Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
4ac2403dc7b3a04c750c68a13bc8e71b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4ac2403dc7b3a04c750c68a13bc8e71b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ac2403dc7b3a04c750c68a13bc8e71b_JaffaCakes118.html
-
Size
23KB
-
MD5
4ac2403dc7b3a04c750c68a13bc8e71b
-
SHA1
efbece256d69c079c12f75ec0409a2d6ebeedf42
-
SHA256
94b059b2624ed91df3b357d7e6048879889f954716867de961bad3adb374f123
-
SHA512
a641dc9dd5609a7f5a717fd1d5a444b9fcc6495599afb95ba7b10089c6a7ebe047aa7738142c869f5efee8ae975cbdb35c2d68fbd706f6d0789379f39da5d94d
-
SSDEEP
384:OIQh7Zr9Z6VY80gZyFDAlZXQ/PJEukF7SQxcjNWSNpzZ9C5bKjFJb:OIQh7Zr9Z6VY80gZyFDAlZqJEukF7Scs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9039631e81a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004d7d1a8648b82e46a33c6e7c097049b00000000002000000000010660000000100002000000042f58c7ade9afd0bd8edf27fb6b15b5a21699ce92f113e160c5f6e3fb2c1f853000000000e800000000200002000000058cec83624379ba3b68afbf626e08d1042afdeeffd2ccb48367f9774b893de7a90000000ae668f8f8f5bf7f305415c15112a2ac266183fc179a5bed3de69ad01925019da8ef50eadb094e503a4b17dff4fe69af1e6855b8f33bc946ca01753d6c9260e95f7ef9df9477a6e6407d43db04662498058d69e363c557369e46237a5581d52bd39cb7dca30271f025f9ece21540bc5e4d5343de47aafb161a9140be51ef84c85ad8f3903cea4d7ba1271020a30aec5e2400000009d1991a1363d0e3f1610a74e30b5919e18d34e53dba7e2495302cd754186d1ac9f46f0d72448f14ac28f911649b9505183df2701c0aa8a13ada0383a515371ed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422019432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49AE8191-1374-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004d7d1a8648b82e46a33c6e7c097049b000000000020000000000106600000001000020000000225ac5b90451cbfac2967dd6e6bbddb0b6cb05e410c63d804cce890ac7072361000000000e8000000002000020000000cef626567ded34d2c5e6a760c68ea69b97090587ccf9f3ad9a0ef828b35bc1bc20000000f93989763c46114d2b6932116c95c9781755b353c90084985ff473491aafd4ae40000000254782bd78695afea5be90920057a2ac20897d77a74fb0f2407aff8f9c155265345c7aed9ca1e5469286eb2d5d710741b366f5e2a8ae174c2f6b8cf6379416e7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1336 2824 iexplore.exe 28 PID 2824 wrote to memory of 1336 2824 iexplore.exe 28 PID 2824 wrote to memory of 1336 2824 iexplore.exe 28 PID 2824 wrote to memory of 1336 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ac2403dc7b3a04c750c68a13bc8e71b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5669380c7e1ac0d0177a30516b5258f30
SHA118abfd8e4dcc21f0dc9a669d0a166612da19cafc
SHA256223aedc4749356f1ec28a52eb49761065c923ef05365b4d9a09457afce9ca74f
SHA5121ccd816da20ddb8f4370fa91c1f043d36ed6d239ce4cc650c5ee8acf99d066649ce4d71f363391ced265f2d30318688345ed6d700ccc099fd783d21b40e6300c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc14c3da62a52651c8e97a806505a22
SHA18bd78d816da6fb1411a420769d9b8bb3e3a3ac07
SHA256d676450431327acb02c8b32284f103fb7cbceae15763171449df590d3ba4a507
SHA512710e5cdc873c8c4bd17d99dd2d462bbba9e9a217d835af07b3f60f57fbb15009c71bc39c9347d4e37d2e1d57334f7f92ff067b279c88a01925732639e199bb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509c66b5fe785c4613624b5cb977f9ffe
SHA1c14579e1a50e65e00ca894269718f5dd59e2363d
SHA256bafc3d743578106b5fa0bd18f62ce96b4007bdf42f8054bfa95346fb856fc7a7
SHA512921f81ae9aa49fa640061977a9ee09a68803a69cfa1699b172f798af7c457c8a712427b381d0a67f2bd28c10e85953b8ec7b3a5f8e0f7caa0a521542327534b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca26cc48276daf0819ead034ecf04c43
SHA17e4a9b478de6a83684b45f49907725d4738fbd6b
SHA25639ffc878eeb3faed40373a62164c0b4953051a9e9385250e19c1ad3b20c2a6f1
SHA51293acc0226b708eb09f604c3c5f699d781104668f86f593321f4ede7319a81f406d87e751480488f74a020daf18aff1a544de7f04c9cfe35b09c628be9eb2d755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ebe5519e6f47ee6fdea2e58ec3f17e
SHA1c5e40e151713e6b62b2f19d7c326d439cb5972d6
SHA2565bb7684872f9f76ff1504dbea2e9dc0126577b6b8de35aa71c9c4190c2e80573
SHA512f9a97223374154bf8fb9185a93d14e869e79af789d9f967d36f07579c65f6d2529c5ded83c1f0a9ec17a9bf0c5976f56ba19b336d2a94d8a988e024a9464adfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419e9f6f906c088016f990c4a830f47b
SHA1029d186ffe65e5d08535a6535ed6133d1ae0640f
SHA2561f26e14a147d4e3592b68043681bddb4094aae285832404654ab1bf4102ee31d
SHA512fe18572ff2bd21dd26b2ef7ef6376d795cb3ea9a37267335ecbf21d7287dea7493a5d3ee1cd6615674f1ee99a7f3b38c815c8401b69519f5494e130e737c460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a313d994d5b23c4f65ebdedd21125e66
SHA192a286c39c65c31a5ded0cfb69e5ad839c68111a
SHA256d2ed93a76de9e07496446ecb33c982a34608ef37ef88733c1b42da6a43a0280b
SHA512f99176275466cd4ba774b5416d71da366a7e75ade5b170d463b01a297ccd6bbf91e433e43de4a75c5359cce19c25a39bd002251acb6969e0a68e4a7fa87af6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b96e3b9eb935f2a76edd3f069d711be
SHA1e48e2eaefd6426b3e019aa19e7a049839c87cf4c
SHA25667d10472bea086680fa88fd2edf3e5b6ea44d73fbf5ccf999b48cec8f4767214
SHA5125cdc3aeee707ba33d7951e1891373dc298e516f456a99ee367c419bd01445f5d90a2d562cee0c336061ce2abae0935cbb49dc285203df10b035fdcb33a1cd057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a10b1d1791e448824c3980db18684b6
SHA123549b0c189ea13d42f2253482c18102b9f127ec
SHA256c95f9ca18bb61cc89331226030205cfddd3983c769c1bc723bd5cf58aecd1431
SHA51288275ed10564eac4ee3673fa0ea47fa9215095b309bc64c241a161b218540f63eec0d97a064325153796406d83f337621589b1d546840922b395ef526ea1baad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f651d7822dde43f19de469fd15c78c24
SHA19c4816f8fe54092d528d9ab930501933ad509e8e
SHA25683ac06b46d023d6177548f4b433dc78cee2a380300841ee5da687a045a547ac8
SHA512f98175b3d484e2bfd646c1765d86767eee18d854f6000c9ede442f0d849565a4d343a2bde6b1bb36cdf5dda14ad6728a3dd127eb04d6e7679dfaf85f932aec8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976b4605ca462e40555e342b09146307
SHA1c13de1fc3e3846a38733e5e75308d0aaabe0c901
SHA2561292d2cddd77ca762498d705f94055a5c691c4a4dd60bdb1e3bb0c3423b143e3
SHA5127e94f77d8575c8bee8511bdc60aa8f36b4aef841d4ab2dbb4bfafaae6d0033ea9f24323649f62a4f29e4a0afb0d785a671877ee2ca51501dbc17651ec0736e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1b36660d7e202b82842107f2d8dc1e
SHA1b62baf5bb82582c18725f32323188c4e57827387
SHA25699a76d610a275c095828d89b4fef7db629d47238a18b8242500d99443fcb5aae
SHA512d03d5f26d7d6470ff709507ac750ee91355650c5fa37179191116d288a1034e47f6884df261ecce5c760abac546921d5e7178fe2f59e3d7bda47974d37b0b439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55725bfb3f37f8c84aaec5fc4b38b49a2
SHA17fb02439b019c5d067d6ccfd54387a6339f8ac4d
SHA256b5305eb785755818b37e759b107b49a0f788e2e159dfb6e84b4253308f1b9d42
SHA512767abe39c343f1a2ff821a8c3f342ecae5faf07b5fa5d74c68e842efa9e935498ebdfb7a3433d248d2c499309855e9e21e6bbce7819d694e1ca1ed23214f60ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3234365ce8c5984b7632da1bc7e06f0
SHA17aa6c003eeb9b0c63208b396a3ef673af5301821
SHA25635faa73a4db8ee1218d60b33ad207542f20dfc1386278f1f4f6a29d0e0ab4cb5
SHA512fd959ae694b83fb145af781bec32a41914b847d770a73e97ca83cb28752f0f497227aad6de51199402069d3de4ff6718eba04a517aaa631a36b3dad522b65470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14d5402ee5f732ed79271d5a500ff05
SHA150fa991a69b8ddf2d1ce5a2a6d502295a3d35da8
SHA256a54a0d2c90480a061a9240a10a32d6dfde04ef7f686a28206027efaf2b51e542
SHA512e84c4c7a311b09055950d285026b3e3b5325559dc9b5a9170fd248aa68b6d81ccfc90f9179d1f0ba667f4d08d4991da409b651ba6785de0736c1c09afb8ce9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56022968c74d752b96f5c77ba25f38fcf
SHA132d8cfae007adee1821fc41bc886813ed70be4bf
SHA256a03c9056ff06c234369737cc13d576002edb5c546acb75c8a4e9de89a6705116
SHA512ea8044dcefdbdeb2ac15b61b746272305f2d071516d4da3673d44d0d84926197cb4037345c51a9b9625989759863574520ded8203f87544850aa65507dc1899a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5923c57ef9f2764262caf25555c868697
SHA19f6c7308178fde8c4f9564aeb1cb7d0126d9d4c2
SHA25694ffed6c05ff62b31dadb2011e81ffc54292f2a021ba887a8ba0f7b71cb3b164
SHA5122c79bd218d0579c69ca238833458bad08eb17012310ecd0ebe5ae50142d94fbc08f3ec47291a6f4d52e528f224b44503eb42e96b65eddd330f66ae15417c1c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a761c2abbe75cf7adf129d2f1d6b3fa
SHA1d6167574dfac0fb15c5fa5a7eb065f458dd186d8
SHA2564495df6554b60e051814c0924e6a4defb94e0ce6f9f6a23eda3f91e8a93c040f
SHA51295cdd1d01d697b9ae56cbbc954d469a2230cb2ba3fd1817e2da42177a63f836bfa6d7f47429be4cd4b2d31da9a293e5b61c4cbab5f50c5f7267a1fae5326e698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50632d3faea7e28f1b697ed0fcb1ada44
SHA1a6d3d6b2a34d0183be5d7caa17f9c67beb66bb83
SHA2563c930e8ef622163a3e6fff3d2fc578ebe3caf35783a0f91f972010776e24f8e5
SHA5127187185ad2fbdccd33ebdb4bba4bccbb9f5c7e88384389b0e8540f26eb8cffd4126825f7e78d3ec3d0de6c7f78efb78de73b342171fb73a74b8ab61efe3483f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a