Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html
-
Size
19KB
-
MD5
405162d2a2cc5025702d8329ac72735d
-
SHA1
77916adb3a06c3b24e78332b7234de0122b841c1
-
SHA256
600f3df1679b42d74435632700a5c79fa39a742a1b17e07bc2f3fdcf802f625d
-
SHA512
d3a10cdf40df2d223002a3d4685101b2e2273dcf2f84355630f744c943528aed4a3a94723688d829e55cc7b4b7376b69e5d23bb992374ec2494e8624ccc8c842
-
SSDEEP
384:NTBEJqs1LjSPh71I6Dkq9/+OaA+Ld895vQHGoHXCgJq+W51zRkIB7iPN:N9se9Dkqo2qHgiV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cf645f50a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000368673a1ddfe8a1ebbff476a3d4f8498cc9abc13befae8477d78cc4928f6ebe0000000000e8000000002000020000000156b98bdb6c46f5e8c43126752541fa8f22d7af51ec875808b2dc6224583f855200000009e6d32b09808757fcff450b93598841b785c1a70bb5091665e6f9f0f6d32c138400000006fa701224dec277eaf09e7144de666df0d36b4bf8a7ff2531efeb8e3fa9ed1cc9ba137dad5418814da896aef27f5dd2c12c85d9c6f1566e0bb1bb207ca1b26ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000007c1083fd26d720b93a44fd3e7e7d4156e71bf890eff60ad6c0e43a103c6b7251000000000e80000000020000200000006980a373b2bc17eec4e60ddc7961c68bd235459569626aa66294ef45023f13ff900000001a04b087194405dc7353f16c6084c5e2396639f3561953e8f89a5aa1a1440c5d81cc279179a5be0db3eab2df9e217edc04c40fe533e3ead065fdb72473e9e912f6571d55bc141eb3e5b55952d0487d89c81f9132fe48adab19d45ea642f71212118739ee101ff64c9f2810383246cb1cf13525afb1c6ea71bcc479fcef4b2d73897dbeeedc9e9fe57aac218442e9e67c400000001d318d008f54c73179d67dbd7e025914250ab9da7796bff22335e6c1e93b73f2c2daf997001f7bf137a1c4be5776a2d9d25f7ba531ca31b5cc749f1f414c405b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421778593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A580501-1143-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2184 2016 iexplore.exe 28 PID 2016 wrote to memory of 2184 2016 iexplore.exe 28 PID 2016 wrote to memory of 2184 2016 iexplore.exe 28 PID 2016 wrote to memory of 2184 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\405162d2a2cc5025702d8329ac72735d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20aff1ebf33d4a5b8118d74a3609511
SHA13a4f5cf647520e96f5648b5460a09ed7ca3e62fb
SHA256bc4c59ebb29b05518c2da46a9797b1e7e096fc82e305558f70900039c371e84b
SHA5127d1c0e2936c3598edd7f3714dc47d51f839c31eba8fdcf31f4eb4251f670a54ba75ca733add30faf7c4f866a9883e1c85908944f1dadd1d38c245946cd8ac2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb56d16621eca0198f9935aeafd501e6
SHA1a553111ba64edae42893f509ff9c29860a5b260b
SHA2562f54eccc8fa8a2bccb485e3ed48c7712620fe2482a4e96fde3df05018e45101a
SHA5126d6d47c47fe0a1e73087744e96ef01c0d8ac9c1d9fd7a38c151ff08543c9f8b8634606dc73666ef047eb2986b401cfce2f3af483dcd8d2cab6d53954dbc94b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc0465dee07d7a92a9a08a4830067cc6
SHA1f3c913fc79f4329e06461967f215e1dea8f4da24
SHA256375832dad7c09a0d7ea30392a4039c533144faef918b01bbdbbdf9bfc749179a
SHA512973ea235f12bf593508d43cb5e8e51782023e0803e93bdd136d98c425aed4a50b4091d5c2f57747a8b690159e2deefe16e29bc4d47388de67b9f248998b3d0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572ef728164a2a4671fc49c9855d60d49
SHA1870b04c617bae766ef89544da48f20803307e41d
SHA256b42fb471b1c2e00250320be696f1c86dca7d39b3a3cbffd9df5813a14b9ac6a0
SHA5123c48e0cbb4bc0b3b91323ac92563c6b90a1e56f8015edd6e26e06969d2eb212ca1dc12687f3afa5dbc538131a83dabbcc8765d2f5461640559adb704bba4dac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1c3f7188c40c71e7fa34fa2a7cbfa06
SHA10d44fceeee5b2d63a572f1d87d98d864b5060eb8
SHA2561ce3d8998e2b8034e5b3548ab602ebccc23998b508a35635c3a6d4b93a63e701
SHA51238842036b62ea06eba5f20b10b0d4fa0f1e28e57a0b06f225a0ff112a3ec555566542951e6836162fb6b31768c389194c87047079a47687fecefa0ea843d281f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8a4c41f1c196669de66b01fd32a23d
SHA106ec03f08c2d08f6e5deb2350817e38757c06ee8
SHA2564e6314eb718e89b3e3ece402efeeaa1f7c83d9cb3494b6af8a04aa20493e180b
SHA5124af7b0dc89ebb297bd7c9a05d1146833ed920d0f4c94f34fc545c068ef4da1469597498808f3c9555c8b8a6be49d3018c1f06d25a0935455bd8704bfd85f9aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b88b81e25321469362c001df3c8c03cb
SHA13b16cb063da7f5454b7c90e218188d7d61ce7e5c
SHA256b08c12648f6277fbc840b8ada75222f7a79cc9c11784c469daa1a339f0d5d457
SHA512413d62b5d7d6edcdfc98d3b0d7293a5b542a40ff493041df212f9ed47feaf19dd7690a23081abba041a1c02d9ca633a79f2190efa47b9199562d93b3d4abbd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58305c743fbed9ecf9c12f21bde85b52c
SHA1f6a3ecdfac0fca1608c6267d2934a973651f4866
SHA256ba085812152f1d0d3a70d50cac54d826c38e675e342d6455e5a62441f73b7739
SHA512cc4dbd1037a5c4c5b87b5d07d296e3cedfe295c43225def3979cf6e72f80364f51cb64c8d5a637065ba91b558c637afd7bc0825dbcbe1fcdb1bf0a7f7d50c809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e3111b59c1c77befccecaeb5916b12
SHA132ed43dffe34db64ba49e9c06887f4460d6cc8bd
SHA256e75ba2fa4d0ba1e77dad4b2f4509a4d574f3705a566d7e4bbb3c4f235c399237
SHA51264d37cf2db352775ff68f3f4f3348c7b782837ea742f47fb0fd67dea143b74b396aae05629faf6b750df6fd979f215d5c5928f2edb501e63045446807180b551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504411fbffb3d8a660ec8bf269111a828
SHA18059d234f70e64fe2a8e8c714b4edea9407534e2
SHA256227e7b5ef6092a7e75db1f385099751131c7c448114c9e7c99e8a5d253f61add
SHA512f8888669e4782566260b37a0e522525fe60ba6f6cd8f21c35b53fd2de520ae02f5a28164b216b03712799716fee2ccdfe815ac522156770143e13b4eb9302ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b623b3036284736a3b390135e092ecc
SHA1894bdd91b5d2bcf2306aa16432bc223f2bd8cee2
SHA25674fdb214c4b6025ccb31ce47ccd6b8f180a833b02a6166680c994c99ae2aaa5e
SHA51273498e86d2f7da360d8d9fbcf7032f689203b2aff878365ae7eba7358a0859a48bfbcbf7a0198eb66029121182fc692218f236bfe556ed7fe3f51ead84521a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f70492ac58d31d8503ec3a5748369a0
SHA13093eff03ed4f46974d1660e0ca23674f90d49ce
SHA2562eb84466692be88af80219aa820174f4e7812451258c8072e189182fb3945342
SHA51270c57d757205afde95541b3047b6706aa3e3e569edb031b75820dbde82b5e3febe53a101c7e0189bab9b6a3aae333ad3967fa4219ce5a150e3bedbcf0329f907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f7c8708847ad42fcbf8abfe1e04bd1
SHA1187b2ebdd63db60726bcf4ae9ab57252124f856d
SHA2565f9256525f638a25dc0e4d9b6ea7496c42d82647530d809f819db44fc00b0ea3
SHA51230882c6589a7c0fa43d365dce1f35a7c16ad2ad2a2f404636fddcf52756c928e93942e72ae02d02a377b35c60c1858c72531ea189b46fb044fb5774380059901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf801e4f7fdc3a08c9a57114ad6fe065
SHA14ddafdfcc61de03b5eb0561194bb1d8007e82b6a
SHA256585c94796e34d4d21e72dbde56d69db769d11a95b3344f3251cbb301adf2b269
SHA5125d55893d837a19098b4833b24a92e517a442a905880b2925c4b0825dd40fb9efdfd20e76e1841fa2b4b6347ac1838dce10fcb672a13ab4d7bdaf2c35b5fa8b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932aa84f43ea3e91277f5f8c4a98c674
SHA1f0661e9f22e4c51f355170e3275ebd0f698246e4
SHA2568ad1f1168d5e8d5b580805bf50a77a9d7b2fc3667a719b249e8a6d6eaa062d75
SHA5121e3e9a169a0f3f673195caff71ba1a90b6dd8abaf16669abfa95091ada91ff29c734aac28fd9016f09545a521c96d73b710293877bc62ac90d3f2a8b2fac824c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80a5af2df2c7cec276044473acc50ef
SHA1471864b54edd21a7fff4c4f6e35c78dc30cb692e
SHA256e3516cf50b66b53a1b632bb3c104206c5298e8a3afc5201e1ec779117f3bed0d
SHA5120b6724aeb994637eb4e50e4c3e818ad9e0267ed5cfdfd72ae0738cc62cf2d49881c03fc9e0ba080bfe874c5aaed18c10ddd4035653a65f394aa2c0845d287649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d36b385b0a7b0bc2cc12014990cc84
SHA15965abe21e69658416e9338c7274740419b448db
SHA2563f4ce689e2c8464c60d86c6ea82e7b6f6e657334aa3348913355abba06cd560d
SHA51246257068eadf4e71ea0bf9bbdbb905ac069d577c1637ce2ce26fe6b02cd3ccf34c5a742490f48a7a1a690b580111192922e2fa14253e2bfc69e5bccb366103e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd74a97a0b8a68fd700cbe14d42e15ca
SHA1864e2be7c96fce475ea2356b31c0620db06d015c
SHA256c5933ee2f60f51fc26882b9a7260ca26d0aec4aa4d68fd843a8892d16b943efd
SHA512352b825417baf3245256358be4a7c421a070f47e5cdc2b5c507c4d94309ae2bf7e96fa5dbfe584960921266c4cecf52cffee7501b6cce60096d791da5f30d7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175695adf73103bce6a253972d668b73
SHA191a26409aa7c98d558d354a102c5364475f21492
SHA256945d7fba7c1791a3490e0339777ac645ea71d750e5aad1ca2e2ecae741c15b41
SHA51232b1a91744e077e47e6fd828003c634b354303140785194060315c9e00eedb0bee69a03f9e9bb75e49094c04ff61b34a35ec32b0fd172642a58f125fc0aeb49d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\cforms[2].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a