Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
8ca18d4e6c90a7eea3d1ef5fe9546eb6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ca18d4e6c90a7eea3d1ef5fe9546eb6_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8ca18d4e6c90a7eea3d1ef5fe9546eb6_JaffaCakes118.html
-
Size
4KB
-
MD5
8ca18d4e6c90a7eea3d1ef5fe9546eb6
-
SHA1
ac49d29fb6c45a83b5817ed08e0fa9eadd24cb1a
-
SHA256
10ef65f677102dc41b7fc753c975bb4ac26dd177411d3c96f58bf91766d2aee7
-
SHA512
03bd4aaca75f6f8f98a842041dedbe1316b7b2ba3524cd356b540e41540c1a9a7028c28a1cf64727f5f39c2b673cdb144712af28d5133fe0ca3a60975ab0a646
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oz+hZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423457792" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea7351e5d64675418d81fbce5bacd57200000000020000000000106600000001000020000000182a784de9d027d2d2d328aca07d98adde299cadef87694a97c4677c6dfaf7b9000000000e8000000002000020000000022ea6d09c08c2319ac5337b0fddd8b6f747999edc707bcba74e8f510ae3672d90000000b450e14c2ba5b05d1daa490796a3d37feee957ebe5eb77b3fba743adfeafd579dcfc684ae84a725aeb304ac4eb628647a0429abef21fbc28c8a7fcc2cb9a9166eed94371f5eb48b97edfca56b1e38a6c33557d61fe21e5a1679ba72f7c7be22049adcb58aa9541183ff75b18d735ef814447d240b704bf24fa815ad031cef30fa7b3da8e0d8b0dab02f083fbb569059f40000000191ea865595f42c03b3b7b4c9b1021f3f5413afa05bf8ba2015142d5d9a113572c8c9c72123df8bacdec72421e0f11b07f5abab890bb963f4bc68f127a94247b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2046770f96b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AE5B621-2089-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea7351e5d64675418d81fbce5bacd5720000000002000000000010660000000100002000000093c7eff397f76b1c61b3adf14a64f89e567b036cb6e1c2c65445da06e6be2ad0000000000e80000000020000200000007af5e528ec108d40fd171f6ebfa999afd8b36377760f727dae058511507fa40020000000d25e9186bb43606779cbc474b199519b4546fef5239573f8ccb80e81ab07e5eb4000000078379d9ea3a624852002d66fea3c64ce2dd6317df29a3b8c4faddd9c3cd3a30ff49dda7e7790d957e4d45c37102944a9505cd7717bfbe90ff6fd4933da2acc09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1688 1288 iexplore.exe 28 PID 1288 wrote to memory of 1688 1288 iexplore.exe 28 PID 1288 wrote to memory of 1688 1288 iexplore.exe 28 PID 1288 wrote to memory of 1688 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ca18d4e6c90a7eea3d1ef5fe9546eb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f35bbb30385079ff497b218fce7772
SHA19dfeff4947ea2fdf161b66ac4b23e6c5650954f0
SHA256891f4059ef0d7d60f4bf8ec107d203d21b08a47ae23121bf7a1186a7589ae2b8
SHA512f58f214cf71e8b6d183aa6eb0a429d04605c75b08bac770e92448ca4f28cf180fabf0e9e6d46df82a337a2f024fabd21579e3894028bb1e80d3d59d6b5bd182f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044c5788b3dd1c186c6097edfc293930
SHA19148874e54022bd80a5636787026030f71fe485a
SHA2568341a728509850c78692c40b36915b1e288f363474faf723743022ed74d956bd
SHA5123c1cd0d020752fa81530069cf0a2d648e4c5c3b2aac9af90d9e433082b23e5a3bfecaf038030d1ea416282e2c16b46f62bf88660a1dee29daf6d388d35a91e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c13e61981a20b4732daee7c91279a8
SHA1f54950b8bef7cee55bccd549d11871d1963a1321
SHA2561f6f74ef63c8d4d77fe2e74415d5014a3c51ff7dc0364fe1bab78f7919d6234d
SHA512eb1922776bc4040c832a9b09d6c55ef2644a4289e3348c228c44383ce8220e5f1dccf214c6d3b04cf3b4b8ca8cf128ea6b064d1f5f7c083e10a38c3bf05ed2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652b612b54d63ab5bc76bd8ede3d616c
SHA1b86a0d5be34c83efd0aa7ac045d86ffbc1672d42
SHA2565b11607ca31c7c4424f157587897e81e7ed62a007bbfa919a5fe0aa37351bff2
SHA5126132e4388c8ab92a2578851f031b761102e76fd74f8980db6bb0790064029cd4b9b41e81f8a03595a3790bb6c761a6bdedd534a07c503970b399c86770f81264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa89d351b123f458b0f877ba38065614
SHA1314d4f3315c694681c7311ad15b25658dfe47f5a
SHA25658ee5e7410866a52b471f35f7ebd8998f559122a67b9fe87e89c5d9e12baeea0
SHA5121a91d2bf93434155a506a96c02288296a9dfceadd7d4a2dc8a0d5cff0a524d471050db24a3a8c4b0684a60f2d3fa6362fb7d7130873fc7031a2c394619a1befb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b2e3cceba8e3f3247f5af5c618c7f2
SHA17f44b5ee1822fc4aacbd1f4f22e36225f694ff73
SHA256699afd1ff00167886e52fb4a6c6636380147b685b6756ebce2a37b6afdf733a0
SHA5123d16f9f1ca7956e8604c4bd3276ba1bc50b91d83e4a2bcfa485b2b86eed164cfd1ac11190950686aa63053e0bbb6a7b85b6aabae83ef1cb5d767aa025e706250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b332a814d03f25f1a93db11a74d50c86
SHA11a73b5c915e6ca90822ad6506bb5a9accde66974
SHA2563a4941b3804d89e4af67b9dbaef6cd2331fb1aa892b413612743a9011d9707af
SHA512fdd031833c9f33b79436792cec39f265f101a5736af9ddfc8d6a6f65a47fe3244aa3c3f5a472294bc5aa54e49920ff0d1d593b17db06eb1f15a3fd8a62d59bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0818972ce3e790fa8c2b209785987e8
SHA18d5b47ada3b1a8077e44b8b25a2afdccb7ef26df
SHA2566c069d5ab5cde84783be859f9cb6b64ac9d168396f80624c54b3cb33f7664082
SHA512a9568a3cda1deea7af2704d3baeba2c25d7bc843f03b4a93b600d7e7ffe0f8166c1cb93eb6535b841b9f00befe8dac196b25c5a0244f6e4dfb2cf9cce0b64bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def90d267449bd79b4acd3c05087c7d6
SHA1739527d470ed063ea1454d9748edc64c108953d7
SHA25655fad70a92de7476ea1605d0b543348fef81b93803533856567e8e613195f876
SHA512be93e002a596ae143cee746c72452aba82781933403937a1d76afab42ecf6ad41b0303ae3382a3ac13e44dfffcbcb8aa8530aab6c9cb816881e286b3261c0ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c30a4d612b603b9a3f8ca0e1ffacb18
SHA10cf66d71a7de1e9dbbc32af4b1b56d3851d574c3
SHA25668a8fdbaf94ae018a4ffe861d29c59237cd53d162559bf829c0b5851b7ae5436
SHA5124fbd67efe18380873696cfc34a9aafb26f087ba676fb47a382049d298404427f25944806f7f065b3ab8858a62d185d108dad3b9a29b827ca3d66174e4e09df7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd4625c0a5dc58df476c48be156c15f
SHA1932c2b6bb263414e56008b8d64355e78cc812d0a
SHA256175672bcb1b6ed39c37ed8bd59eb6e6a7ee2494dbf4604cd1cecade091a93f13
SHA51234fc192915d41bb2013e3afff53371df47e74899b77a6c19956aec0f1607589d85d7dc4ff1d208f6d3e0a914da3c9a70c1fe765401ccdf0989e3fdf57d12b2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9fecada8d4abc01e6ed471c67196598
SHA147b276f24543ebe32f668636b197fa08999cb75b
SHA2567a5f0a6cc36c888185ba88f6b690a5e14edb53a354385f9146a7ce80f9a2497c
SHA5128728f95f594d94168b92cdfac00a10c5615823afd84565c8a1a3049c4974c97dd4745e7342cc775f5c7af888c261436f7f669fe195964a5a56ef13c2b09e9748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb05075052abd689867ead470799356
SHA1140a4d7275c99e1ca5b8beb153fd366a9e478098
SHA256c88e7587232e2463d6fb98d0222f58f898a6fb28dfdcd1999ed557444755dcf3
SHA512a79bf8f8367f96ea067bbfdaca20cea5d896e2d0162adfb68ec58221d7e4629cdc8adce0074dc4771d59265742c3c53d3940ac48ed41ee18e45b7687e6107ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58283ed5947955629a2be0ee869f64c32
SHA1b5b5ce97e7f3a5d3e9b497b8d30739c0d11c1b7b
SHA256a1e9f4bb6db4388a038ef9cf931053db9c749f1f70c86be5b2f4253d02d30070
SHA51282982ce568412842d92468f220f4acae7795bc35e69d4664fa2b88b168ed3875e60c88333a1f7c268a20f61431d510b88b680d1783f569f781bb27c242d6934e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea838daf1c1185f9b1ba5abe0a4b9c6
SHA1ed51f9822da6bdc0e0e5bbc1825afc3bf3a65a93
SHA2569b79219acc8bda38159154c4b3b635a56019a5771c763cda369b59a592da1341
SHA512c4f773d9d1513d881fef9ad7d0a6714d88d2f2ef9eccaecd5f905e9bdd696264d07877faac4430568f8fc474a86d0e930251dca685ebc99093eaeb35dd1f6ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522851cec82142cebe16850c6667affc2
SHA1aa16708f36eac9ff98aa893277d7c02f18de977a
SHA2562fec6a9a3b790ec1486f25b280e835853d8d4db66dccc1e6c034d2bca4ae35a6
SHA512d10453cc9c98abd48262f745d899701468a723bca00f91e767219cdc38084970f36a6b376b9da67f1b234ffda02c63660df6d52517693398473d0d775648c5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda9c89b761cd878ba6f7a0344d918a9
SHA1a9828942c8647a145c0308dd70da0985f5fdfac1
SHA2561ca2f29560db33389cdb941092932c949a27eb6be07b3e3189b2ca30043260c5
SHA512f80d754bf2d3c9caacec0bf7b308a5984099f5030001e8c93ea05d85bfc723aee2356d44fc10028d0efd93ec8b4321ec0b626a170c851ca1fa96807a70d61db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df340b9ac9206c96a54604092b04a9eb
SHA1a3420aefe0274768ca4e83f8287c53b4aa345d6b
SHA256c8e29621e14edd0ce07f01eb47da833c74f82b7d917e10d0f926ea735a9eaf72
SHA51209d476401190dd117c96d13c741ffece624fa296e74ecb1bca5e5354e5cb30547ca11bbc2e7bfc8ccf487f51a41776f957783489e93f697dba03ee12b3c59cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1c5481b7adb80cc0e05771f75a1308
SHA17b71f0f006978df3f0a9ea454a5b3503effb5f7d
SHA2561d0ea54be1c47591cec06366fbc26d8810505be31014cdeea7b77cbbdb317dcd
SHA512ab011804a1892afd4205c4b3980e52e152c024b3433df8ebcf585aed493603f240887a61bee6865b1f4cb26c59c90407424a7d02388944fe0b6eb169492784fa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b