Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
8545d89c96a4788148bf5ce4c3a586a5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8545d89c96a4788148bf5ce4c3a586a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8545d89c96a4788148bf5ce4c3a586a5_JaffaCakes118.html
-
Size
4KB
-
MD5
8545d89c96a4788148bf5ce4c3a586a5
-
SHA1
67e10c58ace194f9083872bc59c40d8e27e8c12a
-
SHA256
a00baca8fec8905a557724c4d6b6a8d0f8a46f236e9fc42bc41ae5824a416080
-
SHA512
c281dd2def6c0ba7e0d8c58e124782cb9d8d427b72820a0dcfa172ea2b7de1177316142c843f89bb4639ca6d92376270a7c4d921e78cc2d98c6dee561f3a6952
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAadKPDJ:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001867790b8177ff8e36c7ab93ae21ecde22df4641e98988fd4f6f12d976d19fdc000000000e80000000020000200000003dbc7e1caaade36df16757be94c041c16a97d8b3a325087dde3c676aa7974f329000000067b9d9cf81d938f2c50d27b4ab7a536333d2f0f4c8d24c77381038b78c985e172644e77c8c825bd4243193965c1c2fab86f7e666321b7d279dc0a0842cadc480cb0dfbf0bb18dfb46a92e308a409a3c1493b70f768056d9648472e1cd16b1e3a899f7c40e02ef3ec7897f018438e61035b92d218e744ea6a01cdddd92e681cb83b1b33144dd40a22c39513c454ba07fc4000000018ee26cb6c688ca95c347f252d477254fe9706cc2afc26d305b5b48ee3a81dd00e947fd8545368fcc3cf7f24c6675832268f1a6871f97e27c1b66742e3a16c96 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{377537D1-1EDC-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fa080ce9b2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423273531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000340325be4afe7700a49a6fd8890bf18aab038e6ed026e148d731e596325e96a0000000000e8000000002000020000000f2505d4f45187b584f331763023640e1ed3e6d56eb34afb9d5d64bed6ca5bd9d20000000ed75164241187ea8a7076060d2e090085d321a8e2fd268296ac89ddb7c6fcaf24000000044713076bf8b9fc96f7ed3b4f699d409ede281763c0ee055d0671899d7dd9e64f2981dbf148734f8150a14982b9b6349cbb5d5530dc35ce0148cf837395cda2a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2028 2928 iexplore.exe 28 PID 2928 wrote to memory of 2028 2928 iexplore.exe 28 PID 2928 wrote to memory of 2028 2928 iexplore.exe 28 PID 2928 wrote to memory of 2028 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8545d89c96a4788148bf5ce4c3a586a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc0c540b97e869d3832ebc87c44bc65
SHA1524908221b1ac5f775d4769f2876f3c4e2e8d20e
SHA256b5390c799de27a68d608a1467b2c20d72b4a7498caaf0a63a835d6a813fb0f66
SHA5120ab78a388022772fe26cc66de6e07937488ee108fc6dc660b053ba44e4edf75bf4407d55fd55d03786de00c39ac34177363918ee24113b1ffcd2a8f221b28e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98ecbbf4b13d2ec3f7635c303733a7c
SHA1aabe7bacb800b11b5c57c09b180a02c181a17c8e
SHA256332ccd0aad51d31585b1f2df477671db83a1008f663049d1884d0ec74a0cfca9
SHA512e184c8960bd313fc9ea532ec468927f2b01ee46b699f8791c60669064a58cb1689bd852679e615acc5cc9dd9e9dcdf34541e8f298a37c627ce402fcf4c1c65f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af196315ae0e4cb7f630cfd51785385a
SHA15267439b0a1d99b0440abe871aeb3da41db1f62a
SHA256d56fedd0b4f13c1ec4874437b2b0305f184cb7664577a94dc01ad121c15ed64e
SHA51279bb785968646cffa24bf55b467acbc871b1679f5bf8980897d3399e22153d999f657801514653e66078231f63ffc52fb518539265e4dbebd1a230323102b160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfba14b7f4b35b681b84fdafb946dabf
SHA1067865c683ba5873d9ec204f52b9b4319987139b
SHA256b8efb679b41706cafe1307c9a4be9f272b8f6217c76ab965e2d187d8f268b3d4
SHA5127f85e1dfa2d4cf22d45a5d1e108575cf9185e878c5bc2c7f6c16b4b996fd0b11ad00d3c2ee21246b63dafafdbdf6d52db36aebd032c957364adfbbbe5a0eadc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b37709359e492aaf197dd26512be7d4
SHA1e76c75900f95f3d981363148d12099399dedf9cf
SHA256b08f41c9164cd85c51bf484afe0724ae6f0e36973ee047ed39c794e27294df42
SHA512a74cc9c549cd3dd3dcf8f12e5958a89b6ee1a957dd212870c5298b1dff8dbd0c493208eb2c5c3f290c05597f523bef4de61d3cb5586e3457d182b84083f165bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d70b5bc524d664aa26b122f7c4aff0b
SHA11693032ed22a644ac558a5cef4fb15cddc9926ca
SHA256d1ddfb8bea2d4bc7abdb569946b954fb102283a4ddbb6c0a7b56de50434a3f8d
SHA51243ba0deec04f23374983110b1e3244c1a05aa396a459f8cd7271a36ca5121dd034f81561be4d6289227a8c40538dcedfc38c58ebbda2589061808594cb490e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57806cc958ffe0e03621cdb27db77a4b9
SHA1d261f1c17dd074572165e088b354cfa21da571ef
SHA256d9bb8fd7c3d72316c2e4e36fafffd0a8ea97bb13ad8a1da94e9637fa3ff81388
SHA512e8394a9fb16127e934a35a2ad1468c90eba8fcc0bb77a0a6ac2c8c249f0f20778131b391abb083c6c4bddf1dc0bd823dee822fd1a55a735272618ce9c62ecb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b58d85fa6d24f783a2655a6cf2a0495
SHA14f86f7a3babc452d47f7128c01a9130ec2e40d45
SHA256c1d5d8102bafb2701ee57d1cfe64e5083ff0854c80164f6838d159ddaba8a15a
SHA5126402b212547da715cb894b9d0653f41c04de31d30b08b5983df2916e93b6bbd721d42151ad4000de365007d8e37927a6d61c06def2fe037555bd36b7f100e90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65a26a661ccd5080cc0ccf1b939bd89
SHA1addbc39aa3922c86205df9e065bae4695bfef0f9
SHA256267585c9f0cc9cb6043770f0a5f624cac8417f204c5fc0c7721545e7cc48b0f8
SHA512fb277ec0b31b20b852bdc202d43f8ef766abdcfe196a937cea01db4c92505012b17002f3ab42650c077add06c1af83fc19ac55cbe7131feb9a46806420ed370a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503385023e3e99d35ec5240d2cca61829
SHA1d4bc1d4ad08beac90997809f1cb36c7ce819ac97
SHA256bb087bc349543c8eb10064d86fb067cb862356057e4b213106a25dc7e631413f
SHA51273c1d23d417eeeaf22d36722226b3ea903b0bbd79045bf95ad09ec0ddbae2951a4ed94303656b6c80addb341ea0f39626c7da1b931054217709d80510196ed5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd4792c94749a195786bde971ad1573
SHA1a035596b67bc010a70ac299cb3942d199ce7d317
SHA2567d8c9178e751de26e28163572cd213181e15325b58a515c2246bd31fef6f6750
SHA512339a7f556c337254c7047241a28061b2f2d37d92a970f5023791f1ce9a5dc38347f9fbaae3d6d4679c5c3d4fdf86485a7b5737c2f95e87e9b5742c38454ccce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494fbac3f7ad6cd0446efc33d7f04f3b
SHA1b1620d466a96e0347e6fc554caf201880fb7e07d
SHA256d28484651720048d22b8e132fcb40c762c5e371da0440931fc0d79fc41b07c0b
SHA512f06713a067e33133f2219dbb73b586e16200eadaca37db6ee7925b0442fb778bb21e9d3b664e57c58cc4b5a34510dd00dac0418930105a8923486ba43c8a058b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898b173ea0da6d94bbbed69dd42d475a
SHA17507084e8411f6194b4951758e83140cd25ac16f
SHA256faa267126077f737be6c456f37017f3ce2bf1087d5df11395100ee7e38afa74f
SHA512acc7d367d2ecfc0e0765b406379152503784140b6201832941403ed636042ea54727ea07dea89843bf27db3b066e7b70b0918106a077055277f6d7188ecc2ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b926c01b419bbeea6360afb484b3e76
SHA1290fa7862e8dda3b1854c661005134f861dd1427
SHA256ed225a76b4d337e24b869b9276fa013ee3bab90568e7ceb2c6e2ea279b69de16
SHA512570c0091ea4ffd3a8f0154489b4bd8b2b1cd43ccc2e08de788e979bf18d4639aab5ca8e579849b85fc4177198bbe7ebd9578a9ed514d6ec871be330563af28e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676d77559733c97cb0a8b088325901c8
SHA1c4dcbeffd85599e49212a654eb6890247c769bf5
SHA256846970f15721e9bdaa15255065acd7063cf6643ebc3124cb2d092cca6bcdcb34
SHA512567f9ea6e1ce3436528a0c2edf5cb2acccab6cde89237fde81ef313a72180e40b47536c7f1e5eef9ce4b89f051b7fa573ddab30f5d1290f3694ebea49ddd49e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf700e838c08218bddfa29af120fe260
SHA130116e4b9af63207d0ce7f5471e706c7bd3f2ede
SHA256ff2d42599648100f7159ea7a33cd1924c29b762bf5a1a0301a64bc99102feaed
SHA5125298e53e7d3ffeef52164b6ce726a851a036fb7f9a477c7741e2bc0bdd4bb3000a1177bab1cd6f63ded34669a090c7e75404c3c53d16301f59f2d3f16a64c970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f3c1e699f46ad7ceb59ba6acdd67d2
SHA1541c95d72c544af1dbe94739777967adc1ce1e6f
SHA256d5aaab2fd464fc1b9065ea447d1860e2966760a60c57aa02b239cfba12a4474d
SHA51242ce2b6d732b5326a0504e4ed0ee9b3b2eb38a725ec57a2bcf69f18b1ea3494bc97aa0262fdb859f2d068dcb764fc3def8faccc5ab8b86b2c9d5f9468e357655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633544fc1428eb4a6b1f1a0c83c78649
SHA15b2a415cceb3479c170f1ec749e2a4cf14b0f587
SHA25690f624e4436ffc2aaf24c1f60ea49e722a9129f0923e0cd9e542fc1a15fe0479
SHA5128a4f7259406272304ee09de3b62be3e0401e4725e4f92c9836c5454c510f6243a1738364aa34a7ad80d7dfdfc4e128ec3fee8f2ed723623f7dea573d4e1db93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1a6f6c87a85c69ea0f69a18d7c6f0b
SHA17322e87b0aca3f0f7023735f86a37a2a816d0211
SHA2565f44eba45b10818d6bd8c1c1ecb5686f16c82097f634e2116d8ff01ab5aef6a0
SHA512b902ee7fd937a17059f3933a13d962bb8a9a826e89b346540bec54621f1870adf45b118307341b2c915bd7cc44cf5e39756895ab7b6b46bd5bf61dd922410b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8d008059f7c99dfb5a684707dff210
SHA11cbb525fd28a0af96b890595792631597fcca032
SHA256593b4a348493d04b935c5a5e0ffda0406067005ca235649dc132ca0e2d7c8c43
SHA512af33afd87ec3b6f422f015a0a11e3d8c87163cff650060266661093e625b40f2bbfce6b581f72cd31ffac3109b8760bed27d2e9abf807e0a616860c4d6ad68ca
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b