Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
1139ff4273aeb000a0955e2f0637a90c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1139ff4273aeb000a0955e2f0637a90c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1139ff4273aeb000a0955e2f0637a90c_JaffaCakes118.html
-
Size
4KB
-
MD5
1139ff4273aeb000a0955e2f0637a90c
-
SHA1
5898cea82e04d451ac551edf8a9cdb644354918d
-
SHA256
b42c43ad9d1ec5eeb0c960eca70d05e8a37c8dae4be14a3511ada8c29db0525e
-
SHA512
eaf73e9c88e424aec5aeeb202359714071a5df0bd3e8fa7f5b945c5d6a1a4c6fa8d637fe83c6d59b0733e63c72e3fd407bf41d07091035af486123032137f8ce
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8osE1nGd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ee1052a2323cf468e9aea464a9be987aca73557d8608ac203272dc0af4bda929000000000e8000000002000020000000650585943a433bc5a409c2318d6087432e5c68692e652b2ff541f8743cf235d720000000cd196f701315357f6c23e48586498bbc3a6365aac52bd453f6220da93d3042a04000000032ee5c9f78801b35025e89936fad76590f6b18bff83405a86751b90fa56b157ff237b5e4fadb0964fc0d2dbe21ed5d3af70fb8fe080e006e6338aac94a5eb423 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420951125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F18F2AC1-09BC-11EF-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a40bc6c99dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000094ee839b0240c8fd8f048ad6d5540b1a2f17c0d9a9beb3cf58d1b51c5680a7e1000000000e800000000200002000000084edfccfcab812534f1a5454769837da0697bb97b86ba5a1cc48aae2d707624490000000a2ab7777e8421763380de4edf8a770741f07f56c87a1aa9fcf91e4750ba59878feac0d018be264575a2c6f4205022d0e8b193498cb3b1ff3a813a1de370130500a69aad426e968d7d6dc3cc3f8885cd5489b29e42ca001f3ce88beea535ae42562f40ac4af2e6d8c3cac93beaeb0bdbb2f280f1a09c33b0d489325270536d3340a0da3f13535642af56320de04600b6940000000fe00455ad1f3530999a17a92080362341aabb4590141b5c4e6fee05741cff51b3ce9a37e00716ce2fe2283f315dfdefa60e5b4e286ebd20584792c76f1d938cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1728 2972 iexplore.exe 28 PID 2972 wrote to memory of 1728 2972 iexplore.exe 28 PID 2972 wrote to memory of 1728 2972 iexplore.exe 28 PID 2972 wrote to memory of 1728 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1139ff4273aeb000a0955e2f0637a90c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56723ab1067bdb012ad8e911c0d5c516d
SHA1455c511af5567e868eda54ae06caf0b94ad512cb
SHA256256e19259972bbe9bc89de95546493d1e61968ba492fcd951b5483a9fd4d8ac2
SHA5124fb4529a83c71acbfd701f9315b983dc12fb24bd687849865c0567c025fb4a33a4efc96226035ad6cd3734e932e12cf8ca065851425fd82380c21d67d8cebbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c023c812cda86f8edcc07f1ff536bf
SHA12aff3df682607de08164e6ce490fdf573f7798e1
SHA25604b2fe0b1817505b46c15ee14ce3cf811e5341480278d802bd8c24ce13392bab
SHA512636039d11b13c8d183878ef2bc4978dd7c193e5b0ee20bd1ee5be0390836ccb8772d0e8d2c804009a2694e09127ad09aeeccfcf561baec99553fbd76a2a9f52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab2831d583275f7139bc5820f67c199
SHA1a495cefac9713605d30a89bd26f1fb4fa758af5a
SHA256d4fdf483611b9c4f0195859451d7b45bbfd4b9892de1dd0e6e49dc28b2c1fe19
SHA5128b75fb1478bee9db07f44553e2637880a3c8267994a12880fdece314a113a2f31075a1cf7b9ee78739c12b3c28f47bc5fcb88dc370b028441adbe8db874dcc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508a23020998f376bf9ae5fe1a85b8636
SHA1f207ea6d42a4880abbbe3370ed978026cea14c15
SHA2562186c24914472bc293cdf323c26e67d530c591d2949cff0c559a47673c1211e7
SHA512e4e1bae0941e98a155d4c1c82483572095c2dbad93778a379d5451627e5ceba591dd2c5cfe757712b75f9dd9392ced6fced1e8d237a21e53104fac4bb542305c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3a0f6ee9565d7ca048113c0e7cd4ec2
SHA1e3594ec2fda284b0aa13fbb02498713158abdbfc
SHA2568afeb08445f8a869daaa506e4e46c339a69eece4d404c5bd452c45a47fca14a0
SHA512fae6efb37bcd57c64488bed1f17120bb70347317b6a73dfc30b46543de457501e13ccce94c2270c470b2cb8b4cdb06cda8b3b8c9b32b86785dd62a541cdda777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca26e86c8c3255fc996ccc612b645450
SHA10f324e53d9faf3d6f0686bf70c6547702f554903
SHA2560100a6d49bd741dc64266b322b206b32717a1fc941d94bf8751e24d1c85bad3e
SHA5120b89ad54486492b4ec679d69b8e8720422b24df56ee2719809985411cdfcad3b62ecd6c5a3dc653be1686c37e5841f16e765580225be13339ab9b5935ecb3b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550af179f2544e62d6f097b11c3b8988a
SHA15d29448782df75e8c39ed840c792ffbea862fc5f
SHA2564c06514ffadf61847627e70a5f083d9e0de9da6ee99ecd8b857795991327982f
SHA512f12aef79ad7189f77a405a53bfa394fdc6d671a81ae93136c4505ac0315318abbadea45f1bf1fa5667a84009c3f445d8bb73e8a163c036b917c2b2c6976bc5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f8cb3bba635e992b2df0e1be6d3f472
SHA128d9a5590ee9c15b288d8eb38f4e757c704ce3d1
SHA256837898f1982ed31a3ed0f41444a4fc137a32aeffa723406b1b35ab8fbf10deca
SHA51230998bcdaafcf1365c9a3d1b05b4315c465730755c3af2fedc75116221f6780c0335571ccce10d09cf67e1d842adc2d67e53f521be4b9b4d5b06085e5623f653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b307300f737ac00fa480b6985f4ce6fa
SHA14ee7f5cbeb4258e835cdb5a319468b9abaff65d6
SHA256fa01e0ffc21c3d9308360102e5a6c53f9c3cdac07ffc6930a4cea43dceeda47a
SHA512f2fb306a4fa9eaf1114e3250e5c6173c510a66e021d9e5e0fe9d5c326abe6cf350042c56ddf1b068c89fc9af8feac99c502287b47c66654113ab6956db087ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520422e440caf1d33505cff6bb2e79b83
SHA170d3dd344b287469553c760bc452419ce4939797
SHA256378e3f735ce8a8e28baabd6d21d86bcd48973ff6d991af6ddbdb785ceac932d2
SHA512d88ef486eab79c367bdf31203332397e26c916dad300d83b5ffe0413acb304682ecea79b0b4ae7ccfe4ebdd18444756c30b4f02270902a7a3e56dd98927186f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945b0446d97ffeceae9be0939ed35f63
SHA15b67e6cee2e52bfd70ab588b863e0142ae6d7cf8
SHA256840aa5a75b773adee872748abd30bd88fbc1251b8b8820ce20d0aef36f5c1891
SHA5129220f3cd5a55db46f6cb2b30f96f1d5139e427483e4fecf2260620107a9f41e5dca0e85aa45f9706f51eece428090c318d59e0df8d62f88e73bbd5b9461408b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57feb115cb5a4e324f3127206e8b96c63
SHA19b6e80c1a29fa93750d77216887fc992009c756e
SHA256e91996cd08495e907c28797745d066f38836e3cca032a97d7607ee58cf30a3fe
SHA512e7b523513efaa8e239b1750e80dc7b992aee4842c6792cffcb7210a5a11a17cb45e5cdb116a8cf495f6385ef7740230e246f2fe00447a0066afab58d996e7b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d71ad8888248db958818c81e4ae0af
SHA15aead02c148d28af9db98ef10c0960117059bc26
SHA256150071660ce66da6038047570b4fdca1342df46a7897772b5343675222261f35
SHA512acccdb1aa274927174ba539f7b723a23e5310e8da0a8adb0c29c7e6f56b4a211587dd37661be92ba62e6bbe5fc8babef747316376f1db1fa164e6fa97a0921ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575d61b8a80c845cd44f8a75b96497d84
SHA1a753daa98c60e44a170fdc9559db2d2d00e3846e
SHA256c7eaaf1c248d902130299a6dec4f9ff8cbcd086b8f5947dddf432ca516c4be4d
SHA512c6dd0abd2580e20360139a54b97ceec2bf0436cd67e9ac5004432944dc9de65eb0bd1aa342db48a55cce379991ef661b6456b35144399f77490097850ee196aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55108fc43e7e335a5c09cf6021b18ed7e
SHA150690fa16511d16363512ecbb95e006620e223b6
SHA256f8535af1c898b05b3f37082e6986351a304e05bc893f43329dd94d16be7c7b3b
SHA512db8301b452cb73e230377ba0f9bd1f79432e45f4412531ac604149e8311b392ce2594242d5d6980375fe5943c4061a252654125346f7e35eeeb16973dfa0d6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5be348b81a408dfe80860b8049439f
SHA1aeb732422a6dabe11c3ab15b3b76ac9a4979328f
SHA256317038cebf316946cbd3c5451936ca752dbaeaa16d0ac1bf136695cf975b14d3
SHA512b118f133fb49a2a1d49b3ad6a073b07a7d01f02474256609870d842f3aae6849cc311a581de5577fd8bae2f1cc239d93a57580b448f14d5856880a1a1274e169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5754c95a30a33a874a34abf86ee9d1dde
SHA17b3cff59583bcd5d3a8e7172327f29c37ca97500
SHA256fb1abc98fcd4d786abc6976e1959e1383599635adaf7aa1f19c1ecc0f3ae7ccf
SHA5124a8d69620edbfdf176240bfe8404dd93bc2dd1ae8b03e42b078800de78d07f1dc8255c40b5823d96439c455efc8dc241c69332381a39b9b6d4dbf33f136df713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbf5c084fdc7e031d6303af73ea370e3
SHA1e80a49b700571a448ab02ac7e2966871d436027f
SHA256a11ff1798e655beac5a40e72e5bc2bc21cc7d2715d5767674613af0970eacf7f
SHA512eb12e801240bc234cfdbaa743108f4a1f137ec2a7f7983a764561aa4ab64a47d1070c2c83b3ff7ec41e03608e8a189a58da6e2d9ccf304bf875f6139b2e5a013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d8391a21a8948418db972b97775e43
SHA1d1acc784b57dcac6ccde1aa3b45b3d7d416f2d75
SHA2568a26de8346cd9fa4709579ec1b7ea751cb1c72cac8b996ae8cebde6f11d57a05
SHA512f7337b40a2413ee23397b37685ece51b586eb2ca228fbfb2801372e71371caa350f7b771ad830caf0bf73c9d8c286de3ece8d5d1b0f0e46356c1466696af48f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582c72e7af6adc96de1d73d734b060027
SHA17f430d673511ba5402566988292e47e61e1a3beb
SHA25615e98bd6ca069ad0472980428f86eda33f420dc925954a150bb692c644e44b5d
SHA51229a8f3931666c719644a5406dd27e9a116d0fb15c870c8dfb964ae8acd4e9a0094e42f445fe71b58ef6f588943d680ca6f43ebc10c4a3b3b957808fa0ec28a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c6cbdcd7660e2a48cc61a47192431e
SHA1903e33af64b408f710f30d752ae3ce31b64b3118
SHA256d7e6328c274411d4caddf007b44c577c0521a1d842621d49486d61503a28b865
SHA5122281d3a4e4306468234344e6b43a7a334255cd581338102e7bba4a659718de60645ce4091725247b6fe6c3cd42f0e9d59bf684b573d40da3bb9113b4746cdb5c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a