Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
476d08df88ab46b26c46f2d3774c6729_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
476d08df88ab46b26c46f2d3774c6729_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
476d08df88ab46b26c46f2d3774c6729_JaffaCakes118.html
-
Size
58KB
-
MD5
476d08df88ab46b26c46f2d3774c6729
-
SHA1
3c6183e842392ead8a3ff4e336635cd7f3ed6944
-
SHA256
16bba71456d20f57dcb121d3109260d0c45510a0f0b1581ca8ccf93190ee20ae
-
SHA512
5889d54afdb075de7d1c6ea1e752e7d7e91e3eaff439e6f45496de121cad82b9a9a947f7636c79a4c1f62c3ec7de79182120d42b3c8d9bd31534dce5edeb935a
-
SSDEEP
1536:gQZBCCOdv0IxCZzSzfrfAf1TfSfmfRMf2frf9fFfTfpfufnfQf+fDfdfcfrfafyL:gk2J0Ix3jId6u5M+TlNrRWfIGLFkTyaL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427164836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60815d344dd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000e5e1e5cec446eb0b4f627a4f7ba479e41139106ad96aa996c3e0705d88dc88c9000000000e80000000020000200000001f1a7079ae47c813c0ba2663db15c0f32d17d8ab3df65aae7566cffca4787454900000000654092521b860c2bf0f7289dab1196290758c23ed49e56fc05eecef04a5d5b37a842629d9ea169c15bb92da11086606f12403168c9d2615f91ee8915ccfd274c859ba58a9e67a8ff2cfd40ff035b55256e945be540fe345390e04528f24b8b74b329dc5bf4a1f5a6ec3111da5ede2fe2cafaa6ef15340269b332d37109202c28007f5d02b8cc11206c1c1ef05ddd08d400000002b676ac628dfdc8fd0d1f000b75bb0ee4472154096034c9da3296144cb18e2222bcc9322de3e67ad411fc387b58c36dc0b6a97d074ed7fb7b1fdec49c338e995 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000e3df9d461a1e1c181975813d538d12df88da369a2bfb042a7d3a8fb74d49bf1e000000000e8000000002000020000000d18cf9f405a3f8248044ba4bc8d8f92691110cc85e988c7cf9144968f8eec5a120000000fe3c0af2ebc0a198ad015196f561ce3ad810edcbd4c2c391641a59b6e67f0032400000006988f6f89447362f23c659052d50913e527a82bed62837e724a8d9b58e07c0a9b991d419207af2490783d28d6be33cab9ff6c158fdc5fc2a5f2f072325da0c82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D6597F1-4240-11EF-AC89-C644C3EA32BD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1616 1760 iexplore.exe 30 PID 1760 wrote to memory of 1616 1760 iexplore.exe 30 PID 1760 wrote to memory of 1616 1760 iexplore.exe 30 PID 1760 wrote to memory of 1616 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\476d08df88ab46b26c46f2d3774c6729_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e580cd6d520bb1c7dfbe93e3704bbde5
SHA146db1987bec5705726ab87c908f812b588d14632
SHA256ba79b5c01643b4c06eb3011ed5321af322dc9559eb8974abf886f580d738e3e6
SHA5120ee40882a12508d5a7264f8cc48708745db6a73af49d56c89556aea192fb7f01192811371272467a552128c6a9bf94dd15d154bd72b99fdcef423e4f244223ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37cdb9f1c16d5d6431bc2b614f84874
SHA1fc33334ae8dbb6da419be6a13a840a9601e80e86
SHA256838e811bf23b6ad77802be0290e6809702e046840cbecad0b5d13925f542969c
SHA51212fefe7de05578f286bb613b346c331f81352c3e7c17605851a66652f4199c7beecdad5e48de113b9f31c306ab768bb72283bce0f23b3421ec23c2474cd77514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb899636eca9e37bf78ee56b7ec424b
SHA11e694af510298ef5a52d3cad59db2adea229549e
SHA256da18a8f02db612c40f5233639caed9a08b40c86778b085fcdd32da58ee26c4fb
SHA512b836f9032a6e60cec5fdabcca279c356666475a9cdf497dcc6da5aef8c00113d2635934dfc4f98ee3ab5e787569b1da10a37c7c92ade997ab840203aaf5cabe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394cc164747747f6553679b4b596949b
SHA1fde5b15c8bc1d0d891d83823d351b9359dcd7176
SHA2560397e121dc20d9ef1037438df8ae8989c4b9b6812188cfd12b2db2d1841c5670
SHA512f84056d6b1515d6c77ed5da1767305b6af86514ed3ff95587c62173e6af07b2c0c4537b08c1c9c48a07c60564bfbd03a349c7401ed57b13b3128e841914a4b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b3d67e68b19eb2ac7c2c76db464dfe
SHA1393187de68602f9307e7bda4e0ac1021ce503df1
SHA2569ecee23ec56057a7f6f172a1fb3188063f9b67a2979c99842ed8d2c98e60927e
SHA512e925a5e3e04a4d60fa89cd39b491201daec82341fdf6c6a619398c282e6699e2660b88e72453ad5df0f62ecac6a98c8417da1c751552e4005427abcf509df03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53372069c897451e1aefc5e62bc33aca3
SHA113924c7b34d10022e11cf61d7f11c4891dfa1efc
SHA256f3c3bbe8342dd5bb36504f03b9ec42d847f80b76f68d16c427830591283f9e75
SHA512382649abefd247d6ae28d08574c2f1c0f63eb7549d8b09819f534df1149f72cd7d919f5067fd02846768483eef79772f1ba5688f77d53c57fa42d65ce2face63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d415802116cf9ae6741e6ca2a9efe13
SHA1acf3e78417b8d728a9247e99e03f2a90260992fb
SHA256e2526bedad1f00707da7fe1e9dc7c84a880accec46141cd709ce529b9bbc7ad5
SHA512618fe5be55b845f6bf2d2f4ca2fc1764874621febb9ebb1bba4ecd6be2917195b99277d843d84b55112dac7346333dfffc4b1b631644dbef6d0f2a5d7de713fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e40da622434bcf3b0d2fdbc976bd7f
SHA12e8cdc5507c6dc166e2d2a85c15f74fc0c2860c7
SHA256c46691e6727d1cbe7c7fec5b13b7037a970f712f550d2df59e91bd11c1cc567f
SHA512029cd9399471ff3c43c16b7f7a122cdab65b429c4f21334912b4d7c15a6d28254b755ab16c9d898717a2dc0c2d438d9abc37f72eec787505763f2bd2592b3069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53052d22ee27727e583ec7d6a003e2ab1
SHA136f6d3a15c143ce88795c2dd55ce5499c05e79cc
SHA25690c170bfc030955e2f065fc07662bbbf06d3c67484f2a3a297e1a379e1509b7f
SHA51265b530ce9e64f8020ec24fb0038625240587b5bf74f16de716ccc35f406ccb0f7bf00faba145d005015ae1f381396a0ff74e62f392e405e86364c6052fe69340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ee463dfb03de166633757b288a5748
SHA11b92bdf78997a30838821ce63886b5623e522148
SHA2562fafb96280ff75ff643fd69bcae8d13733beb988ffa55ec7883c9c1214878436
SHA512170bb8dde11b97a901fb6cdd534629d4dc22e5db69fd9cb411fa90cadbec12ab41ff49accc5e5497005526ee29d381e4e1c2472e151f3ad606afefc239273124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a523ec6be1a3ac7411f33720c97c1f4
SHA1225db4298518ed485b12cf8fa2512c6834956b5f
SHA256a81757f25a5ef7a4f4450eb494c5a9994856d58a4822e117f7b95584c1f65595
SHA512b8f7165228fa5ae3b63ed5da59284e0c8698cb8cc234644d0b46044f8598c3fafd6a18eb6b507e6bf21b8031856da336991586bde8a370a88984464a21d8a9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52caeb7b63f123b03a10d6eefd096bc56
SHA1429500f66f6815ebff782f6105a8c68ee53c685a
SHA256be7bf4cbf7bad568f0320f695acf16f350f07c2ad478c97fe3125f698baba87f
SHA512177742c0c4bb97c0156a407d266872c8b2dda163b627a530504f3f6684a413140fc3ce8f96a856cdd6ab0a9ca58f582b7da476d14d7f1ab020d1a92f84acbde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc9d609d903cd880ff340c64fc61bb1
SHA1c3f007d37d5fd7e41f8a42e6c8e77e94df382731
SHA2567e6a52186270624b01108df22b84dc0b7a09f3c6ea3e49ef8818b5874f38af4b
SHA5123b12e5ef1d28149319343b410e2e1dfd8d452b6e053150173855aa63cc68160c779f7fc7832779751a1da17567b18e826971d3efa6f855d8296f238383a3ef8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16cf398e0e5f6da8617cf48aa407d01
SHA14fcd7e7426abbf706b9cd164a17e80fd9f10d211
SHA256960f7b40bfd98a667dae6b822c057eee6cf582908db9220ed3854d87d767b7e4
SHA5127658ab3f3f7655439d1b845792d488d3597b1970681ebdf414a98883d4f961cf701b8fcdf28331d96acd58b6fd530d67deb1fa961d8823678ccfac6c9ff2710a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5548247a5ad3ac27e7fc729a796385
SHA18d2292519598a733e2de793f136bcb3ce2bc0d3f
SHA2563bf42d5d63a664ca9819a73d76a1d175cd7ed00d96eab7d161302ab88dddae6d
SHA512aa9a0727c2aad1804f83da89027c3b43fe791f0e10bffdccc83d449f985f8cdd07507410d0a5bed1675f85cba0132045360e7cd0bd6b6812d38076953b4a0e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228bb8d857cfb68a466313cb70541314
SHA129c703648fb517fa33d6dcc23021a3b209983bd2
SHA25658b44b0b6bf906176438cc92fe7ca681857b048b2862cb0093bc705124921e7c
SHA5121b2ff0cfaa60b683e24975609cc31dcfc28f31be91e158d51a43b3a276189c047cc09d8ca91ba7e6682007d4fcaa689fef30104a7242e4c54202ff865d628558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf5a1c354e9fd15136383ba2d1c36ca
SHA103741199d797315289206b0bdc24636f24d1d3aa
SHA256ea7832d0e6fa097ed6c43b6d7a6cd6172b6572697d13471544d532ef0eeb5391
SHA512e7996ddce9cdbbf2b7c05dda1eea7b98b00c3f91c6a3cf59e2888131c751a7893ca200cd6064edd1d36ee7983d0e10edde8c7517f74facbda1c86d4d34930c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575c7bc435994b1584a82cc5d78c369a
SHA13f44dcdd5119526f6434f931d2dfd9b24d3d74f0
SHA25675a70bea8ff8d62837b9d96dcd1f9fd84eab1d65f4301d4da5aa23430d0f51f0
SHA5123c3b0679b4a43b1e0c9c51d9bece2539e649a4a039c487e9b41b7f637274d01d7c672bad3a50823ebb1c86f62a24c78604b2e93df853493946160c3403ca3072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b970954c5996990ca3c28e228e79f19
SHA13136191a55f2242cd3e7b86289c7692ff8ba90a7
SHA2569b48b4593191cdcc941cf940f04c47ff68e149ae989637c02185ce4524d88525
SHA512836a2a0169994e0b9e501e12d6c7cc9c973f526adaa06fe28db9f686e6fa101a045c7eddf83aae51130025469cb622d6ec64746649a82fe4aa066b9214654166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a33659da99d45157437297105a0b22
SHA1bbf5ace80f00d2ce6c49add42e7725876be41cb4
SHA2560e42261e9f6045f22a95612ed09d7c1e2c965a077a3dc6be9b5dbf6abce9dfee
SHA512325b31fd16f509b22ab226e4dae87880eb64a7b49399bf1da32d75e4d4981ef03fccf72fe01f3649009a7450b933c4a243fa273658d09143d8968ddcc1b3e592
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b