Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
1281a40425305633c9e009b0b03aa0c4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1281a40425305633c9e009b0b03aa0c4_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1281a40425305633c9e009b0b03aa0c4_JaffaCakes118.html
-
Size
4KB
-
MD5
1281a40425305633c9e009b0b03aa0c4
-
SHA1
cbf4da5cadf3a593a2be1f5093939fe14f1b089f
-
SHA256
5de647e002c40e14b2898c00911fa63371545ced926919c5de21da650141c997
-
SHA512
7983ac275b159e46cab3433d5669588836638ef4a54bedcc6566cc3933ab69dbc5c3fd162566bbfc80775634fbd79a6ec33eb0cb8d611622bbc45df57dae6e2b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oDx+d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDt
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006b468c52109983d27520059e171a4482468d3b671bbe45dbac74045437d0f11d000000000e8000000002000020000000afc71864e1551dd6aaa0d77cb0b568b37ec270c3aa999c6ed4b283999c02e6aa200000003853d354c8da6f951312de749b2e05147504f496ac2e7188e4d6715e62d1119440000000698f6d12dfaf4e8ef444250c337c3e7e58c8d9234ab21a1f12d5bcf165cd69444d8a8096775bcb6483ac8bc8c97640b0575230f5c7782d787600775c02183786 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9958FB1-0A08-11EF-A1A5-568B85A61596} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420983646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90071e7e159eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000fd70c3cea9f7c4721419ff56844fb9145de23c0fceae726c26d25ae7ae39fa09000000000e800000000200002000000074066db634dd9f5c3a8e92b70aafdae20b2c71da47694ec812e9140df19a15fb900000005eac54c05ae3cfddee6e63443901d5aafaa047bbe4ef140ee7e72f697c24854b9941b71cf27f4d74b39b840f99ab3accd48794c63a3d42bea1c1aef008b36dcc19bbea366202f447848579d5cebc0b94a6cf652649428d7becc4c0528c0cbf894359c20eeb247ebd76ebfa9b38322c6da77194f1280174868f3295da66a7540f64059ef477c868834f922f7bd48edf164000000067463db97f1df655caf9acc8676667b71268ca5389b9a04252d2d69a6a8f1c5b25258b1b52f3ee7797ae2c70fe517f08574b756695cc9b7eb4edb9e062993e18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2508 2356 iexplore.exe 28 PID 2356 wrote to memory of 2508 2356 iexplore.exe 28 PID 2356 wrote to memory of 2508 2356 iexplore.exe 28 PID 2356 wrote to memory of 2508 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1281a40425305633c9e009b0b03aa0c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd93997e4cd1702517144d0f39e5bda
SHA13d90aea500d11fc44755787f6684367609d95048
SHA25664c8546c1398a9deeb83bfd58236b26ea0bfd9435fdea7598e9340ef8f660d6c
SHA512ddf329ec32baf8fb4fcd8d57225cc16e5dbda60400336dd08ae9e4b9e76921892369c3dd7c5779c888bcbad8362b3352e191dc59788775730239301789ad3b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e4fc247a1a695c8d3409b56caab6b4
SHA1951198ae1ae85a7adac75d3c95220642acaeae98
SHA25697ba851ba10e963e8d5635571c25e3682ba82b77b40e5b27da32b4e329b58b1d
SHA512f3e8da19e42053a033208d7c27c0dbcda2e3cd8f56ca3e986ea96a92ab37ba4b2ec22d7c5de246f2e181bf63a3cebe0c64e18404169592c11006b80b8889c168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547bf8ebe54160492a0c517b16813b632
SHA144ac63828e3cdece0e88b85c843cec0adf506d0a
SHA2562fd4c608eafcb18f25b01285bb93998beb42f4b30bcd13f0aa956e9ee551efef
SHA512b80981dd34f95a39286ef1f63b2d1969fcdc535ef09f0734aa602307554aa5cc03202e4fff7513616ef49eb64306983545d3728b65e2e625fd11361727683471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863658b7913b8949557eb092af1ef3c2
SHA1323fa5f1e0950141b3e21fee3b487b78a02d9d86
SHA256b2fdbee38bb060cd84414e64632544ee9f09205429c9315b3f60ab02fea1c78b
SHA51280b6c6a7122650519bd116e7bfe1828e66bc86157c597f3e380c887d84f03c189ecdebd18785184eac1d3c552893502b05a0b2111fc6f5e728ac1840e32cb188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f08e9c27c1736827ae452b3911f4ac5
SHA14df5750175b511234df43c5eff1e2a972a707628
SHA256da93ec286d23b0cb3bce306c554815bdf4563f3f1f56d88fb032384d8745ff03
SHA51216ee8ba795d39931c45fa3ef308f1418a8f24d5a30db445a8332b62ab6267692ee3cbb161ec72b3c07175b71a18ef5bb15ba0b7aa52154f15f58d56b4a5de8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdd78fd4b20dea756c1097637fc13a5f
SHA1a7bb88830db154f869cfbd5e25fffad8677fcb0c
SHA25640aee176be5a797cce75fc83653d5be15eb4a96896ad2c1b7754b30413c7acb9
SHA51203260013f4912475c203bf6a0ad99a8bb860f5efadd4f6f74f038901fbfeb57a60526714f76ab7809f21102d16c9658a13bb117260ea429bb60ff484e406e409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ce57830d87b6ceedd34df0a8e65f23
SHA10ece7fc8b32de97a9d3e680ebcb50df507f54bad
SHA25671746e9db52ce433dc67854cb4853baed98870dfac25e53d51023613c1a1f898
SHA512eeedfa106f4127b08b9fc7e2b897b1587b4426874e15b50060e60ac1e8edc3aa456baa661f502c29435dc492e3ade850f513fc43c6df7a3c28ed50d02d700ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556266c05cc573d24b7d7d1d89a86b081
SHA15982e6ecea5ee94197265545d2798f4f9b014d78
SHA256c1546dfd07a5a77aa5a11107aa18a741310cb0107a105b8c0182c1a230fdffc3
SHA512cf8f02e0e5a35972466d01011a8dd40dde4b086bfd92a86b3fd8a9b6b1800faa925d908886c140bd8a9de2d8a2b5a24157b69ae0c9e6a6a8a7fb2a01921887b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8254befeee9c00891513605977f9d6c
SHA1b91872edfbb7f566569212654572cbe7ae8c4409
SHA256ab068296f85a970e56b47258c9760f517e03a0786fcd16b4c14c200002430d26
SHA512ca6014598f9d032299674ea5296c78895fc86c076719cc82feb3213f895ba99060dbd4c6cf77ac6af74b4bf30d587961b1b56714440242c4c9b42aa704be6e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563b3ddd1e34ad9ec8e743fcf308a4939
SHA16ef3b205630c1d3b5ce7bc4186d60485cd533ec8
SHA256712da61fcc30e1d175b30bb6492aed9c6a0812815fa08c9864cf1577b8f01977
SHA512e09de0a6778704a4da401d59c009ec0ec6efd519ffd9c298115c05ddd05679f4b5594f3fa5692979f692d0a1dbdd6e7146a7c2a68c863adb011b2330c6bb6972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ee5fda9d506cc7656f69180d552599
SHA1f73e8e73caf793a6f33b08794ce0dc28e0097ed5
SHA25674920b0ddf9fa67d311677fa66daaea4ef351569af9f3a8df65badad0b5a45fb
SHA512fe16d4f9ff4f3c244a96431d8d613d78757c521cc1e162c06efe445d396a0a9a048557841aca1bf5c2d4f7b74bfc28f47277f35989901a7a4d7b6e60ba33dfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d35bd1d372f4d2ad926c0cd1c817d46
SHA1b3dfcdabcfbd5e35bff5da81b6c5d65b3d42134e
SHA256e6200a5b48eae5f74e4e2d81d803815511bc2795a1eb5c85ce02ad0eb3010c57
SHA512889b9eefeb61806c1bd62665f8387a603606736281b10b51b49121cf9d7b6310a94d8bd3459ae4a7d51f4186222e4fe0ab21baec6373d263748dc7254dd25132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffe856731c2ae3b23dd57a65bb49a4c1
SHA101795ef41b206f9c2e6203fa71febaa5caa8e874
SHA25607230c24229a572f69bbf4dd9550b34238b3487c3b058bb9a6d95ce5f7a52916
SHA512bd0aa1b9a45c8e2b10aa5620f61a664632a6983cbb0533543241b115bd7eab475edd5d3d1dba244812c783d1cfc0701779e72041d8760e55320c80b4d91b0a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559282e72922de55456fa950f00de0462
SHA1351222969e31f7df44eda72fb5b80592849ecd82
SHA256d162a9ccc1edcd47ea92336a537233a7586f10c3053e094979d18d4c17a0076c
SHA5125b75f64ead13bd702a9c1ee2c5b712952f6a60588de5c04700e59d581031b7c0a71ea8ff6222be31eee10148382f7426aa826f572ed5209f62746c21a7142e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5befcab2c40c8492153517641ee85f22f
SHA1f2735e23dfb18ababfaac5419668658737eb0b9d
SHA256b5154d09f8a1540f7bdf4b896bdfbc37566a71944b62dd0e5ef7aa3766c3494e
SHA51231b239ffce7fed675390e3ba1adffd2ed10ba3580d456490c45cd222c76cc2c798dd6a13f81685d825cd248a82c4096dba0f9dee963ebd5b0a92ded7a15bd318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2239dee31bf2d8ba791b75f59285c46
SHA116a9dbda8b568ce3215663ccd316e188e18418e8
SHA25685da1c9e80c36a2989e8bd5efa687fc83ed3aea30964fd31f860a1c9f2b6e497
SHA51273015d59874b9a7b0beb2dc06163fead3a641e50d70afa65125c63f11ecf5ec3aa7b50cdc2da4cbba57e3c09163b5bd1389b64c75ecf46bef7cad92a945f5372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b164f6958636249ea30e604cc2ca8f
SHA12881743df3b1e60e8e3e81f1f2f0230ae8965757
SHA2562cb8d5e53b7db712a3d0ebd2cb355169533f1b5ff6b3ad93194eb6057f4a1609
SHA5129cf6dd8181a917d644773ceb20e91c268a20d433fe0dcb8ee948ec14b4a345bc8e47f51ed7e9c9ce38948bde863f4fcb106b7f476aa626908f562f9092424850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5b3341817d1e174cb2457d8b4dd79b
SHA13751e9060d2a92a4728e4ee56d25fc91ab079d9b
SHA256419e1cecb1383b46fb0fee0a36f456d23514572c67e39440ff9a9f083162685c
SHA5120f2a938853ae5eae26a896bd80d824cdcef5f8d22ec2bbbb2dd0393f48c7de78304cfaea125175149ef765a6d3c49d84168894d0ce81422646825f1cd7b0d45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef7a17705e741c15787ae14da6d2f1bd
SHA15c1f40defde87383a2eab2adcc698e759b7c18fe
SHA256baa038e8e403893469fc2d55fecb586574387bc5836b6944dd77a471c0280583
SHA5125ad5fa8f1eaa3bab27dc0773ba2f68c02723fb01a1d4583868f57cc7a8a183a477f0480aa51c2df7ae1ef52a18f7c99c3db4f292e5cfac55c20b38f4eb4be085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b247bcf35f9ea18d294c4083b3363120
SHA12704d744ddce0f50da35dd00049578b365830ff8
SHA25634a8fdcc63d3c1af9417a5fd1607f2789d060ac8b1e812d16895c6c21931164b
SHA512968da65d62e420a3e2340f7e3d0f1967e15ef46d326675c5179704a869024c81569020b074adcde168c9a3dd9ee17018d45d36cd5b53ebebbdbd4a1df711a7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561df405f3f48737d2c9eece1cfda975b
SHA1097c6dbee79c0f0909c9a8e87436e9791d9340d2
SHA2566e2eff161c96618516af7d1fd08ed3701f6f86bbb067f06186a9675190244dcf
SHA51247b0621bece57923cda25a0f9202c70a70840946e6863572a7d6978887dd2bfada91e2f3e07e8bc04ecd4fb2ab053e2c76929c39f130776c0f337edb2531d414
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a