Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 00:35
Static task
static1
Behavioral task
behavioral1
Sample
24081b932b4366fd4a4346f7df4a68c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24081b932b4366fd4a4346f7df4a68c0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
24081b932b4366fd4a4346f7df4a68c0_JaffaCakes118.html
-
Size
53KB
-
MD5
24081b932b4366fd4a4346f7df4a68c0
-
SHA1
11e047b88a6d852ffa08f450290ae641b63ef2f7
-
SHA256
17e305afc5be8596abe1163a65140e72f66a33a8b8998c28aa62f3ab8e2325fc
-
SHA512
8e98968d0a36e3a7a095d0edd2d710a291a725fa015aa2efe1931fb917d3a2654ae0febf44413663a73ad40d1b1d1ac3d9fe2ab77dbc04b8e694e294a5d68ce8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUtrunlYr63Nj+q5VyvR0w2AzTICbbOo4/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyUtrunlYr63Nj+qL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602b5b24aacdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E15E081-399D-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac19a5362129a74798c3a3d32bae152800000000020000000000106600000001000020000000c2cb0525479411fd38547c13729a840f4952e57fd22f660aa4b4e25217832982000000000e800000000200002000000019dff481142f29cda4456febc17f5ea3ba9ffefedd743e9d8557353275ee7b3390000000d78ce82a499de5a6dbceeab4a26c4ddcb70fbfe25b148782ccea7b3c845cf835d133fdbc1fe4e3981b9d87a0ad4ca349fcf0e103ec91b282ccec8dd7d8ae1562a239b3885480b8418945a364f51040153f257ecc4ceb4a7caef9701484fa4e4884846349b0b4f2b7c47ef327cf2f453a0569d30ab88b1eaebd166b0bf0dd6e7eaf66313904b06ca587ff99d4724792d4400000004fb402ad278c0a4aa0302b9bbc7fce69fb7d89d69ee9465304b1b2258e9dfa54ef10804c91a9f881461e984d33399b5f924971ee3641e6c538dd177213e979e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac19a5362129a74798c3a3d32bae152800000000020000000000106600000001000020000000a997d9a3287ce7d5a6dfd936deda0caee2a76fc42807c37d0683eea79631c9e6000000000e80000000020000200000004c53a5ddcf9a354ab93d1256b9656d82a1cbf269d6e07ced7c59eb5809a69dc9200000000f32566fa37933c0acdd07e12bdcd9c68004a9cd9441bbd200c60022fdd0347640000000858150159067e6746889869b90fc3165daeb6f0a86380c18b6821136fe6b48c9189e4993c64a2e5f405230f892a02e854b5f0860b7cd0ee19d30e50c628ca248 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426215193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24081b932b4366fd4a4346f7df4a68c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb37f6ceffb0840f1e24d97965b121a
SHA1c14521e3af9bf1cb5d42870af8bf839af3a5b1d7
SHA256477e6913e87a9e967887e949572521d16e84fb195c289b7aa84343e85734dcae
SHA5120054ac90d97a5ad1f3f53141ddd0b64c9ad96d44d176125a81f8f6ced6e0f27ec69e0ef739dcdd52312249179b0e89bb92ca342c87e72a03f98c8ab2c9e1e42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6ddf0b4bc9467e8473ed4fbb9abd5d
SHA17d4dd771e2eeefef1bc5f5cf59cfb9805aa67db9
SHA256214a67c189c47eb7fc97358a5b820a8dc2563277e9e0e3af6afd6300a01d7398
SHA512e3fa5eef4c0676213ff2e3be3016825f2432542476fa67ffbc176a6665ddd8791fec25364b5701677bd88bbe49a7e8e0fdd4937ec8738da2353f2eb72560b663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0ff4ad0387c21ea4cb41415f221a71
SHA140bda57dc4ba59b46f27c59304d7ee9a6edc83ba
SHA25631bd8e2988d33168c1d03fa205693d0802a96da519e73cdc33571c533a3be986
SHA512094d2495346898e2d840a167441af7b736c67683034286339479c711067a7c5cf3c117fd43adaaabed5afc14b998e2db846c666a1aee70c62bf3feede617cdca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59849d46809fd489aaa67fc43adf1f7c5
SHA1e5c1ef53ffd5e4dbf818bf42a2ccadfb5884fee2
SHA256a1b9789026da5c66753a8cb48ee18319e0dc4bbb2f16ac19b60e98d6f60e172d
SHA51206653f7c0db01e21cd5abb03e3fe5cffb7e7d2a5bd0316982e3c212bcfa7671dc475b2ea99139913321ef74d8f5b4322e7b9494cdbf05eb7079caf9276c49ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17c0c55650939e2637af26dec98445f
SHA18ff67e8b44b41e71f567414a9bb0c4d1a083f1ba
SHA25660e5c67c355065ad63dd32b21c798b5612632f0ed47130aac2657eebbc1b286b
SHA5125b26cf5c1b63529bb0c9e05d5846d97033094af590c8d0e963c38a7b11942d7da80b967460103633d4da8eb7d7cbe40636e5629597cacc8948e6b191bd24569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c76448388214846c6cdfb8788ce651
SHA1c5e6a0a61cc8ded2210b663cdb8e8e5cc3fcacbe
SHA256ae69c53a6b977bf66fc8274229cbc44857c54227b63a82c27975087b49137ba4
SHA5120c1f11651d16a84dc5488c999238f267ec74e5b985ac210026c5c2b8d1ca5709c82bcb7ff5332cf0190480c6db04fb787a06ce5ac789bf1eff9c1babdfe5bb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da7542121f53e4e65132f3d5489c458
SHA18c5f12451e36aa3c1424d2b856c909649340ce7c
SHA256858ef15856c2c54fc3f07fccd179d7c88e67e842ac9a716646b0f499565e6a2c
SHA5125bdc35d1c5f381206cdc06fa1d1784b5c5ff283cd54a4f8074261735193ee80ba7d7e6fba9c1367908f7f888edcb4415c0ebb46acd27ba0d1f679d492ff447a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaecde2e72958ea31a58f4b1f16ac93e
SHA189719d3df945c524d8e5a0876f1734ef1ae25d50
SHA2566eefa304c244fe6709922adbc56a580eef4b260db248efe034d3568a056e1a63
SHA51207bd3229220e2763c9639b14f2331a4dc92998113893a1355e45d016d800fa8f4e5f79f75fdf6f3c81676bf2939a8e430436a372bc1a1bca58dcf85c46354053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59369d5ff03eb6afd3eb961719e2a9318
SHA1fddbfd53adace16eb5ab5be23e98719e43e88375
SHA2565ebda6f841fec1d303a1333b425676ca5a40fb10d1ff1d944dc62628fc1aad8f
SHA512e834d6f510225c4f14263842781628c44978f2a00aca6c604ca9dde4f2c18e8af632062a624cc8aca8f05529fbd453affd4fdfd6b7eeafa0644e3303691c94a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121512bf291dbfc48356a60d5f8e9812
SHA16edf3e66c58dbaecc0bd3fbc87582166e5a3466a
SHA256bd6ccc69abc37c32632b1a5184f0be9fb388e59f7a82c06d224a96c45633a1dc
SHA5120cf0786da51b3ec9039765c2d2d79d7431e369a6ff054c8942cf3c78a4c26ba06e53de680b14a0ff9cbdc75487119f7a65d64b6301bf14626d59792379af4f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fa28aef2e4f3bd1ef5cb1bc270af49
SHA13b4ae7ea56ef21a3e7f26512e4c8ba034981df58
SHA2562ee4eea222b1ab32fd0fba1d529851433e4bbb37b35fb1f3e159013995d7ca5d
SHA512358aebe45bd2990ace4200393a6408e70567378ccf32ecc558f8c5a48130e6c2767fc31b47c4047d1e9ccdcd6a0e6e390027c67d06b8a743c15f9401e89d04dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532bc1dcd2735103841efe9b930dd356a
SHA13a9d95e987c004ac742774133370a110c1be64b4
SHA2569b031e9e607abe039b41d072693babd45be929907b349f80affa5f8cfddca2e6
SHA51297bff6e0f026b0522de052b751ecec81c4c911cf1653f3f4fc27c7358a6d85f7c875612a13cf67fb6672724b1ab62c9882b6573451616a6d73c642c5b585315e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be6e94f2dad8622711afe4a084eac1b
SHA1548c550df4b0c0d725fd320f0cff463af1534b26
SHA256d0a84291e2ebb457b7521efc72041b797eeb3c455f3de6f02f33307169242ab0
SHA5120abe9d6302fa695172c1502d9700fd83b7238ff76cdb1f9f2d9b4f23435c7e24c41df64b7fd130848b0c0b2460c90e776fbbd7c227c9c44b2713c5b1895d8a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da36cf4ec6a40b5e47e59bd2ab5bace8
SHA179b1e0dd97c4f0868ed70ae7f76b04ada1ff7e92
SHA256a738c60fe69945f6140ac75784dda3e786583a78e99844a78ecb43d7170a22e0
SHA5128607acb2067637a63f43afdce10d1f35316e94220ca686173676657d4336bf25a899aaa27cf43a3e3990cad8c94f640a7aa26751e787d19b275eb6d5e50efa37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa979ad6860b34f10ed31ec5ccbe5a76
SHA107da7a3bbaabf5ff9b875668a74bb374fa11402c
SHA256e53cd05ca19438f1560b1eeff07782a8c6ca4020dd94963d3d8263f2acdc7a59
SHA512428c90606d9980534666d9658fe6a055d3b846bbe9984c410020b753da9c792b7f80c21e2ddac059d9df19ab27f74fe754eb3ad1ab1892a4bcfa45b3d7b70e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0c45a37acc6250f3c81a471ea9f00f
SHA1fb8398b7a770b9be7069eb822ed18c784c82b514
SHA25631fef8742c1332820aa8bafc8a059f64b3b7c5923a784d96f6a79580d25014aa
SHA512e9992e40fa96bc756c3021b2031c1992e22c2bf86ef854d331bf79f62421f727e800e76b7d461a8ea43c23632306db2f0eaff680c7753f6e6246cdd4dca8e6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e17a9b019b74d6850a6c600b5984fc2
SHA167b4b9cb9226b5b6597fe147878f89b967b02f2b
SHA256e42cf9ce0ad12f8ac05a02a066c368e6efe2aa0420b4c62f5c1618f88bc3fb84
SHA5124045a79e5ffb7415ea0efd283a0d588a26c6aaaff1d58b693d7ee9d2cb720d0544cbfb00c62b75df7f7b8887c46f764a04f5240af57cd204cc57201a734f9624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcd578863d810d33a573e03665a4fc1
SHA117cc3fd6be117410b2f45760d7c1866e02f0c158
SHA2567f88b74357f11ec37427f6eb4d104cbdfb2d2d88dcbdf3a0b040c4d5ab22fae9
SHA512b35776f2081f24693b6613fec7afbaf0845e835ae9bed7f0594c88d418980631985681f45d013d1ec1d4de9b4fb6f7f1bb4a24741212ae7c20ec51fc8a500432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152689de273c6cc327c0e4ed3156b5bf
SHA16459d971fd8d29df2cce8c2fc157d34f683f00a9
SHA256927f3dc0c6a92d25bfff9345b3ed3c2ec42033ad1da34cbc11d61dc8b9e90bbc
SHA51264c0d5cc52b7fb75b7daf4cff3b6b8b7de1cf035b78b53467e474222e6554c9314f41305d8bfedd06002e9a0fffba9e6642c16d08452bbc2b001769671e33839
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b