Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
63dc6f9c9f8503a2430b7c7950adb3d2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63dc6f9c9f8503a2430b7c7950adb3d2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63dc6f9c9f8503a2430b7c7950adb3d2_JaffaCakes118.html
-
Size
141KB
-
MD5
63dc6f9c9f8503a2430b7c7950adb3d2
-
SHA1
f0547c1ba24bce3e6a004504dd07bd036577f611
-
SHA256
c03c6e17f0ddc427dc5c3b18b879dbe3b603377f94a7887e0ccdb2d7f1c0dcf0
-
SHA512
ac4fa49b6235b1d739210eba76220467205dc26344040ce29cf3956d3ca073d57297654ac8f9030466e4bcc595d3fd877a6d4ab9f5e2231a8b0cbfacd816a9c7
-
SSDEEP
1536:SP1PxWvs1SdbP6WpVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SZ1IbX7yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004f68de9b7521a1ad76c43a3e2aa37650e51d18077cad5f9b4512621adb1963d6000000000e8000000002000020000000f6f7de54a35ed3fb371baf32f0779315d6d78dec0693ce6d183a0c54cf43f5102000000063aad469a497d7d96e8a3534f57a3154041073ecdfa67a0045e6219905c007b840000000f65e74d7224cdfa384c03e260c0a4a8495498efe3556e4c2088f1cb9e3768041a2ee74666733ffe505442ec750213830597f2e266287135d0b2fe0b12e14c4c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422468700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e3b64097abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52C3E3F1-178A-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000aa1ca2213ae947fb26738a5c31139b3eeb83d98353a5a02e14bc4d829ba4e293000000000e8000000002000020000000268bb2fa4e3f77d3245b19d1bd0234f1243dd1d490b4082c9c78a347cec238589000000001c1ddf16009cfb0ab09097c415f7a8f42a133505293074ed3ec6653e4eefc18e5f28f4ebc83c6335fe6b69e964421229540a0848f615a7a5fb9c0b1bab4a113ad581efbb077b688e2f8cd160cfe6eb7b87604653cbf297ba559ebfc09f95a920e9271758f537b0f42cb7710fbaeabab8623efdbfe390689480e000f1a53f2039eca62d17e813f982862cc3da39ca1ed40000000ad114a15332391fc9eed79c2b5f031be01592b69dfcc2a480540a5b56a4d099260a8f5248094c5b186057ea92c6e2bbd24e51ea62dcb8a27690a2f76101ff3a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2040 iexplore.exe 2040 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 2924 2040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63dc6f9c9f8503a2430b7c7950adb3d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f1be6de756a91145e81f178abb3e05
SHA1722490a7ffe463e4f298eca6d4723b7bd5d67dda
SHA2565891d14c0aebfffee0c9cd57f66575054f472ac312f55f261516cc693b3ecfdc
SHA5125645dff520f58b5bfb1be4d1abba5c42266aa06a136c72511bf88d35a0866e68cf527cb6d25357c96bf390c1fad3bfca7df8a7a8b887ab70fdf6f0a53612e5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e55f48e2e85b9f5294304a19a1efc215
SHA106e34a48a7dcbd12ccbb909a51ce01735f20c8c6
SHA256c3a657831920505c8bfa9475a7151e41289c508156eca5544758af3ad0392cf2
SHA512e1f87e598212b417400a6b88890a9f542fce6ca2f87e1a9abf97feafab3af46edb87f5b8c4f4ac0f3f1d77fde0463446fef65a31b5dfe76da651f316d355448c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a2abcffe64483899477c6ec4f8516c
SHA1a1d642189b4f280b02e3f3224348928991108abb
SHA256af030e7c7850e262978e46017937a74c0028682c2fca8ee30054b02bfff59044
SHA512bd31f6569b3135b36fb6469b40fbd7fe120bf8111b3fe5918c77c63813b49355106a24c3fe7d95e68369390d7b4127c07c88aee9150332dfcb69d7c999253452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288aa5d919a9726e8a3d715cadb76d65
SHA14415d127e3831978749b19f6d4d56754d74ac942
SHA25655040755a73d715fbe67626f77656ab587ceeae402adcaa2cc1675f96a744f41
SHA512659b4a41943352f72b8a9e83c29d6eb484223f850c6b601e598b97aa9c9a10882850c172dd264e40f2883a7e3314bb7119a6bd564a19aeda2f4306144fb81708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3360f473e250c444ed498489a209958
SHA120498f273543d8144269e99d460e2d7ace6a92fa
SHA25615edc0b625495b9cd8f52092c2e073daf88e00f7334acc96a45ebea5a82961c9
SHA51238b56305878ab76d1fe9266a8ddb349712da27dc4ed12e0c3d48b49756c96ce76fadb63a4bb52a8e71f7667ad156de4c01d4afb29df9ddf63cbf576fc2127261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5233ddde30eb0069df36d6fdedefd0672
SHA16fb814343d347fc33a390e447fe70ab7a91865f2
SHA256a9d8b2fa77ac212b9a8a2d9224cd57e7a50d9f5285a4178623d86dde09629c83
SHA512245980335a595fd78478d3f6a5d34d4c1113206586ba36b4edfe4422c0bf4739a228d5a7bdd1cb0eeae9b143f2f5a4f0208ae36559ba6c2d6860299f2910aaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e3d506fa9d1daa0708abe3da756c2f
SHA186e13bc85cdac5b08b4cf4cad235c12af2c2bf70
SHA256ad7a543d5504530b5e228b1e510df511150911e1ae0d7e72ed1062f80fe7022d
SHA5129e3bd65f04797a5900d7e2420d8903d4eaa77b966dc3f895b26c9da824af6ef059ee59eda65f5935fff856905d0c0f7479a913acf84c837b15554aa74dd9ac9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9891bf80f42d8e2a493db507b607a45
SHA1bc85f87e290f064df9f58fd2fe982ab35075d5d3
SHA256c380311e3125990fd55ef9c51bcf87e47f2345a21b6d87bb5f76d43aa0cdb64e
SHA5129bb458dd63e982a7c52117175581e38d46af9abf4446cd353fd97a590270a7bf7f22156a386d330ee1533d4c81ec0a91a2fc51e6ff1fc6ab88b25c34121d0b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b9beff8eebcd078a0119f335e3722c
SHA17367fc4f8198b2bd20c401b95d8e4be0867aa495
SHA256500f1724f01b38b0c34096e2d8da3a991fca2523a2fe5f6575def23655fdd5f7
SHA5122a88e601a7ae036b3c305e78ca21e63dfc8d919c41c7dfda8bcaaab9488018484e58ed57a5a39dd6fc0af9b449fdaeff944e2f5826ac62c302345fa911a7f3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb286b04accc283323ee24d35ff69772
SHA15ca35f8bc3e04e42f4770b01bbd88801ba681195
SHA256c9afe4715671a09ce62fb9e607a2945d4deaedf4ec3e768a2e1eaf6137a05dd3
SHA512190e0fc82187ea2e36ea32080f523050d070355766765e5859824271107317e6e1080e7a66d914b1955aea5ac1d7c533f45d63c99c98c13570d3f5ee8ded74ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51356f11220f90cd7926971b3daeb1284
SHA173f41f9583bde675f481e4304633bc710bccdf06
SHA256573cfd5d82e79f9a56dc63e2178cf5e397475c200511cfae797d74f57e5bb426
SHA5127b4b7bc2578b6dc553998b2592793632c778dac4aa6e1fe03fc96e5d48d4d23a84e3d33935dfdb6be21240f1b7705021026d21ca0cd3eea5b5d43fc4e7c1f0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e14a3d82e4d1f4fd43ece25aaae646
SHA1fdb69caa5934e6a801fcdee7684f12462ff591d4
SHA256f238d660c9c408d3334aec5715d12def49f8f839c03728a4878baef457d39581
SHA5128aa56fba0de076c3894b152eb2a2812d80cdf5bacd2103dd0483e8526eb66a9b885a5f444346ff157eabee4a9ec7555baf7c8e8acce2c62b0e63c05d5a21e23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bcbea7bd34ff58559184228e30d8a5f
SHA1977b7b1867efcd14aa6bfa83d6e7e177f44f6ea8
SHA256dd1d00bf70c2b6109dd43bf7f9446dac9b98c943def3d39a0ee5a6a3fdf4c681
SHA512cda1528996e4a21f2da78b91d90a31d8ad8069d98beb5dc26da783003fbfbe9ef1345f49f3446798305466eed38a304b60cfadee158f359b28ded223f84e7783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce0f8a6c7855e51f96f494238be62647
SHA136a3e8c9fef287834f2252b5c0ef55eeca10ef9a
SHA256fbb1bf5e7c7c530794423944b29b4b65d32c31d4d4be6f82e28347c7b1d03460
SHA51269a3c94874c03da7945646f589a4242ba14364323fe45f19942cc39f01203e441d9d91e8bc78f9ebe8b0a153164967ce9f917221c6fb275cf528cdcc665778d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525233033f1de0d112e1edc89acd7cc42
SHA140c4e3559188e32c5c047ea59ad39b374fc8bb0f
SHA256b18d8c9f83e26a9f247238b38643b933b0e5cb98e8cea4b5d60910ff2838e3f4
SHA512e33906f96e7a0d2ac785889ecfef63717d63093b41a0b8cc59e679b01f72b1f5106ce589304659529f5ce32cddd18a170916c57bc08b768c7acb83d4fe87ffc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56fbba8192b4b18f0244c8f3455c1cf
SHA10c938cf9bd3e40f5942bb7b80e1ae9fd1ac9512b
SHA256e9a2bc456888b28794a5856dc2f28d4a66ad775f8f02e3a368428612dc71af3e
SHA5128e22b66c2656ae57831ed1ae650377e1e92a2db125f722fec5dd3760075b4f6b6dc675165842280b4a3c54a901e61a20e77e8053a286c6b27bc8214c02e22170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5145975fed3264b15247cc37365e69fb9
SHA19c625291b1b5b7c81ffa3ef468fe97876c57bbb5
SHA2560f59e51dc3501547b3f07e7d9102cb960c6ee6eb7acd1a1a713a35b952c22663
SHA512d79356273b02b53d400ca2a992fed5030734024828fcabe91f8e68836da576fe5611e543bd51a985a8c3ed88d4d56c5b2131023c2369a520fd7ec4af7f109f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7721be1dedc75a193e1ec3f2a4e48d7
SHA196146508eeed005fd1595f505ea3e9da896f26ca
SHA2569c21bf2d925de6be391d3c4bcc2b713f7513238028a7f2ba82d0055c0c633284
SHA5125a3365f698954ccf1b3fd1a6e9ef293f641ec075fe9559888a247c260f33235802f1add9325ba614c292669cfedc1ee3f83e4befbde71a6eac24692d113388b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdd0675947528ea5a32cd9a58fd61d5
SHA1e8c942e351c31975cc847e336b2fe1a9bb55da6e
SHA2567385f98740905e7a7eeb11763323747ad86e27a39fd0a347facd7cf633ec1448
SHA512419cca8adf37bcdd2f2bccc489c2db004d67aa871c8a89d3cf6cb9965a3b79050454ab3632722c3382176df8f072da422f5e1af25197d0425e88378abad7dc9d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a