Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
43de6a4b4f7a8e700d26d4c5724a20a4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
43de6a4b4f7a8e700d26d4c5724a20a4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
43de6a4b4f7a8e700d26d4c5724a20a4_JaffaCakes118.html
-
Size
15KB
-
MD5
43de6a4b4f7a8e700d26d4c5724a20a4
-
SHA1
a66439989ad54002af2a2d04e3438a9fb5c0c3cb
-
SHA256
df247f8bb5bcea0f1c9ad26cfe8d6a06ece90b807e2885d9724c32ad5768d968
-
SHA512
ffc31ccb7633db86520cc129aabd072d83f69a7abd9fb101fa8b6f993b727d9ab5d5daf8944113ef78514d11aa332ff5d4dfa64d11af773fd8b7fb673949b3e3
-
SSDEEP
192:QNjSd00BnJTw4PPx/0dekSPXa/aTrp6Ljd5pEYoTunfwOpywz3SmwHCG94tsBgL7:eOnpw4PPx8dezvGjd5nVwGVC794tsE7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000159dce1f1dd44bc79d480ff7c08d60844f08a46952bfe13fad4b72d257c65fe6000000000e80000000020000200000009b6c96143941f4e895b00fdbada96d8ad02f2feb048d660346da3f3615daa53320000000200028b248609fbfdb16aa83e2d0436ea7e9dea2c25b038e386848d11fe0d22140000000eb81349e074b9ef77ece667a445bffc2147fbb7011d3f5c49fb53318a2b1ebdac11fa1a335ded9fe4deca49cff13f9601174213b254505c3a3cf15275e3128b1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b916fdc4b1d9bc79fd2e551d1d3fd974ec0f0a68bf52910ad743eb75761eb3f1000000000e800000000200002000000018a5481eec0baf505b1aeff3ddd29673ccfaeddc2d2a944c3d0dc9f20cb21e4a90000000a1fc9ffb2a4772908230b17e0c925c36077e8f240452da648a656f8e181172d4a8a9d4ee5bca7f1c39e55e0765f1bc6d0578e23454fbeb09ca23e724f387fd81f59d17af3e05412a3a67e10ed167426e7ef2376b2fb4eec89133ca92b280ae05097379fbb246033462210a24bf1d9a22088713093302ab8e5589f4b418e91a550f48c5f920d77e76c572755990ebd10a400000005d9c16c0f2d9b4886d5ed03e4ce59b6554a3e701819e52a008f68ed19f5c94e6a5b3c3e86fc90a0dc573f248f1c810581cb3f6198476080467279fa6069c79e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421896504" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208c76e862a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1363CDD1-1256-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43de6a4b4f7a8e700d26d4c5724a20a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1c8770b31dfcc916a144249aa92180
SHA11e4eae298a64b91ac1d884553213ff39f1183702
SHA256008d849e1229e55ccd733769124209144a52f80290ce4bd08ab3a2e9304c83cd
SHA512196e629f47826b77a9dc89b34dca3ee487f8fdcffbee50a03c35388e090de4854d667c3fadeee0d054274d2811a37c33dccbf01514e01babdc73e84709c980aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ee2e9724679f82c9bf1bdc0b18f6463
SHA1a0eec3fbcc003da502f56576564ff5f12afd354a
SHA256e25772642601eff0af18981539aca1e7c4995da0b18e956a6c01ac16f77f35d2
SHA512b46a85ee09ecd80410ff44f6aebce31a4471adef583ad99e80f15f614ecd3eaf051d05c32a609ec36245eb37521906dd07c29e0d29969fb7af7ac4424a9b696d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5641b34b9b9c4f5b7ed3a1d586f73d141
SHA16273b3e15222cd04a93a0af5829a77b2fa8f58b9
SHA25616d46160a650dae1082ec2b68d69673dee5b54a65290a8ec739ec58a45fe1bde
SHA5123b0d6de62a8a160bd4677019fa4181aeb93313afef76ff13eb327b6f3b1642b97581dff63cee5fb65a89dafd1bfbaede5d4c611d6fae1b76c54c377b40b13cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5a9e47ddf63dfa5016af426a11a6d7
SHA10e10a6e2e2f510dc762a482c8c11cd64c6fca55f
SHA256482854ecdcea0cad3f92c5be1c889319307240d590d0ef853c47ea2a8ddceab5
SHA5125b74556f5c617cf25f1564ad05ed542610d5747463bafdcd49399ab4f110281a05ad728762c3dd92e49306821dc02a1b3dca68ef6e9696dcecf2112177871ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d8708d1104787c3c0a538ea592eefc4
SHA1726a70ff94d7adf2b7203023fdbbc4f9b4cf2afc
SHA256d8f63995a000dec0e50ab61b1075f05684854be8537555bd2b96e27fe3e9811f
SHA512c991bd8130e74a3f794e2753cc8d00d5d54f34849f3f55423381c87c04b88c4a30a085a6de46669b3f85a4fe0545661d935a37d9882934891c861015be713484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2227af01c2ee1167ba4afbed82346fa
SHA18f8ab1025cf56d4f5327a5cc2659167fb1662d96
SHA2567b02f630f33786d45bbfe1eab14bfb6c1ad603c9354c4f0bbceb92adb235662c
SHA512a40cda6bec4a89ae8c5f9999e4ada3bf10e347298088cd18ad4ee85e014df0ab4053801bd8acf4983aaa30a30a3d27a75d613d9412f975d26a6ab4be007c64f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee620a7366e03c64ecc51f8131e4bbe
SHA163f3c283cbccb05bdaece9aacd337ba87606d422
SHA256326869e35660a90535822c852b09eb588e9a1cd84589071046f7c7fc00c7530d
SHA512b3adc71cdd5570bd82af390c10ee4a43364569da59a5f671e5f3138d0949a02704b17bafc998031a9ef7c85fd5f479d7605be871cc51a528212c15b863c96c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85f8924a2a4565033e3a597dea3df19
SHA1174f4cd94ab2420578e2c9cf5ac51b05b7aaaf77
SHA256c3426d2e74616d5054a976e3a0d4a78430c78508391244e8aba0a8b31c744f6e
SHA512baf7f89a9f425c186287a67abea5bebf9ad4804c5a1dd0eb311874228a79cf7fac3aacf551d4280bd5b0d1083df03fb3c77f9d62acd03658b23d82e4c37f6acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d4d66d3164c53164dac084ba1259047
SHA1ded4d0c7f2d53f2a0ff8f1ff768f3c50c8607560
SHA256d0bdfa69857a0a9a5f0dafd4121ad6868496c7f7e48c5bc4cc4fe07b921152ac
SHA5124a4e69fdcf3e698db2a0854819d5313ca06fed7f8abdfecf937dff4fa2575bc2e29cd55e54a0dba28c7626096721755aba4fa84496e55f28cd02ceb78f632588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b860444e6d08391a6d2d395981a9814d
SHA18cac386188d227bb114f6910a99c947f7b21021b
SHA256f8a248e2ac91506a2049a186d76007adba6ed77efd1fdf01aa17af77066168d9
SHA512cc2cb4f167e2f7a7c0991012f70470a7e97c0040fe4acd4b6165c3ae446840479f92d41906ab2b2376d49f165340d7bffcc7f214c3df0d271133404b8c9d4a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df732e3bff77150eb3d2989cc347a94d
SHA16733efce97a0ba5fb0aa4e8d2c982efb2a94ab81
SHA2560ee56495ea6a3ff4651ed2db529255e4916634ad1ff827de61777963efff42bb
SHA512bd8eb9e9f30f2353cee4329b3b77fe95beb3dc1bb98c3ead4186ef3286979017d5b6e5e458e2314dcadac3f26463d533c579625638799aae3c1be883a3c5f1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54581d922bf7de2c8dbafa7b78ffa46e7
SHA10dc1bc7cf9703526db44711f3a64742610d4e60a
SHA256f3e9a4b9997a72e8376364f8903136159e10778c07a3733c579366f65b82aaba
SHA5121a8b978f1db2ef38a3abc641585ee96431f0a5cc9d8ad99765bd90d38eabf2ac745e2f7ac88e0cda997211a0f5698c76e459b3d0525197e686564eee0ca66952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a966bfa4891112509a54b0f91550d849
SHA109e0c39902a742257187a5900ec73a59273a0bf0
SHA25658fe445b6dab06a5a54e3e6204cbaeb23083ce5aa367a76e64ae59ba6087f5ff
SHA5126964ddcc5e3f9471e2e4a3576b5a738f7527aa9bf8fba12f084016a4fcd95e2b0ba336297a13dd8f43ff914f7831e13f8787dcca1033941f707522658448ce7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee8c29ce733744fca28d00e20aab8fa
SHA1797fc9b91444e3c2587b129a94c4d6f09b89277c
SHA256b6655900b5035b63f524d437ed815b3bef76eb722077f462d8e9b58642568ccb
SHA5126b400400e34d592268efc86b87aec3347229270bb1cf2112a5cf0cbca9744ab421e4a249a63de728b50f7c06a7ce0241c075ffac0eace8a817f92ccd516c3759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d499a8dad4318953d5397151fa5ed7d5
SHA1ed7239737a2171a7c2f053a9aa2c4d2e1cacdf65
SHA256247a6e743f6200f01b88d9349be098f6f7b6c44a5efe4652d295d0b5e1d72651
SHA512b212ab7793936011089a10172c8b8d1e2264a7709e7566708cc15a266144e696a0a5509f8b449c3329df90438a2562a06522e558ad968210cf050ce8beb90dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50132b074614d07b06553a5ed18b39d79
SHA1ec607b40519529ab42c515df85c3ce0539e982c5
SHA25641b8cc1ffc23925e601b846dbc963203b6c11c0c2e679aa1987d67a4c57f952b
SHA5129816e9db04e0fc298379ffa670ac3d24b22a283778a6b7216c902b63b70cb571ccfd4211bb3732488cc23f510fab412e428a9b9328f8771460c02365265ace58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4526d41126b64375e41dc0633b0efa2
SHA152cf450625d38fd61044751d98cdd47071813783
SHA2562e964c788b3a35e66a96c4949fe526108ae451d79dd7397ee7f3eb4ac85b4d85
SHA512a8b3bdb8bef9adf2a6e4187c0ddaf31721269d1c75072b6e12a5bd982c6528462021da580b7345d1c1808fd0984e1e9c61cb2122bea5f0697c3891da990f93c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5078455a7f9c04b91cd5b41aff54b3a5a
SHA1cc5690948de4886c4a1ccf3b33e068a0cc4811f9
SHA256adf83355807d60dfe6d19f3a154920a623657b71ba37db24ab28385ad792c0a2
SHA512e1950131f1c9d9bbf4340c6675037425e6a78768ac8adc5a64ae4e9497087affd41aaef239c97ba7be0b1f24d1a8bb70543768d30de455a48be38bef1f842103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b090e5b7bafd2a9b79f727714d62cd
SHA1d7b18e930b2faae446d2649c416be77fa5d170b9
SHA25655fdef06d4991e48dee0546fc87af4fd4a34fa8200bb585f7ca08907f73f6cd1
SHA512941501d3b714e1088a62324655502c93371144656e9e33b95e868caa6d602f4e0e873bf57f43b4fd3e132a1ca6130dc27157303f0dddfea1c2c6e3b8ecaa9e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a47c7f3bc99e2fabb5ab7ba7ddaac93b
SHA12f3b974632ef59d36c7fbba80332b6cd4645ff14
SHA256a020e019f04db1e6f78ed1aaa1b6a1d11a66855373d5fb107df0914139b8c998
SHA512679279bbea55fcecee0d52d0125c197ead2d3f33bca501f388930c4c0a3b2cf0b02e9b91c1d30851f5cbb36087b166b5d78cdda10d3e3cecb23c1ffdbcef7ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559494af9960496ad635e1a1faf319d4f
SHA1018208e409aceb47c339558622f278a0f9b535ad
SHA25681cd71c7c7b723fc77dbd95f339116bc132217dfc37dcff148d59250622b38ce
SHA51238d6f4c5a5d4c0a7ab3887485f538e512e3de2ea7655398dd285b3380e4faf69e2008c30d99e63749db0146e5adc52fa93e756499fe47d9f9d49c4e4d3fd315d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a