Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html
-
Size
14KB
-
MD5
7f7104ffc863792e0f0056cf199a12c7
-
SHA1
61db82abffb4f0112a56e85767bdb380e41abefc
-
SHA256
329057be9403f27e3d9df66a5494291ef0c815e66a8ccf4e02c429deabb9edde
-
SHA512
189a29efcbb035580c4ba82ead74cd9bf0993f8d8b18be9be62fc674d40346a209e15c93b8b8abf6141922d4e35dbc359b65a03b4b0e11d0338907da0ef7fc59
-
SSDEEP
384:Rmbp4ll/wp1HMNbDRQqYCEeRoqQuHeNY8++8GhRYoUybUvdZqNgTTazi+g8gaUw:Rm1Wl/8MNbDRRPQua++pXbNVziCgaUw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f79daaa55df654782e009ecfd9d7db000000000020000000000106600000001000020000000d34d453442f7bfaccda84f7b12befa09ecb3154d12e687553910b4a6adb8122b000000000e8000000002000020000000b5a3717057b49892c998c31218612dcea1c8cd776bf46c6a96f5c457f78ddf4c90000000d27f6d95051feff9270587ae739556d63f2157f25148f5c9e523c681054d848eef640cae1bcd6a1f82a1be9a47b508fe0c3e1cf0f0bb5f979c81af6ef1e24f82ebaf985e40bd331e948b57d708af0537b503ac161021a27d3e245260666e6fd99fe9d228c0b2ec6acf9f8db081290e6c0aee40ef79ca209c462f10ad9434d93c1e5c9f9fd158d7e2ba1f5e856cd2aff340000000b1f9ff2672bbf2784ad9bda116286517c973b5ee66a3ba27a92e54c75edbd36a84b369c48849157a57fc711e29bec69b7e369704fdeb69ee3239ad33d3c1dc98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ECED6D1-1D70-11EF-A6AA-4E798A8644E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423117314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000f79daaa55df654782e009ecfd9d7db0000000000200000000001066000000010000200000004816bc65effd9cb65ec8821712891dd05984196001d29666e3aa8c895a348ef4000000000e80000000020000200000004be4e88ad0d214d96723c92cc42c788c65378a87024897e57b37f0c6872df29a200000009f717aeafb150b827d0f000d7391db94a57a7c8ee101a7ce3b311b3b497f3b7f40000000a5b6ff3d11374c61cf0f566a4613c0f1987ec109fb781267ddb30d84bb24d175cc29f398c575961261df7258cfb2d42e63c8a7b21a6e6511c4c5788b3950f027 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90458a537db1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3060 2748 iexplore.exe 28 PID 2748 wrote to memory of 3060 2748 iexplore.exe 28 PID 2748 wrote to memory of 3060 2748 iexplore.exe 28 PID 2748 wrote to memory of 3060 2748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f7104ffc863792e0f0056cf199a12c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56145ca439b5dbe22bc26dbd4e5143b8c
SHA1b63f6cfd6ae7aa45c8ebdaa653d5001cf47c8357
SHA256840e2f50aafa532663bfd14d9abc54129e60bb2c003ce0c90c3710e704bbd0c8
SHA512d5fdb2513d9fd7a9e6ee56258042564d140709c83a9e6ad8d64b217cdb936ff48a25d130ef0fede5e231b2bb3bb41a9030774b3c72adbd8f0a3d3f3dfa95ff47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523096b60e3e69fc26811e761271fc737
SHA1a6cdae505af9236cae48daa6e306a18fc7b67728
SHA2560916acf18a878f9827b675c44c73ff9a87794646a05bd9a3ea4b762c7c75ec15
SHA512dabfd850ddc33212386de858f7c9fed0426f4d5b8ad63afee0e61bda024d361a4eb002a89745dc8dfd4cb1930c7eb1d4452b233ad59023a8c097507b9c49d63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e230242ada181362168a4f9f93270c64
SHA140652df8c2f44044428c97061aa17b4e46249225
SHA256e7180c2125c699cccfc36090d68884e4e70e7689b1d43309d05b43e0654ca66c
SHA512d099a3e06e54bbb2d8a3d4c33e36f774442c83669cdeaf61b78e7fde32dcc297623fc5fb25c1386d4803e660eed3b2d8f01e99826f388ac6a011d3005b326d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa6378449b90dba47389efe649fb148
SHA178b46d873e2d8df401a34fc28c8975d4a7291986
SHA2569adbc5b32ec3d0ba41842c61235721728c74776b5c87c7774b1a95fbbd078277
SHA5121502c4405879034a7cefcda7367191c36a089935b4bfdcf89ee5a2e9c3521032bacbc6452abdfdb58399a7a192acb35b7144c001d3a96443f9ae5a12c366cc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1e96a6e624d2d3c06fdf97aa15d1da
SHA15c0cd8758bccb8296ba160684b99c0ce52259d50
SHA25625472dc77d389ea76c077e3750cf57b0f5ac5f80c039f2740bfb12cd5bd5d5ba
SHA5120b02507fe31315827e0c8f0dbb832f476b58ea82275c109517807ebe48deb9e3ebc60d3a45c3ce6349af1906cf5e6d2eef26106a4d6a69c4c311447696d8b37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2aec007a584c7e160c8587d2be7118e
SHA16ce7812852bb40c8a8e8df0f89766f6f25b0434d
SHA2561cc92b5fccc07a044cbd427853c7beaba7356a11f7ccb95bdc22a4cbcad1f473
SHA5123bf8ce3d1e4c143413a44d16f5e487ad6f4441c8894b8194abd743333d3a33f3139589410b46bffdb880491f125e18b52b6bb086437cd97d629fb731c26dd688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88a3bef39ff77842830894780a1a983
SHA1f5a5fe3925f981e48174fb705bbadbe49caf0255
SHA2560e259606319a2ed853c889228fd223cf7927a82306225e1862b9399ca7f8d750
SHA51266d2bf4bde61f8e6fa8ba10c608484d57a2a3cc8a440730e3bfc6412eccbceb88ad747336479ab19d0129869507d94106d191e7ccf193d6ab82010d5ea10c2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5eeca12155261f21dfe23c5103b2bb8
SHA1eb1b237a617a20722c8ea17c02a1bfe9fee225b1
SHA25642367023b9923818d953e7578c9ffabc3e7af2fc26a98735471aebd0ee3f3402
SHA5128f89e7c170f775be84a2ab8358d431cc78055f25535bb5c053548d99ae34cb533dfb73d20bee291d6aceb28df35eeb4ea784b75f4b8494391a059445d0ec62c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d533e7713aea2f269f98e05eb5a8b117
SHA1419c20a8d0240db282fe9b4fe05c7a1db76b74db
SHA2567f99ad988afaf1e6446c23e58749a37cd188b841adaf9bf18f87de058048be47
SHA512b3646310e1e485dec190cc1638572bcb6ba04d617086eaf7dea23bb6194a085ca4ad40c071b9598c1a043ddf2f99181fe2526ad145aca18fe4ca28952ec5f59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f1e93cb067cc0162ed3be79f5c7dc5
SHA1a04129bd7a1510b49c1b0b0172694938e196c452
SHA256ca5dc7dbf648ffda5dcf9849327c996a916493bf3ff927a2b2622d0d3784ab4e
SHA512d9a07d538247daee90acbdd55487038b6c3822c9ce902dd7cabe3e8dd27fab8ea9cbb291a39151a8e969147f6ddcdb14f386732483b3f30a96ed8a8cbbff18ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d27d6cdec598d3ab629090f73518f5
SHA1221b9fa00e73faea0228a550769e99d7cef47877
SHA2569d5851483a94f4c2eabf184123a580a4c89e6b945e258e83e9970f840582a065
SHA5129c9d96cc8ff18fecc94013987d47309bba795c096ef3bb2b758856b0d0e874ac3d629fe7e850bd161c407eedb332643d7b35f16614097537342f1cd939da7ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fd437ae3506afb2e44dfa4eabb22e1
SHA1a1e37125c2f540f592bf3dc98938e7b0bac2fdc0
SHA256ea1c1d1135fff9c5cc5c6ebccb296ad9d4ded577185a12adbdd57b7d93aa2009
SHA51205b6afa1abf089dbe9b6214b2a3be01b74334657a6adf6e1d009ebb7f3b21e218cf0583bfd76dbbd9cc3f86985904d6d282cb123268fa27d76a58a2c525a3856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffe020c0237cc019d679a83ec1a0ca6
SHA16f5a7abb1bc5572c0de11d13e69e62ef5feb35dd
SHA25685023bac01523b2bcca29323beba3f7d30c3e8726572dee9f1570ff4bf51e55e
SHA5124b0cb44c0cec5d75d91566db96574eb792f91f0074f4a53270d3dabd4c6e8e1dfb94d96201b83575d26ce7bb8bdca02fe8d12cb82d90c38bc5618443449c362e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9f16eb3f37cf3a4cee56925322b23d
SHA19ffcf67410cb632ae4520a5855d595d7b0a76dbb
SHA256d327308047851edb3e38d624eb6ccdef930eb1c090cc701e3c33769729392226
SHA5123eee650b345a68872318f0748407e866fcbf94cfae7476c014490bc4b3e364d40b30415244e9639d2c8024c9aae873b475734f631443d5659f81419605835110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b41bfdf3a9463981aa5cfec8ccf7e7
SHA12147dddcd487d0bcb97fa213c3a1cfb08cc61a0f
SHA2560c47dbd38035a579342adf91f8a2d73db2a0b368250d9421bf65d5a9998e0d3e
SHA512adc16715d4074ede71541c881bfef67c4e0fc363d7d6930834b6dfc14570c8bd8e3985f415d6749f668cbbb5bdb483297061b1f1bfb05ef3bbe485ea6c762f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41b51b5e87bf6e7703bc0446edac216
SHA16467adeff4c46aa2d17ceba70034ab733e4f0c5a
SHA2563407bec0e852a73a61929e10b04bf4197b8fe6a61482cabd60fb1fa7bfe516e2
SHA512bf2dd64ab03f05ecafd6a5bd6ab756e0eff8b534ca806e30cc6d1449196a4db6a9de75eae06005c2f926776cb72e18c3d5f734c336e3999650fb3965f61202ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595dc3dd438f6b7fa91d6de793f2a2ad
SHA1d0744f8808f4a910c1ea5500d5d9ad29a332dd41
SHA256940cd49a65948899a45119a672177564e934b335142289776fd6d1fd7fb100c9
SHA512d711a3a1dbe536408218fa08b3912fa0fb8d137f9489ba02426a74a5114dcafdc5b9d6ce227698d950d28b3dc58f46a6abcc120cde67537d5edd5ad975d9fbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52217ff94b2a73e9d57807e46e69ba020
SHA11cb5641f45ef6c475e2d44d36d10824d31ef5304
SHA2568bfcc1d5a0d14ebabf8ae2709bba4d4b2352b9cb9e7cf6eda81c5d02f3cf940a
SHA512cf12917ed669af22cc4535b3f070c06b9ef57c1aaa2026f2235c132d7d7c5c41ac237c043558c912e3a71fd17c90c072a2ed97c931b770a68f5f6dec7ec0d9f7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\comment-reply[1].js
Filesize32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b