Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
a501b5ad3be5a32e9be8f2fded7d0846_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a501b5ad3be5a32e9be8f2fded7d0846_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a501b5ad3be5a32e9be8f2fded7d0846_JaffaCakes118.html
-
Size
275KB
-
MD5
a501b5ad3be5a32e9be8f2fded7d0846
-
SHA1
cf19453fe15fcf221df71e5ba9a9d1c7cd6ad8a9
-
SHA256
6414b7dbd3c5360142497c5510375e95870dfe331b5f4abd6626d6eb47e23185
-
SHA512
8245b7e09160bdfca73f09622514438f9804f0d63e61ddbe05053ecdfdc002bed1c5659a0e39c5a68a96e31f03408ba25b94108524bf51aba4856aa25451edca
-
SSDEEP
3072:SPped4XzGYX9Sdh9X+yfkMY+BES09JXAnyrZalI+Y5yfkMY+BES09JXAnyrZalIO:SP2sMYod+X3oI+YcsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c080d5b279bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDB3A741-296C-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000467e4a0fdd53146a93f9309a5f81510000000000200000000001066000000010000200000004db93637e3598d08855b8b1ea358b18863e129c0b76231cea83f383189acdb7e000000000e800000000200002000000093bef5f5377ede231b703c0aa2ecfb09821bbfe1724e4d3188e3995ddec4dedc900000005df2a87d972684dce5886bcc2503c70247f46cbf6be8eadef8c50ab00ac7a39a9168de33799ac1c3e06722d787380b0fe72a9de9107474f3b63b59786be09b5b2b89dc45dbced920e3753f79f4edc8e1bc1c4d476fe5040b3343847fd227f8ac58429f772e7b8badfe73f8696d3aff19f63fac2578d964c998c0c7d5422e9eac8b9ff6cdb82ff5af3f7f766904abe91e40000000f0a73222821a5b632f382195d964e290231a7d48eb8597bb10b99efca660c73fd563589b451dfb6dfe339e825fa897efddf6468730068fb6ac89e9dc99f92502 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000467e4a0fdd53146a93f9309a5f8151000000000020000000000106600000001000020000000df1e7fac65e99db8c404064f6ba980fcd5c98a10991fe26092be59b444798125000000000e8000000002000020000000fa15a7e3136573a0c0fce518e93a7b17cc6bb9e879d24e86c85aaca261ea89152000000023e8ba0a62d488a1c5e09d806fd9c590e0d0fe826705776fe8afbd5aef15c0f5400000001c2677de9467f07ad4f2595c9e91b235fa67e3b989e10430c07c3ddd3299f8b71476d9eb09e77db6666a952ff434ab82d99bcc9ac91a55b6c44834d27703c57a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424435170" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a501b5ad3be5a32e9be8f2fded7d0846_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec689e23a186ed7021ea1f5c9441224
SHA15d43a783055d6c3920f2e77fc80337ba4eac2e9c
SHA25663f36b90e891ce5e91e7c58b13bc555fc5224b855da7d1621797fd53a5fe6ce3
SHA51264662512c29e383aa461aa0c081c35abe5fba054df63a2e163802c8a69a873ce722fb4ae2c7347f22b1828c3201d5c9cb0cb3c1f7998b26bc624fd153317a6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2143fde0d2af4125d75d30e5284ef6
SHA14d4b53d1461487d398402da70c3a2b245ed320f9
SHA256c4c75a12c088bc29d93ef307a6de4fdcb052aeb83102fcb241ebabb904e2f4b8
SHA512485b361e154e7b178f41a557800f754edb212f34f45a9613e920f5cf29d2abfd4edb9827f907bb70ae581a981a101cef2aa0dc025ca960c13f2ff3c6e066ef43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50463d3d84d9a1aa6c2550da58a7d8980
SHA10f45750632d6d4f19d085c91bc92cf3d9001806a
SHA256371c88e39ce0f9569bda1fee055fbd47d3cd7a2110776964a7ace4628b658e17
SHA51266cc10976fe21ba8565035a6427013e47aa9509fceed80909570acea991ff9178e15df0fd21c9c7edab856f3cc4894d36c72f7a1f50a70fc2db95b664cd9651a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efcd7da0d3a3005127ccc0b29ee5545
SHA1dfcf65cf1d5bcce54a20091a5eda8148edacdadc
SHA256490820b10bfe35bce8099d1a2fc01741fe6ec4dd9e46dda4e8cc28825f048897
SHA51256ed449d99be14159ffab93bbaab70d997b4e0069384ea7393858d03352a4a147fee69c09fe20ba1985ccda09b4555e90f92ffa5c63493197301ceec8392e58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379af69061efccb257a4fd7240826245
SHA1f4c3914d4153b082965055ace9c63787bf7cf039
SHA2569c8ff646d732df61bb009c9ea49ac4258f1a71486b833089e77cd214a7448d00
SHA5127c4da4ec18e50a0bc7876212f8df1e3828ae91de4927adb93ececb99fda2186473326865959766d061b6670ea164e00ce475290f73c15021f91aa669d6cf9d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260a1d286ea19b3477b2b24154a9bce7
SHA12c1a55c2bdb00cb61bd823a6a9ad5eb037b3e44f
SHA2565755d2f7ed352fa97d71d1c3f897f2ca9a2cc0fef9a1a35eceda519f6b14cab9
SHA51257e609bf438ae68198b0599de5a87c137299acca99c02780dbbe801fb753bd2a2d79b835805732b375264ade9f597dbeb2494dfb6d486b7cf1676055bddf764f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84cc11a0e5aec8515f79ed0627ddedf
SHA1299fee3892c8fbebbd5fa9d9ca2a3313bdd42138
SHA256119e583f7acee5c763f782d5d9c29dc325c638b41a58267c0ed3af2416954d6c
SHA5125248e8e7b5cc612fd1f6c26dd8626d139f008316ccdbed917d8c595e8157115bb48e327395568c35159b135a7c3019d720caf624f823636a6e08da5e5a0f0e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6eab1eb0496f597d303c40b0f1acd43
SHA179b2a9d8c77527a6cad1022fb42ca2230df56250
SHA2561568c08d980289e54a881bdc77afc0ba72ad23b7e1cf86f2f0bdcbdbfa7a10b5
SHA5121a2436d479e242e423d875436af2c9059ed81c3b9b6dbd9468da63955d506eda3f4a8a9217233ed62bd74eaee7d794629b207a9f39da62fd95a5783350643dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df20a03db9e858f69b2d75ab8bac461
SHA1b6ed5e29e28c72bd493c9b9ad14c2fdb7b9248df
SHA256f17b1bd35cf18d2ba826f047aae1765e21584fa1e046c98577800e330fcd001d
SHA512632d993b216ebadbcc6a3b1bc4e0d5e18984fe3be0814ee2dd9a626c7613626812910c8d588891746cd8e3f387046e4a44e095cf8d1ba804d2943f94e4ac226f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52997fc8c1741048074740d08948fc521
SHA19dd987f0eb90a524338ac259fae8e09b7457134e
SHA2563f1facc83a6fa0450f00edc9887b6dda174d7e481fa6126297c326a4aecb5b9d
SHA5120e132e97bd793078d85d22e1c1c6ac446f1bc41d09f9260c03f4ca7a10290b8205664ed0abff14c3ea4f3ce402641c4c3fa907c5e5204fa911016de4216f3334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5599dbdadec4593491eb1eb8b4dddaf0c
SHA171a06e2fb0336c781a3fa7ba371d2fd200b9a7a9
SHA256ef36d8a608ba2bb2558f72050f9b8fccb80d9723d78208499b6dd8773fcc17bc
SHA512327927e9b3f88d4e994dbb7294bffda9e5fd5dc304f60edd2fb59b00ebc8f9be2cc08f101fd3df2fbbceedff966285186db2f90ba0f91411acbbd1a3b495f96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2c0ec30adf070c8ecc0201842c0127
SHA1eb4b5b9923149efc453298231d20013a0c0b655c
SHA256eb9946f8945c3f2f2a16ee219d41580dcc83c687b651b4b29f8d9384ff321e54
SHA512f8b17301eb72533685b36132b2de0220932cf72ec8d33f948f3a70994ac0cd7d095f7555794666090faf9080ab3404831b3bbcf8864830ed144314d40f12c0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ecca805d80a2153f6cb187c398e64fe
SHA1914a250fbfddcbfe4d450897fcddbf0dfa01df59
SHA2566916beb113e44c74549ed46b86ab4cf8fa9dd9a8fe31ec587cbf19c9c5c9804e
SHA512e125d243f0c57f6d5a7ed70d269de4bd3adbad008c3d3ad6f078c15e1d43e99ce3f49de6dc8dacad381aef135e074eeaf7598081a2e85b014961ced33edc2212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57913499002adf75efb930a4eac6c1d3d
SHA13f2a6a8b1e20676326c23ac86fcf9c96c1acac3d
SHA2560d6533d235bdf6f58a4a2124dbd01d9773f73af13f3b95d4b2f17d4ce8a2bf1a
SHA512898fb23a1b8b6844daf06d790866dffd5c11f4834b6d3952ac370ddb29c02ca87c483894760699785db196b3d9ed3515aef36cc3b1e57d74d3ce807018d8a9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4bf8e8dbce0f20b4e9fcc769df3a3cb
SHA13394c334ea988334b5397eef718cbbbbb57905db
SHA2560d8265b415473f9f582ee2befcb7feef801487fb10e21823020bea9d1bf925c7
SHA5122b49966381691a77867d2c83489f6380b12e925607492ba435c4632b6c126024831fe34a428b2e1b12c27c19683553dc20b46ba53422f8517ab7cdb3b192ce5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536019ee71d11c94b648ce2884bc322bd
SHA11bebc84758d6c60824553108940c4912bf5c88d8
SHA2565272e37c58e1fb0e0a96ebbae0d8529d8a9baf9dd68d864205be82131f79962c
SHA51275984305349a8d7a7157734adac30f34531d3be9fb65675c665201186b1124793262d97d8d1dea5af1b57f4fd2e8d6a391873b8ec04be40246ec1681c5cc545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3b8bc24b5b94be81805eb852e65eb7
SHA1fd7fb054e588332eb1e7af0b6d3db2bd7fb5b7bc
SHA25667007209fe355805f17684f26c9f9b6e1741335391d9b93432ec61dbdae96510
SHA5121d08a0bdb11fed72137c7b248fdc9445c562b6c5693f1fd1b2528b79cee54171b4b446c56206ad1598be0a5db6d1620ef2ca2aec509485fdc6aa0d81ed7cb0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfaf01b712022e92c93aa916bbb0785
SHA1f58118cb5b6db297570ea5883debb0b5e59fb3e5
SHA2566e9afbec945065b41ef9631d9681bb60da19795c9784e9d2f8c2da635ed62973
SHA512a08986ec9dc8e636b9d018809e9159bdd3db2121ea290e8f59ca5f5fbb42a346419c5a20c2b6e03260c494b1ebab06466bd18d7a4a47d6abee21516314c48095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54047ec71d87dda78734aa1af508418f1
SHA16f512c770c45d28f8367773f55a9716a3dbe165f
SHA256f5760880c450ba278ca625eb1713bc3d65ddcbd5f5066260ab416d54de42ea47
SHA51299370ab1813afb299bf6b191bd6e3490ac835e7f7a8e4b0ee0e23835256b1546eb8fc1830163a3658e1380941bb2c244c127faa678a96b712f07db0e48811196
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b