Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
327cef20dcdef4cc0d1e7f681fe53ab2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
327cef20dcdef4cc0d1e7f681fe53ab2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
327cef20dcdef4cc0d1e7f681fe53ab2_JaffaCakes118.html
-
Size
58KB
-
MD5
327cef20dcdef4cc0d1e7f681fe53ab2
-
SHA1
df117db1307a35db64be8bdbc6d8a7b9b1624fd2
-
SHA256
db2f54facfd1076ebaff49ee17c3897b8737795abe608b641bbd5f683e5be34e
-
SHA512
45efa0f644617e9e97cc3759bf6f1f1856104756a311d0f1759ffedea523ea2dffd628e138c5a1b478f894a90e4633079bc521dd4ca14e8aa3bfe3296a678aa4
-
SSDEEP
1536:gQZBCCOdJ0IxCz5z1fzfXflfzfcfqfCnfkfjf4fWfJfYf8f1flfRf3fHfBfyflfH:gk2D0Ixorf97EianMLAeBAUtt5vfp6tf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c0cb285e40c4215f21f6cc20a75540c6aed61142ae539f35a36dd0a54c85f1bb000000000e80000000020000200000006565af72b66d08dee314a2042451d8e27294dfe51814d4a035efb6e65f4297b1200000003895eb0e8c2b8ad2bddcef80175b8e12aaaf38499377b5917262094e3ec4f9f240000000a474ffb4ffbf2726214b0c50e35a2e204b906e483bf5943bd5b05102fd8cef33768846bddfa4562b4a5af2950c9a3b501f108def9e0a6f02fba2fe33a5d0f8ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426730992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E32DA51-3E4E-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a5a78c72a3cd66f747ca51c0b97a80a6971bcfeda87abd12671b4af3f276782b000000000e80000000020000200000007c442176551be0a28e4b941e786dc73ec15b668b8f8f16cab72c5e76106932ed9000000060af77da08d0e9d8f7cb43b5f38c44387e81b531712b8d83f7c45c1995c61e4ab42c0b1e7d5dcefe534660bbd95373b46606512b812a0dd21a4bf18a17fb97af92030de86fc83e0b933dd8741664f308999dfcba3dc8576f8c586b3154d2d322d0ac3c84cd0a4135de7d6e898089ddbcc68e6106debc8b42fc245a4f3daf9fd5b6f5dc722a4eb785444abfc019fecae640000000c28ebd862a869708c3c2d050f162029bde611328390daee8fa8f711459519a77a6783c85fe1da26e67f2b2dbefbb248cc4f05755fc89c56fc63d6b5bc486770d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d6e0135bd2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1280 iexplore.exe 1280 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3024 1280 iexplore.exe 31 PID 1280 wrote to memory of 3024 1280 iexplore.exe 31 PID 1280 wrote to memory of 3024 1280 iexplore.exe 31 PID 1280 wrote to memory of 3024 1280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\327cef20dcdef4cc0d1e7f681fe53ab2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d638b687154ea30e140fbe26708a0d
SHA14bf0878f52b2bbd0f69be28bec15e5733cedf29f
SHA256d94c8e639acd2842a8462fd569522b1436b72eb18e46bbcc01ffcf216f0b3116
SHA512236c5f6403c77a841aafc7fe3e50c547db32d64899ac8688aad2e94ba2e2540ed6355788ccd165cacf22029871f569497af12898d5aa5f27522f759d3ba3f74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4a2fd0c5afa7b938a77feca4d5c8ab
SHA124d446feb7e44794556bb55f6b03d16c7f8a779f
SHA256bd3576a00755de01d0fbcb9f0510412f307aaaddd1448ccbf0b372b743356a1c
SHA5126e55377e2e938adc548c1921db87f57dbc86ad32e3e1782b68da79e9b973a7003b644531e53ac1e6042899e667995d8c0de3162c3118c8898bffeb8bea72e423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb378bb84e8c69a10e29314391092c1e
SHA10ae82097cd929ba2e60ccc572541590258dd3abc
SHA256a35b6225111217415eb7ab9dc663f48f60805f3b6a8660ac16e0138d27ed3de3
SHA51276eb8d2e2329621d1890f6971f154b1fed4bf1c546241300c81dc2e54e47ed03b429073388604e610419ccaae0b6155941afa98679b84abe31c7313ba13774ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a705229c84fd118f3a9f2f7789e686d
SHA1c9c627ba7def47b49810edca62ff7fd78782e07e
SHA256d46c67af4a67457d8b20a88001f3e2271c0570f44f0e6d4eec937f2f69ce5a58
SHA512e66c318166ed4390ab09957eaa6916a160b35c2b29cb57d87956fa533b699be6de311e66cbdde1c98234888077ff9e73479ecc597b46f46cdb89f4fdc57269e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c4c71f196a70397972a7d07ea54e54
SHA1c13444cb6781eafee48e677ded95029c2e470885
SHA2569bfb2114cd736b9483c2fdadbb3a845210b16318eb55261dd217165f28dc499e
SHA51290d5bcfb1ef38ebc3d52a3d7369fefe1dec0b3b1e78ad19cf2ad8b4c094deedff6d2843b5988739caf617a3c16e155c52fa0db83cdca82639c350f0324b98324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597ae30e44a190bcb0e0bc485d673bc7
SHA1f99ebf840bd8c57100d7a15b63988d2ae01cd5d3
SHA2561f25661fe9978d82c3ea82126bb24b0475bfc896146ddd1e6f5b6acd3e5f0cc2
SHA5123108e93d4a2fb56a3d55efa796b7bca8aba539606dabe32d9d817b9920528218528832f455d6c10560892d9795e3b95594557f55a7e9bf7e5a1639f43e11d499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643b93654a519650be217401afb7843c
SHA15f3593c5e3bb0c3135eac5a1a383a429d690f083
SHA2562343d8d7f44da8beb14020a34a169aae968a5af8dc20b15ae5e9d91532355db6
SHA512a6bb68f10a7643a2c488bb63728f1831119845a7708ffa405cc987f6097b114aea3d825e1a82e3df3151d87a27388ad7a11403e4efcf1a42829e6b4d5d31495f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56733248c0b1d7fea860fe8547bc2b6
SHA182540609b20464ff3ea67146fce1f2a654f6bda2
SHA2565c648ed797d29dc99315fef9b98d2e765e5d3c02f1556e0e86277ed37fdeb974
SHA5121816f7d66fb17289abab7b1bbf19aed94c88bb7976b835f21e891034bc130bb2e8fb323099d6bf00f3c42313985f2f603f47a65c93bf0ec03014aba2044e2afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8150818b7c2796881026ab6276dd5e8
SHA10a41790f12c358745a9a3928b042ea0afc7a8f29
SHA256501723e74ce1d74028549172bf2d6e0a8fc9ed4e2d35c53ce50c15670673bfdc
SHA5128c7e24b32f1f6165a1add6719b742a92f505386ef183555515575791762b2027ae0ba531a51d6d54b3b0dfc294343d16c322fb57ede44c0f9bee67a01ab5339a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc8d1091aff72a0c243b8867f2f25fe
SHA1789a962ef67d49840687b7774fdb06f6c148e47b
SHA256197280e096b0739230baf9d88c9011da4f901f00fb47080004bd22e1380da2b2
SHA5127c61ffe387452087f80ee511c4297a279167262c577b6eaf43801023a5e80ced8b4f1aed7e6de6a67ec02c8e5fe6448537face79e8a7f48bb0eb3120ffbd1a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55480424ce5e78851e82f9c847da6036e
SHA19bd0fa83402388b283284a23f09b47732186123e
SHA2564f458b762152954819b766f25d923c118299eaeac58d690fa8a334a28606cac3
SHA51287d65a1a60323df02a2b4d603e025a62360da09d58e30ad93d52682fb45b8ad7a16958a45b076e42c34c49ace30d2a92aef75dc49191c80fac9e280060cb10f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f2724a1ec488f6b099c3420c51b769
SHA11d7e84ecc5cb514bd7a1ed31fc0fd9776e6c5276
SHA25662516cdc43f6749e40fb7a70b3b7df68ad5e34f0e3ffc2c9bb408ad050e5c01d
SHA51275dbd33cc166cd060025a0ffcb4175c8341a6a197228ff057d519814659ca758965e44b242d167a15de29eef4c8727a35e6565c5793ae7387adee6215a16212e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc889a733cdc416624eb367d0e45186e
SHA1d287a301113536f98d958ed86ed4e64319752210
SHA25644ddde374ddc438963a7f497097f92d80757e82e97163c6d5fa65e7a737e548c
SHA512980230a5401e4cd1a027084df42698c7407a5c815150064907bcbc638e8be736b7f2d3784ace3d47edecfec5de896afe151e9c8975370850d10af8788b7f4ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555629d8579f07491837665ea219b6075
SHA160f617383174b2d9b3bee58b1db89264ff4eac72
SHA25667800f005d2b0c755eb317248bf05c948aedc676ab80e143ce83afe3c2d005c4
SHA5128000a2fe0fd3f1727489b6b44e5902cb7b4106e371453afc3d0b16ad4084643ce67d863beb5f8a583be6e9a2ee7d3ffaa431c85d7f96bb6c4d7cb27d61969d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b33242c4d4d8bc2b35dcadc03b51df
SHA1adfcfa84940042e05bcf298e3c2f44c168934b86
SHA256085da098b738dbd64c85216b81a5e04c54354fde117378d0c0c490c9db7e66b3
SHA5123bf0971ce8219c00846cbe087f00c7da230650e49fa394e39387bfa69af06c84e15afe0436ac9842f66e3eac863cbec8b002acca42ba69cf3a99f49a2e638e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50461d9e77d5779993108f5233230ec75
SHA1a70deefb37572b45f00f959d59882bb6481c95d3
SHA2563ba5be4127d90986cd1e52cabfe952fc57822ee89ab71a83cc422cd0128d6dbc
SHA512defda748efcdc412563e9910a3352587fe819d5fc5989e4491abaa5a1f9c55abf3885ce15dabffc4ebe266f0c0e38885b0bd457641ac2dba38a2dfb4b56d1b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535597ad7097d7a11e7d32da93d54755e
SHA1e231f2a664f0840d59d9771c1c16d242bb1ce98a
SHA256daccbc726644fd28ba481a7cb3dfc65da6ba8def271c9e762964c1962ae69320
SHA5122e388a672ed9850fc0bd1a83f09f90e766360135f1c8618c027a1336b90de00cb1331cad6239ef7e7174e5981e9f8df290d4df722994fcf7b7b61d16c1c7f262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91c351cd63e57578e8182df82bee1ba
SHA1ae01934231369bede62c238a7c6a44b6e7c57463
SHA256c74029a7bb255d0f8f2d92442de5b1caf0cde4b91d27a1a78dd6d10753c02b4b
SHA512d3dfc9e1c3a53f4a31bb8f84d41b36b1b11d9d356c87c5f2ffebdd0a601370f83dd31e9ee65f98823e8c8caa04f118a1254982e19106e5a7bb4029462a14dca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7769ea8d7bf6ac1351c082f660a130
SHA1d5371847fdfb092926d6278b61054216de94a374
SHA2561f7d0b068163c1a495cc4e4ee169e7674bff20a8375f45a5e44aa2bf56510ea3
SHA5121a55b075645596e10098a445bc1017044130d66495c9ec745c8d53c526ae89a16d76dd80fdb8806ba335b48026581bdd0105ef573b5d386215bdbcd92d8e9a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e3c7dd19959b0c1f50d28c8b63c41c
SHA18f56d0b276d5da5205357a35c1b134eaa6ed6840
SHA256559732f65dc1d196dd694449312f9665b8d0ed9f0160795f01587aa232a39a88
SHA512e4d8c54c998282228f03bc667249db3868e33eacd26aeae60e0b2c8624beac70dc76ad7fdbba451d797ac6d7954d4fb00fec37e233c7ecca7e473c052b4501a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b