Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
2db30307fd067d14842274fbe57f47dc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2db30307fd067d14842274fbe57f47dc_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2db30307fd067d14842274fbe57f47dc_JaffaCakes118.html
-
Size
102KB
-
MD5
2db30307fd067d14842274fbe57f47dc
-
SHA1
8e9a58aa808b6cef943bb33a69de29f15cca45b0
-
SHA256
b94d9d672881dd429c7d3f520b9d1d9275879a5fca2dde81318a299f9f33f2bc
-
SHA512
e2d3e4c8be9276ca4e65be5b02c87be5bddda5d485d929203c73723c3cc54e4f62cc4a95e62096b9edbd0da7858efc8305c52d940db9984b6cc86b2b976ad84a
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcZRmHA6+bLSeA/pcZ540WQp:sXP4Lopg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85A99DC1-3DA3-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d5e3fb32c2d6a33a906db46572fa46732582e9a046113acb78b53d8bae2a78d6000000000e800000000200002000000071722dd69238394d0ac467cc709e8a020d8fd07c11e401f66296b3ebbb43e3d320000000bbc5d7e335c78fc1ec42918ac3c80ebc4d6039e51d22e668bcb3ec84c6a33e88400000009b075c2d7f3e1afbaae015ebb3b2fe31cc46533d77866307b1b049666039a50ea1e59123d7e1ce8617cf61364c4037b68cb7beba87a7a966e36e238f471c922a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426657668" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00446273b0d1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000de3dfb3e1c16bed4d4c2b754220126f66bd6181733704e271de7090bb7e3b02b000000000e80000000020000200000009ab3fd4a6f52fec87a8de1e4e4655717565608cf75687e40b179e7b22ec12a7d9000000079e0cca9728011525df702e1fc49765f367ac7dfadbe1af385aad18b5ac76ebf92a035b875a5a746587b728dcb182f327b60a4d2c666936477611b7ea1e20f0fde52a87e720f5227e368220bd96386c52618f3f6d954f436936e238e37d918fa18b9259f22020d482fca76093be97bc596ce18cf4f44b00846b49e475a01d03a4389ff183a6c58eab9f4c1a954496c7840000000ce5d2762e185dd1a54ea4537638c81b6cf36662e0d596c326bc9b1eed4c931571ec36331c08db2d96f280ea09e461f5d7db38737f14657c3744bd9169aeb3a0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2748 2188 iexplore.exe 30 PID 2188 wrote to memory of 2748 2188 iexplore.exe 30 PID 2188 wrote to memory of 2748 2188 iexplore.exe 30 PID 2188 wrote to memory of 2748 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2db30307fd067d14842274fbe57f47dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19d90e230ecef60962e8f847715a140
SHA1cbffac9cdb72ae2cceb08f34cddea5f791b25c7a
SHA25648c787b2ca50fc965dabaab70d792a124f50a7b00cdbbb5a84bd289bb84fd4c8
SHA512d8dc50f0d3568d1b5a67d34e7b75d4f27c7b57737dacc8fcdfbb6dcc6fda9d67d47908077753203fe2e132784c39ad1837c1273dcd28b77295b7a86a453dad86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516121c89bb089f57e971122368e584a7
SHA109a612f5c2dbb6d97b6089fb58cc324b5deaefb6
SHA256753f99913ba2cd7f4487314399127721dcb2d66ccdfcb29b713e5d1e7ca7d8c5
SHA512b6f5af6a04be747d9988b25872675ebae5ed107bb432b7e30067e98f1e92c2c936deca8a8fd0b114070e0706cb82cf45e51bf7080807ea48380aa49d9f68c284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10999dd411f72e7aeeb37543faee68d
SHA12c2635a1ba4f445074b95736a41d97d9d35368be
SHA25610c95cc2389becdf7dd10af202de787adcb51c0bca126bc1c3e6c89433b0f935
SHA512a91aba5426841631fe682fb5769b71094a7467e612135cd2bb6ecb3776c8d7e725732c4e1b84eeae3ba02b1ecfde9bcfc5ae09503d99a47518779836c6efd8fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4052540dbc3edd3b3b242d34cbc9667
SHA1672c730a2208ba1780b1f2a89cb96435f7350419
SHA256d92845a8c33922fa5aff3776d87c0586c8789a34b78144a342aa676ea1812f4f
SHA5124dd0e360216995638f712ab031eb421f223b9b1708674ad0ea71cab108586d4c6a889461c19bbfbb214e547d57d2309f7b4be5ad0943db1800c84a52a23863cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58747dcd8ee456fc71a3c6c8643a1209b
SHA1ddcee26dabf6a9b33e0f56c0833dd26a29f512d5
SHA256487f8588cfdb41de1e5f9edd5a4f524fae0a0a65d2d342aea1600c824b148195
SHA512ba94ec11376ca04c30ffc87e68187ccc16ed39fd89ae2d859c399a74da4a92f17e7db3da99225756755a3ca6611a6d593272d87b2235ff1634ba890c45cc5747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fa7f04004cda19f4d184e472199a9a
SHA17494dbbd92adbc0675059c1d3616f14e0266709f
SHA256d61cb50fdf05a254adea4f392340b05f8dc92521fd62ed64d58144f14c73966a
SHA512fade8f040d432b8a4939a1b20972b25bd0a09174d100466eb3e1a1eaddde28233cbd10d3c903dfc09e05256c5e9aef6f8f838a64189046cb34a5e84a9e1ba4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4829dac1c0a5adacaaca6bd9a5c13c
SHA16b7d96d77bb117e8532268062e816bb3b38211b3
SHA2561b4e2d4c8793c0632d4df4b24f8c77d6fb2853ecf647961e071feb884839cc58
SHA5120ff3d647929bc2fea9af79998138b06c23ae9915007f50bdba1eacad3f0fe2703bb31358ac09d0ce32fb5deb72c408b35190227dbaa3f34d77b87da5c02042e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eaf01f820cff2b14fe8f844a141e88e
SHA166344b9372597b9fdb09f826724b8ef8f489ab9d
SHA2562c5ae4daf7a3ff2d2682b99745d41e3ea4f34641cce03d1a32f5bd6debee1d44
SHA5124bd5f65c6ed42746213eacc59d64eb60ec416e0be5dee0ee17ea32146c668408364aaed74fa98f16f78f9976a3ed8ddcb3178c7634e9f5dbb7efe18e5423cf40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe09bb4e89e90b9de122e171086d5a4b
SHA124d1aaf640f86591e4268fb941039bd25d007265
SHA256182b9bdf310fde63a82f618a9b998c30867e6d7a3c2315c0f0679f8b00009af1
SHA512c5f952955bf6117a65d5d763e4d7a865f531a6ef0aa7c426e3ac37c6592593ba49d11e5f998964da772ca0937006b4a2101c6e93d60537eca1bd4fd474e83fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99e604af6177c68c5e315c72a210bb4
SHA135f73899a2778cf7c2fa496b54bbded9d4696c1a
SHA256a4d84208d2a3b0f00eaefe2a830d6884f895116819786184bcf9ba8eba55a21b
SHA51283765fc2cd55c28c114593f40e4ebde9f7d4dff7953883c7d26ae44173dd93249e858f9f4de808c6e81a5924c6cff233d99df992a311cfc2ea2a8068f904ae2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de50e02e57ca08e93b8b7cb3bfc931a6
SHA1543f53ff299d39d5f8db7e23dd45f4e4c961be69
SHA25650e536e224eafe8acb595f685c1dd83ed120c206cd6111f7bb79128ae9459b28
SHA512c0a5329ae62b65b1400529ac4c4f1b6c8e882c46b1c1bf66c803e9285b755c729150834337716c91a6dce679e1452ab70c444daa05d5cbf5afc30e18e94ee1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5921c8e464a1ea817928e05fed5574844
SHA15a029dfb7e81ccb4d1e57d56de1c65da284e1e41
SHA256e0fbd77cb23d12a5b5aa86a369b443f81fe827f1bb815ceecbd80587f7bacedb
SHA512c9300943bd3238d6c1f790a601bd1b42466b29d2d41ba7dcbc0ba48cbb30539c845d2dc2a84d785ccb586426fe8d117c2a034dfc79c33468b91984f70bc11e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c192610dadb2cf2febda8059fec81a77
SHA16b2308918bbdd0f1a007c2ca11000cb82b558881
SHA256879f32548f8e183717a162733e37f8f50e0b8ea02c03cf93cc91ed1e41fe7d0a
SHA512e27828972b383938dea22df21c0586a4949cd263a161a4abb14af1162b8ef47b8351d528dca21b7390e00dec0430b8bb64128a48a3c579ef9d92d37808411805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d259a433fcdd0b10b533f58d26ae4f05
SHA123a057f432fd7d6b7a967195210e777d174f7d82
SHA256ff51371d382ec203cc0ea1f29f0c5ed3094c662723e2c91f20bdf835cbb720ef
SHA512a2b71e9652ad0debbea26c4619a5347cae485e628ba8d14bc6d8a8131d323c74adf5a87b22764af182d4385e62186aa0557a2363277790273fcf91b833e046c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce639dce3fb2edb631876f34e9ebe5fc
SHA124c96b07518ab59325afe0e2d4e58e89f2a687e4
SHA256506e7945ba1612f9c9c6a1cb8314229402c5c7cd854e2db8ce7f8288db9ba7fb
SHA512af7f7ebc6cbe42b7f1195ce589c40f3656e7f0719289b22ec1ee2bcd75253a852d67a853015090a30033e200be97eb5956602e4618bd2c0d332c3b77151918ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55caaecf065f1d750bff9ea8184743ae0
SHA16a8d17c3d9c8484f1c465ae1b3e641acf05768f7
SHA2561114318e49bca68bfd29eae8156f546bbc8725caf930afe7445d000d8bdc598e
SHA512a7ee4e5b37c562b4374d7485effe34f88895f117ae208152106a7ac41d5078c47eeb26ed05eb1b895d68b3ba38a6eaa1ebdbfe81f54903cbdc9dea163cefe5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eba90190803e5891d22513e666fed17
SHA166df71ccb97eda3d927c432055e14649420c7fa5
SHA256c60ef4a7824d40ae1f6fb60b99675820f6b53ae5557d14932848b57427d23ab7
SHA51240a4b0f5d313f704d66ff0e8d6018a0bfd66cae10a69e4391cbbacc5cb4933673b9ea34a616907b24b531c81f262ff4f8eb368945591affd8f97841716ea080f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadfb8cf2aede2c2fc769c2dc376b9bb
SHA1e9b293d103f01f5b31969ef2545c68bb5fab39c0
SHA256fb225612c987a2e58eacf1c446c08c603ff3839f57d301ade565a5fedd909731
SHA51263bfec2090a4c19b7ef10dc2ee5edd454521f586914e6bc4a47167f03511bb445925abec565917b642062c4c1f7d49e4e3bf5fcbff693f820ac977c907bc1ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5afb1376fad6b92fef661cbc803034f
SHA1632960849f4c7ee050c95f9dcb5b77ac46f50dce
SHA256d4341a7c14857e0e74adb7fdb48e6bd85bcf24ce90d933eec95c07d7ebe6e533
SHA5125fc854f63024538d333e1ed3fb97deff8d511ac3b828c41d5f2dd2e75b48adee0e52da920fcbdab0f725e722fbe8e52ca2b20a0d82663d05892215a4c8a9c8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513546d30e58fba9be552cc4e2dc2fbc5
SHA189fd09be4195a1f7be32138b6bec59509d3470a6
SHA256a74fdd0d2034f7cf50160b16205433e5e758902b910927bad45bd05ccf2d5135
SHA512b55656561c6985e0761676ad7fa7b2efecddadf90df6418676d62020411e700a3bb53e9226596385099861182e37d3c36e900559ce6e8ed38e55cab0ed527830
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b