Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
18a3f4fc2c4c220f6c1408bbefa8c991_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18a3f4fc2c4c220f6c1408bbefa8c991_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
18a3f4fc2c4c220f6c1408bbefa8c991_JaffaCakes118.html
-
Size
9KB
-
MD5
18a3f4fc2c4c220f6c1408bbefa8c991
-
SHA1
d37e71121057593d5367dae6ba376aaccc67bd69
-
SHA256
2ec9796bfc403c74c942fce744efe1bec56a27e359ff513d9f504479e8f7fc4f
-
SHA512
0105091b125fc06b22e1842fceda7d83c32c914437c1f7941ab71c5d6699a85b6d3b0453c845f60c322ced6f6c0662c2d35ce3a517477babc3a0d9756db7db5e
-
SSDEEP
192:kV9rmu2XAbUe2T7Zkp1Gsd7ALvp6pzpgOp2SpNxpzp+apTpzpTprpjpjpTp7pzpQ:k6XeiU27gBxxpRhxphxR5xhR5hxeYpR6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FC8D291-34FF-11EF-A30C-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b41845193b92a4a9f5ed8ad5aa34e4200000000020000000000106600000001000020000000b70cb02af7ac1abc3435e544349b2f3f8451d1c70d7475456210a8f8c238fc7b000000000e800000000200002000000093aa6b532c6145e4f655659c17d7e3afbad0cb472869c82846bb0fb0264815cc900000007fb2f17baf8ab513780a5fe701c3d8aea397849727698e0830ab01b4f26e7bfcf15a00ca6e1bfc0889f3ef4d7480fd5f16c6827712f6d602f7d1d4e355895c0bf6495e9af4ce72c4265c80da6cc7765bf1a6e67ff487f218cec3cbe04aa26c9b1856e1b55f51c946c524e0efe6eb75276d42b07a2095677ef5dad9426dd58d5878d8d232ed4637796044895a4bb4d2d940000000ed03516612d3019bcff6a2bda2c825a6c38b16d871108a52803a0550fff226123bfff2d60829b0ba55bba4decad32922441321cca7cb11349ebac22122de43e4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425707665" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b41845193b92a4a9f5ed8ad5aa34e4200000000020000000000106600000001000020000000c8db61e5d8acf90b6a061540a708636f50b2ec88a606bce3b94210cdee03f106000000000e8000000002000020000000f5e85fa784752b068b6b3221236b019806f8e8b4c5fd53b3fad00a49b3fab164200000000884687843618ded4a68ba25fe55f9fd852faee2690bc30433c2281554eefa2440000000e6a5548feb564d372dc5137cf1ce98eef3d5bc521899fb8ca3ea2b32d407d521c313ce40a7e3d72d62f9e8d8bd21a7491a1c8c431b29cf6d8e0f237614b723d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006173740cc9da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2536 2588 iexplore.exe 28 PID 2588 wrote to memory of 2536 2588 iexplore.exe 28 PID 2588 wrote to memory of 2536 2588 iexplore.exe 28 PID 2588 wrote to memory of 2536 2588 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\18a3f4fc2c4c220f6c1408bbefa8c991_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31fb48ae5c735c30cefdb6dd21e9392
SHA148c3ef507433b2e6e9a8d1a0234fc75c82a5f457
SHA256574c4d137e5a23042e95c6ff47792d461f289d572801325a3ea194e02fc51ac2
SHA5122fd5accb7b702cfcd2b552ad648cb8134ca4aa8d6baf2a5dc4372823e893a3044c020dd4a60370d0332c30ffa199033cb4ab056963823924513b2f4ec2fe0560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15eb7e3f2547acf5f4ef9a64920e67c
SHA1b514dbd79705718487102a2a5b3506bc4a32da5b
SHA2560d4cbc0dbb27a0a28dc94f631f072ec3814aff28f80289c53571e39f6060b733
SHA51203f8ef1b7a8e022bb4350dc4b244c4033fe53422cba63658ac317068cd4db96d4ae0e624f71edf53ff9a5fbec12aeb4344fb6e6e9e0aed4441d009aba7a4ee07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552eef7e8700ec5dc905089c1ca7de130
SHA1aae11a70b1420cfa4d2c0e3efbecfd0466c4bbee
SHA2564b1393cdef78f31fd6c29e61dc3338ff45c667c3e62009a0ed23e10b6a857fcf
SHA5122cf41cbd39071248560bf7dbdc41af3512c840f0da475d8c74b4fc94f574c973ba3043cd8dedf0c7e75c74d64c0cf6901f31970a9250942f65d9e83c1e595d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc754605074133f9c20b581b326da7c3
SHA1fb63623ef54d9e91b3a649aeec6c41e688fb1a48
SHA256525082761a24e6523a2cc1776e0a09414df9519c34f4c82ec52228a3714f7732
SHA512e82473adcafe28807691a4df530053d774f7ced35d655c50b0e79e2ce17047fc9f8e00409aa95065ca23a27bb819077cfbd3b765e1ee2b854063e92f2d2d6e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb8f378aa81948f6302909a040f8554
SHA1b309f07e03f32212d0853a98e39904b25d090bb7
SHA25613856af8916c5a4aa1737fea28e747b34b4926ce849d1dea30fe824df4a28421
SHA5129e6c9680d09463a4ddaf357972bd261970dbf1f478c6f94fe8ebfdc7ea1e29bb46575c6c027810e78158604ac3a510a15ceefa0e461e427bba05f7733756164f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515dc1fdcdc18f2ee464a645231ce102f
SHA1062b0c76e3c3950e4a1796070b02163ee0af333a
SHA256dbe333c7abc87f55610877130c804f10ab6aa7a42296ea9292d5929642ddf4c4
SHA512bc0d3f08c97efcfe20f1242399c61dce77d3d4eb781bc453a70e65f7b860a82302b46e2344a46bb219ef6785b439905ab1475eed57ec28921978a7f444a1e4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f30946b92411190ea867a4a324b9924
SHA101173e14ffe774475faacb6ba324917d09b807c4
SHA2561e76eeb33c2e321664ae48cd1e6ac581e07f229c3f43e196df4a38b878efdd07
SHA5122898655928b85b63a7fdfeb13e121d3b0525ec63b368ca8cc163b97bc4456142947adafee5aa89c62bfe1fff863b9d798364a96fec64c3cd365238141268d466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ec3e85a7cd67b105944d9ec824188b
SHA1e38ebc07d9f7e05c6f080cee924e07a3b5cfad2c
SHA2560b3ce205b7f12709821ff87ad3504243fa0d24cc9cad4c271ef7a9af8edd5f1e
SHA512e519a9cf76ef7c2e069debfc4b48ab9f1c73551ba182e17e496dc48edd686f904a881ed3fe1c04a3c50251e9bb6388a809bef3259d4e34ed4e75f95f28de3ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e126a12220045922a7eb69a83e022225
SHA14a1b92d13b306ce1464eb4c8c5b866055da00e97
SHA256d92770225daefe56a079e4f218aae0c3ab7c04705846977a15361203c4fc4224
SHA512e8ab13dd6736153611b57516b6119e82184f87ff9d84dd30a066955d19ec8a27e225f260a2784f5e27cd63d0a2faade0252b1dd5dcac3f0c1f1cc1313099d953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2dc11a28466fb6495e316af3c9b2fc
SHA1b00b6167465923500859f0a12c2069c1355b203e
SHA256e53a75fb39fa446ba55ee6cde4c80009a01bea8c44727f58b7072e850f128b0a
SHA512f31a71e52a3b36e5ff39f3cc5900aae88fa479d2bba30a3f55cb5f2c68eaf5b4d70ec4e9c8e608c0eea2c55d27595c64ae36eb8a72de3d97cdbb69e9555ea031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955e29fc64cc88c080be850657aef50f
SHA1328c9164209fde7dae64f1f12720ac638720ce9e
SHA256a8b73307ac9d950e1488d80fda5da348c43f6332bc79a457586d1eacd5c24762
SHA512b91db5b249be5d0ec7cf2be8856151cace27a0f44e0ad518034d011991a155503cf0c2d4a73a3ed8d39b44f415d651f34ad2c2ff593c7de1d88e0005954b94dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c247886d47a2503e646849d5c3f8b0a
SHA1bd185677ac7a894b341d9784f8f0b6f4faae632f
SHA256b60be01437ab937549bff092c47521daaca9a8d84679147a00df01ad3a737263
SHA512a926096afeb969bed521b5edfe077239ca2d33a77c76434af622abebca5ad15bef2de7c4c4a7276b0e28bfec20154f694f189e14a14bd459f3037a52e56449f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f0044cc0c85e80d67a714c26c85ecf
SHA137e19fb9aab1db085fc8a2866272b92522c6087a
SHA256c89d9c120d84f7545ad2c49ecbcdccdec517d7bd8c5f1eafa2557464b591686b
SHA512f6862b07c1eec8453a3c0bded1f516773ca82877a6b714239812c675214ed40bf17a9de61a189168b6a382f2e1c5a6f725c9fc22629889a0adee3a649ff330f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a6b5543dc1879ff2a84b67569b50a0
SHA119a2bb32f757187cd9240a8364ab93e74b1dffc0
SHA256ffc522b96b2c91c4394b9db6ba8a08900f7e80e61850465ed5f8dc1a3d648b52
SHA512852f3a06bb3386655026198fb214297e4a9c12e97dabf942e45db1d844464ce77e10094b98010730895fe6458387c6676d18d629d2f16d7213616e21e2b552b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee6364848e90a3c5b936d3a0d101600
SHA180d26c35a6f42e5bdd0224384ed30e676998bb04
SHA256d5fd085aff1a22606d35b2ed2af80112ec6edb05176592b90155fa4a40e82ea4
SHA51297d48fb17104f51a9221cf67e24a551da77440c7e101c4a5b1b9e08dc99d936221121815374511f1b5ba4b48696302a7942ef72355dd4a3c6d6b6d915529b290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f0d8498142af3415dde0f47a4dd02d
SHA1620db0e857cc2e686a50e92008ab2fbd20e31c74
SHA2568fbf37ab01fde29dbf255dc2ccd7dad44eeefddccfc6e3c0947d571dbd8f2ffd
SHA512676a7d98ff26066c4eab1f93a41df041a2ee1a555f77c9376696c6a5985a72349d333948e699482d845d993a203e0415658561a3bc824020625ca2954e7d84a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56789aed8e0143b8ab7a12ba95949bc6e
SHA17da2a0740c009998134149e6dcdb3797c44856e0
SHA256fde0f293d896db850b3094bac402d991889ecf906653982676e1f0c4deeefa38
SHA512c7189bdac4b506db88d1ea0aaf930b7c8f0973abd99d1eb5b91a25488a6e0acc7b944508b113fd3bd204a7409d7c72fdb07d19a56c154d9dec8e31981114998d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd23d8190cde0b20f47ffa01433ca747
SHA11a0a7f279607730fb0167e0444f364da0548e818
SHA256f5572ab21eae5d29b6827bf6bd03759a3888c44de13df0a7f420510dee0ea01c
SHA51289a9915d82f2bbaa10be764517b83b8fa4444437be582417f5aa2646d3156343c290eb08bf8e3043b508ed1cdfd9ccb95f659915e9362327255546fa40905b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54047ec705477afbb06944dbd5752d89a
SHA17c8c1bfc68c5a1e2f8229740f7a55902e5cf096b
SHA256f912d2c51b33fb5cd86cdad2531858e2651805200f49f809b5f3b77b23b7fc3f
SHA512b45d0aab52ccc6cfa008158b2c84ae4fe333815ce8af63401cfc4e45d8ddada18ff0b1a9d7bc29c16420a891a4f37869e1712c3ac3326b869488e1cf38639b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d485f60153d30de03c0df4db0fe212f
SHA1c24832a8f802cb587680c51ab843776a421fccac
SHA2565cf4722c98397702176ba58dbaad536407af27107c055c36fafce8e60586727e
SHA512ef6a64077007a7ec99f956bfeca136548aac87a3bdc9f2e8a882ab8c53277d8c2b8c2c23d86fcc089ecd93b5d6275bd56f11051444100300bdd26e3012bef26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f383e6b9be8edaf3dc48f413ef6c73a
SHA12ad80e837a6e017441bc896cd568364a6636b60d
SHA256a209e4b9ceada719d974bebedd87d565220dc7ae6d39742279b515d5c1cf980c
SHA512df46f92a2781d5fc4ac295d683263628d58f06fd3fc4e42f731dac3d5ccb87f54d9662601dc60925b205dc223b74863197e37905227662cbaa7e488f56fa2f8d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b