Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
69230b37289ce3ad330d26f4a445cfdf_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
69230b37289ce3ad330d26f4a445cfdf_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
69230b37289ce3ad330d26f4a445cfdf_JaffaCakes118.html
-
Size
241KB
-
MD5
69230b37289ce3ad330d26f4a445cfdf
-
SHA1
56cf9786d98191b20359ce8748232bad6f017395
-
SHA256
09d52aa8b9abd3e5e2cbbd5857085536cced341c9e678146d813a00fb6302b09
-
SHA512
afe10ce51ddd5a0dc4e41d470ba6a5cc19063c11a3445ffff0a7654727c28280608ab2e4583428e64dc583f24237e2e0dcb987d8bede9570ea3ea07033e7593a
-
SSDEEP
6144:SIr5WMsMYod+X3oI+YUkWsMYod+X3oI+YQ:/r5W65d+X3Ck05d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000394243a9fe4c404d82b3dba714fa07930000000002000000000010660000000100002000000011f39e05907bea7a44fc9da8c8cea09b2ff6a8a94c65db422cab9f144669ce6e000000000e80000000020000200000006ef371dfd36364dff877910e016c9c7a16ce3abb4a5e169a93173df1204f408420000000567dd16954d2768f667e3c9ee15ffc5662106468916d62657693bcd681878f4a4000000037feda8edefbc00f15122261b47770e2ea2bfa2fdfa00fdcdbc7a90b138764b9e6da773f433a165e7a4f544ab005613bce6bfd025f4233de9691b564329e28c7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b069730aa8acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DOMStorage\weibo.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DOMStorage\weibo.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000394243a9fe4c404d82b3dba714fa0793000000000200000000001066000000010000200000009f5956a362e64aadd251f341c732ddb0ce75b5bd4d4708e88acba85fccca1806000000000e80000000020000200000002cd4b6af938e0a5a4de07162630e45e69e8b3051fda4625667e8f829c62a98a690000000ba94ffd616ad85b392bba7ac1905ea168ce16b217cf01331ef2dbe769618865b6177520a13be3e60d162cb4bed38093456277eb7dca728eb49b85a2b804a25a9a4516f606ba8a7e09af408f9e8e644c16df8a4ee3a27a396a043b0fd989ee77afc7ea5e427b73a507d52fffc1c5fd41e0fd89b70403ee800cd6b9f38175616ab97e7b1fb3b5882d4b450164f8cc3795e40000000fce5544e599410be39e24ea394bff7aae57387ba6f18f534de4fd6b7cb178f4c796ddefd9b482bae38d16c9dec686d9c16d56c37b39eaecf27e3a13509c4667d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19C5C661-189B-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2416 iexplore.exe 2416 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2416 wrote to memory of 2648 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 2648 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 2648 2416 iexplore.exe IEXPLORE.EXE PID 2416 wrote to memory of 2648 2416 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69230b37289ce3ad330d26f4a445cfdf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd3deda23cfbc6bc326d096df6b92834
SHA1224fd523af9592f993672f5ef50ad6cbc0c496e0
SHA256f29002d82b2be10ef10375dc7f82aca658328a83a22a5d8c69b750707d31f713
SHA512f8120dcabd51d00427d83a6a3149827fa3cc1736465bc816ccfabf778fcb3fb64c1cdce316db8758ab9668cf7f0664d86f02fded0c9697b81c1edd4390c47ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce52646be842bf5ee1dc30a940c34b1b
SHA11173314047fb4350ab17c560ba9b8d8b0518a2b3
SHA256d454c85ba7305ee341a9c7b9077a39a9a2c66c0eecd8397e81bd4fb1a091b84e
SHA512dd8ca4f81f3f88a7b69bf5d8569b876e7aed93d4c9d8f62e8b371896b78eebf7d34b61d8051334959e68e2ff2d3093847b32f6cfc21e80905f83f504d65ae540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54db61c4b71df5c14c433d53600b0006a
SHA1bc484f27e5452da1d1363504b2b9af670aaf7f3f
SHA256dfeff3059b2ddf01aa70a40998bed96cf9ff2ad0dfa1216062186ce60b75ef4a
SHA5125b441dd7421fb07f5ad175be27150387f3396296269bb2ea2d1faa8853d6952ca4b8c936a0f9c053fffe616ee4bff1ba25eb1ed448e56b3714e5aa55e29bd641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51710dc52b12c3f93420875bc837e6ff8
SHA1eb5fde540696fe0cd774785230da66b6fdd412de
SHA256a8fc6572f81ba463c7c7f79075f2d74a1208919787c04c2b3877de0f21c5c7c0
SHA512bd7b49055bf097a3cd87ec40238c3d92a558b19f5044d8c16347bb5f0c5183f02c591903e6cdd619b44f76cf0b2d6998bf224261a69337200eaed113939548d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb18aeea47b4f9adf9e2073a95649e0
SHA19855bf359fe62efa7cb9b5cfbab3098e94c4ae20
SHA256631944fdb2f20157acb9b9a2e97b54a7c87bbcdc3e16abb2d7ed8e3650415bf2
SHA512b324caa3287e2deeb41bd9466b2b2e24bd4cd0aff67d0c8c8fb34006b31a8098480f0e11941e4b920298743a9114b9c3c1cc2c1b26b9fa0c88eff7c2c8fd2393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb7538630e866480fb21c2627b29fbd2
SHA1d98600242fb75745218e89e3ede6b2bdc350f05c
SHA2565f795a9c04abb61fc00b1ee1b532869d410dee0abf63e94dfb48fc96177fcffb
SHA512a72f5147a5643897bdc6b6bf3153eea002b28d24226a3b32fe637c0a3bdb965cb7b96c23ca2b4f32cfc9a7da6ad70d4282dae46fbcadc40dec33eea4b6569ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac696df8a2dbe0140e0ac5a0a7d99fa
SHA1a6ec8d54b31ccc51b11caf890283036879226703
SHA256a8579d483012e5b9c013b98722e54c1890988e25d0bad470221c764d83c9094c
SHA5122514145bf85366176e18e32a3fe9bda4c824f515e7a3caa60f494f3701d61d370504ef8b5879846624a60a079b14367a229fcfe43b623aa4a41a5186cefcd171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e85b880e01ce5ac4b1798a6debce4fb
SHA112b68dc2b1b691f9d3b86ee7bb2710f8763df3bb
SHA2560fda0ed3e0cd23fb279e110339f822a7719f70183d8cdd97e4db082b7c7cb7d3
SHA5124a2931044b7becf3100cd160abe17afb3a22f095c3f42ab4ae1eea4074a50d628261f59d44654780d0f96f23e6a331cbd56b943c5f5d3179bfb5471b361c3c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597bbf8a5d60fe3450564df711d598c6d
SHA1710e9711ae2d63ed68e098c536702cb1cf3529fd
SHA256d28ad35ecd0892ef94da066b4a0878a84c2c0bb45e5ed9d51d9b9905e2388530
SHA5129139a40fdeea8f791c37a4e1e8004b705b759735e0bff89083c80dc04edb5eb8664c37031a6e41f23c07a4cb914d03206d70a6f1d1e85caaf33d2520eb97916b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a86e2bc785d1c9d03cce71fefbff3c
SHA1d560522319b0cb5ba6d0a0a094322f9dd3b1697c
SHA2563830c45ec546cedde5d95226d26b88a42bcafb1d197f3fa7700f01b6b6062852
SHA5122b50b0e1a8e52e5128a321e37b752b5b5d05a7df051ec34b8ab9f148b17aa6f808a3ccdf6925a21a6361d4d7e9a29b4e189e3d22cc5b5bca543a340008419438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5802bbd10d214bde32f8d3b18bcdcc6d2
SHA1e264f064dc96e9f35dc775148144bfa09316cd08
SHA2568f2d96dfeb9b2fd7521a797954554c7cf286da5dc3bde4f90fb47d44bfafb69a
SHA5127f02690a02d614b574c180152c00a6f38ebb5e47f593b61961f92f340a7db06f1a84cba6bb7c318022480a5c26d0e0bdce020c9c9ddcfba643d8a8629a2d03d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd207d6150abfbe12ecac3bc56e794ec
SHA108eecaebd9e9ac8e307a971a9cb7cbd339aaef15
SHA256afa7d3f47976956ebb35131a197ca4e8576465b8cbfde99a2e63c3b5f7522389
SHA512b23470d60c37b984ab578f8cdd0ec0e3c7ede33931804d1fbea4f1ec3fdc309bac0b8c36a0a098b1dc96a524f5cfebb62b62290378ff40a86c27308184d81dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517376c4846571c83a2effbc5accf31b7
SHA19c82c2d5ef35285e4bf81959330e603cb8246e1f
SHA256de8e645e69604fc02c1f958b47a89fe4dd36d87caa3a55712f8de2b76a53f4f5
SHA512d7e92f173adbbe7ba73aec703d006b637e2ca4837c0df39686c06651cc610b04bc664e83eb2d7d70077bfdfdc956c7c207da0c000f910874229fc71ac2edc6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291f26fa2b024d64df58ea6838412ee7
SHA126ca327a055f34610cc1f5f8f9d4bf532a3a344b
SHA256ef4a809e47f079bbed6f4ce51e9b1c51c370b4ffb1ae160cf04a003179fdf889
SHA51238e10c74b44f5aa00ead5b80be161703ceee32b65a8d697b627875c60d14c54dc1b3de18b2fec8964ab02db1bf29fa1a9abc07ec10c02ccd0349bd1a52b7dd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54775874e2e20cca06f5f56c3b3eaf6bb
SHA1ae407c153e6f94b847ec023e8e28073fce0ecd12
SHA2566ce9524b5cc39ebd269e8ea7f4c6bfa1cdc73b9f7adab3b4ed788cc1741002a5
SHA512ff0bc0e1c481b31041dcc429d6d278337067f2ccb0d2931f3b6f23d34595e69478d34861e8216d17772665f478ec2cbb1dc70b530c246c125ebfaaadd50d1433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb68e0745b6a37b2cd12e00483d5950
SHA1b86983942bfc06b52a601472fb884f6deaf73352
SHA256a2c2c4bd8f8dd54cf4d93a35e91a71fddc364f4139e84fa961e2c114156c52dc
SHA51256ddc04ec8c7a6995f8806f9e5451bd50715febf46305e53b50bbe8f9fd3405e6c85976e221e1243326bfdbfd7d2840894d73864bf503136da7c255f0f2f7e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ada216b56d02dfe2bd2b32d9f4f1d8b
SHA19a105317257e8a4e26d7f392ebc215c4994c2921
SHA25630e822e0f0180c6eb63b2a1651034afdb94840304ba8357557acab9b4bef9966
SHA5127f9aff7026b8866053a5102327a8a45b15a9e9acdfd3a910e41dfc982056fb4470d6246ce8335c33d3ab489cc5a90c392d2ae29107968369553ce32fea6de092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55861b428118b2340ac80e123ebaedae3
SHA14a800471e5a726fe5103717ffbfb3942f6dafae0
SHA25670d26e2089849f35f4ad26f40f3e83156ef7cfd8cedd74a66c61abfacc520776
SHA512fd92c769e9b79a6bdf1eb3241e4f53e386dd655913748021084778797dc15be2ecbf34b09cf2831cb5c98ffeea694efc1d2a1645a5bb94dee59d74fadd60b23b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a