Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
388debbf7c8168dbc159fc7ef3ba198b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
388debbf7c8168dbc159fc7ef3ba198b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
388debbf7c8168dbc159fc7ef3ba198b_JaffaCakes118.html
-
Size
27KB
-
MD5
388debbf7c8168dbc159fc7ef3ba198b
-
SHA1
6767dfca2e2f0c042bc37ecf4e90294c5916def2
-
SHA256
5d7e6532be160ebf6d6fb2612c6fcb46225e7adc21af5ca35c0b847a3c992e0e
-
SHA512
16b1bb86d1c92554b4cf5aea0e8c7d14656d57804db95b95d09180eb724f89078d4c5db441c706a889df20d1ea375155f5381ce225cf02e3055e40b91f23538a
-
SSDEEP
192:PCpbk18Z96BABQBSBZBWLAZPJM3F3IJ0+JZKUcmrbe4NNIyH36E5Jku1/5prpfJs:PdyZ96R3fAraS0gyZAXRIAra1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d3a2c22fa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000049d7abb5b4f1275623b85f4b6d02a8c4cb0a3add36b1d6c19facb8048780e83f000000000e8000000002000020000000fd65bf369071c955107061522022a9ea3bc6c1f63ffa5cd286d8e85bd4d3cba920000000e99d2a22d01fcbc1503bc22f43f428fd1a22a3eb94e9312b1bc852a3fb9096a64000000058151fe883a8b4472a407d87bad421923185ed9ea4b7aa6ce6ff727ce859975fc879417bd5ede987fc13541b696d9c8e9bf4895b167f04a33292e8304a43c333 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000309ecbb3c9c3a9f12b35d7e53f124a034f6900144f9aa8054c877aea4cd912cd000000000e8000000002000020000000d53ed342af28d415ff9158a3f89b1c2755a185cb33a739f3195609dc02cccab39000000087d98524bca16a014f407acc6ed7023457e00d669ed26b4914fcde73e68a45311b4d951fb0f91dbd1ee661beae8ef9bd48f0e3c525594edc7dee38ac47dc386a9a7291af02ab2b17f2b54530ce58f2fed1b84735ec9a55864561330d840d5f5ba833c1700e73b62a36c4bf9edf2cc50b1ba7f1b474664f707ecb6cece6d970d385f41d42c9a01e65def01906fc1e9dda40000000e06f6773d7de6f5cb57206326389fe8044dc061800396f182e2410adbc037258f3985e29ecc327d02832d35163dbb4d304ae0ee1ab228ee32c488937ae688352 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421654630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB3D8241-1022-11EF-AB95-422D877631E1} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\388debbf7c8168dbc159fc7ef3ba198b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf535efe1ba8d9d54f1a8cbac72d622
SHA1d99d3b577bab49b1bc592e5f194ca603711ea517
SHA256b9aa371c913b99e4aabb94903faf70b2d5442f10530da57e8cb288cc9fbba578
SHA512f7c6c9e1dbcfd88c1fb98a7eb4f9288f430d4c033bdff1ec3ab3e3312c88ae0facae7366c3735bca623fce12e6ed9131ba9b557e16ec58d255f0044f36230d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5529d7e480d842869f18c8ae5ca2b370d
SHA1cc2a910251a12a4bc2ed17d3f742b794345b8ab1
SHA25663c84aa7d661a9ffe84587c38c1094102771d94b4b096270fd0ab1404cbd0e62
SHA51252ab3b8a25afc89b432b0cc88b62887402d1a5e44f7ec97317b853c7a8c050ef263cb1a4c9378e8c0604bcd3272c814c305a7f163695299d212c14256962b584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597daee32728c6ffd9337365a9aa20dc4
SHA1d58981cc7218a9cc541a292f7aadfd7d73fdd5d4
SHA256717f718f6b669312694b06b9fb732488c8f330a744dfc847d35a79458f7c0b2c
SHA512a5b60a9751b3a638a175c4983eb93ff1e53f45c5795331bd4f66d92fc4e883d1c9d0993381ab0610050df54a6ab90236b6f181b50cdcb727217b621c65cdfa3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36a1ed15de791754d57a8ff89bf97c9
SHA18f774902283f3a501622d44ce0e08efe4d3ae23e
SHA2561e372be649dd2760d5626513cb152bd797601ce0d625052c7e2cffd22f481c63
SHA5123136a561dd54e29392ba0f77e1cfa610dcc01203872f063fb3c7e143919206bfc543bd830361b6dd6e29ff52db255d68b1e56af452b7cb3a36adadfa91fb5c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ebf7b8a977bc4096cc5284b18eb405d
SHA18530a0781c4223d180ee479fb7277bc0f33d303f
SHA2568ee0dc743c7233639c1c7158bf4ef453adeba50f5fbb902e1db87d3115cd5efc
SHA51214a2e412a07a679cb2b917d345d1ac8f791026118fab3758228c417374fa2c896930aacb2669e0e922c2e80aafcf289828a5ba825ede1f0f96fb033e6c41b9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd0ce6d0b6ea723135029f47adc866c8
SHA17db781995f49064d51bac5b1f12ee160fac58a42
SHA256b2cd474f6d5d714bd4298f8b235e836a2d2b78e9074db593bd838b216536f2a9
SHA5129f069beab796a452f93e059816d8f5ebbdd062c6ccfab0329237cd4f3af9738947c779434184769e144d012ea32a653a7aa9070d9aed963928b317a55fdfc915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1f3b59bb5c3abf348e4f4d361ad991
SHA12de60f9094f3118ebab98fe4ff1c3b645b106ba6
SHA256c4a5de230b87d3d4295cdf86bbe9f52a28348007862fc0043eeba596c97b7e14
SHA512e4079e13597cd81993718f0bd68ee621ab5b030ac62f602308c8a6a2e1d908e3e161ae943100e4860133baba2b9136b5dff5ca109e3cbf73e9eb5ba554b13cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525ef1ae4dc6205db0e93bc1e411a5d19
SHA1cbc9d49d6408489e9cf5d834c200db75622f63d9
SHA25612726d2f66c84ab3c1f4de0d514d31c672e45ececc2a672fac71a6e5ab5ae506
SHA51266b6459241f9c7b69912fe2083e5c079cc445a40e441db74189f09a518f6bf75f7723cc3f09042fd9da1732fcec22cf4f88dd41bec9cd3100158041627e8cdba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad5852bfe20bc2ef9fad9b468623bf2
SHA169ced1888690753235fe335b1928a407e04230ee
SHA256c41c4275eb76da5ff86e335f450d73c138c440b02b4c6e5c321375a8f41a3322
SHA51292c5c36f4a539133717d9ddc8be5c520a05f83848b8f9445c344b82995c47185e973fc4d948952864e1d56511f224a70e03d7debc6f5ab8fde0c471151a1f7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f290050369ffefcb2ff36afcf4fbeac6
SHA1fc69f726fe738f7a7bb0bc48959a226af2b54301
SHA2562f7aec61f2c4ba0428c1705cf01afb22bbeca58860718189970620f8d7b25994
SHA5124c2d5010a593539965c7d02c36fd0bdb2d248b78a9e3666698f09af710ec85b1b7737b322faf203bb87a870e28b227e09043d57cbd41897f58fd4a145685fb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59768683c801ad0c28bbc978afcd7c2b7
SHA12ded9778b7a0dad6c0d77b9c28565debd16c493b
SHA256896a169ede77283aba92a7862836b3644a27083f4e9fc2254b0e4e89f94293fd
SHA512a8ec97cdbc7004e6a15c89bfcd8055db1f07c0b615cfcfa2a26b94ff25446bd644d6a0cfc9109450f457454d342ee499526e5aafe184b7a11661ae01820c1a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523f5ddb758852a3b9317f923fe454810
SHA1d609cb99aee1392af7e17062a9bb8582bec09126
SHA25685459bdaeea0fd3b7ffe78d958da320ca3c80da473f57ea50dd6bce3391c3b96
SHA51290466fdbf6fef566e3a488912b33e0898c85241bf7d15ba8f2448be7bae5726c9daec077596cb1c8e0bd04adcd673c8d7f7a0a3d74bfdf9e428ae5893d339c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5403045ff1c175e8bd502599a8e3fce6b
SHA1186dcab2bca3cb972a712c87f996269fd8f79756
SHA2568bba57ce52a8a5fd6f1acf5a71e53e1a5d4738b0f6e18920d0e993975c728fa4
SHA5126066ce2e921b803d75b165114b3dc059891a7c8c86aa343ff55f01fb9924a5ffbd4a95e7944c06927afc5e766bc5e17ca38e26c760c1191752bf7f2ba86ac4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d254f0712cb10887809f5672d3cc56
SHA16f373d169343ee789d938194a0f7127a00941599
SHA256cab7a4a23f30d8784c58fc8e32d292363756ce0e285e44deb2087ffc23e6d343
SHA51232f641c0fb767b2fc801b61ea897ee12b75371b3f3ffecc3879a30f3db86d34f9f4aa352900835fcaf8088bce94b80498c30b974f9e0101f5510f154602cf48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b70ed0d846e63af6ee0d7b029a7adb5
SHA16097024c8f8b5fbe31bd6fdb8331c89f1179c6f4
SHA256f90fdb8f7ad8e4fd92ba1a52df61b2b2348f8d606513ef8f0617f572d36d1336
SHA512238c867c1f26e8cdafc79fd6ae877f3466c29490b26108843a3003039bec4447bc0932673d4904a9f57421cd4a11af390432068e2c8010fb51fa606c0cf6f620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546a3b3b45105808d025b873e3b113741
SHA134a25a589870dcf1b90ce7ac2553c18b636358ff
SHA2565ea4d505023c23ec576c855ad260b2104697347f1f417848a85f7fa062998f20
SHA5127b05c6d62f82fb7433fef1f6bc22b619d04ebeb7e5e9e4371f23bdccb7ec9d2024f7d0e4bb76d02594d61580c358887b23f4299427b3e94bef4aade0ee06f58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e473371227cf0d85568d376dbf8f1a4
SHA1eeb1b84af65112a1d406cf8c7bb1044cacd2b8a5
SHA2562d4bc279d0806afa98e0b59628613533579ffef78fed571b3b054ac94ca400ab
SHA51221e0932b6de4b6e915449ccf379aa2c0efd2576bd5f90e8550d59f0b5ad29d7d6cc0043e091a64122e4c769f4ef70b0fd8649538702911a59cb96359f0ec034a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f21b3b63a09781d104af9bbeb9cc36
SHA160b08378184e3f487ed2a7bbc0295e98b9a9c629
SHA256362976e2b9816450237e6637d9deb81379fee147433be00065dce6b8c4917092
SHA512d53edd5d752021a411ac703ebdef06ba2e2e0677e3369fd936309ebf895ad5465e0f4c087dc0d9902fa8dd76ac02819ee094f15a810c868f73c82156008bc089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ed6b14a2092639cbc65f193d83af93
SHA1d4af803f330a7a08ef818e7a04d3e0038c89acab
SHA256b3cc83ebe936a7d3281f18601f6e5f2c01c8bdfb9a648f8df0fbac280f95e9cf
SHA512068e0594b4e6b16d91eaee46dc99ba6f3208b92587de980cd7315a9f8116aea39109c070596ba25128d38d0f3f4806f7fcac0043a085f6cb3252e060bfac7784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d28763e05f0ed62d7b1d1c491500a3
SHA10481c3f6a37256c6206404eedb279fa16a43a20a
SHA256b698a985dc05f97ab7a60570f51ea0bd49042a9ef89a1e27748ecb3c4d917a2b
SHA5126c0fffb3e9e34fc118338346237097aef60fafd7520a90904fb7753b444442e405ce1f5e1b41a02df87f1ac61f58dcf24af8b60593aefd9a773af79d5086c690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0ed4994e8dda721c211cb49e6a40c5
SHA146e338da56145e9724e7e0fee253a785a2a37f66
SHA256362b83ae7b756fe352822d1b61ddb30017cf453bc1ea5d2429e1780b7bfb62ed
SHA51240b4dad8c561a45a22310481a5505672914203bc1e49bedc6b416fc5076c9023d8325335b8015c7e80f509722b507d44f26b2a838ccc087f7f06356bbdf880dc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a