Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
a4789395b268ff813733daacaee46b25_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4789395b268ff813733daacaee46b25_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a4789395b268ff813733daacaee46b25_JaffaCakes118.html
-
Size
460KB
-
MD5
a4789395b268ff813733daacaee46b25
-
SHA1
a076fb6d06f22c8f4a27fb5dc9e8ef4654397679
-
SHA256
8f52c6c98ec8a63dab62de0296001c9f287a20956bf477846c7c78b275852d43
-
SHA512
947c0a89aaf912f00c82f14de81158e542c3b309d5d17d4aeb632aab73b0f4abd76030b830ff4680410638ab082bdd67b45fa503fb0d36f11b21d6f3ba92fbb5
-
SSDEEP
6144:ShsMYod+X3oI+YYQNsMYod+X3oI+YsTsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3j5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d4fb2865bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424426343" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000019bf3bef8a6fc34784254758a398ac0d000000000200000000001066000000010000200000009b2a982f3657fcf019da0512359f5cfe955267dd51492c76616331058fef8c7b000000000e800000000200002000000069991ab754f70740f63f5b3b1140d71360274561c94ac8c657ce91e2936fb8d290000000567d27157a78ca74c8ec7a9d907492406dc1648bf66f4bb91330ca9efa9ab1cd96b57d7a24dffbf1f38f9b46da0235d044375de34116aa52a71ecf17b39e32e85a57145279f483b8dd2c3115acd178fd8753c4097ca4699281d1147af3aae0435ebbd0bf13d681f09ca6f4c30f9704b47aadbfeb5696f5ba79e8561873d11195d585bcb7679bfd1c05a166ba460d1d9f4000000061d053a73c47f30d31f16401903511fdf12f2bcd4831d9986005aae4b011bed327325376cc26d13dfa523416d62a75ce0021d687863e696f68c62080948a6428 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{505CDA11-2958-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000019bf3bef8a6fc34784254758a398ac0d0000000002000000000010660000000100002000000084ea4b1d470b0744a66cf46365b025c4c37821ee206cc288caba914ad6e08eac000000000e80000000020000200000009de29cac2939d8193ee24cf3fe425b84e3724c6cd509070792d40d2e0f1a35352000000082ae84c91e54fb641f685fed21a0ae171e9bc951d09fad3a06dbb5fbf99366c540000000a1b4c5d3436ad63e9f70dfa371e003a884aec88585294b6e776b8730737f8821ce80322ff4bdbf384f83d3cbb96986d3a2a1e5e54ea66ead77d2cf45a247bbe4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1280 2352 iexplore.exe 28 PID 2352 wrote to memory of 1280 2352 iexplore.exe 28 PID 2352 wrote to memory of 1280 2352 iexplore.exe 28 PID 2352 wrote to memory of 1280 2352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4789395b268ff813733daacaee46b25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc05e1557ea224c0224ef7dd4a051d01
SHA1df595101423a2b834d31b0c63d0209365a3669c9
SHA256b11a0d5dd703d91c506e4be2c02824f599a1a5fbfb7382d5bddfc2284ffb0705
SHA5124abcc5bcf76f50d7c8cf249e584a1864f3ed52b01c761e543edd1e6a24bb390813b21b83143948bda0a94a844943510220e8177246ba94ff4b12b637d517e857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511700029bb3d711580993ce7dfcda701
SHA1e1adae2c32d779ff8e81093ee81cc29789300df1
SHA2562fa6a260c8724542d619f88468707138e6d2d4bc62d9f9504e8f562824c08d51
SHA512002ee0bf50e74c13f1ce577d2c79f4339085158cb1c19ea6a38a472e2bbbe17ffeac5f180b2f1da257056b4d5d75007c2b472ca3ada470bbdfb55da3fcd5e0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6acdc72a969d3e732b9b791c2be2ebd
SHA1cf065423236542d74fb0f7be356c58e1cf0ee9e1
SHA2565ac2d4e3b8057f8e947cf6fd42198abf144f3f90dff008ddbe3e1dfa5227e3fa
SHA5129789134329f2f2d7e0fcea56fac7d7cae5e32c08c73faa0cae9c0c3b6ad8100bbdaa5eeb508f189a927f5c38670916540dddf3c11c22647b57973a4834e5dd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3dcef5bd93b226c6b21bc0679eea6f4
SHA11f6b5b3cb97ad3ebebf4ce7058618bf738ae85ad
SHA25647bfdf07a48a19373ae55ecab98c999bcbe9b043694d32b6aa944f32a594bdfd
SHA512b5abe90a781ef64243d88f9b0690eed444f4c65a4cbc32e16862f7d75c7fc69e8e1445b9e85d2199355ff653c9f8ac2fd4e57d3fcb22d0f850d720db07260fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fa88e8b30014a764fc5a2f54276b79
SHA1836be4cd116cd1bd40aaf2427baf9497891ee6fa
SHA2562c80fb1f373958e3229509b5ad7413de447fbe5d1d67a6bcc7d45b04348d4e7b
SHA5128b2f935b32fb14bf1208151347b4f923b5c650d8a68a00ad839a258d6d4e3fecc39e93ac2bdb504a5ba43ad1a1c2f4b38d341e0e9bd9e8c9b6daa4bee39ca1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce07c3da2b63da143f5e337cb7aafaa9
SHA1461f0345ce2a752fb3f2ab3ce8d06cf6e2993267
SHA256606e292c521d3a429a45d9801f06c9d5d5179a573feaf009cbc4d2384149dbe2
SHA512f5f2cb9971c80201851628d9f1f09fb6a7142fadcbedc93934de6b1baa9ceef2492cd0409d8b4b56e5be74cc4302431c853c4163bae95337d80de73992d95908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319435d859e718a4ec1231de658ae8e7
SHA12a3604f3e846f7d0383f82dc2a325a82cb1b8a57
SHA2567258f4306b90bab7516a1c989442456a31fc1a9e2a40aeccabe1760723079914
SHA5124e697c65c5cda986e0b8bf4cec01ecb39db55b478f4349b41e1318732770cd7d3c590ce8684da7167eb7420f6724a7cc83dfc5309e93e334afbb5fdecd3c758a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af59cb1d18a7cdcb9ad81015e685ba8
SHA1a3dc4155764dbe8b95424e1a7d6825dc37c9b897
SHA256c2d24f5a44942202fdbdbb9c26630dd21b458e6c902bd91dbd6a63c2708431a2
SHA51252923498a39fc6a00ecd4b4186f42c36a7b777bec11113c7e5cb68827692ae79cd9eadda08d69ef469d416862d12701312c4fa2bc1d1a273c39ce83698394f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a3858ca6e5fc1cd82cd4b7200d0791
SHA1dcb2a2e067210da46893430c408911a7b229595d
SHA256a8635518cc18109073aca9769f109b39dec3575aeb2b49b4e8e274a2ed608321
SHA512a57f35480f345d9ca2113a319970b8558a13f50c8e08b81078d8fcc35ec13d77ea4c481acad24ffa82e7349c82061ab208bdab85b4ddf6917dfd3f6f1c808dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667f1cc0fb11752a189b95625f3f9f3d
SHA148d20c1c2ec9282f5000563f3687e3e8ae51b916
SHA2565eb1501e87860248e66ec384a931d67c345485b9cb164d93fd584b0362ca8c51
SHA51249563882dd69691beec37516dece295e3b8aa4a4cd379d7ddafcb4666105f9bfcbcefd9c9925712e89db9b6e5bab8136a1f3c0191d7a43beb9e744ad6b11039e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6f4eda44cde7096b758f55cf4578cf
SHA1181e52ee226c3c221daa17dc005f4cd7ccf13364
SHA25689a32e43529da5a096150472b444225dd22c924764b5175a4bcf00dc5e670bdc
SHA5124d90dce96e591f1ca96fbe2912a8c4e2c75761e4ecb1ff60b1dfd78d11e9365ef0b957310420adfeea20de3d9917e601fbd22c1fa84e292534fbdff802239acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c153570ab0aa1e36292b2742cd67b9
SHA11abdd2d3219c9a88f4e3c1058f0d3d4513f52e1d
SHA256e3da2b1f5008d5d98a08a760cc2fc96defeaba71a4d309879f12da0cde98baa2
SHA512d5905ef4b6556a33ace5431758074adeba8647c405441d6691d8926f3e34e6c23d51e9b9eb977ecb6fdcb9eb4d5a2b1517840c0cbcbf4f04aea42450da97bbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca783675e0ab9533986b5e896eb5e0d4
SHA1288bb13217eb183ffb432ecec813a693949ab43a
SHA256b6f23539f55ea21d05ebf0c4b3ebd24b3f1aac080b0631536017f69564e2226a
SHA512cc5265d9170d9e17a86b9db2c6823d878a56cf5687c6ae26dec154cfaf535ec82a74431e257c616b0e0d40709e01f676994dd014370e61c8215337c56e97c00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa98bb62237c1d30d0c89119542e44f9
SHA1e4b7c66a039f0dd19a3b65c115354c22f073ef9f
SHA256f95230963afcff661e48c92163057aa16c9d85148ea17547b4ca33e1e190d590
SHA512aa739b796999dcbe76ba4de2e968faae44305a30f464c10e00c669c991b13f338088c3c2e0be46609b0da2336a9d909230ad28f733a9c8323732389d61745c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525567be3e9512908797b86a0c8b6ee09
SHA1a03c15e2d5021f3626e162829035966c7ec42c91
SHA2563d0d110c566d17efdbb16c4414ee766de3cf5602c96252ee8cf6ce6d0252949c
SHA512ab7ff82360d16496ec0eea366a88cbd927d22e00effb8e0cb33770d9316bd06b4d962e51074f9d359219b38f7807cdd7cccd5dbe2f5017c887527311ef80e15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ceccb364a6f5d436cabc0bb2d8a6c7d
SHA1eb3674136df0a428beb57ae45696f6fbfc3143c6
SHA2562460a1e16059a1feec63c1fb07df3d165f229b64ef8827ffc033d1f8c18b3606
SHA51265a10fa584946483497d3e13cbba4a3ca208943be5541627d6c11c8c16cd7c91a7358f2886ae21dfe4f40bd670321c921f81e635ad2cdc8de09bb222c52e8044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f17e9af1ea688b5688e308b2e427fd
SHA173014f7754c7eed41456999d6ca860091b2ca323
SHA256220d180937b14255026b8330f40b3650d5d8bd7368fcf6bf1795d8df8366fd85
SHA5123e235bce50ff8c9ac86bdb477808da418c470d098272f0707ac069599d98b02a1910b4058827a53861fdeb6d52bfafe69b0dda2e0803c54ac6dfe23cdc9af75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e248f47933e395f17148731eee06709e
SHA180abb6aaa37cb1b48cc8a90862c7a942c62dbb66
SHA256ecc7a05a271af44e4dcde2aa428009eac38aa33f33393081dffd72a73025f77d
SHA51206dd14828f5facfc97fa72e0f6bae7ca47273f0b0c352ad3084af0bf51d7714e9c4015a6669341eb6ae4acd62698bdd7de012fa797b566721748416fdbd85153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566053149b3a37d4ea2a9b7a6b3e5f314
SHA105d470bdedd5529fb09fa2cfee6b9b645dfb5c3f
SHA25631565bc64fd012952ef04d0b108e6c3e5d0da3129d45b739e3b5c21b9c9ba925
SHA512ba3240c7cf41c7de3a388883706211062f18967a2a5f009a3177d909f7b5b58414034ab5d7d20dc4b5987504bb105a18f64d384b56228d332dad72b3ccf2c42d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b