Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
7584e35d28e979a134cfefa771b02fbb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7584e35d28e979a134cfefa771b02fbb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7584e35d28e979a134cfefa771b02fbb_JaffaCakes118.html
-
Size
3KB
-
MD5
7584e35d28e979a134cfefa771b02fbb
-
SHA1
5d2f5dcded5ae5b6cb5abfff157682263fc61de3
-
SHA256
e4edf0ea8826f6fd4e1d0dc44f5907bea726acfee764702330921876062aa665
-
SHA512
094e4b18af705570608bbbc636906c7a6726cda9ddf8f13a761d971f1ed07c596ad8569902f778d83a44fdc31e00e8ac2dac9c792d7161162d407dc47e2f927f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bb5d3172afda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422892630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CBF9141-1B65-11EF-AB84-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000007090de977494aab3a6e301a0c692e61e22c9ba11c925952db84f2b90a95e1ddb000000000e8000000002000020000000435f126427de3cda3ca7202f903785c1f123532d16585f4862f5bd2dbf088fa12000000047f69d3852b9eb8e34e9489fca628f1455e2a7c895aa08c39433d2d59267805940000000e6e99b260d1cdc56a9ba94f5cd0cf6418b61b8d53e6a354d173f66bca0c349664376bb80f077371ad745c58efad4f5a294a0ec709a844c262fef6d9afa1d8b25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000535b8801c9d4942fdd6b2a44395faa67ed28abcf779ae649e8502da87df0274d000000000e8000000002000020000000d9108384101d545db637d9a87449c5a1c903b58a1826007597c4569926ebb12d9000000018b0b4f5121e3a3aea6ff36f7cdfcba6811ffef5ee657f474e8401f8704465c0a7a5870bd754b7181a4dc94f67e45c457e082e3d5ad8c7fede8e3b875aa4813568efb5444fa49db4334818cb427f1e74dcc00d12a43f621fab4714e00c2e215037a71f735da54aed8812f8f4752ae2a25069d39bb3c3bfe6624cdbee5e8a4c9c433b27b12eb0067a7d5dcc224ee17dc44000000007437bd85ce63355a24461289c5e6cfb4f22b618925158ae18add34cbe08ee25bf4641aff268c35a6117e6ee763c34fb054116a7d5a8465a38b5df65236a61b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2168 3008 iexplore.exe 28 PID 3008 wrote to memory of 2168 3008 iexplore.exe 28 PID 3008 wrote to memory of 2168 3008 iexplore.exe 28 PID 3008 wrote to memory of 2168 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7584e35d28e979a134cfefa771b02fbb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad63bfecdaff524e8dd3c3abad4946f
SHA1799b62ccc2074bd415063b07c8c94aeee0f90f2b
SHA256f895f3e74feb9a9fa4920df44ba9120b1c51d73592bbec8ecff6c13d416697e0
SHA512c9772046ba7b9cf4103607207114a12e1d9e77b8441ee608c6763385318b4b185cf16c25e633f29cb91810873afa9b6c56591ff40c7b703394ca71899959d5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6dced570c05b27a647aca54998fbda3
SHA123a2daa10b8e9222ec120ed3c6e65fa94f60706e
SHA256a8cce6de93427cb177a19730e2ca2ff46e6b4836e739e5557da8d2fd09a637a1
SHA5126c16dff0a0a2c3580af34a27558aa1389ce0e25e83318993ebc11377804fbbb55814680db7e07718a16eb1130a5c97c5b3482d5bdaf50d5ce1a2115e778a0fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268f9bbda1f952bf991b78169c5aa21a
SHA168d3f86d1b4dd08c6548488d4cf0e34886c49a36
SHA256aa10ce9c7d8112d8650311bab32bafafe2a56324e2b538a55178fa367bf561bb
SHA51281a85da766a011b74d29c01b35566938d4c118391c8d9fbc14dbc20a1a36536fb82cf35e364bfea7258a5676862a524b220131b52f95e421d452ab1bc83b9242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15900fe4c1e2f54b5cf92f9abff547b
SHA1275fa2b704cd37ed646f43978fa2c3d5cf5989e4
SHA256e37f5978a7f232f5bee2502982f84f584397e23a62f063c903e2940e64d24b05
SHA5128918cf8d31623c436299d3817cabfd1876e387ac7dfb62185baee5809d94f588419d98c3b0d3d59b09b5e0fb03d8a048218cab6e643998e9aa8e03a48b46c96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58232f7b7ee29c734c9fa5b8326f87c55
SHA1b0625d16c2174d4e531dba5c1a04a0bebf5ec6e9
SHA256aabeb10e074ef7a14b0fdf1f0cea4b4575df94d61e6ef1b722d4355c872bbe82
SHA512aa1d02114697f30803eeb87ae78eba027f5fc64d891dc4243598e25a915a1c3ccb9460519ad75dce0b7edf87e2c86f210c3606ada641836f8c02af6e6c79c5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e2be803b9bff6b65a10784eccc1df9a
SHA1f482898b7280f1f41e1040981a85f7a00bf7917b
SHA256995d37524f658377b69905f5f775dd0095669048de078c3b1a93ca1c3ff14825
SHA51265b98d76c90c57cd0f94bf0c1bcc023ae1dc3b37e74fd5d03cc54540ded1e3f711958f497243f5ea83fc1570a9d25f32eb866dd386a504564f133db716f72a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae35b94abd42f3ab1fa678663fae0dda
SHA1eb148d2fd04c6b85a39d39317e4b71fb18cfe9db
SHA25616a15fed89969ce9d9aa45f38b1fa74085280904c2d60872b8cdb7c28cdc5910
SHA5126f3656ebc38da67c2dfa55fe398a664a397273b929fc02fea04356767345c4f9b2839f82ce6dc26d6c66e5dc54bac24fe9cb4830ae08868f78bcb7362e9583d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3a9db35d2b00ce814d6f690b773fa2
SHA1856a07187cfc87e7db629e707853e9a01795bb44
SHA2564e9dc5d1b95d9f6e6403ae1dfbe52d68939f34ad7304ad462efabd186ad24339
SHA512d8dc7f860938d2590ae50c40c0fea68a3bd923f4b8687215c00de66050281eba48a1fee78f022f15789bf313e7ae560ad77d10b2536a975d8bdce8f458e98902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e857d66f07d54d52958bea21afa86998
SHA181abe73a4b7b56fa9075916ecc4a7a388efd487b
SHA25681919e41940bfec51ec22f3dbcca27d14eca2d574b84f963d323861fd7876805
SHA5121230782f7d600e66481e8115cb9ae7327987dc033a598607811050c860f5e5cdf710710a6df5f6c08a791dcee3ce4143f971c301321999d0ef1636c540bb5b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584223f1485724d0fb61b5e71d44babe7
SHA1606257a4de38aa6ae415e019f252fa8a461186cf
SHA256064cb9f9f85efaed2784c119a33e4e2e9f2df3c378befb85440fcf88d406344a
SHA512d14a8806264598431643c0787eb8c84ce995088a653dec6f465fe147025dc23cdcba63ec0c96a58e19f4a41ccbeda02522e205574e0920faf3d08bd0ebc74f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc603685ec131cf36a3f8683c8978e9
SHA15fbb7d1d3e638ff2fdfe375761cb7119b6c4a78f
SHA256563264ebe10d8e19cfda993dc3be94e166f6147f9257bf7ffd8df4c9ba12e1be
SHA5125798fa201fda8c7a4b8d4db5dfc3cdf546251b24f6f82b7b71533dc0fc050907acf2d6946ce8ae6196bc0caf16a8cdacf0602c1c07ad5bf4949aa0791b2dcf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc1e29caea34e47ebf7a55fa17d49b4
SHA19e4e119e3d7d58f2fc5034ec22f8f2ff30a01bf4
SHA256254d2367bc09392e42261daf99c2ab79575a2e18798c132a03220d705fa2e492
SHA512e88ceed9bdefe4741b1b10774e092f7a6e3d7a9b086162e07f86609db52cb67b7a50a44cd62c3450ca66906783843a0701801338eb1dc3a65a8655cbaafaf6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cb839a58100f50a02582b9c9bd5fa8c
SHA17df9f7c929da52cdb1f8b801e62d686ac2c6d337
SHA256008477241896985722663eaed359347e0933193548a00601fc47a7a893e02756
SHA512db0de77cb2042696cfb3568ca2d07b657ef4ea6456afabafbe852eb15f2a9ec6f23d89017928820523a1f015de32601137dfdbef10452f53b63ecb32d5889bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d60e57d500e3acb0bae803c869b4b3
SHA1103dbda34474389004aa305ccc060f2b4b4f5422
SHA2564fcbc9f5453aba1fb6cc413cbde791a5e28e8f4fcf360491e496dd992284dae6
SHA51299a540af5e3b09940801f808be247aa479341075fe54d13aeed46bc571e74215eba47b4a4d0692f9e4973e9a3b08df49414af086bd2111e4a263d99a9b3b83e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4e228334f5bfc100943e121bd1e235c
SHA19ce19dce002fad948169159cc34aa37cad013cb5
SHA2566a80c9f8a016ecd2ce47e82a4dfbc9047357c460f8a31f6b70a2a7b0922f819a
SHA512b2433183c2a09e7c31c1fd42b6d20f20c3f8d604c244c34d4e601adf7db044dfb32c85cea124a31629407b62bb62c7fd9fcb8629732fffe25fa777c3a6edb1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a746c031139e6f79ac89db898438755d
SHA12d83e9cc07b1298520ac49d79bfe047c7e0c8e82
SHA256f907521f965f88466aafc3ba6f5c5bed05d85cb6fd04378237e73239f5bdbbb5
SHA5122411f8c05cf7608024b6d05c2ffdcc25a0d744714ed74a6772246f7a9af5e6038c48838a8b3f8808af3f07d9cc472a6f9f48d7c5722760e922b35bfde2e3c6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c78a0bbd85eff6c133fe075dd163e94
SHA1737a35ab71464342cf6d9a077fd48db09da8c7dd
SHA256dc8302e8cdc235fb4b27b382b2e7da629f045db78e53f2bb7e284a7cfdc0ddd9
SHA5126c358cd0b7379a473a48f264d083250e297a17ec074207e9dda440715a327bf45f0869b981bc0c413cff7a6fb873c210f9a81608f3f25a2c505ecfcb8ced1a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f7cc947a1f805d257535575fdb4db5
SHA15c2065e15d9e83040880bc10865eb954dfa071b7
SHA256fd32728969d3ba154a6b5147f0227f3d893ef7b6dbb53e7c88a27d2a3826763b
SHA5127c311094992e8d42f7f3e57a69a2613fcb951e7a4f3c91e6dcff698587b46e4b4d0d65ea7a6e0f362095539df6c7296a8d5276cd8b09e7b086e428b91b8e84d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e20178d9ca5304c093be9acdaf4cc6
SHA1dd1bd0defbf848aca3d167cce7b0c011d593d1a0
SHA25641784f0ed3c6561a6ce79110c7b4f598980a259130934f55841d83e90302bd08
SHA512c4619838f7f8ffff33e7608e63c40e6b084f709bbff5ef4c78ebd89d717c46c0565ea0548d69c387987a3bf27b39d2212842db762573b090c5e3fdcb8c9093e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e2d17a58f3191c70976586c63d8ee75
SHA1a83facb51cc514f84d937466fd8849cfb45a8aa6
SHA2564722538f7b2cd05292db96ce7eb01c54e999c64c792f326abb4f91df3a4d86f5
SHA5122fcdaa904681d147856a91d73281b1722fe8c5e21dffa2621a91c0925e490075cce5d7a99e91c2c03f5c9a455e69eac1624977a27e1057413d7dec4e72207c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc56bd2c278d6d877c76817e398e47e3
SHA15d1aa2e979e751669dd674e8ef36b3c3eb8e7f51
SHA256be809ab00afd2e1a7b1be0508684fbe8603d2753351db70207457bc0789c22d7
SHA5121f6dfcf74e9f9b56881a0026d968fa3b323ca96ac9447316b942b47fc6308b18c81739138e980fbd7962923677c602a9938397c5ecfb1f8c710317bcd25cd5a0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a