7dea0b2a53c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039b3a2de5293a24eb17bacb8b5ec25a
SHA19ba6a240e2d78f25854f3e8b2e94cb2663688921
SHA256d37a167c99284362e3a04a44229fac8b3bc0880b2d2626b92b3cfbc57e1bd248
SHA51299604b6e4f0775a7208c9f6ffbc8f2621dde6d850b70dbc150ddc09640b86a0f48d16770ebd2674e90066e69572de5f3cfcfa838454d4a24bfb51a79ec4b622a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542426433977fcda88ea09c4f5f495741
SHA1fa332d1d3203dd24080706cd2195e04aedf5a918
SHA256225aaa3e23310fbbd88e71d1f5d9cea9df44e16db703b3090b65684072ccc9e2
SHA512cfde99776ce9d91747d555213d56908ce7b87c0cf9165c1b9e65a5b19c7a94424e66aa031d6bdb7962152c1e88be867e0588c1b36f8292839ea8434817f9603e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cedd90771d219b7345c2012904e76baa
SHA1fef7f959eadff70e8c2b319a4559f2a1797a3dd4
SHA2569298c6e9ca7d63f99ae7134b90dc99bb81468ff17e6f6d9390de576546f23ab9
SHA512f3c7fdeadc3022100e4ac033fa9a0cfe8eadb6ba3714fcbec8c999ca8f28f7575fcac0b6a706a06da84e98f36f3947f303a447bd733496050ba173d0463c9ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7b6bc2e7c3421daf5e99bea3d2b290
SHA18c54c985b07d46518c728e5eed52af7d11852095
SHA25617401aeb3cb1ab2372cd08f9c7d2ca5d0f4c36d2d690d88cff8c4a95f63f2d2e
SHA512b4fedcf67c5b3a3ed8b915c468d44fb1f3dda3aaeca84c03cb8d49c405ddfb7ef0fae540c2e666f6f06c8c8c7fb1a28f1daf9f61543c06164eb896eee5efd7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e32eb10a86cb8a2c1e1bfd570188824
SHA115e87743ca2fc4722edd9633805bd6c99cdf51bc
SHA256391efe73803a99602afe84372bf872b2d4474eaf4a8bc0cfc62a85fffbaf9fa2
SHA51245640cb6586034bc34baaf18dcba697ab1bb93de3b80198f5d87083b696ca26fced957c73893ebba40c19446d93449f696948ac2639948f637344a2d5037051f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c806fe5541c831fb814df3f0bb05d165
SHA1f01f249f77952b6543dd8e3c3e71e0c4046670f1
SHA256b49a94863e6c2ea99e4699a6f90da530f0a543f4492284d96e37f0d05e12fb41
SHA5126efe8d952c495db1b2dd2650009db3e9d7fc02ca07e41e68f8b37d4f39d356bd3cf764a32691759fcd6f5d52b793cb06fcb8fd9936272ce652e4359def38c424
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b