Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html
-
Size
461KB
-
MD5
606665a075ec52ebd745ced75daf67e9
-
SHA1
17f66e2364e37c1a32087dc78b9dfb0ab5571eb1
-
SHA256
4ecbee5c6e3f88dcdcb1b3ccf41eda2ecba0945d03c94bab8f95d9cf91a11e0a
-
SHA512
8d54e48f4a8a97b53d6981a48c4518b1505fe8df477a97bbeb117c77e1e9bcf09698134e2621656150aa038ea1b658db06b6a1344e97ae0536b67609e6557a49
-
SSDEEP
6144:SUsMYod+X3oI+YDsMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3Z5d+X3h5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1022a432deaada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e9e3e7a1baa48327d2ef3ff148953af1865936bc59e957db9e16457d9a15e1d5000000000e80000000020000200000004a58f9b7a0d449fae7a53f353ce4a4dd1325035bf306b71a4abd394750ef593b900000009e5e4debda02531038481a925c21d31e5e9aa02736ade76e61fd20f634e5566249098743a6f6d68b9010ced2b89a2afba2a01aa3d64e2cbbcbbe413afed02384f317b53a8f01e47039b541e54bdd2c1f93be040f56a72bf2e69426a513cfaf7b5ef3f3b22a377da266783077bb283830bc75b8be9fcb34e764cc7bef9e2cc31722e137be70e5c984fa4eacc348a56b1b40000000c9300b05c522c258c559cb005eb8f770d001438d7aace1ca35d23c2a6efab7db7b2b267b6fa842dfec7e77c168545b1c0bce923d8b8495b6e4b082a795c18cd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422389258" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59C23B21-16D1-11EF-9667-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000005796a5519bff725375c51a46eeadf55c38cf7c271accd5b4d245c42297c6da5b000000000e80000000020000200000008794abcae4615b195046a30fab788226a541207355df9c0d0638b531a5b1903d2000000094feeada315f06d8dbfa67b7991bd041ce5b7a61ffd043d571d906448bb7d2b9400000007a7255f51249286fd53a4341fda6fb59b59aeb7baf79947b182979cb330bccd44774e879c8aa2ddbad7f9228a5706bad413160fba0c253a7d15b551ad847663a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 940 2776 iexplore.exe 28 PID 2776 wrote to memory of 940 2776 iexplore.exe 28 PID 2776 wrote to memory of 940 2776 iexplore.exe 28 PID 2776 wrote to memory of 940 2776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\606665a075ec52ebd745ced75daf67e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56efa48b2248d40a9b6dc6618fbc901c6
SHA1df9c4d9b34e2e7f40450f23c7518ea7bea9be621
SHA25686c3c06321fca0e32e1fd8ea442a6275196d48aa610b481a7a5718790b7b6caf
SHA5124727356d33f20967d2e77220c93ce9d005edfcb0fe6c1b4aab07447d8015a55c51a12b45a827536d4f0ef72c650ceb1871a58ded4e8c5893d4ba4804e58de182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5300df2887e4680cf7302a20bde24f557
SHA1411054a13f3769ab35546bb5dabc939e5880085d
SHA256351cd217cce771a4f99501f0be150bb5eac69df0694f52c029d3af994b3607fe
SHA512964494323295f344afbf2ebcf69bb24c59116b8c73dad0c3c0e7da260d154a677b1ae7c2db931262411338e3420ad846f781c07efa449ba1fa37ba0b1c9a6d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e665aeb664a68c3a13062f210aced41c
SHA1c0721fde001f104c83dc23c04a67d5dad220d15b
SHA256181b5bf246ea25353053932f1cea796470e863702d568dc66ee340cd6c9de823
SHA5128332511614b9ad8b23b36db105442d6beb1b04278a78657ca7c9df8b750d1818137b1b2cb63e4b9c65e0eeb3840936d1a66db2b44d6faa66a4923f05097a1d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58de6edf1d38d0c78b90bd5562db83240
SHA14e3d0c626cdea91252a38cfdd6d5b6e7364553e4
SHA256002f4c43d11f6c49050a0b0ed6a9238fe58ea232b0c7558533ff322463301861
SHA5129c7c84e123b2aaa714bb73c58201d8f699bb78bf4718d8c8ccf4c6778531b8a74e8415de7694916424843629b04f08f43138526b8dfc01cfd1a2f50135ff8124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585f2d9dc4b83e785a4749bba9a64f113
SHA14b2fbd3a7d8a180ca9deec4f00335d6b7a2a5ffc
SHA256e11a0b04cd06f2a95c4609756503c8bddd4ca4858224c61180937094ee66c6d7
SHA512bc54f85f2c782696e334e2346ac0569f9ae625348d841acf92fe6af595bb10af120bce8632888ab6bfaea42f203e55b4f59e3c7ebbca7380cb2d03f0f46b45fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428f47cb1c7819c7d0ff36ab48e28c43
SHA1a5adfbc774d4b8b27e198e59d24299c6d745d0a2
SHA256ee1b9fce1cbf75414f4c1a0be56ce73820dc650b738d3e1bcffd7880e921df5b
SHA512357609a73aaebf964c18cff6c5043994218f3499c7220576de87a051b434b7183c8e10333a96fdd6a43ab6cfc0e93aa00dadb62d938afb7e3b29ace0ce4aa540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d406b63fdd3a7b697697d712bc128d
SHA1cf542917f7253f8d6ac9055fb910d16bc67984ec
SHA25626e6bf26bcb20f63d3f7dcd67f2141034e1260fbc2f3bfc5f1c43e784564e589
SHA5124a0a9a9a6fa8fd3c5f9a9a091f59c2902566350fc94b34f4f4597c82f17a18bc55a2cc02505d561fabb11ed27d9158265e6cc5271b39556c11193921df2dc261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a8ccd6dc26b647768f0123374befa2
SHA10876f08e52e4b1f77f5539caabb5eed31684cfe6
SHA256ca7f4ac9cbb0ab765e9a59e1752f731e0c94b1c0d765664bbf7daa9285b976b4
SHA5124e1bd2b52d8c64c67591e5d49919d72fcb1ae7a8baa6514edec52f53ec129c82ad0160e7d1cde43445e01b1a1a3efd52b5c63c90d86e616e946918af9ade5262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5941e980daed15030418735a0e50c966f
SHA143b38e368205879f67990decb02abe0960bcf36a
SHA256efa9bed61d5c3b2e7941838902d4ba40fe4106b281e5508ca8ace3de08418108
SHA512b24f367c55730c88cef0282ba3f67d8a6a054d42de2719359d74ad2cb20843c2be544913e2bd7afa374298137f38e2f3d207916ae6bed1a53b12ef8f2be5d2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e03c306eca5cf30cbff7e5da0507f2f0
SHA16a1198691a95f2f74cbd9cbc124850156a2001f2
SHA2565066b72e7b4a56af94daab11f32968a5eb4553bb3ddb970dba02fa2b5007bad4
SHA512605cd5017afd8b599ab9dade4fd226b2fdb6a235e333b5f671e353e95ae4f94e1dcf5fb02781666026d798006c57a85a322dfaaf59ab6b96e68ade907924f97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5954e39c9b75a2898f1497b86cf458218
SHA14573fb5717f4632b874822e17ee0685f19ddc7be
SHA256dae8cf6f4c2b5dbeb3ed7f51cd1aebb6402b0a1c18d941e59dabbbd25d30db61
SHA512e09bb1a5bc7ab01352a6369bc03634d28134d7c0fab42dd50e99a67989e4d491dbc4383340087784b97e204781706b2257958e125592a551a99f77173b578761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab37f5c5576db09d95a1bf5b73b6bbd4
SHA143cfd1d3bc8d154ae6d9f09b6dd5bd3c2681679a
SHA256505b440eca264ddc4fb6750c7523b6eda10cdb696f265ce2d653a7fe2e6d6801
SHA5120afb3782c7ae3ad4b0ff07377603fbbd350e504c89480fd79164da568d6a6b37f619d8beedd771ade88a6dbc49ca353f77f485efda7468251e0a0bf5f6f74b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35a17b539f01d349fcc1367c7019368
SHA12cec3bf388defe1ee84768f1311f8f8b5335de78
SHA2565bc212c85353401c125b34e6420d4901e5f73eb8ac84fbeafeeae1e36c413f0a
SHA512078c72ef9774e06c85461c64eda315ad477a645056de0595dba7a30cc51ad97bcd054dcac201ffe325c65a655a794f433addc098ecd5ba7f7ee502b0f98aa711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2303458d61b0f85fbe228da9f5d5aa
SHA138eef1c4bd189e4602c69e767f0be5207b3ed306
SHA256f59247ad251ccd1eac11fea79972d139418488428b0961d7911a442635321418
SHA5127ab26a1f9aac25539e1e4818bca3be9457f3c84b7fecf8dc39d95db650cf933e148a310b681b48a01cb3f76edf393dc993ac6ce8a02aa0024924b70dd80d6a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6d78ba7895470b421f0252c669b86b5
SHA1ccef3f47b2cea25034f30e2f2c6af50450421475
SHA256c9fb164b0c86ac7e4bac511f3083eed44f9f5aefa0767bf902ae5d09824bd3af
SHA512af1b7e0c2ac8915a2d9ab27b927cd431c59e8ab3c4720eebd3c320f46d15cc3cef5353bef36c54bec7e1f9f8c6f764d21e79182a850aa0d50f9708af6956fe17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da26a6ab4ea61bf302777d7c6c0dcf7
SHA1eec84a68769ff1f41541529bf3f580fa16afe752
SHA256f950e688a4d18056a0f64c73faa1b5485364a226f66acbd0f8885582979ad158
SHA512c839237e63aa12a3f7d8be99c95657419e93103e118f0b0e3a00f5d4cf89315e044ca0edab7d1c8b97680ea5647d28141a8331022dc2589634a928d7aec2ae2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56964754afc7352cbd9e76b4a7336e5a0
SHA160600b7b02c8b235bcc6611a7391c95c3f2eb5dc
SHA256255130107b62c3ff7348d178a44f44a16bb2bd2d63af4e1fa19aa7a0a40dad33
SHA512e58886df861564fd92bfc9be951e76a818c14813221708a8aad8a18f2ab3c45adc351d3929d36ff5126745f3471aeafe1e8a2cf42ea54241a5e8349f8039211d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b0620dcf264e982606f1bbf363a4b83
SHA1bae3ddb32f0faf98826e221a26266e524d93518d
SHA2568230648ff0ce7a88406b47541a28a7ad9ab077a13673902618a9aa2cb22386b2
SHA512352e2f858687dccf37a68d561b9c759b099fbbfce2f1b7c019349a5a0b41dc3838b45b5c77dbf8f08a065a828650a3b809d9dbe7a2624e90be0e8f30d09a6131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94e69aa14a49bf1cfa53cd0a741ac2a
SHA113987da976db5e8a58f9902bcda2a1a498947892
SHA256c594bd4ae8c8a63ce52b76e95dc56fe2a806f8add36344c188e6fed2d1dbd947
SHA51202774a0b46b21d87ad1c7ff036839fec1df2796916b157345aa17258e2bf7dbbe22e06ccfe855150ac5ef5d2197d8b1d7764f17a76c30c33cbeefa301679032c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532b5b40408f7c39812ff8748de332a80
SHA1e0617702ce25e8692aeb595e6bf1c94fbf37b42a
SHA2560f158ba0e2870d3fa722bf0350827ba4c71b8cf4c013a93bd85cb04483851ccb
SHA5123c207059d91b75e38a3274f84fedef5238b2c240c8f1d99f86bce2e7680b62fc5eca87b64857dbe9425531af54f9908268dc609cfc3adec20bf64547e4770e13
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a