Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
398c7443c25ef4ff416adf9782c72d52_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
398c7443c25ef4ff416adf9782c72d52_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
398c7443c25ef4ff416adf9782c72d52_JaffaCakes118.html
-
Size
15KB
-
MD5
398c7443c25ef4ff416adf9782c72d52
-
SHA1
c9de25a590d068fdab75cf2ba9ed528ce46fe0ac
-
SHA256
d8fd6c539ab96376f5b41093cce13792144565e7a4f722e4bc7fdc7739559022
-
SHA512
0186c1db64ffd01d0c7ea9d5461f05e139937847b4d2965ecc3710cc1e6f2261c744424761fad7248411a27c0972efecaaa29f79fa1b13f02a7eea25265c9382
-
SSDEEP
384:eDp3/b9JdmAEAEwd0OOO9DYIj7ceaYTbYzUiPJy9jnKy:idTdmAEAR2OOO9cIPc6QAiPyX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42EB8361-1047-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421670239" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000389c3ec86538f621dceff79ae360af62b54465659c83630d3b6357e79a21b5f2000000000e80000000020000200000005ec1e9201ee741e2588c086309a5929fb3331ca318f2e09365a84b62b52e9f35200000006fea8fcd010eae5251bdc6486dc96bcd1126638728b7a8f67c26e7dae78c0f0c40000000329fd6f3dca8aa7da451fc789278e59cc637c284ea37e64af378081d45e9770c03ad75850d3302bd16c5f3647204d6c4a3c59a95f9a8d51bef14888bcb07a7a4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000eb55b29517e1d8df480e418079e9ed06b9adc1d6fee483e525e87693e7f4fda0000000000e800000000200002000000095d71a5ba4f2ad0d2bb3e008defadda07a9847d8102278d5010130dcc5284d759000000087f5d9df187b5529e968821bc21bbb83f56947e0e487de7d03982064258646812842eacb49191ad81a39fb7e6282596f865e177d5d17fde01346d9682bc8cd2f5ce002d7692fcea3242eec6835afa5c0c3c0f9f1d236127e32f4c3137e3bf7c3edaecf445a8dbb9444ef1536d44281a50b262388d25bc9d999478f1fcfe4a1a1c4bd9ddf54ab94aa7d45db94d322a5ea4000000003f24785f83e13322a2cfc83f1364675af4b53d72b5ad0de8d27439e9cc9d8969d16366b38e2385dd67c7a3d51d4506f7fb00521e84394a022b341be37cb051c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8093c81754a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28 PID 1612 wrote to memory of 2996 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\398c7443c25ef4ff416adf9782c72d52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540400f02fadd440393dfff949cb2eaeb
SHA1764faae299fa7f71189f1c94ad77beba75185b2e
SHA25674ca2131b0c221ffb93ca9af6c45f0be29da40723dc8ef887f012347b9402413
SHA512994239ae7a9faffa9eb3be31c49e082d63125287e0755af4e8277239930b22527a579edd3b22f11e8b79c35add61b141028458e97954c850d704168c8c2b65d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8686d612e88c06d017bcdf0dfdf916a
SHA124aba71b0d66beae0fff2ec777218b84f6fafe82
SHA256ecc1fd78ea132a4edd55d3a5bc4e93dc63be3c932290efdbf51a3ee1f5ed6a3c
SHA5123ba87eb2b7ef511210cad122fd0a7ecca8076ae40ef5c15fdcde88f8af809f264f8247d17431207fe90045f0c2c573064f3307b1ed5538fc70ede85871d4635f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5809fcdffb6d4cc4af04a4f7dfeee7f0b
SHA1761affe55728f00c55ddc9896f399c8b22b4abe7
SHA25628a76a6738ea9a263a79e77ad452756c4ec80c58abb73b990b55bb4c997bc275
SHA5123b6bc67b2efe352c9c4deb62f6565b630e819c3e69bbd3724fcd8ddae2c8f50711b74b766973bab65c4ca902a547565fc66e8ed1ebd70872884eb6702ce5078c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54586d40e18db3dff05f67ad1f19a67cf
SHA1073e74d407b86b6689cf80ec663e260fcf17993b
SHA2566ecd4c05caccdc49bfeba57a700578a0b0f887479ebe38043ad91ebf93cb3aa1
SHA5127c9743441b670379c3eb8b7ab478d7886ace2071387f4e4538fc7e3f5a03a009259a50e1c1c8960165dc159975daeb0caf83d1303bc3f32dfe1cdb9d2a738fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45034aa2b1191560d728c0a950cb01e
SHA1f7115b1cb42a2e1a43055b73a963715bef6ed1e9
SHA2565e8557e20cb0f0d2e0ee71399fc63e8955ee591c0dbf2e4d2623a52a6b4006e1
SHA512dc8d3e7df6aae2de1e41f5af807458509f699bdaf97dcf7d796b2bb6ad17e35db1f6af89bac28f626c63cfc42c04a46866432035e2b0cfae9b596afe8922f4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5474d56543a7f922e5a35a144b73de64c
SHA1fe3b5c8bf7b592ce82ed7ff2280121103134e830
SHA256358145e669eed77f036c9e6b482499d7850b3e242fece5ee32bedec7dde2f00d
SHA512e9346df0c111914f2c7412005c478d09fab42ae5f997561abae55adebd3097141e606fc885791dbcb96c58214c5a8c82133e031e1fc847410c94957b491ae449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e34aa81cc91308f5b0e21d50438a0d45
SHA15029eeb271998143458800c8967faf563e046198
SHA256ae70dfbd37ea8dacb814a4d14136a9ae562e6afc43bb836a7bbeac174c11b574
SHA512c611bc16959e78b0e81de3879c0438b18714c1efd277f7409e8434120c30baeda18ed82700947498a5d03dc12c89de2120e53ce28b0d6f2b282bc4f9691083a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eb06ccd11bfc3963643600931a55ffa
SHA19dc319961ffde07b4be547110b3bad5d0a53969a
SHA25617c9c40f50b05fac1b2084179172aaef7ea1b1aa4d4612096dc77257bb672ffd
SHA512562f0b9005f029f05613159567bba4d3a932fb6e02766254de24fa06a785e3ce2869a8cbe01bdfa9b744a7ae146350b394d364d7ca308f8b024cbb0023f26ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1417a74bfc6386515cc6a647b1ab63a
SHA1403b39700ed75a54ce15f5f4458008732627abf3
SHA2564368351f6a821b763a69164f470899011394be03cc8ac80a563c04f248494440
SHA512c0b1400ce7db671e06373cbdb51a262bd24110966a0d14d306192019adf76ab517c283bb71db6aa1f26e84480a54f658d429496ab4597c80a2c17b3fb67a788b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cfcacb27d4f914d75d09549b2d2baaa
SHA172e14a3a1a08e7883fdc37609938a3ce57fa956e
SHA256603f579a6d918f9b7604433db5ba00b5d3de897a82f156d34efc1bbc0a450762
SHA512f90905bf3d24e00c0394b296838b16a8c67ce77fee6f5b0a1ad2c4c48950a58c5e32be2b242a80d2c80cca64e59a0ba410b3a6d5d533106320840ea78277624c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd81a75a04b14f6d9c73bc3baeb94c2
SHA174fc89db144d06f30803b60da64549561746971c
SHA256933d5a2da615892efd32d990337890090725c980e63161e15fbc5efcdd22c896
SHA512d97e9ed278bc1ee9255c1458b814507c983168afd5663beac1ca481e246a8b1ff90b96bb8f5d7a1ae7aa22f34e32033b044624374aebd9c21777546cc32f55e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5371763857659e7a911007edc55bd7f94
SHA13f04da1b2e73b1ad544742107c98d98bdccddebf
SHA256b922b48603ab3089ea94b91425d6bb6d08d09bd0270d2419b3b893b28e2f34c0
SHA5128119e4582c87dc47f434e29f8e8b864f7bc4c6e8010de42c883df97808e3162fe5196bcb755045f7186fd8c9d54c255fc542699c994932ff58d62055a664bcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592f3faff5242c6656568b8ff617ed51f
SHA152fbd038c568f409c39c69d9d30cae7ebbd57af6
SHA2564cf52596b46dd90a54db82589f4f6b0f97d36eb2c272bff4c02ae55615598ea4
SHA512a379c5ee7e31096644bdff88d2aaaab57ca4b8e0137bf97b292d3fbd06044a2dd89f7a5cecd50984898c8d4acb71b4e30ad383c83c9737d41a2baac18aba3014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39a6b63ef4b67f8105580cfe18ddef8
SHA121ef043d98eb60c3a0cdc9556c4ce13b32b768fe
SHA256e61b9b2d955dffe7538a0c28cb0d6e52253088edfe8f081199214369276aaa26
SHA5127a9259c424ca797a79212182353e67dc1cee92e92fdd4e40d0ca2882c22511f3e9ff84f2dce3e84a5bec58306e666e278bac33fcd5ed76165aff42e05cdb2464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a4b8dc49441e12a5e81b39b98326adc
SHA12b16bb3fdbdf642c7502e957535842d345065f86
SHA256364ed36816b6da7ff3f87186f6075ebc21cc5b67ebc943cdf82feb70fa61cec6
SHA51277678f2dd1cecb758c01b544c8ff3481bfe6e555aa708a2842355ad7d90402fb49d3fda859d3735b30ed6ef24ae8fa5017d9394a7a0cdfa67b23a0ec1e1fe5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c755968f66f8c623dbf77efea24fd624
SHA183faaabb50e966818e8de038dfba8c81f04ae0d0
SHA256b0d6d79c24bcbf8b7d2ad642dbbd67e5256fe7d33535bf7204ea098152f53aca
SHA512fbbb7156c47542c95097a96077c87a51f9edc7e9e63b30d314db05c4e60af7b72641b00dfaea6a53eac2c544b4365e735383b0890eda84f65bba87a0211193f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e30ce5ab3153e5e71c59ef848e3de8
SHA1b6d5948078a4794f88a18422b0d06c1161f59c0e
SHA256399bd191bdae2eae0c7ebc69aab57fac37c8ca90a90468533bde11d997d41d8c
SHA51287553d4a6230b8b854a81489a45bf8d231e3ae088b91accee9c25d362cf58d35569b96918357d1416e1727c218bd8cee1359826cdd295bb733d519256427b6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411c728646716650a971146757282d09
SHA16fb39b127f1ad8f7ba720b34e3510916c8d7a1eb
SHA256fc157e5e76c8ca42ae0b5cca9249d1892b5eb72e45de7dd6080cd5b71be77d61
SHA5127c1bb06fbb8e982506c4760865608a5fd25971c96f82c8cb19fcd7ed0f3b26caa7d32de2da6d6dd2118277985f904bff0bdd4f208690fc4e9e66bec84179a2c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575d6d27f8461d66f19d5ba5f05eb0aeb
SHA1e8c7459f16893a885fdae875680ab89812644ee1
SHA25616952aa3f106e8f484776411a7139e3f27bafbf449b886d4d0d629d9da6c8967
SHA512ddaef803b0351d6d8871128d312ce449b7e2944530b3a68f5f8c7c6d20c4cbde740eef6a8bbd9042d5823ef9d821d51b908e4f099c2458142cd126c094b1f513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a0361f8e5ac5248fe864309a042a33
SHA13077212e7ccd9f83cfcb17b35925c0c5a34e8724
SHA256109b11d32792cd5bfd05b8011ed9cae640942b156696ba525e2b12739772e202
SHA51235a0676cd97d0d698646d15ee24048279f7a87f06233f1009e86a518161611e224f405eb5fbbadef7f13add00e6031378257c005f2b6a2c12094f270df5b45ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7fb35abcf17385e5b6ec15fe52cdea
SHA1511af1e14659b3ca65be5c75812d72e2efbd3256
SHA256fe8beeb7b894c051e9d402f589d6a1e362122311dd6d9e9bd7f1bf817af1e5a2
SHA512ff6918a78bf6d081f3a8b30a173161057a5f642b7cb904ea3c3dd25489a475fd279d527f14ef919b942a98827fbb42f1b21530760505d931bb53567e163ceba6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a