Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
3ab709606c2b2deba56c5e7ece15d0ff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ab709606c2b2deba56c5e7ece15d0ff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ab709606c2b2deba56c5e7ece15d0ff_JaffaCakes118.html
-
Size
34KB
-
MD5
3ab709606c2b2deba56c5e7ece15d0ff
-
SHA1
c3d159cb3117035a54d6d5eed017f5b3c7ffc35b
-
SHA256
3725905965ae04b0b6de51c0c0c54b4411169a0bd45f822b173e66317a994b09
-
SHA512
b9dfa647d64f434c7a4882359570e00ccd7b65c50584b3c97394268845286c716acd158f9ab320dbec2c68bab6f8a2e01bc092e86cea2c5071efc1c09772528b
-
SSDEEP
768:q8FU5Iu9OYucQinti8/3+W5EOffP3/9r/Xpt8max/:uPUY7ti8/3+W5EO/3/9rPpt8max/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000e260f72fdf619cbb51ac8444354b388db7094384b5d3360b19c6931e5c33e12000000000e8000000002000020000000101e9e3b6887c95a1933fdf7e2ec4d9c20207710847e7c174ce6be6ae4fa602590000000b8b0a9064ef144a342a87d97dfae332c8b3d4a085b27276907429a101183457993236ea5d3efb644389b7288a3e65c0bb39316f0c9868239c7090e578b84fc23f8e0a1a53697a9f252912d517dddee8dbbbe6fc4afbdcebcb43ec4f91eabe856485795f9017a05935ca807d7c5ccb194d489f107d0418fbd8b5994046f4e78a80d7983ff3ebce2d2b66390f4233addd040000000c224d61a0c755f7ec7fc238628770f37c3f495223ffb9223335108bc7185ab11535503d8a52676ca33fa59c412ee9bf8bb0bee1760a6f0c9654beba1c8b31342 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4010f78c7da4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c3ac2978f95373a321fc57db75d5851305f1c453bb67b2f6f0f06795beca3306000000000e80000000020000200000009a84463fe25e205b437026b4ba20974e4ae4c30833998fa37a22e17a5104ba52200000001f335360c3da794c7912ec37509cdde5df11b59688bbc79eb0036efbcd6630764000000025d2f50278be650fb06c212f024244334b463feeb074e2d04145373f5dc324e23caab634563eaafbc91bd663bf240f3049e04bd7ea020cc74e78e16083f54c51 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421688041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5B98A81-1070-11EF-8C71-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2916 2268 iexplore.exe 28 PID 2268 wrote to memory of 2916 2268 iexplore.exe 28 PID 2268 wrote to memory of 2916 2268 iexplore.exe 28 PID 2268 wrote to memory of 2916 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ab709606c2b2deba56c5e7ece15d0ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519162282b78847ecfe326fcd885159cf
SHA1f1f6704403a4bb44f14e9fa2195b36bbbc813019
SHA25609ec9c9c44135a5756bc25038b537370e83b9ca03f06bec2ad21f4d2d40217c4
SHA5129bd62b31f1498de502154409f82b2016ebda5f4c7a89129555a00e5fb687f777aaa3f72482d46b57b5941842abebcffd7a86a7c0cc14db1db7449924f3c60b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d71728f4fb917ca69b520362b0fb775f
SHA1e68f0c76df219351122b6a12a5b3bf5b237056b3
SHA25621b3dbd6338541d99a50b0d21136f86d4df9c9fd80b5f73ef4b70a25ba118a87
SHA51264ef3ac3f3c58e66b6a169b829e1ed0d887761727c7e43e53752fa04492dbacf822296ba64f639cd14f741292dca180322b10cc17312b3192dc6b5aa11b6de20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541205e96522a107259536a7aa36d9b0a
SHA1e7b26aef06868b601dd0080a967b7745f19328fc
SHA25633b279587d4abea2a0e21dfaa9ffef4e1220633d559344054e1d0760a80d47bd
SHA5126b0e5eeea138ad2ce7d2244bf0fe85bf6fe85aba635168daa0e38ac9e720c5fbb1bd768df60df083f42e11e839cfdd7994551157f755cad0a406d91f3759a562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba98eeb9a3d2af67fd4ed010d73b166
SHA1299427417fc23c7091a8667886afb0402c41149c
SHA2567e1d8f90d9ed5dbcbf959f8556826c804c655c4f9e548a9f210e5e646fda0442
SHA512813abc1335165ecc55d79b8ba4486905d5992365fb5a87d7dd9974723af20c7ad3878c15939e83d4e4e5b32bd4db471b713500b7e2260f0c50204f929ba62e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ab8dd8e27df992bbfc80fa013ec11e
SHA1c54c8be5f19ea777adc357168810dcf5e4c8940e
SHA256e9103c60b8d760334460efccddf5b58b47574613e9a3c59ed27301223f84cba1
SHA5123fdfe2f5f38d167af522116f4735a557440b77069cd81c63e96b123b767e7e9f0a92774c5bb28362abb40895a99cee3585477fe3775dccae739ad990ebc63b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c61ce1cc0d8a2dcb8c98dc8f1b4ee3ce
SHA1ae411ea140edb63017986c3dfe9e2a5ff55751b2
SHA256b6710cfc877fda4cfd162ee300d4a9e0bd1974b050a4a31556dba814405256da
SHA512df58ff3ed4dd546e7bb22f91248a92ef3dec45e225c8a68ceb0993a772ae6b347326d10d46cacae7a783f105b69305af7656d4bb8644d96241a30446fae42141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511c38ad9376b94bff6762d5392cee0bc
SHA1be34043185dd4654ca1b4a3afff918a213f7db20
SHA2563129683552fb18843397155db215345976d24e75866bccd55f5e72190e3d3569
SHA512c17fa07eea099de4a5a8746d28b946e661a66634257626940e1307aa24659962888342d6988f6ab49499b0c6359bc9e5563cfab5dad1cd6b3d11f69b9f5e3532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeadff5c8ec4bbfb8768aac1f663d20e
SHA18ce2f7bb3d5295c40424c7d38f9dec6fca563c13
SHA256a2362f1e75657a7a7c4fc6793c2bde15739cf59a97497c171b0505b7abea5e1d
SHA5122abac0a80aac2b8e73501a240fc9b5f113bbaccb36302f716fa4b2cfc541200c76da5344ba450feb5f6b29e9f3768c26474926c96842f91e288ebd52f343dca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50628bb72797d7e6b28da4b77e157612a
SHA1e93be0da2928360b39a997713ebd9e5d77226b02
SHA2563a97584b537ca0fde3963d4385f8a4f71d17c2667572da1a75023d9f0300b5de
SHA512bdb486dffb7f5c18b19d52e3691217563b8a308a8a35683905bf2ee0fea4a3b963eb1eb71e5d2491c4b677941690916eb3e93d363e02fa348d928fa2021c6d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54531cd4dfcd14b74b24b5e10c7cc1d0c
SHA17d22b29aaaec5bde3157c69209006d842cf5b059
SHA2568fc7b517c2bb3f010fd939d472fbe48623a0ddd96e3c08c3d892c4185126419e
SHA512287e979235b6a0433fa7d7f0c995544d27c6f94f84684e4f9c859404c099d6f495835848e5d4dd9bf794b9fc36260670c9638809faef0d2f34dc897567bbc70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c06d0d37ef636490a7b38c09457a19d8
SHA1aeca06774990d264bd9a3757641d1dd91b2ec171
SHA25691cf48dad59492bc9a337ce6299d2b4e4b72626001d51c4f49c9ac0f5e77259b
SHA5123dc6750ad9743f5e91c7794c2d544d83d879e0dad9819830e638f6119a7724b6255836da0ae09b473015adfbc564a8cfceb43fabef7d98c90be240b35d48a89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffcdd4e6efa7255de66986c14a05215e
SHA11eea2f56348349ff374562d1d808cc122c59fef4
SHA2568491cbad6f0fd92f0b23b7ed5fc705d1767909a671dd36a2cab60238733aded8
SHA51207355a9ab6d1484f5e99e69a33137bd8f96d7b30fb443d10a38328fa175078fccd2364920d5aad79264720806448b030bfd733d90a53922b8de087f59f7152a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a40b91da011da0eac4514df3073069f3
SHA17ed1a8a2558596da93e8e3e65e6f1b2ccd0bd339
SHA25607175c374d85aa3040eea3a03f8930b21a034a348d0d679b245dd06bb766cce3
SHA5129a9780f119f912e3b0c7962e339c552799d4f9d77301471a1241ca31bed516a9d4bf81583ce370a8cd5eeb13a45daaeadec3ea9efd5f4d6db06aa4273aae03b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c3b6dcc24ec37eeb5f76511a670b83b
SHA1791a20387c74bc52ed420368d650dfd7efd552f4
SHA25678ab75571b20e8d24f23b1fba60f009727fe9951e3bf2aa43b9f3eae9bcdd1b0
SHA512edebaf4f449954921592f882a9109cbe3b85b672b68cbf7ffe7091e9f7736dcc11931604fb4d3c120267bea5415202ebaa80ea419bef2978ac8484ed6954a9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dcfe7478c35792ca9de24beb456ae75
SHA1a735c6ed850fbda8ef8f4d883474708938bd8acc
SHA256a147f6fd97990c8b9380f337bac27366fd39c291ae4333608527f8850b087d48
SHA5127f77a19d4f1dbc78fa79cffb3cdf55f0a42f40b7b68bbae4ce6ecfb9be5e350d4b67c69d02020a22c2506402319b44fa407a940631e7f8b1d406c7af9c4c7355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54095eee9c60c2c677265679407e6d33f
SHA13323a21b0b87f535b6527e4655e3f9985667dac8
SHA2562d3fdcb847f07105a39f1fb57802bd5824868b96620df28b7e9025bb22ab1ec2
SHA5122474038ca8adfae8e79e6df24ab9e15baa1c94e94e2005aa9b02080d251f4c3cfbbfd70023455494d9ec698201e03a8ed96dafece33eeee2e5fd6c5dae835710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5808c735b8ffd5cabf32e18d2c0acb1f3
SHA1e804cb6e71ceb9780c11f008dfb4e56d1f958b6d
SHA256faff7ecc92bfbf58c4fc6dca8bc013cfd27d3a97d0b6a28b4c93457a44c79365
SHA51243930d4b12ec5269d0e42ebea6cbc6bde87821c39b8899b89b1919f85a3858cef97fccbb5f4711eafa01133672200527f3c8b033ac38150acd48256e618c9f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e08f973efeb109d67ac5f304b626bed
SHA156dc6425f6e1deaf4399cb78a739926643ee1aac
SHA2560fc6cadf6336eb21969b06aa323fefd24237fc49eb56b36719185edee7b8f308
SHA512176b1e0d4aee61d2cd77fb0e65b3922de3746c111a365a2c9b7c6c14dbc81c2f247fb3b78df8878168da72bf2d2b5a130402e0387eab3aede8c7aa3d5b77939c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57277efc22cd1e11d4e8a365d18530e77
SHA1ce1eb29befd02ef4e9b0583ba246ca69ab6dcdcd
SHA2564d9b2e5ec357057452862ea098e5b031612d16db8fd958a9e960f23a52ae5db5
SHA5125863228c460ed87e59692e2c63806f719195ac371519cd35086fcba590fa906175b0e4c66fa87efeb513b689e4eca801c61d67a880adc744e53d2fbee42cfc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52428e01b04144ef9a23c8cf30a159e46
SHA11ab71e86c9ce084637ecce86baccdbe28a8e7b14
SHA256143bbac9c1c5ccc71570f387e9787c015c56b9b90a5bbd223d87488cb9e75ced
SHA51218b734c7d65060fd19d4d51605c1c4d1f0ca4bb1564e1f4dece3f74f6f300101434b2b9092736b7fd5277f5cf1d9f9c249d747728788bba916dd52134ea7d6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57525a8f328fcd1c26904de0aecd9859a
SHA1769485ba80a1c02bb61a006fd794074be2c244b3
SHA25684f80e8e889ffb7b718bd601f876dfc9c48994e5a9503af9c2329ef8c6ec445a
SHA512126a11473c6b771291ce461dd4e56028f53f306138350672dbc92921c9b297873df5671b3226e235a2c2d8c73d15cad7e20fc9a5d5db0fee8759257e3d9e67cc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a