Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
917949fb19273e96cebf49d2962ded97_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
917949fb19273e96cebf49d2962ded97_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
917949fb19273e96cebf49d2962ded97_JaffaCakes118.html
-
Size
3KB
-
MD5
917949fb19273e96cebf49d2962ded97
-
SHA1
0ffdbcfa9d869749376f5019eb825b70cbfc5466
-
SHA256
2ebbe865e31202c719c618056e7b6b6fff793156fe529856b11765c7beb763d6
-
SHA512
b3e8f5b57bf97e05db3815b811a69be8b408aefd7c1561ecfc18cea905239da1c0e9cd62068a7f64473e65e09f7dd3ee47a76b8d443c4f97a6bf85a5fe98fbf3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b460ad32e47fa84f816f2f68d586c081000000000200000000001066000000010000200000006f53bd55adbe2a0af3c697a6b4299738625413e3f2608a83f68a51b0229a3d39000000000e80000000020000200000003f62339a754b9ec2345a7e4a22ea21fab9adef2232d699bc230fbb44d590b16620000000155df6c6a114145c5b5c2e211b75ab4a88213cf11681f6ab1b9fd55824172f7140000000e43d54b67b7717c606e7508861447b0ed940d290af464510693ae0034cd30a592d10eeff364e7f419fd5e01252419cf27e650ecb6b279d2606c32ba24a26355e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423573008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b460ad32e47fa84f816f2f68d586c08100000000020000000000106600000001000020000000ab6c949add8fb30b9b7d10a399575ee1da38048f9f20d9cb4a68c8bcbb7919ef000000000e800000000200002000000093b4267ac3690f22809c6cfad930f24946ee573b5f8d10b9de83a0e754c7fe74900000000e3e477b5f7a2007996cc06b352e7877581cbc4b18069c48a6f688f0ac114ff8419319988c60de59a4f375075a95e0c00ec4a0442dd87ac43de05162ed8e9712ef5ca7cf8f59e7e89f2c6eee5008f3446c3d5f29edc879065efa8c5e74dc0804a984d35acf3c76d94d2b4869964572f1c6b55a510260b81eb6d0c4604020cf0eeca1b1af085484dfc1187b275d6cc71b40000000fe299c7b1a67f4768bbd9c3de96d2ed196f3c2f4318cb6cac36d2f1da1a30e402426c63500fc5f4da0b6dff1eec31e6a58c67299da5cb649b8c7730bd3c959fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D142A61-2195-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01fd151a2b5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1384 1132 iexplore.exe 28 PID 1132 wrote to memory of 1384 1132 iexplore.exe 28 PID 1132 wrote to memory of 1384 1132 iexplore.exe 28 PID 1132 wrote to memory of 1384 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\917949fb19273e96cebf49d2962ded97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544f09cffc5eb627534714875a9a7036
SHA13fe16dcaff0c9c90b76dc77d6e83da3da73f2221
SHA25635f899d1059e3c4c4317c61b30c93bc04f80358d91a3ca4491af4b021bcbc366
SHA512f8ef250264b6a42f84f65d2b09062028f89429e552963ff6731956aed8cce5d7dd6ccdf806e42c3f1f4cf7d346d76e8f34d813b4fac7f926a90be27c8f91de15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa3d9c1c168bb8444eebd3058f1ffbb
SHA142cc1a01b5145804adfd1cde7d4a5a8cc2858ca1
SHA2565b9f55a6665a58fcfdffe3c6296ea509f333b7eaaa5030747a9ed8def336caf6
SHA51246723750ed15c15d46d3cf1b372e9ac6bde9898c9602b372338953c63935e94298263f601f2b098d2eb2c7e3b3ed1a4721cece42d7c4f5d5b399ea3a47f8bb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1bc210cc52f45d397e5402707eb98f
SHA19ba1dad741205b70c194fa3826b7b8cd043c9c39
SHA25605bffa10f6d043774a7cf46005a6e68d7961132a6861ff290de40c95d985b208
SHA512059bfa90a2fe5b992bc96a820e2c4384d26736303c9de2be6a31dbe63604adb3d0c4e42e532bfe6e73404c48d745739a34c2c1bd58b277d54029dd29ff482134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7b140a26d0696df05bdfdbc05f4e25
SHA1b4e6e5e406756d25c8958d9aadc18896d57531f1
SHA25624a2bd2dba911605a032ee49268c0dd4da30fb872fed3bb3d8b3d0f7d6684439
SHA5121324cb70ee63ba970019cc7092b1748cee9431ca0edc5fab2239dc972da65189449484638b78beaf96a3d1e19349b1c9e841f465ca34a33a0cc428f0de250cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2bb925fe91a83ca7ed696ed50daf48a
SHA1e80d46858a5a772cd51ab79768ac212aa4ea6d7c
SHA2563f5e3e0f3c8a7e9c8274ab87086a43d6f109e0bf55f12478b007c82bf612457f
SHA51204713c12b6b8d62d2da34d884e80c3e63f23a7e7a7dbec93a0f3a911b00a21d4fdcdaaabcb8cec098207b4ec683a3c9f3e90fcbf62eea560326dbe38949bf6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4044adb7fc2947188b2dd01f80cd6f1
SHA18d4e055b7a252c07ecc12caa365b99922eb6dbed
SHA2565dcfee3d22bd4422fe7183bc3a644b79ee3d88657001f527a11e1e575f1a2d2a
SHA5120e7f3487e317f2f26fa58444bd854d8dd03bd031af86b174ea9d8ffbe55e6d841a8f1d94ce7c3e3e0a7cd2f83c2e5e5250781e68e80092553c47016397ed167c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f4d3e7f98bf93fce433a3bd97b2d84
SHA1d2c8c67f5fbca49ecb93367e8205a05d5970c61d
SHA25652949433c798df8c3a1a3b4c85b432afce515ea29ec0966336bdd0eeb6da096f
SHA5128d96d0801c0f0f59ae776a8a0723608520114cdb96b60d5c7e359e422f6f10ba3ffe6bbdf7ddb3f27538e4ac1d5a71e141a13db085d02a39ab9cda306ac41eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf04d8e016d0878ee8b672a63be287a1
SHA1418684b28fe9ff63c5d02cd41295517f05f87b5b
SHA2566651ef7f212afa91a8d3d8004704ba570d0186ad7b42924dd2e903e83fd18a6b
SHA512ea4dc0b5818f9d005c6d030fd56fa864942230b8125e8e66371dd1394ecea0d13429b11f8e3ba4a8f720d4e8dde83bb4804bcef5a3bbcd222eb202e275a50261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545055b3a39c72110ef187a0fdc0ca13d
SHA164c38a2256b1370a182ef3d359097ec9ce52c2a9
SHA2568b42221dfc2c971d42c3ca830dde91b94bf6fd91c94dbe8f7950a38e2e2ec84e
SHA5123349047616a7c6435cd04d7ecbccae5894d8cac353221911bb573740efabcfb69637eabcbd0ff82819fa3d591a8138cc09336f1197456275d1d73849d8ddcfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e821cb1385c55c2ee4a8a100e83e07
SHA1dd2b82ec91882b8120c6674382a73246b729ec3d
SHA2564d6cca88aa070d2699f89f6ee714447fcf93cae79996744845e387f44124080b
SHA512bd2a903b114cda310a61239ade08d153507fdced0104fa9a8b49d50b71bf955699d5729b07c0124960d8786acb3bd7cf715b0fbed124ab96cad696bd114ed779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c811d3fc17aa287d874536e16e1dced3
SHA149e7aaf84a838fc52e84ffe33fa700d205384a84
SHA2568c6994c0def64a9d7e9f8062dc5dad86eda885b812f0f883e14ddacdcd2a415e
SHA512aed7c9bf7e9f81cbfa371b81b7de37853675286eb3ff717f4d88a5f85cdd655fb36d793b4703a5f8f004cb74f7628534202d37ba32178ebea133a3777d306fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c220d4f4f0eaf95fbce16e58515475
SHA129b900a359a2bb04b4c6c9d5ee2855ae44f69ba1
SHA25658c6c12fc3269b51c22f0cc5061802c546b136ceeb60a0dc11ecdab3c73c5d29
SHA512fabfbb2dd8f0edea2725302167ca4366ee0c780a83322c05de6d955058516c76a200cc2d81216684280542ef2136349c0d8bde4eefc3943f093e85a9d56c729b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a3de39f3ab05c128e1bd4f92dc15a4
SHA1fca927211c01440dced4e9ba77f39c46a6cf40e9
SHA2569d188db728d94034afce77fa16087da775fab8197468503b1c3c97b5e8b63d24
SHA5120dea46a75421ebb35751ee15cbcafe220c271c03011ec481617b241b209cb766b903585fe1c90c17dfabf49c4008c5b451bb53a893fcffe77e4864c9197f2c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528730728f1b187ff627578c74d0aa220
SHA17ac5daae1b67719df5182ab2031fab876c76495d
SHA2566a5213b599ce17514ecbd6616eace038f296a72524253111e7f60a397587d7ad
SHA512e1514e98fd6eb501e3c1e048b6f25ec35ce7823e6942b8d09b4f857e2849915b4d339312ffee55af54910d2695f5362361d9371f567dcb720a030cf0eb676606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a674d17e227109fc3b1105d27b31e4d8
SHA13ee7f723c2c186211922fbd1f39dba36ec890233
SHA256cb5d0403456afa484ec8131395d07b9c5b2ba4239b14fce5d24c6ba4755e98b7
SHA51273999293eadadafabd7c2f8e48695f92d72381d589a4b852d8daaac14e2842543e602db0cb6a1792f1c8e8ff332e9144b4c232a61c7fca4d465d33120ecd6f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38ab22a6fbba6129c18e4a61ae13f32
SHA1acc82dc0fc833cea77c4632667c2bbe7ce289ffc
SHA256febb08307cb3fda9693ecfa773d5cf9ee4fb55bfd57da650ea259565c92a41ed
SHA512731afb6c8021aa31f884abd18f225083b93c4b817f77fd6c3d246145f4fb751b8ba7d8403a20a4250be81e72b5a3c8e73047237b053782030ff4b2eb192661a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bae12d50f84c79e3c6f005519827218
SHA16695541fe1cded1a3fd1f29f438e03307e12634e
SHA25649849c195c3e5add3c17d772fd5bd4122b810c0a9850d77ae47d695299b583db
SHA512eebc58780bd6d1f37c89d13a95cd9706208d73195e4e66de9456e3290b6b5a551a3c927f82175b2f2361c49c50724fdeb1a64ed31d491a957b113379fafa01ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249a54b33d4dcdc3246569b8fd9ee02f
SHA1d7a88f0236b7aadb2444cf83d5f85b9713f8d38a
SHA25682363614031eea4d433e407f9f40036bf23dd3fe63b1f97ed3cae1c6590c0f9c
SHA5122633f0f765ae39135d2a5d57ed1dfb76cf4e8fac187417708649cdff8dbb3b2987b4532f54b1842c6dfc7f03bd4555d1c0a23addfdecabf62c65a39238bf12e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc2d5519992a1d5a02126fdb5899327
SHA1c75fc3ed8e7e8abcbe905c91d012a1f9819bbeb1
SHA256614d96e0cbe9eaf4312424d381939beac25d9722eb186b969815cff4c684460e
SHA512c1198c29ef59786af749414d72379a5be44deb5d43be3de2d1ceef4825dcfb76b62830020c356efb775c66a3b68af58c3be95d00f3a9e91487a0df4754cd69d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56483072921103f886bb78258f4c0f940
SHA1d7ffc7860df34c7b091deaebcd7a77fa775684ac
SHA256fe96d6d030b3496341fefe51b0688fb1a1a3de8562592bb6c45ebc53bf468b77
SHA5124fbe51a56989e1a4f34c47457eddeff5a7c3f053aed61b81e788d573e8e2f8802820e7051cff34af30cf46ce11ad931fdd82a40c1c73cad4e14ba985d783f2e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b