Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
5c1481fed1b5d8e0d5abd8ca72a8e0a1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c1481fed1b5d8e0d5abd8ca72a8e0a1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5c1481fed1b5d8e0d5abd8ca72a8e0a1_JaffaCakes118.html
-
Size
18KB
-
MD5
5c1481fed1b5d8e0d5abd8ca72a8e0a1
-
SHA1
c8cd6beac078b030f2ff7628d4fd49ec9e398fde
-
SHA256
7447de1c7960f27397845966a7f6d64d64ee32e50009594683a1ff64ac4640ca
-
SHA512
065d7d57925e1b4250ea585c103c1ad24d7de72878648a8a15f59a8c650839b799e8807fe7aa7dca61824034958ce86aef77131c4319d166f8a9a0cbe1443acb
-
SSDEEP
384:fU1ZCMMx0iFoZ7EyYBErWOKX/YwT7L6+95AuhQYB:UpMhOOxBcW1XgwT7L6+k0RB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000070a028880e061c4a262bb7b5a41fc17770fccaec9a8f32061fa2c60a3ae9f2f6000000000e80000000020000200000002f0516f48e6447e3f79ba73bec0a308f9e6fdcef5f9028d75b76db988764c9512000000021ad7f2e152a67c259acc0d30e84ac40997c12591b19faf60db096e852341ec1400000005882fc1aff37b5d2ba0c47898530205442853b72b58fc3f58c7fd3270c46c2dd2cc21218deca3ff6e0d9f5f61f6b876ef7477c293a81dadcca684744a4010e90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422323826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000009d7453c1d46afd722286706925f732427514d0d751ca9533eb3f64b2cad0f2f2000000000e8000000002000020000000bc2f2e639f551c5c17648e0c5a0505144089d2180ac8c45a354e8f836e5f7a7d900000005385105c660b6384574217bee05775d6f2aa201b4854554685bd5bced042899a483023c17efc5aaa6ceeacd0e16b36643eb06a48e98d256651c58a3dbd7a75ae05399bae29e428d0f6c9452351c19b560eaf8c01b4fbec2dc77240f74538c8e7f371e14e12d79c1d0977f979ae4596d886ca72bbe33f32d71937f88677f0f63849cc05a187a1f31e1e4b0d65e213fad84000000092fbfa926809aab881fc296e5b61d697b2f2683e2693afc09373c3f918ba51342b9b0079e313cc084cc1a1ef562c29add75fed70a64a337ef8f88857fea69d2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02022281-1639-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b004a8e545aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1960 2892 iexplore.exe 28 PID 2892 wrote to memory of 1960 2892 iexplore.exe 28 PID 2892 wrote to memory of 1960 2892 iexplore.exe 28 PID 2892 wrote to memory of 1960 2892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c1481fed1b5d8e0d5abd8ca72a8e0a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb7522dd7a8e756cb58a3f9095063bc
SHA126b9ec5879d37e49d854cafe89007f113724acca
SHA256a4c3188d5e0c8e68134b5c76c3948faff0be8661111cf8024524516aebbac9f5
SHA512a16d5a5a93bc7b81b95d63184fc72f5569cef666681c7ce9b0f2f545f598e057d717cbb019f43d0b5f3e62d96a715e3d9049a06624624126d28cb3c47895adf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eff6f70dd802d00517c0f01bffb00c6
SHA1cd6a1f56eedcfd004acfa142bfd3e71e983a7459
SHA256b49025477d2e5a98458ab6758e9bda111346e2ea038792ca53e2f1232d86ef33
SHA51280a113d027569f8b8f110bb59b4ef3b5d2b597df15e510ac2c674043d90bce3f5dda6f845edb89cf7a18d36dae58e2c731b1b9a516b9c7bb6f7a0d5327dd3286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c8bfa3bdae756269910625aa7368e2
SHA1054bbbdb97f2da9db6cfb1736156c68fe1cc0748
SHA2563e51796d6ce43831bf2f0ca1319db5310998e77eeefd69176141eb940a7a1cc0
SHA5128940d25ee6d752453673ebf6b15c510d2edbf5fe72e66b54b98188b3e77a5e303d7d3903f3d5fa04a5455cc76ce14f56be8d1bf8f5886d6c2f471a3bdccb43fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aba28c9974e929e98b4ca365b8bd625
SHA13ab14fef2bd7df903fe30930f635a9e5b9360bbe
SHA2562124e9a51d9e0d5cfedee53856a641631755a92bddeb06c4eec021edbf0fb8d0
SHA512a5e8d88cb83c12dd6830ff2cbb531fa9b4f4020afaaa224832d430e63a6c09497197aca36e06268cbd6074da77a72aaca8ebb3332fa1824660968ed582ad7572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d27e1f604669ce6a99bc8d114600195
SHA10eacd15ca35cf2eac39e855ca548e35ea861e5ec
SHA2568ca507113b2380ebb2b3078a872e7c5457c7630bcf4ccce324a78ef5fc3fe021
SHA5126141619d48f35f06c741cd258263df84b180c084c1ae3ce0d1a9d8decf34a911ca577b08c0ba4a2aff762b4b4dcc7715aac0f9c9271df3a59ae82b6f131732fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537dbec917750a3f51d788c845ff4edbb
SHA107a68dbc69a52e28d61994ae48f5defa8b2ccdc6
SHA2561bf943c4fa21a88bf790b7500c987f0d8729a3a5fbe364ec37c01028cb6d2ee5
SHA51224a74f74693c55c25aa86e89f7e7f2822a1e53a9eaaa97de529a435d5024f2e5338e32c87b09db6c5017dcd09d2c89e2518f29f2f9d228ee5b3228848004c1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de51bea2cac3d4d4609bba5bc608423
SHA146f929efe4c9b19bfcea8ba10cff03dbbfc7c1a2
SHA2563e24a378020fb8f4dbff5daf1671de4cb622eaf4d90a35a529e070b398fd3f45
SHA5126dfafd62544b071d371e5149311ee0ad06e3719dad27eca1b09327ae7bce8e27558697eea2f3c984527a272c5d450d28e411f95016e8e3cac830c5198fb7f934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782d5c2cf474c3c2f187ac357c253438
SHA17d542afe4b9cd700804d196b86b37935209272d2
SHA256bf9db244c65cb88fb233a34a1b0a61adf6aa41a89280f23114419ed140043b8b
SHA512fd40f4953a7cf2274570e6f71cf7718cedd0207efe7692d6316128783cdefdc1468b4e87eb6c07d48287240102f353754761d3855f58895045effcba44e18961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505529526036cc7d938831ff92cfc8d65
SHA18f563857464cd763cb9cb153d7048684b0ced496
SHA2566fdbca3b1ad4dd3fe6424b68d973afab0a37c89c450e6366eaf1f2977d603ae3
SHA512b8610c2aa7919ba5ad5f7fc997d1f7d21665d9aa500bfd05de5450fe544b05b54472664216900e6b8448f9d63bbed4d2269d7ebd3b4131945b6884baecc2bef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a48d5b0615290b4b541d72f57af8442
SHA155d7cf2db808f1df351c85c6de4115fc1cc022d5
SHA256d9bf471da9dd5166a038d8dfcc01010435260ac1dd78d30f3b6e9cd833df7a78
SHA512b5042a7ad7361cddd3792c0db408c5c9ab70390ce9f2f470db64d65c846908a0cd4cd548afe587b6f89e54a2e86df45a52285a3e448afd2fd0d78727c348c38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae2a035b88f49ebd0731697dfb5e2ee2
SHA1ea543c35eff3b5535e6d2e3ea9782d37d097005b
SHA2563fd7e22211b4e67ba36eb5f05dd78d725cab49a1d1b17ec664779fa6a5d71993
SHA5127ce8ee42470207f07d77dfa5f32d11274ed546833b11ed04ce266f097a8a67c3eea8276a484ab34e2b4acf82e158fc1837118149f8d86be6634b7903ceba8861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5445f76193ce8ac13f25961370e38e39c
SHA12fbe7556acacc1996ddcb25911219030a84d40c8
SHA2563821b4093c78663551c2a1263a9b6499c6916a2d291d72e15f95f5f93498ec8e
SHA5125cb92de4b599cdfbf31a56e67c892354debd04e110275e0106c8f80ee2af6d4c1a09f14072f13a46b705990f1d1c1bc5988724ec74c1cf55fa1235b980056977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5248ed7446f68db856045db6c0735dccd
SHA1da53d36334dc2f8ed90bc3e7500967ab04b20303
SHA256613d88d8da1ac3d9ef3750e92f36170aa3944e3de7f76fb1121dbbb61c10c8f2
SHA5127524e3f76f7e512002b2abc86f011d17c2e8cd259288f7b79136d9839de13b690e0f75ba89fc0583358dd6907ee3355bdc8058bdbfc7a56800fa610787f09012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526da23be1b23fc2febace1393deebc34
SHA1c38ecab34b2ae255c2cd5ea193a1d0c079e0a5d0
SHA256e03d43e7a05aa97c180b04aa51d1f4f6fc8641d57a72be3378eff9999416d093
SHA512c34a810caff6341e615c0ab34d3709858d4b2397e784aa0a0ef922387a77e564c84ffd30ddaa2f61b2bcf7e6161ea6dba74b4d26bc90fe25fb04b6114e4b4a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c33523fb69cdde5d51092f61e5228525
SHA1e1792e4b6f948800066a7f7802e1bcedb6d04956
SHA25611d1ee2c0be0888a475fa5bd26ed254ef9ff00af997e98eafc9aad4a77191e41
SHA5120469e3636c291a08a3a7ee959d1f6c78be53ecadd447dbe9ff4bcb6972421dc3aadfa195b439036dfd1b8d32fef8e132d9b1ec09eca663fa0b59cf89f28603bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0745b54909c45daa41a7f053fb25de
SHA12fe135f8fdb8e5bd6ecb9f308774cfb76a457225
SHA2567bcfb74e07439234ef779b382a55204045394e3ce62a3dfa0ae4c5c43ee6ecce
SHA512770abd7dcbf8353082672a90c6afd0c8f2cd8830cbf64c6529108224c043064e7a9621d4dc076e5bc13a4b2dd85df76c09d4cc2a95a59c524b4f991025e1c345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3d87141426c72ac57ad1eee408e776
SHA12d87cf4a5ab9623c29ba2ced8cdab64b4ad7b75d
SHA256388520982d07794c921cd2f9d005acb9ae82e9658c8eeb82f834ece54d8e8ff0
SHA5126d33cfe027cd08edf18603e03f36502c1e193efa3f8f92a5c0a63ac788575c28a5c98bad838523609d46c04038555a2568a876f3b2e6cfcf4909f72070f2744b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d06cff460a43b0443b2e411cb38b7fb5
SHA162d58d237ead8790734f7c8ba366f4dd11af675c
SHA25685d88a090399605a486e3f3ec758f9c101f21e6d389ef0ca6950620133c4ae97
SHA512e9daa33a032eada832dc2981a5e6b889a62dfefda10c72a2c734faecc4f41ac9382839fdba712599ee724504c25b56792d7710098ab52c744b3f9f918482ab0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de4bea6672d0d93f70caf52b282c3884
SHA198cb4e1edb9d5a9a3285e6802c37dc16f19fc93c
SHA25681e63d1b6cbb0e221975de9782b10865ddea5617d014f1666e287aaa4489c7b5
SHA51255e8b7f2b7c0b2fe00b113890f84c8947947f76feaceac74fd901b03f0c51950f1122d2f2ad4c97bf48618cfea172c7c03c3d7ad1c8188b7c8664ed1d998f94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7826d623584886159dba4d7e79e8ca9
SHA1ecf42c81043c41765cbf944b3d63b90655c2aeb9
SHA2569dc66aed2fa1834657bb8f1e4a2451b60d1118d8aa8a5d72cc6f4a090cedfd75
SHA512a58d972017df1fe49a0b68dfe02f9ebc50d507639ad2294602ddbb1f2800052f4497c5d16fd4a5f27939a230c67e1c7af7223b5fecb8deba702d9fd73b3aa154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2a71cf04ce18b778db2e5c93186e6b
SHA1e9fef04eea1a9fbb114d81d403811b00878f7d37
SHA2562d35da610af019e3fad207706403880426b07bc785887d4bba5c0741fb248be6
SHA512b08726b992e9e6dd70f0efea22306832d38d66aae770333e4e91a460c1b8ffc26970da2841d012adf1b05674ac4e8ada806471d78000c56aebf915f47b857b23
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a