Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
1984286568ae651111359fa6a0062257_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1984286568ae651111359fa6a0062257_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1984286568ae651111359fa6a0062257_JaffaCakes118.html
-
Size
3KB
-
MD5
1984286568ae651111359fa6a0062257
-
SHA1
2f5d2189ad117114fbd7fb88f05b580a8970d1df
-
SHA256
52c865853b9871cbefff883938fa2eebd23720125c132a97843ca596e4d33dd7
-
SHA512
4bbf951ec640fe843c677e8e2c4ccdec523c3521d9604757ec73bc3e60d5638f96277f45a81157613da5a4c3dddada816461a54eac65289f38a0aaa31b3aac21
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083d4f74db6a7064c917d107b582653830000000002000000000010660000000100002000000039ed78be29d789ee382c38de7401df17b5ad097edf7f7e8eff5ab37cd26254aa000000000e8000000002000020000000cdb15ec79b9380c68c2d9eeb4a4afe2101b4c9e872813c17274bf0575e63a6999000000079b837cf1efd59b2bff9442941ad740c533b92895d7c0d5631901d70037e4fbad357e7e7c096884c64e24d6c5e7f25ff0babcfd92124470fd7c1a45b805b6887e1db3b94ceb97cc57110f567d859d1b5bc3e203327cf864635a709eefc1d58eb3c8733e7b194c4fe7f25db5b7fbb9819b14cfd24924390cc4828febd737fce5adcbf897a697611d48e06153040d420d84000000011ee8d1eeda30f65d329baa7ab1965ea946c5d8c968ad1ae14b62c5b69d88ddf42f6540520a74e15b6bab6611402972ff016713e16eef5213ff7363bb7722eed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425726562" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F3C4601-352B-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083d4f74db6a7064c917d107b58265383000000000200000000001066000000010000200000006a5bd1f2e5609114b4a91a2226dd3255ce4fbb95401c3527ebc4e6c490f653cb000000000e8000000002000020000000729e169981e96ec62f91e78111d9a3a7cdd2b0305d734aa3c69e33e2c226ec4f20000000d5a03e46f40255f125fb2c14a5d3410ffdf2f42341c641c8701e69c1b3eab7464000000035854f5067e68b4eefb0aee6d6d58c4d2475af1b70e9e4c2383e192a8f8d57ce347a6f0482910313e057f8d5456955728af80edd0ca6bb133c9a6dec212e42e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d1fa7338c9da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1984286568ae651111359fa6a0062257_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6dca7980e6c257756c910bab21a844
SHA148dc93eda9aa76edd4b700120c160e14158a7050
SHA2564ed72b41e54a39a42dd54f4aa7d0a4596519b46a80e4f6dad27113172d7038d1
SHA512ff7c582f827be985b5e5cb6b493589b20d892398bfad58c94bec5a85343bead7abc397765815ab6776c927a97cc02be01f667ab5a04923063919a8e98ea74484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb32c1a7ee5ba351b305dfe2131b903e
SHA1528599f272e08beed1a6dcbe845ccbdf837bef10
SHA256c97e05c5ef1a89c4129dc4b06ee3ad559d757c47054deea4940a97b2246ae3a5
SHA5123fe90a6d411e601596d06404a19f01e1793c400fba60b1ca242303903bea4cbbd49b2d166974afc56805100fc0542923432ee38e826533b14e0b2d1ec559a013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575429360b1a722b6ee5ca01f60efcfae
SHA136d9d36d8375f56238b6cd1726ae4aa16a81f5c9
SHA2569dc7fa1e632b6601141e09527587ce00160161d2e28ec631483586a2e18b8f86
SHA51257597742092f8f1dcf997af4c9617774de783752ad48bafbc7f09e32631bace2b3b164e7e18a18c44a6eaab1c45f7efa5dad04fb358655843936cc7839394676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f152d85f11b264b86969cc3c7630910
SHA183f758d516f0491f13a50abf2e58adad4fae27c3
SHA2567e92fa4cf3f985e31b9b9c9b4a7b1f43fac8b5f2ef72df84ade04c129deb2ed3
SHA51218d6ab6b71209890a593ee33f9d9b6d96dab9db2476bc57dea2fd3bb531302da60e8ff57bbe3c30ac64f7ff12963569c8ddfd7640d487db4a71912fce7c8f6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ea1968d3832c5108a384053fe6192b
SHA17e4e28222b078d4e5b0878ca8b9bb18b4099ff3a
SHA256b8596bd2cf83edf4c7b9a5de9e484ad3330335d68562c2e0739627e433be38ec
SHA5124cc1faf118e3fcbbad9ac6637a29173e40e28a9ec2cd4fce5986cd2624de78adc2a403b9cc8baaafd0b095c1c394d42f4e1fcd6d469912b803b72f4c8fbf284a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d72180e4a84ab61024d1b33b20be998
SHA192aa813d9933ef7949dc2b35af029cd1f8041139
SHA256de4e415dcfefc0de4f44d22222955bd6a90696434240a2018ae899d26dad5731
SHA5123b08146f4bd3144829c6d6da6f7674b9e3a5b2441cff08e2800a91f46b18fd7f78d0b0cad9e23e4205c972a5ab374d292a4cf5f84beaddcfb675025051aa836c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca76c33d369923cd1db409230cd26a3
SHA1fae2f9d29ff5c6e0a5b5b2fbd6f1553ed314cce0
SHA256aee442a085025fc5fcdbfe71ccad8bc284249c5a27ff19abef4c865ac622d3ad
SHA5126d437833db47af535ae50276272b9413d2234da3b65a3cb108a3d81b1ff1048720886e938e47b58ef19f732420b3451949e0441a60c8c04218a778bb44ad0fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad7b95a12b965af27c3532429ac5f00
SHA155123561f9745b9623aa5682914cee819ea0c75c
SHA256260889d69672b6bf6dcb3ef405d816b06378e9ba2fef58db9cf188aac7731849
SHA512a10e049191bf3bb63b4fe6ad9f9910252341027145b280239f16ad3fb7a08c69d4da74b109e1be52a4f4be57a45ca897c90116cafea90c3f51a3153d4a0efcd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf516dd54fc0c2e32fc3b97a52a812a
SHA1546efc7cba765ca286fb4d94f33c42ba6ce156f3
SHA2563e7b2948fd9e0f71a153fb5636e194fc1f57d8619a881a16edef4f682c8549d3
SHA512f9d260625d1bd72601d520d5e286e1da6bff093d0f162203e1d8054f8ed87ac8043125bac12d2d0d0d729758907d8593d952deaa306a5a708b3e317acb2e66c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2cb7d2d8a208eb3806cfe803cb4c6ef
SHA11362f9606079720283a84e571872ac13286e0bdf
SHA256aa449c34593d5cf4a8e0c8f636644b90060a431c53b7bf3b6476fbc5fac3b697
SHA512f133ba5c4da26bc0ea110c0708c7902febcea690c5e5fc9a2537551e20f05ccbe63215b5994e94d0d3452d404a8fed8797c2ac76c66afa8b2186aec15cfff6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a996c87d5efd0bfac272ac4d62b7e4a3
SHA1fab090337d3f4a6da7914a81fe03253d4d3ba99f
SHA256aadaebb152699b5199ed0784d26c578d96eb4234c9d679a3b88c47718de28f02
SHA5125f06dfe2c0e1778b4a9087aedb436959c9935159db31f05997aa5e65531773923130f7da2db9beaccd58a14eb40bdb1a5471ccda674b5b77ed432f962c1cda50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee56266c6b990480e846a70735090519
SHA1a0755e0cea0ff9c4f148693702b18618679ed3e1
SHA25663de8fef7997360ee1118a0b6001ae23dbffd69060911d2244600b0160c77daf
SHA512c5af3bc97bdfe7a037aed653161735bce2c2dfe5295628adf41ce75c0c3559e2028154b4071063ac3f9e69cc7f272c37d8e52b0b94858a8baee4a0afe0442356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee814dfc064b53ef2c1c8644283270f
SHA12640cc14fdf397459ac7867b29fc86f93ee6f06a
SHA25666c18c2a4d9a6c6c779104623282109357dca37cf2b7f28e51ea802177a5c02c
SHA512e48df2667b3ce71027d63c3bbec0fca23cfde3cf860240463104a61f56877aeb49867f8c674b062917ee938714cdbb3b42565b0f254dff52cb0b8b815fe18d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199cd599dbe916a4c836772b88bc0ed4
SHA1b6f63b9b7a51e8290cf9ea1714f4fef6cbba5298
SHA25684c95347e772fb5a4496fcd527f1aa9581ead12a4ab3a84bb5a3c6d67383d374
SHA5120b31a916cd7ffd265f17039fe594bd6fc78adbf2d77e24e3497fccd96756a32acc451f43cd65e2276929a79a95275700f11a22b8fe50586f42b4b632c94390d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86b7ff87f17d90408c1c08dc76ffc23
SHA1ed83bfb7dc54555d349a387fb75979962583bbf5
SHA256fff83eb266698fc8d69eab27a1278f8983bbac0bed78601c077c5981fe1f6bbc
SHA51220c1d32afd2281dd4aba9e684ec40a14685a225b933a0bca78e8b0f1cb74bc6e44da48255955f27e50d62f12bd74c8a71624cab89cc9de12837d080810f8fea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b598808e7adf612d96d2a7192d3769
SHA11a2f1371a986bc67eab8959637555152eddd929b
SHA2560feaa94fd64f0f892233d5a64aa91c8b3157026eac2e05c8557586b7f523f547
SHA512ba7f9de03c335da693a7c144387730805dc47598fc04a6aafca3045a9843d9300a1df944ad83c9409314c595e60101c64b643c161afebdf2781a8f39b8eedc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871ca4c04c853627314d5b9c272aa92e
SHA1dbaf9dd2d68a2600687262f32e84006df7e25d03
SHA25620e70155ad460a5e026548102516a4b68e8b1ef2922a857c23d91b7bbfeafef8
SHA5127c32944db26ea72536c17c64db238efd4e60c92e9a5a3b8a1477453ca88296b5428871904a1ba1bf2613b43d3ffb01b7d7d1e5868b62dd2b1034a0508f6c510a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d1e3222e410726cf457650077af69c
SHA17abae9175b8282a2bd7854e72a373b25426cf938
SHA2561698e8aec06b758025f099ba6ee262b2a69018b774321fda41659a66c600dfaa
SHA51295ba87006dee89765cbc478fca60c6a361631128d1641eff0cba91f99e939aae3d8bd6502fa33e5a60842e82e831d2fa626e9b93698b6f04e8c7ea9704501e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31235ef4ba0493d0da7de6906122211
SHA1ab116b9d57ee51457736248dccfb8c558645acc3
SHA256a39dcbe6d7dc1a7eb80cce75d5f0715d8421a34b67ef47c47041a650e9a80dbf
SHA5129404c640648d4e639d9b0800829a158dace2a28b1a2a4e18d8bd881389ed286c483168d67a130ded3cd6f60ccc1006cf5711238b5bfc28de2a97d92a5eb85c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd4db0030f337cd2d34a65d2558a76e
SHA1be7bd945ba3d67910ec7bf3775cd0113f868bba4
SHA2560584d02cfed9c7c3c821f3ae96d9860e7c4641fe511cc713135b73d4f6bc8efe
SHA512df3146523e7a2d178054e6e3624968ab2eb90a17f793afeb061c4a631ad91f085dfbe53e3fb1128e33aa0d81c377748f3bc5c58e2c11bffdc2c31754b5a99014
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b