Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
40687b9d5170eb7494741c991a195fc5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
40687b9d5170eb7494741c991a195fc5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40687b9d5170eb7494741c991a195fc5_JaffaCakes118.html
-
Size
27KB
-
MD5
40687b9d5170eb7494741c991a195fc5
-
SHA1
056bd32de5039df827a89d7544fe67d77bcd12ab
-
SHA256
cdac4aba430f7ea43325bcb965b40022f351fc66c458bca17ee3153335773b1f
-
SHA512
36132546a0d79c854b61de6f98f9eb1390724dca0bc4262b111dd89deb06288a64b0bdf265c9c1d7a860158738bb96638f27c9d4b6ad76c5d637a5d448e873c7
-
SSDEEP
384:SdEa6hiqFKfvuCcV4UfAF/BsPBLzuYx+xXrsFH2ntKBFOCQTIhvcKAXE4:Sdm8lfvjU4UfkUBOY89ztKyKqE4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD797451-1146-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000de43b1eb4b5deada9453c7c9ccd6ced177b3081afc5d1d92ea9faf346bd28b2e000000000e800000000200002000000061b280b0a1076d3231f102d89ce48bfe31894a16f2546256f54ceaed8e783f0620000000aa62dca855e7d1a857a4084b09d2d75b5b4b48c93665009f8acd0ac6500b7b9a400000002d8d4a00ac4dee47f8a83cec68ede377cb75246451646af60b4f4fcf598ed94884b49ac824bac0fb996b85f65a0a97828928e8e6e0901b94330705d9b0e62897 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a6161406eb7552438e74f3cac6b50d08c607255471fa0227f798e2e349804bf5000000000e8000000002000020000000eaab883b9e09007eaefd0b88975387d0554a0b764a28ad13ab96fa978b68d06390000000ec9d28fa72f9f595b07ed74d158cab149f41c15e7571c395250aba38e472d0eff513faed17073736a21876ff2125e5a0999e2d121b9e2588c12017cedf3c372da93f2c25e14d791b3a232b1f2846a0be34b1a80c757a8d4671db8b9ad369387a2797be80ff4020ed569f98b2e7be3be99cdb58e4a2afe88ca8ce72420a7900fb4337afcd91d4aa8e9ba06445650665704000000002a27f99fa60814b5f6b643ec9da7c6e67bbccb3c818987e1986689d22ddcdf8bf59acb07a1515393b0d03afbcc71c51988e7d0d9d034ec8779c5098ca497f47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004448b253a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421780021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2936 2208 iexplore.exe 28 PID 2208 wrote to memory of 2936 2208 iexplore.exe 28 PID 2208 wrote to memory of 2936 2208 iexplore.exe 28 PID 2208 wrote to memory of 2936 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40687b9d5170eb7494741c991a195fc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb9aa80557a85e5e8e4558bbf4fcb1d
SHA1d4281b13c11a96d6ccfcf1bd32d3c00ec888d994
SHA2567b1a21f9d8173daed85fd75bb353e407220c3bc5abc101acbf91f9519c2a9728
SHA512c03c2b023c403c7d94fabee21b6df29703675d3f75434d21b60935057d6daeac19c52993fbe965aa987bb7a17dab8a4c8ad1c6109d2e1f9d872f35409e941608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d650c3e1c21ff0961aa5d308e0170c53
SHA115be62bf15a8fe4a5abb1e917d3a96ce6f70633f
SHA256e200c3fe6103336479e3205a887ad199f73c2708214e2df8c7dfc75d253f8751
SHA512c51513efa30d5c207232904a8f864ccd367c73b81629f0b8258f428b963227a76f1de62290f7495676664dd29f5bb215d7b2a7ca282222f1ef7803719a7e7b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c908d22a55b3867902c76a519a47257c
SHA12dca8b1dd940cc3b4d410cc8d0e4de26894882a3
SHA2563d196e8b42637e7d600be4aed3871441cc4d9a975647c34f499038b4f65f4bc9
SHA5128a5bbc78922ade743da2b597dab86e9479a0b3aa6ab6702998495a556cc1d152a3ffd0374029e049d9ce2cbe10a710687807b884b3e15a2dd481833925078d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f9a1bcee170276030ac2d159c5fddf
SHA1b04489ec6c47edd5b461b92ca1b41176a2cacea4
SHA25613a4ffafad9e40c58d1be75efc95b3c28cf99837410248ad51718a6b6d50b5e6
SHA512164af1671fca2034af5820e7492ec07d2c5a28d92bf321213be881c3547e9c7f70868d1ff3522b96543cf39dc9c0a3be0e3d0b3b5b2e7fe8baf70eb42d33db29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5652820168df368fda01a627a1e8a9331
SHA1b18c9f6a43ceee18aa16b7ca70b0cc6c9fbad8ec
SHA256254315f7ffd3f7bfbe17fb01a1f011e0d67aff1081cc531b129d6a99d5f363d1
SHA512022e41edf090a3d1168886daa8d155faa31d55cccc33a5a641efe6d333972c5e87126142e1b4a7e8f3852162f2939f25113371df0fd79af6294a88ace3b9e64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a72f26483540e353e3d7892b1213d49
SHA1d27326f49153771e1d87fd74aefa3cc41c7f46ff
SHA2569732f125cb7e9e62358efb6376606dc83967eeb50cc322571cce7d207d160c92
SHA512571f1724ae49e961003d9521ed4fdb701e3272d55a916a48c832bdefa80f02b80e6bff71ebff5e5443ca2ddb30953da8006022a9e44bc00302a257752c879683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555c13e8be69fb6c87cdca3d0d4346b97
SHA103a995c0483bad9965aa9f1314070d873fb75158
SHA256f5c0c462ae6a4466e6e6744b80a75bffcc421ad5e4c9cfbda60275918385d185
SHA512a039d218646ae73f7d3883743376e2f5faa3ed0044d321e62c4bbf1b38b03552094e08d6376df3043ec604e9de2424976f6bf0102aa4957a964533eafb5523ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505eeae3b0b15897576152e967592fb6b
SHA17e00c5a230e1b70c9452e3d5b7180dc63ae20709
SHA2560185fda7dd1a9298159ef1c7d3dce1b71d7aa8fa213f7fd054fcd2a7c97b7948
SHA51217cd35bf4730cc5ed3f9a8845267fe2625388cb50651775c539e45aa523b91a91c8acc4739fa1b921eac17d35a8cfc00dd5a2baad669a0a7780dea703f3b534c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df000c0c756eea7d1558cd92e5e252c
SHA112919cff418e94d990ee1ca51bb1d9f4f7408e87
SHA2568a09b2ba04ca56a47dbfdc1f691719417da91fd25f58585341c6923ae389b655
SHA51281ab35b2294c277aab65cb8a708aea3614f7da65a0c842262ac2185f2b6e960983607a9f2e9f86b055a387df68cf9ecdbb3afbbb8f8165e3f2c391e8821280ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf7d78f7ad22184f088481666ff405f6
SHA12afe29cd7b9530c50cd48c53cb91bdb10998a05c
SHA256ee08eece0a564bf66c6113b5d97ca86af15e8dd50e64e251a8b452ebe62464af
SHA51214d050fe2faef67495c2459d2d5afa475daaa319933d1ef824012f850fe68bfe26765e188fb0b6275e8e01f3d5aff23fc3921fc7a0bc8657f03360da8054f595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e9f98d5d3d0ed5690c4b1ea14d33be3
SHA1750971533befdf80c4b97959612f744278a0abde
SHA2563469116a0e95ba3a11d818736581f82fb78e07de4d531587a3554cbd0264b408
SHA512446c4d2b2d39670d2c07e1df24b91999aa51a458d05e584fcd838a6bd5eba1530d46d274b6f31272d9be5c6f7510829430c46bcd959b8a5dd6606316aec0a75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ccc2afd85417ec23307f072a136fee
SHA19933d55c76c1676a4d663a819be028285ed984c1
SHA256dfa3400015781b976cf2506861b1f4e77cbecdb375cfed6b65c91fc824953f7c
SHA512f4f7840aa6385f7562dcce84d43534b4de61615ca873207483189f85c9978b11d33e423caa283f8ab01e5b4fe1af3f64e0f08225261bdf17e82727db45984ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b9121ab240bebe16108daa1faf29d6
SHA1670b34a2cd3d965b200ab7e98ef1def79a1c199b
SHA256f7a9669a5e6d0455e583980ed379352d439d4a0bd7ed52b9f79543be03776b49
SHA51273d8b86e8e10099309f34c9c2a5528775efa5d096481aa0fbf7f23b6ee216ce9c4795fa31f14170eb7f133936564d249983853cfcf8d533c405066d09a91e1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f12fa706e06b76ebf45297e1a9daa853
SHA1d8dd2eeb981fcf8d0cb57f2c6e031f5c74b888ed
SHA25606df737215348a0776caa90991150045ce16fb3fca3d80c6c495d32914320044
SHA51219060db902da48aa1634079e2bc4698f3e8032f2660b71b48f67ac6b43282f695051d2e3901fb790f7cbb324001a686b4999264bddfadb0f93ac7c7f298f772a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6b90f233bbb78d75dcc434c5a27b488
SHA1e9e59081abdcc3cc9708af194feb970b34dcc106
SHA25654e638feaf133cdebb7408a0613281bb3ef2b5ca3a0bb8e4118335a66baffe8f
SHA5126f341bcf6a1a196af9606235bb23fa15505cdfd7336e700400f3b07cf4442ea3d44d21b7d0a69e0c4c7839b3d6f0066f341792cfaba2869e511fa5ff7440c375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbebc765ff8e3f481c71a40ee408c8b5
SHA149f088adf8bc660f62dd980c06cb45795f950539
SHA256a4ae31161b3ca0c3d61e98bd939fad4ea7787b4455d3ca8b267f8f1e7925a8ff
SHA512ff6e7b06e5066ae652100f7e8f0b99c0d49cf4ae03ca31442df7f4ece4b3ba516dfdf061d74e72ba730c0ef3535af1c506ee6c7b65ab0ab00650d7e5fed8a578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5251fe7f12e6524068ae80651a0e15069
SHA18071d203c4f430554999663a158000b0674f8d86
SHA256fe08469d11773ba71617754bc44aade1c8281aa20c6147a3788d4d9835916c38
SHA5129126aaf61b50760ccec29e534e69153fd49cc51757a324014e3a4391cea605296319a1203e59643ad5a51f72e96c86080dd4c45894e469d0746e8c1de0f99f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57162b1a89ce3db989b1f514cd87cdbdb
SHA189482d388db531bdd0321124470c1922a376b656
SHA256d6fa248f4b02959ccfd8118d46f88cafa951c2e71e3dc663d7d7c94a3bd2e3e4
SHA5127f16d07adc97ff1edca2aa8f204afda6457076b63c0a8c2238d4fbaca09a766d42477c5628e77d45e4d9469f73f5bc5328498865aa584d404acba6542d4a2bf3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\suckerfish[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\wp-emoji-release.min[1].htm
Filesize124B
MD56d282db8a2eb7e90ba167f313618d5a3
SHA15417a9d0f2a8163d5b22e33b3b30930a3ccbcfc6
SHA2567ce2010ebefb7068cdfa597ee15c053c9149468593338b67389254656a08de9f
SHA512fa72ab6960db52e76bbbd453d4aec5ab30aa465fe8a36a0f7f673272eb81094afabf094300f3f9cd5919d4b40c2c89117dcbd2dcfe09435336a03ad74d7744a2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a