Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
6390cd8f7a62042542d3d78b83be1f60_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6390cd8f7a62042542d3d78b83be1f60_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6390cd8f7a62042542d3d78b83be1f60_JaffaCakes118.html
-
Size
36KB
-
MD5
6390cd8f7a62042542d3d78b83be1f60
-
SHA1
b3a5153e7424b83c0630524e87a362f0641b0027
-
SHA256
dbf1fbee9a9624dd7f3f5f57fda16faa7332463ff1e7f5d100226ddd53913bc9
-
SHA512
d3cfec3f4c8201aa322de7398f7050a471553bc65a608655ab9d366f67e78513bdaa392f48ebb8caf945a23f42c2963a489ca6ac8f0dab5b35ffc7472cc74b55
-
SSDEEP
768:zwx/MDTHuw88hARNZPX0E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRf:Q/3bJxNVNufSM/P8OK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAF6B401-177B-11EF-B02E-F637117826CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000058e8b4efb999822cdf6eddb461bf8ac33c663577d6deef9d2714d2688806b458000000000e8000000002000020000000b3a0cfaf4e2167b281f75d0b2de04c4959a6d33259a5fa60ee4450fbcaf368fd20000000ed0050aec2d91e06cf5be84d3b0bc4484c38a71097b7653af6409c4d482feca940000000ea6a896a1c48d47a0a913ef80ee1bf4be179432a2afd7c999644975a4250a983fe903cbcaaa36a27a12d94fe1adb496a96351a400c628c60c031af8b7c1631ea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801611b188abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000bebee6f21131fd82d3fc4a3532090295711fe2262f290bec570072f39ca15e85000000000e8000000002000020000000b59a0b0098f62118ddeebdfd5ab16b32fa6a04d684710dc21e53ea244c33488690000000403f3d2204542039f22fd0c2662a22ac6eeb9e063b0ccaceb302e3cf083550d6f926ed14d035900b766315cc25fe7ea81c883ff60008e826b4967d02b28baa93f13bdcb8640ad1480c18670732802c94563c0103924168f2b6acf4575e23d54cfc9780e47719a2b949bf78916d40269f41460bd10a4b5dea30eb9aa7f9d0727742276af25211c5534a9ab4a60ce519ba40000000e62b590c1b63df35e345b1ab2ddfcdc6c79776819a668dbdc336d98207a911e975feba037b99f7b8a02dd63c2fa68b8f68aa338eb50b3d30d8ed4406b44bdfb4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422462487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2808 3048 iexplore.exe 28 PID 3048 wrote to memory of 2808 3048 iexplore.exe 28 PID 3048 wrote to memory of 2808 3048 iexplore.exe 28 PID 3048 wrote to memory of 2808 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6390cd8f7a62042542d3d78b83be1f60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b53df57805e946e2be535c17f7122b
SHA10b2c02b39b44cf050730834db05fab7bc5d94dad
SHA25606740c37ae59248e4060a11d0bea0992dbd5817dc632e1d1e45efa6c8d930102
SHA5120e8765fb94563d4d12f2fe496f0ed022376b581806fc13d6ac90d0354d9b20f0ca5a771a8e36990770babf077b07ae440dc13fce8cb4e151784b30acad2bcb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e469a4422ea229b065a55d3fbbd6fec
SHA1788f8494c8b2dea1a28ef9f336c49a80a9b1c527
SHA256e15cac861322eacb71f307a8ed2848220b52546d885b08b6c79cb45440a5c828
SHA5126d190c3a45c6ce99bb1dbdb63479062ee74e374cd244b1d89d28520af8d6a5ad38d83024c1a43048e7821411295e8771e7d3a27ffbfb60ba146ea62cacc46e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef0a6d639b75b61d381332720017fbd
SHA1f0d184974724decaff064162c581f03ea28ea339
SHA256d4b49b6704d59b1a1ee1b58bc53b04fc977ea2b0fcbe814872842f366322b883
SHA51263af91b8bc413dc2a431d1b18f2eb31069db042d6efea0f4a23113b2351c9a574c8a01d6696f23928fc7050c2e96a4230dccb16c74da3f53c884e27d86be02a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c22dee1e1122b3ac3fc96e52f555de4d
SHA1a89265baad94ad161dac024d3e7e08eb2e39755e
SHA25636644cc2379185aa6414dd87fa97af90d05a765073bdc9b3a8405d2805b7dd3f
SHA5126847bc1fde4350f2588bbdf90546408c6e17f5bd5d665e992883b85967116b313c8760b9642374948c172d039389043edccaef93702b081f19552a902b2b2aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59824ec331edb75dcf309374d2111ef02
SHA143e02ab3bd18dfbbacb84d0b43b79fd2d613e32c
SHA25691e2bef2884d9b8162f76cd936cae16dcce20dd7e7c1b4563770f6719e383547
SHA51292d5c63fc2d3aa0b35d7be7def09205b845a8ccfc06736e05beeab1887e6560340693c815456c913f451e0d1a090aca0d8c60d95b3423cf25a8cb5bea93a2e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594d7a6b20aaf74f80b7921fa39ee162
SHA181a48ddbb23806bf912f621d6deaf464eb4a393e
SHA25637c69d04b5343a56e5d07439686b58c3528d0866f93173996efb462a6b455c10
SHA51202fb7d53d7308bd4126d9874114c40656cfa629622fa0b08af2b88a259b7020e11fc8050924fb6c4003dd2f281e8e7935162a40746b2af2cafde1fb2152faa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56be1d5303b5e8acc7619bfb913d2ac85
SHA1372d05e24ce8de5a43888ea926b61533967ddebd
SHA256cac345bb7db6b84a3d4c9425e1c2831b3978eede22e8c5d64f30b610883b3dcc
SHA512bf1dbef7dbbfb9e91a52b40636b1bce1a9c9fc95e6095136f06b9bf3a11196f52bfd6b39bea36f82ae5a395e0a199fae0bddd2495f56912271976b9360d16aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2db71ec5ede1b9a034d8fe3dfaee45
SHA1b99062da257b7a2ff28477484115b6c87de50384
SHA256b1738508f8b80a7074133f4fc799feca9bb6208e09d8a0e5446ebf32b62f9dbc
SHA5128682285283c90c2fd54f7dd0cb0f486ae87ab0ccbb81850d0814a7514630b43120a0c6c4356e23deb7840c151fc78fb586debae6e54d4bb41a0d6fb253f08889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59817e7fd043359618cd53036734022bf
SHA1431d973bcb3ee60284d500e6c537f7cd20fec3c9
SHA256a3d28626289c1417687758a1198660ad3ab649b6e801e015a613f0faabc8969e
SHA51297907c2533086c6034efa6e1ce6c6db8b99b90d97a08bb1b7bcf13b0ce3b8d475ea5190d1ed7fd87376e335afc7944688d1636549ca9a574d921c5d6ab66f24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd2f4db6d38d54e5b9baa43deecb9c0
SHA1cfc8a2ee20b6ef0e89e8ed2b3d76e436632c8b10
SHA25656b228d40628f7b1e9d919171804b89607ebf704c506a87b90192f9ebf801122
SHA51204456d666f1c035f696efc5ecc28516d3472f1913ebff9b0a56446a836df0f2e669eeac14782c66add7802d4733efb0e2891b2330c110840191005d054a5d74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5038fc0753e7cb29d3d45f997c3ccadc3
SHA16519c540fdf13b6148b8edf59137c69806ec54ce
SHA256e8a7cc6573908ef5e890b0a056bf7bd30dfe089ff58e89d9d923d0d45fe8720b
SHA51273e79722df7de7161fa75f1d26348f5d375e11c77b77a8f3e7b6a4ab3e217bd5269b28580013fe8e8b214bd54fe1262e71208294bc1407f3a98b11d24d1c4575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1651c6bdec8af3343bc4c04c8515cbc
SHA1781b86113fda884d5af83bf4a630659a6e759475
SHA25622ae4d333259f7eedfe0939b29296c13ad2db5ef8fc88acef1721c695f380ba8
SHA51291b73f492871129ab6b972707793ff4c7a765a4531f6957f752e17fa04a85f5956bbf40cc45b1171a3f9042346a8ebde9bc7672912c9e61ffc6eb9e04c355532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541290fb27339f7cf507c7fa77f0c545f
SHA1840f5c1ab170d5aa94646f2ca067f8dd277eb48e
SHA25658be23a363bdb4760f1ad340551fed98e8994842cf639276485f0af095ff70bf
SHA51237e17a71572bd90bf8f2bc734a372b60032c32bf6b5f1f71ed16c8a64da2dfed73920c450ae36c848a76f40bec9dd3c75456a4b35eade6ff26d9eb476e9338dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7a140c9066faeffab528946f2da134
SHA187c8009a4a2458eec8ed6897df62548bc171fa6f
SHA25685f280b54f899b1d355575d0bf40bfb6e04d0f5eb0a04e08acc9a9bcf9ea1d9c
SHA512d5fc315a46eb2a156274b1844cc716b6b2bed08ca30ce956154995a7d1834cd51a053e0deb8df453df4cf67faa4694054b88eed13cce7fa32e4c8d15c37eea33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5378b8533ce10c0bd27e06d9d6d66961f
SHA13a02ef5df9fb1773f1f141373c4bd0709fac2e9b
SHA256b7c19dd9dcbec9fe95936a71c6d893fecce831a6581ee3accea93ceddb47bded
SHA51289d2b4b3f230d40db6a90096eadd059392c50d4eec1676cf0e73ea4714d7fc361812a8f59fd8262517a3dba33c203c31dd0078cebc087311b7f49875fdf0d46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c8a80f4a5f93221bb62b04b7d992b0
SHA17e3995bffbc6f8955c6b29499f4677820a9775f3
SHA256b6bf66a47f3759fcaf52d1d2ab4bd3604993ea3af17060a966750c6a0c85c845
SHA51262f86ddc39c61e99d74ab771ff2ac8a64fa2196bf7d9dcedcaf00b2e0c712a1f770881acabb8c1d080201f6b827fc8c8a88e2781d63c12b16313e1286473e9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a1a3abeb272c07abc67de3615c02d3
SHA1aaee30c00e19fce5e74842c0f63fdd06c81daf35
SHA256016711107467b75f0a3fd7d66c3b97c8d005427e4a7bd2f87d3f50b2df630948
SHA51282d5ed8abbf40baa768a195e3e820af614b6a5e4d990a3822aec0262b5c2c940e299260733eeb6e71f6c1e3479bd8957913aa2edfe9cbb4f9f014103fc1a0727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559613bbee1f9a1951c5a2062025e91dd
SHA11cea4168d813e5bdf20848c06a8a66a4d696bd7f
SHA25665880a0be91150e63980b97f3130caaae93bcad6cec262e692cc578a717afa6f
SHA512fd4d9847f22e5ed2c460d32af93be776a1a2fab5f44c88a5dee165004efaa7895039a1e1a3499616c86d7358311e3481510d5744a62bf3fc55f8e1c111c549b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5bc65f25805a1c3ee0e3cc18e94a4d9
SHA1c14c2545ef5e31b4aa207ef31e50971b74e06a4b
SHA256733659744c7f2b17c4968371152f07609a3c9da69d52efe88f15c92dff992d0c
SHA51292fbea2666752796ced8c1c5e5eabf79c76d581a0630a72a8b500784139b620343799211e8393f70f3449aa10eda155ae27be6d96ec573d983e631928bb71931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528afdf1e7cbf7de08647b528a83730ac
SHA1bb2d4371034e6d2fe76760fc3f9d1ea9b8120469
SHA2560787f50b63e3984ca737a95902570fa86fa8bccdb978e8a050dd6414e2c4a8b7
SHA512a5d5545c2ecbc26d1154f101dd24c5519f46d23b4620a89bee79bfccb076cb4ac3585f71c166066b22c983b74181e1be814ac1d1d1ecf6ed8cbaabc2a5438aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bea589244103b9baebd84f0dc364f74
SHA1da60ce04cacd4eb1b1dc76c24e1d5325524d0fb5
SHA256f9b50083e02acb89e3ff15611cae96ab63db5173d55db52782b2d9f2fce999c7
SHA5126eb4ac3b00cfeffba499069f6dc7cc11ab025016b5c14a36fa62f6f8f7d7c19eb799692d22ce41f446cf4cc69272765ae98c3319235a75c776d1aef31e23dc4b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a