Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
68502fef8d4b528419d183451d475b4c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68502fef8d4b528419d183451d475b4c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68502fef8d4b528419d183451d475b4c_JaffaCakes118.html
-
Size
158KB
-
MD5
68502fef8d4b528419d183451d475b4c
-
SHA1
d26842bb5afbca2ba6fe97bbeb2565416b35b3c5
-
SHA256
e3f38cdbb51304bfb46c9fddec99dab37bca1c8aa298b968af0a91b1d29f41aa
-
SHA512
990a757585b2e9f6822b6e95ebd6de1ca8f67d19ef3327c96b2b3f5465e80079255cb4f95817c7e2eb73e3f65f1731944e238c6829ac1554419decd608f7ea25
-
SSDEEP
3072:SRi1AdWoWFyfkMY+BES09JXAnyrZalI+YQ:SRCoWwsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422566861" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000cb470469883ecc6e44a55e2ebb665708350f5266cb520200aa8869c6c7a356c1000000000e8000000002000020000000d87924407d9d48d9a16af441944ee5b6034a3701a9a451e83aa94baca101591b90000000f04dd37dfd88f2608c5b5257a92daa0ca798d5485c86a393ee09966c3c3f1f1f9abf04fc87f78c7d89cd5bb3243bfdea31ad72b8e3472a26d270aaa6c1c85ed0f4869c8274df373ac0084409d50cf5cb22eaa612788627a04de9c9dd193dff6790fce2607c0153ac1094bf463eab2b9c82e48ef478dbcc9250fe6630692590267b450eb7beeb79fd3dacd361dc682cc1400000007cc3a9ab58579803db6a71b31ff76e5f77573e992a09162bae815736d045af19ee53b9305aeacc570d84a7cde2520cb56c1c9f8d8c36df6b4fb9dc0597766001 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0053abf27bacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000cedfc9250edf4c33a46ae70e723bf5195680eb097001923e2ae30bf7557994a9000000000e80000000020000200000000f9e5767d1818f071b9a8b185837458d46e74c178079a2a303dda81e80188c5b2000000020195cd40887155408942a10a79c8d8eaa35b9c9d49684d36772b473f226558940000000d30393dae1277e47f0c9477ba196668248ebe07231c0a6ebfe11bbfed68fae364ed8f704bf1d2a8be10ceb1b7b711e4213315069d4809e158509baea78b90b02 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF410C11-186E-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2092 2824 iexplore.exe 28 PID 2824 wrote to memory of 2092 2824 iexplore.exe 28 PID 2824 wrote to memory of 2092 2824 iexplore.exe 28 PID 2824 wrote to memory of 2092 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68502fef8d4b528419d183451d475b4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29a3bbec5458713061626e440af3d14
SHA1608c126e560ff7bedf61d5f385b2695e96d53b94
SHA256ea53bb60a25810b2ce3f540d4155e2b873601989344444ca5dd3924d719fc83b
SHA51232ebcdded948dcd4c458e3ab5fea619278370f9aaf7830614645d7b956b536a861aaa11de485b0bcda1075201fabffbad5a722fa803af99d406053a5020dff65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ada91f617570ffda35ee2519877f484
SHA1d9ad9fcea246d934eaff7e07e638327a80da1bb5
SHA25602421447e36faafa36a23b1a076fbdad5f9240f823b6eeb9cc9508daad414fe7
SHA5123bd8a48e323f30bcc7020ba7d30a2bb494ee6c9ca5067731bb8989f6e553617e8af5375b243dd5f0d6bdf6999f0ff16f66333f5193cab0a91a909fc18a03cd0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54398aa906ef968acda1892a83c19c18e
SHA1b6e2c1bd5fac065598d0ee8768c15a162373fce1
SHA25635579ca4e07cdc39468ed57a5f22fa727b4cfc8eac1d76afb591524869dbb9ff
SHA512ecfdeea869d7617b573181fbda4c4bda83bf06354fda1a15fabdedb5fc06e830685ffb3df4704d59f09498e2411a066a20428f3e6cbadfcaa65e35d58a02e835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56497a59ca5f0fda46c19d8e9a01f915c
SHA1d5d3d5c9ccf13786522c66ea12edbea06a31692e
SHA256a3621f4b86a38d583194bcc8a22bfae6aadaff4cd02f1eff95c0ed791665306c
SHA51220514c88ba9a0164092cd872945a5b6b5f8271d551354dae9386b50d395cafa05930e5ca8249708321d5147d7a0125412e76544cb29b575475c2042809a420a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d127c1aac958a1aece362900de40c7
SHA1be25e3905d2baecd0612c4e7ef6526060ee6113e
SHA2565747151887b84bcad588396ac4ab8d60a1810cb9e8d7973ec64bc93967bef8c8
SHA512a99928389b91bc90a3b5972ccea58650874570cf4829f3ee71c5b7f9ccb5733b64fd611623bfa951343e000a172d35dafccca8b0cc6ab7122eee4b0797da998e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac9b7dcd647234037ebef21b12441cb
SHA113ebab96ed51c0ffe6be2448b183ad3a1c2fe60f
SHA2564c486fc3adfc55be58b78a1c50212c43fa7610049cc0f7ece1b2a35fff505a1d
SHA51281b589a575950e60ec74f13e9c687c1f63f39e10fed381a8b38ad94cfd8f96f2c49ab7c5da49a114c045eca951e4e03225e899bb44281370f27625c46d2ed901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c44806a1fc207904270a7424dfaf693
SHA1135c182fab4bc327bd531bd77c37923f2bab7826
SHA2566cface5210aa6fe20d2ebcb4a6172e46062f30dabbd01738f124ec2c301cc569
SHA512dae9de405efab0dd4f7b05d003139dd1fe84def8136d9ca0f8a064617212c2dae7611ba34138d6129810adf5470a4ae117e159c5c51ae56577a910e74805090c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5456caf1715b0c42eacf3bfa9bf4ad003
SHA156bbf55387e0210b8a84d8affa014dabb6b02d02
SHA2565edf642a146fd1d54a858117943095b101394856c9b48fc3e35e59f37666eb23
SHA5127e7c0c4a4a21bfcf2470107dfb17b8a5d1837ec743909fcdbd430d9bff2c5bf959640a235b7a5d0c68ad6fbff0a60d4ea9e7e49854e14d6f454575adc290f51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90cb8f18d09e896407cf316540c6f8c
SHA1ab2ec82a49fa4b37b665e8b915cba63f9703014a
SHA25696dc9131e4c5963d4bb889faf4862a2c0cc06e230e827a7250ec7c42d6079daf
SHA512921c83d25a0a0519f6891a920ab916f7aac2b77f72b4becf6f3ef18dda4d5a6a7240ff6ba1d54193f29c40c700ffa408745ee4e4b035465546b83e09163c256c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be2abc146522092e8fdb0a9657c11ffd
SHA1254ca41c67ae36da60abfb4c5ca23f24108fe702
SHA256f2e49c5de08c77d800599db14ea34739d1a52706b1d3883f858a4dd91a5be89c
SHA512cb5ca6d23e323a8c29d94c441bb1fb300cbb560f68d457b165649a36a73007e30b1416e125c48aa0c120333ca4214c6d531a72f97d2557815b3c82dd5e58422c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1a77869a350b300fbbfb9955c03e6b
SHA106264519e15a3512099771ca3588654e94bba795
SHA25669bea21dde8c7b709aefb5c6557fe65850d06ffc629973106df0038db0fd490e
SHA512dbcec60b7fa8a38f487d773b800164ea9a9cbfcf8cf2e7ad345ec37ff8b979da4952d1a8eddcd41d616f783d59a769bfbcf958465501b16fc0951cba0fc4c35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5302f787e3041690775ab55336f7dd621
SHA1a5e87c9bae440d3b08a4cfe3970867b0a915611d
SHA25688e22b980ad70511a6665460dbdc57c9be831f4fae210e89106649e968506dfa
SHA5121366f3ba70023188620500e750f9c69ff9ebec4777e88018d9ea07492f53b34a7d200cf3becae7144cd475eb89edb8d255cf3069d490a17ecaa9e0083ec806b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbcecef9bca13f6846d7578a1fc824e5
SHA13f38839a17f0fbbe59ae9b8d463530a94a00eb52
SHA256aee92abcd2c0094a1981e92c4de06299fa3e3f92c72317b15d21f17892464917
SHA512e11cdefc5881b61bdd365a580a47211ed21f8662d0398c4cc20d9ae03e97fb2a8ec93a196becf7d74e0e730e94e678b43e0f2e49da38f67aedb90bb961d5e04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56694e273f7e8d3d812e259623e1d8ca1
SHA1a3ed2bb200a1cbcd753aaa0dc3732670fff9d847
SHA256e363ccc287d8b4d52357a96b2d19ad28241932c4daf48c6b4457b41afb7a8cfb
SHA51257219f0696bc2cc940fc0789b656a95e92b9d57db346ade615fa8f69934e40e1235d02809c974b6f6211763cf44acb28efee76f85b27f799a192e39050169d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700ef901bd06f87f9792256b648e61ee
SHA12ace9b4424e511e53ce28758b26028626dbd2ba1
SHA256c8b6daa9da27c6177e2e5a0696fde46b3c4b400d221e612fbe74f0908db640fa
SHA5122108b96be1ac3834ed0f8e4faac46d503efc0a8fd807afb5536e22516284bc280527b587b27e4d5275fb2d0da65a7b60351a7bde6afb4dca945e4af6cca57f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cce0c6b21f34ecfb769353cc5f993b0f
SHA104402f88df35ed21d1ee1f2138647144fb7c3dae
SHA256122475c51112ef6c2d8399b971b5502f17a9e95a1c8927e4fd716296fc19901b
SHA5120f14c325ef70d5b7b4b0c75c793e49d30390c7cced04564c5df7a354f65cafe9c9d52319dd4216dd7c1187a9885cb098d33d73fd9ef292fed9cec873d22f6958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57904534314d548d6aca1a143cfb83be4
SHA1b10772270ab5511ee51038ce6240b623713a4875
SHA256dbed258553e6b61ba6502042b6c38f8c0e412e04803463837e1fad4204897199
SHA512d32c418a8792cd7399b4f6410fbcb749914cf3410aef7985203f6eec9d185f30f0f824034c24afd0def9d6597d1e01fd82a37890e46167a11e9706e2d0f70cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b267b76f3921573ca7bda6e0d3878cf
SHA186b363b1c90b0bec76a3fc209b8bd9c6726e2c31
SHA256812b076584357472822049f2ce94b59eefd7b801afa3e1571268d618213ec48d
SHA512bf6b1c17a78f7f2ea6f4b173d7b801ea96df474cc6836a8da536374e8bfd16ea627006e6274b10a6aade9489045bc172ecc353c74318776e424117488946b8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51029d6d5316e2a7eaa05b9f0ac45025e
SHA1469c5f6b6106b76cda787388bda2e344ef29c614
SHA25674f304bf5672f66e9acbf5a7ecd639f481a672558c4cfed0e21b9aaba2f5d267
SHA5127988f62f68127c9772ea85a7e1d6cea13c6a1fd39b2e093361c4c8214f18c02fa2c3590104aba92112ba2d8f1525c8aa2a2d3dd2c9d61c10b867dec909168ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587367de6bedab68fd89a31ac91d6f8b4
SHA14fad24e2afc6983e1e2205c5951f070b1bf26111
SHA256f77af1ff1015ca6e3b138b2daa6cf0945f7896f87b7cc242b0d85105f7c0383f
SHA51257327ad5ac82c2bc8135f29df4fe690f131bac7a85ef1bd5f96ac55a91f92b92a994e76a8c7fbb75c903c7107c1055e61c32c7301b7d5a64f935ac4364d2b27f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a