Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
82ec2d77858394a5009cbf55b01c6c0b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
82ec2d77858394a5009cbf55b01c6c0b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
82ec2d77858394a5009cbf55b01c6c0b_JaffaCakes118.html
-
Size
127KB
-
MD5
82ec2d77858394a5009cbf55b01c6c0b
-
SHA1
457dfd2e87e811a29141fb206cecd0977a5c7eda
-
SHA256
9e5d90f5d6243ead339f0901e143b2a237bc931b3df85d741907051e06920ca3
-
SHA512
768270b9b3640918389cc686111c5af1177bb8e7248f1cce68c88c94be838c041a0cc75fe1f762f5cfef80821dacdda888a96f6b2b490f7fd60f9761fb7d9e94
-
SSDEEP
1536:SEniuuOD9hm0yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SbuuODVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423202193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0071f72443b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E0D7B51-1E36-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009ba1b6bef75fd46b7c56db08ae049bf00000000020000000000106600000001000020000000afd441d5355b0435cb56dfbc2df160d9f3f6a2b20ed6e1bd7a3c95060804c57d000000000e80000000020000200000004808ae50dc88045780f459299c2a92cc5b4465b418a910064569ac514e813521200000003628929dcec87e3512178198f706310306e464aa80ec3d821e277288d03a0455400000008dbc689acef693dc52223041782d5868c9ff0906f3217d29c500cd62c5b27111da09938cd537094601fedaa64128969d9822802e46e8a7137bb9a3788b21c266 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009ba1b6bef75fd46b7c56db08ae049bf00000000020000000000106600000001000020000000cd062ba87fc09708059dce9c34b81811ad3e463c590824d39d841773484b205c000000000e800000000200002000000089c133315db0b62326171c12884aaface2d2630b254ae19be8e944afd34062e0900000005ca62ddfd082f81657d19814324986dcf07fb8efa3b185de1b96acc88f72cc1fa7cbeb29d9436296a59f335adb267497387e9db297e1a8ba7221863cc01d998327b99607233230e0b6ecfc864e0540589a5f70bb49ecb4f0f68e8bed65704b60d3a0f9a0e2fe354ba222e5af603a9500f5c176015cf951cccac4489be224d57b91d429a14e602683d381035aa65fc40a40000000d72340c1b2477b290f48ac2b88602438b2282d3e3801730cb93a1d0d5c7e97e794f9cf949a15bbe6993ed1dbbf92dc1ed14df70759bedbe505ee006848569c02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2520 2872 iexplore.exe 28 PID 2872 wrote to memory of 2520 2872 iexplore.exe 28 PID 2872 wrote to memory of 2520 2872 iexplore.exe 28 PID 2872 wrote to memory of 2520 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82ec2d77858394a5009cbf55b01c6c0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53c48fc2c4a28e24e1f21301996cd4c
SHA117d3e479d704324729eda5a9d41515c4f9ae471e
SHA2566d00e5851d0e8bd3feef783a9b565c3e4a4d5ff82778918f4a182d19c53760d7
SHA512f4611e798f74aa304157cde8dc29600904e5b278422e269d3098a1a8f35ce1562a97b8f1910400c0ac9929522689835fb072ebcffaa6733c1f403b3c49c16bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cae19a03970aa36c01afb12ef24d66
SHA15fc9a9c2ca93873bd46b18f573dc3838985a2900
SHA256c9945bc4486e30f5161c9a512a4893552010c4eb0275c608144ed5957da71585
SHA512188217ff991caa59c095b99c22b231178e264e45a678ec929d1061f9be10913b408984d5c0926000e89b10ee0cc0834c8059174b193358a96763018d1f670c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5164f21a60b9cd2e2c103c29830f4783e
SHA145b06d60da1d1ab00fa2a476cb8989fe82fee439
SHA256e0d1c94bdb37719b1a274acd4410e98ec9109007f40d7b8683915077fceee333
SHA512c1dd799390e637e06ffb62cb505594378b3b73b0d2c6760cacc90efdde7cf3f14f1ca1b25ef04a58a2bd61e25500b93a5b84ba735a2c17937c88fca2845c35aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56933515bff81343944f12978bcd09dac
SHA18ba0663d01d1c3329bdc2ac0c3ecfbf9b4d98f98
SHA25660c95eb7ff46389bbcd885da018b0382a08508935aed710813c6584bfa85455a
SHA5123fa5da00c452b9a70139b097e8680c7c48043cfea085c4a0e435c2828fd93a1fb0e25c85da63998b46f7af5f44c5ec996167ffca0ab91e92dd6eb688ecbe69c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d2e678b5d38ff33ffd1d6ad9ce90e2
SHA127abddfd861fdd10bd34c3c761d312a46dbea1e4
SHA256183599debbd84a3e37eb8153d6badbb6aa17ecd1493a4382a95153fb0a5d029b
SHA512fc2dce23f5c882ef5fec4cff11b1be1b9c6095f8dd669a0949547004b0a9d71015a2f202eaf9f2e266884ae495fb6c2f32667431ddd1dccdc7f24032f1e0898e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53044be1756f806598154dc7026c87bd8
SHA14197eaa3eee1c6010b69e5ac69a9616a194eedaf
SHA256e24805884f499d8017017fe9e127df7f1a34979478ba372c0b316f66deea0ca8
SHA51220ae2c20186c7b40f4661fefcb404ff4744031c3f754f5e98e644bef302a0c16d567ab6620821758e6324b8dd827c78364de2735f4d12c8a90f53bb8b2e5509f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b0d1316f177086f27764bbd4c374c3
SHA19d6269b319ac18e62414a33d10247b8afe389e8c
SHA256d65cb88abdb96b9379c074cf1fe7330d0c69c908e3da9583ce6e3a76327dd612
SHA512b4519086fde6ad7f0149f1d5677f68e33da27340f3c650c4f62d1af21e59c687306efad3c0628ad3ecbe1fe9d9a151b98ed7ee9443a5ae91cb8659b346963f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6d7befcd8e08412162b24e925e980f
SHA17cb6653d530e49f9c0866b4832dccdce64b545fc
SHA256948a61e171ccd2eec9382303c55b4b1f9fbceede56e6320151a051fcbfcec1a8
SHA512fc6dc90c3a3b8f9d4cd041e7036eca7b67489233c68472a52f0d1167f27fb118613f1d217f3c0abcb97a29ab196f56295837b1e92c01ea703ade13e36b17a692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cebc5df7fe35641397d8c5d94021cb1
SHA13070d22f046ab4b7f3dc63c4e72813d41c8100aa
SHA256947aac3e054216ab0504f38ff97f9d41920f52a4d0ce44a4912546448a771e6a
SHA5126b2171b92781d1d4baf01b8af66b25e79e12eea01c8bd22f0936175a4792105b4775cc0d3e68fd3330880738bcf75fc2f73a97fe78b89ce2e914be54df185382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c159387f4df2ab53cfb022072d994e1
SHA18009e331a29cc574e6c751233ed19243e6e16a5a
SHA256e28a5932fdfefe4540a64076f8448b5147fe37a7701cf2d7d08e2c74c6224e26
SHA512e591a68742461e15f9f83ee3d0e103d5fa4c116c639a6cd6fef47bf01d386629c3c07338ab6a7c15055cc534d4e18b0062c37063415559042763e206d9101475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29b781d1fb4c4acfc995eb886c8d494
SHA17dd86a08d99ef60fa1011293e8de9b98c41bd9bc
SHA256f419c8d6d726fbeb279a993e103650f0cffe62164a613f8b45b3b2b8bf2e9bdc
SHA51234a302ec57c8f565515dc62c9806cd84e68ae0a0e6d5636db7f21634e2d76ee1e8335181588d713050b28373bfec9386f8873547e3bfa8d316a6440a152e411c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f39b9864335e79de7b3c5eabcac0a83
SHA1126c6bc7c20fed4cb56ca0ed4228bdecb8d3a899
SHA25615f7777da9596cc068538249437cef88e09124af0f46f6451e11ba43c0c9afcb
SHA5125afcb371aaf2515a29326ae57c916151a2cd9dc12ba4cc7c8193d32f39593789dcd2c721fae7d2ee0a07677bec9dbf49e4ccc3ba3889b982562de7314ab15bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305fdd38b8e36fb841c57ca6d06042ad
SHA13ac2c0bf2f3398acfb170dec45d75b7eb63457b7
SHA256cb84edccdcb63d9a1c29acf56b0b2c8895d339725add383e1d35d709e5acc4c3
SHA5124a5246ba4998b0cace97da26175b07a9d53066341ed7f4eb3e7b742efbd6f8a5c1009a159a21ab59b4db8d56a63fd3c00421c3f2a405c5dc72c04bf27eeb4314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dec8f0ef8bd51a952b2be409d860d7e
SHA17052baafd6e29513415c3d6373adbbfd251361e4
SHA25636a4110d09a8d48018c1bcf5af7031a720174d5f9a3c268757707829400feea8
SHA512c9b98ad043a95bfac069fbd3a202d4f7712c92b8acd42d199e985edfc65e62a7c169adcab69d04b8203467da833ef0cdb8dc0a7abfc69d1c3858089c4c9d9f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518559e9d78310e325e0a11eb313a7174
SHA1bcc58b71bbc291e2770311f5ee3e77480b3384db
SHA256a9d09fffedfeac84e0c0ef060d0242f03e4a5022961687692119c648a8a0a3ba
SHA512d61d5e92e2b34843d440843387ea03d4ef0634f174519293b29f2013e353d837a8cf46f8b8c05321a4711316726580f135ad005d1f294d9bc0f69767371df3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa64978a6b5c161ba093e272bbb0c0a
SHA10a417fceb128e5c1278f3f3be69e4928154c3f46
SHA256c54d4d6a8cea787102646d339d90e8ac2f266a95bbade5cdf73c158feabd9374
SHA5127c30252f6685617992514490997f64ac935ac9103aad6fbaaa824b21d98bf7ad836a31344dae53e611741da2c0ecfa7da85881a130ff7953f896cb3ec4329be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57002368408f116f43ab72e097c8c2bc9
SHA12e6437854c0ae1f36cdf7fdb6edbf419828cf16a
SHA256881f4fc73fd0101c5f37a599dde463ea9d8d93b5b573a8d018adcdf5ef33500a
SHA51274dcf143de9c32fe4dc6bf215a1c8996891d33d8f42c8f596928134a4a87e21dffc3f769c8f1fda92d11d2de48f716f220dfbf4739a5715e0a453c21a32de34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659326feefc2915ec8778fa0e551b471
SHA1a46b4a4a11b5a93c6d50e93259b2b4638bc0b8f1
SHA256cbaf69f7ef8277ca7eab6584efadfdda941ff148b07358c49bef66db89cb808a
SHA512b55de20f173c80ddccd4ae0d18036913494763bffe7eaed1e2ba882129085e18d20dbabcafd8875815e1f8818c396e2aee083013027cc0778aa3076a0d53e201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc66c28b357e6c9791d258a1d8c22d4
SHA188cc401f67612f220d8a704142e0ba6591b087cc
SHA2564d127a72775f1f38d0597d3cca9edc3d7132709cda0c7077e380ebf8deb6108e
SHA5120870c920d5ceba78bdd485ab021068165e63b980316bee60a81d93f8607251a8bd659a00e53492c837c2c14adee7a04c1c5d719deaf9cdbd31135a284dc709ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b