Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
6965f92958636eca234872ded7639510_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6965f92958636eca234872ded7639510_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6965f92958636eca234872ded7639510_JaffaCakes118.html
-
Size
28KB
-
MD5
6965f92958636eca234872ded7639510
-
SHA1
7d2723ccf8d2ba1e7d5db8940a80f65538dee4c9
-
SHA256
dcc637bc4e0b639b7b099b8bc11b4049b21243b5611f22e73eded49d2805f9aa
-
SHA512
34d55feb00443c7c46cf18fd54406b0c0aae0015ff647a9d98db4c7e2ced53be3004ddc881447b7af677d6bb591759dc3e03037d16651b00dff15eeea7a4f745
-
SSDEEP
192:uwrIb5n4DqmnQjxn5Q/anQiehNn3nQOkEntewnQTbnI8nQ9eJFm6sf9i6pQl7MBk:EQ/nkfq9i/SVq
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006f3c7a7cc886b040b34471e9bc34191400000000020000000000106600000001000020000000cf914a126cd2e96d9619cf2df6395e7f3bb9534532c8c132640c89696b43e334000000000e8000000002000020000000710f4f9b7acace59f5c8c9243c814b6e5ee7a7aaef516e094711926bc13f674220000000e828a9dc06922b8bb09d1294ab40a51ffdf34f8096e11cd698cddb51781c993040000000bbe6d1b60a1ba23dca71c55ac0d68651100a07099810b7c91baf879d5cef860be4c78b1e5f58e643e00e5069a8fedf790ccbf34cce8c016d0d3ce8522f005a8a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E31A7E1-18A9-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006f3c7a7cc886b040b34471e9bc341914000000000200000000001066000000010000200000004643bc8d757c803ac5d77b5b14e4487268011f1c19e80fbe3db26207cae6b685000000000e80000000020000200000002db8b0ab6f4c1297f4c1c8221ae5c5162fee08aea8925afbee67d3952ea056a090000000aec96e4b25158aea657b6d70b1f15bd2f720441a8cc348381982daf4ed05f2648b0dd81a9fa6ebf84d9022683748d63b8f7f43ffd5d921571db88a6b08ec89370fd225a5bfc39ef2cdc2fdf6929a69bd5bd83c1e92bcfc86734ba4b321798c2b0060e323d3ef6daca652aa50877f0a3b1c03d02da43cd7908a58fe6b99cfeec3b99bc3b91fb23a1238ab9e0933d4e4cc400000005f3fccf4bf037b83ead4053d5e77bf9ede445836927b11106ff8919e4f56833daa033f140678bacbf2e6780bdde080f5a32977b976527a2e15a343e6ebe4633b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e60513b6acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422591932" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2180 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2320 iexplore.exe 2320 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2320 wrote to memory of 2180 2320 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2180 2320 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2180 2320 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2180 2320 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6965f92958636eca234872ded7639510_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef0f70f62ac6e90130d418ec02f132da
SHA1215f3bb6181f172dadd1cc67d85a6790298f3748
SHA25601c72c8e68cece5083ae72897f264c3d353ff3db2af450cef43d68b71a0ee5e4
SHA512883b85f54287b96db04f272fa8d0f49303029657389c724d55da02593c2115ac67e0ff95e7a42e1763e5b4a9e1f3cae4b0407c3d49df6f6d901a2ba77c1815e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80e91a1f9ae49e14765d38542638b3a
SHA17a7396443eee213259b533a28ce300d2f83e1ff5
SHA2561f9a9dcdc18582ed25030003f133b7bcd0fc6504d40d64d77ca830bc64f25b04
SHA512a25d289a16488de8db976939b8f667ff2f1bfa8a061ad2fc849204fc75cd5b9e46e137f97c7dbe5502a5230f9238ed55b607d595b5a248b4f6143dae4388cb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ca6961f2b290d7b88b41050cc9d22df
SHA1693a92582b4daf87cb7748faaf7525b8ff3503d3
SHA2560c87b8ad8093915e410568421ef793687966ef2f1885a1b8a8248c74dd7933fd
SHA51289a90425f9df665388d52a4a4d78fa2ed9d22764d90fc4c62d5bf54d85f1d5213cb154903afbe07715198e19b4263cddabf071a1026fcbfbb535db01f59d9501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f91607a40f3e8f72164a4c604462cb
SHA1af9ca42c492e8165e407544caf98ca527fc7ad6c
SHA256ef27b5996042e18fbe7a810f614dfba3b495fa44c4b7c5660cd634955796bbe9
SHA5122f4fff28f7644c4876d412af80d29e71e492a60046ca82d8ceda17484172e82b633b8b311ed397e78b5fe7ca6e076741bfaa31ed550af8a6d5b28605e31b4780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9e8ef1afa8c865a1c9218e6a040c24
SHA1ed2ab74c5faeb3b65f0a2e4528ef453d583ea8b4
SHA2562e4e481ab10c3c6f693071aefc00dbb599c6e811965f62ca561c508088dc8b17
SHA512839c8c8a1d46d69c60260b572a56a6e8e387c1b1221314a254201b98e47f279302711c0a59c64f5c2459844fe89e623b1d30ac9889ffc8c5c6da80d927f772a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58685a6820e55db6eb0464e32ab17e92f
SHA16709f02174f35b4d0b57fcb8c7b8b0b15150d215
SHA25611cda606296ed34c1172412ac407334a55dbe93fc004bfc11475f05ecc34de2f
SHA5121ef1d14197d709ce77555cf2b9c423f7da8b632e9a708719a24a9b912747f83fd5681368302a15332bc3d44edc117f467ed45e5599d034f8599781873862d4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bcdb7fab4629becf3047b8a0c4fffb
SHA12134893d77690b80f587d5805c9437814bb586cb
SHA256d5403d1fa8665300d40593fcba668dfd77cfb991fc20e5f48f16df60265c60e3
SHA512a4146f96ea798fdf43ea5cb0715fa778f702109809ead070e45993e99a28694256db8380b93615e34c4e59d7199fd15bd34db6c721c7171a2a7d3f070e6106d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523bfb7012a74ec3a8b37fd560bf302ee
SHA1f2f6a347ed8b6e4abb09a3fd75ac96af2469ad68
SHA256e99d1d83fd6334f404d3e2187fc9a3a631930fc0670664c647ebdd5826708c3d
SHA51250a7b4a630bdf3ce966db212ad0a9483fcfc5052687b07b48112f80e28dfabb5337a75ba056e672b3e482630efb524a7065b45c8b67707d8e6f02687f5ca4529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b182c05c7fd516b071919bf06df1d5ee
SHA19e9ca2c2f951c3f1cf0f9ef2961fd5701127ff02
SHA2562596564466c22345cb13ece8daae6e7db0cf42a78f7e624e05b4585417dd2992
SHA512ac1f36d32898b748408895380e25d7c8e1608f61708521b164d7e59a405cd1adcf6d1a3e0da6d9fd691d09302a372464697a959839ce30cdb0ba9508ae8a2a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521152af52628f500ed0b177191e7e33c
SHA1580b6b54ff565da30a132dab738684b94fe9eb99
SHA256b14d0e9c9b50a6d9089aa123ad2e71f01bfb792c4706ca27691a2ee4198522c1
SHA512a1eb08da32127375c686d443cdf06ae96db187f84c343755f3a5a83693d75de0277fdd68427e8562c088fb8312a2ccb98658c97c64748bc0fa502611f63355ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b580433f36e55be2cda42798e55fbc
SHA195609dcdf549c4088b5b2d37ec8c4bc37a2e47ea
SHA2566ce98454c7b9db22b046c925dcba494b16fb3d3f6041a452f1c975faada47fdf
SHA51242d4c18a95e7d870063d137eec9ac4d7e6c947ed5097147f527ee3e10d7ddfb58e767a0bfa635558971148c9c1174db7ce452df846075aa16fa79c5cadaf6a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57347d80646445a2a1ac586ef996e2a1c
SHA15ddaa8b91330562d2565a3bd157b4c6728d6c4db
SHA2564f30d4279953719e2ff1a29ab00acdffba5e78ac42a0da0d93783bcd2ce6e1e8
SHA5125dd25f0cfde08446816135a7443e18a0854f860806f14fd8d1dac9049a015eaa13463836cd6da4f3bfea2a693d8c4abe64ea78574d5356776fea830fb019aecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea9d5b0a1fcd16dd0fd6948b721760d9
SHA16ba0a75fb2f1884f33fe3be533bfaeaecaae6158
SHA2567ebdc6bc2e4d40d751141754f4af2cdcee180e923584a61f528669522242a13b
SHA512261cadc8eb971945b7b6f7a84cddf8d08ef1da834277b5ce1734844a95c64d1c1d25c552d56ab09ac7102d88f7f4b36e9b25098f6e28eb9cf5a1c60626d75b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe43539334800cf1706d0b3232370fd
SHA1312c05a4c2837cf83846a465816edaa8e6cf69fb
SHA25636d4b610e611bf35cd8f0eadb8479bb9e4a5e3cb496d727de2ae711d171c6bec
SHA51225c1dce02a6b101829b38bfc320842bcff8c70896ddb35f43022de41c26b0a20d7c96bd97d5c51c06836e03d7d49da17a6d8944c3528bbb058028515aa16eded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad56af9b5ab2a47329d6ab2070085c86
SHA11d277f138c4a2b4b772b9d50d21c19f0c366f1ca
SHA256413f306fd89bc0162c79dd108fe2c40f458e76192070cc073c0e55adc4325403
SHA5126699afaf95e7c99f0f4a12fd1e1b76b7129d2c3e929709bc3a2128ed5f893a33a591ba70ebda0178c3df4cee417d2aea731d158a55a329abd7da75a956a764ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ec86e8f9831c85755598b023c99682
SHA153dcb8d4725a68e0a42028d3edb237109a2dc00c
SHA256579268d80c3d4e22fcfb284656ba159ec13b8ed1ce8e2501e02376dc18ed45fa
SHA5120d7a7e86d2776d3c472c8f25109be02263fae3292b8da162c5cec0cd0486b3c75d73d207ec4e47291c84e6b2b0e1ac89342d65f896b8e102bba35151ae2ab254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5277d27ec6c6b8706e3bf34629f6c49f9
SHA1ded74565511e511c43247041386e1fc0728db3ec
SHA256c1da819a9f75170b82df86c1005eca22c06ca57eecec78c6f86a953756ae4d22
SHA512f3379f010c7c3257cd634d0f2f82cf3c87faa466acf8ebe014c708350ca2708994511ae697148a9de133874a373a9d6c0f179c9f531cf13e95b422073db7abc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d2683f12a10f54945228bcbc2d15762
SHA13d28ecd51af5bf1492127c06f230923234c6bd1e
SHA2567ee3e8de64c6ce053efb7b487113a7f0089d2af44acd25513e242d0755176b90
SHA512827a72685548561e7ea677ff00204afda847d365a9cc5a13abccc6a88f559a5f4bb01102c2138c3e902b0ecb58e451b3feda5babcdfa19249d928c22167c547b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a