Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
69424cb3df450827b0df56e9c7aa838d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69424cb3df450827b0df56e9c7aa838d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69424cb3df450827b0df56e9c7aa838d_JaffaCakes118.html
-
Size
194KB
-
MD5
69424cb3df450827b0df56e9c7aa838d
-
SHA1
50584582964cc48dfd829e930c3f354fa93dd2bf
-
SHA256
68b93136824b8e9792900f0d9206e7de80682097c60b0a31be98191e964d45a4
-
SHA512
081768a41a24ef1f3c8ecd3f3ed4300b5475a7077b1dde3efc616d395d922ed89588eda30eb81b8253eb3ce0dda9165aedffdf4422b8dd176c78e0b61ed574f6
-
SSDEEP
3072:QyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:NsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422588890" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c90ac1d278eea02bb1e65afe5d17284963059608a63ad3beed86efb34b529ff4000000000e800000000200002000000085ffbb076fe026c76ecfc6b3f85be958543ca0e8f196fc2c72f611cc1c73cf6b900000006b984a00fe167b378051c19fa91cb2630b793a7b318dfe66a3bbc81e13bd00fd0748cbe05e389069fab4e01be23c10f360cc0752b39230f8c6d3b73b446e949b315127aeb59943b00f6aa0d3db538a274f0c56f0e64f2313458f6d4d2dcebf3029eee565f14e8323710588f1a072b9ba4f1b4a937db3a12ccfff8b8f9e70eca96fcdad5aa60b9d8200115fa931baa0804000000005961c34835496f1d344e36521debb62bf6a79cd52b9145c6545ef655689caa47e67761fe062172f414bb8e1c360d3d0e6dcfd91985d5a82ca2c5e38e03414d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00829feaeacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{299B7061-18A2-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000284fb13acc53e2a33dfb894542aed652100f19b7ae484d6f9f853c6f0eaeffca000000000e8000000002000020000000309cb338ed8048a3d65b1a6524f5a4208a24def0765e95660522c5c8b34fd53f20000000fc897e88f0e3d4970c4d21baa0af09298306ba41352b881e1700a08959190c7e400000009f4858b08117e7502405f7082dfa52fb9c114b2ea3fb2ba5b4bb8eba6019a817a51e8814a807d2b342fddb99136de8467e2eb2938fbfba08840e0d8a0cc57f43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1424 iexplore.exe 1424 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1424 wrote to memory of 2976 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 2976 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 2976 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 2976 1424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69424cb3df450827b0df56e9c7aa838d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59287fae387446020bc5f1399e68cb482
SHA11b1dae323587b0ad8b948bc5eebbe4a8aff791a0
SHA256605f7116fb03123bfc4cab5130fe2c72b10fbdf53d6951aeb1405c87e09851b2
SHA5128321b9379b869aacf7970d0008c95a6f63eb0104332863c2b268f1feb5632720178f81a5c83e28949846509d8960ea21fd6e66446c01d2db8a6a9a3e64e5b0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597a350cb6c68f6765dd0b26d3f1a1996
SHA19c9f3a78d725ca42ddaa0117cc52d60432fc4af3
SHA2568cf732e2fa457f01c40b876dd308513e35daa10de62d5292ceac8778727080aa
SHA512e72dbc6e0594604645aed6a700eb9d470f6f4820e5881fe2f88f72823fcbf305213794a354eba7535a6a71049ab24e0fbe2e8e13628fa1c6167b489163044b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cf0050390b10a44f60280eaf8a42fc1
SHA1a5fe941089cb4aec7f3d13e8d89930003a8119f2
SHA2567fed2bfa32296994d07c2914a89905e342a715ef4dcc2ceb1329b7de1df372c8
SHA512b7a29996dbef60ccc5b088d1952ad81ac7d39b12282ed2c213ba4ae8754af403224f49308f08d5a0cb61e1938b00605c82499616f4ae225b965294d667927f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706473baf0ddb210772d799e23459227
SHA1c685ad2b5725b4e0b2c9b2fbd851b50b6f276953
SHA2564031aa2fff98db728445af5e1bde12414f3cdf72cef75f66e36bb00b0f88c69a
SHA51243bcb09980adba031aa8edd67fb55b28fd27644063bc3c8543c19bac9e097bab5a7815d2c5e712f43e510656029789244960b9654ead8241f1fb2986b5f7f373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5744846615c1e2d2f9c2132dce5dd478f
SHA1caf1828fc1760d905d86aa44b3205fd5dd423655
SHA256a28a7d106b58f29a3d2ddf632c553e79312461e713a1e0e5f50c9e5985e6f299
SHA512c7eed9b8986a50b5d32e92768a5c86510168e119687ee20bb6f477105f03c7c7b5e11f1ccb6a704c95f91a2f84f7ca9b6cfc8236af550b0739c51b65f27480c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f2c01093e63ae76b95b67f7420dff04
SHA14ebc26ad48ca0a16352287999f0cc260006399d3
SHA2563268170f432f57e74088b9a3c199b796915287fb19ddc69dea69942c77846581
SHA5123a0d6da10aba3a32a845c96152a712b770d5012190bf70ccff59e87ccf36ab9626803017d074e3e4b07c6be4ba0f8ed1832ea06f13f902080f4946b7d2e66de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fd3e0adc1c3b954e2e4af635de937f
SHA104ab64bffb2bf705c467fe1c172c7e960c321011
SHA256d063fbb160e049094fb7fc0b5f90fef05c2223204ac525ec083bca1a8877a9e1
SHA5128a8677238e0252d497e8536465f71b81d7d8fee14b20577f9f6a2708481b3ec0bee513add8d950d66dee7c9ded8cee6c00923f3f0192c439bb6caa17b38ceb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535503df7beed82922bdee1cd91fa69a2
SHA132d6da2f869ab52cebcb7a5be26adf0a94a82a0d
SHA256b7e74649b316a97cb640fd48bd2c0a3c76f7d537b65ae3557b52c77fd27d58b8
SHA512fb83c3a16c65689dc054baccfc1f19986104df507c242677ef45e2a4cc63197e8c8be958d7313d089206609b62d07d1b79ecf73da64a3376ea25e37fed1b33db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be187f2a5857032f3efb53f4840aebf4
SHA1c972dd7e0b35fb6258975a9ec381b3d4c7b5fdd2
SHA2561a5c9ecfef940e03bf40f684bdbd696427d1b0632b5592c6c96fe7f26b2b0b3d
SHA5127e8765d4804197fada9f89a58f0970be8ae19f42816aad1ed77aa84ae61280dfe5b60cbdb766eb88c2416293134b4b8a82051c3be5ea6500cc7bce41b3ac760a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50decd9e41fb86feebf4421436b98d8
SHA1684d8625fbe8c36a89bb2b31e65a8b4768d66566
SHA256538bca0fe704a433dfca3819c1ffabc8de5d0b82c16742efeaed54c3848a60cd
SHA5129ec9cc6f8b49638f0b949f378af64c52a230be9e5a62feacdb14b1b271e02d0ae7d24206cda4f5deb26676f9cff179766a5fe631a8b6dc5d0b6fa095ae16de94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54378371711a3c5c4341d5500b7fea4c6
SHA13d35140932959acb17958c6b88c5cfed4264cfeb
SHA256d2cb744de8a3f9a186e96aeddba7109a839a09f0902f8921ab7548dca005c915
SHA512a54dd6d055383d6cb6078dad04dec012216b97d46a9a6200a02d766e256b58d461ec7f9563ac7f96d8cdf0535f5d7318f60f3599dc72664843814ec7e6e93d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399d8dd8b65451ff3ee2d03196893a0a
SHA12a0994eaabf558a7e08fd7d88cd7310cb5394494
SHA256b0c20768be758e89b0d688bceeffe5f13e7962ae953ea2585e220223b0074be5
SHA5122d8c4e55600b8d4718606baacde8d4b191faad3945f5eaffc766506f50de1d179de0c6560a45634626ffd26b1931af920a4fb8b660cec7d3e27afe37a999d1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381f61380728e5e3df9b8b30c2d7412c
SHA1b9b1961c092537a4af44d39cc981aefb05259c6f
SHA256b470dde964c4b8c9b08b34573311402877058a83b47fef4f8a2a0dc1d8e5ced4
SHA5127078c5a3ab706551899ebf8b0ca33702718d14cccc3468acd6af744319d0af652ab122b8f0a9d0d00f20328a5b8c470ca640008f0053bdd6c38777c51c54c23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9c1d2064c5062fbd2e52ebb8ad3869
SHA1a573bf18d0d7bda747ec19616a03e64668d00164
SHA256afb73d062796132723c1e967a8b396fabe997bf87980aa0dae5ac94e41928505
SHA5124371abb987fa5e99867832e87890df87c0598644fc3ee5a2f17106ef6e280629a57c4917220c31256f3321903a2cae481def8dfc492a86268664405a469f0bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac81ec4a8b1dc39dd7c759eede9595f5
SHA1669fcb72d211abba0e05266a189d24e889062ea5
SHA2560d840c81a7513443d584f079465d4d8d3499b16873eec3c8c7e97f23333b3761
SHA51219fc0b28f756e6e6243384b6c36290d602424902eec94614ea34dadb27997e3a82728034abea2dd2d28bd0633119d0f2a983fd6a5da96f277d6fa56aecc1f917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a81a9c77528dadfb1e8aa8bd4da887ef
SHA13bd6744f4a94c7550da690bf51218c0e4aa10eb5
SHA256cc2bcd33dcf222f91a1de2f17290d7ab2052edf5d411c67e7b61df381f650c22
SHA512b1b78afce3691d2eb8719900ab5c14638336b6dd6877f0f44a0f0f3bb978114d01254d2df8f0049926aec85bb8eb2369904f448eb8fd8387c097da5bef611cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc2cc73b282b573fe40532a6f572912a
SHA13b40ab05a694678920e81e005ee932d08095a27a
SHA256f4f3dd0b107ff3093f6be37659227e7c1369c0082e35ff47a85e77e54d8f6654
SHA512c9d288ed9363f158e180ff4457a86d77ed18bc25403981d174b4dc5cdb22ee891df91cbf2056c5eae40be63ffba7d2987711e5bed8e08eb88b1e160d2cc544bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538fbb86d1570ac4196510001a763ec01
SHA197b2210454834f02e3a4c076c09903f0c566b053
SHA2563e469ebca918b6a3ed183d0008ed762e197fe96c46584c12fb5b2dc81c456e53
SHA512ddbc20c58aaf700f15feadac038d92ff3e35daf6ebaf785c3b71a973d80168b630dd5da18f73caa006fcdd4fac337f6e26c821a09f4e1495918ce95b9c3bfe26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6483daeea3398d9544add94bd0ae15
SHA1907159fb31a3e0fd074cf1a52ce2d7c423d57e7b
SHA2567be43c1200275958572f09139ff4b4b3a0bc6f03974f2dba493e3490e2d47f94
SHA51262a8cfc0bbd4016cec3f1f3ccfbeb55e83b69d23106ec3a27bcabbe718d3b4ef75d62cc6a93c2133b938774f6f34f7f12c43c12d9eae273f85652d99a44006d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4768f4ce8586069e9752be89c9afa8c
SHA14d89fb5be41ee48ad33f8389a2a96177ef2c6a0b
SHA2564edb59f59b71e7d18b06b8aa8b5cc18b1f695d182bc3bc7ef9dc7777f0200a46
SHA51223d7c8b03e85881d9e20520e25e5a3ba11784071157b6ad8efa4b4c8b67ab318d5659998530b0db37fcd0509b5050059a751cf3b6251b2daae1b6894c076a8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50148e6fa5485ba31405aeb985d3e048d
SHA18d0c3345112da4c8939b717b8cd4b7ee79aa2ef3
SHA256c53127797384620bc8a4493b328e0b8f75a1e7eec53cd2240d79b501891b3217
SHA512ba42f4e44d8121f957ec6506a610d21017a56b6eb296172d06c20a5c6896fb2475b4223a3233a6c3ca4f8c8df32743fb73d40455f90a287d859c06d9d5a45b9c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a