Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
3a93a34e3ba46b182a6812e095868d20_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3a93a34e3ba46b182a6812e095868d20_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a93a34e3ba46b182a6812e095868d20_JaffaCakes118.html
-
Size
62KB
-
MD5
3a93a34e3ba46b182a6812e095868d20
-
SHA1
1de3ca35c66d2fd9041d018649f9d07165cce60f
-
SHA256
8e48d1c90ab27d0c2452f1c4dfdbb144a13f655cd2ce47d481a19b903b4b7df5
-
SHA512
1bbc6a348981362d84a53b642b4c80d5fd8df7e61ff402172b0ab28bd52f050c6a0e4fb96a579749dfe6d96d9aa1128103b4953477f481e4a57cca8f123d7434
-
SSDEEP
768:Jizgc86pGrbXWY7XegJUcMJnoTynC8koTnMdzbBnfBgN8ZKa64QFAG/scL/Ijkyc:J1wngiOThpc0zbrga6vLNniK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ed767247f20fb5648bedf23529685f6fc1e7c5e586e17711e6bff180f9504a46000000000e80000000020000200000008fe02d904d25d71367c55d72782b7d920e824c2a71c657d10496406b3cfa45ed20000000dd54329ccb10e7551d9914c93f1c32994f2caf39ddee0e9c1f64c794617f0a57400000007b72d3eacc7b125546ef56b1316d1f711604138e2a071c5b5713c4b79d0d6fd784aaa835118d72e71fa657211ca27d53d4e5dae54aa6bd4b69fba23757e0bfba iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A71FF041-106B-11EF-92B8-52226696DE45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a039cf7b78a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004619b13c34ed50df23667203ad1276f90e90aec23fa9c25bd97ae1bf2d09eef3000000000e8000000002000020000000cafcafae751714966c52372146f02398b61a449c36056ffb2f205304e3cb545d90000000d90c7ee0dd7459cb02b0fb7be81ecd8e7c28b872cce024eddbe2149b604aedf8289ea43a6255fa0a39e90c9faf678201868f2eaca7152408176399c628e3c2688c3d8d18b672aa3544a61f1ff9c357c53e071718280848d6bfa6d3dc22888e218a0dda1f8106b7425ca412ad4f89360c2e449020dd974aeb5f3b04d39dc6922702d18dc62d8513d0de7bd485b1044dac40000000b3651213df93cddd02102041fb31e5ae9f7886ab0c26550841f4e5dbae2d0d75a43d2faefaccb44cedea2616aa882e90a773609f151d053bbe2733cb33dc1642 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421685869" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2124 2208 iexplore.exe 28 PID 2208 wrote to memory of 2124 2208 iexplore.exe 28 PID 2208 wrote to memory of 2124 2208 iexplore.exe 28 PID 2208 wrote to memory of 2124 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a93a34e3ba46b182a6812e095868d20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aca3628da26af019dd3d70289a279c4
SHA188c08d9dc7654d795584a76249d1c3cadf6f3e55
SHA256a3c5cb82a2b5a4590cc1c5d4bbba523dbdf6380f063cf4c63ca955ebec629283
SHA512a280e7b44e6b38b8c3fa1b78ea1e2d424c82663f15fb2ecc2194ba618df07f79dc7ea0669193d281d671058b943297bd848a808ea9c133c469a7eca09dd62a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae5da97cc5547d0d50f6f3b4d73975e7
SHA1952acf2389925179d3ee47e6a3b97f02b7fed56e
SHA2565929eb7cb1cd6e1b934b32008fe00849adb0d9d753e73dfa1ed331b27f48fde7
SHA512b86d7e4d439a1b2536bb726b1a98f3eaeeb01c262857db00779da2cd1b904fb8a5eb94e0130459ee5573b8b3ab318fe4e917002841e2f8473ad0149909a1af7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd235509bd5b7a25e82480477c42887c
SHA16278dc05c32e683396792dc11625313fcbb58af6
SHA2568e3d8f8b9adca767af1899304b9a0018427d229153a9ee3cc71d9d09504c4310
SHA5122a3a4d3788598ffa1959234f0ad727e9fc66445d1f389474bc20345e398bc64751e564b66bbb5fa5804972b7eb9c2470b89c8fa3d2ccaf834f6bc3d7907fc4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e6cc65cd024423e7b72ca80e304bf8
SHA190da4cf390df18875769d720ae6f7b169f0b4470
SHA256100cfd827e94f0a038719491657af67bba1e83ebc82204ae01a8a902aacb0cf6
SHA51253805d8d81a11854a40fc502527bb381e570429e5948ac812e8407e4f3300ac6de5e73ccc553f363136a7e46f79d01ff7e70b789fbff5f76cb7c5c47691a87f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588195caafff4d8d02bdb117195c7b821
SHA14c9242eacad7fdc23d89e529ea7c5cf132482b03
SHA25666d76cbae8696c97d6da148f45655f98e29c3c6fbcbeff4f1e3cd72823494fbd
SHA512e218c56b3bb83846c9788092a2adfaf4ca32e80411c0dccdde97399310487f25f0c4d1959d2296880b2ccbf36d6b49aff76e463ac6cf3d6afa97e984b428f5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a217c45dbe131b975a381289e29bad3
SHA105ce8c65fcc7a7d2b60461124cf12d8fde3164e5
SHA25651e5b3ceb8bc17e9ec3f68ac5f789caddc78d8799bcf8f7cce8b7a4069614149
SHA5120f21c5c34ad0f59c034127696502ffc73f7bf86c528645fc7f7b3a9feb3b7406186f23a191e753929705de4216e5b1839ddb4a1f20a35611c3971c5debdb6176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cda4c2cf6b5c6778529226c728c4c7d
SHA1d11ef6a099aca79fd646e1279e43d65d67560875
SHA256dd4a55fc99624282636574d561d63e90798ebec7423293a699065cdca1eaeb96
SHA512f05f7eeed4e27da72823a23fc3a05c9af566e28c73ad45b238592debaae4e3ae2b30864679b1094b0eaf82fc8636ff99d9a45e746f44384d2f1b6dfeb4c7a5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43679ec9ef80ae48bef45e48f82906c
SHA1f80f1b0817880d0df2f79ed9ebf5da66edbc20da
SHA2565007388b9d39f3925c8f8dc3689f693eaf2eb81a30c37a5e4dd915a3909f9981
SHA5122c115afc3d239ed21517bea1d5faa25fe88f2f08c3810a97e919f0b10b891e98115f020cbdb52eade8d6175354acee0e259325016bd7f43b54d40891c8732653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f90bf3ec2834dd1f860ad0a05b3af81c
SHA1b0a979ec579ca4cb8bebc321923e87131ad234fb
SHA25681bb91bac357f94ac3d04c4b685ee4c5b2b29911bc934e693162dbbfbedf0ae2
SHA5125a3a38e026404cbafdd240b64248e55f7c4c4f5e646dbc61d17e23abc7bb96fd238e6fd0daa570932575be675bd8cd5d23bac57dbaa1e2b71f816620fe47c9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4533c331d3143edf1c2b2d5bd03be49
SHA101f58a1b5a20a2a76ada165bbb491e7a55cdb11b
SHA25646c55d8b225580a8b13a896ee20d601c6c84e85c8ce74e6e8b83840686b0bba1
SHA5126fe19c554c794fa58f762f0cf86ba24d8d801132adcfefa865c91c39cc197e71fa75b737475837b566859c44b4ff6c488582cc251a84edbefc265bc4ff9a9790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e23b8134df3063416bd9850e0bcf07
SHA1f9d46179ea293f7889b33b7dbfd656fd12a114fd
SHA256927d923f1d351279afe7217c4b98891dc405f10d109dcf22ee55171099788738
SHA512c66235b20e8ae356dae5140b798a46240a3216f72ae54f283ebab16839b4edee377b5c16b648571488faa2b954cec55c447df78ed4c1177c2d73b4ab87b9b06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54357584d6e80fe974d0ed685e09db5e6
SHA10a55b2d9037f71987f487597d3b7dd31d0691702
SHA25642e3e9a08d12948ed0bf7b3a74a1d4fe3ca9a3a47314654df17122227edabfda
SHA5120364b183a63e1823289d8da6e9e18bfdbfb5a9ed3ca6bf9736c1a847d5df2b61ade8efa490cea721e739ad2e9440e78cd1b8c470d4eb31f4acbda45561020d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51220eb05a88d19a9eb1b500b9928cd6f
SHA182c62d8b859436992ee3d198cec3e7167351c324
SHA256f06e80dbd6230981b450cb3a8c0485048ef884c4c6d71f446d311dee44ed0b22
SHA512010ff6f4b20b9d3f45cb705a5fea6238d2c5d19c37ae29d8d1931715351367bfa9a662e012ba5f1dc843b0321c80680b3c5b147bb5d481f329dab4b8bb1a9a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fe6cd84a7017347afa449cb2afa72b
SHA104e7830fe63a714bfc9df13bd440ad79b9fcbc71
SHA2568584a0eb40703c1f43df5dd3f89d79d038a204711a7097e6a2c1102e96fe53ab
SHA512676c09ac8d8dfab918e091a9f2ebc065ebeba7785dd1e941b3374d1340da3fc1ba054ca966b7b05919ce3120e37d85fb10aba9f9b30bdf6d6e934e210d035478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc2995b0d4a442355d6ef889ba0dd13
SHA117a02f58c2d84ff151d499c1af9469369ef4f7ca
SHA25650b0ddc6449c48a7af911c692ba39602e8c554c6935c482dcfbe551ecb29af4c
SHA512079fc87ac5f9871d9f346273f21647d3e9f28dd16a497630e162c2e39c347e25f4c17f4c4ceebb760e6bfb159873f99214b7c8efb840e37a6a3054b8d84180e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59311f539f704a712f9cdd813b0f5b1b3
SHA1a94e9edff316ed8cf8507c9a0b6fc576e937299f
SHA256a16b0f745a9a760842b8f622e26cc07b2f5ff3d489a6ccce072dd1b126767f2b
SHA51213742f21e451ba1077cc4fd39fd2821921fd4d00d0fb8e8c60408a517d46aacdfbbdacdbe1854afbd44fedda73114dbdb446b2190c66a720e572d8096ed5daa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d2be1109c616c1ac8ddd5db630c2e8e
SHA12c22331906e51a3a442fbe22877f72658267e762
SHA2561622ce65377df103aeb2521e58c3a438bea86719c3d6de10d696a5a88cdfa552
SHA5121b9429fbc9c5f19910aa5f1e4ecd49b30f1328bda78f8852125d1545024b31f3a6d2f409fd618180d338a029d9a04f40be21c76326c69fd426f378cb04e8aa57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19f65696390a7601a46ac2bcbe35410
SHA1f1b8a17d7f9e3bf892d301c73fc33bc6277b7682
SHA256c0679b55d008ac3729632ece932472a47dae41347a80c0b08defded5c1233051
SHA5122cf5841c599b1304530013cb2a49c61cae187f2149a878ec97f584792abe6f87420ea5fc590515c1f40bc52535705d7cc1aa0f33d7b19f189d15f3858a031452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56be1442667944d5044a1e62aebaefa36
SHA1b73603c22cc6e7f4bb90c1e2932d0ac0c974e69d
SHA2568fca8d08ee6fa0cde3ab0cf3205d24ef513c18358f87f00206a2f8d1d8ee7bd1
SHA5128ebaf76d96dc8063be19ed83f7053d25670f554a0b328a3f3881f577d3527c67283f0a818c84dfc02a85b2060873f3b002d58240111d0aea4646d1367646a3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7535a82b9ac4e170c3aaf28f51553b3
SHA1659331100ed62e5a70bc5dfe00f98535bbfd6ba3
SHA2567235da6efc9f26216df467a5f7fab0ccfe24ce7630d2d2dbc852365635722033
SHA512a01ca379aab144796698ec770415e57062e371676ea8a9291046789b7ddbc2ee5ca94e156a064dd9e880b004863c239f650edfce1ebc267c0b3fb321be46544e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a