Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
f690b881cb6b3804fc24a84a53be2557_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f690b881cb6b3804fc24a84a53be2557_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f690b881cb6b3804fc24a84a53be2557_JaffaCakes118.html
-
Size
53KB
-
MD5
f690b881cb6b3804fc24a84a53be2557
-
SHA1
64c0607f114a4b28c59e875428354b8a0a6cb50d
-
SHA256
e6dd36c6cb76b65c71ae7690afc55aa610c008dd312b39bdbf3ad097293f94f0
-
SHA512
1af1ad3179dd522b83b5fae46d592d36656aab8cca1b91748b8d520a561a0bd2a7f094dcfd7ace34724039f630f88960bf28967d95ec287e2ebfaa66fd5e0880
-
SSDEEP
1536:CkgUiIakTqGivi+PyUGrunlYb63Nj+q5VyvR0w2AzTICbbkos/t9M/dNwIUEDmDa:CkgUiIakTqGivi+PyUGrunlYb63Nj+qw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB2A0DB1-FCF5-11EE-A72B-4E74C317C9D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b20000000002000000000010660000000100002000000030031634d8786e754c72e681cbbc5aef3f8880342cd9986d61b0fc4e97de9103000000000e80000000020000200000000dbfc3ed1a52fd6546d2875ab803edbd18c75e7c45e923ca2e36a0aa40c4e97d20000000e8b70505d700e3fc94455db706a1f141ee30c839d3a1f220c8ccf783885407114000000014fd89a748e955fe6d8c9778fb695024c43f7483591b5520e78c60edbc0568f56fe1332807a3ff4045c17eb5905b97e06c7355b3ac00b00278049adb7bb30f34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419546179" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f054dea30291da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b200000000020000000000106600000001000020000000510da7d69326d8c4a09b3e2d6b8b795d1984915cca8be9afb420e32745f49f0e000000000e8000000002000020000000056aa58185119a9f1f46fa74214b1aa044165b6025ef1af4915a353f20dd861e900000003d8793ff5bdf60861d9c6210a61133b5b5d6684a744e2ec2abe1a23a022c0c3fd0d3dccb653dd0c4bc64bc32923177020694941a935e974bd77a27f0bfe1e9536ba533a05de71619c68fdcb045e8e0b7b3d1934a696e0b004cfbe1702503c9f4167401192b3e176b277b8643976e0a7fcaa2f4b9121f3df32b8961e692be20eac21bb58b5b357af09c4b72ffd117cd1240000000522da1cd735d5cdc2d0b30d3f1cbceb590fa184072d3544538e3707614ffdc375bcb0ad41dbcff70881d91cf2a56a73cf0dedef7c63fd32f7d26c813114cfbb9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2420 3028 iexplore.exe 28 PID 3028 wrote to memory of 2420 3028 iexplore.exe 28 PID 3028 wrote to memory of 2420 3028 iexplore.exe 28 PID 3028 wrote to memory of 2420 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f690b881cb6b3804fc24a84a53be2557_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2bff50a5970ca6d0e005945610c7137
SHA1e06779806ba85cde0bd8cab43c111c118aab9569
SHA25685ccc5e322a1f5c991cfa5740bf9a1667e4b5506962aebddb1fce10305d2097f
SHA5123482a2c882fed342b9cb9e474cb93ae2874545232b3c0896497740f6c37613fcba8dc4ffda187adbee7dd165b694b7504743c530456b1f52b2d95601c5623c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b93052e85196fa4a5bca2ae3e63dabc
SHA1305fb92cac0b6c1181fa5d7626214d7e07257e6b
SHA256050d5760a3746ca077a185762dc19e65a45b885519dc8f0172c40c197233a67b
SHA5125e73153b0aa903ed98e6370341c80a2618188f12debfc0b8aa19ecc1606ba4076fb632deb86e9e04bb3977db4a03f8faaadeffb22423f7ec100cf6cf770ed506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df9130b36e84eec24e03f24d06f4357c
SHA1e4b9a811eca1a96554d7042fd0ac87ffdb711401
SHA2565a9f64d9a5c0706b389ec5f93a5cf01e1732d532145e76b0a107a8832ce0de9c
SHA512437414a4691070f3f185ddc83f7f530bd6c7a6d0c08d598ab8706de2db8c62ce03ab017aed073407eab58b64b0b75e27c5a8ccb1870846c62ca6bbbecdf1f66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f5a6e401da12fff6fa31aac953b309a
SHA175bb38ea44f3251660c738ba8b9d7a74e3a357dc
SHA2564675944524a430f62db50f120ebc3db37d8badf62439b24087cbdd8e3ec76795
SHA512fc8f00636f2065862c5be11831accdc12f6faca4386badfa8aaa389fac10d48c7f122dc6655a0cf79ddead1e8ae083957678bf60b8c530225521d8b42a3917fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb8e66f56b5c3ff8776ffd1e18d53b0
SHA1aec1076f699b906f33db2814a160ec1fd74781d1
SHA256ae731e286332580e41cdfc3e8ba2f4fcc6a5558ee4ed0db6670e23107dfeda25
SHA51259862224a36ba8db259f245282f7899db1f523b1f9b2d4306ff4a29f21a9587e67c4b75905c6a7e3d8afcc7a4138b5209a16ac920457055033b902cf7ced2b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553999d7f90a739209c35f5bfd4cf193b
SHA1015c5b31b6220f78430f52032d3a56800b89e57a
SHA256d768be69386d5686b99794ee1ceb09b9f31328ae3c990c99f18c8e744a6cf903
SHA5124aca0f2a6123eb66908c791cb2b56e849f94f88151742a72ed80bef8eef2769ad416481285e6850d63e757e7607e4cd61659b755eec85ff0b567c33a26bf1ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c84aca41bf0e0e2bc130fff20f711b
SHA153237311aa458efc0b5c839f9b6ce575bcbf2285
SHA2564c340439c9c5dc5d005842fd8e63b419981d81339c4ef0c549f47fba681009c0
SHA512a777bb0832cc2aa26acc985f77bd1ac11aa66375122fa66f67ed379a6ce72f9e3e389c7ed8413a0b10257b9a778e4ddc3c84496469867e511976d3ac585a397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3dd9e5b4cb4924e7252074d621cb26a
SHA12891f2feaf7c3346749cbb1c532c9e797f7cc801
SHA256d678a7306c2d5d0a4dfd636e846fcc2efed8a666d209762ca59343c0f53758a6
SHA512b446e3269e624625c0079f5aefd412d6f97c0840c76c79e703198f125a2e29a688605ee03a65c6bca66aeff76bd225a77529f74874b504b55b47e365b1229bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530a5a7fed3a4ff6c744bfe2dfea6ba5c
SHA16f2d2ba2c1681f293b21d4543870f9e9deaa8917
SHA2564e878c1b2985f18f6176c8a0e346ef090db92d049c7d00229416afdc7199294f
SHA51285b1b7b740b7aede12fc1caf69da4217d9b6d1cb6f41112b6d8fe1f717ec1e04f55e0e2f95677763080a1d4e13c615661945d29cb784586b78f994af14940694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc165051dc6e396e8a35456f661ed787
SHA1e5f877441d75b228246ebf95ed71a8675090bee2
SHA256fa4dcd4e4a79123d394091e96c275f583acb285552fe4f70ac1675208ac7fd47
SHA512386040fbac4da775d0cf6aaf79a9138e9c2f7c867646a62c8cb145deec552702c928075477c6c61ba7e1380e45f78f3695d083363d302c8b849a362f918db3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580dc0ca653347c1c191207aec98d1a2a
SHA1c671488787d724df0aad8ab91bf0d6b2953cc09b
SHA2568aa482b7be62380e9ad8b97a507aee8ff11a6ccc73d394385ae49b6816e9bf18
SHA5121d5bc98c380ade96c94d88a6112fa9000dabef6f7e779dc02fb91311a914a736a1c2fba049f2d9cef5d2aef48fec54d077fbaceff8e08507d6a7ace25502da1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc1f442bc8c46a74f0a5cd78ae871f8
SHA1f82635b2df3fa94192b45671876996a64b5e0bb7
SHA2562c03099b1b9e3e26a4b502abbba9e163abf1ec4e4d014db2e43384ac66e1491d
SHA512e552b40726125f2b108bd5c705ca6fb23925c11024227fe0801da9e916ee72a1397beb324daaff8f7bbdeead65dd9ec3b848fcaa5938738f711fc52066913a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c43a7305a0fc1e7a9f1a5946caf42c
SHA1991c907a8573c21a7eabbb1b1ce2ef192de0a381
SHA25688a8d0e4fd5a132f8fb074645bf9dfe6f3f7d43e5e7ee3410cff339ed8c872dc
SHA512bbdedad986780b7bd367a5076cd83fa606a4df800af833de72d1075df3ac50dcdfa8238fd4763a92f8faf5932eaaae3fb79097ea97256d880205d30f34a5df6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b7f95809bc5913f23e4adb30180642
SHA1ed90b7e28220a4344480f2399f666604a336e540
SHA25602fe6f83ae14552ad578cc594f8e9594fc1d24f6d07e894e3030b06e412095a8
SHA5129df65a4cf83be8803866998cf71e79169685a39eefec1b4510393e8b3b3784f11d30e396fbc879448e0fedf10fa78a4ba72253b274fbaf1b18764eae3e64b18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e136730095e25652c6c6ce13fe8261c
SHA17f1e3f8ec93916de7dab91b7452d0cb8cbd3f6f2
SHA256982a34e1e59e4193ecf20522f5e1ae95005fdef5a6fde166081fd0b1ea789d71
SHA51259e5956d0832ba9337bb646074ebe3dd2d7ec2f73fdd1c14b4f98808ca373eb63d5ba94ffe7d53255bfcc22f68f018896487313d6b9815dfa96c56ae09a92732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a23f6860ea490df671ef694d3bc840
SHA13984936538175b4b322cab60de92b86f70555f14
SHA25685b3a5c114fa660507a0ef80c16370ad0204dbbabb88b45d5bf22d6aab863359
SHA512bc7dce2bb9f6b236e57bc49e7d522737140ff4f6a253594d9ea0255183a5fe8051b852da98921775b224b5149ddedc9e59039750f086d8329fcf42d4a66b2ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d817f7f8e3830f44e99c792d54b976e5
SHA17ee08c4b0ee0247573ef0088b5e85d9ae450233d
SHA2565976711457b790acfbc8f2afea533d3662ad567feeb4bac94d81a6cf005fac2c
SHA512ee637928b63284ed9f9cbaadca5f73608ec4474e06666e4602073bf186129ea5cb0b6097fc50e55b046ad525183d6dba8073bc4a635ceb724e1fdd3d34569760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7fdf983169facbe704cd06e0b9336e3
SHA1542e8398e58d741a674f64849f72a0ebeb5b1a9c
SHA2560ff1a63318a544a91a3623e9ff9bb9e94d20479de80c933f870e2df1f04fbd1d
SHA51262aabc233b5929e921f20ab5a6a94e73f15b82589e0329e271aed37fcbb636688967ba2342bb7e28cb50eb23649ca5ded3cbc3f16f1400592148ae8df4223fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebd53ce703d48946ede1fb3b15983f3e
SHA1f23bde2df1d9a2c7a48972c082fd5862deec909d
SHA25632d67378310a26df2df61d5411928448164ddf22c57cbd916a14fd5a27e1773d
SHA512c580835b7c6ff051b2f3fdd1503a586589953dad2bafb87def4deb0d623048e56bae3b1d8f609782f6f02540d3044bf86f5889a1abd536881530831a69b71cc1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CF94YBKR\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a