Analysis
-
max time kernel
135s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 18:06
Static task
static1
Behavioral task
behavioral1
Sample
60781b3d60db4585f512a61aa3a8ec88_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
60781b3d60db4585f512a61aa3a8ec88_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
60781b3d60db4585f512a61aa3a8ec88_JaffaCakes118.html
-
Size
121KB
-
MD5
60781b3d60db4585f512a61aa3a8ec88
-
SHA1
c94930334419793c295748fa98393e9cc04fab45
-
SHA256
d68324b1c9f418bcad322ae3377240c1944100c4e67929aa606f9cb55e6b5633
-
SHA512
e72b832d8393a870b79dd5c5b5c8bc02338a411c57a160bc48fafe9a25c36776274abd3da175ccf0a8265a1bf33193864b0710a7803cd8c460fb537bc345b775
-
SSDEEP
1536:NSlKRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:NPyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005760a2bf7c219f469fc9b29d11dd714f00000000020000000000106600000001000020000000f2cbedd5179679081573c071a854fa012c263de043666da123118b51c4568b9f000000000e800000000200002000000013d922ec991767174e40c0d72ccf90483bc2e6d78f72d2e4f77daa77b5517ce5200000003cca9ddb39c37f28dff86d1aaa3b83b384d3954535e1f1416cc6614e43ecceb740000000cf3a274bd460547010ddc5daf37cee77fc289b28e0c15d3becf6dd2aca177b1cfa144af9214451b1dbbf41619ef09a8c74e99ff3cbd8427d7b0e73a8cd5bd54e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD5322C1-16D3-11EF-9907-E698D2733004} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422390255" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005760a2bf7c219f469fc9b29d11dd714f00000000020000000000106600000001000020000000518fc3005413f0d413b677142bd78fcd372fe82f2a51f7ab387dd4310fa11fe6000000000e800000000200002000000041b6e1f492c4d318aa89d531840987e029c15f11dbaf895623c628685c6629c290000000953403174b26a153a1b4e6479f0b5d4b758a8786a7c1426ccd73d46b0aae1e6b6c93ee0e91947f49d7a94ba562f60e052edf6f396608d6979aee7544306add57f11372fbf6317940b95e9476fbbb0f9648c6ecc797e435a2faacba8fb6446dee8f9221608b209cb68f728f7732538547dd1be9169da82c395bb05d6bd109a3b2643c1e68ace042ec1b8f71381d9b8e3a400000002b1a5308280f7ed4f315ff0720660fa0203d1a4edf4985af2858619f04e95e15745a476fd461c73cc883bb2a9a9f009553b094701d402227fc6b4dc26b6769c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05a81c0e0aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1936 1624 iexplore.exe 28 PID 1624 wrote to memory of 1936 1624 iexplore.exe 28 PID 1624 wrote to memory of 1936 1624 iexplore.exe 28 PID 1624 wrote to memory of 1936 1624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60781b3d60db4585f512a61aa3a8ec88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ef2254ba2a86295e029df2f322cbb4
SHA198be4cdb5d5d3c296ddd4af1533b0b449017db3c
SHA2569d9ebb05e438f31b487f629a7f1cdf00c343a88da5a5c2c14950b29c57a94d47
SHA5125a82e5fe9e65dd99017ecc539aa077bd7ed8d1cde6fb46b669c6c3735b61e8a930446db20454da599d0d379afaf09b1179e68685b57a976cb5a636fd88d65cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51673e5ddd23b8766945dbb4a954d5942
SHA10117a76356989bde5fc6ad09a5253284c5784c79
SHA2560190d88b4e0c3e45b64fb069e0b8976c688934c7b9fd1c796f57aeee4fe41788
SHA5123340cc19bc749d4604f1a677385fbb0cd781e90cd4cb6363e7318e53723304363046364ff297db98b960feade50cbe5737ff6695c173183cef64999d9783d90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535b51ebb22171e1fa914ac20e3f7bcec
SHA17c42805c3b55e2b02e6e48e254ee2abe7eeddce0
SHA2561c5d4ca0adf243cd3f7be5420959ad70357a2ca4f954e665c9d60e253f170437
SHA512996e803519770eeafeea7ad10dd3ab9349ff8cbdf40bb0bd8006f0b54f0265e601a8f0149c37d9f452962375a1fff04abd846d16b282e35b62fe5ce5ca79b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2717289fe0d9ff7e13fcb39c69b04af
SHA1b8995f9a7a391ae31b931c095bc070381cf6979a
SHA256f377b7a586937e5c810773d0126cfe76ec8b053af0d655f35c22c84529723230
SHA51248b4377d0f12c1e95aef75fa6c82579ca45c241746749769a7a490d0e6db7a7aa8c2d6a0b9fcf5d890d49610136c9f40fb4ad9167d262a4a3b5baa46f8a8bff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605400729aebac725df254980f750f9f
SHA1fe8580e5a025dcdfdbcaf728307e431a519c9251
SHA256f675f877e5d5953d0da3a079192c2bc78a699aa866f56e0b1e3e11a5e053c387
SHA512bf988da5b293dd45a9f403d729d615d0c6af741aa5c6a6078ce482cb21c57eacfba15e5074b22827000a45712b509fd0b31124c26262a6119637de3b40073e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb9bb14434fe7b0649c31b0553227d6
SHA18e4901d6ac7060589e24c75a2b30c71bf39b6433
SHA256e4929ed93573dc09cbf2394617597e60d941dad8eaadb8322d363030e108b8b7
SHA512a81cf4bbd02716d4326ff21ece2a15fe6a7a1951fb0b0a31a9785eb72a68bcdad2f1cb6728ede008911b40b251e7b29ece57395f14e05c90aadf4e0b425b90b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50365b3e5dab0a62fb0752ded490074a4
SHA155a52e5a74909684100eeb587a49ba40ea2d261e
SHA256a6397bb575303857cc8b298422d8e934c18a1afc9ecee301d30bdf3a8fbfa721
SHA5125c18d2e0d47d84729fe16648f17b6e9613f1f2d50059daa774dc10a764d4b4959c344b2e33b081c3db1e96b2ca416f2772be4aa0efa971565eab6cb56f7fd567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68798e30e18afe04ebe981b809bc3ff
SHA1b79c0fdbccfa8dd469f9790ecbb25856a1f49fe7
SHA25637c08bef9b4b5f3db4ac7a223c87d47545be71dc1566480344d4efca53d0b293
SHA51299ba62c926e607d0f7593010478fafa995e67646aa9b08fa062e5ecdbf50c6d4fb0994a4d94f7e60a129859ddbe7b9188ec62714c6e04e36faf022aa20dc8679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594364b4b286886d57a455e6e68d0299e
SHA10ef27fd77b0e8a8a9641cb81b4d1db259514e259
SHA256f6b7e4fc3b9e373e187ef3ecfff9e5ef388ba980906bb15be725c13eb5767e55
SHA5124848885351050d5237b59c745836504322ebfbaa148fbd883da61199f6adaa4ea3f252666565cf6acd39984c035d5618778f157277030161104100e243af97ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da244fc290a47b41bb955b007f0916ec
SHA14b7e5131afcc2eea0568315d0eef6104ff94ef85
SHA2560bdc315902cae4ef6d619505b3094f7a885d773b04f20a6a54f28c85ee9d6222
SHA512c70c6933944721790f031efad55673125fba6713e6b00d51fded6c091771ecc4058ba3e916327e82cacab00abf00708dcf47147d560d42ea9824b8555bee0dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53411e14d1ab5a27c035f4f4d311186f6
SHA1ed9040d9898da93af6cb824fee3d609ca68b53ca
SHA256b41c6ae7392deb1eeffb44578f20564c592dedbb2b6d475e59d7b83f096b4baa
SHA51231e58e458d5acb1e26b7ee3c1f6632f090db9e032f68a0d1ac2a2a2ef885b41ae75e88fa670a460cec445e5cd310837e71d6c8d9257040dd72e1e33738f4d4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eedcbac76cb08db3251d2c5423c84f68
SHA1aa81c890a9c6640f1186ec9b177a1451821b5b28
SHA2566ac247a23d5289440fbee00213a33141b955cbe7f45a9a89167b1b0f7eb3f53a
SHA5129aa9ff6165dc4e62b9801c16063d82233ba743562b91c461ebcf741d4b1bc0ba8fc56a17a52a7cd19b4a955128076b3a3f2d730c09a54d99d80c9561c18d6dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcff58e7d982b575dbfd91a3f8069fe9
SHA1e0c1644e39ecd3f656bc6c71db011204365cf2ac
SHA2564d140dde2673036c043031415a515bda1e672ca46f6b30a423a82eec1312009a
SHA512d6bf309b68bfe29af74af377bae491e9c68df96eb040d14b732306d97a01666ed9614922b676f16cfa75cf4d6624dbc33f6af80df4217fb19522711beaddfe10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51907ea0099fbeb7bd46a4862818d2c52
SHA1a9f61a173d614d8fe64dd7aa24b96aef91014f27
SHA2564283faa71117550ae085f070ff77b43abdc99d11f3526416145acbc4d764711f
SHA5124b5f2004f17c99b4bebb8ef394f33c02bcfbb852d9f6af2255e9ad46e0dc0eb8378a4b0235ec21a69d9b74382f92c3bc2f5ab4af97feb2b90c84afdab0f8d57f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c31630d9769478d26ab296729290d285
SHA1df1884920d9eaab2b5238c88eeaea8e8a5f608f9
SHA2561be5aadb5415b78b893787984e9cd24cc405e3d707c9b69076a6b053f7ca177d
SHA5129e8c07698e5946b033b0565664d7e9d8b84e63a72c73334c36acd5060637680ccb4136e4609eb22b0ddd27b5023a770b3af69c337279cd5ac1d28649fad206b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2d0968f49d9571bb8b1e0273fe76d4
SHA1b331bb5cefe24175708dbe3ae8bde64643679e88
SHA256ea478fc269b20ba4e522c40e129e88e6c8ff7f60769f21581c5d95653f1d9c5e
SHA51229571c566fd20f34c0ad7aa69d1200fbee7853b86790feaa4da17ea1cfa6e81422ac98d2650ce112f2a3e00041f17e04499bf3f35a0875ae2817a56966887b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfa65c4d3f23dde73a08cf83c3c67b9e
SHA1362bbd74e44afc422234a541f3256e6be5001c27
SHA2565500f467495eb213fbc163dae9e55d2e1d970795eeb3f425f83c2bea2263b6c9
SHA51271777db3b97c6864f44cfec67e4ee29b8fa7734c347b76ef6efdf65711d96c3399c453091144e046462aa309270f244a105489c2366acce467c432e6aa71c08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570b9b853c44a3327eb8ff75db4642381
SHA17c1fda2f9943cc709bdcbc63b364d8371b91b70b
SHA2566aa22b2a950430f48447fee06a69872530b26eb4cf7e70fda57584d026f38660
SHA51226ac5c7ac367590027de4c882d1460e554c0e38b7b61cb55f631619b306d8d84568df2bb680b4cd987fe1058cc507d4f47935ff811081d3ce8d2929755df35a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ff11806e2db68e6c89e1b523c9abfa
SHA1266a92032eaebbf09002222c1e22244193eade3b
SHA256fae03efdc9aab27ec9bd2e1d6d4d433d0682caf4cb1e26230346f6ff414a5df4
SHA512163b033b34751da9b27140a019f4327116f1aedc325830cafd467b7ec464524a55d0077004126d76f6a9b53dcdf4992c4e5eae949b09f4680acc1233bfb1e825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc79a6afc5105396e4f7f7c61cbc6aa0
SHA1d60775f109a043d3f4cce9b70e80ebdf3584f9ac
SHA256eced855db8045ceacec203fb2c2846028f2ebca9789956a6975af31e066cb11d
SHA51248203063fb1c8772aecb7d3a6b395f9b48fcc761d20d438ffe803adf593f86925333370ca8903b644fed20cd265fe3a2bf8e7352a4fe910919426550ddf29921
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a