Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html
-
Size
4KB
-
MD5
64bddc45dfdb369ad85f851fa1ba53c8
-
SHA1
3e79c75e07832113fd8a8923dd9a6f87dc439c88
-
SHA256
1dc80f9899890885dfbe89bfb9c147e33c683609521a07a5af702f5ba4d401f1
-
SHA512
908909937f48edbf8065551fecb8f9a5a97fe10fe58e46fa3626c35d2eca32b53da9ab95271ea26ee72cc061b0e837bdb854913707fbd026056f3cf8d288018b
-
SSDEEP
96:CH0n6t7gVRf7gVi7gVD7gVc7gVB7gVO7gVCT5o2Db8FmFbK4l6ovYdR066:CH+a2Db8FmFnsWWy
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003dee429083fda0458ed356c6a979e65f0000000002000000000010660000000100002000000083bb01918283991105806665d30c48f99bade18462fcd3b5f2d21db132a899e4000000000e8000000002000020000000f5d7658763c730a81f1cb1f0257403e4b5792ff24d9b2ab3a4101a9071dbada42000000013b56a5011c1d97faaf8a8b7887535cb959f324e6759a93c3e6df482b9db84cc4000000059f7745382581fe7d0007e89dabcbd36a2fb4c5907e646e0bc579fbd91027581b9e52b47c0f50b48638433da3aceac48662d6a9201bd6096db6f0890a43711d8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422486858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99C64251-17B4-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5013626ec1abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003dee429083fda0458ed356c6a979e65f000000000200000000001066000000010000200000008dc3cc3bb9befc0256435b8daba4d42ff55d54a480a0a78d61de6c2679c5f916000000000e80000000020000200000007a091b9da12165dfc80178205965556fd2390a781006cad880270ea81166d97a90000000f431be79cab7dd37130ebfc5acfe93e13769c7f0db25547f69fe6c22366fc597c2ef7339215c6c5e80e5df0cb76867d9bb5712a68d9e52c363f2453762913f624d338d253981d5ac33c989d5579ba4880d3d9d5fb75938504cc27a1d6460a4159664b702aba9deff828f1fd78d9e3c4795f9a2edc47d804de63d5eeeec9b7de57df334ace53eca1db56c7dbe0a7edf9740000000004240c191346ea615ee81ccf7dc732d65393917bfa538bbac059a646d884b53931ce51695b7aacb5323a5d2b906eba3409a8e84000567c2851224cc3d6cf066 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3028 iexplore.exe 3028 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE PID 3028 wrote to memory of 2224 3028 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64bddc45dfdb369ad85f851fa1ba53c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e075a6debb6afbf067711263a55b3249
SHA1ec2b2defdeb896234f693b14f93d82afd3a44dd4
SHA2561e9b94fea6f82d99116d8fe2be6bf2fb5188a627b104af60df3e79f5dd5840eb
SHA512978b96d7f2e2636f72f5fb63f3850c948aebace56eb70ce6a1162a91188f2951610b474d3e34c74beaaf7105beb9b94742faa7c8c0612b6b6f6c3b781f88c1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1cef72eda0ec16de1f5c4a7d694fa8a
SHA1eb47caaacacf48689b9f4be4637bac95c68601ce
SHA2561a0a33e342ff708fdd18361990a18b5a948e4b204d666ec36a3198fcaa07bf04
SHA512f2c3c9996bd81119fa5e2492dc4918aaa174b9b275b03afed5a06fe3fb5cabdece260c01ffd5dbe9f066f15ae7238b692f49542eb3c6a957b7cc257202489ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3aacceb38edf1f16ae17fabb3eb03fd
SHA1f13b3bc900f00701a249efa1176f65ab2257fd7f
SHA25626552ef927e7b3ec606f60498bdefd072939c220d8d2b8ca0bcb06d01ef810ae
SHA51292f8ea74c0f51435c93f35934b2521921a275bf16fe12149fe15014875216d29206f06a33b35554e78efe2f844c536592abb947590409322a5404fc4c6d2e12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1e74c1d2e0d076617c2b27ed6b345e6
SHA140fac02b98b2504ec14e3b069376143be063169c
SHA25638645ee88f2b8bba4c57c42fa3981a4651dd00e7cdbc678a5183134855997625
SHA51215dfe6b3335235034a867bd3b0d34ab8d07f8dfc0f0fe7cbb9eb6752f9fed25aa506ce6ca4b5525144a2a0322f1b5d9932d63c33ddec7ffff579cd9c55ac4923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c41881eaf3bbf9359578080513e9b7
SHA1ebe69b21d51398ee3d1042bc29bc69490c1cb7ed
SHA256679d0e4fb4bded9eddea40f647bb9eee0eae125bbe0084abbc5ea64b11e45840
SHA51297727b59a39885575af7d9778fab8c76cc6d8e29dfa812663394718b302779893b80c4eddd38ec5e4dc90df8f5adadfcf7ed620484ca197136ce8544ff981240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add06d4d0707a5ac34f6b1612ae049c2
SHA1552fc90b50e85d2503a14d9fdd1fe31cced85250
SHA2568ca801a9331049d0c59d767b8dbdb70cf27c9167358693c85acb75f50661e1a7
SHA512daa8ce54b2f1b8df371b06feaf0b1bfcbb1c082246157aaf8fa111f852c66095c25ea71ecb7df55adc899838398dbc4eddaabd084cfaee12264263303b3c064b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58de032fbb405e7cce4ab5b65cd24bd92
SHA13b2cd87c4f4123e3ed73e529d09de7e2654439b8
SHA256725f42f6e6153cf0997f0232d520c694a5ddaf50a75608d9c3c47fdf63aaed7d
SHA5127a7566180605142fde405285dd502d6bcaa6b30c3d99be405401832ea079471c4075d94b0b1718f8fd3a88b02773e18422fbcf6d0b64d580422c9c259b15f38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538feab557fb9b0029d58b8a6784347d7
SHA1cd1e547af09c041f3709e8525618bc2d6ac434c7
SHA2566d87c92500a378819e73c13ac82f44cc2344b4caf06ec1967fcd7e88dede0e66
SHA51260274f01c43d1347b5137f8ae920ead40a7fe958f50e92e559e192f571d1132cc4969d26b7983708aac33722c2903347b57fb00a29ccde32b8cb1bfac7b8efab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eccf141fde61827df66e164acd588de0
SHA1337481378e56f64e4a43603d8e4913d613b298d7
SHA256d03bceb52d47929ad7bbd8143323fc65c62302ec3a11ef5fa2bda0b4c7da43e1
SHA512e08912f792bd0a7a1611064792892e5735c537ac5a7ce6015ac7c532eb4f011d5956e56510ab639c3fefaa273cf39ba73b84b6f96677651bf7bf3560e05b14dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ca5dde79c20395cc2e3c6c7bab8bc25
SHA132f44921a3f2bfa1b409eb05f151372b9b08a7a1
SHA2563bc8f42b3487597352551ab9030bcae21b3b93ab709af4a9cd5f285f4c41f363
SHA5122f100f562be24c7f739a1a9248cd375be34a9146c6f97dc0b7ed57541349a0e79b82b796962516b820905da23833cc950ead8dde39862cbd305168ed5a46d587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b7bef030d2a5d195b1cebbb7aa576f
SHA14f851a500eb0967a6e97f931e336db9865055e73
SHA2561c5b6304cb35c9f1760484896e6ee882a3cf60601bfa3946c078f4f851571b19
SHA512a28efc20b1b04b3302738e89be1fc5040e018993d50980136be348323d7a14df4a83106a5ccf6af4114c0e4548aa62d01ec69afd9718a7d3392991164457a192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7d9c09fe33163ea5d8db4503da440b
SHA1fe58b29e09058630fab1042762be08faa6f493ba
SHA256e5a099db50f61394dff17acac61651743642bec86b2b1ac2bce2c7575a0a8617
SHA5127c6ce7b1eb2b39dbcaaebf7e300addf50356ebbe9b8e57ac29a07acd30e213bd67b94009d2328168503c710e7b5100b877f9eb767324234630b6b4f650eaf8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c764ca93b722ef19b70046719de46d4d
SHA1f9f21370a58c27cd289e5056898fd3202850e0d9
SHA2565ee25e8fc6c9a6f7b53b6d4705bc0b7563c57226cd0486367823db12a8d5cb96
SHA5124a375d631d0dd2e1318be840aef8d34947e70cc99f617cfc54105a1906e308f8192da908938a517982614ba998723197628ce1c77cd9e6878933e38d9d3aef52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f414545dd9b307b8f3049976203f4e3
SHA11d4cd2a29d6a016b34953921a3f85d8e6ee50ced
SHA256fd305c3d4e0aad66c013ae2d59a89b9a74b00b4ef6ce5f27ff83ef5628d404e5
SHA512e398d2a3995daa7b9157ff8cb75d4180f9ca3ee0359275a798d98e917ec279fdd283f44e8b15791848349c1bd05776ff32695600c6c80c6f9734458e856b9584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588127e484dbbaa8feceeb0b0222aae80
SHA12e2e7c407748035ffd25a425a1c1ba8df585281c
SHA256a0b9840e5d90c91d39b80c43af3a04a8911ebc55d1f2e459485cdec36366b5d3
SHA51219d61153a44314ab827941a682922eeda74b557f91ee6347f1f3b662ec6794ca9013a873a9ac982b9364ccbc976adac325e828a039a9d26d55dce77902850c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d866db8fae8e5f3a2ba0617ea486332
SHA128c65fadaed4eab3f381d175c30279a45b60adae
SHA25601fef1db73af8d1f33e4ea0bf7fddec287d241346ad5143098c576e40bf2ab56
SHA512dc83c657d9f7aacaff1d6a9eb02179dc1f335d5f0e2e789264a993581cf9b5130fbff5e92e4a39e504c80bc209753b29d24c3e6d543c569457500ac5f70f91b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd2a208d408d30e1c54b5dd4c492427
SHA1893bde549bfdac70b503590e14237d53e1e36ba9
SHA2562656883787574c5b10dac524abda2130e41a09b0493282c8b46c9836c0a5d23c
SHA512dbde29fbba7c339247b4461710be4f9d941794f03e0484586f9855fbc7f2470826eac918a58d719020ef62cdd16b523fde8364404723d7db07c704e17beba61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569f354719084825d1e40d7ab956e145a
SHA12e4a4b74712b55b24bc3a9931f806e066c2cfb2b
SHA2566310a0c6bc0af1a4ecce6fb7326610ff6dcbad9fd68b3544966067d2eab35d0f
SHA51281ae5fc9f1f3440de2c861615b844736878f42e55a3c50831fc7507704986ac041edc2b568b82c19c505dafc98fd261acac2d4a94cb6c5e3e0690e76462498eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc2f080960bdf35e2eeda9f97b16602
SHA13403c2e3b8b2cea5891ab9fa56175841b46221ab
SHA2564a9dbeaee0cf9d856a8602a6e9ce35c7f194ab31f02d8caf9731e1777e78e5b9
SHA512ff5f5f00bc9ac9fddc0a27950408e2cd1ce56c8347c77db456f16d5ea4af0c2d8dbedd17853a4801228dbddc16169db362f0f3040ae1b82c6bd37450237466a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d83863721acef3b184997b4080cf8c79
SHA1db8f67da99105f590684b4f6648d3baf8ad39c83
SHA25654e0aa35951c6906abb5ebbe9af84d0be1287d8216a74ccbce1d264e6bf6911b
SHA5125328f2f457dd9d4f1fb303d9f12e7c460e23165a8608123e5eddf628caf202ca58b40c6cf7d93ec9cc60cea87853dbd0f05c74f1c524ee3327c25c3ffe1ed53f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a