Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
5a41e07078cdcb2cdf540531168c351e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a41e07078cdcb2cdf540531168c351e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a41e07078cdcb2cdf540531168c351e_JaffaCakes118.html
-
Size
53KB
-
MD5
5a41e07078cdcb2cdf540531168c351e
-
SHA1
46c59f0071c876cf53addb09c874de1cef92daa5
-
SHA256
9769df6a1f6d88e1ab60b77a46685529022fea72d5013d1c5ccb54edd804b4f4
-
SHA512
fb4ac114c857b27f22352a9a76b5e5658d6a1eab3f4972256e1660dec11ce644ae1081d2801cd94e9a048370d27528a0753ee11aae576c3ecfc6cbe4ee5d73ad
-
SSDEEP
1536:CkgUiIakTqGivi+PyUUrunlYV63Nj+q5VyvR0w2AzTICbb0oi/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUUrunlYV63Nj+qJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f2b46677950036e3cf06e1cb98e3e205bd2d2b9c6e2670e93de211b7180db3cb000000000e8000000002000020000000e709a17b29148b0314e8a1efdd33f6569283e1a32757edf42590eac1f978540a20000000da06859a0af205899acff138b9adf06dcf11658e30bf4fe3230c739573ccab7340000000d79bffc6dd92c1253f5f0c58f0dcb7dcf4c4c796f3421bdd8968aa703c6f08c5c4c11b2b9f666944b1c988b6fb12377fb376f98dbbb202a60bbb6c8dd1fa951a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ED3FF91-457D-11EF-9478-46FE39DD2993} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6038d1558ad9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000a2b6c5345d0b15bbb5ff5db3f8e47f6bd78319ed83e86f4936641f953007b165000000000e800000000200002000000024922a2276a955f9aee645f875956cbabb5ff7b6c969e58e31032a073b3ecf90900000009c7484ce39baf6fed03387d4db177e0eb8571d5abcf9a1e3229856b73341cdfcc012b3d4f33f8ae74834cbec4f5aa6f80e90bcaf505b693e8972cd9fc3a52ddcac50473dee40c5a3f0e62c0e3e36d3cd4496514b179e70172840a1bf2c888f460846a32207af688db49aae965485343e04aacbe9418ee88a910d78efa01b0853f293bea8a11d9e57bab5300df5fbb9794000000023a56376c128a2934c15821c93a8505a7d121c9cf60e2e93cd72d37dd74156dfbff8096eeb9d77cde4430fe9462a3aa4214e4834a82ccf9d144dfe4579fcf7eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427520944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2072 1656 iexplore.exe 30 PID 1656 wrote to memory of 2072 1656 iexplore.exe 30 PID 1656 wrote to memory of 2072 1656 iexplore.exe 30 PID 1656 wrote to memory of 2072 1656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a41e07078cdcb2cdf540531168c351e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca1a408493fa28725e3cb9c0feccf8c
SHA1b1b8fd63a834a44449e7ae71b1d512dedaa9a653
SHA256d1d6a5f6507f65a766a458da38e280d5e26dd9ea86651f845fccb50227c983aa
SHA512f27fc2add25fba9b56f15482a226b1c4c76d5b7cf553e4bd0da7cccc3cbbf63c7bac49c1e81e8d8ab4dc574b8aebd72230550fd3b29e4b0855649dd95552a28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d0a5c2fb4e8ba9259ac275fb9b6648
SHA1f48fb820bd25289f09c458c2a38a912dda8de664
SHA2568be216ed80119119416ea0b2f3d819411e371fc5ce0d57b86b5babfa731310f1
SHA512eb80239c522e67d871c85d14cf90e16b068a7f287c4fd71c0a8645499f53461da476b2b408ea20a87bf50bb0587cc00631cb6a4db92e077a36954d646b3698a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55154d2d939da107dc85b569afdb487e4
SHA1464dc87fd18b02a239a6f32e8aa1e310ad739e00
SHA2562a664b9d8cc39595b5b0a76a858c57f04ad04cbbc7a3d1487196f2dd15b2edb0
SHA512c57189e64beb711225c0aecc0ee35964267160bc3a52a52b46dbd3390c411e62d115941c5396e29c63def3fc2a35baf19ad5a7b3cbd488d4d198d15bfae33310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588045a66f8dc90c912e07c9d165d484e
SHA12dabbdaa43fa1865801dfe9d70da8990913f7aec
SHA256d0f9b78abfe1c712f2c08effca53fb59938ee3592e736834810f121ea6ddf7de
SHA512949dff539a536509ce58e40f8965ef605baf5037d2ec9d1460ebd7a33889a1d8eb0925307b4a4880baac0c2a70ab9f6eb2c592b76507f6b2b43cd4a8fe676878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4a04cb3ad6d3916951a5d8a511ef87
SHA1879193d3f44f6a39d440e8789f2e21951429b410
SHA256085bb051c88372b6c1ec483808b03deb6203a480942bf3d2d26557b596baa5b7
SHA5129b4fc747adba30504f5b75d3395bf66e619ea581df5e533604eca4f8dc3c4149882e757882ced2ad19e7e6521e4ff7b75ed3212f15e57b970762469cff98ea6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb071c47f4d10038f29cda8ac99f392
SHA1fcc2c6ce4ab2c226ed427e1696fac015f03521fa
SHA2560eb434fae314111dca0c6602491675d034ed798b28b5871f3474acec174a684b
SHA512f82edf9f656911e2d1e5f3f5ffb4e3aac463474245be2b4369aeadbf928f7f6cf9d63a7e176372bc219a41a37075e99c02b10ca60fe5ef24e306ba590f55176d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60b65235279598e56c981dd9d86dce2
SHA1bdc5c6f0f82298392406b532712e1fbddefb63f1
SHA2563e0051c995476ae4562b0d6f677f8db8c7fa1ccb21dd4e02f4336d70208385e4
SHA51237f7cd62157b1d575d0d60818174d5ea974dbae2189eb30889de748b700900f685f1a71fb861465ec2877713b1b8063bae2612eb964475ee85f5c78d60f0416b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b00f62430cccb5645c71c535327cf7
SHA171164554c4b8ed15e59296452e571a0ec079cf37
SHA2566e28332d787b377bb6045656f81e2ac3a96bb702c4e17292d804ea17c52a663a
SHA512a219f72f4f35580a98075249eaf2aa464946976ef1c291331d588c7717ec5d0809967bee5071419d69bdf9a3b536d2f6d6a393753c31a4f6f4421c253e654159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2e60495b5a20b42b8eb2705f0a2414
SHA1472a305f4a8a3d61e17f54cd513b136491e49dcd
SHA25678f8cb28509d499a45737c1b5f93483fa0564b43542cf466392a0f48179b64ff
SHA5124b91d53ef909103bcbcf3c45130bfd60a3e7b16955a4114f5ee21aeddaa1603bc40c404b4ccb724915eaa1ec48f513383c2929b2d3dd42a21420eb21bc0c2451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c56d62d73655748af6b57cae0764473
SHA1ae8eb73251d30f79e24057744ce0cb18d164573c
SHA256a6dd7d19b9fb8580c0660fed161bb5cc7e7721b22b7e9b99d0d51dd7bf0d63f6
SHA5126ddcec64b00c0761801b75038f7cf1a821d08f61244125e60878732a3a77e7cda074d008c8e6c795cb830fdf2d8d772556bda9bf3c97d8ed7937066fa4fe4782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7698232bf6f88885b7cb625911eb14
SHA1419a96f7967e1625ec00fe0de83968ea9acf717f
SHA2565c594a6f3317da8cfc2e0e4fa7a71ec24a74fdfb8abf15fcb74d8d0aeec48a0a
SHA51251b5d085258b53e0cdfd15a3ab7ffbfc43d0045134fe176eb6abd564fca804b2caef61c81a08c3c0df7d299f3726fc76b9fe175c37107a7d32d51975d44674d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace2ad1bf37a2cc655f6a9535256fb16
SHA1e0daa89aa3dff3fd60ce09966b689d7648258f4f
SHA2562e27b14d03782392c056e30e5b51d5ab3c795fc895e28d22c1092709e3c53ec4
SHA51211e58ad2eb3bd265d9cd69d7d0f4d2f159e57647ef39c43e44375c399be1982c5b7f4fdf804e6e46a3cc3036a4c257b483bd45b0ae4f781d4cf8eb757df81418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c73d4982fb13a047a67b45e6b51807
SHA1a5515b8c196df44475c72b5707e02f9a3387b923
SHA256a1e015a7760b524394b1cf47cfe8672682d4b96c192f8db31dc440ebf4f09405
SHA512c7998856330dbbc3c5c401d1abc1d6df20635cb4cd2b5e4bac0f3ac4cb5a067ed3b5019e3e3e70d3cd5cd603b63f4cd8aef31f1e0fb56319c5c830666a2aaf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a32f147d723b8592740be82b342ddf
SHA1608d3ce15bd63541ac3161f8c6f25454acd3eade
SHA2560f8bce8f30ce862201be50eec989b52a52448ba1496071398ba7ebaec75a15f2
SHA51237505eb2c387c0543adc9471b4224e6871eb6f4cfb904f74a692647be9a6ebabe5dedb3e6f5956ff520c6b5457757763430d5d66d026c34b0b2c753adfc21d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551430edf4241f63bee3d921628bd3deb
SHA15b89e67b1373ea0e9a4521d70702db77537cbb2e
SHA2568600a4a26363d9b1bbc1305187ac65f43085c6e8e59b3ef538c437fbad529390
SHA512fff63299835721b5c8aefc28e783fa0e9842627920dff087c32d59a8d5ec7cb50b84e2059f3a7456ebcb9f02e6cf0cf713d904170ea6faba10f19d56aa51c301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0cbd5135d95fb1a69a885bd2130090
SHA122a1924c05cab655274bce93429fdfc28766cb48
SHA256137102bf1887f7e499d8cfa1580513533b61b4ebf6686c74cce4a2f17d1a9899
SHA512c2e9b20f11a853acfe0fe678daca450b15f6ca495bb3d2311d4b1058efa2e2437000dc3299a93224cf6fbeed568e8377033f2a6aaf12397491864daa59c9d400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1bc6ee1e690e86c36491fe0ba881bb
SHA1faa4371873a8f873d379842ec55c93195a5fb775
SHA256546f09f58dfdd76320b97969a044229c909c14a8fb188d583e0766dabd999987
SHA5124012f61a37c85526e6c3d5eb1a5789371d1d01a3a64e9a69acd01a3d3f58aecb4bcc713846129ec393e38a0e8d9eafe6f9f91e0616cb7d6ba78585b07277c1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f72c913a61d1c7d186cbf7e22a81950
SHA1017287b667491767b91e7f32c5edc1d0d82ecb85
SHA256c3d8c93c3cdf732ed808d9c1585c3f246c8629b708f18b42947c46db969c0e8a
SHA51277889823b1e4fdffc68869fb031cce5cb458351fdf5c0535135757500151710a39f82a603b51d696f8048e43494ee63d20133eaeceb0761e998674b91c7a0b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8baa641759d1f163af68e2a0b48a5b
SHA1b4de70faa2d0cca301fd9ffcaa9e9a1e52fd14f8
SHA2563673b985f2f698254508bc0eb4472ad4f2b7c65dbc110703a393f998a80bcc1a
SHA5128372ab79cba449961c13d1fde94a71bad011974fd0c640ae4747a6646ca7e92f7752f9cce6fd7356adb1761491aaf9e701447c2d67fabf54bfa65b6bc577700f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b