Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
28f1311d8d496c648f830314365f375d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28f1311d8d496c648f830314365f375d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28f1311d8d496c648f830314365f375d_JaffaCakes118.html
-
Size
53KB
-
MD5
28f1311d8d496c648f830314365f375d
-
SHA1
8fe06c544c11db9e18f4c9f512e24ebdba24c8ad
-
SHA256
9306eabf30564c774b36271c10ddc28ea2dfdf609a21fb2284da0c9f64bd4e12
-
SHA512
6585426875bf57e6e9ecda2a56ff38ecfe137acc53286faa2548b4ad348f923f2d3df77bf246b588909ebd562f13c505cc950206085117b3c10c8a0f5248e021
-
SSDEEP
1536:9kgUiIakTqGivi+PyUJrunlYX63Nj+q5VyvR0w2AzTICbbroQ/t9M/dNwIUTDmDK:9kgUiIakTqGivi+PyUJrunlYX63Nj+qI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426452375" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20123c68d2cfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000013cc3b0b5d68a3c29f51f8cf8ddee4d8cf43e9494651c4e47501b3679ff7c84d000000000e800000000200002000000081de6b15e69f354dc1cf2fec115548d4799306fb1d6813c5976e30fa39c700ae200000005dd2392545f461c05b57cfee31182457c46e530b9055c3e7d26a45a0ef6fca3c400000003fa235c87fdcdd4bef1eeb950146a30b034aa17d2d9d090c6244bcd692baf96864450f6c6291cfa4073ab519ea1897126f0653342cff5c037cd3974a1d2aff14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a0be8e138f6334b1d0a270c73047727c49ca0254c433e5b50662b827171241d6000000000e80000000020000200000005b99950fd3b148c149a5980a9113ef74942c5e0a01a0aaaa310babffa29bf59890000000e3ef6b23eb2bfcb4dd2185a6b3213ddd52f9c87b9b6273ee40a0d788e4bb911d1f50b3c26ca67897466a6cc4454950283e77bed336f1d41f09b0620cc620d0b10409789c55dfad77840680c389ae00c3b8a12a912ea10c35fb6ba0467141495699571ba7a92a6b934761e7fbb14ddd12c8833f0392c09765914a0729439acceb85277f03eb048f18621f338abca1281b4000000023c2bffe223a137b73c09f95a55ced9477f064b5ff93b6d5c113626b6c3eecfb68c514bd163d0789dc84eb53e464b7bd1c5352be9236de2944b5570d230a2313 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A10F551-3BC5-11EF-9889-CE397B957442} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2984 2752 iexplore.exe 30 PID 2752 wrote to memory of 2984 2752 iexplore.exe 30 PID 2752 wrote to memory of 2984 2752 iexplore.exe 30 PID 2752 wrote to memory of 2984 2752 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28f1311d8d496c648f830314365f375d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcbfcb512e93ac2823583c9d2c1c120
SHA19ed682e65e0a20fa54b984014b89037cfc2e2239
SHA256330e15f09afc54cb24f10de2a5516d156cc4e2254f7be4dd9c03bcf80ecddd27
SHA512360722c97ad7a0c44ad4564850517c4086f4ce97c8bb7073b85cdc6b29effcae16772d47959c214c8550bc804fcef7742828984722e38c90f53038526f193193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111ef76d30ecfbc483ee14f9cac53b7d
SHA13a05a36d574e6e972fac15f3ce87937e70ba5803
SHA25623b69a24b5e5a521a714e9b8a6228c77088a5b65b8bcd0e65e83229aa28e66a0
SHA5120648325a1c0a27bea017f72d00103d4108e9f5923fdd9a7bec6e6916ccc4c6c632eb7c064b5eaefffe70240b6d2af6679697c90032ed8f2bfb2245b169dc6536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547422cabc9843c2771ca5bb9e7e1de83
SHA1a55eb0c59c185fa0339fa105519be9622251032b
SHA2562cdcdc19eb17d5bea102acd48c4c44282f337606cac17ea13f16715c2698dd0a
SHA512ed82ba88dcb8899ba1f5c939bb467b258b8705d146bab6b950295a6146dd53f3bd5b1b837a24d3361e713d37fb9df51695edd1399674d934cd184bf8a3b7b7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5930eb7bfc129bf3917a0789e6e0ab840
SHA1a8baca911b952cc7d22471042728b48edefb7030
SHA2567cfc066a798fe9106c733dd1169ab1fcc5a348b8363ebdbed0827fba6107a5ab
SHA5120eef800eb6610d91822840462609726177f288f5324d00acf3c9bbabdbe8583a4c5fc4e9bdcceb3143527a703cf0bf81e56304d634e4c980af01ab62335bba63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323942edbb680ff2b1a728bc79159862
SHA189485552a458605a1708c46715c5b6392cde319b
SHA25650893f43de74b3c0eddb5a3ee0a8bf499812e258298f60e6cf6d3f3c6a6d264f
SHA5123472ff926571738bd755e40acbd65b0d87d76a86c50a25f33c12d2db7818b8507fea16f01ca09207989e92536a892c8632f3e12ba95a47aaba1aa7def0f88895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9c5c0ab18e38bacf67743af6269522
SHA18dee1ec72675016e1c4fa05553879ad6938b30cf
SHA2568bde61ef725145875473ec82551ffa71f94af36a2f5e30f06c2d2f49a3987757
SHA5120107c4fce10b563762dc15b67af736c63c86e952a0b5f6245049e588f9bcd746db1d330fd8b4fe2ff30c2cf397b7500696f1802416559eb550e4acf08ce7cd64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54990118e005c0f18d071527a2813a072
SHA12d4cdce9e0b592b35272d905c57b68c2f15317a2
SHA256387917211a9e4bcaf00bd58d59123c50f786198e3388ca654cb715623c78f228
SHA512bf4e3884d99e3812c030a1ddb44c2d07679a581e1a33b97e2ff85b7774ffdde1757236a2f5c86911a3b6bece1a9c0b40bc9ea1d8010a78652341a604376deda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591987fe6b3ceab1f7dc5ca1fb22eda77
SHA1e513c172cd3756ccdd7ac2c44b19ee49a8300016
SHA2568ec039b30bdfbbf7e7181bf56dddbcdb98d58eb1f6a09b6548546fb988bafa98
SHA5125e44f07005c51acd99e87a6c83e55d65164dc1312e9f0a812387c671909d5770f195e6faa3ab0435b0f99a8587802a210570cf297ee5447d5352f0a1d59c953f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea25a19806718491630e427a80fd7011
SHA1c36973aab9f51025720b4014fdfe335dd68f4086
SHA256fecea1af8296ed16cd90479528d2135ed0fc14b40bb1d935183170476ff9ef32
SHA512db9feceeabd2cfb9a0ed7adf8333e7219299b457236b84b82806a266da6e3b196597d316fbdb25d63cece1ab6314ac767fbcf6c8e8ea8de3a7b09abe60063f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32d9c0a2893e7e8d7de4691c823fb20
SHA136bc9ca3f6de9cd7e3a20b1efec752e6d3e1a590
SHA256a475b4458a155260f225441aa419815679a42ca89af4e5a0cb6b973b5b9903e3
SHA512bc6d4621a56f2f9bb087f1b5a46af0408565eb1d28f2b7ffa2395feb58ce239de0b2e9d56ccf66dc0c101f1393d2381005b4615595bdb6b868bfa53c9a4ba97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52361d8f8f3296e420a78a357db378e48
SHA112a015f460a2644fe6675659e18af37884f90eb2
SHA25651d1e57c93a7571d8334c3fafa0b2baafe789ebe47038629a20a9a70f23ad8f9
SHA5128e6c22662095b7d4bcb5ccea0b0deffa9df7dc9396764364c87290aebbe5167d7c0c36dfe0cd37ba514a84b04863c5c2f10aacf216846b518bd2da376b05dffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e01e7450d32e3ea39a903c8cd436c77
SHA1844317feddee5dc703255dc9e7a446eda4e9e74c
SHA256e2c610307a6ff7d7aba94faf8a304e2fdbaa7756249752232d1431117e6bcdf3
SHA51282e982f27cac51af5af105de93c99f380ba2166bbff35cee1a11f00e513105204f305522ef87b76a18d2bcb952d825ebf7b4de63fe0969b643a44600722cae1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb18bd94c8f0d0d100daa416de44676
SHA134eb37c8c7085cecd6cf458b5953a455c3e45d54
SHA2562ca6cfe0a86eb32d398086b0373760f3e4785db38df40f3d9de17d378c0e2ffd
SHA512b89b62ce9502ba96f522615bbcd9e05f7914cc90e3703d404237ac8be42b9149fba6166316a977e7ef8f51069a1ddced73f709d2a8be3138e55c7080ad67e411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8010e8e864a0802c7ed3f992d7551eb
SHA108085690f0ff0a8aa4685f6ab558c86f01436fcf
SHA256cfc6660d4fb4063bf2a35e73c92d4fd2d9d5bd52cd2dc2e360a86cf5b5f26f72
SHA5126a50205f532840b136cf5cd21ca3dc8c170ac175154994efac318b9686cd044b756fb96df6f642a732d421996aa7a0391a5b6a931e8172cc6091d92ef3e39f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f4c44dbfe4983454a606af1d251ec6
SHA1a11ff52737dc44a3bd055a287caca0d1b0550543
SHA256e1f0a3a10eb57425971714e4cc5c405aff84db3fdd38532916f3fb32c85d420a
SHA5126a02233ec165046b2c436b5ee09429fa5d4e0e63efca1e92068540e5104dda9e60bbd3ce59cb8bc646ea229f9d1207c5c8d79fe5b0757a0c991b9d7e05bccf3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034f93b4928c8ce73cd5d76d59034e01
SHA1d6b432410d911c04f70d21d8cc8eeca49a0aadc6
SHA256dc62b4571bbf3cdcbd66b96b75547ea15aebfb8f4d59af1d002948658822db8f
SHA5121dbc1fb4b6165a3f688969979df3ce405afbab4f7864fd239084de2c12363ff8ce2386d2afad0505af031fa8ba758fe9afa6ccfc27d537396534cb74af7338ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282d0ba8922731cc52e4db62ea4c39a5
SHA17a5a698c0ed471d168dfe2597df63a445bf7b68c
SHA25606f91786af63e7c698de7ade5ce330fb1927ed3a1eb3b5e2997a3c14cd48aa14
SHA5121d34d247a2cbdf6b5a7709b4f52ac57e90e4778e18505804a4e90340b67c352852a74e0ec881fe0a39ecc7ece5945a4d71a1ba71424de9d664fd7b1afe40eac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98f45050b55d1629288a21c885c6a1b
SHA12edf9ee14bb45c21bfd3267a8d0dbf328fb97caa
SHA256a89f2c525f203dc891107e3c932761020b275511a1f86eca065265102a1003cb
SHA5128fde6825dfc01eca421f9e1e8d7a8d122fc9fb946262ecbcbc747bc85aa964bbd6deff872f6e21395871bd3d777a62d51e48f6ab1eb387627769db0d0d02005b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1e65ee9e21e4b767c92b5f27356022
SHA17d5276b09915a1585b4e635f5087624552714959
SHA2569150268784707e5290486f8c1a5c0f79ffe239605f32c81f40b7b8a5ce47cf88
SHA5127e9d61d5ab89ee39aaaba32050add2a83d4c3dcc7f4b6d0d1dd10a692f3b61440f73d05567298ed9769f87e7b26033398a73d95d5bd48605dc5bc35c39e170b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BVY7RUMW\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b