Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
30d6d54e13ab663b9a9241b5224246da_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30d6d54e13ab663b9a9241b5224246da_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
30d6d54e13ab663b9a9241b5224246da_JaffaCakes118.html
-
Size
6KB
-
MD5
30d6d54e13ab663b9a9241b5224246da
-
SHA1
de43f64fe56c3147cf3093ea4928b9b95b506716
-
SHA256
968f7670897683f46a0baf9ad6520bdfa1dc5d090f73edc141f16e0ca37aaa2d
-
SHA512
c6a697071abc1aa99e88ee1e61a7344993b1a098b35a447c96929f03cab93e89e3b2c000db06ed3364b93a90659877cc6f99fbef3491cfa41c6d06976be5f8a7
-
SSDEEP
96:uzVs+ux76YLLY1k9o84d12ef7CSTUxeAXwcEZ7ru7f:csz76YAYS/iXwb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03dd37418d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E4C0031-3E0B-11EF-BF10-EE5017308107} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426702377" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000bc78e079724981e94326512d6010a06f31c64b5f42468b551117c60aa78ba2d7000000000e80000000020000200000009134fa36e547b49c687293b76bd6dcc54996af58da7ab6cc5b7dc430351fb9dc900000009cf08bcb3534b5525b04b0c996ec3412725b12600477b9adbcc4309e3bbc0a254bdb2e5d573a475b981b722d8965744d32471475903c774ae9ebe9aba909d6661daba6f9bec29e035560d2cba0d6a83c2e2098a7e96ebd8827d2a0a8a401f2e78873ee011f0fcbb45f846f5add154b07b2ce6328c6dcc0a845d3a6e9ac4cb1a070da662f4ee25f21fcfc143160206994400000009e77907f5e8dfbf40ee0da25df70e0c5313f081e18efaa25a0304ee51c28948a32c7e3d31d108f8c92d379e1c42cd6a2a1c7a2b49b59e754549358fa359a44ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000fb9f90b0c7a16940b13c309f7bf6c0bd35afb258c94fc26eb0180bcfabb47787000000000e8000000002000020000000672c063562cc0cda2b871651b3115e4701ef3097bf1b1389a1b681ffb26999ea200000005d36e9d74878981ec25d8675b1cac030988318d8f22e92974d2a8ac29a3efb8340000000f5472c62dbe35231fb5b2cf2d814e116209b97c2329b86d8fae2b238a97a7d43aa62baa334a3e93b1c5215177f47c9514a3a81b32b2ef0d54595dca9d0c3a46b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2184 2996 iexplore.exe 30 PID 2996 wrote to memory of 2184 2996 iexplore.exe 30 PID 2996 wrote to memory of 2184 2996 iexplore.exe 30 PID 2996 wrote to memory of 2184 2996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30d6d54e13ab663b9a9241b5224246da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b740021019a262a4ee4a36618e7e5df
SHA1b9b79fe4029ba7a90abbd75896faa37daebf7ad7
SHA256de326632fd7b7927f2dca1e637e0eebfd94ed8edd5c0dd7a488ce228223a7fdf
SHA512a485c397bc2082f1b7f380ae14e107d839601f9caef98066f47445e00815ce22cf3a52e1d34b509e0d9011d1d03bc0e308a3b7549fd0154909e6d32c4bc4af2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d98eccde28231ab00b9ad5e23d08d4
SHA1ab327c38b57feaa7566b59dbfaf115924ec2f55f
SHA2560ef30b552fc19714144afd5c9ac0d2f1245f5c9d96aeac4df54f1a0a028487b8
SHA512c8a535a9b8be105d4c8f53a965d73245cc25d4e7cea5a203ae91660feba2d268af976712da5f61b5ca2f6b3ef3a00ff012631611d8b7a0aebf0c378fbb77133a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f3eda9e199bf638b1aad8bb9081dbb
SHA17509cd2686d0e364dd3488132398feca8e83eed9
SHA256966f1d7f009d1f4267baf46b781a01a97aa6727c89496a181bfe025cc1ea4d93
SHA512b507c272d104f9dbba72e95d9ab206c039eab86e63acffe0d99e3294eed3d673a37ae9f00f42c2d01538ab68cc623433dbde7e3872e32227d496104cc587ad23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1ae2520615d6c0d0a3f8d9dc32f1ff
SHA1c8988e2e679dad26b8094e0768cc0d64061f6e27
SHA2567b0703c68161208ca2ba3b85a3a5d107b0b25f1e699652cd8d9665f50de9ece4
SHA512e8a4f0ef1bc59b3d11084853fb017086b44e2e66b4007ce4b29b5347bef0b521c48f4c245e3c0e57779b31646af8714e3cb1db9017141f482a66e66c12370821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519f2a9e0435a1d36d888b302d28b4dc7
SHA19e985d2fe2391f90b6e0dd9b882bae9df9b8176b
SHA25658e5200102c580ef862144ab99fedb120ace5feb16c8f794078d02f534233883
SHA5121263ac34e9308cef4e87ff07703bc0ddda48b623ff1e1298a02e056e5a504ae7263c9e07e5688227e6750a2eaf7c1858a02509eb51f43510a38f550ed3077f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629c8afec94ebe1fcb7fe77c5a74efb5
SHA1d3668a9f902c08039a06f6e1fbac59c94c0ac550
SHA256735df391ddad998769727def44df60ac18f339fd761d0edd24ace00d5e110739
SHA5129d6d909ecbaad8651f89a511cd73b9d3e0251b510f7a7fc5c5b52befb6a30b64a1256727a6d999d7d98f1c854bb8e231788a80135fe4c0ec5eed6af73aa655db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f1b313830117dc7ae9c39e05451571
SHA1524a6e1ac3b22973fe50476782e35ac9f7d5eea6
SHA256c09b88918ed6ffc6a7f7d4d0893417e9585cc1a280b0f069bd5b446fc13865d6
SHA5120899734f43f61f1cf699f09304c4dad1ba7f83a23746f19f48e050bac665840cacbbe4fd0079893557fbaea3662e5a32efb019d57a9bd8193b18e59609c78408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a098f9f8fd0bb2fd7def62e4f2368527
SHA129a81bce233066d44bd843542cf6b5014f6e3dda
SHA256636c01039243b038c3d62af7c4f51c42e31222d7a43fc5417bf4645faa54e684
SHA512adb7a75d7542a67bd242a65f19885accb294c85f0c01188b9345ce5f67592ec2dccede0f2c0130d8a109cb688b96c16e7f8425c9825a4d072d762d6f7da6a111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629fe12537cd5036b05d1be13aa831ee
SHA12a9873be5841cb889deb7c30e86b86a71ac11b66
SHA25636b190f981991363dc06246a68a40d4daff1ed3131bec4bc8a3828df55bbcf14
SHA51256eb64bacce7a37122b371d1db27bc63a4024ee70ddab37145e6a6f133d173e772761441e01791facd04727f73307d24321f4ca2b8567d93c3aa8d68eb38e9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba70de9a1fa12d9dfcaa8d559d7a1e59
SHA16743d66729a532c21172aa02834ffa0bb7cdfa8c
SHA256ee3eda302f54cc419afb0ffcaced43b09ac65f8103222fac8f09f04735e61180
SHA5120b7db05be51a761cd39ba346016f74e8ad62e08ef1133048122ef6b56fe25aa2b0a8862ec0df98616faa8b193c2cf12c6ca6e9af09770071bffd4907aa9dd847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a811125b499b3fe1a5b3cba29d6feeaa
SHA1081bb2ff5517cb67ecb7af1e2d79e9193b1d977c
SHA25664249a15ea15f8a3fe731038ce963da9be54757c16166929e5e08a3af2fa8758
SHA512fc1575798b9584992fb9ee06748efbfcf313f4d66d391e274c5d4992df8d59ff6420d368d4437d80ae27c8d32de5520325146c76745ea09c75ec3b49a5f7b29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fa1b291eae37952cd7c76f91502ba0
SHA1ec527f79e96458735a1ec3153b79a5417d04c400
SHA25639354e39e5f0cea1e5b7ef102d6d143dc5c6d5884b4377b96caa7476224f2879
SHA5120e65b54f2739113ebd0148ba628b8f513d2ce0141170cdff255331146fb033c0b18f251420134c1a47c1a020560963efc13a0db64f82d9e45db66d981390e805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74a131867c5d43d42c515f16209b45e
SHA1c29e44a55de4033eb2ea7ef086362b29fdbcbefb
SHA25693f04e187fb7fa65c37f650a6a20d3238e42a77c16a0cd25a7aa07f94811a595
SHA5127db910a6a50aaad1ee5de0ef7708f8a507f043d48c9823179d4e07a481c18dcc73f9b767078a717de58a84acc4af2e8ec7a02384af66d3f965e4ab5bdccd7e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bae3893c3f04440d8320c975a8dafa1
SHA120f48267f00b57c07b0db7f2db92d2dd217f33f3
SHA2569d392be33ccca1dde4f242345db33809a645c7a7777b1ab247ad93dc06a61bc6
SHA51230d348a4cf1f2ba59900e89a636aeaf29a123bb08d0f2122a5c34763336d67325e7baa9cb811c1ef72ef2c5a0b952ef04133457ea5c432f30b328a8aa4e099b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9965ac7269fa377e1b929019f582112
SHA1200ca270f9336afbbd078f5fe39f0c68ae793ea3
SHA2567043f50ae9f7b008743751f0e4a8bbfa57943f2fdbc70de31d4a3e5ab147bbe7
SHA5124ccccd4791f08765fe4ac2ea0008d7b803617d2bfb9949e3b25b3a14dd9b3286bfe70be88f3df90100c4fd8217a1f52eac09cc41e533d90381e0cb15201bd311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e96571795d826f7a0b2772490bcaef7
SHA17fde1e487f54cf2a0c99d41ef781c19a035f1d6d
SHA256ca0333b862539267937a06ebea6993fd4eeabb2c9ba17f0e6616862badcf25ac
SHA512f07af0945e92cbc081c213b816c5f2b08e362cd9794414515b4eecb34e05e042678cd8ec61760cc4615199d13de3137dcb659847b75bd2107c7b2a02ffc63279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e0f205a787c81f4363c131c0837282
SHA1be1ec0b42538d44a0e00363a37e9d6a86af958b1
SHA256acd18e9b862ec11075e4ddea413cf7f051841f59eca839b82f32ed9e1c83e568
SHA5126f140c105fc12ec1971ed42655a147acbe123e4df916c8066f986dff85d11ab989ca859d94ef3c5f01547b2770c14c29f0e882185bd5310c5c4ba13d2f514ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bfc9274a3ba2da05a8615b4d4f1da5
SHA1d78f130159c3c5b46aa0c92dac8b6ec4491aee0e
SHA25618b2057619d9025bc8bfa2b2402e98bcff2441b270fabd853efdecb1e7dfc581
SHA512d3b248b40487f3460ced663641528f8637ecafe566314d94a9f293a976a4705d7bf16c2f9f9d2c7a9ce711987761f0f072d48a5ba21fb5c943af06d9ee11f9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213816ec150dcbd790050d3980307195
SHA1d019fc8de55d4e7c6b26848d69315abf7da32ea7
SHA25638e09ab33802abb14cda3b65cfc8327bc14a798fcf80965fd8f4eb433aee4a48
SHA512d020a6892696f5fcfea0fd87d56f70d0ca90488aecb9221a8b00f47100c42d7132445ba04e77518561590984da10865c76194cfc8e3b47050de63bb6b8c659e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a24d6d86d9fdc178e058be7355b3bd2
SHA1f53da2d4599bb91b1a7c548bab9520e1b6bc504b
SHA25669705873af8648f63d328a5e5e86a1605272eac44d41290ea1f1934df62dca3c
SHA512a42e3ec9ecdd2e6bd2c58168116d3da7a112226020e723f8d04af75b8a3a072f116aa6aec687cd3c085fc0b6dec8b38bd2d401e150bac30f930c014c1d500a1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b