Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
a6a960c544cd8905befbd21fd9cdedc5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6a960c544cd8905befbd21fd9cdedc5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a6a960c544cd8905befbd21fd9cdedc5_JaffaCakes118.html
-
Size
94KB
-
MD5
a6a960c544cd8905befbd21fd9cdedc5
-
SHA1
92faf7a67fc0a86bcc5f646e054583a6e5e9cf89
-
SHA256
63b8aef384c437824c54047f26c13029955ed664e07c92e14c45c745559d2478
-
SHA512
c92c42b845f8dfa8fa93f0f016c08009e8595efc3807d0a3797a50f62e88c1a1a2a6a4860b5f508a1be0a25ef984bdf8a3dc131f316861b018d64a8fd1b8a179
-
SSDEEP
1536:WMLiNig8Q/mC06AQH27L4FLmUpKfXuFjWFZ3y1ABdkrY8mgHC+qpEyW:WAiE4ABdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000002ef5f5905240e5cf94cd14cd5f32726c132a7161d8e9c33707bad9ffdd2ff575000000000e8000000002000020000000933e2629c3991ac7d5973ced1d7573533f940e78b89207118374af5ac9821810200000004ca858a88b490b19fcaabd56520c2da684b403333ef7e715abf302c0175d0f5840000000400f8cae36c8bb35aa46563b09139cc30b639c28816e30e75e9322bfd247e58beec5108a5edb0e3eacfff51d49864ed8335f396b2e84df0e8544a6bfcf8c8abd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000bc25f898386d5f1a662a44e69c33ff22a9e07ad35e83e57884bcbeca0b5bc900000000000e8000000002000020000000b99eb69383abd67c3b47fa38db3a7a5dbb48211b44186eaf54e0c5e552d038e290000000c2c41b95fbae9179ec657788dc5bedf9be8869745f499c50dbbbd7e320141ed6181852a6c3f9e24a8e7a28280a0748c56eb8c0e24bf801e517e57623cef470f9c96eeb7df3cb29b267076b21d8002bd0f2447a36362846b6eb045ff81a71c7405d8a0084fcc2000fc7b88bd2af0cbe4f0b37c3f8a223102ea0272994d06f07bc1bc062b263309e0b1e24c4e1ff03de95400000006080b6d09280b1ac5de4475cfb392e9c4f9d5834daa5a1fc8da99482d4b627d07dec5de7af9eb71a3b95ab2f46ba12775dd547ba97128f7d4f5e5671000aff2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424476205" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4054573cd9bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65FA2C01-29CC-11EF-A85D-46C1B5BE3FA8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2460 iexplore.exe 2460 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2460 wrote to memory of 1996 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 1996 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 1996 2460 iexplore.exe IEXPLORE.EXE PID 2460 wrote to memory of 1996 2460 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6a960c544cd8905befbd21fd9cdedc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2dccbd0bbe70992bf4b85a2417e489
SHA12b8327b2c5fd7532f8e813f81dbc06bad4d6b48b
SHA2568c256b1a3958886f8673e64af9618083ce84d7b2c1ccdac1200ae21136735e3e
SHA51261eab8b1d11acfa586f3299a22247f38100ee913e81e28907951a2b1d7a862508563aee9c84cd5985316215c4a8dcba9e89d0676ec464e56aa5250f78cbacb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5990002092c378045391e1391a1c5d
SHA149c58d000df8a1569f0da7e71aa76cd9a141a9e9
SHA2565f53d949799c143545b9e3075881ab22b133c55e92ae40074ead640564325399
SHA51243eb4439506f4c098efc7b61db161ddfa51bd117012ea3e931f7ffc88c7ecb474749c87cc44a35336d8a867b52e0c1bbda5bb8921ca2eb51c867fbea9905dc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d321ecc31657a5b3ac450e7ff7ed78d6
SHA1b852d08f85cab4719c9b66f4c53c41b3a171150c
SHA2564502ed93f043097324b528ba24229ab0f32895171ce59b5605d1de9b7920f6be
SHA512b112b6e6cba8898ac092b3afca338202e663119669a49ca203fd2f62367661f6653a03c7adda8b419014197b6342e8cbd3cb0cdb2c045ea8fba352499c239454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb2aeae82b381ecce2adfca630c634f
SHA1ed0dc2d61049b912209327746fa7ed424e33e474
SHA256e146aef20ba39a6c569f3bb2c1240d94643d1a09d704b9fbadef9a63538fabfc
SHA51270a54fea66bfea4607479b49d481af32841389f6a86376f9717b1b7f161d1bd16164178654d950313665a8378be959813aa30d9d9956ae2e0b8aa45b62b3eea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a316023009d4da3cacdafc70e8b98e40
SHA1ce6fa04be917786cd81c7a1ee76a71b2e6965ce3
SHA25675842009065ea270d3769d102a98541668dc6332886e624cf967483a565db5cd
SHA512c9f83f25badec86a5188ef0188dbc778727c9028d2c1b13f7dd1fea2dc3bddee8987deda1deb2348a88e1438b41d9b96be8b7f723c4d120c368cada2495bdf66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2466cab8ded4a9fea4bce83b6915183
SHA173fd2f9681402bf255b9e2a5c99ea81c5caaa981
SHA25643cce8712b2619c0e72bd42c58c04d8cc61030e1d763b8a0d7806d9f98b275bc
SHA51230c3de3ec59e539c8c9cf6532f861c6226a34b84fcdcd7c7b8699738db59a561e36150ce74240e365872fc2524f221fedc5431df7071d05028b5282074235737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522e21da579e15af15f26a92cd0fc8025
SHA1bb8b41808ae4b442d7e301c7dbc9c90d4bc958d0
SHA256ea64370c6a3ae79babe3a8d28641f8105d8fb5b755328678e22d91a9b4c4b52c
SHA51238c8f633c050210f796cecd9d2f18a4bdf1a0def5464ac08010e212add270af748cfafee3bc238894e49bfac94d5f99d04632057a4775816c021034f5268ca10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0102b5e1700cd0447b9e134b563eeac
SHA1a734eebf75f482c7bfdc85aaed4a6d04d910ab75
SHA2567815ca9fdd71f32be0d5e347c3014093d75ab989beb8f8473c7996da7f30130d
SHA5128802b970f83b86226f6b50cea8fca6be6346f040bad3a8248b3434702bbc9e4d71238972553771de695870cd4807c6f8edf694bacd73f7ffab69bb2a1ae46b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ee378e6239f3119e8a99ca2cce21e5
SHA192e84dc715c87e05be60e491ace07f59018a54d1
SHA2564e4751d3c149b5cba251aafd918088e9fa8e3d84ac1d2db4541fddb6cbcfec05
SHA512ffa27f7eb3e255dbb18ed861186645c21b347beb50e77a15a745758dd6f2704ffa1e897d046ce8b5a792bfbbab4a35311478443129357f22ad75234e6aefea4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77aa51654da405c86d5a02bddd732b9
SHA1ffbdd70c3ad95690eb8fc07568e5e70a002d057f
SHA2560d8701cdf368a70492d96e3348fa0fdfd5ddfab178c3a05b04d60470f51db0f5
SHA512a6d94bb3036ac6e80d8f4ae0ff8e55c1a882e4469f2a0aee9fa27aaa3e6e0a18a72ad92e26dd26ef5c35a7dde35e88981e87cc9310d78756bac458d976faf4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55114b0e53b1e4dd233f8495e1480aa50
SHA14ce2367ac778450ce1ccdeb4b59e220dcfc1416e
SHA256ffd7fb7b18c48a05f0db57b8bcae65558b46391a15215ddc652bb841b5f84473
SHA5120e470ee8e7759e1609b85efc369c2fd4c13ffaafce94dd98a2918aaa046bab5fdd9873dc0475fba1a51bb8d42819705096f81132258a719ab530b17285b1750c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8879a472393e72ef608597b3fc45e1
SHA10bd31398a13c4626fa7be201f5e1dba5f1f6f31b
SHA256ec8640d6997c6f5b224dcd0216177ca95efadfdc7646d78e5f2d127b4bfd02e4
SHA51241398b585a11003c180501665e1f8ec1feacb558d888867e888d2101a039b06dcdc310142fead69d9b6a8b43947aa19ba8194f50ef639edaab18f4d8d5df4eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845921ecf6659897c9096a53b2c680ce
SHA1fbf1b22e6b15029a514eb7acc7f2cec9eae9d4bb
SHA2563bf1600b1b951539d9c5f48eb40d9a358f051a6741436156e3f040b832db1027
SHA512d1297f936917a9e2020fd0ea57d02c69a8eabe67513ebebf42fc65e6245f3a95e1d052b45393091edef4fec18dd292d7ce465bb1aef4c3a4d9a0ec54b49bc293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a2b543e41a943ac0335471dcf36572
SHA1839bf9736979a0e5655ba82c6351458fe30c1972
SHA2564a7d783f0a412fd36fcf793c28544c7f59bfd74d7ba8afabe9657365f3788858
SHA512de349541dd77f7c7b24dc9b8088d2a11a0b174bb0cc754ccdd216ab90d640731304e8f779ba05cc8bf024f45ed8401abcdfc5bc8c79d22fc766b3de52b27f415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572324ad679fae9c1a3b888d9e529ab66
SHA1b159be48db05d9d04f111227db2451aa0e544e3c
SHA256715a0d61407c7651b0cd40325cdfe0b4e9785feb5a90c5a75cb6138b82a47d3b
SHA51210325420c97b98e435911afe0d9b766d168c01656fed031fa6d2d8c08b93ae601bdefd322e0f83018a254748dfe2e79ef9faed109db506ff10304c09e76bf3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509b43d7dfac2e126c2b5b71e8ea2361
SHA1f6294f7dc5f7f4be196f0991c3de08b57fdf4b6e
SHA256aae5d2678c8b759a8b83b3fca552b62172691e12196613f83e7be168ab62fb89
SHA512aa3044f49a74dbc99cb8e71502bfdd5496b507c857d202dbb14bfc538edfce2d6cc5f2977733ce0108592014dd673b80aaf6fa5cebf6a0ea38425c38ee82fc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a99d29989d6b342f32367b7056b47af
SHA1216d75334241ab718a0250633abf6df405ecff83
SHA256ce6cbdf8daa2fa6940ac69dd5e91067d7398e3f59354017a7de570c119c80625
SHA512d7ae89e6e198f5651418051ab9dbf78c38b08d692f2cbb9824826054840b9105e5190a4d19327c9ca5628d23db96f6d8b1c76027458699139d1c76ec18f04587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784a6a63749699b668b1f3488e028c86
SHA1b10df5c2f819df5aa4fdb04e29a1b76e69f745df
SHA25607c6b55715acfef59175c2ceb079f4b3c49a6a52d62754710fa2e75b82e3d96c
SHA5120c87d08b90e8a9b583542f00404faca642e32a05b4a2b17d7e25319fc45dc45ca287aa91ee81d17db2b2bc5c696a57ff9bd7212889ad8250cb53d638809fa8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a023e9af78309e39785fb014819febb
SHA11d83c43d3d9098ce755f6072861a1941d23df70e
SHA2566a69ca514919c721593757ccbc0d61e7a2bbb7ff355784da65d42f2833902bbb
SHA512de1401dddcb09da25e18c3ab1ee5ee13750bcc0c8230b9b1bed5fb12d69f013a76512429e784d20744d5a87371f66f58ccbdfc6d3ce21eb32df0a80eb14f4f3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\jquery-migrate.min[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b