Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
694b1123b45613f70f827e9ced89f404_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
694b1123b45613f70f827e9ced89f404_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
694b1123b45613f70f827e9ced89f404_JaffaCakes118.html
-
Size
26KB
-
MD5
694b1123b45613f70f827e9ced89f404
-
SHA1
6928da139ca52223168a3e31e0ee42ef08562e8f
-
SHA256
38592e93ee8c9832f944d7f0d7cd956012d234db775a79c2374d412f0d597e0d
-
SHA512
e4cf15df6b6f61b8449392413bfb9e8d41289c39ff2113a3b59a12dff1bc22ee7710b1ba83be9fb9ea0353e7925ccf21fbe712d7c39fe7f3b818e799c111eb63
-
SSDEEP
768:Cyi2E9fZRSHq7QMP5QMPqQMPpQMP3QMPfQMPHQMPCQMPyQMPNQMP0b:CyUf/SHq7QMP5QMPqQMPpQMP3QMPfQMg
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b7b9e0b0acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cf7de21bec093a4897c4fe82a130882b000000000200000000001066000000010000200000008c16fb4ea5bf03920703d9cb931918bd28f44dbaaca15151da2d7e747f525ef7000000000e8000000002000020000000322ed3addfcb321e7df92ccb20db9380532063e374c1a42ce4f50903727d969a9000000083deb3d2fe41dbeb46c394855521a3d296ce031f518b7860ff3957e4b73f52dfb939f6142fa7f3996e8a0bd76ea97626e01714b9fffa24b75ff197c8c0f996d23c0e9a9d59b66fcf02908eb3b24e704c05a2e513ecbbbbb8661a8d2b18250f931126fc62fbc845cc625b23122f7c6012d53406b5864b1cbf554694191ecd1b8b09cda4eff97eeff9d13e323f0a22551540000000f3b12ef324a9d593ce1afdf9f44b9b1cb06de3f86737c2ccccb3d36db1bc1fcb891583e0fdc24988eab4909411d6cd9fdb553e3a09a145377382e50c57c98d05 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BC38991-18A4-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422589699" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cf7de21bec093a4897c4fe82a130882b00000000020000000000106600000001000020000000c01bbb230c619f68e691ebbeb28dc04db0fc6e139ab31fe710fb1e17e06f7911000000000e8000000002000020000000750f08bd77dcf8a916c12b23cf219b89d394cce75d530fb79bbbef1db4665efe2000000058e8362d4e87a7f1195d047e869e1a615a10e39452ad67e32b4f6f6cf6b80f1740000000905b89606168262f5cc4b6bf72c1f01f9d23de4dc1154ab15ba79487b9adce9cc777bfde80b5d1877d989e53d86557715fffdb9e0fba1e80bcac4e6fbd64cf0f iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2320 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2240 iexplore.exe 2240 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2240 wrote to memory of 2320 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2320 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2320 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2320 2240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\694b1123b45613f70f827e9ced89f404_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ce141784c2696ef0ecb12a94ec4df1
SHA145db0a2c6ec9759c43bf5f49bbfbd2ed0808acdd
SHA2567f9cd158275deacbfd4b270308cc91c06da7827d92bdcf3314eccaf423dfeb88
SHA512a58c80f4ec289bc6094c1d4128f1b6222be30e5f3dd311386dd3e4fc48449085828c0152a1eb7f3eb30c7e08d8a0cff2e833f4d62a1c059c987bd495d98076d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54070348723c039962f23940436be2d
SHA147cf13dd614e1b9d2c1704be35eb95b3acf3d37b
SHA256d99e6ab81b323a310886c18b7f9ade494dc1efb7930904a33775cb71c5e9b335
SHA512a3f32cf882a8df0abdbc7a15df6fb05f8d7aaa9ba1dd3c541986cd7fbd296bf8f4368dc199ab6e8b6b2a793b3e128f56a2b98c823f1689dd109c6175715294ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1d400b771cfe676d6d6f9fe3980ed0
SHA10622157e309c380d324e576a17c9097460d7420d
SHA2563b1843cbd3ecea606a5e7205be726d1d4b50453885e8c665dcc945c75f36bc2d
SHA512b39576cb0727cddcfd3e69a4e6867cf3290da8ffd6037d7de4946f38950df7fe7d5e63df40d920424ea15a98c52ccfcad4eb54e15ea02c2343e21efd99de52f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f5cef442a44cb84697022d54a253b9d
SHA19314aa36051a47c8f4973a007317ff010fee544d
SHA2567e6d606f888f67487c33f007c42fd8ed7d76c138e1aa7e72fb83c552bb94f0eb
SHA512be9f81406c54bc78dafba698c85296e13ecc76f0e32c65ae92351ed3659866d1246b0998d7e038b78b7935c2fbfcf04a704ab1601adc84a2be8315a27e1a7150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563f2dee5f3a60096af57316ce1579734
SHA13fb74a9233592232d5140b219744d428354ce365
SHA2563462ceaee2fd3a27669d2865fbcdd381033bf63ba682b0c007ea27f67558d21d
SHA512f28ae3e11e7d8fb1b11990999d126e34f448dfe8671257bb8c5f88b87936c318f58f05c67e238d0575d1001258725d1ddbbcde267384c82eecc1a021d29cb259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f364a04b6a12e086b30e7de50bd66f72
SHA18fef297b913f56e631ce5163becccf33754c9ad7
SHA256fcd37924a2f04d9c2e3b63ced77ff5ece05a0ab22465ac152795071925a99d10
SHA5125b3889aef9cb99936577bb57bfb7b96443f1350b31a180ef446c7dc1022b4acdca415dd68a8b3583a04186a0fb47b59e4811fa0f9a7c060db808370a452519d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aa452779292dc26c681ecc074ad2d26
SHA131e6c6475ea621010d2e519fcfc5b496bd9d2111
SHA2566aad64275b45ac39490628e06ea0331d0365e97dd067de61becf357bb86d7a2b
SHA5124a85cb348f44947a9616ae9eaf36706265d2023e56cdf8a964ae0fe7ac0c61c5f6fcfd3a784fb23f07910a1f5c6c7807d7905f1342864f2949b54c6710f55c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f0b08ae187c872bd055e14e37daacee
SHA1d1e5f7aa72c0cd9e4f922952eb1e09cc4fefdfc8
SHA2561c2b978fb9b755c973de92846a2fbe72fe67b542e233058f5657d046d0636cd7
SHA512d320ee50f0dcbf87eecd7711deaef21cd9ac0d2fbf8047ec36c285ef7adf3caa7677964fec47d5bdf02f8756e6da3b4fe583f1e7d77ecdb30d156be25ec7b7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336776ac2f010e30107ae0f963fbc3a6
SHA13d9935ae41a155f7529f95c39d938667c85bd4c5
SHA256d422a7e02657cf2fe94937a36ff800b0f3fe2b39d2ef6f2efd86baec647a8162
SHA512bccc3dba9abc192a93275bb6e6f0b3e1d3e3adb94fe82d8b5a050c83c9ce7af5758e9a456784be487d0ab52ef088dc05a92a9473b89f26599c08183605425046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5599759fb3994fc8ab63809f1f30d382f
SHA10d8a093c98a5975ca69c038694422d39e6795440
SHA25659f4587a89e0f9ab917219d8665fc21072b56f76c3d3417cd92716a0f99307dc
SHA51215b5047fe9d5a722d1eaf6cb4452e37d678d60368e52a5d0da554e11f397dfe7fdcf406c430233fd8ed4127115c4a1912e9302b9c13ac371a415066292f62b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d9b189b7137748facafb653eda5e48
SHA1be4f06523105a443fab93eb0a788b615a43c7e0f
SHA256a36f1cff1b71e71ec9304fa866762885fb930f9c403dd20c276fadbf9f35e35e
SHA512dda4847e613b33d75b834b0eda73f26503779c4087b6c139075ac8ff4c8ffa67288c21648259150a5c40f64279d2294df3c0a7a01b88f8fbf261a6094ed4edb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc38a0ed8f239942655b290edfb40929
SHA11e7b86d26be4db8d3768bde48a766d2ab2febcac
SHA256786bcf9e73ff58daa9994d69474757fcc3806d4e13989df372d1861ee94797ec
SHA51283f89d967056da5929628d491c9e31f901bd54602a49883f0465d5face2c190741a78e132b5401a27e3cbfd108a08d37633d26efea2ac37dac6af79e1c08c07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2033dd4f37bca3e646bb88a79c05738
SHA119ffba638541f1d736d3f77c238f73b272f8a5be
SHA2567aa25d92d9c9dd11077c53645d6a9084bb475a3fd761c34f6ab09fb5c2f29566
SHA512ab7f8bdae51738edf8a7b0161214f7431d6cc3008adb89b7736f389f5971f4c5d814d22960a46ac99061b132ccc84f2c9b8870a24a1c3667a52a77e7fe542bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e3f16a07e59e85f61235bdbeb39ee04
SHA13d284307d04f1e2ec0639ad0cab1d615ac4b67d5
SHA2561a0f9d63425bac33fa8e9d882409d6550e2965aa487ab00bf4272000f3ecd7f5
SHA5125586eada72b0453b6dcaa63c66a76b38f723dff91b7fb2b0397eb11d06d0eb03e3b0bc0ee386519dc2dcf960c047f327ab5557178cb5557a4bd97b44fad5de1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ace56a0765c2cd33086e87ca4b62f65
SHA10d41942aeeafd1c25567789c662a940b0b38580f
SHA256a36bb60cbebbb4c91bc392a6e752b651515b623b743e3d46e0c9b1095eb347af
SHA512527360956e971d6cddc9897c271d2d6e88910bac2beaf986af36f58d63391fd8b6e841dca75e11cf55a7afba1b91c6fac1090a60a75c6da29defcc63853fed11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ac5e65331e4ea642be958367ba4c39
SHA141bf743b16e1d91a15420e2ca5fc0e0168759230
SHA2565176a54fe6792814b8512b73d3f19b2d3d7fb901b34ba0b46527e10ab635bd9f
SHA512fbac87d4f49c266a8f5edb0b7af9509f1ecc5f7a0be55378b5b551c11b5fe8000111947e3f968f423ffb02982cea4b88be3446a6077146994570d0e3dc867fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab22dd0da5448968a408e570e8b6f806
SHA1bd73b3b6e4cd2e5ad69a7634cfca6844ea5a2f05
SHA256dee8792feb62b753fb18f759bb4b5d2c971f6ff17c3249c5affe078ada87b3db
SHA512d64893995607c554d1715ba28714e8fecf926850c1491a2e794d8ed2c0803d3d1c7687e20403bff94eea56b2e1eeb68b5da0040b3fdac3fb519d7deda38f0aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd03293debab5feae4f5aa3bb142d636
SHA1b89bd6b95820e54d012683e742912324e3a52907
SHA2561079b67cd0d92281e6d5c8ef77167fa658539a95a2b403647e32586af0671de1
SHA512b4159b5d4a44ba6ef145fcc430b936bd11f8a438a64158ffd22ff341ffda13ffcb50e29cbf3727a0494985941489d42b142077c1552b344cc84cea498de38e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4434df943a55e46e3212c82078dc59f
SHA1e667554bb61f85292b2e091efb16b86e45ebda85
SHA2561cb1b02c79b61fe181503b9635aeba21d9d5e8dfb63c965894c53c0b87487f6b
SHA512cc15de896ee844969f8b0d00e90fb3a34d773f2603531b439a8ead1887fba081b287ac42596c1278112fbccba0a3a016202fa5c1ee8542b2cbf97d2953fd78b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a