Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
f28112a49b1fd975cc26ab454dbf3609_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f28112a49b1fd975cc26ab454dbf3609_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f28112a49b1fd975cc26ab454dbf3609_JaffaCakes118.html
-
Size
978B
-
MD5
f28112a49b1fd975cc26ab454dbf3609
-
SHA1
071927b8cbcc4d221f162ae628d5145e836ddcd4
-
SHA256
36ed936657b7d07539393e2bf297ca148b1b08675000fd21c818e5f84919f443
-
SHA512
fd979e7239debd139f025d0aa544c2bb335ac5a59e904148399e8527e783c5a7b9294c74eabb2a51232b497bb3290c5181d5a58110be7f7497433bfb90168359
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419397323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{361BDB51-FB9B-11EE-A49B-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b1030ba88fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000fc19c6bb3afe3ba8fbbf3ab01133b8ee768a0b81209587596ee0239acfac0b90000000000e80000000020000200000005e07c8fc24d0a3cc69d8ea9bd559272955f0f784c1038fd3c55f7ea8f41434c890000000c864f6db09d0f1ff2a99ef5dfb9b3beeec86b41d06488e6f1fdad2d6574d7f7e350ecf44620789467ac58e4c78f32a76471e89282b9b4337cedb8c5e90c436072850d77755c8b9b581af5e6076580c98dd7447fa7b760f020b74ab7ac30059963413c4372f5b9c450f3f20e6cc1e6dbe5a088f7dfee15b6a41ef8ea733d5f794cce7167e228b3f8382957a1ce0ad911e400000000874d6da34e0f469276ecefadb5e912a20022f3e75a60b905e239fbe06dd510c2438c46aa716ada216995d317ff9432180e9e631e51419409008e50227126d15 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af60000000002000000000010660000000100002000000045f67d7bb9d96581f5023b2fdd61a13227c8c9a7328e706b31e2e18f22b0a9ab000000000e8000000002000020000000bc1494a9aca321b19951675043f64bac35c31250609c4e5cad89288c870ad5fa20000000e0e535480bfbd44c5a1137355a5d19db89513febe8dd0f395b4d3be4ddd0c96b4000000024aa2ed6e4f3e4a608146d23ccc7a3ca47243abb2e812ba345ed414a4968ae2d6cbd331ad66ea7e98635eec379557f344a569a139782579fdca5b50ca0d55055 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3028 2372 iexplore.exe 28 PID 2372 wrote to memory of 3028 2372 iexplore.exe 28 PID 2372 wrote to memory of 3028 2372 iexplore.exe 28 PID 2372 wrote to memory of 3028 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f28112a49b1fd975cc26ab454dbf3609_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e022124b3eacdbc63673d00827009d
SHA1c4ae8cc8efda15ae5583f97bf727b6d26fba4fa6
SHA256937dd907e21b63107929a25ecc6584015505311913715cbcf47a28e6f1050a4a
SHA512ace9685e6e92c2e143267a671590ac80c719ef24d3209d936f66e9eea91b5749e515912daa8efbd6994493a32c7b1c38d4078302c8910354e277dbee78c3b566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d08b69545f0e14d79545858fbbfb48d
SHA145655f1c01694c639c01cfa576a16917e06c1dc4
SHA2563a950d5d8e56b85d9d68409057dc2c9a9e68f0aef22c61a9f0b5b390167eaf26
SHA512c26a7e94811fcd289855f8314ebbb48e0a4eca2ae01c13ddf3fea5fadd54fbb430cebe7e6dfa91b74db36c2e9d241e5184f6fe26086248c7f378750fafc36a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508100fa5e462d7fe91cfdf550b878ec7
SHA1519e38a0e1fd7b34330fd5318fa6663290b96996
SHA256fb1f88e38b856818ef34a456258cd88107059437dc13b59a82c0ba7131938f51
SHA5125d15cee44741be1727ea4b90fcb78ac1a90e737a255e74e27e0b37151d1d97d382421ddbb632adce42e2bcc15d5b94faf94aaf01572b16f2ec8101158904684e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c01dd74c4e49953e8af0bfa07b2e353
SHA1f064448a86196688236874fd91c221499a80d2e4
SHA256d0d28451d1bc179bf220788e7c167c252ba15c9a1c0f0cf37b3080c68a0addb8
SHA512035aa32638a68bf9dc731a6f9a71240534d6847515105d6a246d833ff167a47281ada659b8e422960d490ebd95526dfaa99dc463076596cb0d6ceedcd4f81596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e738c21bc03a0f81bef15b1eedd1ae
SHA15d414fb31c301688046ab5bd4788534a358f74e4
SHA2563702eeb06528c12b36ad82d1e002b7ef9eac678379ebea21d8edd2da893d4e3d
SHA512419741a239e054e4f2ffbd8a88a17a3d36ffeae14203ade6f48239e6467886d65b69ad13f87a1b8bd1565ba08c4cdc597d7654a6e161a4e2c0124e24ef819a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d769d4936fbfdedb7f119b5083d61c1
SHA13898a263f2699fad9715ac81070e3360cc364f62
SHA2562fe9ffe15b8a61b382161ea42cf85322c5a9d829edb3fc9feea40388f1e137ee
SHA5121059ed95b4c9e300fd7ac4b881c283f41563af305ad56bbfbf32a0c324e1e609179cb03b13e8cf6390408650a1bd817fe372c631bb01aa0af51d4ec2102c3e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56967a23cecddf1d4019fa13acde2b229
SHA1af17af81a95215198a4647521d17b64f61ec4e05
SHA2560b54448130ebc9d59a2d2bec78301505a00a61f1627eb611b7c7760396e12d49
SHA5124d548c08e697229d9c6cae04c00a539faaf3c1855aa3bc5b83cfb1cdee242e2ac04f9dc35bcb4d159c629dfeec3548a715cfaf5eb9bc33eebe7153f33d77fb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5933ca42a79fe95a33a93c56b7373f5c7
SHA1bebcf340489b02fad488326cac8fc4fb67690576
SHA2561b6d3f55cf52b7c66fff2744099c5424b45b48ca1cbdbb8c051f9f2888414f9d
SHA512c9731a0f93712e9f6a2b0f549c49a2418276266b357d234fbd58fb2261932dac84e22dfed9f6f5f8e65c72106d94b30322aabacfe4ec61b3cd81b9e346d91b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9f43c23220696a9a804c27100c9b890
SHA1cd9f03dd7b9e1125a7d9e174e752e2f107bea53d
SHA2562c9ffaa57d8265171fc7a499cfbc9c439899dc8f30ef735e5ea4238c1fc8bd6c
SHA512c967cef0475bf99115002ad832d35828a1a5bc980bd151419893d80eff4d142804db6df6c0542548135368a572c744d131aa6bb9a034d399e796299d9bd8e296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555318e84c97eec8e6c8319afbc2d2b2e
SHA148636d5312b651f82ac838f1c86e88212e02cd74
SHA25634e32a76fe0792e3ea33d121f806750eccbd5f77d4d0fce2affcd36fae8bfea5
SHA512536a12887ebc0b480e338a7739efe3063e443c99e25c4458160aab3ba3a1a75129a8a1c44efe28163c6f9a3800a8a55fee9adeeb84202133bf8884d791d54ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5236de564fddd8b3d555d5908f488ecdf
SHA1ac72c6c7c01df51aa20c79bd118f4d41c9a486c6
SHA25652e0a7d55b54bde3b4b3ecf69d3baae6535dd5860c30e04701feace771f30064
SHA5127ce31114c9e7194aba848792bf51b50a0c6e0ff4949e31f2d11d4c1703a4065025d42bf1ce82a72a00e44bd21c654519510870b0dd3fb07b091d060c0329a9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4dd2a06d8672700c3755d5b07767232
SHA123c77c464c882172c1e1f4e180fd0b85f6dc51b8
SHA2563827aa9cf985d3a42d21642256411efce8ea1213c19798cc31f0609b74c2bfa0
SHA5126f4deec28e9e4631370ebd7cb1c64b3a24af0da57e09379bbc281ac466e3d30d9d143389428c7bba70eb85d64f5c12ddcde1cdbcd37ee12a25075fd36075fc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85cc397587551c31c739d6e002d87f7
SHA1647bd7d799580e1c9c479fc659e1733ba430e716
SHA2560c936fcd58eff05cb85787a6d3f3db7594594726583e78f16d05171a5b0d55e6
SHA51246156090983010a5c265a679e010af53c983f50c5158894a350b9f36d3d9976beedaf07a0a936cb2648f8596111352e7d27e62dc9cb2828197e8599cf40525f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c79577a65da0e4a884900bc59b24a1
SHA120571f937382c2576b4f167a6576cbb9119036d3
SHA2564919ebb7bf3d444a7e753869db500f141205d9990c9aeb95d639da3450cbea60
SHA51247b6b7c9dc61c01ccdcdd0f431d0e5ea152b1f9865847a2de6de18942224de20a808f9a85b54311f1fe6dc5a0eb9362f164afb34434926f7a5bdab611a68c43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c9c54eeb8256a0193179d0b481c1c4
SHA1fc3a4666bf1cd6b47346995985360fba194f0a51
SHA256c7b73631804658a985077826434302e341e8d9083bd709747714bd88bd335896
SHA512f0ce9656a81d2d4563bba129dc33eaca267afb7c7cdafe62ad8f6a9168b55f39321914632000387f7bf828f81a04d97fa85f072ab2aee4639c3be0514b059b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c49e4ac1a541b1f8c8af5900c35d1f
SHA1a8bbee3907316d78eea1264520da21aa15d62c42
SHA2567a2c767be820b48aa63f36c18a8c244290bbf23df45d91147d653f1b44931c32
SHA5122253633fb79583283b350c1d0aa92b6acd235476300e2ac0e6ce5841e09fbcd8b26b925ccd10745f15162b5c6dd6eb6bbdf2c78a3125b488239b89c3411d3311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc4e3f78fc0fa938b961b6f0d13c7ebe
SHA1c4bb00a4fdfaae20765ed9d84804329cff25e6df
SHA2565ec8c01a968834dc3bd02c09d64517c95600f6efc8e8495646320636bc953010
SHA5128c18fa5adf746126eb23b86185764d0f1c5cbf1d0840907c35cb1fc967916bca104ce615dc92fadc2a7595e0aa824f5f1d7a9f325593b8bc6dce25e4adf3450c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52abc5dc2b7076bf18c1b50fb3155e0f0
SHA174921b3ba5ecab2c8496622d0a2d96d03b4ce6e6
SHA256131e246be5e24ed7dc228bf151a35f55b421d665e1767baeb73b2aabaf18dce0
SHA5127f5e4a41a484b322a12814d9daf1e52aa1d4f0434e6db269f9bc231b0b5086c1a960db5d397644bbcc178e3f1306fce56b348f5e895dbd2cc3e58851901be191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fccc7193075f9874113edd25ca29d9ea
SHA13ccc7969224cceb72308f5b23fb2b364af2fcae2
SHA256f51a47f7a99507d115d20c5a8a3415ca80f04151ce91a8b0d8df69fd31523596
SHA5123bcfc9484cfa0970a31ece323f0cc240e19427420eeac1bde6904c0aaf44791868d92cca0eb1f10f2ff2b14f43e91f2bf80d88bae03ae407f21608de125dc547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d00475f9fabea41cf55aa5c0d07bd7b
SHA18262c7b55e0667c9d2e410c78f17f7e79918b261
SHA25633934388090292ee30c641ec2dc549d85c81f58389a22a191f4de2cf56464ca9
SHA512c53b4729b3f0efc2fd040b6e3dbdbf07a8e1f0d7ff3a167cfd60604486c3d220a1c93159276281a5c52170e954599cad149e911c7d403b7f0b956d6b96370662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fa04fc007c45725e91398986bc4af56
SHA1132bcfd9bfef828288669f85b728a5047a245257
SHA2568f9cc28f261b604531e86196ae4cfdb25c43e44aa2d90d2640f8c03e00ab52c9
SHA512410ccd2d9679571997b4c2726cd0e3b577c4229fc758d3049e45f67661ad0d7ceef6de2d61ea76dcb3c4be0a37759475f6ad944ec19aa1d7191959cbf11e8dc8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a