Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
692f11e903da8238750582b74bcfb75e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
692f11e903da8238750582b74bcfb75e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
692f11e903da8238750582b74bcfb75e_JaffaCakes118.html
-
Size
462KB
-
MD5
692f11e903da8238750582b74bcfb75e
-
SHA1
9889578fb4cb92b9312ea5f7a0f9d6b3fe065359
-
SHA256
ab2a2845b39679fdecc6cbc74df4f251c9822863bb9a005b60f50dca4b9976b5
-
SHA512
9087bac9de0f95acb0600069b6220dbeec267da99cf85bc866104fdb321db6feb213a53626321761c7f56aa410b057639c881294922f23e90ba5e27f38066771
-
SSDEEP
6144:SBsMYod+X3oI+YusMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:s5d+X3y5d+X395d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000026fdb09a8e3fc276644733295fd1ff8c3d7f2f6f12ed926fff14bda50cbf7bf0000000000e800000000200002000000065511ed33193355eb6fa35dedfc7bb40955420737624a1a0b4b5ed7b9e553c9f200000000d1400f4ea1ac606ff20021c4b2a72c4b55f19bdbd94bbfe72138c8da03153804000000036dd0f98c51c283316ce7106f28adf07e07b5b06f09f9c1a756dea02988965a0e31e2b9ce84e5752c4cc42680271dfbaea22e5819a424d725352751010a24a17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000dc78fe304e36c79c418571b7345f8f396f7f6da43c411a2624e3daa0105a3aa9000000000e80000000020000200000008071fcf586b82055e716f791cd30d2fa44187d88228ec07fff63971f6544371b90000000584c9abfcfc4ca39db686175998b1f18c416cd2eb799055a7dc71dbe29c1a848f058d122c74128f0e4287b430b4c462bf05ed2a1efd83dc75bfb9fe75fb45f1f0ae5311f600cfe0a945a7cb1af39600e82cd0f206c39e154289349631d2d1007d25f0a19569561e0b01aae3f0039c60ef3dafb7dc4c2ea585ef1ea3d09c0be63b9e7f2e9e56df49a0a500a2c53a8184440000000c4736939b1b73607b91c170006512ded79a7dc9fe51047b6d42ef127dfd119672ff2cb26fc2478848d2c2c5d4360a0e71e4e0a74c4ddda7e32ce9aec8b6bd65d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586952" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5060f77eaaacda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A66DAB81-189D-11EF-9B88-D6B84878A518} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2236 iexplore.exe 2236 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2236 wrote to memory of 2820 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 2820 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 2820 2236 iexplore.exe IEXPLORE.EXE PID 2236 wrote to memory of 2820 2236 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\692f11e903da8238750582b74bcfb75e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c68c1508c3e87a38486fdfa794f17bea
SHA1ad092459724784bc47844dc9afa1bc54ad6b9234
SHA25671d7eca37162949b56a3b261ff6f732648d0220b9ccaa2dd58696763e2346671
SHA512665f057f3a86ab7f21fb89368c5cd2a652ead6f70a557af46b7c24999d3304e1af1d9812a9bd3772bc8d3d98ade54e4555efbbdf58807c053b6ccc688983c53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54163de81382fa48f90cf89b71614c510
SHA1038f87fe4d924edc86b8a92ebbbddcaf1c12ec0d
SHA256906bbb680eb4d24c40aabc0a066314b10a3ebfeaab5f2f93bda9b62fa2515465
SHA5122d5d542b1385cebde5237a7013f3f8ab408c844141f64c0494fdc38a394eed444386739af8a386181bf86900de11360318ba6f5f6a48fd2c2e54c6ffdf65a00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3da56204880c336602dab77161e7e26
SHA134455ef1ab22dd4502a5b3333f3d5741bb3c6c4f
SHA256b09d2787c47d95b67d52deb3254b3e3b0201b4f8316f3d5559c3075ef6da2f64
SHA5124f338a44c200df9967e88b8347919d96190850dbf08586319abebbaf40ab8e322caf6e3db8c1f3d0d648413a123075d47491034034a24f1aa413199bd0573f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5696d82411c274ae88370a5282a7b56d6
SHA1009f613a4965c2f873407b1a28ba90d7478eb0f9
SHA256966e01b91144c7663a118e59b2843cf659e419818e1282c754d5e36d9b13ade0
SHA512abcfbef62125bc3c22420781dcc6d0bbc55d0ee04b9abfae287e2ee814447a92fdca651564165660ee73f8cd3d3efd98634c16e5451bd1cad905c5d0dec65738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac1cad926173fdaecdf3533ae2a06e3
SHA1b1a0b5245151f6315fa7fac7038f2bea8993e4d5
SHA2566a0841316d808695c58ae791e1f2c8a3bd5f19d10ae5e91dbe63c2b160dc071d
SHA512ba8bdb93b51ab4b048d59af2227c4dbff0fe94bcc22d9ac5013379b857a596f52e6bc8d8f8ed158cf7d1d031a7c65f63ae40a66c5b7bf2afb0cb722e93df30d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d1c9c30dfb38f15464f9a44d38ed4c
SHA14cf1db079f7a23462ddd0bf71bc2fbafdec4ef12
SHA256bdfe838347b38dec078b89bfedfc91197ae819c1f9d9669796b4ab01b904d4f5
SHA5128f1105c3673e67b7b6d77a14fea954463fb12f1fbb21b313bb0514fb5c59c3498fa5e06c3d324706201f02dfd2d797c765cdf49ac1a8b026f721716ea019fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e094fc5c24f98506a4b8b376d090fdb5
SHA18aa3306196c27f6694608be559db958d77e4d8d5
SHA25663b582424facce746239e56cb5c1f5a63710745e8587a080b0e17d7b1cc601d0
SHA5129d7982ff5d2d45ccade76a64098da9c5ddc3f85c07fd816a7dcb761040cd672e0345e2802c683263f62325ba06abcfe8bfdeeffbd66d76377e13285ec0e998d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523289ebd17b705e129cb132108a29f7b
SHA1ea4057f3d21c7a4808c44c0b25b72fa1c15c7fb1
SHA2560e7a78061a95e51017a08432f37bf06c5af39cac42e21d966bd6b771f237e57d
SHA512ac27d26ad625d7ab57b2791c50fa975190397cf9497977cfe55626dfdcb45eb553c9e664f3905b17251a83380f8b092a1fc6de7f91aac4e14f96306e6496c328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f37afac5f2f01909c500d53fde78adc1
SHA109c044db595335ff592d25c1e9d5cd37abcd8fda
SHA256e3dea945c283f163a1492f2a02b3e4d3b9753b1a0e6b60f29b21161c67a4ea3a
SHA512aa14ee8a56d6f0508c6f761a84542364fa4e430c496bca7e1de18874151fb7c793f293d5a40aab1ae74a58f810fa0f913ef64abd69bfd42471f73db79f5c8f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdbf44e36202068f88a2d0a1e258ae49
SHA117f85f2296903d80ba1785e3fef7284ada6df754
SHA2561bb874fe2bc0ab578d42215542989b23b2472a2db008e02eae7a52230723eca3
SHA5125af2b46ab26b93e9808387d0a5bd39ecd41f6dc27bbeaaddf2d43447684b3c3a8870aafc11d833f5dc3959d144ff2e2c7b860d783c5df6a08dd11e09b68a273c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a339193c3c73f85462795ac6f0b8dde1
SHA11802d53d8ff00f61d7ec19f484db63ecded1b88f
SHA256f09352baee866873fdfb815bb17a629f5220647590b5f11f4b8e396f50eba0b7
SHA51253c7a2c12de264fa16fe8bc953906938f57d50e34ce5b1d9d6f56daeae65bbeb0686903d1adbd33b77d18a5eba969d97e57e0f04a28401d5079f2a6b6fce6e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb028ab427f88225198aff81720892e
SHA1089f67f7d36add5015fb58fa50133cca0f15750b
SHA2565a307a1cf7459a3caba09a57e48379a0bc07e382b83eb06c9108e1382c3fbe80
SHA512341c649ef8aae72efda2268b91d24a7b2c91e87c9238f38e38779bad1222fcc065635588aab5a25d99b1e82573f4f71436c82f6dad3145509d21888cefd30f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f064be95604a059aadc085d1663186e
SHA13229a6dc051f8d14d078a035efe5c59a12babe55
SHA2560bc0078ac6f4c1cc9c66884a2932edd5872588cfafca9c484783f374fe5d3249
SHA512e42688c147afc58a0ae349c35d055f0809d066ba6615c4b629d69af08bb6fec28663e08f2a69e6b3e5b9fb0fc91f43322142bd9b6e915e39af82dfec5cd7bb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a99ffbd26c4fac640e0c9319ff33fc
SHA1f562e56883bde3400cd38eafed8adfe1539c5d40
SHA25676d6d988ea0e3cbdc8e312902452620f90ac93a0b85ed0ae8ac3d1f9dd301c0b
SHA5127240a86f5922d759a7814aa8f9171921a4ce21e85945fafe22cfbaf6c3cdbabc347c0a25a8c09764279f8eb258b05034c9191ecfea54412f0d2873e413051539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32f7964a1bf2ed40f7b70d1da5da609
SHA1ba697ca58d01ac9ec32feeced32e4edefcb4039d
SHA256caaee652c8b2f96fb00c431f62335856b7e1f5af63a5ce1f3f8a85c39e36f107
SHA51248fd0fa7cba0fa145ccee338c86bb3a2f34bc4ec20be55b392cf868e35d4e724bef6e75818e97124ab312e17e7765891f7c86fb7055ce508a3a699bed2ee2d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba34772edd3d19e962e47cd71382b79
SHA1a6999aa26f2e4c700fe068402e3bcafad0da8b5b
SHA256e76d9b378736feaefd2c37ec4305a1a6f0083020d346d7744528586441d5565f
SHA51279feaaf726153c6c36f8b6de4c41369f3bace74a1a56db19f57ad70644cf80beef4f2cc4300104f42307f4818445f73f200db9206a2cb7c2ef8d7ca7ede83bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c52c8518771437072f9a06f9b927ed83
SHA17b4856cc4aaf8b7d5f09f3cfe500e05c63894d92
SHA2569753e7753bb0b2645c1045bfdcc5aec3cdf17c54c26d72034bb2538fafd8b87e
SHA512629a235b40d994562cd67c368f5d2cc46b171ad337460ce84430c4e019f744dd420ac40e59315565d2093f1fc59c22dcb18d8f5cf1a1d14ca235567101369877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51ed9c536bf31769619557454f7718a
SHA12d7222b272b799a44b70e97ea3705a9d087b3c62
SHA256989eb8a0366fc2e311db3d31eb826de80274a918992cd897ebdd8e3a524a8262
SHA5125698174ff8efa6e468eb9ab81d93f725063750cce2b4e5331541cd4cf249a633ff2c79aee72cd03d65e5d3e54b2813188294e21ea035107a2c0fe7710fafb214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a61e63f816c13cf47a29cb642830a819
SHA14d2f72d6f9dd03682eb693d3782830e29550c05b
SHA256c53a3c3005321e221fad4d8133f72e1868d59f48bf26b58b7717a9504dbbec69
SHA51244cbeb6d948ea81039aefdf2bf752312a07518e033905b518487f1641549bb23633945c45b23b63f6130de152b303ccf4979674d011a6fce970368c59b31f9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc90c668eb07f434cfde1d0853eeee0
SHA10fe1db4273a2fe9875522b201af2e8155f112025
SHA25617f3a002adb65c497bb5a38f1f5d5941263aef9d56340b8f099b4b127b0baeb5
SHA512963e06f7fc6d63bd9d73a40aaf46f30813b878a8677b41812b440f5a2e4eb16a2981f28e47af4e7465f107b59e2e3ce8e57fc088b7a05791c3971be4433473a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6a3f8759b6a9000aefb136328ae978
SHA19be105ba3891b7d0eec45b1f8f77c54ebca88884
SHA25667acf4f58baffbebad73f0eed00aca79459b66a12eeac2de8c25c7be10523e0c
SHA5123054e9f10dbe378e8319ecb9df34ca7000a5288a40c0348cf665afe8d3535ee705808f06f75cf95fb7034608ee1f7f80ef8e3333c35c641778981f9f64a25497
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a