Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
1635074eff620158464ed666fff2c0ab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1635074eff620158464ed666fff2c0ab_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1635074eff620158464ed666fff2c0ab_JaffaCakes118.html
-
Size
61KB
-
MD5
1635074eff620158464ed666fff2c0ab
-
SHA1
b6db1815c3a51fa1eed7e717d54aae59220acc88
-
SHA256
7fed3a568906b8294ff30b8f761dc9cab0ab83c01d84e95f008a1627eae2cf53
-
SHA512
6e22fa1fe3c03a154332e0808ed0b4acb976a9a35d7b828b20ef99936ac3885ab74cb1f76c3233b940a9e3b4e367efbf199556fd74b1cf9d532f5892fb9a9e53
-
SSDEEP
768:JiSgcMYUcXGeCSXuhnjajoTyZCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/Ijkk5nnt:Jk2RcTbec0tbrgamchNnWC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59B1DDC1-0AA1-11EF-A304-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000ab6368a9c44fb0b7406c99988843a7ddd994728f7e846accd6c881ffce8ae3c000000000e8000000002000020000000bc300f54681da1e158fdbcd7029c7d2fb57b0f38e9c46378102c5487df3a87b020000000a00034cc6ef23d5d2cef83b04a48291dd01a24e87f8bbf29f6f067bb3960969c400000000e0060353e961ba711c4facef542ebcdfca844608b580bdd95a17dfc108a7008b2b829f24f034c4ef834cffcaf58687131d123a2ab09371727693c5a0d2bcd75 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803b5b2eae9eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e1535040d90a5163160b923a0d7c846cd4d948f77779fc8d53e2a7251f074d06000000000e8000000002000020000000ff91291d74c45884e4a37b532e9b430179321632974e0f38625dcc84148a6d35900000008b473750371ca9793a4b92577536efde637cb0e3efd4df1ba16fb8b7f83fd2d319a13006b694a788a8e5fa741d2aba472eda4ce9202cef5623d1e3f3a9716dac60a566fabcbe9e95ee008dc550eb34db66d22902dd6b773b0d886aa332d3b240b1e3bba8260659958de7d0518c8ed0ac9347e11d41d541c4354969d0d3e5f0fc5d2699d62136ac4e07a1bc4fe7639e2b40000000ef4f877d08364e7bb948a375ae6d6ec9cf7113ba8cccd2bfac8e71c8d25842aa835a03efcc98e510b0bf3f7a0c4c178f0ee7d93c92bceb5932b139e7685886e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421049225" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 3048 1812 iexplore.exe 28 PID 1812 wrote to memory of 3048 1812 iexplore.exe 28 PID 1812 wrote to memory of 3048 1812 iexplore.exe 28 PID 1812 wrote to memory of 3048 1812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1635074eff620158464ed666fff2c0ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d061b4ec32ade4deef178db2ff1a12c2
SHA126a52b509b25d8b4fe724721c4feb8f0165da1bb
SHA256b7964423ac4e77bc99bee1ded9132dadaec84e664447e305e0f687c1415ed74d
SHA51202b0c57f327b725c0a7effd196083efa4c563ff2b8b7a0a929e7c33e7d4743c70d7fe20ec6cf2082488b8efa033991e41dc3ee28766d18f23c3f207e62464fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120a476ef9f1b24d351763b8ccb87379
SHA195a39a49d8ce7791730618fe983c76500fa9298d
SHA256add7673abcc0e745ba1b253a0893d4e4f34933b72318df052445f74307947f03
SHA512871008b4b60bc0d2ddbe5f5cee8b9130063aa81501db3ea3152e08688cc346aa3a56a5bc2d913f830a944296877fc920c4e27fcaf69cfd3d471e545fc3c7bede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aca7dc9152d74f6ea935660248ef7cca
SHA1a85187001bfc702555eab6e8d79e6638f020a873
SHA25629f5eccdaec1a87bb12cf0def9974f72f4c22e951dc641631d8d7452d329697a
SHA5123c58b532480a7b2dd3acb9dc2ab94734dc0512247ca96e9a314c1eff711ce74114dc4dcc8ef3ae82b76dcbd82292009ec3aa38331537d89b1876f2c947b42127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7659462a1897a042fa2a5023bdd6a78
SHA15585e10a9ec97ef04b52c3aa4f997d1e5db26e2f
SHA25610356dcf025855451718500f023f5936987d730813e7ce34c1a86db5fe89ef12
SHA512775813461a5addbd4b8bc5b3296fd5f0e340ed2cf177991612a553986db3a19a642830e3d1a5647f7071231ad34b567127e47bf90f02ae143cb2956095240990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5801a568bebac4723e633390e0db0a40f
SHA1e36a01469acb7cf9060940ad6cebb1fd03452b89
SHA25646a137f16d1071ce39cf5d5c06682b984ac3759d0a1037546feb11f1f97a4778
SHA512009741eeb083950c04eb7df91473545c474c18089c9d448a45b3aae6bfc5117f7146938af4382edf98270315f215fb3c0dc405fca43a7ba5f8301aade0bbe2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583847ef94f0c15bc372047e9363baee7
SHA1f3ea94ad2b732755ddd8e0a460b7ab46dec01b0b
SHA25654db7e443f91bdeee972583b5b43f447c51b685ae069e88dc81b49ecd8bccd7f
SHA51299f609f91785d005ce6a49d6c21f093cd2840275a22698d4bf4cd822ce22744701de4b3b6fcdcc7e1b325f302ff1f941c18aa8cabd2ada6b7399da83fa4ea936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166ce00386ff01dc58e17c533743a5a6
SHA1016538be5be1a66ae7f9a310aebb43be4a1ed8c1
SHA25690e3927e3d05159805060231d091550b1272f346bb8a414dba770ecf80dcd5a2
SHA512d5c545251bad2ecfe5aef19edb14fd5207dcb6fa6880357baa07975b5a46a8d589fe1ad2e1e1b1c21b7ac6ced41da98f8e08c8291a3a61f54bb7158eb30d35b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e80664ebc294ce40723f5e380defda7
SHA146d047d2f44ead605bfc0e71f6075862d01993e1
SHA2560cb4380d5621ef3ec04b25383d14bba1ba1c8cc7568f4e5e2ae0443dc4d74d47
SHA5128b8f5052221596e89f0e1384f6f63a474c2dee68eace77417c778ca2c3949594b884924417b69e27ff70185949668d52e35ece73505a5e779b0fd8eeddefec6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c481636d3178e144360f6ab0cc99d6
SHA113028df049ed8532fbf8e713b72356df7778586a
SHA2563ef8c83b92e8e77fa2e1d1325e0687f92f6f1ce083ccc86144bf6ff1c7d85891
SHA512c9ab5ccb5552b15578796f859c57af8d1cc90210c93d51d9b436c6aea8eeaa1632637777996088ecbf55f45cf2a9d6b670d283ae9afa27cf9796346a9bb73736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554db1200b7b3669c24d214fa1021f1c1
SHA1727ce4ad05f1c0ceceb1e0e03b56c0d6acb4c71f
SHA25682252d3cb719aa764643fc419521457638bfd9f4d01426192020b78dbe48be3c
SHA5123207f0dbbc7bc902a3d47f89b724c256b7971ee67e50fe8b4383c416afc1365dfcbb89f37702ff0e977a90888c01ea5d4a1d3e2961c6b936025d4d125c7ce0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ec4143c4e96ab076440d4d951ca3a3
SHA1705ad320a6d802e9fd17a7c6acf5478c16c3d85d
SHA25657f28646ad98eac1f417fd9088fe64706b359fd9fecd661d56ae95ee92f52b50
SHA51266979e6afb3ef7605acc9136f641797f1dff1f52d891547e4231a7e8c7a649eb229e87880d36f70c5ef46ba2e48f8be0c7abd90a519aa1c5997aebbc15663253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e0ad5179128a4451202519af75775f
SHA135527504fd5e6c56dc7b80de5d75df173da032d2
SHA256ee6d22d46222bb3e3a170d1cbf8205a51961dbf98bdb12a8ab8bd1321ace92fe
SHA51204be0d712e42486672c1be3cfba0e0087c090b0cc2a838867f2c02396fdbc6a67c569fb5f53e018b7e244b83f3e1709a697e9ec6c364306fa436dbcd6af9c893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5870d9e14fce9c03176519b32158934b1
SHA1143b981799a4213164d11ea56766bc4f255c426c
SHA25687c1397a3df93d15f0219b217d172376b9e45a92481f28d2b67cbc79dde00216
SHA5125e73e01083f21a81461e4a7d11d55859e12d21225993074331c2928b9ab619e1f3e27418a15d3281d256e1b9ddd0196a4c2fc92bf1a8d5c590fe976402243f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543562d1941e3f76ed9d55d69f667d438
SHA1e0c2d3d1758adec4bec016a37dbc0e559ca75fda
SHA2561085fb9e95eb8dabbf008e818b70f20ec2fce50c2a2acf7a53893b93e0c4fdaf
SHA512c04b5085875acaba06ca02383993440c272cde3e73cb6797e26e6c90e359d8cd2966e1660173bd7ce9c37a551e31174de993b1a97eb9f8ab65453394210600a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59690fefbeb9d34bbf6a48fc4304d5e37
SHA18c52b4ad70f0abba1a8408163a7d876f28cf2282
SHA2564b8c10d57d169c0ee796f5e3bbd6ed3309823295089581cc736a23d6e0b918a6
SHA51241905f5e15c227b44f9d095b701938148359609b589d689c3f9fc33f4e7ab2ce64f29fc2fa36c937a7a574011b2134dfdc2c90501142ddc0f0217c173f64880e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5148d777320e09b38f1cbaa57f12e3835
SHA114d9f035e1d9bd1f35c4a3696cc260dccf3edec5
SHA2569d6cc1ffae1d60d10e24746c7ec24a10c0e74d465f9748be063ebc1a5838e566
SHA5126d72260924f65392738709410485215170f2550d896cd40a8098c9fa5ded1b9f32c1a7ee4bc40afc1708eaf2f7238e4c35fc7146a3ca90278c4f7d15654d5e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a71facb70e66c1c9beb753ff1bb90a
SHA1d587288498086509ac5b149d1bc4d7a0a4e135ea
SHA2563746095aa47c42576d074d9e2bc62e06a167257e9136f198a60f1ef01e8f22b6
SHA5125d093c7b338827178c07c7b94917b5a6bde83b0dc9490126e3d0a36dffcafbb5670adf5391c926caa614b93ab1b6a6473b4ecdde0979367e3d11087a90cb1b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba82746a6288c8052f139bd510dd334
SHA199e2b430b1e2611352b090dd88529e10fbfb8c6a
SHA256da11de97bb7f1abfdcf87940dd250cbce1cd9b1c7aee5a88ce2c611f750bc932
SHA512428c01e00a628f3a3cbb237ca310663b6ab3d71f1098b6fcd0d5ea1fc14a4f111443835508731d699a9fac379be3010593aadf4596ddf8d4fe28b1b17ced281a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535557011ee021c7ddbbfe1ff41dc8036
SHA1a903f014665cb0de311aa9364138c0b7d9d9dcd0
SHA256319582228a1863def6b0a24e2a57a5c15fc97272f8d48c2797a8fee2b1691552
SHA512b71103a4dc2f476a37cd03bd60ecc9b9cd242d748a6390d9ca6549cebe8c700193adc5b735b06f280670bb792d911e6b85af2801e71015ea7beecffcc0b96ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f396dfb56c3efae304750c724307184
SHA1cd4eb875270735850b1ace6a30d1e1ac00b78d1c
SHA256fb1e22be20f1f9796264d5fe313de9439c56175f8a772708f3965f1ce53138a5
SHA512690ad6b234013b7eb69f825e5f539efb995c363dc1a8c3f83df01c6a4cec28428a343ba65f2646f6e2d4996ebf6e2550c54d63277be8b898d5dcb26d75226cb6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a