Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
3a106c210c66ee1bb4be12609f14a451_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a106c210c66ee1bb4be12609f14a451_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a106c210c66ee1bb4be12609f14a451_JaffaCakes118.html
-
Size
138KB
-
MD5
3a106c210c66ee1bb4be12609f14a451
-
SHA1
dfeff48ee104fe57f65ec2ad2504a9bba73f517e
-
SHA256
bb3380f6d86869d87eff8cfa867654d7e4ee9f370a18b8bb345337e692ef3d76
-
SHA512
7adb0e9d5cb2ff49379148f15bbe2949a082680d3348831cc942c35512cad7d149a7ea0db714b54e6c94f9a720b04a06233775d4808ebe38f623253b6c4b2d8a
-
SSDEEP
1536:SeHvYZglqcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SecjcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000892be1c51a869c20ff402a15210acfbe4fa19801cf75033f6c92f3d5dbda9393000000000e8000000002000020000000ec68fae4fc259e1c1d794cb3b57921376fb8ef26d4f66ecb8a6ad94fe09fed7e200000004c448149b78b37214b6e10ad64073ec334495cfe62e038a5aeb80014aca9522a40000000bf7dba380758f796bf14a5e2eb2906335b567f7911577f441278bcda63704102b56c21f239a3f1e2e0af2804430deb70093476356cbfa58d08b9d1aa962efe62 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9081538666a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421678047" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d63cf67f4f10ba9adb1877b5d980d15b4d02d98c5f8f250e66416e81e1670b2d000000000e8000000002000020000000842f5e446e829b0f2d59264982c5ba54991e2675e8465ed45584a720afb87740900000005625e7fc1167386573e218304a744524794d023600c338f4cdaa7bf10f7dfddfbebfed0df1190ed747d0105d027d8b4b49c0d2df2dde2c8dab2b044808a4677e7d7118ea557e07fcd4bbf059d957400270fae28257e9eb45ed727cb43f9d567575dee254fd0a8c7a7704815533273dce05da1ef7620da565a114c0bcc0f6b7180c73fce519debe7bd2e4b0dc42822821400000008c02ba8bff896cc96cc5565392576cab2c793e519d7223825820085dcf46a85f95938b044fb2a3008660a418e3f12b0bc624fc7a87f3b86e253de9beeabf0dbd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{704BEAE1-1059-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2052 1868 iexplore.exe 28 PID 1868 wrote to memory of 2052 1868 iexplore.exe 28 PID 1868 wrote to memory of 2052 1868 iexplore.exe 28 PID 1868 wrote to memory of 2052 1868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a106c210c66ee1bb4be12609f14a451_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d93cda02ce41dc5d36a982a379e7f1b
SHA1d93d2f20613621f3db1f0b92caf51c703fe601a9
SHA256e9869825ef1973e0402687a3647a328dac9090a3740da2693da39ffd3187e1dc
SHA512135255575118924e5a73b62feef55f10fab2eb098986014b608b8b65e0ab557e5c94bde3a9a0593caa042bce8091efe1d0c59f07f17e3d676775be75aa622145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eee15e091528ff32558908046222706
SHA16bc83c4bc15cb1df61c8509a2c7cc76d75e4ed1b
SHA256cc1d88087c7128967ef9b221617396668b6a0109150137c8b8f6444b01fa228f
SHA512d9b23219e1468f032165be3f69cc7c90a29e534b9c58e8d4286792b66a9faa20ea90eef44e707899a2d2e1ce629dadd92c5c7a3a697647900e289f1b5fd4e867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5939f97026d207f239cac99125d36f9fb
SHA1fabc2d9e2c9d49e865b90fe36fed6402a4eef9a9
SHA256cee3b96a00cb4a48f491554d4fd0f2d01ed870bab7d97aa392a7346786e9232e
SHA512dcb4b103d3c72b8e31a6d80f6135cb39dbf44a11cf42a39925adf0dbb619d52fbf10049e032b6f3db8cf40a9a4d2c35742c41d3264c69fe2c5bc48856ef23cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5196653c59619ba22c857818f48f225c0
SHA1ee195a156180e376a2f8eb7883e7c47a66a4362d
SHA2564fb0ff574b941080e7b45da8fcdd97c80f7a1726a23a702f143a179a2b85a390
SHA51220ff41dbde9380da2057a3c89dea26e66e47beefa6ca240e778daada5693d4868aedafddbf2bf071e1da3cf203063cfd5406bc0eeabe78bbe7c8fc70e195aa86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9aea55e854d7d9f7ed28a853e4d572
SHA18fae1fa4ca5239d870b24ae643efb3437801a661
SHA2569eece2277692ebc4dbd789bd844345f00f41613f3133e123a0fce92d408b94de
SHA512ad192b3ae8b9eea7623c4c2c4cbdefcb306b11734c870d34d47f2c4d5a57fcb2ae284e11f56bcb0d932cec2be5df93e0450a5f864bee176ecb9d405fc1944f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d625844ec715343815bb0bd450ee71c
SHA1b02abde1c1379b5dc371e3ec1ff369272c6def23
SHA25605dd0b95e05c4104d7b80859b77d5b9a18821a973c3021871906b58c39b4294c
SHA51285122680182d17c47dfad1b7d8a1201574ca81b5eb7a79da4297f9ff6ca14e2ac2542ed7b5a22dcfca5a9b4e4daf3fc744a9534bfe683012c4c08a777a3c62c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f00163ad7ecb58db1a43f4694f39cec9
SHA11710da02d7db5f93b1bbd1764712e86f85ccc87a
SHA256ec064f80da9c5bee81aee61bd95dba8ec1c675b3b07c9d741de7bec3f355cfa3
SHA5122485156a8989a61bc1d7510a982ccd1a1d475c122df5d5740b7791e9dc2323fc6620df637904288a8f862b1d1053a3c89346c3a7eb450ed1093d85b5a46ff040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550acc5d81b857a2d0429e8d9be267e40
SHA11b8d8fb124f6481af8f610765c0e451f1526bde4
SHA256700e8c31249b756b46beb56fabc63af256fb83e1f1ffdca4c20b3d973dfd1290
SHA5120de329f6088e7c116c8176cd1b032815441a8e42fca03e34053e0c498ae808c4b5d53435737f71f9150cb32a6bca8c39eaafc3e0737a799fe9f81a9b01029194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ea160dd27c606940c71c91fa2636bd
SHA1edc1ab27e9b3afd2ca74aad810405c4f73fad5ac
SHA2562f83ecce785ae7e187f414e740ac71a5e50cc536988fb31c0d3fa77825e37f33
SHA512229b8d0daa25d57d27f0ccbe700a621d511193dbe2dd9deaa038770e40b75d14e84e1d45be9e6e691ce23ebd5e015a055c605cf353dd8ddeb400e3c7a7ea202d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b89ac1bce8abb6a4947eb748e3d5efc2
SHA128e5ed3902bd918745ca244c2ff9d5ba8add6e36
SHA25671f3124220ddf8d361123eb8d1664c19620a44c03c2c98d8fa34b4e104598aa6
SHA512908e03b30fec72b169276a0f56f75cce2d0550b642d86d9e3e9958e369bbeed5da5a4eefa6293f999ca5404c3b293247563484b4afc593319667bf695d8cd8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d3abad310406bf5a83e6398396fdcc6
SHA131f0a24189a920a4d718284baa9e2b8f51367e0f
SHA25603991bde432e4a15d517e05aa65e661db0bd83c2c34ab5ade1b6088fb21a651b
SHA51231943a5ee943bab9182adb56b76ae7a2f56652d5060d5d3dc5cf45fd776391ec30844785da227259e4ed73033444bf2a12631fec08e1292077c6db21784b792e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e81473faac28b9dddb2c3f9a52b1bd8
SHA1752823824a5fbf7bdac18e18ef50214bebd1509a
SHA256a4cbb1e643e4445695c28840f15d750728f356647227dd1ca0c114d2426366f2
SHA5125b6453feec03454fbfae99149cca70b901aab75df87d0dcd974ed72223ab3a64992ec733155579868b8d3b855ff78ed8e6b300443426bdf337a9a5b10c9708c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf44479a37818322b1025461423780b5
SHA1a5def9bb4ceb2991998ec0c9befb8b7c5239d098
SHA25669b154e3463d97d6a1e3c2c98f1f043f586ccc9c8537bb95a0dabfe389a2b4e8
SHA512d7259179069afa651dfcae23e65c59ff73088fd5cb5561e16fda1d21c960f80f6d8cf43f203e9bb100dab7595dde8ea9db505b17c29d029fd1e24c286a411b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53cd3261059725055e73cb53819f4a6
SHA1432f3edcf33c77f072b57d4e46a4d1beb8bb7227
SHA256b464bf44cda162ef6b74a3dfaa5ffe9eabd75f1d7cb1724b1becd649b14f0276
SHA512d57fcfb59ad1829931491b8b8fdad9153c78348ef9769add96b65749d188c0a09ed77b975af17592f1c0f1311f0929e0155ccf084b8b4893d92428cb9301d4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f919e8b6e3f0f59d09e1938b30e94593
SHA1e76a3f08d5dac16c10fe00b74276210c3ef2d2f4
SHA256dc4390d47350d434f20b1055ce757a239e0f575a3e0c2dbb6054844b3be14ed9
SHA512365ac182285df34c603cb5f219aebb264a7a4eb51ec678a0b0cb93828b156723c833af1a0128b7c7ae61f2491fd5604ebbd454efaa89a696de099e4b73aad099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7023c35ffcc7cb05511193015759f87
SHA1d36525e74e9e1a749f9048d4c54c055b84c2b36b
SHA25697edb7061859b6c1e421e96c155cbdaacdb2a17165f558919665f46a5308ad06
SHA51296f0c66861ffc6b2131e0fc02fc03b6b86fde1c9d4c78deabb50c6750c8d1403a6d2134f822de1e7d53e2c6881deac55b7777c28f947e36bce5e20a2dea62164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570442252abd1cc78d541647f26483a65
SHA139d6600e284afbf0c81d4b9bc4bb07f65031c94a
SHA2567b5ce2bdf1ba9bd7a5f9507e7b59860612064ebb8712a9c0fd6eadf1bdd52a4d
SHA512cf9cf8f17b85eefeca92351ff66deab802f2fffd7b66d50226a3ad72a5deabb789e4d38194384362f91a28c5ced895279ee56c868425df43d8bc496d40e9b21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffe836f5385ea5ee123715ab9a95f7e0
SHA1bc72ffc1f9d07381b323fd00be49f8f9fc750b5e
SHA25612e44af994c6aef8f7e3cc64c28a97e739eca5bcfcc31c038c4d654f4e12eaa2
SHA51208daa0e8ab887a52846ff28020b735588eab208aa9f78a144a185726c6e74d58ba6d5698ba8f6e203fe524ac04f6249866a47ef104240258f024b74264977da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b7404eaaed12b1e881e2eae2d20a8c
SHA1a5975dd7af49ab23cefff4b428f1de0df1cc9093
SHA256181043c0cd4c01a4160918585b69e7c8bdf430b0f1ab819047ced226c27ed50a
SHA512a09f3968f0a44a69d09a62deb21e84367bc5bfbc387849e07d855c6dddf4ddde2290a7c67bbd8cfe5653b6c4d06f90f2eaf40358c067375fc49fa438b209dec1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a