Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html
-
Size
4KB
-
MD5
740e0c7fe58453fdf5d5ad2b0c962fcf
-
SHA1
0ef1de9bcdbd2a2e47fdeaba9412f4dbebd4eb20
-
SHA256
52c27951e5d3604c3eeb42d56c606a734eb75b3e828eb5c3c9c9c2adc5628a51
-
SHA512
7f7ccb1b9e03d9ddbcf31b5be957789ba3ccfe49466e824dd4e459b6244b30f558b71186a0497ee648b1e04765401253d0567e85f58c1c1292d414e65cb44326
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oM2BqBd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a663b5409f437507b43116904e76e19f0c69c33e71b15b62156dcaa8ab0a6dad000000000e800000000200002000000049f1461502ab21246b603c83492ab9ff175f915d230365ba54cce0ed38e1e48e200000009a22f83b07a9333a2f63d775e71f23536de7eddc5f8b8dd438397c21c7153291400000002d2a0f28063aad21fddddfe025b03b5727242493d37083eee411848f7e0c0a745f76017574c21d1880ae361fc432ea7f14f570a6bc0734e6e74eb1adb42e7ac4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005cf3e3a5c0cbcefb4020624c3e75e42d3be860b1ae6de5de8caa2320d1db9992000000000e800000000200002000000009acd78cb210bb4f6329a78c472e5882662875474f7357e67d8aa23f7a6fdced90000000a19aafdf317b9379bae2a5fe0219655e24b84ea0c30f08eb1708aeb293677dad6c27b1eaca55afc6e11f1dc3fa6b55043223b59bfa0f4d7df9eed2d067f37493102246ee4e6cfb64567c2d595ccda0fd7fe6445836ddbaabc854c4d73fc57e94445ee96e3471fd6b414cc241e315ebe26ed82eab0451e16040a85d467509c26954b6f939b859a09565d5a52201b45b0b40000000d4696943def3afb694659a4bde503c94c3cbf4c64020fe8c14c05f63c9b74949b2a8f47b14b74d1b9e21d50626aae20efe010076c0a79580dadff395b74a089c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207c429514afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422852425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0B23441-1B07-11EF-B0DE-E64BF8A7A69F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2120 1932 iexplore.exe 28 PID 1932 wrote to memory of 2120 1932 iexplore.exe 28 PID 1932 wrote to memory of 2120 1932 iexplore.exe 28 PID 1932 wrote to memory of 2120 1932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\740e0c7fe58453fdf5d5ad2b0c962fcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591bbba1a2dc24c70d7bbcf5fdd98e0bd
SHA1975653d256558fcc803b9e033391f6720ec8471c
SHA256a77ceb384d82a6be8e591751505caf8638d9a04b006989d787c2e1e4d220122d
SHA51240ca652313b084c96b1b470782a932536a92f793f3d8156cab1342a5997c55ef643bdf203b954acb164110fd7c5ae8406359ec43f7ee817b10070e69ec320c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a82edca9863b6609099e673c7cac01a
SHA1292ed636d69158b06461e3b588c709b6c0ee8213
SHA25636bcf467488e84c047f71b6b45e4457b96a96412d8528bca790b17fbbd1ed561
SHA5121b38654200e77b685d71591fc6496503ad6840fd147fb8db3e02f971aade24585744312c27da3ef3304a531fad1dabbaaec99e790ec7d75e2e00c7cbf9b950cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a075dfee9a09ee9be490efad804cc10d
SHA13f3b343e70199e3ac0a1429197ceacd240833b38
SHA256bc7ca61b3ae05850bf17298ff0c011bc93b6b57717613bae89db03d1759cbfe6
SHA51228ab297f4aef262340cde2c073ebec94f61bb8e8e3e8a9834e4743b18690ca928b6a292f2e4d08498ee8393557f9d86174aef12a03b3749717c04ee99832b18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af4145c4ceb31d07657f56d1df55ba3c
SHA1b42235cdfab8800e0e34b22fa8a9c83c0f3aeef1
SHA256bb62466d93c0394b7ec47d57c87d7ba649714f478e08f94802ae1f403fcc120e
SHA5122ab9cfe583ce03981a1623669263eb13fb8176f15d16284a4a28d54b150c5ba45e5a265afd8ca32f74a3cc18c4efc80b5799ade5f3600b4be56b58eb7518421f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f04615a0d758a96ac83fd4b64ab66a1
SHA138c56d7b97c749f6d784ccaccbbdcb0657352720
SHA2569bf68985608e3461610bbe6a5bb75f471162248bde9863dbfc432226b2cfb1ca
SHA512506f950653cffa60ff8d4d3d7f1cf47b7794f33d19dac35956d92b60d9b4cfe7319e12e4be9bff1a49eba9ab033e077325ff5e2c2e9606567feed2b7dbbde19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b94b7bddb4e7cf4572371f1ae197e06d
SHA18e7081ac5d1edff8fd522b35ab76c99b80af4f24
SHA256f2a42a07efd42a73a01d4f6de7c774ea551cae96d3800a8cd1643f6c14e0bedc
SHA5126cfdf458205d222d3b398c04afbbfddbc9f03c8d481702881799b5a2f7fca3dd9f6c3a4ae8516c58f8e2a54fedf5c20e7bb5772d9b722f23bd2a90b76471d523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a7ec8c495cbb7451d6917d73a6cadb
SHA1bc82e76be47a16569ede41c1e232c1e9c340dfa3
SHA256b9a63cd74e66c598218d25e7b7ca8aebd9b8b7d241833ca617b02adf78aaecb5
SHA51272876c8a14299477fde6191a5dba7b368ecfffcb26a56a6f0b121a61f702ffe42da93b7ae33fe3bc57175bffeb56744596aa40416451bdda80bf8361cb1220cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55388dfb9b61767c66a2c33103a3d3a30
SHA10bf9a770f32b8469b8662ae591f7a89ba9323a5d
SHA2565c10985794327e7d54fb52c4e77ccb945b50596ac6ecceff89f5917b9f9f1d00
SHA5129c124529bf896c6868b23fd99e183e88c9157cdeeb23cec92401bf30907848f6d370c7e4f608e461b56048d3b9bb33e3f5cbcbb039edee6608ddd4e42189169d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58055b86c98938452a9eb03a45f4b304f
SHA1e736fa631b5bd3a5cd079c98db4516be80274ac9
SHA256420825fbeb97bc357ace0dbf4ce25c5253cc417e9841f1d6c2ab77fd925fd283
SHA512f5e922cab892456ce35a327057375fb25248bc4c915c318a5a9ee36819a27a1c8f9720fbc7a09f33b4bb62926cf3083db56908babfe413fb89980e76528c5304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d2df40cb8461dec97486b785bf48199
SHA1bc6cc4d9c0fcbd16fe666c8b4e827159759c9838
SHA256123f9785023a76bbd1ca0371804e6b0753a8ee0bb969b2448916ba44bd11eefc
SHA51211508a32da1fc29335ad8698e0b30bce89daea76fcebacbae2f3d3f4051da7aba103d5dde18002cea2226d3b6e0761b3d9073e847ac30fb5be12c187b51bbf9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df1b0ffab764580ce1b69c871eabf5c3
SHA177a13edacfc06daa54eaffaf1b0c08b6c5900ed7
SHA25641570390609458d50e22ea55397614418de379a4a1abd6d533f6981215c3d3c8
SHA512fcc2e48b133fb24cb4c773cd978bc502f54920af3c56bba7bcb31f37d4ca0eb23e5f122e48d0440a51d3133d25e643bbf60491f801399d9a39b88cb59144b017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ee4d3ee3e24eef048184031ff7444c7
SHA15696dbff18f8152b6cb3ddf784ab9e7871c4694c
SHA256ff3c6a860b60b79a8cd19831231620580fc679102389c21454995d13afd028d1
SHA512a535eeac04efcec4c05fe83a3bea0f8193f3948574175d2b7668dcd504c8e16e6ddd5a03775d0efa36203115062f3d8470b7b7dbe7b365c96b4d14995279b7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5899da867fa9a40adff73a00af3d55
SHA145e8ca70dcfcfd8e047ed5b601b543067be8a58c
SHA2564efbde2ab1570ee84b29e5e1497a065201bdc62bc1fd4d1d5cc4d655ed25b8da
SHA5127a0a049577d416d4eeeee546909e052806e739aed4d699dc63c533e7d818dfd405978593add253f6b44f5f1e7986d232112f1d50641838ddefdd4f0deee1e980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cbfcbf1a1c9ccbbb9a4809baf5fc6f0
SHA1b4029b5efa14046d229cab54507bae20a37d7815
SHA256e37cb0635c9e6bcfabb6cb87bf55427ff2584c51c4dbb38656ad88908d78afc7
SHA51247b5cee9d89099ef9ab9ad7313667deddf69ab6be7b6df9efc000ebf86661b24f87a1751e84ee62e7d2b73d7e9e3e9cc1e18979fcd2821e19d32c96aeec7c452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580547eb2db7a5df1ade58484c5611973
SHA1d7333614e288278a219d27ce0230391411c55f38
SHA256288296ec4af117ef0463b633a8980e1eb9e61cdf89568bce86e7eb4683ef95de
SHA512cbfbf9e1a8e3fa5d936672bec2620a0dff8859d4655a5518ade985784a29f46c03157b567f2e47e6a55e7cb458f44e44a6ed0b327ce135ea7205fc527e36a43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75b7b9b6436909c5635a47417ca3176
SHA1a3b6cea36fa16e8515fd0e77d387d3bb706270f2
SHA25644ac45c26b99035593ae1e35ea7c38d113341860122284cdcdf734d97dd69905
SHA512331a2007b2583c8d26a18b6fa73855c7b427ff052fe72abd53be944851f207f189df12601c2138d626291a5398f868d1026c02921e139204b27986bcde0ab9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc9a73b1654f38020cc532cca42ded8
SHA13d8c811a96e6b3bf868bdef1e166d9d3980c4276
SHA2560c2c6fae8bba249cdd98bc28db6d98d0257d3a350ec5ea9140573f8f79e190a2
SHA5128cb812f311b4ce4a4a15fa530cb426badd53e61ca9f70171bcc8201f6cec0b8dd55b085df274429464baa6ac12d5f6eda6b15e74a335378613e0d0836c9d0ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd4244a437acc0ae61c8f4cc7030431
SHA1cbf0bfc65646ff4d3145e9b5876c06da5b7392ba
SHA256c06a606b87fa73d76d540eb3bf682be401a26cc534138423d595e71683b4ab62
SHA51297cec338be77ac1d7f8e2713de90f79b5418194e66e1ccf5e233902cf6eec38dbdc48584cb5b4f4bb6f8f1e57df63bf2cdb3a0a6425f4169bbf337bfed89000c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d9aa4dfbdff3fead56e349c86ad11f0
SHA1fa7ff3ae9799f3dde8c762c26a1ad5eb905b5cc6
SHA2567a34665a4d0d63f9465502ca7014cbea25420fd00c9cec484b13e2a0ac1fb76d
SHA51250a40a8986ee7943b410def0396d89ba119e0edb0bd05570287a89a622f329e3fa1b27303ce45d3d11030328a1be064aa63a99ebbaec10aca47e55c46d1237a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552ab5015610fe27bdfe0286a9d0f0b7
SHA115ac7e834b5395b972d0c2d4d90237113a2dfb46
SHA256bc82db989ca4c8bd9f76d09bb246909bcad1b5e17cf7b908b78bd015c0f6c4d7
SHA51240a74c03d5e8a01585a225cfa94a9bb3f311bebb699b259ba80c0fdfc25f87099f8283a9aa6a4f65255e4b861b08d944d22fed9ea0f340ee5603a8519e161440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2dc13c747a2894d49930d015edba21f
SHA1c0e5c41b356555b54095fd9ed2144e72e6962488
SHA256372581c615c5ed6f1135d95b4c41632d5688c57c803083376b0aba2a204e0316
SHA5122ba9aa10b524e339d292e4fe8720d6c0a8dec5314f1e3b8e406d5962c0cf33c6e23c72831bb32135da297bf4140ece8f364a21affc2beb0f68c0f18bcf9d07ab
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a