Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
7e7ebc77681604fdb19f26c598cfdf85_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7e7ebc77681604fdb19f26c598cfdf85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7e7ebc77681604fdb19f26c598cfdf85_JaffaCakes118.html
-
Size
102KB
-
MD5
7e7ebc77681604fdb19f26c598cfdf85
-
SHA1
87e6b2c65b4f0baeb2372c098a74f726eca96fcf
-
SHA256
e27a18e94f1ec0bfacb63de18d5df673d1f13e16db2575319046d3f2a71e4bdc
-
SHA512
f6602e0c46fdf983544fcf2a4ba37995b6d098b36ed8f0ae359697d2230219d183b4c6b08fc54860e0a5bce67003103839be664114b81829602510cec8a605e8
-
SSDEEP
1536:/ggvqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZL:/ggspD6VxM
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d223f468b341d1458d8482f3176c330100000000020000000000106600000001000020000000d6e4b0182df65619d9ff726899ac3360be0b952e82b5fd2c1cb501e26971f6ef000000000e800000000200002000000027da723a1bcf54d3cd1b425de2ae20c0ecd5aa38f70ab5e7acdd9584ec56866720000000c5477acc98b5b9084404b64d4b5bb6f09e44e68fcf31a2cbf7862d7cf97df792400000003b467c0be2f02128838fa35b81a7ec023a074c14218d709426541cb8102c877c55c11fc9f01866ff7b61d7569725162544bf699d15ad9de6a5a0851ca343a897 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d223f468b341d1458d8482f3176c33010000000002000000000010660000000100002000000012a28508b58ded15e737a2462413c85af70a66030802d19b7c6374f5ffd49ced000000000e8000000002000020000000881ae86dc9d358f689d0e76aea56f7f304974f2a3c8d460bc075a37b5d4e37099000000098ee335df220386274c70d1200cd6e7309d273594e1dc5d406a39dca3dee7e047685eb180ba30ab4685bc831a8437548baa977ae2e91ff684c9db066576af0f57ecccffd8d3ed12ec4ba5a7c94eaf070f0daa2c86b72d319e8a574aaefab4f60572907120b8a119be104f54e7f60ec90275163620675faaa162e3ed1c63eb89883810b54fd96834a86159c95095901b340000000d93434ccbdf1a49a47887c3ef55f5cf21a75ee97475bf543a217723f537731878776ce6c881dbc38c378d30e95f351da24fa67c4df32b4d4372728300670c9fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE4B3101-1D3A-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423094336" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3097a6d547b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 iexplore.exe 2832 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1504 2832 iexplore.exe 28 PID 2832 wrote to memory of 1504 2832 iexplore.exe 28 PID 2832 wrote to memory of 1504 2832 iexplore.exe 28 PID 2832 wrote to memory of 1504 2832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e7ebc77681604fdb19f26c598cfdf85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad6ff4bf1212396579ff8ed3fc25148
SHA1ac4d0f1bd72b5f79414c358f63757a3098b71012
SHA2565c9608c89e28ada317be60db8875c71225f2cc4d411dea8d2cf1d9bd6e1a0cac
SHA5120fc1144a181696937ecce6e120ae58ab2460519a580d11b49e1e4c93cb307f4aa1a4bdf946193ffc9201e93d7288d8b131ea8d278c76cecb426a8d69c085f561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffe02180336f068de6a496e5261df78
SHA1a244951b0a67251a48bd1500fe73fde275ef35a0
SHA25649b3d8d1ff13ff066327aeb7cd6c807612b1c0e8051f119e9812a2882a372032
SHA512468148ccc9a84ee26987f845e78491a7a82f76bfa369b34e416bec81bddab035f0901e4260b1e51223a06fcc4ec8990efc13678a77b92efd50f2f46b984c8149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc2846e37e5a0f3eacd8a89c64a2958
SHA1b1d16c13347a23fe1e4a617e892bbd92254e0bda
SHA25623aaf0dc44bc973cd4d21ee4e21de6182ee067577aa880e7a584954801135a28
SHA512f5b0724bb35c7cbde0c40adc4746056d13e907292ce640940505a98759b64609ff489a188ead3aa63ebed41b2211372c4c2457c10b97cdbc154259a0841e1cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532026db882ccec7a89d6c5ddaa7e6616
SHA166a4700c50691e838767a85eb5475a72c0edde5f
SHA256e8c88eac4f2a1386e37a6d8d8a3d5cfee5bbe9a5e73115851f789567a754d0fe
SHA5120ac591ca6f55fdd4b65bd518db511e277ba271e330f87b07728a5612e13eaff0d2c39a47c7b9390a8eab3d9656022b65ab16740a4591eb280e8fcc088e54b2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4d4c8c58649c729fb19ea096bfeadb
SHA1e7c5e47781ecabdb339164735fd4c12d430800a6
SHA256d2a3589d3ad37e7d57c47aab5c7780502ea3c329ac5ea6ed02ff57a4b983dc76
SHA512eaad7403e14c5d3f1ebaad2fd23b15eb60085f677f08b54dd6c15b5d3d8c9b8f79a491a5a59fc0cf0daea77d3f2a97729a477574b04c069dc67ccc2110f1f23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eaaf9042b4db0b09a5be07d0477aab7
SHA124fb4f0ac8fd6211caaa1977e28ad6bfba853dee
SHA256fb3f411927dfc8a2043bb04c32766b710bdfe1a391b2221ad94c0935e174752c
SHA5123ebdf39e7849eb76e3a9c5f12bb0260fa13f645ace36cdac8cb4590aab6a91f55897e2d0a2649e3d24dcc52a4177a14c80618152e31b0c787d5e339187549560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c4e753e621adf856fea7ff17c34c55
SHA1750ec649696d5afd8b41ef9efec20d9b83d4a2c0
SHA256330d779e96bf753c93651e4d63088088c815271e4e9cfbd176b99270f91b5b94
SHA512c8661e914407854b625dc271b2d89e4b773b5aba42e28381baa907580877baea9dd17f5a08b7b178b1406c625bbf88e8d1f2e019b7c4783d80dd4de2b4a87fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e6caace1ab182c6e68549687ece11e
SHA1d71cf50acfc4acc5f528a844dfef739ff99d556f
SHA256321d3033ea11270736dbe83885366a4c95b8365626aaf6475a0b6bc69a207104
SHA512078eded74d9b391b03da7d780921eee0fdb31b3969d288cb61ef863bdd02e694f3e1882212d9406a5a4cb61417ceaac30e3eb4cf620010c8dc44004ba05592b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a493d62636cbffcb9a193e1a1d00aef
SHA1b95d47f014d16ee17bb3fce80cdd46c43bfba0c4
SHA256210117f46cf3dbb0e59ce5a071547d3918aad092c05d6004cb83b2e9f8666fdf
SHA51202a8b157c8af11f9e4a3fe2cbbd6c9c46fc71fb8b0fe723d6e4201755a559584b4ce7a0f3801da3cb98123112cfb66ac3e88b5db407b4d625d52eb4b0f2f34ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516f6f967220c75dd68fc0c250c7983e
SHA1b52a265c8a4ff07883ccbf38a5b105f249e0f3cd
SHA256d6e7b75f6da728ca770d311c2fd402bd08ebdb6d10d8c1ea44e4f58bc815eee6
SHA5129e6d56a327f98bec927326e91c0de4174f5b2c13d9c2ea0ffecd254ae0ef1122588e9b9972475cf731ee1aaeafa2c613a90d2e260d4d58676b9108fc9980e49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec2fb238b1b8c21e020616681b52d15
SHA1f7c56ddbbacb80f8a4e5e99c14672c43ddddbce5
SHA2562c508c5531da4044a65f7c1ac7e355a8f0666d6b933beb907cd0ac99b035fd0b
SHA5127f62c3af9fb52b93362b1e9b9cec1f0fee20234c638ca3b22ca4cf8a2773047209faf329202bf8999b673b2a4f47cf8e4072dd213bd5b7a854f3a9d297b44ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e420c19b01c2bb377271863ff00c4a2
SHA1655ee57288143493c58b6dfc18142433b9cac266
SHA25659a34438d2da2e8e9aa34cd280805810ec5894619c36e8eed91b2f384e8227ab
SHA51242b70cb174bec7c5c1c36fa68b04e13ee98c99802a51ec44fa4e86ecb1479d26d21fbaa84450f15a4574d8ed9103a9d7aa70b4c2fefaeac02dbb77a6df093f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524a313863911d01da9fa2076090f48d
SHA13d69cb77855d06b1b8dddf380aac3ce82110b96b
SHA256c3d2fa2c63360461da1275940a450a7c6f219ae4714cf3ec8b0304a240bf335f
SHA512ae2e5a70613f4d3e923b786c6084ee3a3d60efcc2a46cb34d9995ac1e16f42d57bda7cee670b7570e07d870289abb8bec4a470de0ecb5fc2c97ae6012e9628db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55075da6824f10dd2849f18f2f5eb875c
SHA1abdff2321b89642755beeaa83a6ba33d1df3d2f6
SHA2560899b839c49bbc2ac8faa3e98d8512872a05be94152aadfb0a8d73b47d3e423f
SHA51274b342057bd4ef6fa2d60f4247fd5ff0125b6b10db643d7ba754102b15b1b8bd99de71161729c2df405ef87bdd40c8fe57f19153fe4c70e77c9b222b99419005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b794c930c796749371591cd3f81f879b
SHA1908e0160ef33998588c0e38c7b4698c49b9e7b20
SHA2563b9f933de2b70334191162f44369fed9e79fa0608373772970a50d95c7971bd0
SHA5127af8ec0b7b8fc73b47b727fc07607f5161f9af23780f48c559dcaeb41e9589185c2829012e7bff7bd20cd02167361357ebb0ad02e0a63285a1e07029ec03cba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51369d1f5c7b0e20dfb647c4b946a1669
SHA10176cf0fe983c313d60f314f363dd2d146dd2ef9
SHA2561a4c3674c9a3654ed007249aa92a1038832d2078d1300c7b11b2f2d661128af7
SHA5127962b5346be000d6465e6ad7cd20e81602fefad46892e67c9041b805b1b1a2f1bd4255cf0f6ccda69e10a423505b22ee00b9387a6a2c636f5afe7c0ed614bc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4340c7e94707013609415234cf26c74
SHA17cf865527fab4bfd90405b60b3e76610acf33b76
SHA256a30dd42482999af98971e800286a962932502f02d89633059e8a53c383d12fbc
SHA512261e0eca641bb0ca55fc67d537a8b7052feedcc97d51f2068d1b42417f5c5b7e8ee337141ab3951a376ec862ce3b196c1e2048d2d60db3ac1d0e43fbea29128e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccae5e7b16b016964b1c1500e3cd2a6e
SHA110ac746ca3d9aac1615b72fc4fbf32ed390ee46c
SHA2561f95df1cbedf8aed104d328d8a4df65f9dc8cab12f216a12f7365b61719bcf0b
SHA512cd2c8948760ff576dcfc6f69c4fe6fce6893dd9c16e29c847f889cf803e680aceab722b41008a85974e2263d6e3d0fc3b14c926efaaddc0599b2eedb792ee4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65b2d3fa2fca49db3b71683abe9765a
SHA1db270d2000b17058f59268431742a80ba8f349a7
SHA2569db49ac42b624f7de30090a71cd6441a5d6bb3b4db22bbbb6fba0f06732b5c1e
SHA5127fdd2eb569f6b33b45fdb507cea386f3d33798b3ee5c2e859d052dfbe8b4920c5e67eaefadbc91ea3ab40cc5bfff24187ed236d37b0d5986ed7723f66e7bbd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4da5e5b991f730c063852cb6151d957
SHA1eee53aabd757126c08777018086e4b69f3b2a1a9
SHA25604626dd16832c70a53942f4f0e0f5a3fd62476621eb54b3d3d3c6da2f45b1cce
SHA512e6c32da78e0bb8178e68719671f03410d07e6247b9e60e48b8080f6e15fced3d2c5ce8509da68d4c4e6dd418a9fb67c95bb085d394a0122d17c1880444291edb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b