Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
71b08bfb8a3ded76eff325003e7a219a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
71b08bfb8a3ded76eff325003e7a219a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71b08bfb8a3ded76eff325003e7a219a_JaffaCakes118.html
-
Size
10KB
-
MD5
71b08bfb8a3ded76eff325003e7a219a
-
SHA1
4db8512376110c3cb7d08cc16a14ae15700f8378
-
SHA256
3926bf9c0411c4b02672f5801bf9f356f344be993862657edfe3bebead17bcf5
-
SHA512
e886119431a7ee6e8aab4b8e7d8e2b1e13367d42f8ce8e11f6aaaffb005364e469ba24b8f4b5d59e426c42661290bf37a0970b311efad6768940e48a7239fa20
-
SSDEEP
192:clKtf1ANUuJ66GXKqK5KvL8KvBAKwgsGLua7ym5SZ0/eq0XBVD9+17B7KH45tg+R:6tJ63LpLJ7yISZ0/ezR3GtgUzIM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007da7a4778bf00e47aec291648970632c00000000020000000000106600000001000020000000716e668e8b3471b8c8ff48d9526927dfcd495c4338f9d6573c4ec303dc61d387000000000e80000000020000200000007db63797cd981f4c96d934379a7f1a737b35f957a2a580bb1cb0dceaf69f8f2990000000a25db638e46c4d2e791582e6b41b2b8393af155487f11d25c7bf44fcbbda68e4aa44ba39c2ed595c53c5fe15e137bd5ea3a1039e0eddbed7d323e3b1a39b10e791a00be4e0fe701335dc20b35422926d60d5ff2e54fb98f15272a0ac43df4962a93e1bc523ad7f0170c5b29ef9e117950e40495c96e31ce08062a2070e257d35cbd0f200471d9b2c2b5084c711a4af2440000000080f3ae786f51cebd8595cfff91b9a9199055438fd9ca730c355e1f1b6867ef87bfc04350295f69447ad3f7c688d19bf4eada26fa5becb7ec4f00867f793aa9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422795641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007da7a4778bf00e47aec291648970632c000000000200000000001066000000010000200000002716a18c6c2b3847a0254d3378832f3890aea91e26a43108d7a3fa65562c7d79000000000e80000000020000200000001a23b8ec0cf734c70293b0facee01fda5be89c4f8909a2ec2e87f8984c84e368200000006c50327739dd6678b31bffb2803ffb262310fe052ccfff9bf887d30ad58ef1db400000001f96dfe8db7888759c74787f2e6f8589efac40825a188f968df641a7433d494e59c10194759ad7af402d9b7c65e5a26b7d1777642faff3228e59817d9caa67f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AC1FE31-1A83-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30db5b5f90aeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2560 2924 iexplore.exe 28 PID 2924 wrote to memory of 2560 2924 iexplore.exe 28 PID 2924 wrote to memory of 2560 2924 iexplore.exe 28 PID 2924 wrote to memory of 2560 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71b08bfb8a3ded76eff325003e7a219a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541c26f6fb36856f5c04ba9e211815055
SHA16447be346a93c515d0613b7b9c6fcd94b243f560
SHA256656fb485034731cdf098388b14a1de57e434f685453257e70bcb1ef36763b6c8
SHA512da9703c5b327f1361f1a1470c06cf6a0a068d9619be272e391a39f96b5624bc234f2381527aa1b40550eda834bd5c537e34bd1ec5d42a518aab581102d0a8dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572efdac906484d41ab65b5cf422a47f5
SHA1cf823921d0d88d955a818bd80503a3554ac6e5d7
SHA25629447c535bb84d248616e80ccbd181635816d3359abdbccfe0cbab2bf337cf1a
SHA512aa056bddbb7c0031d2dd52e12cedee2cb24dd8538dcf998c2717a1d62b45dae1bd4bbf6a530b9f40ee5784987b8a0b59a2ab45753c23df222462498446963aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561082952a309d8169fb1682e67e50927
SHA1a9ea407951601972a1e9bf810af3d671be356faf
SHA25671545218a03cbdd281685037a4f29a0e902d685b444b718f76aa3e97179814f8
SHA512d1024d0d669e388bec75c30f698d9c9c8cd2f1424e93cbf570ca52aefe53b175755f792c76c9a547529b710e8b8f7d7f74f2b5ab2ff25074fadbce9c29eedd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d42b43dd319daceb24699d412c19d6b8
SHA1319ac51cfbe039f2d715c514179ab82cd222e564
SHA256ce6a9fed24ed41d838671bee81901a085dac9dc8bdbf57a92fe000228c99c7e9
SHA51268d836d6ac63d1f0fa17ae07cbb3673a28a5cdd3c2645e42cff6b6744345d32b3033b6cd8e0de949b6d3104707dd6e3d9a4333bb9b5241ef83103d6a088efdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519835f994507260faba8d118986ae583
SHA18653750854e699c659fbb01a3eeb543f0a08c3d5
SHA2562ea33808c9a2562f2ef8245628134e1e04bc9704ed30c24ec74bf30d62f3dfb0
SHA512abdde0db4adb92d8427e61be1449731e0b01c297e188abbba6eab258a0b7a59eedccc622df480104b3dbc95274a257a9b46850a774e416a182b39392c383de99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbacf1be5589da74762c19b69bc4ab3
SHA17a109f5320ce9b3a1ff784cce1397b1cba7c76f3
SHA256c3ce15fa0d32257cf81a5208c04b98b6fe47d470983f475d46471eaf306cf3da
SHA5125ea10ca835d2979ad01514d8b4905885134c6cebe9441b5021601f50102881ac998523c16ce25ad3a000bd6d80f65984e91fb38a2a23da15c914baf49fdd4b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505b404d78da4a4298655c0f988c4ddb0
SHA1945504fdd42217f4e403980a4f86f04959c66296
SHA256ce7deb4908dc0151f1ca5b711b3863e3266c9d68f72859f63307ad13c921c7ef
SHA512855a36a43176c401965f64dc0e229242f2c045888f5bf3365e7dd75cb81ddf4417a95165095305a597d0e8562c126fec220acce9ec45a4c0e7c6204199f66062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357b9961db6314d50decc9e87e287075
SHA13e4486bad0689d82683ed20d27448824a7ca5fc9
SHA2566d818a719f0031da478aed8ca58d7c85f92a40712984eba72b0e32bc55a2eb5b
SHA51265f85eded7c866e3f19e72c07ef4c6184e5e354a0f5656499d5445fdb6c03ab9ac1e52c488a370838fd468ca670cb36ce55507f463db9d8fd3e1b68a2b244fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd8a4c71312daa172c8bfb8853ee9ba
SHA190e45a6e7f48d1e22f071e34bb8950bf9dd8e417
SHA25696ac8703de5e062b5b7c07fc6550edc6b7c7198c42c94c35ef0cfdc651639570
SHA512b43a5355fa4cde94ccc3275cdbc622abb0e5adce92fac436f55e4f40b24dcdfbb682b622391f4ce7068bf94c7d76d9dace4ad2c9c0bf8174c34dffee964ee07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58937cebb88ae55223cd6af61cebf1e33
SHA14e7edc50905055c4dc4fd8d34ea710a617e710fc
SHA2563ba3f697efab8d4172c603103b67fb1942e39c8d79796676df44b250513dd0db
SHA512724525a724dff6eeee60a3e19d96bcf717a1396b9791d34710280ce48538a318048199458a9f45e0b3f4c53caa2f75b2ddac224a84209fd795f2031f3d22af08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b147301a9c1848ef467f8f1cc69a820
SHA166b759bca2e3e33855dbc34b498d7ecbbf2f7451
SHA2566aef3847b5dc9953c9481ecd2e73dd48793a1c7ca9a26904fee9c491eac7a2b0
SHA512978fc750c84e957f1c168bd82174ab312baa8e32d2bf0f28646ccd454e2f8df29b800b56049afc4852e9084fd795f267a1767be41c7f34de7e5bdec19f3f3dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58005e46f9e4a42606fb9b98b713baafa
SHA1de8386ec17a98b1113151b35cc46a58a445137fd
SHA256dd007407a11e276ca67c20911047bdabf74bbe7c8d1504b17825066c84255696
SHA512c0a8a3376d1e1dc5bd89dc4a58749ef1f010f1029e784d86041437271666ac16ca5548497517282ebc9324dae34e96a71537b7f037c6bfd9ac69e80f5dadc84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533938a65865cfc1e92d80e44c6cafe81
SHA1555e0f59700673287b0e457ea7377ca06f1b0c0f
SHA25675171ca82483d63bf0e0436649bee04a84c02a897d26e6f0d7bf304366275d3c
SHA512b9bfc53f1071b7deefcc379ae305aab88cae48eef0aefc3b31da2a5df96defb7b4c5bffafff9b021096a28f0e0be3c08c9971291b68dfbac0d766c3f3ab2fa10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5473fbf1611fa6927b115396996844b12
SHA18c908dff5c1d1ef23fd5080722ce993435d1ea41
SHA256e5e8008c46a4e9d1e66d67b50750c6a0809f923aa93f630b2ca60ce33eb1280f
SHA512286a103699b57c66665ac95f40fda593910e45878ab25d90f6fec00850a9e8989027fc95d10e6bd5c546c4acd53f8aceefce7dbeb9a080a6df753cb57ed60a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c830982ef18d2302b70f6daf2a287bbb
SHA1bb81bf53ba402dbf0e6f009e3a76253c8b10cf8a
SHA256f0f9825e34c6625e36702498ee2c81c07db57f9a70e981ddcd5ecd46c5ab39a3
SHA51205dbd63109cafb1f9b9881ae9d7895c6853cf8973fc9134159ebb606c6e08e1bd8ccff50ef19a55540f081910c7d5e93e70c462aadd38fdd1717b2cb08b64ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa065e9bcea95977331034ba7842fe7
SHA18a0fb5eed7fffc058e6594ba85105a7207db9603
SHA256163988edaaedee86310ae0ffb9ca9a922e8ee97dfca89acb132d5aa108d1512c
SHA512e7b6bbb200d37c3f1a7c6eede4b0ad7002b0c1f5b95707e2656b401933011a4d340721e99f3db3ef1a403dcc21a82f6f87ca50e68e0468457872785c682aa522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa04c633a18e7d22973190ed86009f92
SHA1d6b4dcde86da288fd5861166b5eaa72cbdc503d7
SHA2561e5f8f428360eda3048d55971cee003da98d22427d355ad28760445f7de4b8bc
SHA512f97d5c9dcfcb0bdd19e64fadf9d745d8f2482e3f7b19df3aea0e73283db2cd55fb29e367c3eb31ceb30f0f404a516e600e6759d419d881c65339201cd9b2030d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e3c20cf0e4e578019aed06f2a2c559
SHA1b0f035e3fa7c8cda36ddebb72a48cc7a4dad957d
SHA2569c0870ff5d3371cff8bd4ef4d0b306a7b7aac4daefb15e9aba0601d25f100e0f
SHA512b00d16e954b7ac675f0e2960953c3031a1ebc7dcfcb2a22ae1095443202e1997dce3816ca88b2f6ab4f465bf6de01f7073550d3858cf47bfea55c7950a6414ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a2187c6bcb11b460c9edb656d68f22
SHA16965447aceccb11d76fd47f3ff0b1057586fc4ba
SHA25664912a9fde171206b02dd398db653e3257dfc2a6b60a44e41dc14493dae908f6
SHA512787ffacb6688aebd0aa213e3611545fb8dc477cae984875f61af549acf5589a0be7bb6481a2f5197a1c898444afdd18358d0d4dc099862741cf6b5b0161fcc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b8ea98c3614cb0d9c06266adbcf32d
SHA157660da6aca2afd3e2d76842a8ebf8a2e4647b89
SHA2564fefa8d47cd7ef1793f1b01f7382626329198ad68973758cb39e2befae049ed3
SHA5124991924603e1a6dafa4434747c3da5df0efcb370838949643f0c8970ba91c30c4b92397137c865fb30a0c225e0f9f181298f8d8b5c9199e1c5669cd410b7398c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e73e3879dfbfb8cfe2dbca6edb874d2d
SHA1b84f8e8e052d47b9fa3b3c108fdaa6963fb32824
SHA2568a1786554cf3e5caed4bf62b09f88ce1aa5a6c8ef088c5b283b61f3a61112106
SHA512f1834b094df98a8fa64b28ba2de42c96924ce178100e9148e5bfd81dc05564c2eb6b4f51b52fd592480513a721314d03881dcde97c704eda48a74b740d84b50a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a