Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
7a18667808ac2375f36f43ca2686de8c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7a18667808ac2375f36f43ca2686de8c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a18667808ac2375f36f43ca2686de8c_JaffaCakes118.html
-
Size
68KB
-
MD5
7a18667808ac2375f36f43ca2686de8c
-
SHA1
354ff04958d80438ea0a32ec532d0e2d2338871f
-
SHA256
afd2c00cb47988aa73c6a7d4b5f554476ed6aacec716f7aa52a32a792c22513a
-
SHA512
500da52f6813f0c169977c42ae5b5e6b3df0bc2cb2cbf304a6045f35cc3b33849152ecc5469823cf5a04181cd821c523af38fe36fd4356ddcb151edef4a2f5ee
-
SSDEEP
768:SIrIC+CnCUCkCDCCC/CvCUCRCtCtCcCOb9cxmVKylL:SwIlyLlQNw+1iIIXixmI+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000025ac154c21c06c9ab76a0f53004d3c9ed75dc0f9a6dfcceeded8571f850b8418000000000e800000000200002000000053be3b5f12bf4ccd123378a66d0f790faa36849d595341eef9fdf8c0102711c52000000088e75afc0f0da4d4312ae62219b6c6ab98dd4b8ec784a221f82b24ad1b9f4e9040000000cbe91fc1531c17f417c15c88701e1767a1096417ff89bf6dad6fb1e284b13c7579ff9a2ac94eba34d60633a0c4d63cb7f713afebfe7ef6df4af3b0295e9838b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4566A4F1-1C57-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000036cdccf02a6d7c3f466e9dd1ebee8961ef231b139161d6ec179aa3a1773d0d4b000000000e80000000020000200000005f6d9c29c2fcb92b8deb1b39e68e7c7d85a1ed187ee969c23d4a20525866a68590000000f11dd458c71c2361b91d0c859e5981c887c08e2f8677edd19e85c1eeae32388b4d3bf4b516819ab5ab29dea37b62291d18719cff8e2cae9b1ffbc6890f47cb2526ed72e3f9d727820f5daf2639cdfe3f1a104f1764fc706b086189cafa4a27425829c817cf4ea94f7147ea9f2b1d0c9ba7952cf77bc21f89b12f7b1bc5b7e0c68008508bafb9a64fbfaf07b919768727400000006a9ada18ac88666617b8d125feaf30e9c8bd5ae5bb05bf36c75790f0f6442e47fad52e8460b97b92a0f0cebfc0d2915b799e1291538a5e0427b376e675f2711d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422996529" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e7843264b0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2144 3008 iexplore.exe 28 PID 3008 wrote to memory of 2144 3008 iexplore.exe 28 PID 3008 wrote to memory of 2144 3008 iexplore.exe 28 PID 3008 wrote to memory of 2144 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a18667808ac2375f36f43ca2686de8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cc5fae774fa8af8124d1b9ae0b8080
SHA12dc3ce9645c832633a37e2e3f88ec348cc86cc87
SHA256e3e6255d0329cc54abe2fa6849ec839f40d8ad0407b360b6b2fdbc34bb596827
SHA512596a0cb9a906d00bafc05af4d36dd8a26f62da1334fb2b0018c58e2ca99e7a0746cfc70782a0ed61a6cd3415699eab319fd87f006dc82b2b0e1fe93741745f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588e7b8cc37a9c8132a00f0a4cd26b79b
SHA1620013e89f9e6534eae6136cfefa1f4d3d3286e5
SHA25654fdb3e4f890ebea9b24a74c311699b82dc6a59c9d36a46ff44218be89695223
SHA512438eddb3880a7828693e5073543c099fe0c18cddc93bc0d48960ff2011a031ce80cef46a824c7c2e418b25f05cfac6e9974ba824c46624f7aec042b3c7fcb977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae757be6a07b33709b52a047ea0c1e76
SHA1c0660bf7583e105dcb45cade105a6ffdb74874e1
SHA256f32226b76b79006c3dc348e99b6186d26c090dab781641fc7fcd79bfe00122a4
SHA5125d4203f91c4f84cd8f0ccb29be843db692f5511a673f0aac3ef0502c1d54fdc98858eb5c71564cafdeb2afbcb1cea1d392ef0635edb039a3209174022953dd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea4d17641d7de64a976d3b05fe423c1
SHA179a555c3f43d85e2768305d8352ec02a7434ae4f
SHA256fef4b9b79f6ddcc9a21769a7956b78a7b4d8fad43c5e7fa5a0567eeb4d60a709
SHA512033f2a51d89c2a8f201b8dfce73473e7ed5d5823a59d430ead2b364c479bcad95f621238c301beb67e16385f91f3ef93cef561559e589341320c2d6d03826426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0af834acd1d28ed6cfcff25740a33a2
SHA1ef85f0f604dfca352a592d882a1d86b5d3bca7c1
SHA2569a0f302e2bd3d94b6366ca85ad804be7c270e40f07660ea8c292c52b16971f15
SHA512ff1d0aa32f77d199170d9ac8671a1ab75d13cc9d4497c6518e8a384bbfd74eeffd8b18199cb554fd8879ac225cc7cf5fa79acd4b25a2882b17790dce17ff4686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6cb9325ef5d2b418fd55c2f3e4e6723
SHA11b648fb44a498caaa6f183faf48b21c9794a9c2a
SHA256daef5a48df48f8500c219447ddd2bbc3e0d7bc2c7daa4470bd16aa39cb9f3023
SHA5123b6eec6ee4a1f279c82cca0aee7139e0552fe3614cea6515d97c4bac46cd2800009c855dd3330752cb24200d8bb5ee54ec9b19f92943c3784e004b9f0b152be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac494876f57278de42ebd4710673471
SHA1aa8241a3c039e53f06860b20a76c873f77b64a3d
SHA2562574f0c2f3d5d5607aba5fbf43a746bdda9ffafe86c7c4fef2e0acc19e7b0b44
SHA5124168658c3fadf775ed85883af6c00a712c702720346eafea0ff8bd5fccf6fa06f83bf599afeea3363b23c519955f3b8e5f6ab0b6a8e4f208848ea5e4ef411d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54343d93a69f0f02002fe67ff10aeee49
SHA11715d521065a22d46452374de08c27e7d749a8d6
SHA256e2afd1e48e5e5efc54520f8a3cf4c6805624db4fc75f6b4064b6775b43061222
SHA51281a68995643eaa608cba8091832aa00b03254dc115659d14643446902f5852e72332fb0e7d6af388bb794ef96937da21fef2b89ee7add62113fe9c52a16278c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fbfcdb77719c3274cf1b4a08aad77a7
SHA1b6c21cbf1e838d0c2fba5ba6c07467941b2f2e1f
SHA256d8494dd3684af9a5b2f6141833695a98e4a4ea6bb0b02501897ecb79861a77ef
SHA5124a64f8a1854ead57ea7916d0dfd5e7fe43aaf491b40f804969680a13ded3336a31c8fa25359604e08e04f8d16fd527b1f0f13e01cc1a73660a36129bdab913d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed05721c55b12d9fa8aca5c893f78164
SHA119ebf4c82c33df1c35ba2039799be06a1d5e7d87
SHA256d26daab3b5ff6d4fe7c80aa2b307662687a2fd730ac29e6d1585ad53fd0585d8
SHA5129a4689e838db75f9d9437ecf85ef202d58afb5051c7795c9a4a711d099b9930d6c9a2ebe21b47b68d5a765c15e75f3c65e534b05e746353d08204f084b2e14e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e071cabce1f58d5fff59e9c6f631627
SHA1e5aa5faa1b8cc34617d919b5ddfcbf0b1c4e313a
SHA256df145f6868782149f8ffab1db2ad760082a556b32a197507fb8a6dadc6560c43
SHA512e7bc7037a4b9cb313874e1e0be45b258bb35391adfd390fabce5083dbb8b8a2dd151bca868f7012a1be18d23bcfdd71a7ff68e7f848bcaa9057381bd71c986c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e726f3a478d375900fd158b53c59af
SHA1147c494bc7ab02579095adcf5d58ae215869f2fc
SHA256b632280ea58b3c08e768b2e5480a4974b500452b4ccd916d06a3091e8eb12051
SHA5126c724de77a10b49014fe7002ae550d664c24b3d1b9742d2467ae505b340f7e64f26503be5ca04c8f307e59962dce2ceb52a641e16c0bd408662870267c70c5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fea1c4581250af2ab43802645aabb49
SHA15ba49a84f5f061d9a1241dcaacaf3a99107f8f99
SHA256ae34b4252660d4d4360ccf903adddc10a2c7a8696c2fd198142d2068ecbf38a8
SHA512c53d048368e33cccfc8cba12babc4c7c9f1d22c0f09b0e9e4062685b1e35ba5e748a33720930e6b0d178716d47bbcc8b7f0a7e204d8a959b860795560baf0400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5055d74d2263b4018d9f3fb81bab5400d
SHA1e18b12f2e08bad8001a8f9cc8478a5389496ed77
SHA256113312e32d8bcf340f69b448e811dce94e29c73696a1b95f6828d7451874edf5
SHA512be35db296c8f89c34f25119480e1ba721664360eb4e7755fe21816dba9d87253b63c30f7a4e6e2cc00042c158ba48a486df5257de0c5fabe1d14bcd760ea0616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b96739537c1d69cf4e26e0cc56004459
SHA116625f4025c03798dc99e4627de04afe385b87e1
SHA256842be45476594ed577819ecfa9452d71aefd4a5c8c86a15e6582fb93b82c2c18
SHA5125572c840694964c05d640fc389812dc4b90290066f50dfbf06605988aea2ad29dda260ba7a50a1ddec39e450afccbfc36d96842a23fb1ffcbc24fd14c0e2d223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9dd16df28aeb7f7ea835e81c363d420
SHA18447f0169f99b118c1f0c5a14079222d9ad8ac8a
SHA2566c9b901234c3dee2693d4a2f83689d8635d31dc03d3c3037c315b1db1da8c04d
SHA512f6d07b918b74f1a278555c87eb67be2c594b9545c5bfaa1529fa513a8c5c621b111342c3bf0e1a00c5231f58751e272bd4856a84d4200491acadd5e742efd3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fbd7115b17a25a462186b380b9f400d
SHA14bc5e4e1d7105f6569b2780dec75ed61e01a48bd
SHA2562351d1186f8bba445d51a53c4090dedac449ad76102d249bf81d996345f3fa4c
SHA5122b4fd9610bd5da17add9a75a97f6fe8b3b80bcaa9c9fad64da5b2226c97bf1abb0c95e9b3b910f261ede58267e5df3f19e074d700ef7a342a69b58eef622ad8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d10ad0a4dad147e4fe559e34e604aaf
SHA11c3973620db765bc1a7686e32db24e5a3ae4f80d
SHA25630b107f1cd2992167a80c7b14ec1b375c8d5494cb2d7ea1d749753e8814a11ff
SHA512a957fd37219c71ef20cfeca066709ad67b239b85afec8b65762b49f157cfb01f183f5fb75a85ff6977f4a1651f8fb05d3626e3dd56817312a9033bd6ec099b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575b290845140ea0ecdf1f4e0cf6d24b8
SHA15b960a827413e5cdd54532d59cb7afb5f71aac67
SHA2569cca68b5897d41e1ee002db6e3f0ca8ee7d234e048498208fe17a4c686223116
SHA512db06a8e79e4b05804cecd6a3a5720ef91e6b0c59c7b812439a9f5b9513e08bb7ea6006616231856e6b68a1f465380ddec9d829fa4b800b225130c96b9ff0f03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596de22ef031a0c71f8638615846a69cc
SHA1251638a045f5277946e107e6c55b227ee8a3e4d9
SHA2563b08bf9431947e23045e107b602918a2f9f710b76a492df9c69ee26025916b0b
SHA51236e73fd4f2e27165d036cac75bc64f401808a41ece0c20d9254bcd157ebcc74a32bf78e7bc9b90c65c9dd1df06a2572f1688064c50ef8dd760b4419f839b786d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c46c9adf5499e72c11c99504826455
SHA1e0d1067c046fc8aa1873cae1c2f8c7569b8e3011
SHA256ac6b56e779ff0a5b5665df6961daa5380f78da045b57419ece7ab9b1a7f75144
SHA512fb9106176a34d515d45c3d9cf5c464d8fdc01336bea43783974c8485c84aee6c0a16cdcf5080cf02c827a1613937a2d83025b90150aae5b59e506bc6ddd3e256
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a