Analysis
-
max time kernel
119s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
020915ee5cf0acd5a52e8c67c03bac6a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
020915ee5cf0acd5a52e8c67c03bac6a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
020915ee5cf0acd5a52e8c67c03bac6a_JaffaCakes118.html
-
Size
22KB
-
MD5
020915ee5cf0acd5a52e8c67c03bac6a
-
SHA1
74477f9bc30092f88d20b607512d9b5ecf125353
-
SHA256
05d0c8493b38559f0d398e082cb0d65b28656c5d178fa490518abce5e04a7adf
-
SHA512
601755904b4f3eaaf010b3c53ffea1913439cdb28048b8f3c0ce35ffd4c773420d38af12ca82bc7c0bd334c9686ac1bd09f898d6ed47f0a8bdc4a413a8481bb5
-
SSDEEP
192:RmCoGCbb5nwnQjLntQ/DnQievncnQOkrntlunQTbnCnQwR4SnQNjMtnFnQ7Xnqn8:ACobtQ/icq
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000029f9627419c67b79b2a873b5e9f55074b551a89d3ea3e908e2067533e056c2bc000000000e80000000020000200000007b87014efd56cc3b0d306a54f0984e7caec932051d7e090dc99931d4408f38bd90000000631c21f5a9ee42ff67c653b7c50e3b49275ad3bc0484e9ef62ca1649784f2afc0633e04aa231643b8df9d786a4ac7143773048ba8b89831b7b84b5fda9093a33076bda32e71285d785e729a64781092d3bd7d73a9fd03267bff87b34874cc8b64d99bf8329bc932bf09a42e1cee718b7511146578f5afa8944f96198dff1fb6817f28ebabde13913aa319643dc9d21554000000017dacb06822bfea9c36fe9abf71ea3a3c5344816e34d98ef1c24fd245c1301931e7a94dec5499f1a697d5f3f0439f35ee7c2fb90b3f4f59cce41a008cb872182 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420340765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a476ab3c98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6A70211-042F-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005471699c60920845fa1345166f9ef72dd4de9f78f83ff4102122d0627238d073000000000e8000000002000020000000a5843b9d7fa237b24ad8a9686c182c97678ebca2539fa9da31ed391d4d36d0be20000000213860c9635eba8def9afac4d5b2e285a8881366741d90ab15f06bd81f54c136400000001e619f963533a7027378aa19826345c64aad6e6bfb686a97f39255e72a4451a4be4a57a060098cb42630762d343310a67a9bb81d8288cc336b14f965e864903e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\020915ee5cf0acd5a52e8c67c03bac6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b0f3b70209a4d70c3ffb97585dc61ad
SHA1f53ff83b594b34f0d180a90f7394329848b698bc
SHA256e9eb33b6590932f32ece8088389365a8b8ff0574efc4e5e1f052bd265a083999
SHA512ab28b208860d0257db5b378f246650f4e5bd76421461be41ff8057f6eace45cb410e081573ce8892d3263fa396122ce648ed17970849c0fa9f2291ec57541ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD522c3c79a9efbfe7e5082af41501ba93a
SHA147c4981187f1872c5c0c41018274800c619d34bf
SHA2564d3481d70502122b3dfed8e7c575f4f9833a1a439e1865b744503b2a26771da9
SHA5124b0f1655ccea7a2f844554027bf0064fbfc819f5fa6f4fd6a5d658d15f4fbf7748ded3c8775eea1b616a81cac18784327f6889fe432922c23d0396eab5023a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5657bf2260baecf7859fbba4496e4a83e
SHA150a3ce7d595950506992d9423676f4e1aa677cea
SHA2567dac8ff0eb5993ace241dcaf734acfa503a4667a8242ceae5b5dc4f37470a9ca
SHA5128c79cb3e15089b1ac84a918e65f6af8c324268fea7f6e7cb35783d49a418b1a24dc1160da03ac9645219cba9f949d2d02cb6c435e8d2d6146cb7952a8ff71b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8e2d4447c76f2301acacd176fdbab48
SHA129e8f9db86aad423bdd46e23f3f818f368dcae66
SHA256725cb13ce2c94afecd5e81e284bd34211f15b51633e9332866b3fbdb330f2cc3
SHA512439829a2256ec6b443e05ffae6a621afa1a51a84f6cb6f16ae14f8d1ac08a637dbc695a9b90938f46d9c41afde37a0c9f4afb0234530ad5236c3360d264dbc61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552f496bc09162a176f95c91a56b22848
SHA1ca85e030eeacb533b08d5c3283846007e8a18b9d
SHA256b082b071a11a7c8e39cbc4920a91cdbb7c9ca7e8c5943bd353c8cb3531b6340c
SHA512a505d0b57ebd961bc6d52df0b209e1ddc95ca60f8c173f6fad681e61494db3cf91137c0ea465006804d86cca881aea2c135d53ba5148c0015c96412a3f3b3e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3e4ed82243588b064321ec9fd4b0985
SHA162e6965bbb314a4ad9abfcc7cb91b834d218b1cc
SHA256e265052cc7730e5316b52761cdba990e6bc90c152f2a1db5d3559225d4b12afd
SHA5124f1f8ef757a4f5d830d87792bda79c8cd368d69deefcd46cab63eacbe1dbb57ae03525fb38824667bb78bcb0305bbe97694429ee463780ac9a591ef8d86b7a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e10f4187c71e6f1b830cc7b523b2173c
SHA1a822484fdbafe24311e1af4fef1ec56caebcc974
SHA2567b689c9cab9289c800dbbecf74af838d935d96a8dbdd91a496d56071bda1ef7f
SHA512751fe9c6d227b87f226e4ab086904e1029581260786f3e592f42b255f3bdaa0f5c990907f4423538d00a6452f111b1b7d3ff8b2b8b9a023ff24b1a7578735be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b6e9ad9b615a18b3e4124a3f3e03425
SHA1aa9c345284cea69135e48b258fa449acd2a9b403
SHA256a1a6dce9201ffa16c0f88ecb59e1c29e29be48331b2434dd042f794d34e3afbf
SHA512cecdee1a98d912d245e51d4fdfe098077d132bf4fba99cd88507329f333fdc42ec113c1eeb7d3bf82fc1c076649b52273126363ba0b4a5a245b024c2d4f5ba58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ece8636a6b7007d4f84dca01c94bca8
SHA1330a5595f12d1534b618fb922ee5598eb5aaecb8
SHA25607b856caa4939d471bd8d79b01288dacb164cc50c69fe3f6138676a51da2875d
SHA51241198d179d20dff49180e8ce4b74d51d0b5b1b2fbd60cae2a0d21bfd041043dcad59b887320569eedd3359cf3fba95bd87af7c85b9e30b2554bac9ad86c1d3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5309111751502468cedc4054e6f7b033a
SHA1da578c2020944c591618dc491cc07b705d9763f8
SHA2568e758b21def9596778bbd733ba6646f19b19c0ca2b7d30782b43b394591bff01
SHA512113d841443027a4cae1082d0c087a7569943be06fd0ea1e57a7d4b1fecf65c6e4bf1e91c57602df69c8455cd53f04e97dd4dfe58efeef1cf2e593fe10060689a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae68693761a41e0bf01d4aa986e74e3a
SHA1bc1bb69b347b4b8b4304b8a57954dab94afb0f21
SHA256f4be902daa53c265d1ca4b46e320c5febf6a6752e6f450bf726521ef198387ef
SHA51288f0ea18f47d8998f1501ccfaff15f4bfa0274188610e0f7612a473ef981b49990703c1b79e7e60f5f561558cb7ea9d9b57c8c041df16632af5dab3b745ff25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55189c007a5e7439c8b2136977ece7c84
SHA11973af850b109e5ffd688231eb4b7390ab250678
SHA2563221b51d3612562fb8bf2d6eefa754d1564e97156b312497268e6e9327fb8d42
SHA512860b9da232fb66e4540564d60c51e96f35d9c412d06d4d127e93ad25f245d9641ff8240fdb593a587e97fa9dfa59291313dd2e5468099eda8015866a8ec861a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512fd678c2045c954230d0a585ac6d11c
SHA1255d9e61ed618de346ddf154cb501964ed5c6605
SHA2560f811f94938a5cb974e10845b6dc4002fe803fbe5793db1ab2fb7614475b5f26
SHA512aade82075e909e61d077e685f643a1003ff5b5b7c1e591eb3986b5617e77ac636e47405ffbcf9102a8a84249359e15dda21c3524d88ecd6fb35ec437186209de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb4c2292363c7a730e1cbad8cae29600
SHA1015ac5f5d5a0f6ec0b72ff5a73a30c351d2053e6
SHA256f7db23407c7cca4b1bbfd4a81ffc9264ceceea6b9a8fdc74b6b62e05bf1fbde5
SHA5120f0f3d164825c2e9142e5a8cb436245f9873d393f0bfc67c955cf2f875cf559b980548b1ca317f4c548cacde6c091859a3645a4ce509f18ad35df46d5dc4a867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f30307a876ff1a829fd807d9ccb9f5ce
SHA1da4ca2616fde58078a88ece9a4ea1ed78bcde65f
SHA2561e8c8a1a7209eb1ecdff9e118d4fc761bfbf66201e15ae3a34c540afd194499f
SHA512540a56ac5fcee8f3c9ec860c7ed12a2bce40ce389afc14201dd7e07af02a8dff3790b31d019a867c4ef0ec0e4d982f0d1eb29a669c044d37558b9ef96d54143b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa123eb86ed9a708baf0e440d7257386
SHA1b1850853362ca904d22a2b490edd48f47ee23ecc
SHA25612c6bc4b3cc04c664fc397594c368b5675c45448cf2596b01c679389133e6eb5
SHA5128a4ad4a51060a11c1f146b8174da1104f4f728ce2b2b9d8fe3dffffe8b1929d2e1d33a7914aa87727f92f79b33e4526e465783c8aada0a74db997e304f5b30f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb696d76036f36331d720812a432817a
SHA120a474eae78bb26b3a3f1ede036ff091d15b8f1b
SHA2569f0ccd20452f6a90105a6aca46600ed64b5eae3d57ac7147886207d253416c3d
SHA512d26f5cb7092443eff9ff5d6b4b44410fc679383ba2c8537ce8562ba8641f61493fe8386009f72b50ef2aa94bfb57f4a33a00ac94958f63a4550a03f2e1b6c8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eee444d1ce3cfe986d7ca4d0676ece8a
SHA10680fa77f39a4c3f2734f047b59d65bc9cbd84f4
SHA256d2728cc50ae3cdbc2c56776242556d91e76f00087bbf06189a205f4acdfad64c
SHA512f9f2337dec63cf94e16c0a962bd379b0ad478873646268a0d24b9e4b28b740aa5c17875f67077875da33385d9f834b9a258095f5057a06401022bfc37b1a7e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5386b66f8630c521588588e17966a6bf5
SHA182c27693c0c06b445046201662cefaf17c6468a3
SHA2560fc179e6157a684ec2f20e59bb39817a9bfea1ede510c0e9d1d332b0e20590fe
SHA51245b8e42b0f684625d24a3f4071dcd192257ec466e19ad3047d9a69fccdae6a26aa9b0deaf40ce1801fc5e27d3ccd74c8fd65be803838215a9745053c0cf3a6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57115431b0e2ef3af2ce3bccba74ffa0f
SHA1c786956c11461b99d4c7589d7abace6887dec33b
SHA2563c238f3947720b12b2056c638ab86c114e5b65b7270b6f3905a4a085e6a3b4b6
SHA512e44a7ee4a00a4c153e7f98256d730a60e97523508f54e768abb3a31edcff3aa6e0020aa41a9374f1ec6b76d58c22e6b37f1b10dfb599d7fedc690de603913d8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a