Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
693c9287505173e9b19caacf7b9f978a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693c9287505173e9b19caacf7b9f978a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
693c9287505173e9b19caacf7b9f978a_JaffaCakes118.html
-
Size
13KB
-
MD5
693c9287505173e9b19caacf7b9f978a
-
SHA1
c885f2b2a662f5e2dbf3ec4ef43c03348fdbb02a
-
SHA256
112404e2b000a9c7b651d5f4e85d59ff904b727fd113df2708866a89074aaf5c
-
SHA512
5ad1a3efdb62f7d0f6073d6a013e40919674f000ac181129e2814ceb324f342f4e2e1d3988a56ebc9f8120327997815cdded4b6343312a5ecae912db293c5c4a
-
SSDEEP
192:ZUBLMptMsc+G95Hd35uypOwlnLTMdQ8zeblwp8YO7MANckryEzPSt9Rl3rOiz55K:Zj6vfDJDJpQvwMANcdPsN
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422588261" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0582793adacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008959661d79c7dfcf45c431ef4e52eec2d5d0fa7ea22925bd7a390a89d659bb72000000000e80000000020000200000003a33a3e4c55df34c392b5c2a06b33ce08b079b19a9f8b7307f439c33512005db9000000052a388196f8d6334872ec15851534774e7ac8483f5e8217c2fb6502e063b63c1fefc9005ee985527e6a4a69b4c58b77f718dfa9124b7263a812fd5901ae1a85e214a96155bb3a42f8341b15a208e69c85c041db609c70d15499ba4a807827040baa53a814a7858e4fffb4872da94a2187b8e12c74bd898cf5397b4d51411f70fd965a91648c6864d174db488ae909c43400000007a95f4416a95d8cc0989fbb320c856a44f6a40eed67b1288e4266fa0cf962169c7d2176e784752944ba7f817d24c98afe8ab453feeb18feea712df03e5eb013a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008e781c0819a0e6fe29ceca21df95d03af181021eb2a155f27fe0043b565b3d17000000000e80000000020000200000003775ef166bfb6321abd53443df338493886573244bbee38fa5c65cce827ca47d2000000046c40bbad63c273f596f645211e1c1fa9db9adbea2ab7b4ac6cad9b03e66ccc340000000997edc9d5782a3a4cf7ef8424360bb28a18d7fcd2fee875ac725d2d7fd3c22c4b18c8e9cf1f5f3c5dec25fb857207897a5f5a51724069bd8cfdad66b5df88994 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B216B7D1-18A0-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2372 iexplore.exe 2372 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2372 wrote to memory of 1912 2372 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 1912 2372 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 1912 2372 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 1912 2372 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\693c9287505173e9b19caacf7b9f978a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d9de586e9bc16eda65f03e38be2ce4
SHA12798cf4357aa935d4d97fd9ad4e57ed3fab53f65
SHA256cedef53be2ae7de42ca63cc30dbbd2a26576d80e8fda3b2ca0d4f56bd78ea0ba
SHA512ae579aea2005996e540a359d4b456910ab1e8fa2e3be36263ffd68c392804c06be4778c09afbadc846f69e7cb2fb4ff31a28606696047dd338682f638ae85eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcb1647b148d4116c5b506a6bdd0cfea
SHA1affd1d28b61cdcce3516e28ccd9f830d596ab134
SHA2564602d7d4c8be0fedc83ebc41a507216431b82ef3ff6a180dfd026dff3559bc8d
SHA512825ccfd89c26873d16b816fed71fc4f21ef3ac3b88c0aa8fbdd5640ec8c00cb23a451842ae449d8297cf468ade86c7d0413e0afe6a096caad850163f4fa303a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b30b0ba84f6d75f3b3709ed3822dc1
SHA19a6a563a65c4e66019760a2a97d7b82612ea1c92
SHA256077f1d2611011c35944ac49b7a1700eb5604889d7f62b9181a238b87a010bf45
SHA512914652db7963a924deb772859b7902c32012932a8ce02fab61ed1b54416cf3f4be7f557370cab5919380abb90cc728afd3a2647566444af42c66dcfb6a7b91ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9fa9714b8c6fc1ee2c5be9854ae4ea
SHA1ee13235ffac0e787bc887e44ee1e32c2b717766a
SHA256e7d5a4fffc5010bccf32b8cda05e76035b38ee3f883d1bb144de510bd6e1bcd7
SHA5120f17c6b79a2592f78faba520b0f30e32e3f8974a0431eae058c5eaddee1a7c75ae050da428357bd09a01c5de4de5894ab4fe0cdc83d6e209cde0179c4dec5826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dda6a0f940fff18ee66477055bbd9fa
SHA1988a18edf820efba52eb12b9322ad7173f482991
SHA2563eca7bd96416c5dbd9aa07891d152ed4bf67a5b0bd47e4303ef8c36bb5bdb304
SHA5120ce5e3b96ab2d8c9f807c39b72364c6e18b6f8173b8d81577d0ec70477339d2758966ae08a032cadcb1a1288c48d63d4de498e83c344508e96b9804e47b50a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caf48a43023ff1b187cde2db92eb0b78
SHA11f9b7f97898f6c2fe49ecceffba5b80fd650ce6d
SHA2562c7ebb3d9791161e03686ffb69829651ba8260416c32529becb13750dffa4cf1
SHA512ddc0ba947547c17a9a984efa8ad09368b7963eeb2264e1f87825bf7576796595de310bdeb98766328b94fc26dafe1c9522d1866d3b780e085725ea5615919c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51887aa5bdda5214f96891ae10d11d918
SHA110651a661cb7320cb6e92ea231ad2cd7e3dbe5c9
SHA256738d66aa4d0974223ffc62c74c7f8974afc4ac60b67d3cf2691b74fd58799f3a
SHA5126854cd533b7c2d21cdf576f1f5ef739c5cb5dc51746778dcad82b0cc511d184a787546c51a2cb5b673d16e6b963b93f006b29aaf2cb71e1080d7e2d9a7c1d964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf4d4b6602b6f38212c7449b5103ce0a
SHA1ade6b3546f470c43f983dc57f0b2911c19eba47a
SHA256b8a8cac9b1410bf47382155f48219bf3c4b2e1fb44eab4ad00678bf0a807a96a
SHA5122d522643299979a624cb72eda932b46598f33d8350d8cdfd33e5d77517ac7566aec7ca4a9d0f1b79b636eaf5c177333765c0a4349caf1b9d3d1076738ee55a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5210010fcaa84dd1916c233255d23d1aa
SHA1985ae5f4bc641a2a69ceee1f3006191ffaa12f70
SHA2567337e0e8d55dcf087e0176ecbb0b5762b1a74f0918746e3c65f394530dba45c8
SHA512d25a04dba210412a6bfdbc5c3559dfbebb6f8e016964b6a539ab79cd6ea701a71ac97e4ed58af039cace2e0bbec29a8c45ee3500df14d2ec226d30df1331f03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ca5a6dd95feac11c0f7daf2a609ce01
SHA112913bff655add8fffaf852c36a2a2d310f2861c
SHA256e1f08ee5bc8c21c7d927ce967dd075ae07176eae04576459b3fd88e1e96a55f0
SHA512ff5b0ad1d106fae3e760f0bb4e3ee1fec0616a70df29b6bba857f72b8fca6437b79f006c5c4a867bbe81ec850b27f06dc737992e1ac707904d5f88eafee730b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59078660d632124473fa449591a12643b
SHA16397420a94e9c2d621b7972a7318dab88f92c65f
SHA2564cae20fd7c472563ed5dd0a194e52d22938189de9d9ef0bdcb0cc0d0be57de0b
SHA512e79a5fbe9c2dfa77f332ea8b408ebf865592123a3c348441a81db8ad047810fba98f476c25d3aa1394f8108718e547c33a238b4b1ca1d4d5865078141c6796a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505f7326bcecdfbcb3145cca9831cc8f3
SHA1023814d7256e2937734549191e05f5279a8159ba
SHA25634d134821bc0fcf352be64803fc0219e3cf10d6f13191c866dbe3049589ea513
SHA512fcf6af8f7eef25781a1f6bb69e48bddb0bee589e67d293c9430e99307931a413942394cd10a9a5bed6087161edf15b18db8df3073f74a9341f81a801aa64b6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099e66f1474cd0d7f43ddf4675a43ef2
SHA10fddbe8d20f6d77a5c21bbf51bfddc16867e4b5c
SHA25658773d24201ac6de51c81bd9941cca7c1c9f08958ae0e4a3150e036a412a3253
SHA512489a4eaa45bc59a4b8a2744238682341a149afa61ec77aaa67cf0da4fad6d1a001ef05887e7ea49538286dfca7189babec6e4c7f36791dc55cd7bd51e4bffdc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506bc028093c7f4b63887e4a348144885
SHA13f60e93d606012e3a92fb5cdd2b12abe00505ef6
SHA256cc3fa5662315767186115579eb374ff72dc38ab77ff366a9b1f8a93e072fce42
SHA512250df698b61ba574029c24a8bf7273a990dea8d131b968908986eb5e02723103dce28d7e635fc1d7bed79b55b997ed9593807f5efdb55bacda49c752824637b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3c805e5f59760ebcc08d97dbba1e10
SHA1c8a8991f22e169044c4b014a1013a913393bd787
SHA256ade17795b9be74aa2fc4d94d6e417bfaa7b94109af28b4dde796aa457fb985f7
SHA512cfc03ecec494da50d90252f88629f9971f231609d299edcc6da836f288615dd845d2012e357b8b61b5ae3626701e834c1c8f2957b9cad25196938e50d38dddc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc816389631b127115b09d98f276799
SHA1162e26ba5e7e258e73c635c014779d8784d96b06
SHA2560fdf3abab168300f0ea66d45c3122e5e47d59a5ce1743594646a744c49175f89
SHA512292399fc19cf9fe224eb8ce1e1e89e43d4bc27cd4edf6963b8a87c93cbfd982a5df648c1a7c2ced7dd9230935fb8b28770bc2d375f50a3937fa63da750020942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f8573d7d3d1d0e7c81a80a2180a5ae3
SHA114b38dcc2c387a106b58b1762d16a2aea82b57ed
SHA25624d6c01a5d4f001205553c01378253402e8ada27abafb7c85ea44ccff8f141d5
SHA5121db5e7770c40fc9060e42650a86580828203648c4b8716bf44bb0daaab53743697ef0c70c09479009001625f168859c54063c77a63c803dfea3fc1d5988d5620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52062e0b25cddce59786a6a829d766627
SHA1fe50a8f6a4f9d6b6f8efdf659aeb220a90006f2a
SHA256706843625e08907d0425f3e2fc99987a28d11313b74a2a6f2a1bfbaf127cee24
SHA51224c6a5207f9803dce1f4aecd0934a9c004a6576699ebf54eca9859acf8c5c751ce46d8443a9983b4d9cdcffafad49a3dfe0b9f5fbf40a92e24759731526b9f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a25f857aec1f7a660bb3e034a36c93e
SHA1030b7ddfc491511b4c4a38d0ea3f905e02e876d3
SHA256dc861f79badaf4f051eaf3310d844e84ad60e10d527d49cbb6ec4330217d61b8
SHA512523391f438dc9ee55e0cb9e89d93505e35ba5b8d5a5304ba4ebf2e1c21569a6c993fca38d962569e20c5a79c0f99844389a556ff1bec18c452aac2b25adc4128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c04b52a9b54e1e441ca8d5340cc79ccb
SHA123d69d5f3929ba4f1be7ece6daaa9a6f63ecef8e
SHA256b660aefea5edeae6c3e841f45c9e758f97ec421b0c79e27a17965a2c80891e37
SHA51205b35e58b4edb142335de2681c98e5cad623bd379127e608b53ae2f97f0e878caa0c9d912be4bbb42c7d3e6810e3e38695405a0051a3370edf200e10c5f4868b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a