Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
8ebffe27ce6f024d1e51cdb16c4fdcd7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ebffe27ce6f024d1e51cdb16c4fdcd7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8ebffe27ce6f024d1e51cdb16c4fdcd7_JaffaCakes118.html
-
Size
4KB
-
MD5
8ebffe27ce6f024d1e51cdb16c4fdcd7
-
SHA1
8c452a20819d1bb17ee7dca0302e5f754c3b8b1b
-
SHA256
2c54940001bbd8e966880003d96e12c8fd6a8fee5679587a793cb3c1ee84fccc
-
SHA512
83313c41d3a62bb06eea734993e929182f36fab21cd46a775a94e47f4068ccd9bf4c8a95d3cab7aacf0a50c13d7d0cd7c8929c6bbc10ab2b1d3db4bd5952509c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oXd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f2ae7da3ae75244098764f1336e8ce25000000000200000000001066000000010000200000006b31c518683e0de09a22965a5cb020e94cd0c43839a23afd97b028080d931282000000000e800000000200002000000029f947a00935c051be40d354d355bd8c02b3dbef028fd87b93b0fa0e1c159d7a900000001375cc7c3e4a9aca20bde99614476480871bc0d6177188d833da631a3985608f1d3946d1c2550985ef7287ff0c6ef1de435fd6de82e961f338d1f34af0ecc7be54e665ee4c2c31cca9d6926c2a79a94fb89b42bc29b51da7107048ebd9b7a5c87b4867d6d66839520ea314c457d53c9860cefe79e86924a3cf94b4d7e0071d1a2925da9538f0d9ad22ab5843c03d7a4140000000e79378dc1bc77cfd98a14e5789eb8ff3d3ebb769c52cc0799c86ab9228fe233f95a6a20db6e943c0530df003be604f85c9764e12278bbf9035150586911f8f35 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806c845f0cb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B100941-20FF-11EF-A564-5267BFD3BAD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423508610" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f2ae7da3ae75244098764f1336e8ce250000000002000000000010660000000100002000000086404b1ccd9d623ad8927fbe566901b61fbcd6ccc7d712a49c252bd3ff7185fc000000000e80000000020000200000001e23197ec187a9f0122867161dbd1bf4a8822cc1d4ffa40cd157213f2a7419b120000000b2a99c392d6143f536715d8b4df82fea2e3f0e3ae3b157d52f69ec375018c2084000000021f1a2952845427d0377dae06a472bae9603c5d1356bedab41d958574326a859e60158262ae126f686c5d72e57c0d8c3578e45d96d824566a631efaff51adfd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2520 2188 iexplore.exe 28 PID 2188 wrote to memory of 2520 2188 iexplore.exe 28 PID 2188 wrote to memory of 2520 2188 iexplore.exe 28 PID 2188 wrote to memory of 2520 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ebffe27ce6f024d1e51cdb16c4fdcd7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881f7e7d5e226f0a4cba87bc31c62b95
SHA1f7de1997436d1e1b224787df663b62cfc9c14038
SHA2561fc70019247414567ed06d77ab3a11f0057d3be00b91fc710cbeec2e928a29e0
SHA5123a161934c39c541b61f86635aa6d2dd8ef12eaa4ab865f257849545ced013734c16294094ee2e70480383ed50eb80ddea434cb636b5e7ecd90bf773774627496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b0cbc82ee08cf59894e149f13786eb
SHA1e8e46c3c9e090dcd2b16919ab9087d95aa93ba02
SHA25623d74e8164e6eb5bbd9b950bcd3a609ccab0e0094334d4b005cd3f51ed9743b4
SHA512bb7693fca65d9270a9828f70f130c610fd221bda8b423af7971389ef24b50df7af175527568e63be0050ff4d320a55a77da6d3272de90529180fe9f04ef9e5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3c8ab5155470ec99e92bf2432823c7
SHA1abce3fc2b8d138dede1169ae1b48a57eb1f65b6a
SHA256314b2a1799c25a462ccd6e14a0b1ef7725dfaece09c6698c926579042c242b1d
SHA51225ca5dd7150fb1f66dc18aa6f7c510486b1b5d90e746dd82674815b66858a27a3b8b435935ba620a278fabc0a1f374257698fd8ac3ae7baf9ce3abe63cf936ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4ff31549be7ab65126a2eab2e7ea24
SHA120d3b6d4e044fbb75b6c55fdf66aad0dff60e784
SHA256e7477d32a40f31f676327579ebb161dbccc2621eae742e94d3f829830c39c1fc
SHA5121201a3ffa10775b5b5cc76d77373006000094aeb9c33b581d5d03175ae7e7f7cd25f62269833a58181488de770f5cffc0ee6757e8391387e6d315ae44982b982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ff49774838495c8cad67be081b0661
SHA1289e3dd8bed53dade2084e0cdb9c4770ae9d98b0
SHA25661482d36861f9e4cb94d30b2fdb27e4e3fda06e977ba4c820d694a9f63b0f0ce
SHA512b3a0ebfc4532e315d02abe0588b2e34d7bb2ce20fc707a76d78fb361e939cbb50c71355e10b307c24f049e2729843cfe6c1dfcfea5c81d629eea410f15d986b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1ebc9a0676e342f723e647ba19caf9
SHA1bd4086afb759b3c338f16552a9332c38a064199e
SHA256f8dea8a1807a796200f7a7fdb9f866a8beac2c7b7a7292f53d86959c52112700
SHA51205d4c4c197a70a416014bb5dae29a9375234a0a132d2b02218105b5434e6b53003910bfe9f51bdf0e5ffe3fd4868280f5eb8fa855214b733831ae82cff5dc6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0ef6d09a97adba376390003212a86f
SHA185918a2e79713d03224907a3f80cf7588106e833
SHA256207e5b5e18aa4f2978af0c03336c7305df8c93e6b3904bcb8ef3fc6587ed4bef
SHA51258c661642a5fd4f66aa310538a7dcdb3fe5eb7f0a4c5429781d968bc444f5fd371dab347bece60838e3f9fb4066c4ec7511a94ac17523415e372f3547b92ad9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e1b45e137230064a5e714581b804ac
SHA1ceaf3a788207f3a01245766772bf5d9871b9515b
SHA256c735638c6a6acf900172107d6de3afb0919ad145c1f439dbde8effe339829185
SHA512b8a1cf0c80c154ec6b23168c202f4fbb54d7b4e3e17cb6a0feea7e7f1085b54e811edb42eecca4b551fb550559cccd57d8f46e174f8d8e24618c03cdabd3f051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a361e43468600481295405ec9534d8a
SHA12eff5c0fb6b272af8de14b1775a45df38ade07be
SHA256d1a653f043792ecde47134cfa23a3826d6407d39680ec09ffbc126fd10e9c488
SHA5128ce58def72af0f2e18c635bb94475decd8749395074f4eb8af28a81cedcc7ddc9830ffd8ec8c620dabd26ef55601f5e2ea60d22878d9acdf8683c0d24f37022a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d4589bb3a86382e471523f1d668f3c
SHA13fdeabfa5efe37187b7e6003630807bb407f923b
SHA25649163195aa169244c8ab14767805f55f5d3ed5607cd4b172784c5b4047c215af
SHA512080eb0dcbcff8dbf881a9ff6e6195462e003bf26ac2565993764bbdedd01e04ed7725170aba165f674c95acb317abab5d71a56f7a85ab1b87cfa9556a414fe9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8802c4cce5971ce2bf1d5897c02ce0
SHA128fad44f7133361a4fbc76cb7ed0b93382bdb471
SHA256bc687bd091cdc0efffbe5b3df55169b7037bf2157d3183fda1aa779c93e20e32
SHA512fa36dad966b803356467f555e7e32410cdad3b105e489f9ad3f52ef58c4690b1e94f2c2612873a7efefe39006f9b88dd40650729dc5701b0343ba4dcac22e809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26a22a034a1c350910740ac6ddb5fad
SHA1636baa6159d8a8c8ac0f80b6c0dd0d819d3e6e2e
SHA2562e7b2aaa017a75ed9e2773aef4a04194e5a1bd64d12a5bbe8a2b2ee0f2533e21
SHA512955a4f677de626b69508bd3601cfa16cce5abfeabfebe2d99140388c5a8b621bd1c734b73b2d426f5d7df6689bf61966759895c939c9d094f2de29f4087f9310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996f258e6470ef5ccd5d2a85c982df49
SHA1edb87062b9f315f2f727543332439b92dca9a23e
SHA256844c21a3cf694dc7a44c22a7d823d6e91f4b77657594e55afc76c12d5f7b9ce8
SHA5128a1009e616481935999ecbef1409d4af050924e5fe991467cb01ff535035aed74568afd916a03defdd5f70bcad80edaa2132a747d1bdc5f308b08b4dfa417e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5037c9999c3ac498f73828ea7b32bccc4
SHA1ccf5902f0d9483235a5754ce8a03d293ab0928e5
SHA256426eb2bcb2e15546120447a17fa11529104bdfe3d25d1c04bd2f4183b3059b08
SHA512a53775ac4b0fdd2dc1d4312d7d5ebefe6dbf1d1fe3e9f53d6ddd30479d87e1cc3d8506381722229d098821c7483f0fcf42a29b126ce70b49dfbbf877dc3bbf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1b19216cdddd63dec62fdf2fe0255f
SHA13d585570384b9367bc827ed8ebd4b0b2ec9134bf
SHA2566bb78e5947a3c2f292544f87db0ec6ee66440cef4dca579af91447203c7d718f
SHA512f5cb630e0c10d000d1e6392da17429a35688fec160662db46ba520740adfdf68a954a6cbdca26350a5aa0937a6420a9e2e809313e689574ff334489834a6490a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2eca50aa3fb0c1dde5b60a84d63005
SHA17e3bd54542b86814acd368ef88ae4efc60f58f68
SHA256a7aaaa5d2e9de78cf39279bc72cbcad14bdf8750a2f0dafdbba0a3e4013d426e
SHA5120af247ce13fd508bca55ef6fb4e5ddf8289f8aa391243411c3f4c0afaa830e1ab0c6bdbf73d88b28ebd91dd67741b598e054a4d942ec1519be96f8c336e7c9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b3dfcdee27aa4e8a824bd5c45cf205
SHA1b5a8f30a05197370ad2356b9e3510c0cdf17b151
SHA256510692fb2698a0868a32c04b7a313f185ff3b62cc1b2378e73bb0b06ffd29b07
SHA5126a209e681c13cfe266dd526bf6aae86037d6d6f13a709389b8ddaecd997573948dd670563a5ce4cd681add84bf07d111d1580b0cb20c7f03ee27878c74ab62b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbaeaf08af45c8881d13526e3fe3a873
SHA175f56fa6fc802f98e97af5d537644ec135ed6be5
SHA256e1f3a0567204481440f54db111e665524e97e2dbd9f1fa36d1bede82fd43142a
SHA512bb208e7f9d64c6b8dcb2c1bbf9731547b8ac83b227f7f6d7638f629ec40172db501d023bf962e13fdcdd8337d5a5baa8c2677392aeacab0d09119c70c85368b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b777f3159be6e5d27e2b98699e2a3c
SHA1253480e4fc19888bcb0d8559be337156b7450738
SHA2561d7a8cb239387ae869d94f6311461b72a0528972954577cc0959c2c60efd7f84
SHA5125401d7fb60e7815ce8e1186c9c6cdfdb41012a547f6e1c07b2e3e511e726469513afd01b17b3a63814f22f21633cbc8c85361b39df6500a6bf92e7e55a0bc0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb2f306c9f6ab9958e98a7c9aa612f1
SHA1a3b16e6ef2c82f319864ae70a4ae52cde29ea0ee
SHA2560fc435cd837d87a2f5609af0d414e8ab1e414d78b102bf638d21b6e85fd87390
SHA5128f5a8df6678755950b558549301e8b19b44b9828bd3fc3834c57096cb995a06123fa8de6376e93e1b8564e1dcb947023870b8a34148df7cff183510697fd06b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b