Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
4cccc1a8263b12799d90b6cec9335790_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4cccc1a8263b12799d90b6cec9335790_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4cccc1a8263b12799d90b6cec9335790_JaffaCakes118.html
-
Size
41KB
-
MD5
4cccc1a8263b12799d90b6cec9335790
-
SHA1
29a084e8d2ddd988ea643c05eb7b7a1908b06648
-
SHA256
85ac323febed631bec48354b9cb2f3299f8cd0fff8d2c8410ae73a2290ca4b6a
-
SHA512
11c9db6c430a0ff4bfeaf2db0eeda1ae5d866dbfed13772c1175a243b4c5d8d3e8be2eefdecbd026ed18a8a12b78a0409290b89207d570cc9b5604ec12dd9766
-
SSDEEP
768:iFBaPMynfOnc07aloodlfPufZWeFwEsHwznwgc:iFB0nfDlFdlfP4WeFwgznxc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E002CF71-432B-11EF-AC29-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427265987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2644 2480 iexplore.exe 30 PID 2480 wrote to memory of 2644 2480 iexplore.exe 30 PID 2480 wrote to memory of 2644 2480 iexplore.exe 30 PID 2480 wrote to memory of 2644 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cccc1a8263b12799d90b6cec9335790_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD58d1040b12a663ca4ec7277cfc1ce44f0
SHA1b27fd6bbde79ebdaee158211a71493e21838756b
SHA2563086094d4198a5bbd12938b0d2d5f696c4dfc77e1eae820added346a59aa8727
SHA512610c72970856ef7a316152253f7025ac11635078f1aea7b84641715813792374d2447b1002f1967d62b24073ee291b3e4f3da777b71216a30488a5d7b6103ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5156d24db65770a68058222e2cfcde53b
SHA18db375db533ac07c2c2027ef9dbb377acea184d8
SHA256e15349027cf16a2fc2c43f1148ee5496042cc0e5ac61bee5e260425f5f5dd32f
SHA5128b33f446105f057dc1dc47659612a6516269eafbe66510b48821e8e59913f31aeb4ed947b6af8314bfbe1a107319734202d0190aa4e4029d1ed1819655050b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD563dd3376727781a297d9aa4df8283256
SHA1f58e2d413b724c69907309357ac2607d7ab47e43
SHA25604119b7a64f3186db9e970d6fd0313efee58f65a8eff4cff2fe59c7a59c9a78a
SHA512b2272e5e8fdc4a182da97b44a3912d8d98f311ddbb406639a6172cf385db7f952afefe22bb3a8468799ecda3504ba8ef7fab8465d492145b8db53836003783e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52a5b5e4931f1400ab37a14d36720a02c
SHA11ed74c9f54f9353a6691c52164f118a1b8afa26a
SHA256a76daba1d38681f0b1a7f02aa0f8c50b8fa5c96e0f1a14e30db3c358c622723d
SHA5128e2692c6e4883fac3cc030bdf19be485029d10f726b7a8b6ab1e32b47810422d221d10529b24eca0a4c62bca17c388385232ab94e6c0f53be67380589e1f1493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d6f97cacf1ccf6de281b0240cced21
SHA114ecbb1a213a3dc26d5d52f4c96b738b27c0877e
SHA2567b088cdea31e72c77ca9933d4f531d8532fe5e0bc8624b8bef38a331176a37aa
SHA512ccd61b5a7450268a0d90e23b91ce865726f90a518e3e0e9c39a3a9a0f9e4384cc3722cf1d5b9bc89835891572fc3341ac342901ea2a80ef43eba7b57752fb940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07688e9903818d3e8bbc08ece727bba
SHA1db5cda69c2bb260000b46e7e71c1884b808109b9
SHA256f47be8e8933d3b24b17a4d317ac3eb485038c739e7a4cac10d61501e73d4dec3
SHA512b1ed6b17e163f64d1157421cbb8452ad3961c32f2927ee76c1d3e08da29a0d6542fd1c1b55ef1a6ad58d3f41d070c93cddf49445d67f3bb0972344181fd70aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff8d4502abf476cdb7399f0708f913c
SHA190880a350cba803593ac9a1ab0117490d8a12a85
SHA25638711b2b53f56f7d7947e10dda8c898dd4a157ba79e0a9ca2837776925d12e15
SHA512063dc20b57603248c7351599136043207188da376b30e2dce6c763097dffbe4cbe0b95cea015d9ea8721d14c6cd3887174f3a1336100027395701027aca34bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee111a1e10af379e9479399896a65a99
SHA1934920ca070bb295c1d5179850d4bae5799b1400
SHA256668ce722ef09b8f55df75667fb64aed2b3a06137950d55a5fcce503251aaa28e
SHA51293afd36864217ccce16a36c5356c3aa14f530943a3431f066631df8d14105395c4e4b8163deb05ff2c9d88aacaf5648ea687d47980763e832468f0f11f278024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539aa9f1b92adc242686a24ce94e06b0
SHA10364baa8fa690b89a7da2ba7bdfc6157f1f69dfd
SHA2565148c2902d83c8ccfc3f3c9d8ae4b201d48f6a1dbdffe1bc1ef875bdfe067d6b
SHA512efb4e61312799195d7e1a3101001744d99cbe6a3a74015e09af2dde71d9d52b8ea9f0cdcf77f2ab0be78a0a8379bcfb7a4522c32e7ff634905431dd910ea1ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8a599f9c7d8ba8fa87ff0892dc43aa
SHA15e2794fc75ee6ccf9079ea3e0a626b014b9fdb0a
SHA256956f811479752248d6c308d8d6ae33d1b1b4af1655df811ea401ee399e086603
SHA512c6a40a5dc60ea8c736298ae00da211ac2a97dcc9fb42edae9f5bea497eb29e3fd95f9839e6508f1a4f126829597c69376f51bd76ed85726598b9a5eeccc4c930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9d4530d432475f82291a567289f982
SHA1c72097e980848a4178fb93a41b58631ad98a3d05
SHA2569a7d688c8de7de5605a1468925c989c24e4b28d325ea6e1cda6b4dc1d8453e14
SHA5126d99e78d71c9f73cbc3b66922c4e102fe4f1fed6b23717a7f86ccf88ed71389bca30bb277b09279e7eb8ad710d3c537c32b610d84b62793f3f3bfb1cc2cab1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631db1124eb519b8365bc528847f029b
SHA101eb3bf8179ed4cea53a7dd265b047477b404174
SHA256fb31a4174747b61f94c587fc8ce06c741b9edba04948a285b65e379c1dee1e89
SHA51215f60a641a04d1e03bbce742894dbd820292cf388ae0f489f9452e6e3d9184c42da1606314149072216478c8d27c4ce4eebed229b3ead60607a6ebabef0de10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a7cdc6f46b23048188182e3779c0e0
SHA1e2ccb9b87ba363705d0f6963db21a70c24ba909b
SHA25672013c187d53b4a3e742754a6780ad684fb0de28e832ef60e17dc6ddc1774d61
SHA512fb29b90020ab5e1181b62ce0b95e67a9096119c336b25f67142c4af0407aa13861163d90588729be27a3a70159ba93fca1ebe879c18b7b766a6568c28c1e0944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515753b830df529d1d20abc8318a90622
SHA14397166328efdb380fe24b0b796933fd530e73f9
SHA2561ef005b88b37a57aa55c8f70a282c21c53c8bc45e1cd9094690465902f4a5f21
SHA512409ed05bf1b1a3ce30f09b83640cd2eeca4aa0627cf624eef0db77754f2e4dbdbfe1a2fe1331175f327b783eb7f5de8e3a1288ab428ed679d48f8bdbe2a3a488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c0aa096ba87cad2f52b6602bd1259c
SHA194726e41c1796772ba6c853e0a31a7d0bf76d308
SHA2568725432f14c82b41dded8cf450a9a88bed5c0b400a35c9ca676b2223688705a9
SHA512bc2ea2554fdbeecc5a54a646689efd5048c7ca523ada206ed3f6859bc049b9549f28a49b61b79e97a2edb8cce1fbefc924227c1feaef5b8d474c33f69ce6c2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ca2ab3634a2a2e51ec8e9b9729ffb2
SHA1279a25e0181ad9b58c64a9ae15fbe212419f233d
SHA25678dd55ea2fa09dfc8ab92fafebb6f3afa8c4abe83147ffc0b870a25f0fd4ee63
SHA5129e0c44d61f7e1450657cc88ff4e71771ab19583dc02d633dd05b8bb0f48f115f0850ed291c1f9f6c1994e79cce58474a7c302983ed306f7b5fbdb9f26ab6bec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb66c206642012e4047a47ec6f8b914
SHA170925e020589bfecbcd63ebcd5579394d087814a
SHA256287ff4b7bd623646879b95fe1b93d413c5b6e696190ad5d1bfe286212bc47fc3
SHA51285fcb8bc4812e16981a5946cf617b4ba80ec270e93b0cc880d585a28d0c1618c41f54f4f0d83ebde3a3e97efb658cb598d91f7dfcc67b599cd77108ed5b7058c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdb5a19ce85462d0c518885b064d2d4
SHA11894ff7e0ea10d7c45578579913155e26a3ed62b
SHA2567d5788ceed78b90ea7a0a40d7c0d850e60222839b3db415afda4e6b71acc6d5e
SHA5127a76bb2f1ec556c0a6746c5002afa4e6c9c76dc08655bab34e584216aa6e4b32c4b1c2015cbf08373b15ad60586d1475194ed3cab0e5051ef85d016004e21205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313dcc0f5a77585a6632f438180892ba
SHA19d5f3e2ebfc81d1835b1cebe51ca5158c08a70fa
SHA256157eb45540e7bb6929ce6f77511f8d52373973544a4b2d2d180fb1c78409e862
SHA512e4dad2734fd929963dced87034842827afd81783270b819ca3aff51684cabd2de62ff5c7d8a802b2fc65820267bf4045269048e3613f948619119ad116ba083c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e068573fde6d4aef5fe8d6a0859ee46
SHA151693d7ae38d5f8c1730c00ac246ee83900b3531
SHA2568ded240be1b9734e2ec35a0527aa3136de8cf649e762564bab475bdd3edf9cc4
SHA51238541dcd8ce7b38487679d7996697d50cb1e5507e273c1abee61cab397266101d7ffd15606dbdd43f1dbc0bb45468288fba8a185937c22a8f019da807c2d857a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ae1efe4d5f15bb94f60c2d9b84e215
SHA1693b7383d9684bff9dd017e1b0dacc876c2260ea
SHA256b03aa924fcfe4d091ce82a3ae174b2e207b8242b98976957480d0d25ff8a9507
SHA5129568dd938fd27007853a2050f505bd772f23cc3f8ee7e5e79eabade6a0eb55d4ac1d11b147b8ebb59eab26dad68df9e16bcffd5ce50dc95b3db98ed47c1e0591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6086fb3565eaba15a1cec01dfb00a1f
SHA1546a054d0934fb96d63c3986a3854430daf91ceb
SHA25696c1ad30fffa3d0b9f209e7baff15ee91b10947ff3f7cf2904917c143b68b127
SHA512e51ede341a99333eb39c5d0c042bcb6c2982d1d08f7893afb9cb0037914fb745a4e24558020b25d44ebd4ea37f710baa3311a196787378c854ed0e2046f9bd49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc57e5a799ce1e0764dd399ef8aa23b
SHA18872cd76b264a42add0e548274919373ac4aacc2
SHA256c3243ec45dee56f8a66a19ab3689d4a8a3edc4ea79b0ccc7e16bf16f47614ec6
SHA512e9023a8d8eec1af8145cd0dd45c76384a7514f21b28527bc64818bb116243af458cbcafbb4ae63e618ebcccbef1926a5526a02bae3992aea6ca3f4f10eb302cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac18a7bf7b47950d53fc9cd5033a49e
SHA122c4f25e949d47e7d824603419b755b633b3c0fe
SHA256cef989a75a9d780c30f58119b303529c773a751572eb1cefae2ba6e80ffd5c49
SHA5127de3897bad43466acec685dd0464f00f1905a05f67c315500224e5d6e892f4745d51d9eaa0babcebea6c747975db0f6fa0d2d4d3e0237ca849782230b35dafd7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\cb=gapi[1].js
Filesize136KB
MD55a7616280268d3642196c89bd5a7bf00
SHA10350f9555271f57d150da785524e095a7e8eea56
SHA256276ab13834ac74ad86344346135288624927cf2e8c5cdd589bd4619fcd467c44
SHA51276381e69a4c24798b68e95dead45543e0f685dceda39ef73d49a65261db91d07c8aca0171b97cdb173c0f21d52aef3d6c6699ab62d511e3796dfbcda4b26bc63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WHDSWW5V\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5ebe5a485f29f7967338096e4e6878846
SHA1845bc70098eb80aef57ea87da8fc7bffe5aab067
SHA25629b3fe99b016598da9c20ee848f9a90e48e14b16a1393e91a7fe714738790625
SHA5123a8c4f3b40a1458032be90adf0ae152c9852d7ad9573146555d983de21fdb1d538d90a56d822ce8faa85cdd4575fcfca0204648c1c6ebde3723f9d396789e90a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b