Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
1286e384046777d5e80d31c1729f65c8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1286e384046777d5e80d31c1729f65c8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1286e384046777d5e80d31c1729f65c8_JaffaCakes118.html
-
Size
27KB
-
MD5
1286e384046777d5e80d31c1729f65c8
-
SHA1
cd0c2f503e8d8728de8ce2646776fcf5b8d6f7e3
-
SHA256
c520d209058251664d2f12ab0666869a017fac66e4b67ef4afcf603b802db77c
-
SHA512
45622d57de600450ee0df61394156558d3654c24b49c42b70cb101d93da0afd97ed95420ff02f4ebdbf9d08b11995cd0f876f81ccb91be426aac40d5e066aa17
-
SSDEEP
192:uwXcb5nPmnQjxn5Q/mnQietNnjnQOkEntiInQTbn5nQ9ehVm6M3DFQl7MBNqnYnB:6Q/z4v4DESnIA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CE2AD11-0A09-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607b9f21169eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420983920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000fe745dd444b85231157546a7526b30e86986879da107eeb8b2418a90388b6629000000000e80000000020000200000005db1e1261ebd50e0aeeed5c98c72d2352e03a98d1bd922f15dd0c5fca0ab8d96200000003a288e54cd6b66a8dd9daac774168d83d492e820a1b7243340fc91092d12d152400000008c183ec159555877b7052675e479e40500872634ef14da266c9cb970bbdcb701dd2667828c9c06356593aed53b69dc7e5266c50e70c877fb82d66cd44ba9e8ed iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c780362c080685bc8f4e17ff9611e6fe9f303bcec55f33232b9c415b80ea609a000000000e8000000002000020000000ce396879b050a0c65954cb7392f096e2174c690827078faa93dab73ac3dbc45590000000ace3f1e5520fa20998773f6fc6adad59b148141ca0a9f52aed1a8a0a66df084aab44c7320a2ff426be5eb8edc3a8394f6b377c6d2ba59ac9d12e67ee4559e6eb95f408f6e4fdd9e9e11138c9caca00ce359aef87446466923200b0ae6ba4c9f19e46abe9081f760f7e5b635424e717830ea6c77647916ff108c0d3720e686a188f60ef0273abafed0f7890f8b9bfa42e400000001f1ea3755ebb127a77fdecc301e90b5ce8af61ca323d6b98bf901f2157330810bb305827265c56605ab480b5872db6f9d4713af232f1131c4d4abf28458f63cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2476 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1286e384046777d5e80d31c1729f65c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9558d5b1667d508683dd439d3a92df3
SHA157225058f2e31c0936dcfa286bfce2ce0b09a708
SHA256b48a898d4c9ffd4ffcebd6a08ca99b59b24893504915dcf8dec6e15ce52f74e2
SHA512cf576340f34430afa0aae144039edd850a26a30ad72d9b56955ddf069bafc9eff73aa937d61acd01c329b3ee388e1f033bb3ef7ac30151f317a51e733e34ffd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605b2015d46da7e2c770bb468b23a82e
SHA1ad4cc18f6c8a929da2738e430a7ea112a3d1c981
SHA256b11a6048a6f30e6b8c46de2a2fb2da31a91ad58fb4d4916199614bcc07362330
SHA512d964b66b20846ee0213702420f1281f083379f55a2199bbfdf36c692aaf25a4885803276b4c478eb88d6ea6570c45d94f6e5d03dec6ea31e908c6743dbef8bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54426ee53733e3593d66ccb21355026fa
SHA14980faad24d035adf2cb4c67f11ec113cf571b9b
SHA256aa4d683fad18b01852c164460df02d4313c0aa4aae79368a2f8dcf6e130e7bf8
SHA51205884139641963ae9f59c527950a65c7d08f2b8698af351ede105ea8f7a064269612ab2c6b00a2784bc6f770e772b05b30c1475fab62d9432797e74630020b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d356f87e86cc6470e19982bbe528f343
SHA1e993a800a36051e04838b932c6b663c74b83a415
SHA256746620fb8f9c7201c843001499e67a1b0d49a398f7a4bbb50bc207926f6779ef
SHA512aff23bdb1618ee9cf74562dda849408e80a78e4efef9c60fc83bfb69cd04c38cc67ab3b43b6d13b8e497b55899827c02e1cd30ba4b754010f08ab5a4a2128394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e4bb3a3d2ca211d5c3c35d3c7a2d3d
SHA19f47d80a5e5299eae36db621119614718c2a56a0
SHA2569f8309c4d8bb6d32929b32bcf409c274fb93ffcb7838fcffd3bcd0fbe630b4ed
SHA5129060675f407fd294ebeca6e5efbd73e82cb558da694df7a1da1dbe79dcc2b9caa3d00e668a509ed5bea80744f60c626b765fe61ced35b4f6208e3d6d1dadffb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff632f190fbd7700e314293cf046f2f6
SHA188081cc31404528e00b32dd2a17d89b001d74bf5
SHA256230104e79b46ae4b9937e99dd25777bb2fd541c134bb022b75fc38df8c7d9972
SHA512b3318c0eff40cd39d3a0275d61ae0fed773f6c3187e094951baff3b72c4b57320598b141864cb0bd5498d0608e64b446ebb34a5c5c0137f47f4465cc9b79ed76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e103ebb17a370cc2295e98526692b96d
SHA118e2dfd0fbf982570a5ca8970ad914a5d0c2ecea
SHA25615b48f6de1355c3ae505b4716421a532f5c10b58454da0e5b1daf2ea08029ce0
SHA51281b9d75a84056e112a82f744b061093ab3dec7bef93c53800de9c606829467443356372f34fd23359424f5db4ef062c23cbc3f37369669156591c2a6095fe9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55150b9fb1c1f7d59210ee138cce37491
SHA15bb38117f4d0222078fb119c5637e1d50f9882b3
SHA25668a1b9a9d304f928153eff4239de849d7194b2fa153c1cfe73108cd148f14803
SHA512598bbe2d1b9200e603ab6d8998701724ae42a5c0da7222fc7e4d2034b79f8ad6a881355f6d76794c73cccee5d36b11bee202dd06324b0cd941b75d1831c69838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07426fb8897e7e570d802a6b3922673
SHA1f4f5c80382d19b846af1f6d81aa6c6497357cd4c
SHA256cb942b722482b43bfa8517e4076af15d125327ebf10653066dce4d74d83d14ec
SHA512497df2d9be3ea53740a921f0ebffc26d84f844cb1f74d6d325b77a2a19bb581599240d24ba1555198f18ececfffc27c7ef008051aad14efaf21b009446542724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ee0d391db047d36c06d9204f83a6004
SHA13e3643bfa6033bf9b2abfa8121222d946ba59cfa
SHA256ea9cd61ad2b2eda64242e3f7b37d201fde7ee012d6240ccabccc5724d2f56d05
SHA5121efaa177994f0ed31c86a4f5551ce3d0692550932cdb447bc0b0760dc10ec93d159824494f716e692887dc8a407df59f901ceada67c447182373a7778a4ecdab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0859bbd0decc03f0416ec14749ba2ea
SHA1134f53a00e09e63dfcc97838f6736296df907587
SHA256f431959534645431882dc63f1ca0b81f5bc1c0101c3d77340b240e3d9643e6fd
SHA512dc2156f8cc7b9b13751e4411d88d2229dc631a573d5d5947afce05bd714cca9de567a481ee7772871d0ca9023266f509fbcc34829f877bd42cfe7f1254ed3b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551fafe78f0297f197e9066879b2628a6
SHA109b7595a4408bc9a254220824c5553652f0bf73b
SHA256b3b8dd3b362d229ec5ebed3759c83d0f7aa96f15cf049b6a94c0c310f22b9231
SHA51213d61752b3048af54cbd226e2d143600db97cf980f44d5a0661435e580ac9ed0b62fe7641a9e4a13d8f18faf35dffd7aa7e113af89aea7a91077f2c8d4f2f81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505204fcce973ba57594ea807f00ebce5
SHA10c692f0616df0aa57850a321ff88cac0564cdeaa
SHA25611151424f9e076490c6bcc2e21888644d367bcf859c4d079d11caf4dc6548876
SHA512a6a1c46723a5060d1de1925c94c1a8542c3f40da4451a6b3f96ea17b373de4d723b17d861b46a00fb030807a69314f28f7662077127b27ee2710723036645393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea89079d2d985faeb521e8c7728eb9c1
SHA16a34aac78f08a200935826fc78bb089a6eb27323
SHA2561e5b97b6af7c52529f452ef72da1f13c3ef571426fa9b769767cbf373a6129d1
SHA51212a9951f61d2ef0453adc7362f1c0e3a888d090e69a58404c3e348ea722f43653a1fc3568739c55b3ce309a830805023ede31bd04f61c136842d38d7318be8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf665df5b84e473bc02935bbf445af43
SHA16ffc82a785aba5fddf2698007eb8bd7cbaa23274
SHA256fc9aaec741f2371f17201e05f3ef0232983996a1eb0e45c755eec1bc1e6b98b2
SHA5123f7b05065b35001bd2f73597fd0b39c0d392b8b2cbea157902008a45890fbf9fc686bc799a37514e83081cabb17b14e33a106a1fa3d834c91f26faa72952003c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec30f1e63dbb79b43667eaba946f746f
SHA1ce03f8e96f1e384da61a22302c69d005f3cd73cc
SHA25622f2b869e8f0f1f24ffcedac6d9731e640020a060f05d7809bd91df8096e8c48
SHA512466693fdd6f2ba1ed03f75d808887516e4f9242e8b30835536fca6a408bc3264da3f9350acdf964a8b2da8d15ca2ee2afc6e99171ff4b42b7ab46e2f5ed4183f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3dbe085a3b0824948607d5d192de2a
SHA118549026e8eb1954a5afeca6166d9452c8c6e2c4
SHA2567f8a811f024de2523b6e5c0435b560b5b486240cf34b237cf011dba27704ba86
SHA512be1ed72e38e9f0edc5ac232a3c23088c4aab09a19079b1a79d83a814f7675d90d92d91de40ad7125b49cc0c1a914619a09a457372bb1402c9288bfae1f5c27e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528229b57e0c7197ad4f46e526c2d3a33
SHA174013449f3b15bdcc9bdbb30dc5b9688b4750c13
SHA256a8f4219969195a4c0a1b7aa0ecc039e49062b5fac546b4c26461ddc3585eaac4
SHA512cde20709f651b762b402f666a81c8c6da42f553e9be39c84d2589973a591836fa83b9a3b2843b0d25318d5aaa00b1e21385f8d866c2c079678551cd59608d75a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a