Analysis
-
max time kernel
132s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 02:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html
-
Size
116KB
-
MD5
d93a25c6d344569f76c14bc735a57999
-
SHA1
6b63feb612940ba21a38465bef232aac90795f4f
-
SHA256
a610bb5410b570e96fea1adad35a4a75f05935e87b76995108437fdf4fdefd90
-
SHA512
51491fc8102271cfe2e20b9253400515d2279c9cbf3def517255d9a365a2192c7ea872489179e7ba7bf137f1cd4cd93e57ccd917be3b4dee44ec51df410ccb8e
-
SSDEEP
3072:wl6JnErYl58U+NisOZHvOod8hNBWwd/RNHTcjbS4h:wl6JZ+Qn
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 136 sites.google.com 138 sites.google.com 109 sites.google.com 119 sites.google.com 120 sites.google.com 135 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4063EA51-D6D6-11EF-BD4E-7E1302FB0A39} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443501985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 308 iexplore.exe 308 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 308 wrote to memory of 1424 308 iexplore.exe 30 PID 308 wrote to memory of 1424 308 iexplore.exe 30 PID 308 wrote to memory of 1424 308 iexplore.exe 30 PID 308 wrote to memory of 1424 308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56bc1057248899575c2b602e0497706b4
SHA17b61ef298b17c558745734f0eec45984f923b58b
SHA2567f7e07fe11747fe56e14e36c48c222477d51fa1b1f359c298f8d86b66c39c11f
SHA5124e881caec0c622a02884f132ee282d6cdfa9b402c5f275785f5e19a2bd658083305ca08e1d140fac668642f973b7720c6f278fd949d162b63d9adfcfc0ff94bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aae9b373b6105f41722faaca1f8e5fb
SHA1c3e8eec9d94e86a00c40a79e8fdddff14372b38e
SHA2569eb08a2c3f4d399f540415789585af4b10e2bdee7dfe9edb9b521359967f5824
SHA512e1349b09e8602234663af438df4b482594d8195cf5966b1441eff2d0e6aecafd47c2ec741993f7ba0e631d37db1d0b7421d3def299f4f50fb33d440d12e652d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a27ad4d6746bd67b899d3f8f1fbb85
SHA1cd586c60ceefb4853417367718c123a2004f6c45
SHA256c8f2432476c4ebdea0fb634fa3a18c4cb9eab82dfc1d1915bfb072bf8e604c64
SHA5120b62acf16dfa77e3f601f26d624ec1afe9329079029b7e8e31650fc65f465e3f9f7b97cf234977d2594e8069f3d902fbe91c86626803e03e9be0212ae377e1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50667707f078ec75e475820ff45135835
SHA1ed1610ea2a8401527dbd25a6dd1782e262ff9404
SHA2563c4a2677eedc337a5dcc40c1e131944a7199d6dd65bb91fce539a8cd1f45ab99
SHA5128ecec1c6af85a56c97cc976d6ad5c896d76f7a2d0cda75854e599675a64e595fe3cd26da0c4e5deea85323b27a47262a9f6a32e6b857c6baa79d728a1120809f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5a6b4e89b914ee8660828573336724
SHA1dc97a36d8eba5b5a18dbb7d701094c80a82dcf59
SHA256a151f00acb46a2c96e96069a4aa76e738c1d0f14a31be4088364b67c7cde9b0b
SHA51267cb3dea7a975f9357661a1410a56fc9726874dff74ab7c7c70dd8fab0e5561809917d7c02e38720918504e771050a5cdf940d22934c725eb29fa4b139e4ce39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e803a17c027421b6f2a00125e1961917
SHA1161871886f2a5d1ade74a6b9f6f86f09de73dab6
SHA256cde80f08d54d438e6ce359cd4406d9180f87d25ad47e0de7399ae1e70cbdb315
SHA512552e5964869ce8229505814a9086fa6f8b22ff570a5a10de0bab93e4bc938c17c278db8d825415ba29e4f0f2b927ec32a172b819a7e6c17d804413a74ceeca62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589521d75ed1e9150aafc5ac24f84f39c
SHA1174f16b782cfe196336affa956b9ba00a5e3b781
SHA256df362b98f7a342b9cd965f8efd7817497c3c5ee45bb934bb954f1f6b3dc42374
SHA512f426ee0a54d6fb8b33363426aa9331032703e49c399509d91cbde8cd5f474f9de9f318a451604b919666f0adde1c5ca80effad83038fdc43eca80f4e5abb8a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57addb71c7eb6f35ffed0b148bc7e1cb6
SHA15266aa675e71d4cef3156b23cfe225b36149d1ed
SHA256e038609f77b25dab0de4e6a4328cb0292230fcb2917ca541fc6ded2385638567
SHA51268b6b93718d544c71e8ca9e08b860e699cb5705357deb56f0b2745556458f1e6fe5d01b9640671923a3cb3818b4abe5a1503bc55cc9e1d2a412f0b8f423c83b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baaf9d714304a24adb2453e3d9fd4052
SHA102b88f708ef2fc65b42a11f927f5df0a27f46874
SHA25610a3b78e73a911875b78bb8637127dbf46458cd54305230a597df6e88d1e59a1
SHA5126e133b8d11d3334b582a6240d2db49fdc7ee7bbd1c16c420636bade1ace182d3c1df45e05f1063480fef9e62664859a08b6d9d6e7bd2299e4b8a019e91f2120d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b723a69e0ec24696f330d569564c613c
SHA103b5bc4d2bb4a1217e6dc1c79b4388e20f58af13
SHA2566093f286f21f35386f6dbc89a1649ab5b2945bab5c4ee0d03e0b9f4148b0e2bd
SHA51291aced935ba6537bf1d7ade3b99715353b8bb628253e25a5641c0ef0b826a2830e6fda03b7d84a418543110fa61693d9eeb55a6345d13c12f41db3715f1ae694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d098fe68222bdc0d79a5aa74ba053853
SHA14dbadebba6cab99bc60e2fbf2ef21d6f2de3c91b
SHA2568c78d4f51ce38ba077330b904e2599596c978f1a1a122dc5b5efe5ee13448af6
SHA5125c80351eb90ba5325ccff43727da322382eea4904cf1b9eae0dc5a91c0d4ebfe2714f2dc3588176097fd3f78be048e5cdbac874036351b6edc02e54c7a65f2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf305771d0680d73557fb9184291c5c1
SHA180a51e802fd6270862f27a4b5bd523ba164cef37
SHA256aef64b8e78a34a250474bf68db7c725e0ea71ed1bbc6d58c1b799041f2b2f408
SHA512fd97338c1de026bd234be3adee2a0750f2559ef596a1067288767c57c5dac9b350ce294d5b0f26bd35c6ff4c7b5270046556db2c2cded95eee5bc116f4b26fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1295c1b12bc25bc6800535f009015c
SHA14114dd1b838d699aaf255f5465c7f1abbef8933e
SHA256d0ab90138df994c470bc4240c8960da7e4ab36824270e51384c3d46dafd99ad4
SHA5126d90d4889d3f55951994d7af359abd83f7ef5fd0b64a66cf26b8913f7d71239fb4f1789001504d745eb61d1f85f709fad41aa8feb8511ba14f44528431132627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577475d80bb991052e2cbf2635cfff40e
SHA10bf5cf06726e52d6dcef786271147762069aab2c
SHA256f3b07605b56c95a3ec5f196c9feae1634b3777527a6d11732e8070ba1099aba8
SHA512a59ac076ac1c8aca63b1876a4f1dfd31740d8a82c1f5ba047f3df323284786255ea942dbaf24492df1777b2da792ce0b4abafbd9e7efc511192ffe033c94dc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a249e74dc7ff536809b9d0be7bf4e5
SHA1b19ce218817595f8203164b560c1dcf5f8a32d78
SHA2563459de67963700b045514191b3bc87624bbff7cda12c28dea04d566ea59a125a
SHA5123962583531b6e24dbe7781ee3b240a9c1779f5106a4a275989dbaa94a78c00ae2a4f801e8ce373440e570820bcfd4f3a20698f2ff8b744442116eb652ea21c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a87993e7b7682d7183f5f1ee6c09c5
SHA13b1ef3dfd912ba544ceef26e02d6cb7f2593891f
SHA2563ec11ae1785373c9e96574b08239983be55a11b03fbf5325fdac64d3f4daea8b
SHA512a76a1577e8770f87db8f72ef5440b4b7b396b091864d7ed0adf44295d3b1ac634d19e70d5e952b2134b9fb82bcec9bd343654a0cc264f2136e47c4d2031645ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53187b549839a32137fc2e524dcb8a756
SHA14d3104a4f97a9376b6da5a60600664d8d0d0e126
SHA2562958c770a5ab2bbd50d7798962b72d69ff9eed5d70a86d2c5605c1c2f550a7d7
SHA5125c2c30995c2d28cab2a33521786fdfaf2df2439121cddbeb5b07828a81545f056aeb4f9456f543557ee40d5acdf3d2b62420cccd3eb459f4abe0f40ed9c31083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6a39f27f2c6941930d13122bd8f4fd
SHA1411b85409f3644abe3d196952b3a2d18ddedbb74
SHA256ee91a0fb47babf504e6d39cf48a8b1683353f566a2fa2681b807b093efe0ecd6
SHA5123ba20133bc5aa056a2ae42c9e720c3d7a6e5d2d4e539f3c5650ec98a83fb89da540803bca4c3d781f947786a1db07e09183d6f31db9cf27a53f7ae2de621e4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bd3e5eb143be64eb04676b9f9c44e7
SHA1747b130dcec1d2f004888feb3a749a023d3ef0e0
SHA256cf8f93e6862af586f1f903c64e8e83c2a369095d312edd0ada9343da967dad5e
SHA51249c5db545432cb19ad7790c04dc738426bb6da1a43b60b19bb3cd8ac2d246f062f847db440e9e64043c3e15776f793ec5a5d9eeab036948b1f12e6fda22ff4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a3fe3a642263c28275b54d547a694a
SHA15ba0dcf1e9f3088b20b8e5e56dc9399ed074fca7
SHA2565c2e02055670fa738790a95049a5932a73de4942df0a00db1f9600693e5adf23
SHA512dac770ed4a8d7280ffb5a821833cca6294f724d4a068190bb65199b5bb1aad167142b24a99a743598a83f36bf170a61c294da1e20b37eef6cb35c04cdcf8ab70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5cc3f6e2ce5943c051893d3f576e36
SHA10ee25d50023aeb6f703e700c053f6fedd1526d99
SHA2562568d68f68280b0eba4857e86d780701aa8866ba50b8013483afa4dd1a888f96
SHA5121c29633aeb386b5a0d5b1046932189c00b7ea4717f7ec5b0da7d64540582c5f6e79b1f5b47817c169da77106ac4eafc8745d2752a40fc945dbe652efe7ab3dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b8c65879a6681f7fb1c67dee97f7de33
SHA15b0272990de04d707b46eec2914a5f6bf17492b1
SHA256dbd15f926a9c7b4f8e6ce6eca98aeeff32919c3ed6d6953f8cceb0f9af98e3f9
SHA5126677e9d58bb4348df87aed960359aae333551940d5ec7eb76126617e001a5e752d556a05468f458ea1594a1cc0fe5089f8bada311552df21368220c3b4b5efd6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\maia[1].css
Filesize42KB
MD59e914fd11c5238c50eba741a873f0896
SHA1950316ffef900ceecca4cf847c9a8c14231271da
SHA2568684a32d1a10d050a26fc33192edf427a5f0c6874c590a68d77ae6e0d186bd8a
SHA512362b96b27d3286396f53ece74b1685fa915fc9a73e83f28e782b3f6a2b9f851ba9e37d79d93bd97ab7b3dc3c2d9b66b5e8f81151c8b65a17f4483e1484428e5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\wCSS[1].css
Filesize5KB
MD5d45a8ab0f958dda5cb5ff316f23c6b7f
SHA13ff08b3dc06ddfd9084dccececc1cfeea41a7cac
SHA256db6982dc7fd31db0d9511d7782216eadf36bbb8c50c1bf7730c79e79f0ffdbb3
SHA512794dea38d69f5160aa62a2b51c8cb5a297fb9988ed7c5b5848700714cb5a33c581d42d7100b59c5100116bcd99e1bb11bf0530cda96edef89d756eb356a5f774
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b