Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
8031d405ef0ec1ebea7d93a4f004fc31_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8031d405ef0ec1ebea7d93a4f004fc31_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8031d405ef0ec1ebea7d93a4f004fc31_JaffaCakes118.html
-
Size
719B
-
MD5
8031d405ef0ec1ebea7d93a4f004fc31
-
SHA1
2ede051b3f402968a53feea18aa70863ef9c744c
-
SHA256
314193c706b00c6ce219fd84e9e4d949f6b49ef425f52b58f514eb3252ed2a7c
-
SHA512
24d20ae64b06f459a8b2dbcd72bf93aab03bdd4a60137c2559fdb08f713ee0d1db28a1b165f8a60bd9e18dd6aafc0f791f4253878243255a993d55aa9abc05a9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423135233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0d6ba1a8ad3ab478237ff87d08fc1b60000000002000000000010660000000100002000000085b5d598569999ce322e93f7e354556f58ed283478600fc302f2e5c8916f9a4d000000000e8000000002000020000000ffdd6b3799179415a0185b3351aec61e164fa05c79554bac1b4719d6155685cf9000000089d43bc6ff7220af0e227ce1d75997cb3164cf10304beb885751759914731be6418cb1ea96598c37e5cba0732b982f0c328fdd7ec9ee418be42eb3951f39628e5226c55df4439c0e680f6e87a2163eace4e66ba615253cdcad087334c645e46515ed25d3fd08d0923f3c621f28568c2ad8217470212363a725854c66212fc519c614f67aa75c7c8531264a8f266711bc40000000143fcce014f0059ba8fbd40633f0db19c066294583d34083eb1759f4b0ecb14a749ef3dfcd2f5f33a709bbe13091ae919d3e4fdc0cf26bcdb963996c70071b94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35BA36E1-1D9A-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0d6ba1a8ad3ab478237ff87d08fc1b600000000020000000000106600000001000020000000aa0fb50b86a715e14a89b567183c769f19e9f485243065ac117419ec6ac172d0000000000e8000000002000020000000bee2883af378dca2388f9c54a04063e18a4a9674c948563db1c05ac32b907695200000002137587742424388201482a72cb5d098af1430b3a2d5018e426e8e4407649810400000007c9ab8eb8d907ef8799742ac6405624151bfac55c6b3a14d3b1f5e558cf215920f2b2cbb625e6012eac5b9afc856f925e1111aa030566acbd3be95c9b8cd1a50 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507b06f9a6b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2568 1284 iexplore.exe 28 PID 1284 wrote to memory of 2568 1284 iexplore.exe 28 PID 1284 wrote to memory of 2568 1284 iexplore.exe 28 PID 1284 wrote to memory of 2568 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8031d405ef0ec1ebea7d93a4f004fc31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517af92e08c61e9d21056c5fbb321d56
SHA15914be7dbc6796bb1040261086350d6381946437
SHA25629fb40707a967d25f570e4ca6eaac64a94ac3b7727cf5c026f68962a9e61e00f
SHA5127889db0bafe7a5f35df9878220705ed8a8960f01b6690ddf6d13f57f2e21712903e08662bf656631e73e8418ee57fc954969268789c9fdb406525ad8699bbe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f4b9bef5aab0619fd7aa80aeb937e4
SHA1d07bffd1ca3588fb55aeba444dec3d8ea8abf53e
SHA256f4f2dcbaa513a80108ec339e991a9b51da68781f5661813b4841421b7b891d3a
SHA512c72f29b3231af16a48d8b62f86e2a4b1f90462c29b04ea1bc2258caa5ff913f9c82a48b6014232a2a310ed41ee1b639af1b573999ec690a69109f2bd5d44eef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524b886557edc4f6cefea76402fce622
SHA1e3ec9f1a285a8b45af787cdb968fb758e38b4b1f
SHA256da9b2396b728917ad5d4db74ea3b5afbf2ad48c239a1192aebc307588715b668
SHA512b3277150ec8055715998696d355065a4eab25aac64af12855b1fa4c34391f8b5959c8a40bd12a8fb61546878c588a348bb5e195e2811181272067a1275f9249b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410fb84b133f6e7073027d5abbc206b2
SHA1c694f568e030052e971a707048d871eea4c48aa8
SHA256629b51adecd38bc9823e1ec41a8719bc0a466f02caac17729e60a182d403cf05
SHA512bffca8357bcec24c3c181e9d4562bb02fd82da41d61c444e9fe6875660322a5b7228ef85f56ffada52c84f8ab3eb209bac0baa1eb52f6204ef655de60f8c8c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c988fbef8f91f36a9bb2e6216a581456
SHA15bf0bcc9853f6d5cc128404e2c8318f0493447fa
SHA25644f2cf494f6b35b595e014be70c605cc5af273a1b74e0b1fec773d0b367b4319
SHA512905f322d06a06e4b65668652e830708307aebc42a783e83d99c19febad7237902fc01aa21e2ff5eee29325684043fffffe896679160a2fe9a5dc2818246db8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c00777574616e6ea1a887b498bf61f3
SHA169accc392e35d7b510363149af027e64df49eadf
SHA256f2d920b60b5508008340498792078c8af2dd1a442589c882de43ae8215d3f4f8
SHA512edfc3b42ef967cd79c4fe42f6344bdab90af0e90263ec6d03d4c915b88bd0e41b595d18964a0350bd2de60a83bd1d4104085c05e8114f74b55df0a7a2f8af820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515265371d5b0f67f1754b026e50e3119
SHA17fab4a81414062e87107a56d0a59e515a0784436
SHA2565b565d71979c26beecc221050eed39b83273bdf531cd11bbcefac023d64c9596
SHA51246128823b2064aeebded801f4afdefb32563541739c382bff7afc70034bb1340d1fe91d4173d4c33590b0a0aeba147e27918a95ef3eb492c91ffdeaec6026a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3151cf1648236bdc8f648acb47e8d82
SHA15f404df8e1e644932aa8fcd1555e64909292ecc7
SHA2566984220660b11f280fc296b746c441df982ca178b9093a140f56de3ea8408863
SHA512f55159fb879ff4095cb606f14bab1555ef76f4521b9c17e5c73d98f2af599f1a2b3605e0179600b701b0f515c9ef499d5f2c2e9554db9668f25b10e173675ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cbfd15ddb87a3d2afd882c6744bafc
SHA1bcff366b850322e9e8d8bb63fac64d10d5468eee
SHA2564d7ccef62857bb346e4ea96e3ce65fe0716cf4b5a35cc7567fbf7d84e76754d7
SHA5123a1573914230703f197621c46f55703f33632c7fb41f18cdb368b11182436a0a4e4ba5daa7dfed822ad111102cfc1f23b35253fc8b84305eee8a4944a575b7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558641812c311a910210ff4e5a4dfeaa5
SHA16035d477c34d498168d17cc7fb27900c2ca8242b
SHA2563177a26b4aead91fe2e5cda852c684470b983725dc1b0443aef236478a3fef8c
SHA51243856f2ee90d0a0d393300504c7fd6089add9323c9edb5d9cffbd9b4cca1f8243efbb4b4d2b0375e2b695fafe5d6fa41af080c9df4786f8d4d99ed03d2efaa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd03c80cd6b6d705d7b7c582a87a3ccf
SHA1a5c84dfe7e690d3a4acce6515e87290a738b6007
SHA25647bc985bf160770d866653971718b6e68549c29f765b304d8d7bab08eb4cb208
SHA5121eedb3ed62f55685e49013da8dad01cab971f9a21c634c43342ff8bea60f608ef87d835c05161aa7d3b2321cec56e08be6d90ee39d3f0ea68570a78972d33ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ca07b501b6b6293cff91652bdc02f6
SHA1811272a2d9572be038aae4b6d595997a29909fb0
SHA2563bcb14825f3c4c94c11b0a2e40837a3c422ace6224120b8f85a659951c36674d
SHA5125ebf208ffd94394c203236e267c87b4219aa8fc977dcb4bc8cb37d91f25e7b713eca591768d5c537d897a9d0fce8cf5d792306d68bd24da3b3a17d674b9790c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda5b6dae2dcd5b2f320f5791c9c9ee7
SHA1e81cac88ec5c18bb973ee31edd068fe98f84e607
SHA256b53bbefe4496cb9e32453408bd825880f383217b40466fdc9d42253edda5aec7
SHA512ccafc463496e7514ca63a5ca428ab6224f5e9dee7df9a073f9aa5c6b53dd63d394173ffb4f756db56470d042d7bc4e88fb6c62b2ed28783bef0068fa7ff315a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a78d7d6786e24628e4485223cf2eba8
SHA18926b4e0f8e8696b8047ef7abd81c2554f62ad9b
SHA2567900b20e52ceeba145b1e9521b8fb7239adbb9c6d143d79d37636645376b35a1
SHA512a5b9ba0259efa0e34235d2cf5351c84181cc7abaa1f8d9109b03d59507a2b9fadf364450759a1288f8cc537fd97aceba407f391ade67faf6b47b9ba86cd02a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1b6cf3a219db09eca3199df4fcb848
SHA1e9c71622abdea3109dc042f35be7cfc23fa162fd
SHA256e79ce4410190c5d076030e0a7a4035e419664eb64d2dde9bc74dcb8c367f08da
SHA512cfd63f8d8d049a39fa7a097b82a7cbdad67bc5882840601c55f460ef903b92db83c917a26cf7246cc619ebf4493238546e5cfeb24906724b90b252856e3e144a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e4555c799bef5c908241a500c50a2f
SHA1f716b0c3d1b1942142341c718338237216667c72
SHA256253eb85a30cfe1ab004665cbb5be42804ff6686ae2775fd9774b04425d0902b9
SHA512dd551540bcd9151ee2339d1265737189a68e85624a6e16ba7739c349a0bb081ea3afca8992240e41f89c22459e004efa760782d8f63d1768c838b1ec0acd030e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323f86511cf2ccf04a1d5588140c72dc
SHA12cc0ec56d02725b72716fab96e63db1358560b63
SHA256d84ce517f61acab3146ebcf7bc3d9e21f8541799710449e82514d6c4983aa72b
SHA512ab6471d956d55bba53431b35402b2e7e50a17cb99d6b7c1cd67a856de42c134524b2bbe6149ce92775c691d02afc0594a00dad9051f4d2fe42ff1cfedbb68e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e6742e060f6db30072ebc85cefbad9
SHA12e3da6cd868c58f13d177b802c596dd4f9c09224
SHA25677366a180e40610e7dea9c5cf0eb996f9a5bff397c4deaaf9878c8ef6ad81451
SHA5126071a082449a62339035ec547fc2c81ad6c15b6c1d6fcf4eab0fcd04d8dd417e137937ff3dede701ef44830849ceb97452f1e1d3621544f93580c91cd803aa6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3cd01c181be2ebc507ef7d8ccec72f
SHA1d091bcb490e9ac756dc2d36915e0fe04a61979f9
SHA256c670413f76048d8609a8b1a7cc895815387c2f34c9daced22fadd09f29ebbb8c
SHA5126dd2f9263b1e82ca9d329405747ea01b5cd94af3ee22948a977454ef78d4c27bfa71ffc4f7a7295d4ce3124889cb3cad6182b07767f180f7b3d3f8cdd82d4bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54634501911832ae2eb2f8105af6c8786
SHA137aa7d3682f30a3dbdc3bb95ef1d23e12c8eb537
SHA2564d5ce5c9b5a7a9af1911661a893e14c5423d9590a6a49093591c2ec63fda32f4
SHA5123e184d96cace730f371a5decb72e2780d1a871c02c2013c13c44184b792b950356c2c4c6bcfa93ed0e6e15ff9928ca4027f69bc8e493194065738753b2f59388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2dae491c7674121ec77d2c35c629abb
SHA16d09905100e6ff49dafb66ec06e53328702549a7
SHA256c26cd99548757bda96081740db5b498fc3dbe90cd21d8ac8da46a261bacd204a
SHA512ea685f8a3195d5f8d4b7c9809956e176db9afd282a4aab4126aa515726e6f5794f43afe2b823c39595adfb2adf170f26684217df6817dd037edc36b1a52c8b97
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b