Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
ba2756ce2f1e01f3a753d7a0b28e8ca5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba2756ce2f1e01f3a753d7a0b28e8ca5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ba2756ce2f1e01f3a753d7a0b28e8ca5_JaffaCakes118.html
-
Size
7KB
-
MD5
ba2756ce2f1e01f3a753d7a0b28e8ca5
-
SHA1
a80985e36bdffb91141ea9dca38b713c327c771b
-
SHA256
17fa2f3324d45c27a318ed51dab739c7f09b573185b76889b955ad2c9ad1d7b8
-
SHA512
be312b8f0218cb69e5e5ef8eeaec1e9efd84154c2591ff0618cb2177842cee3a9893a1dd59b96b30e7cf6b0f0ce7f44c6941653164ecb00c9df43385ca4b175f
-
SSDEEP
192:gzlVZHCkA26xd3Qk/uTtMy47R/Ga0kVhFuPwf8Pn9wHHyJ/:gjJ8VGaRF8I8H
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424829613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04c7e1410c1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fc617e18e468d4488d23c900334441c0000000002000000000010660000000100002000000086493b3eb7602051f3d5b4c480590c9e64443484a5121b9a16b27796a87e8080000000000e800000000200002000000006909ad83cff29b9e5ae9337eba087fd8dbfb359b6ce005195fc200ed234bac52000000022ef86c7d57e531a6367bdc14d3a1d2678f4beb634f2b55759d57dd1a85ace3f4000000073a2fd8621c331805eb244b8c4899d2bfe130bb1c03101c69d0a8f10afde5c8c1d290e4a23cd1fd99d0dafc6acd4051b7450c3538c0e75b1297567930465feb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fc617e18e468d4488d23c900334441c0000000002000000000010660000000100002000000044961f1d62cee187d111d8ed9b80a5b451552c6485cfe5452305ad771a5ead74000000000e8000000002000020000000edd4749941825c0eebef2f7826cae174fb55eef93e69f1b8a985a0f40a9ca84e90000000dbdca7db05ef703737754989dad4e9da1b86616a8eefeacdb0295ab3cfd32a8c0a6d6cdabe79f70f3cb26404d8a0bea5daa7189c6a573894343347f1473f4772a09bb0f23eab8412bd1299d50443b70482c9348ed0de47cdee13518413a6ea37abb69c41c76164b6184d3c3b67dc6bf507caed2f88a2280b452ed903cff6c8e8ffc4351f4a360e3fbf40b7c1aaa5e601400000005684a9acdb5a1342afdf08f3a65e6d5aa7f9aa0a3712ab957b0bf0561f58dd394ea3318594611a6d438b1c8bea1c3c39c82d398149d90de9410a08c31bb6569b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FFFF6D1-2D03-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3008 iexplore.exe 3008 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3008 wrote to memory of 2828 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2828 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2828 3008 iexplore.exe IEXPLORE.EXE PID 3008 wrote to memory of 2828 3008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba2756ce2f1e01f3a753d7a0b28e8ca5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef55ed935465c32eca5963593310c9f4
SHA10fc6bad2e746464dbcc1f8cf3aa1db5495dac29c
SHA256ac22326f1b1316ffa9e5869a88328c4b50ab1ed1a767976c867c701e2e32f302
SHA51267262b16e2c097f5a357602ccacec8ae666e45ab6169b199b941eb21b1bcebdd9f3c29b68caa864741c17e12e736c0c340cd08a45701c8954b8a333c756c6279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd88cba7c4b752da64f6c422f407866
SHA1745b448ea33cf02b93484b6a5c55c72577c91b89
SHA25614772418a57974c9d4c97252186548eca4c24137622ccc0a5040d62460d8b447
SHA51255575e74e62ae57859eed347b3cecafcadd88e16bcb3b8ab69435195205b2fb48b898349bbd56263308e26230457ee91b234af40e87d51f8cac4e49f562f20a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfce5430d62e8dae376a65cc4293482c
SHA1f2121f13bec4ca9d030f718e9a904aed98f16077
SHA256afc1b536d1fb52005ff62f6d9cdcb89940eac4bb903e4a4735ef4bfdcde10713
SHA5121c8fefce6c61370a6cd40dce36ca33c32c2cae2f134ecbf2db551a11c470796cac109cac22cf3dceff7928d4f4594c63b56c84611edfb42e708fbf79d7322863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aded3a3bfd9e861649cd4d69207c217b
SHA1de45781a6fd26f4e2504d6e5c3fd00855a495735
SHA2561eb36ccc197d21bc87fd48831d797b1b0d5259ecd523207c98c788705beca9e2
SHA5120677ee36b33e82c400891fb38b6de53ffed15b84632a3446167f831b35bf622b622d0210dd6bbec2bfc70591e600f54018037a547fc0242bd105ef076b70f4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501fbb360eaaede90eb2ff3ee5374704c
SHA17865d37655e7c984d2e488fc69f763da6fecb845
SHA2569948e892bcfd3939c219107cecd82edc4b0383dd3f0cf9710405b4f1d9254944
SHA5121b2f7470256f2be00556e501fdaef5edabb44c00466a8f78a61005d5bd5296988f6757e1b076cbda594673783d148f687263ab8a8a0e5c1e62a98a4acff4cdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912ef52a483601595f0eb4ae33d4dd1b
SHA141c516b3440ef5e663af31e9c8b987eb296552e0
SHA2564829f34003fb553af0f7c45bbc00699315782d6163e7363e724f1a73a33eded8
SHA512abb873f3afa37b4935d2dbe9154b778f5c959afb678d305de4b96ad522d8932c43b7406dd617971d563acd5f7510d2887fd7118677551dc6f61805d3e2940b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519386321f2fee35a3bb679bd203bd062
SHA14a8437d22a7e79b1ae3f1528545bda242036aaa9
SHA2566ae40698d26f968e69b790545104cf5cbbc8eecdb219762881d497807da2f6dc
SHA512c18250cb37dee14a4440b86a0f5b1cc2cf18dbdf12df9bb5d249b607aedf6c799ac9e7cbfc3ef827ff527503ef4f2ade93080c049ad44b63c29989cd4f5921da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c742d9477b38ee572836fa2a02a62fd4
SHA1daf5880ab5096870a0a676a91401d627e66d2749
SHA256f3e79aa11fab6e7d8eae9ecb06e839355a73c69208c0f3ac48f2a6987efe0a35
SHA5125090f3c540932dc402c70a0ac9b273bae5566e6c3c1cf067075489861375e1a1a47923f5c07b7e34b579465508041920f2ad3f60fe2888effb34ec2be6b74486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e988dda31e00a9a87e012b2f74efad
SHA160a801a02bc62686d21851aa28195e0f4c71e0d6
SHA2569ffef2fa85b06e83c164e80d49a4172a33769920b06c727aeb993697b0da4dfd
SHA512d4a958deaa695294c0313586a06f3978764f210598c099766b82dee013b091f2b57ccfd2cea1f54ab7cbb5d39e88f577c54ef220d32dba5ad950f8e09b715798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74c11bc45906864e823f12aee623fd9
SHA10dc26938c86ef3d0c0045a8172644e878e151493
SHA256d93157be35851fdf28c535d52cd0b820244ddfd25e7a580c93f2e0fa079e98a7
SHA512272640c43cf1712ab415e1cd1bfe09b6c307ef944d3ecd04bb6198c328207c873ff875db2a6002f653d52627f1168a0030a311a5912bce52d470da9d3f650732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07bc6ebd14b88067bf5d2a5cc7201c0
SHA1995d3fc1e267e509a4ab1a89e5896c65eee9a7e0
SHA256114b87e35fb02f68389544ad5eb726e7b82da55624176e8a7a5cea3da27ac624
SHA5121afa6c1f81a513003915a0f789b4132a960d86a729c194fe3b1c5af9560cf7d18bd57b96e29691be81c7d51d05d503f2b9be00d6b4ed69711851cd109635f769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d91cac1cc1b160bfad677c7e3df3034
SHA1d672341cc6e25046172e7e3a24a6b1ce0d411509
SHA256594ed1a571f16035240e72c26dcbc7aa537722eba703c06bea1e886f42ff7733
SHA5122b813e457c5e4b2aba977805d4cd1b3f36d9a800dd1896f73ae513e4a9d0b5374fedfb146c68918f2b54cd01fef75bce9339bae549b6d719d5e380c7b8799ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb288980581426dc443bb01e69ab938a
SHA1b5813de7909436e11f3ae408e30ccf56f1760633
SHA256226f47886f91138462eb0d7f20abee19a667ac850c2efd509c8edb1994117257
SHA5126cebc23e55a9559edb4816b5cc8f5f875730140336c8e67f8de37b2b3fda992c7a39a3e51c77892ea04ae18565a66e5508875dcc54d0a1e7d42654f5bc73e81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c30d87523c5ccb3c58bdb716c9fca21
SHA115d42f67a8e334e421ad05984f4c3ace21d23589
SHA256a8124c12fd114ea71f277526816239cf8bb5d93d02d86899458f0786a06dbcb2
SHA512f69808eba23e6f460935b006d92deb9fbed1153157ca08de49d59af94c927f2c907217c4fc8132bb67b79813e51ca2984d2672047428e14968e65bd76fd0afc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333906f2f4184ff5ff450c3b7825a92e
SHA1122439373886331302f3e0b22703205b9bc0cbdd
SHA256ee4d9394cc5bce17dfbe2849366c6ef40f3c5dbcc87105d8ba714c26ff82a49f
SHA512f9a53090be2f343aa84273dc02c3e61b08aeaa8979c66bde4f35f7b9b0ec22ca0723b423c893e4ffc9245ec0eb8c890d4a9f2481735c27b37413577cc2eb455e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bbdbd57b33f6a766284d5693988eb2
SHA1c9303f9949db333e0cc563fd0e8192fd65f6ca7a
SHA256126631c0d862ea41ec0af29bbafbd4064d41f85d8f5cf21175132486cd58feb6
SHA512d47ed9e71bda7af0b39d0515e1ad3eca73565717c88b9c83e4b73bbf6bec72aa6d5c781a0980136ce165d76ad9a4a51e1c8db774a9b4e4bc35d15394c73ab5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c431648c6a2e4bef484a3a63cf6d8a
SHA1a12c3fadf3265279da4e6b7cb48e4f1bc2564063
SHA256879ad780fc88b5459f9ce4393964d5e42ae62dcb93c96aeeef3be531a5044f34
SHA51227ea845806b1a9de5cc26168fcf12981f9141a4b86ec6e513123a66c3a673ba498736ede8a8caaa0b840dd42f9d1f8a1cb2b88141b1756607787b2974b0399ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b19d58101907dff84604cd884272ef
SHA11be295e4f56063ade5e6c8d37e7412e53b072bd1
SHA256f4ad700a97f8f94e88ed5564a66d8deb89375d25f4c08d0db5c7169737b47950
SHA512fae5939aa71df3632c841688c4ed949c6fa7de9467a08158e02d9667fd90cab1caf43e27ca37f27e7d22f31c3f4e2ea09bd540cae3a1de806c8d9d653c4cea32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d9198e1aa58d013297539a28c54b95
SHA1f50778f0a3661b7d6b233e3a4c8af71a4f822ac5
SHA2565a8d98c2ad79ecefc2df6ab734dec65b5d34cef172d853d304453e2fc25eeafa
SHA5120c10aa3a8b8d4bafe942d8f6fe9df98aa26f6c31938d3acc9dbaf9346b0a78e8e704c2f6c04ed594f8f63dbdb4ffae0f504b3a97fad16feae5a48a71f67489e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea58c258195121b3336fb4f472148e3
SHA1a21a70f955febc3e3984ccb1316ef62afc1f740b
SHA256af726f2c66591142ce930db26015af7ae05ff675545e28d8a1fd45cd9be8b208
SHA512f3db8499646f3fee0e48132317e8dd63322c2aa3dad0fc2228747d8fea74237692d323bf143b05b6a1470f68761e37334d0adf056fdcd38d1f6ef11d01387ecb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b