Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
14c0382c412ae5417a2d36a86b4ae87d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14c0382c412ae5417a2d36a86b4ae87d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14c0382c412ae5417a2d36a86b4ae87d_JaffaCakes118.html
-
Size
69KB
-
MD5
14c0382c412ae5417a2d36a86b4ae87d
-
SHA1
f82b6649dfaaec88f805366fcd3f95a11f26ea6e
-
SHA256
b09b8e0043673a275cd2b2a6e46fddeceae2ec4e247a85380695cca0fe81728b
-
SHA512
f297cd2062e820de438aa1cb9c191b042cd8e35c1313c3d890a843fc0dbcd007534747d9c9b17d2f559aefd45b3e17c521aadb8c3acf53a5ad43109c8366de8a
-
SSDEEP
768:JisgcMWR3sI2PDDnd0g6JUcjoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8sM:J63TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80563251-0A65-11EF-A3B3-6A83D32C515E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a6e954729eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003d49b734eb96068c3ab15d76c37b3cd53295b7e5d66c308c1c2d51c0279e7a50000000000e80000000020000200000009c3882c4798dc7e47a4761a59a4f11f58cf57ca41862ef66268c7b1839407fc190000000101a207f2bd03d7958bb993820d8bba1ac2fdc9df9086ff8514dd011245558d4a1063d2e914e937f485129f0cda0593bcd1edd7cdfd1d9c7fda870880dcf169c3a6b21d81a68fff02661b477f2088ce02419fbf02d43dd6305e4447c58ed34ba9780fdc31ef1852c13896167e1a82890c81c750c4e739a050103d0115b3435e8c24460aa3319ea7b69850cd25c604e18400000000ab31b12833691ba08c8b710a37f9163fa401329ac3372cb7d2eda5d58960e8cd63abe7a73d508fa6e23829f20351a664f5e63e68fb93c82298f16f555674904 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ac8b522e574d9fbd017c824467e3ba4144a970d728b31ed1ff76a9ccd675abc6000000000e8000000002000020000000a7059e0b58eb38bce7be7bf7ab400cd2f0197e0fea4bd801900dd761a1f37391200000007141122e5d8043c1696b425abd097858344891af833ce153f44a955825d60597400000005a570f02c8f041f8333b5a3fbd7e9388a25546d933f199dc4e9e3573d62bbc1aa2783a14ced36cca96b1b46a64c547a31122fd079b1f3e574edf5a75baefcbfe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421023520" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2012 1712 iexplore.exe 28 PID 1712 wrote to memory of 2012 1712 iexplore.exe 28 PID 1712 wrote to memory of 2012 1712 iexplore.exe 28 PID 1712 wrote to memory of 2012 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14c0382c412ae5417a2d36a86b4ae87d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5875f5ffa985ed5e6679608e48d3e9186
SHA173b2dbb6fe12c1e0f534396e3fe185657108b0d7
SHA256261ce74bcc85e0a860ae21f70a3cd0c81dae0707637c2499c2d27c837ce3893b
SHA51239eb1ad4735081851b5431aa73166e9637d45b4738a605e756199b797231943b575cbbaf077ed800a51b3114f248072058d457d6b521d34be9e56b35bec2ed80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532434249c3d0e699013fd749011740a4
SHA11e9a9363f27e750e7757d054080147723cc30827
SHA25680eff8c63e6555cf74033f2102bd46fa49b13f6ee49f83eb8c96840c8514f2dc
SHA51270f91a409437f4397e5211e09551f7499d6e5ea13729252c2488fee42f263e8f7dec197779b2c9b6510a2f432f34a27c03720decc1352311f6f5432d0a89ca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592bb2bb4f39432d78fcd9177f9c6ca9b
SHA17ecf01ac91a5db8ca9f0b6ee65a148a92381405f
SHA256af77ac2d598577a05747b1eeb12476d3737eb2a505723bd2bf283b96312c1c27
SHA512c3a5bea9ec708832b2a555504c69d53e8114b4da08c1f4f7d598250164620ca7afee4f245f325155344111f0c1a0c118f5dfb19e4186a4e70b374de95741777f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520dfa1848296dfa8c0ca97a58633a49c
SHA1e35461067d48d0e98a139ca68dee013fbe443e6b
SHA256698de5f474cd6955cdedfc55c1ec77c3f441a369f5a55c100299cc96f78a8b8d
SHA512832fd544ee00f68ec3336e405ea8541fde923ca4f744542f0914b47e51633a7e4ee813e0ec4ec8915f2bdc5475855784effe074e455eb8b0364ab77263272e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aa3049b782d408887d8ebb82b1d513a
SHA1c6fb665d2ae1c6e987a1d888526a591388f8ecaa
SHA256cc0073176d54490e18379c6daf26a931aa98a84e276ff4ba9eb0397e336fa8f2
SHA512c5217b7d92eb929b88a63ecde70d9b1e634d585d2aca500595eec7679cb23504c86f620d40ba50825196204d4d78d7bed474f9997465b9f7b5a17c79087f2975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fe5e09c523b8d8f3f63115039a6b58b
SHA115fe8c1edf0c21ffaaeca44f0ed8478b04a2bc8e
SHA256987b362fce4730a2fdaecf1d549b0fb7c3195950c68429567eef69336ed72f7e
SHA5128ebab6c0248d4d17bd9576252bed411954375a7495a77928a3d2c1cb66af25537a32824d8e441d440ab117a8f674b177f32f0fbceaa0ca29aaa2284ac9d60f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595772a735baf7ecace7578be87b7cc98
SHA1ca70135ce64cef637d4db4e8a0bfdf5cf43940ca
SHA256f1f074573955b8ede419cfcbee4f4d1db530deaf0b27847e818f7a1795ba3e52
SHA512faa21a2f25a24f6b7b2f75d22a8af6d4028a8d1b53df8b98896640c2c158b6f3d0c1e5b262325f3ea97abd612eda175a84362ee9b1d2481d3d85809dc955d9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff9c99e6c3b9d5ec79345803a31bef67
SHA1bec84814e93448fc9ce1c60ec48e86d3e7bc5c7d
SHA256442b504628490b6a3a3bf77be225a660f025bc3ea05eaeabc1a4cc3890e48a48
SHA51247b09ed08a73aed34e506d23575528e8ee2c57b5e838950af42d1724c8f9a3cbfb6318710bb6238a7b35f0317502ee9b07a3c68f2b3076c54d01c02acc62a3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a208fe94068288d641a50ef80fe869
SHA123a5bd065a94e887d0c9313867b9ef469729b3ba
SHA256b9c226b72e1a62d67260914ba12a86c2e0d10d490c26ec54e4a15131526e00c0
SHA51268affd31cf7c766257a8028f2663902d19b513dad1a581a044713cd5a72be6729691206400f0628755e64bee9bc9d1d5e82f80a8d3017865fabc8c6a120d34f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55799bb569603a700204138bad476c1ab
SHA1bc6609f7e102aead62b55e7f889a879d9c6eb432
SHA2561b63aa502d1801b8e621f2a04d3fd8d417c17f42d55b98fcbd56d819a5260329
SHA51261208da867d809c9024a8a951a31485339b88095be4e933c97d9903d8517a3ac8aa113771f7a22f0fca5bf6d82b2c933c175112986789f72c9a43c13efccae4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f181e6433e522b0e2656685ade8424
SHA194af6b7d66204d5fc451dbb0cfc1b306380b773e
SHA25651d73d4c8d5285e63a33888c8e7ac0a63e78d4183d267323b3b9080ddc098035
SHA512fc5375375debbbeef372de0f4539eecf303ef1782efa715adeaae80a2d28c03f7a34bfe3cbc417fe993f89b3892ddb7fd01aa8c2c9088407d462dfab6bedff07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c64815d03f37ea4a7b358d0516f967
SHA197aa081d9609f083a76083483bb89834d2c75256
SHA2561d17c452a6a71364a67490e8c9758be6bd106f3a02e73734fb422d7707bcf442
SHA51292d215eac912d34481f728161b6d046e91911e63734980d900c55de9727591395ea0adfa59b2cb0ed1df4bdbe1c15e029172cc8c089ff8b1f2afe60ab1e8f4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55938f366d166d38405f4a1b5a8a11489
SHA1676519ae48d8c45cd62f3ed83416d210619c7c26
SHA2565c476de2af132843594d78aedefb4c1e1705c0a015d5b22d8c21871bfbeb8e21
SHA512bf833339a14c9450196acc985506b1372b6b78e5d09267eca8a0ddc724eb2bbf7942d36e97ac9ab4b146af52e5cb0bf00eeadae09b59b1d26d7aa9c9eeeb5146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe2941929375a7ae96deb48b5337146
SHA141467c178de96f11dc76e01faba792781bb284c6
SHA2561ac0c91c153744e270b21b9855c734d760f17e4c6c75c05080e7cb2ed7580421
SHA512c11c4eccc68697117087bf3af4849b7f05439330affe510b68a025dfe8fe917ea33fd65bb19037fd3ed2986309d099058124d6678dff8fc8be4ed340aa67d6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7ab31706d22885ea927cfbc944f8ca
SHA141bcffbfc8188137c42149dcb5c88b1f7d064d71
SHA256917af7b4e072948348fa9d4375c4a787293f2d2124ccb95da413304c15435d48
SHA512ffc8a5896b6033395b3bee8e86f90e5fc15dfb0d3e9f4b01687c8bcdd8210334d261e2fe0cd299fe38bd1a2ed47acae9f565d1bf45c01643c3f08325bddf4b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3939ab6820f338816804668d4f1d4e
SHA16f96c1c3ed89c6ea8564e682de10d0901b9d3e0f
SHA2563547ba76ceefe3af70c6ac48898fad7c5aaa7d308b68b79bcd34c67a89cbb708
SHA51296bd78277b7a5356a4d8853660cee54bad752843599b4c3e42eeeffc26495e13995f2305667653fcb2850019eb62167d6a7802499ab30434e4631bdf1a9285ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba3bbb511be596d49a7f17fbf2bd6afd
SHA1468a7b9eb1bae9996d737d21a944a65c38d3a3c9
SHA2563794289d8af76a6bae2e8a6fa98de435c94b885dc351ff5e0fe4d2c383a07ace
SHA51227558a6f042c582136430603055fc7a5bc1f77450212d36e0e6a3f272e9dfcda0b891a92da367ba830f993c2869e82108d8ee1ea3aaaeb831ac726dce8c5fedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ee4352c4d7ca4a828490696dabcca4
SHA14b1e82f43c0ea925c9d62c733b4124d4486cd695
SHA256d58710009feb0eb3a529b5c398d05a9d985f4a61fe32906e1da4d282ec7b92c7
SHA51244613b91a2c3e1c98440182a0a331a1f10dc1c34e308308408ebeafb46ec6edf844aecc36cb6cae218b4aa09bfa72fc2bcedecd17a57cb687c7a881d6941ba75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aecece651a292bcfc1b225bc4cdb3eb9
SHA15e1fd38fa7e54038a5c882c864b021ea32483361
SHA25660c7f7bb5462b2f7be8e62152984ced64c1657e5b3d7fdc80442087db852e82a
SHA51207304df17e04bb05bbe5ca8c282a4a33dcd465ceb198a3a504a644c1a76bc7d68c927ebe510db1b0a10c943ab01273b252f9357fb0222e25a5dcffacd2fd2155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af6165e7d12776eb1110f02c47a7a81
SHA17ff3ff86736a5121f6861ea27be4350cd5db6b6e
SHA2564e3d1e8915379a5e3e5de3b1e37a63ce3eb54c76112b9c43097cbe85064b655f
SHA5127a48242c43e3f479e439579a836ecd3062bdb1853d1dcb54c3ee49d34c215e7bf0abd1bdf9f226bb0c9d9fecfe16f3bd24a067403568f60d5ecbf9debcf23e67
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a