Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
48d4eaffba8d51eed12961de75cd6db3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48d4eaffba8d51eed12961de75cd6db3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
48d4eaffba8d51eed12961de75cd6db3_JaffaCakes118.html
-
Size
22KB
-
MD5
48d4eaffba8d51eed12961de75cd6db3
-
SHA1
b0b62453a72e86ffac98b957418e8a227b23cbb6
-
SHA256
e00516c8221e205547f6e481e60926413cc6491f68c4dfa2af47218c4d6fa54d
-
SHA512
26146cc268d50c56a308e18ab10516f2d8be96e0f8ad2882bcc32e0a108279d637596be1f6cdb6fb5ec8c771aa635d78399afea09772c116a9a12e101a688d09
-
SSDEEP
192:g83GVwYzel5iYzel5+eWnLzyw+U6lt9Xrn4babDgdvJfHVp0Td4/zJLZOGXpsEBX:GDiN59CfDgdvJdthZOmpTvuZYaPR4/n3
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000db65add7632c78593247bbba39de8b6e727b13186b1ca8802f4c0172eca5f43f000000000e80000000020000200000002d965ef0ea1c2b1a9713fd514259ce2571985ba005f1c129636946c01d0e320a200000004098ecaad482c2d6f8b97999e681a220eea15698cfbf73630acf584b97227aea400000009253f58f879e1b0ccf5bdaf314159e3e585af8788e763d1d80109bc4175a90e055c3587c255bf2c86203ce83bcc7fb594a13cfd763cae412c2fe14c327372f95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E169D211-131E-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000090081f2c5ab217c6724921262ec06c07657926073621ff9c611b42835ab2ef59000000000e8000000002000020000000217d10770cb649375403ce12867e3d1b580781e46d0b5af523a20562128a3bc29000000048b1f3fa3c4d0daaf496cce294f3948c7a4c4adefb0a5972f15ba1126c08b1b830ac462577dd5ea3ca9fb47db9064ceaa9fb1bee1c2a06df304207be4aa732db9ad1cac455ebf83697fb962250d201a0894366afa82793828025da849dd8fa77949f5ca2fdeb3ca2cb715c8080f3998c5d5f1261b106b4cafeb6d2097d2fb8ac52b9939f57bdc7e6f4b130101bab0dcc40000000141a54cb824c3580d1c331b5ba98cbfd3d5ed4c86cf0b3a8819bd4ad17dfeb103551b75361b3467e38bff6f73347d6f7f12f4c33ec3985f574cea3e04e7a9016 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421982750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06334b62ba7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48d4eaffba8d51eed12961de75cd6db3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ade129ecbd4aad9c764a698f79d274
SHA1bdf336fe19941550c422d2941f8d3b7114d004ad
SHA2560689a8c4def3bbdc7caa5265c00b6fc06df79dfe484c07a78599ebfce906931e
SHA5122a982fd54e729807e7d07f2dbabfc8960c316fc1cfc5ff9429a6703e3ba10f12a8af91c474d53faea3ffe300d764510776d7950c278f6d923da87289b22ca827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486e63dd8ed2e36adfc26ba604d2d0d0
SHA103071e6324abac8368a8f7ed8cd998bcdc767b8d
SHA256fea977848e14e34238f42907a9c901d5f66ae39c34a75c6591108741c203605e
SHA512d323a88e745a4dbb25a36ce54692cb6d690d7e4c543e20e238d905f4e5f7ba759ca0cd11772c22aa053350e0e4e08d1ca54ee9c9716d38e9bdef52622c1d7858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a68ff56df09fb40311aebbe36cbcbb70
SHA17faddff628f74b0461ead5ac7d692554939136ea
SHA256b1c14941a937adf5d57afafa1f1732d46fcfd84bf5b6a64c74477849e9bba4e1
SHA5124c0793828a12fee89aadc6211687f270cc184b58399db01a1ab3323b3dcfb84cb40532cec67d38af8dd5ebe1ee4d5246614997e684f6d50c8d6dd2f7abdc2155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533bd9afc00110dfa80c73cc59a9d81ed
SHA1a859c391f1ef2bf97fc09665ad01f2005451c2b3
SHA256fb82c2d0211f1b6779b8be2723ebc9844c5b5e624be494f432d18e74d0fd7a5b
SHA512ea743312ba115b954a8896c5aa49d98290adb28ffef614394d537f89f9e37eac4291b16f6967f22e55b38025ad51ecfe93be0d8b9dd2abbc245bce0419cbc3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564946b95c5d502a31ef7a1c44851901f
SHA1a4ff55502533e6af76b29260df16e16f53a9e446
SHA256eaaf0f60b6b71e35fb0008d3242ee7dbd8e50e3a2b937409c348078ba0d244e7
SHA5126cb8a6e316cb2a25fc7dd3f0d3a57fb7b9d3c61535bad1c355da5d8a263824ccdf7e12c031c9fb4c61f7847c6f0d8388fd213ac23ae1778959e9026b72e387fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b628e27e53fca18bf8b4ef472ed9f3
SHA1fc81e6aa18725760e75529a8584679273526e47d
SHA2561502dcaaad8ce1e18f795591bfc62463ea3ed1f2d8c22fc7315d7d971e2232f7
SHA512adbfb98774bed61de4625b4b17bdd19fb56d39dab30edbdbbbfd3dc6c59f19529b00858f4ef0fa99cff9656ed0deeb94c17ac36defb4d6fd3bf87c341863857c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d58485910c1c96e3bc1fd8050498732
SHA17d265508ae59f797f563503eb0e06919666cd42c
SHA256b9a52fc17b1d50c44d48a51954ab66c7ee26b7fb3cb5fad532e225bef5874a03
SHA512f5b51f48a8a15ef1ecbb2076122fe564ee89f55b276ff8fa3c2d0a829b2e12d1d3267e4026a563b1e259bc6df74230f3b09910d6abbc69df6247581ab8f9cb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfea470115bb5a0f3bc1539c0cd790e8
SHA1155060d85c3afe59bc4dda6e0713b19b4ea37bdf
SHA256d80b99eb37832d636dd78ccf03e00044b38a34b20e77d2e81eb66caa361ba82c
SHA5123b0ff1505de8e98dfa51480d9e0b164f5d34cb49cd3f76ed5b7619e4b1b5a599063229a2cecb26df85cca0606809759b0767bf2b539eb459b4d75eb13797a807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f2557b99eb123e75a7d50ec936c357
SHA175d75c30cfe37197c3f26666732b66f264cf5fa4
SHA256ca240f8d95cf7f43390ed3809a51e2092a8374817fb44de90ce9b3fee52e52ed
SHA5120c86ff47cccd71249d1536b67dc59d30ac9bc78bc39174efe28d2896df24762c7ac1ae88df5175102d567117dd49a1df6c389b51a31fae98be985b5ac46351a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7e2dc6713e86b008bb1029cc7fce52d
SHA1be5809c04a7b205a05ed49b2868bc50af9c1e6d9
SHA256cc16bc3002e02f11db5e46d370815ce9f1d71e5e74f1375677933c07e377f57c
SHA5128cc9a2985bd55db230adb1491e00fe4f00aca5ec2eefe35200b1cb77a524cb2bc796df7de4f464ffdd3de2f4a18caa55c2cf9f92f2e6329d5848f678b58eaefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a25d803c4701899b583f8c99ad7fb505
SHA1d0ed93894a065683997e9c06ac7fdf7ef61d5713
SHA25625c00846d239760a8fa4f9692d818ecb1be4b3c14d2228951018a02f07608d14
SHA51222a03267ab9d16b920b75b1c0775ff51cd18242357ffaddfb042ec6c7d7f54bede4e13a14a727fcc66e1486810dcbb6cf7b5c1d3740ed479dfe5273716abe8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ceef3028497f25217f67cb1e006074
SHA177ca7b2dd8b84d5df979ab7babb41917c392b84b
SHA256e1a761413e2955cf44d18240fada1db40210ebcf3da5a3e756626035613b9a69
SHA5122512767dca1597306dc2d141ce29c5d6bd230079b907991842410a67b2098372f8d03ddd86195070936f239a71190c7dfca3aac56a1095c43f417fab69b5e227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10ff0031d3540da1114402dcaf89082
SHA1c0f1f0ac3a8eab261e570b5214feafd293addeb6
SHA2561414a393fb3613cfa2cd72c44da0243cd226d15f0753c80846aeee63167f7c61
SHA512cdab50e00effc9b95e5bb1ded2329ec01bef895de959c8fcea3328c51484fc84383961bbb791ac1c635c1188f67b609c792d9bf8cb49ca3039d593696e03cb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571da345bd39e7e79daaeccc49c45b017
SHA1f106bb0f97bee0f787edc4f3111d6037c38c8c78
SHA256504be4fc845a42be27febfc7c0a4ca9bdf822369620ab0957d38a5fb44c2d333
SHA512d1cd44df7dc3d4961b9c354c40918d416e719f4e6134d91c7465b661f1345cdfd9a31a212ce7081d9e58b6b99df5a661fc61f4ee9fc3cba7c9e967978d6b37b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5791edd58cc57bab53ada05c104b9158c
SHA135fa09d6e90c2a0f4ce5cb13734b73168bb487b6
SHA2568e0481bb77a5d312f05ff629f7ab7b8e70157b66417dfe601e24d1f8023142d3
SHA51213a4f822c157150b98aff5020e078eb56c42352c315cc60f1e8b3d735e3a88eef83b0089af15ffbafbee8f227a27474450692270b0ce8f6ea05e182015a12c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a776d7c2a20417026c55e848c4ad1e10
SHA1728297ad0a5c304edbebb3da2e3083c4ab0aa6f7
SHA25643b4f21c56f576c951ed20074e50f05d03963bfe0ffe5f32d06dd7fae6014261
SHA51275629f735ec8d62dbb3100b4e40ed4aeb12729bb082d94ce3cfb271854598c39d4d47458c2c5f86537df21ce7b1c1a1426cf7049bd66bce65864ea7c22621b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5087e42464b147f96ffdd71a632e37c04
SHA1b0b7eb287d7739015a7041a894b101df762dac49
SHA25680a46d5ad852fb78d7a6493502f483a8de9439d4d90b51fb25c242ceaf1c5251
SHA51244af6a48ea1bd7ac0001893bd007ef47df54c83f6c99eb54159b59835c1586c0daaf88ddac37252253d832bda61f38d9db7f335f3fdd83d9f8a8255c9980772a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542dd383d48b708bd87f25dbe986eaa98
SHA1d647fc4cbbc17e3f10277a4e80ec870870d9fa0f
SHA256a5f558b406e6ee8172696651661e785ada054233a95823dcb472be6c90a09887
SHA51238968883ba4dda2a225f689166d30250f37e6498e4bd1fe1a5dd68d176fd0dd3f1d11ac03721f02bb150b6c6a6ece9b111cebf788633f3eeb61c863c6be6cf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552aa3200e2802dc7d5f32669dbcf1000
SHA1e73cb4fb2a45b0b0a0dfd8a61520de1195beb994
SHA256823932b8d8f59f336ce18bccbb50204e2d1c56a7274153e381e2076106008190
SHA512c52483158fc9c9bc69b191718a4722eb390edcb86707830e89240ddd11b36a0893266558e70ba2e55f4ba2b4f62ebf4eecec5995ffb6dba86127200e74e82c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d446ea87da6614a8eb1729c7b322da
SHA12469e0466c5932861071f547f733aa15ed35d7d4
SHA256d0bb1bcece0ecd96ac9117974ca90e1d7d607d889ba865d3be9d89a7724370e4
SHA512ead3feea37619a7f71bfdd6743414316d5ec308bcc7c98536c3be305b291b1585bc78441cf342bd63a2228ceed18c2b4f037a389b3d8e9927062ebedbf641950
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a