Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
5bfcb41be919b72d0ec794dce2fbae12_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5bfcb41be919b72d0ec794dce2fbae12_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5bfcb41be919b72d0ec794dce2fbae12_JaffaCakes118.html
-
Size
1.3MB
-
MD5
5bfcb41be919b72d0ec794dce2fbae12
-
SHA1
16776a5d1a58046de375de5e5497a18f073d3340
-
SHA256
9889e43ca23658c27612bddf9db87984873ba25297ef19b54ff34087fb58188f
-
SHA512
6b5c0fc220cc8ada737cc7a5bcc1bee90002e53f2b0fbb1b14ba91c269bea41306b0bbc1dff2a08904de512b0a57594ad0a067a267cc374aa875e11a1b354c34
-
SSDEEP
6144:PncJ50/OVZEa18cIvxJUhqM1lbr17ACMHrwuIk:PnUH8cIibrliLEk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422322452" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D02D5BB1-1635-11EF-9BF3-52E878ACFAD8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2728 1044 iexplore.exe 28 PID 1044 wrote to memory of 2728 1044 iexplore.exe 28 PID 1044 wrote to memory of 2728 1044 iexplore.exe 28 PID 1044 wrote to memory of 2728 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5bfcb41be919b72d0ec794dce2fbae12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e939c1b8d8de1ece7d4be0671c71c9f8
SHA188b1518eb74c5e4c56e86d7b9c78b71f294dffa4
SHA2567f38a02579878100c18fa57a16488b74d8d9f61436aecad02b54324050847f5f
SHA512361565bf44ea5c99b3c6553f743447e5c3438e05ae367c3a07ec26775d45ec20c3cf0be667c35d3dc2b5c6eadd6134c95ae2684991fa499b07c0dbef257aead7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59457289c67498c0c5b3a76a1a62e8a85
SHA1eefc22eaa0ff9cfbbcb106dc3b2b8519acc158b6
SHA256dbf2026b2bb9054123fddd565a0cc2718bfd7bcb41f3437580d9af897035513a
SHA51219d21c3311b2b8291f8c33b5b354b200a2f48e930b79ccd90781a03deade0882f8b3ebe4bc8a97144b070b5742424a905666c220bc4433555c0937f91f943482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e85f6ebae683bc7586540e55d8ffef93
SHA16b0dc9d61b35421d34d7ce67f6ae75fe203b7094
SHA2561e45b29cb27e328b8f83048ab0bafdb8711740cedfb53e3b635da957a3dafaa6
SHA5120ea7a247e740da82445cb9ecc3d90b190f470bd74bfa4254a8864bcc12344821b1048e301056432ad6b7f03a290c02e7647b81b7968fe7cff4e7559caf6c3488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544388f999983294e304d383448b6fb14
SHA1e4fb38cae0bc8a72cc15e0bc27af3fd810014867
SHA2560f995f3a49bfda624b11edd01d66cdeff90508d7ef424bfeaafd6446dd290ea6
SHA51268c34bdfbbbae4fa15362b4a5c365279d4dc970ec2e674c0ea83c091faeebd186b0991dda770a4bcdce15199cec25ab92fb5368b3c9ccbf35bcbbb187d422212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f4a6780d8fbdab263bfd5ac8ccfb9c
SHA1f26a5c9dcaaf974caffece175da45dc379f56d40
SHA25653ad5b7aef691ee44802978458a89f2f41bba11edff535aef0ddafc554df770d
SHA512e8e9f79e5c36df60b0e9d29d5dc1a4d339593397cfdb05a3bdfae8930d1d7e4d46bc08c746dd7ef0c05da048a00ce0da011512536a776dedc7db0b8cf176bc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650c563738e0e0445835139751007394
SHA15f49df6695c045991b622b4fd54fb3b9292e25f8
SHA2568aaed99fd6045498351a333f181d3ff3ad7a69e1bbdd6a0eee892be7a7ef3924
SHA512e8910a22f5f2539f62bd5f1729af09ae7e6aef7b030343197eb6faa6d2512770e1a176f7d4853a32dc290cd751795b9389b9656821ce35944846cde8be4db84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1707d1c06ebe0a4760b70bbe37270d
SHA1d877a5cb0105447aefd78a7f7f1c7098feb366b0
SHA2560a4c9b79b0078af0236d641c4326f477e54fe3df11dae3ff3c6e9179230d37d1
SHA512c24ed2f66d6c06f9bee6771ce964cd6cf63a8219d9fed28aad7100e9f320cda4d6ac588c106741ad905c1ddc39b45342f7314dd9dca4e1d51f84e313bb02b4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9ab9e253470ebcaa5b7bdbca2bfdc78
SHA148a6948089ef72894ec901bc583d3a9b66f21d6c
SHA2562dcfd56177515556c2555000a40f0bd2cde9db8d32038d750499a59a7a803552
SHA512cea93db8f386161c883687dc8aed64763484ceb7b32013bc6a1bb59036121654426be7b6d9a8607641365def250eeb1c92994530df4e7bb0b6fc45983d135bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a5af2dce6cd14f523fa319a19fccd8
SHA121f99a706eec13703c9d9c8b261a265128d71c0c
SHA25626446d5de9d4e2d9c4bf274ff3d4eeba596997b5f6fe83080702b7486c5743e9
SHA512f62bf51ce303eea5f16e6dbf5d95f098b009806aeb3c0a4cb3a211da8f9c41a0310bea30ac2be876594e7150910e0b40f9f1da9e4a055793eb270be2fa2d2150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52948a1ab0020d3a37fe0f4185759bcfc
SHA19af1598d0324355e4c4b667f922edd7c3201a348
SHA256992fa27b502c59abd95ce6f0da14366cb773c53e603648a4e8af1b180fd2b1de
SHA512b40ca5b8ea31f51021aa5b10cb1b8ab8101a9a6d0ceafe11a7738ea3971622f8f2031bd2b391a7fad8f199cf40c1e23aa953a1982ee21aa475265565323568d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fb57cde46ef395b814385205666bf9
SHA1a8d493939c772d61a28e14ee780d0e8dca3f4264
SHA256a0a271d9123bbc5e34aaee25ea528d80c70e2d2400b8fd2fc0020db783f966c6
SHA51268678ea3ab32b70ee7ed8bd65b83d8589b4e430a828ab7b9349a77512d40fb76577f5afff16f1c34d172a99f0b127d1f2c5b12e7623b951fe82bd3e567fe2bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cab8b8664b8517e8ce8862af9580c65
SHA1e4dd7422f1d7d33f5947478fa29c7ac712d9a026
SHA256dec601aa311daab54d1802fa9cec33dd3529d4bf771459ac9d80f7189a39e7bf
SHA5126a37b6a84691ed4c96b24d461f40e84524ee380793159126d3eaf7119bca49cad7174795545f229396ca9a0b3978fb07a087a0734be552bdc64bc6b67dad6ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58867f0fe5a44b2ce47494ffa5066d5e9
SHA1e819339194c144a0f7307e6de56da649c4e6ec5a
SHA256853bccbbec5c5649053649b0cc29882c2bc0b20df3818ec7321358af913db6aa
SHA5126d0fde7d1129ee6a5ff1827fba31f88051d8018103d5afcee90412943ea1f549f2ad6abb42320214e2ee77e5ffc31490c8a65099d98cbb6f6438c94744b5d460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56560216105110533970adc9079a54e24
SHA17cb5c78881d1af6891d8b5f00a6052e628d1d070
SHA2568fd90a4cce8053d9b90233e3a5d5e4b69c87ed5033f5978805103feb624c20e7
SHA512bf1d72c6bc110842cd0a73461291c000f2f39e957c980843fa8dca0513e23b665b4da90cb4b46de4fcd8f40d3f261c644f78b315911c580dddb80beda0e9d0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c2b432a5217012aca940af91f3be52
SHA1d7e9943c54046ac26efa2bee4e08261fe3910634
SHA256497c5636526828ad208db87f3f386043545672ec4b3719b4e3a88bb31cfec3f4
SHA512a5edab59abf23448c4fc2868b2812e050010d2ee97dbe5d23d8fe7d8bc9cc81d7417b629e3dd8794f70134ee408c23ad81d270fe73cf10a88fbb26cbb3a4e8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596111b13b83dffbffbd9ad6c0da6cdac
SHA1db13199c8c56150da1864009028675225c8dad13
SHA25648f2c01fdb797dcf0769a64086d856e33ab699b759ed80aa87f221bf8db204eb
SHA5123bfa413110f16c639745a4efa76c7ba4bef06ed3a4d1b8e8d5c7ab37061c2c196e198c8b8dd36da248b03babb69b7978bbb548039a038cdffc97d05ee76312d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599cc211c501245b7e1b2db35817d3d1b
SHA1249982561b12751dc3eca00613d50724fda889e4
SHA256a8488324efa746804122e2d1def4d4c42842187883bb0f6e26cc3d62ed9cb43f
SHA512d727da91367f33b6b6cf979b3c8979cbd0fc476d4c83ff43e6edfb6a05cd127d958fe71f664138057944f73ef388234c6981ceeac172521028832f2bafacddf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace0f61afbb38079043e512e9d950ee8
SHA1121f7a255c97da172c85475a3d5547c78d12f60e
SHA256f9d3a4491f39176d46544a5bf7b51f03beeb2b0f53af2cf5b89e82aa2c918d5f
SHA512847e36de36a7841d325284df8e20fd86bc0d9f5deb8d71ce4bd7d701740b3866fce801c6bdbb48e1bd1fb7ddd805fb121ad618dd86a211ea736be364a45ed670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0a190a049151c790edad03f70febf8
SHA1df2892125f737aaa577e49fbff8c293f114802da
SHA256f8a32a8396c407e413f89fdd4706a72934e4ce85868c6bb625231352764cbcb4
SHA512f68d9614b158faf3cac01e4aa80253b0d4878c15a8401b65982f3ae562df57ed961403988597b7a05bc7871f4c9f09f9e4d5639091b56d676104310138d1abe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ed55398201c22df614bd872bab31254
SHA16965200ffa228db18ebfc49d6be8dbd478e7860d
SHA256cbc7d76ee6d791d19caa13d9342f12b8412337b269e8bd7f3eacf36372da8fd0
SHA5125246e6d35d09a4df99084c925b6ba9f7b6873eef88133e5d790846450fde10058f5421fcc1d19e011425cf7c228ff9f48c691343ce30be1cc459569c387b561d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519a580bc27ac36b01a7e6098cc0ce397
SHA1499fda9b4ea4fdee576080eeea7ed2d5b44504c8
SHA256900a9a69a4d2199451e3683bdbcf6068446f8646595a3d591179bd9658141d34
SHA51299df2077c7cf0a23fc437a8c84409935c616b67b9ec835effb7c7390f9289cfc9800a1ca99c08153a931681418408de99f2d1874e045abaf02dbf39da0e6b2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528eb08fca75d35eeeeec5285bc658ebe
SHA1f037cde46ff232520f1aebf090ba917f0cccd4e3
SHA2562e841b2a3e7630187f479343a9e956f5d2aaa61bb6c9a037f0b7f71b4871cfe0
SHA512728a2c690f265034e90d579689243dbfd83a8864b6f83ed7802969b3887f58e041905aad17f3feee32521a63c8118a2c17308d7fb3750fe738666c857345d303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577c709355fb14ac80f99525068dca8b0
SHA1f5334d64cccfcb2ada62b6b467ade8048a47a740
SHA256e0a3d4487ec8a8b2d96f72d1a75802fa3a1f7e4c079240110819a4f65070c574
SHA512d4014830a4e1f6a45fe0aaf7e2da86c793a6c5da696d6376de30435ac365a6925553bfac000a6f853c6dba0ddd859eb35a8ed22fcff9fea28f5222092b6a0827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f2c980becd2075bfd9654489507d45a1
SHA1448f802baebaaf4bb17ef3277f3c3f9d540d48cf
SHA25692fdccc8fd188e92d4fa6a614b87add7c6b123f55016fa859bef1dc66f2648b8
SHA512a62cc3abd727dce14f180412052f89fdaeebc1b39a3c84f7d7b0e8ba1ffb5016eafed237a65074317ecc702c01cfaf5acfe213fc2af645f29804266a37212155
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a