Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
4e40a6dd22679ddff24f2eb38c9d4e07_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4e40a6dd22679ddff24f2eb38c9d4e07_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e40a6dd22679ddff24f2eb38c9d4e07_JaffaCakes118.html
-
Size
23KB
-
MD5
4e40a6dd22679ddff24f2eb38c9d4e07
-
SHA1
1cfc6ec5b7f45fcfb94520eb872942761d9f04bd
-
SHA256
4d162782a623213a0c453c5047d1034a6fc884c1ac4f337ca59c6a47f7110308
-
SHA512
03d559b8f88299d43af18ed67eb231e0e7f576ed2a2440524ff0f896ab44ee875f2e74a37bc72666c3285f205bcbd87638ed58e152a97e39ead474628fff0f35
-
SSDEEP
192:uwbob5n2enQjxn5Q/BnQiekNnTnQOkEntnbnQTbnxnQXGLnLnQtyqMBEqnYnQ7tr:nQ/zGH+2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000db94817456d933856134300b1a8fc198e377fd186c54d30fde9df5855b1212fa000000000e800000000200002000000065c5cf68038099f36eecebe66d2a1d317fc680e79ee63c5cdbcc8ac01b89c463900000008dcd26146bf8f23da2691c1252de9ada7d0d7f2410c5b78f97ffe4c09e377e25e1a27a5daa0b573a1c4c4f3bc02ad53e68a27dea89664c16cdb2aaf780a743b3dd613df159659dae0ac2c6e1bd135475e27d1050ab798dc873169feef49db480b1ab16a6394d0b9bc9dc0e7069cc8a3c2571c4e81e39e78bda9c6ff5653fbc19e79fc4f818dfc39d5986d0d97ffccf2440000000fc7f6cdf1afb1c8c0d549607cfca5d2ac00c54f42d76a1eba436ae1742fa28812ad65fd26d6b445e2189c949edd66d138f01d0668418116eb503af9e1ec0634a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c196350ba8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6073EE31-13FE-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002645b1717ca3f2c53060f49b75f33930a373a6ac03330e5381ff7a7c1301285d000000000e800000000200002000000033c5feec1cd2e9b5bf0e42a74e7c2353afd9832149d191cc1c0283b60fcde807200000002214fedc2da4de9ecae9d7b673c8b95359f54df5e9f66b47633768d86df34a67400000007b1b45ecc3167c8e1e677b7fb3d77e0e247f4259b8279ba5ce2ec56f3a763b7210e7e6c5a46b67df202fe52565e010ddb6a1222360a5794452cc0de4d74c1bcc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422078741" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2848 2912 iexplore.exe 28 PID 2912 wrote to memory of 2848 2912 iexplore.exe 28 PID 2912 wrote to memory of 2848 2912 iexplore.exe 28 PID 2912 wrote to memory of 2848 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e40a6dd22679ddff24f2eb38c9d4e07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439e64b12a2f046a7288b04b927dca9a
SHA1c268558ef920d888fc057db07ee949751a5261a1
SHA256948f5c801632f71ba418a8c1ab67f4cb2bb677d2adf443ddced1ffee5a8950af
SHA512898d042de5a22b3b4fb8ffd9592a282a908a3aa864141d6fd26acab01a0ddfb205c46ad39376ec4cf3c6f2a0f61f3c472ae42e898f533f012641be19d0e16fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588f9bb680ef95e48603f158ccab1d235
SHA1e234bdb7a4a9001cb2339871055532b314dfbd4b
SHA256f3ed38f6ca57a66cb40b23791304a8e7190064a237be604a5c7588e268fdcd39
SHA5120ea0a39d81eadc685f3374a72435bf59eccbf89051b1922dc345dad142bd1606ff345e8c4a27a668a8719fddae89b13e16669960cd9e7e0d32d2ef7edc2ccdfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59259f506c6da55b71de9bb130a1c9afc
SHA17b9af82ebc078c054558fa3c3377b6f184050426
SHA256fc6921edd4f91012af468b13f18207295487e41675a321d0743131e3e4fc42be
SHA5127c967744cbe3a2a8f2bd7cf9c40dc86a7e7d921f39912945cb04282c9c53a9af56c1a8be46447ac6442dc51bc25061f4b030b291377c93b1148639a61b4e5da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54086916217c1b01b7a6c125bddd2d91f
SHA1def93a470321cace3fbe548dc23a6c1dda1ceac9
SHA256af0981a3bcb6eaaf0410adfc33d98e40c641f28b17dd3f5696a77495501d1da9
SHA51294396070a564bdf81ed4b0098ee342bb842fe042d101ddd0c6a2c58dafafb6d4b1b9c34e07e95670dfd769d1599d4e6926ebf58f759b65c64f3ef3b41284fd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51259b1e6d444d679a2c8b177eaf2e2f9
SHA181f614bab448d9e19115f8d9e1e336e38c75c272
SHA2564bf1f99d1b9630fb8d4294680c06dc99bc9e4450f8ca2b9dac549a5fdb0f8ffb
SHA512f6bac63b24b1469a56c71d93ca8857b0621bf797afd1ab69176554bf4dc69b1e3b7b83bad2e56c961b99b2203aa5b449b77b2d2925a4a97ee3e9c40c12910a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6586e97c34155f5f1e87741526620a
SHA1b668b17bae902af2f40310e6038d7b141eb720bf
SHA25684c470690f5be601d6e6fb424d899d615840b7f4e7c44a7b4179b46eed1e1432
SHA512c29a3e8b3b031055bc24571fb9a5eba6bf5c74c00391e6f9a46d342f6fa5429a64d0ef2d7d65e9247d76d2f87117f3f6ae1299454a52bc24ea4c58df9c9e6117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b72dfcf60cfb328399894998ba58ba
SHA1751ada802b7d8894f0e2851d0d2ec2fab3d9e3bf
SHA2567763ae44fef7ff4c6bbee9f9c9a592df6256f2cfeea6c0c85023873dd947915f
SHA51264c481a45f4b3caa2cf65b5cd77806add3bd232c5eb07751ea6163be99959cf5d8c721be8da6898270db90f7214bcfcbb8aaacb4a45696d660d4b2976637c334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ea15b4ca001a586c344523fc9a7c17
SHA1a56e9a000e3c769240c98fef3d4efdb09a270c73
SHA25600637b1d5619be1c886d8a127ac020f3b04b028bd05169e56fc675a0c3ce0c1c
SHA51284538e380198ce5f85d171af5bd8f35a71a2a5f7dd5b56125059818235169494f3088eb981d1095951c99de60b7e5d7414a1eddbbf92cac8b61abedc50a537e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f715164060635c0d094f8ae5f0cd6a30
SHA17910de27f06c7fcce485d7eea029f46cef0a954c
SHA256a04b1586a1595a9243738a4d34b1ada8f07f6aeaf80160908a9d254283608214
SHA51212e521ebd0ab4d9a719b1fc9997a17652874e8a6e199d21ce98b04cc2cfc3a8e7e3a1f2a924728e3720a92552100cd19444cf96d193fc916b21fde6142550057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546f39220da1e0b5bd64b60a653fb56b7
SHA1d8d0ecc2351acde653276e7ad6ce81b925a4233e
SHA25602539cdc3d6fe23f1b067aa986869f28dde9fe6bffb5215be11be52dbac84004
SHA51271ea38ad78184685e566671befdf0c0c9480c3a0f7924f8e345c8ddbb7d6542e4e40a3eb504a0eb524f58feec968063a5827847cb9c02be38f7ad8c535bd6af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc2034d6c17ed019d2aa4b2a9f95f7e
SHA1dcee4df3a7f8eb2c55a0cde9f807a24651ee57f9
SHA2563c5129455750b1755dbd457d58932f0a40f6714e7da2d6d41794738d7cb8712e
SHA512305cafa1aed716a1146ca8a88b066834099ae690068ec343b02e4e6a0424d8cbd74ae3a76d4f54969e1cff0d83ed30657060c55332aca54ce458695e2abd3e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58802d1f849f4773df61af718d0c51f30
SHA1757c614fc48f07bba0a8db7addbca65d485ca088
SHA2563daae199e9e274f37136b9e84d47214d454aaf52f13cc44f4e0ef7c5da40f892
SHA512500aea1e47bf89d98844b8e22f9e05eea4f52798e093d46ca9ba1ce7d9a3eeeca9ac801f29fdf86ccd92dc8ad4fc2ed657f4eaf0c737684ec697a8589d9b1939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e97cd05e41230aa9fc8e452c298bbb38
SHA147e911d485d989c3cf4abf83cbb8de67889dbfb1
SHA256352c0e7005cbc9eaf051ba857602c247bd35cbe259f1fa721b24a9fb1cb13a31
SHA512eec9bd86d32a7a436bd252e4ecb0ff9eeb3b89faeef9134a02bd1cbdc460f21ef67f6b40033b69b090bd5f067aed84287058cdf546762887339dd2e35be1b6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995ba30efec8cc7db6281ca5e91abc3e
SHA1439b490e4c29a694ba6d512436b4243a8c18ea1e
SHA256092e773cdd4bbc9ea42ed7f4e0f209dce4750d2e1b98dd1abaf31c7abc33485b
SHA512844ede434d5feb0fe50f185b23c604c3d1bbdf388201df149c41acaaddabfa82f4155c61aae8e3a415aa47ebc09951a539b65962eeb909ab6867e15292115a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2101313b6d145b5e078867a07b26800
SHA156718fe0cc344abfc92f4b3b8fa842aa98477ca1
SHA2560bcc611f7d3ba114f78d247f0bd8986f5b2f288a6f1f84461676c4e83b2dbd94
SHA5122c001cae151d6956c796bf988ac63206232aa225689df73bdef0333ee839275c9d50db61e8cb222eb44c7068d728786d698b98a9b7cfd0faea54cb53ae5f9791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579770b7d9c75ab758f737d51d1d487cd
SHA1ad7a95350508d80547cd266e1b42a4ff2fc8ce36
SHA256f7739bbfad70b2de1afc760a447330d783db4a42c534a7c5155bbc9e32bbccac
SHA512e03b5c138778f2440377c2b7865389078750fda138fb50052cd9dced1b9cb1d9adcdbdfdd01c8ea72b7e0d609e5eff966d2b6c6e562a08d9914ccad9ff1531ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4a2d38f2b1a6b30c7bf099c216dae6e
SHA13cd2bbd046cafc5f8c6985634ec39739745701c1
SHA25632a6fd4924d7e7e86b8c3b0e7be7ed5cd79d7a5dc6e32708f62856f6bef654ed
SHA512b0b68890b37daa78898d4277fe29a36f84d4a2599534c60bc12bb8ef801987f978e18cd9f6b5176312aff8fdfed94e84597c3b1f75d0c74f57d7b2b18000f4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575d60c135b740abed2e12625a563ef0b
SHA1d28208b576f89118cb84c30421810cf40c8e1c80
SHA2563a2f95e0364e3cb1351a80f435a568b1a3ea46c16380385687d1441d7106c771
SHA51274a716cd65ebc4e85f70e507b88d5d50977865f3a2d701a2f1abb54598f703c61d05643af76b99ccaeda0fba2414b92c481cc1b4d8c1fbb80b493691c91cb065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b524e777129079c8e661db70a1c4b80b
SHA1fe8634fa3bb073d7c3ae9d576d8c576f16dcac52
SHA2567907d1ece0f319439634fcd864e133676ca8f19c616b66c5350dc1b8b6d7013b
SHA512292229df6c92b2411480ba8c81dfb802a95314e76982ed6115ada73488101435ab85ecf57a470f7c9aebaffed943ee425231cd31ecfe333f486c586a56045c3b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a