Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
65e4e49ba504d01a9a24753e8eb63127_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65e4e49ba504d01a9a24753e8eb63127_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65e4e49ba504d01a9a24753e8eb63127_JaffaCakes118.html
-
Size
16KB
-
MD5
65e4e49ba504d01a9a24753e8eb63127
-
SHA1
8adbd069d3a3bae88856218b767d19e4cc675f71
-
SHA256
51648d10412efa81925a4f2d210d2189e71677b4af51699fe4b59489d8d3b0b2
-
SHA512
ce039688857e171b901ccbedb7c048806b7870bcd7a394d924cc4c2e18cf3bb2e1f2fca5b888064fb55e0e8a89cbba3aff6daab144a5f91f144f3f431e918dad
-
SSDEEP
384:LhLR6nsqLCKnqtl+CYAT+Y7P9RHlBXEl5KzB1vAL9TTH00:L+nsqLFqtl+CYAT+Q3HlBXEl5KzB1vAj
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC2E65A1-17ED-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90323896faabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000cf4e3aac87559b525bd8c5d5812ae812d208e0c396ab87db47b5238a31839c73000000000e80000000020000200000000d8c52eec4ab41ec79898413ebffdafb68248985d06a38fdc96484a5d0c58c5220000000b6ca9ebbd5fb59b6b9c47eb5d3b3654a88889659116ba029bddace2dd98fb2cd40000000d0f552854643ffa9d97afa4718875a37fea16ac08a9f1d54d64a991d9b6a011b83259e3d2a7ef5749f6ca2558d442cc4abe0860b5c3e1aa2848e5a94ccd5e53b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422511397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c4f89245f0ef09d379eafd16618495c26ce42883d5547c34e6c21f37aa05247c000000000e8000000002000020000000f4fbb0bf7549347564e9655955c41f7afceb9acfbbb670c4947e58a0132472b990000000c170720485a1b387aba8f28c34a34ba1a5c2286bc1efb75cd5ef501067dedaa04277d7de48413bea4afe06fa24e398e3997219ac095c1cb2533c26e33ee333de3ce924f5ef16e12d82ed83b3799d26bfd7bf01bbb887f59c903f7ba4ea3d1f7b05d23b075fbeda14d49f5059e99bf4038101a2fa3bfd67bb5bf9bfc639ad3c319a3bb259b493fcc7a52ea6463a30db1d40000000372a82317caa4cb0446746ede79cb03eda5ca4ae979d40a03ba87e5808f00bda1ed155ec737a8ce55c7886e5dc5a89e17345248e40ff29dc362dfca70e51b39a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1728 iexplore.exe 1728 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1728 wrote to memory of 2524 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 2524 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 2524 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 2524 1728 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65e4e49ba504d01a9a24753e8eb63127_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5636a5f116e05ae74aa041d2966375801
SHA17c4a5755d4dba2bef292ef1568f726b7877517f5
SHA2568942eada9fa05fb95ff04150e55a726fd679dc2eaf03977581c770ba13adbb51
SHA5120ef08c8558d3cc38826b91352d9ef41a42bcd7bd4524a9e235a596b4dc4e1baca02399036130b9d151b8b1eae3270ee73c74cad01dcae0f303201c78ab405ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5bfdf8faf97e9f5e8d1cdd695f314f2
SHA1bf06b1a2672255fd910b52e8fbe2a76e22cd100b
SHA256a7db00746a21ba420f56b00b80debe170295b75542af3f423e3144d6f4e20c0b
SHA512366d06673d2696e1f8ce8116bc506d9cc6eb485817c8c68f340cf37fa2d4193a5f888c6562c276fb422d84be30f93640d33f04016204b7a1c0d98424eb97b7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de6843a00dfc81b0eff3eb5f9e5abb2
SHA1ba5ccbc055fbcc2043b953e5288f3e4b08235d0c
SHA2562cc8c185f0ea6458ee589d7b5e6dd0ae81cea51a1887832314030c4a23484199
SHA512a1abcf02131f85614e2402f3d151ae439e77076c8287b4f0a01a765e9304217db18fc103eb4bed311ce9a7dc89954920a6206408cb7e0d02ea3aa5a2e53e717f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59150c193ddf86ee1aecf343e47a55b5a
SHA123b965cde057bcfba5dc9653c80b86cd8da0c3d4
SHA2569244363dd8e60b4758493fab3c338d6d1d5afa87faa681687257936694da5b77
SHA51270d8a6e1401bcb648417b10d76994e072000e4a1c36e39a7ab9284c321f4e66c5688043e401d5d5b45d80c40c92b714b135ad92e59e5f392faaf0cdde5220d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5803a5d301ca85ea781c84ef37e527538
SHA1726d29b01bbc12cdf868b41d80d96aeb74857098
SHA25620082a03728ed9925d147710cf932cc4eb890efbc62b00a7b76603e3bad75101
SHA512205ceda40b1ffd07440ae7d96acf9a0733b2cb1dd473e7467d751197a1080bcd623afd64223d7e63c5c88c6bc40d7fa875ca202535b5a40a2dd8c1cb5a2ba1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599520dedc874145566683acfb36daad6
SHA1f1b0ff4f985f6a98c53d569a7e8a1fd2c95b86ab
SHA2567e42e5f7258df443aeb03c2a429b37ca2697475b0b3f744bc45e29486cfddb9b
SHA512c833010029a9cb7d81950741bbc3ce8a1a0bc3569df9b2e3113fd695f626c9149f8f002a91175f75ffb001abdb701e14da93746078020ad0516811b121eed5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc757b0388e88320651e427e5e4f38d
SHA196a65494e6ead14b1f1ccb34d0614d56f64d24cb
SHA2565e0b8002eca0432e620c9b73701324deddb7b883794d6c75b6beb92ecb891dad
SHA51249b77127a4306199121f9da76a8197bd8ddd683aaa30e0acc35e8cab54f99027fe7e45185511512cac0fd3342f52f2021b468e366e14a8ed8260e2e834f56a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5121a74174c6bc210f962d0da6ddb478f
SHA1a1f4d3463938416167479e39f2d8cd990975e096
SHA256475c3b1ac3dc208933117df4a1774245fe8a46c3680dc8644e0e86a0f7eeab53
SHA51270a290bbc54f68c7429e0f33c0cf3f45f996469ee89f76b45bd5e38e66cb7392c782f6d40b25d73da38c5016bb5ef96f38c4cc37c0e40f5a5f6939e8274c4eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6bc6dc89ca547dec6bf0b77881be80
SHA17d25b0b195151a7f99c476305295932fc158b269
SHA2568286fa2640caa595a6cd206cb9203d71d03d5e6346058c42446dfc8e0178cdcf
SHA51295302666bb4c15b27ddae9ea0edcad269fb10f6c32eb2e96d7cab6bc86963d8b7766be03a92b40ee4cb39158125b1d76e7e77d61441a60dc111493a5cf44d094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aacbb9c231abd2e1adfaea7879ad6d90
SHA132cbfbb15a217e3d9cebfe0823c1a95812a3dbf0
SHA256234b83def9ff361db9bf752f66ca8ae4810e25ece99ad7f4fca774c50e953df9
SHA512a5181e4f24bf0407d9aab0e43ab67f85276f08ce7d24fad1023ece5f2a3b61c717c1a48c8db677a3bd83b5f417a7b34e1066ca12f7ae716d4fe08057ec36ec1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578cd1b51ad0450ba6846b0d332f90554
SHA1174a030c18b125cbeb3dec22270c90b135c7eb70
SHA256b9c48e10e6e752917ae455fab3a7899a5b02f947233b179dcc2c9bffff91045f
SHA5120df716bae03c4f25ef1dd3a960d7d1660ff3a92f7a8b258c7c83a6641cc792ca93bac2620402045b533b6191e9fe750ec042b83b17954d5d63e5f8a2dd9d5ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5eed88b0e2d2123465bafbf2f38d916
SHA1ba8fb327ac9a6ad859db2798630ec481c345df7b
SHA256bcdc4acb9e2a7a95229d7ca1306640f6911261af497c7d4c6a9bade74164407c
SHA512bda4a1e154efa89e47a7a9a7ff2165a86769aa0a4dc53d3067ebc255cecac31fde4f7ac6c08c11d6ff34ee4804bbcd33aa8da952a75a0fc7cc4bb8a3cc4d1f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6f2573a274df15bf234f84a2301115
SHA1531e379ec21f9243d7bb44bf5656b0a00ba1c119
SHA256fe298ae751af009e7c86cef4e7f3e80ab2e19c5c72f9ca3168ac69013fe6d80d
SHA51208411437deec154a855f4ad901a51e86e354476cf10ef2ac9ab46dc43592fb22eea498ee901f610ba365d5817bbfac2d0417331d16b426fc7ec0ef60e006182d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ce2c1c843b4d0391a08f1fd758cf528
SHA1f957731ddb8e9978e3583e54654b30d847532b19
SHA2566fcde07d45853db6d8a317d8538c18d98eb1786913f95056a4b6ce08cd76d56e
SHA51231dec6f193c1a395ce35a6451831bd2d7aeba13e0a42f98d3cca641fb160d8732e560bc5c2384c52dec457ec27e17cc0ea38f8c76b360f2aa1c9b87c534ebf49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d153c5e51c19daf2c7c75f9aa30717
SHA12eb8c0a2ea284f59987e0a507991ba7b6efee45f
SHA25640f2adaf929ccdccf3c6e31c25443a2973c7aac00eed1eb66af55a2ae74bb0c8
SHA5129968ed70d4face9fa43ed7efd823fdc09e72b2669dead06e1f7c3f37fddb1ed94bd8eff28cab05ec693d2517dfbaab79b3486f58029702cddd6096de27d3cc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8046a9d756ca52f76a6a730ccbea2cb
SHA1bbd909b84cb1344e33d132a487706626ec864681
SHA256ec2675950646636d3229e25b072f4055bcc64702fb7e185e50560754445a1f2e
SHA512d742282a37c85d8f41d9ef90808de3db381f3fa68fe4ba58cc87d5d8b69334aee5b5df860642728fbae8f7a8d5b2c6dcc34a3f284685124d3c128809283f2f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a065d8a7d4e0ade5744d24d180134f
SHA16e2666ea024a83b4baa5db396755305fc804fb0c
SHA2569bbce47462025e3ab20ca2afdf122a3260c8b6c79969497efcc3494343ef248e
SHA5120a254ed6b7454f43a51f12780c636a9a04a2831916004e3289b974b953a8bb86cb2acc1ef12cf0dbf25d9f7a7052b2caa0ea40c94e538c2e09b540b8787b2a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abbbc9eb90a7f0484d447dce6918e4dc
SHA16c8c3365172b6a907f29290a5266905c13222771
SHA256524ba142a18a7e1a225b5975ee9cea181122e4ca3404293e7410b32166c586f8
SHA512a77872ab54c117e77fb474faadbd26861cc314eabeab517f8ae83151d81fa2c47011a9325b4331bbf34eba72d00ac898b5ae54568b00319d1ba7c23f2469018e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50418dfb399aa02982b49275fac214b57
SHA167c892c0f3855dbff15270013e637f33a0d14419
SHA256aa770dc7e0904e293744816f89a76447d4009017aa8c3f6744d92732bd3e7b35
SHA512a3b93b5ee1d654d4976ef12a7081d5d284b48d2a9e9fa6ee93369f5d9d86fa6e635c1bf782f4baf213738ab723c26e88095bf9e729e4c9bf6e8c2ea62b03a93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c13a0eed1e9ba2081b77ffa237a87f8
SHA10c7794e5f7460887018a1a299a93fb4d9893740b
SHA2563686892ae75283062280723fe885d5a2f0fa959e3b624420dd7f5738e28005b7
SHA5127b0134e19851610a12420ce67a3ffbdf10be6966967ec4f785ddbc91b788b0c3bd1db475276339a0edaf7e180913197f83bfddf0909d06e44a9feaa0c9dfb4f4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a