Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
37ac5e3ca303c874ee429237ba8ef517_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37ac5e3ca303c874ee429237ba8ef517_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37ac5e3ca303c874ee429237ba8ef517_JaffaCakes118.html
-
Size
14KB
-
MD5
37ac5e3ca303c874ee429237ba8ef517
-
SHA1
e2fdfec9ca753559597fde9496e63309bef00b39
-
SHA256
85b7994387dd47bd353af1d55cf7a75b148973b034e65a3178efee4275ffc9ad
-
SHA512
531d801587d56b3611f41506f2b71633a8868798b4fcc65246ccfc366cf96d8aeb1032893f3c8eab84f261e0e02e21bc94170586634988ecc6ca5c4018244d8c
-
SSDEEP
384:CyipE8xaZ/t1oy1emFAi7zy1w0M/2XQowPoM1wovv:CyipE8w5L/eOAi7zI1MHoEoSwoH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421641225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000be9632811e79745a789b068ab78baebda493823440e57ca87c04f5ca61e32a9b000000000e800000000200002000000059adafa104689dceab4f1cb4080cd458f9f0a32fb6ebac7c03ad61090b5d46aa200000000af7949ee573edcd4c230f4f5066e8302e96c46a7a58c6e2619b82024cddb493400000003beca65e96f899b39d7d94e130cf47f3cfe481cc6ec21faf6edf67ea11375d9954f981444152adf2fb2e5e4454694a71222267fd3584a43745c55c50ec09c846 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3E36811-1003-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04f638910a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000043e01417fc27116c4d0a0ad944f553fa9dfe375e83fbb99c73bf5da88db588e5000000000e80000000020000200000000f623a43fee6f1060fb87780aabb7cdf3aba8f0b4a9925a9d3ceb0f417cb515890000000ffe5e48b208185a2a2e64c266922a692c419b346f5d2ec74597d68fe2681068a93d6a737d4c269867a18679602b1a809082dd8c146c4d917d4709758be1512348a83237c30870c0ee151242202b31950d844a9c0006e98ab8d840309407a5efb70f88433373ff4916189b0426dc785d680bbb9abd1453c455dcc431a9df676dc25bfead8895bfa8857381bceb880775d40000000351c426c61e9f677ff68e7297ce03139a6933f8607e077ea34ac4592a41e39e42cc3450144a8da81a5bbd726d5dcb2b0ba67628276a45b623249597e5f51c0d4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1308 iexplore.exe 1308 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2516 1308 iexplore.exe 28 PID 1308 wrote to memory of 2516 1308 iexplore.exe 28 PID 1308 wrote to memory of 2516 1308 iexplore.exe 28 PID 1308 wrote to memory of 2516 1308 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37ac5e3ca303c874ee429237ba8ef517_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5607ffde550d34b6a89270c5c107f1b46
SHA1ba2e9ab1a6d5d4fce2cf8dbf2f752b62cc514250
SHA256cbde996df79811a01dae21bc7da072e42686ee0f099d502673dc84b792b4a0e0
SHA512792dceb8cfcb661ab0da0a4a0466bfda3590b97c02dbf9302b5d018480beacaa06f6e2b8aad821cba05bacdbc63b2e025f1b8845172c3e7af1367015b0e48e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6a2f5eb0e3e4d7bbc5e3343268d73f0
SHA162d202e3983b98b1e11088adbb90f3dce46b7085
SHA256b65cf46e653e59fec1a9d07a7a3229116da40a6d82db98441621e32257794e8e
SHA512d7d7b4d819275bb802b2d4a960156d40cabbb30504ecd4bb7789669f563c71f773493a54923959610128d75bee0cadacef8bdf8235922373be33c39e2da44936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bc822f8a84673b9aeaa88381d00e75c
SHA1cac75e5623baa41fca6e094c00d4aa323117fb83
SHA256884564f44bca26a64ac36aa19d0e30d91ade4b00d024594bf01ba95810758bb7
SHA5120eb97c0bd0fd013f672efe2416e1f16074a9c62274cd2b98e474f82ee6bc405d9a4ccc3e9a2dcf67ffe85d664e938db9cf68607b958fddc8e8e665850ae1dd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eeec714ac65ee2077ce12b03c807297f
SHA1efe8d0d0d7e99c4c7ce6e921b7b67c52aa240c30
SHA2568090d33070c3164081d6b4e3f4100a444f49f8f6b3d1a74afc2c7a4776b06adf
SHA512e0adb847fc4d3e932079ca357ca967b4d126d6eb1c59e0f495093481b3a342096df3cc59726a1101be62515bfe23d71f9f529088b97715632f3e1bca500e90df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f6da00292f1e34709e5952523fbdec9
SHA104981f2fba5ffecd2724ba815d2e0a4b25d9aa5e
SHA256e09928f2bdb2b0c65a11c2948a3717332997eb9f888081c843e54a0d3c89bf5a
SHA512a5cb663cbd6fc8708a3e1065312d39ffb1885c123d7b2d79e5424b454e0572c42e0e1385bc0eee11d4b6c34d6b3939129fb105bec5fd923a000361a43db694bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577878bca0c5213c579e51befa5aec13f
SHA11e290deb7895142fd37b2b26c487f5de77c20d8e
SHA2561fc833484fbfef539275fa64affcd0350cfa3ff2fd548860ad9e9938395fb077
SHA5120cf6a1f0bc9e704465090c1a19350d9f48f8bb9ee202041271a6906aeb7e5d4fcc4de7e7434af274e6f1f8f179e55cc78575c75cc53968069fdb49b4652c406d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b52331fa4af93922e68e50dff45675c
SHA1691482e99a1fe93e4fa9d6bcf601ff1f7a707db6
SHA25660ebff6e862bbc96404963bc4932c2e4ba7640350205a5494ece772623dd30c7
SHA5126b9daba92f1fca75f2e0bf32384e2cbf7300d5f843553f26b2d62f5e65001d6f218d1d881499f144e9d4fa57109e9a0850fcab73abc05df2e0b138c37097131c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afa96f90d7a5d78099a1dd8d7e58d5f9
SHA1fe4f2a61c6cd6c4a8402749642e8deb26ba3a57d
SHA25623d282808a6a135c3290020a1c449068373b079dc38997012111ff466c82d46c
SHA5126ef00820fcb957cf1594ef4d6b3b97396459edea13343bc30b55b47383fec7deb9eaaba2953f68cf3b68b5c35a48ca4f7d2f12a34dad0292dd0d0b47b418eb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51826fbe4a72195c52e3bce934f102afe
SHA199a9a8b47b31d87ce380df6a792fd36f531676cd
SHA2566124ca7cc0f560fdd6940718bde413080ac84f310d63ffbfbd330c07a5df0eb2
SHA512ca9bcd6f6de67639f759c7b3db38dc938ccaf98eedc85634aaa2b6d8dff2a3982a8c9b7e4e3943a39fa43e733487de855b7f01c333e1da173d145d8dfe1a88a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a17be4b56317f4f373056fb2fde2cfd
SHA1603a31b414b109bb1521412a210d430faf23ef16
SHA256739bd52a1233bb25cbf6e965695ce379e953ab30346373ab153ece62f9f7e7d0
SHA5126e211d2ef54c22257a55900813325422bb4e2513e1e1a9528df91a75da0678c3c280dec7f1ac5b7e63c7241e7b7ff43fc04daf9612d4c1f74a247ca2c2faa528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50eaabd1ef011c6eb59baf82c5b080574
SHA17c5b59919b17597d0d52b97fd55561eab4f28ac6
SHA256f05931f428a26030eda41cd70ca86d66c92b478bad82b7467e6becef1de3745d
SHA512823c19c6ca28d2a7efc49614bb01c0de23efa9766dc5cd7674ed35bfb374a5f25d6222a2f44bbb7324b2670ed3892be155417263987ea8da07edcf5047bb102a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD539eb740bbb7bf359aa9005690bc461d0
SHA1f185fcc52eb36263544162fc12fc93d596d9255f
SHA2565e0dc9b0aaa503f043ccc952229ea728850ab03c21c61b8849838923126404f8
SHA5127ca5acd8f2feaa7945d8fcd31555995142b045f17d55db49c3c5f71de3dc772d6cdc35e1315eec9c71644d431f27a6b8d154b243dfec662e0963859dfc399fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d423347d62e92a186e7f90f5d1bb23fc
SHA1cc4892f43f5bf94188fa611fa7fba51ecf53e354
SHA256ff15648601b494bf2cd9861271819af6c94498164ba9b663bb54d03d9c2e45cf
SHA512c24e0a1cc94769417c951e3d24f4b04e1c460bd45452dc58a8fa6ff4b6c029bbc21c119d661dfa15f8fd2e9f91a17551b0e80b99934a43c3b1a3611101428986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8ff1c4d5e3bd2136f19759aef5339b9
SHA16e24d8d4554f78b58b035c5dfb8a748e5f21fc7b
SHA2567abadc516c3ea2939f44d609d17d319ee0eaa244610c64516af867b8e8cd52ab
SHA5125c9cc3fbbc227efbcc4586d2a8be8c8d992c6c44b4ddd580a40cfbd51908d31c321345a0cb7d446acb5eda1fa7585449d3f4c87d72f34561ee74b5bbac6df35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c47d2e1114aa6804fd0eb187d318c5bc
SHA1677e892d0beab59a01228393fb02411d28f3d898
SHA256f5a0628babbc7aea49f4ca813aa47d15f49de7b064306734c1da1e99c9d1d31d
SHA512a50dc41728d6a8cb0f9465ab2c7dbb320d5e1c1d35b05a91b02e6fad68c363b16b373cf229ba1fc4ad1bed27681f59fffd6855ded81c413d9646d28b1392442e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51038d67215ab54c26998a6ee5cd1321f
SHA1b9a3bb6b978cba1c9ac82c97b6450d62abbd02bd
SHA25633d5d01e8be5e5375bcffcbf8d47c5b3027a107579f804fd9eb64bde87fa6902
SHA51287080d3fe643eb7272d61b7964bebce8e3c18a9b9177e8723a6c37e146ed24131006c46b511554fdac2e13fc086194cbe7437ece2188517ec2757b1a41737f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5215d979bee6f27ad5bff27bd17e2e0a3
SHA19ae21c4eb16fb12f25230d6f0c0a88e79497559e
SHA2568d6957b6809c276a477dcbd1f943eff6cb403284b2f1b5f8b96504f8b8a7596c
SHA512ebf9aaeab5a2a017c53a2cf0cfcb640b6df56f2f2fb73b27443d98f6bdc7022c1ffa54c4bf285ff88c637a9628ce1017412ddc09b0e1aa8c9bc603d3772107e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c9bb138d06dde98f7b7d3deb0c0793c7
SHA1ee8f120f52dd348470f2bfbb72b03be27fef7d79
SHA25698f1a94aa97583a936bd4f021134934232f648edbee7823de91ff345efd5dd9c
SHA5125b5fc1b30407b703abc10a9a66bff6e73bb86471bf9ab8f31ec2e82908ceaea341eecc868338f1c8c5be17a74bede6c30262501f3f470b28fa01191774de9e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD564e869f2564ca324947820b8e918826e
SHA106249d3f26fe381026fa2d6815872b1304bad8f6
SHA25606ffc43d0e891c9bca77dd853dc42f621153d41bd96f112031458627ea5c5d68
SHA5121ac46db3aa9cba8983ddfff95f676a36a4b216d8c12a7e0eda45524bd9713c8274a2e763c82dd77ee6ef941adcca6e16c0dbecab1181fb0e45f0f704e95ac1aa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\1ADPPEOD.htm
Filesize402B
MD523991600d80bf5e4ec94ea97f35a8bda
SHA134394434cf95df912ffd32cee83dc231b6a5fe2d
SHA2563c760754a953978467ba3217650e43a3053203eb09e60c43e442f32c2d055b65
SHA512c21e01b865588cd5563646d61640892ac3b840196d01754ab1ae98e0f696792c855193178b8408edc0d017481d2096a15a3b70db1c0f3f3d119cfe4449c42da6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a