Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
88ec9260b4618bd5ab2e629843fc55b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88ec9260b4618bd5ab2e629843fc55b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88ec9260b4618bd5ab2e629843fc55b9_JaffaCakes118.html
-
Size
94KB
-
MD5
88ec9260b4618bd5ab2e629843fc55b9
-
SHA1
79b3b43dad4e3e34d27f0c906c64ae95eb401e6a
-
SHA256
40f19d31cf878705820dbae91a93c92fecd8ce92d7efe9b055142531e33e55b4
-
SHA512
44b6b31f0dc068541fa48609965a815faf413e834acd8e2397d89c706043e0b72d3cb8558db5c1d484fbc2c6f5c5f6559cf6c17f7182385d5c8e20ae8f50e391
-
SSDEEP
1536:WMLiNVqSFL+W61Z6az56647L/2jPfQMvyMZ/PZRBdkrY8mgHC+qpEyW:WAiiTbBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{901137F1-1FB2-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eaa48cb83583c448201b06a7cf3076100000000020000000000106600000001000020000000782e24d1075f7ad1ac55ad84a27611defb6e59031af97c67019eaf03b998f95c000000000e80000000020000200000007838a706c074e07b1848fd34dfdbaf5a0f8afecdc47dcab990bd465cb23b844220000000f6273f3bda13a6b60628f953007945fea267d8beaf23aff206f90fb54960227540000000f55953f0b5637e5df5859db47cd9177defc0512223b2ca255dbfa47238e10e1f9894e96bc9da5c2c74a36e18ca3c0eb6678e3ddec09988e41b4380184cefbd0c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30033368bfb3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423365594" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eaa48cb83583c448201b06a7cf3076100000000020000000000106600000001000020000000645f3a2d3b087f86fd214869b508c0d3d0efbd191c6e774c3c7a8cddbaedee48000000000e8000000002000020000000524607caea72c8aa6f2b4f4439a396ed4158dc1d4e788dd4a79494506918298790000000587772035ad79ba925c96a40c00caebcbe61e67ee4e9181a5d33cff34b3a6324bca3ce9755d4282356be4cdbd9268c4042bffc55864d2c1a7a89bb3d1c9d587d8236f53fa8d1c4430dfbdb76c3ac5095264ad3e99f61dfc1ec7f1202cc70ece968d91ac25ba7b18a69f25303650ecfcadd396172d1370951e0c3f13e9d71611c3430733041a24623eb7558106e14836b4000000021a4daf800cdd70361fafabef66c20306f6978d616def5b2ca1b0b3f18197ffd299788ac1bd3ddc11df985cf5e3c9b3ba29236ff92a3182a2a02ae32a436450d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1340 iexplore.exe 1340 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2264 1340 iexplore.exe 28 PID 1340 wrote to memory of 2264 1340 iexplore.exe 28 PID 1340 wrote to memory of 2264 1340 iexplore.exe 28 PID 1340 wrote to memory of 2264 1340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88ec9260b4618bd5ab2e629843fc55b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae49bef040fffed357bb4408c8a3ee0
SHA1a3cadeb1ad7846cd6ec5fae3cac369b35a73a9c6
SHA256529381da34d50ed8423a541a4876ea36e8452fc56e0175b29f8d4486592251f5
SHA5122bec71bc6e1f66ee3418a2880d1673a56cc9f1e0dfdd38ed820e4829db743cfad15ed155208ef6bec0d41b7a6ce81aaddb915347bf6912505bb8dace7e3748ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f769fc4dfcca57e0de6d967f39eb726e
SHA13da0888ba1d7e1000b3e2ad6260795e52392c4b1
SHA25662ff75185a195fa8fbf9b18db5920a038088c906445e1b68690d2084f0c13569
SHA51275b835e86a8632a9ebe4e6d7e886b7c7846dbd5bb480fb3fa4ad54bedbf4265429f433fdea24aeb02ae047511a2a678e2125557bc8653312a63f1d5fabe74cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf340c6dea70b17c3b33509006336c6
SHA1bec67d1dc8ac3c0c3330dc92973130734630745c
SHA256cf1c8585ebbb3131bca398d8a1255a208a94994d4127172ada2100693655601e
SHA512b98ffcd2a1a807722820bd2adbcca536fd4c5a80a0ed0b98a9725ac369ba32afefcb10c20239baac2d72d4b9b9b141f81d7ead60385d555aca1a741b29a3cc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9146f35d45d6b4db91644251c36efa
SHA194f5531547e50d320668cd59118a6c959a49f02d
SHA256ba17502f8e4f1cfe177ca4483a389840a5b8c30a627e88d4ff80dd248c343770
SHA51249b900eaf10e3b32cc4dcb1736fb29fe33b84d36a408e9c4d7032985b87d2275ef81f5d3ad181f1ad28779c732a6d45e7ed49ab35e58930b53ec1e91ae344f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ae63863bccd7c317924e2304182e23
SHA1b916ed95131a252dec3d229ee637d509ffd3dacb
SHA256b026e5494ba6b2cb8e9dad3dee0b3f19ebe2abc1f963f98b9c80e7b9c8b70af6
SHA5125c4f74e16b3ffe946cbd002797dd31c28e749c01c513fbfd0227185260761ab06722e52d9a57eb4626c75a8585b430e3c40588d0797d0b8ba2250a1cc4df7c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d210aae3a1670cbbed53b80e66dbee99
SHA18adc2fc3cde22308ca3a212e85ff9fb84c5b4338
SHA256bd51144cc3c79777f6897d92be13a059dc1f425527634696bf10006972160246
SHA512b922f87fe3cef8703d22e4d2dfbb4091c763527ae5f312d5b9b932222292f066cf935c58751dc7b0090a192e1f57d40dc714510dd9749155535e3214ac1ac925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcec8f464da5d174957ec0902578119
SHA19084843c7151ccfd8eb658d17cdd06c7ebc595df
SHA256d33cea655192cb3ab501e63c87205bc03af0ec99d45439fea5d6220be0c9a67e
SHA512f4ce9bc9981d5a7b8dc71b3f33f241287705e79197972c9271af6d539fe828e5d103f9bfa7572855fd56a44ba5457e7956f9530d7b383f76eefe036890300c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56358bd038f80c751571880460f0744
SHA11477ae57d3c3126817e161f2f799842a47bc334a
SHA256840169abced82d2f5e611941517c839ec9060ea9c10f59a78d8e9ca106568f30
SHA512984642a3bf0c8adb8e224937be5ddc4b1023b6b8cc437cfdbf819fb567f67127a6ee12da2a3f10e201a7fc374dad68787e63e1d1e8406b935916e6afa86ba81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aaa0f42eb1f27a4ac16ad368f7611dd
SHA1c1a9ad4eb785b69826ee38ae0de92222766e0438
SHA2562c23b26625408a5a844b4a7de0093b487eaf9c931ce3bf824864941a970cd697
SHA512cf82aff23b9394a15ec90bf8dd1c79bb02f5788d772a68a537659990b01fef8072a6f724abeecc9143ce47b5c50c071370b873443586fd205829fd83e2027910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f401d41d1bbe6af57149d6c9b3687541
SHA18d8854906a7b9f28191e7f962f07bad8dd00da9d
SHA25664c9a48d014a0704aedcd8713f6ef7cdb5827ef92dbc5087f9ef3b2c489d3e46
SHA512768d32c29592c074f660c6cc662c41f94d52863c32077b2cd3d32fa05c905f33ab4e88274cac996a8a5326df5b282a151695ba367ff3ebe3214ea1cb6edf5d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfee229a54808e94daba06c8ff0f5dd
SHA16e7f4a0e05b6a64465379142bad660c6d2b8b901
SHA2561d4089868f54148fff0b8413e4400b611e045f579177caa3f8802874b2e826e0
SHA512e400897755297e712d419e454b5063791aeefc93e4b8ebc54c05d87c05d16e5277afd901611d59aaa68b99dedc3fd24c970ed17da1b7c608eb3bc6cefefc632b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d788154dd830c9656601011c41aed92a
SHA14501ecab7677b8b902f2fb90595098da8644c200
SHA25647a3dc615245133ad99b280921964f64e2088c287ca4cd79660c9a11c53781be
SHA51248b98b009188e36c900e52e05288ad304119ce2cee59b352b37a17b0d75c80c06af0565a1d674cd16398d1844ed8c614267dcb28a19e6be67e2c3c7d170d5f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b950085d732e16dc9458daaa21e297a
SHA1d6060e3063f4c0e12ff2d70173e99bd3b6166019
SHA256d0e95c107a301084c7d56b3acd4d64041d1d3552457927140b23b731888e2fb7
SHA512f79da2aa09b931e03842ab1267f50b37e18d191ea3ab7f2528b8141a25ff3f36584ce5ac24a1b212b658e49c9d7ff39997b7479a7837f28738d071babc7edb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ae3329fa643090d090ca8d3a858f3f
SHA17b53f380a30aa4aadad3b0dcea8b2265bb2b6b7e
SHA25609b222bfe498aa5789681c46822ea4a35f5e0d4ef1f1653318e35409a22ca7d3
SHA512cd961c882f68bdda18d7bfabd7d75b305909d77548f3be591ba117e1a6056d216eb89fe73f70d081b563ab53571edbd7b6b1461ed1254fa31f393c3ca292aa71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac9af1ac4843576b0014753c06bc001
SHA1a5325d89e45fbafe0908073ee9b9a811f0eadfcd
SHA2561bbedc8dc4420237b59aabd7c51da5f9ebb1265b4462ae1f7c2b990e833bf059
SHA512e5b4b1b19de352d50f892451240607819ef5691ec5a4316916895eff7621e6841313417e6d8a77809a120ef91a2dc1a78c4602afe071623ee9e2100f2524df00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffafdeb7a2f817fae35fc2580547c86b
SHA1c06feee0eac7814df2e5ea07beac9598bd3b006d
SHA2568092e984ba6d2343ce20c2a78305e70747123a942c93b258e2879b0f70839a95
SHA51278370cdfd1d588e1550cc4274bbdb88b940a9258b4a3c894dbd847700db87cf5668099af1ac6b447da1c615a439709f3da0a3d56bee4539c276f29f4d3ff8beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ed4cb1e305d43d95e1bee86f6d9a55
SHA129c856e2bf275d2601597d27652b79229451ee57
SHA2561364513258fba8bd8274633a7a3db8c1db631e2fc34000a0365a4004753efb70
SHA51226f01a94bd18d925249523a4da8520b66ad761f5ef83c6391f2e01df33d6899a4dea979ec35f03b7a56c0abcf9df7b9a88bf67897d2ce9fd75662a2cdd148208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528690dcfedd7fbf597c8b8e457e49b18
SHA18ed56ddbeb9dab26328108c75420239648590f77
SHA256030f10197114364447b09e240c0719e9dc83a9f142e762e12f3a3638dca32a43
SHA51279c711b816f66c20e2a387dcab052f88ec3ef7c0c0a8d3b1b99deffe6710a7383435da09fc54a6736dd8829b81b1f41b42b10824746e1ac919ebc63ded90d468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53659ebd6472aba6e58a120728f36b0ec
SHA1d369522be9d1ede00aaacab0624e5703772d24cf
SHA2562ee37f19da9e40ceda4e41c0fe9eb157a9a2e2b9e66c4f752f4fb95f0f2dea02
SHA51288b2b438072fb9f3b886e6a14b22f86bc0ddbd0953c8833325284dee726e71e254a81e6db78d3c0da4e4be6fb6935aef9d507800e8b85460af8a210669c058e0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b