Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
96af229c1322259aa14c077042cda4ee_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
96af229c1322259aa14c077042cda4ee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
96af229c1322259aa14c077042cda4ee_JaffaCakes118.html
-
Size
3KB
-
MD5
96af229c1322259aa14c077042cda4ee
-
SHA1
e7162cec08469e84f0f9e4618fc2d6c168220ce3
-
SHA256
f7d6fb0e1a48cfd1f38573ded60c5d85396a324f8600d844237e89148cf0b31e
-
SHA512
7eff06f8b3bb761d49e4b082f1dfdfba9b50a59eae0169cac370d5318b9c37126b60ab9fac5b48ae906795c0098f4a8fd4628748fa572caf9c36a59afcbfda21
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7C41491-22CD-11EF-8C71-D684AC6A5058} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423707189" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e96abcdab6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003f6a30e58d44c2f984b7181e914a1d4429e8286fe6de49059d8c2e6aa4b2b3a0000000000e8000000002000020000000884e9103c490b9a841f5d92b074da6f4a0a4a9c6c48dd882ae6ffb7f2d45f3dc200000006b8a394166d1244649979937ef6dd888177e4d2263dd2cdac01c01d9848f620e40000000defcae35099b582757924a3aa15b1e147f986c0c47537215fe5d088d36bfd30c9ac6eed29f09c24c8340699c626287e1694c74eb12d7ca2795bdeec5ad219e12 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000024585e57a002b29bc92a3c6de8393a559cb924a15ce6dee15fdf5d4b9c64524b000000000e80000000020000200000005c2d6fc076fb4ebf11d4fb85c4b04e225827de5f255fac7d2de31a376cb5b508900000000fc7d8e6d17ff0659db8649382ec9999f77b8b18d6298518260c43b7d39057a7eaef4f8a95756d3ecaa460d9961fa6b5303bb702e94583c3e9f3d7c60900ee4108af931612d7c576aa4b884e225480cd1e4874202d0006e9ed515657dc88d265df9c7fc10bb8318eb799b5d38eee51a77a8cfaee8f3d37dcbdba97bdab9269bf2129e4c3932633139340061641da670d40000000fbb06765deb99c7750f8998226d5c1c9846a5f89e1c4f68be31c3e05fdd829f63370c84077fa0d437423d39d0e69ffb3325e4bf234f499bcfe93154ebd3108a6 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 108 iexplore.exe 108 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 108 wrote to memory of 2916 108 iexplore.exe 28 PID 108 wrote to memory of 2916 108 iexplore.exe 28 PID 108 wrote to memory of 2916 108 iexplore.exe 28 PID 108 wrote to memory of 2916 108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96af229c1322259aa14c077042cda4ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca14f24a77bafad3d1cffc417d2bcc0
SHA160406878472cadb1f8073b5944961fd15f94b145
SHA25681fb14949da77d5529388e6af6a4520e9fe65ab6ba7ade8427b3ab9833a6dcb0
SHA51249a7336201ccdbfe928c4114744f424fbe138155d994b67642c1a9460706e4b2c619103baf46b18f59911b165397ae1d90fb067b09cd928c975ef33e83f02862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57967ffa2f21b5289ae117c2ddad35171
SHA152fdb1e40790f518e808584016e92006299c0d2e
SHA2566ba26ce692156339b4aded1b0ee3a1088246a67d953a4ffaa7df0887117fd1c7
SHA512fecce6f465fb8ad163e07f4f210cd711c8c9976c20f4d4aff9ec9a414828e9da82582b010c60216554a2965fb2bd0ec4669b0a2329719489cee3851cd5f60d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b5a503abdb548b0034488194637688
SHA121b15ad15f8f1d62d86b03e9ccb2412c225d1b2f
SHA2561648115195c6781eba96101f88938e19f6defca3abd92b96f87b4b3e066464e3
SHA512ee102101ea62fa08d899919b2b53a1a152746274a8c3dfeef0e287c5777eb30227d30fc731ea3c376bd98d5fb1346a1d83952f3653da2fa873365245f6d91abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a180779566e869f5afacb8701dad8c
SHA1ba8c6588baa7428aa0949a5d09367147fca12f93
SHA2563361fc273207eaea86672270fe48c58f774ead00d302dcefae947b22866920bd
SHA512b884cd93131878acd5f04a4ed6c04049ac00110823c56d447ef3cb93fda3150e03fd9b45c12d636a0d1fa6e1fb39fd4853511a2d55a4b1147a36eda9380f6aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526592b57ff11848df3f1148b65df6e49
SHA1dcee896ac97e220746459c2149128f8fe8fefe0a
SHA2568159afa3b89c8800257878d6def1ae9ab527ea07e546ba8b8b26e6e95ce568eb
SHA5125fba0d09618cd21241bbea4ccdddbcdfca06957b6acd5253a5dab7a31a8a07fa09a202443c0ee07b513efa08d391a05b5d96268cc6dbb50166e53d99baaac3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0dfbb70539d2cf18a909977890c473
SHA1d843081b09d7ab8519a8aa14efa284508698c750
SHA25602a930b92fc9ea66ed7b545d938ffd766593aa3a0ea5bb741abecc5a39b32a0a
SHA51268d4e8878822eff4fac4922886b24397d0ef7d524734d47f17fac03976dde2dcd0fcb3d3c2786f544904acc967f65513c7baa9fcc2876f55283efdf968e23b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bccf8b786f484ef82854ae0f4c16657
SHA1f9bf048bf7efd5faa448f4657bed5ad940de4abf
SHA256b6e3335118f41cf2f1c075621ccdd7651060b644711ecfd404d4c59fe6370e50
SHA512ba202c730c2795024d428c3e4d462da96993f1fbabf77b3eb8c42ea8fc2316a7789f2b95354f437e3f2d937504c17333960c58034123cd3eb5a7e97a43c2eb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5505fc9016047d0aa7445b8f7047c5
SHA1b86a5f7e04d050341628919725f1157f212144df
SHA256dcf62d9ce64d63b488b46323b2e69c81bb99f89f842b9207a38636236b8beeac
SHA51213da4f4354bd79777e898e486cf36638a4f7902d5a71782a8e3efb4b60a9f3c3f33c09af0f0df6fdc5126194883d4cceb47be1acdd7fad3a924b31974e8fb498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50194921a89e4216b18d446de302aafe2
SHA123bffd78e055f1f009c05b4a9592587b4afebca3
SHA256f86b092d2bba41cb303f6bb6f11e8b2c646d53c774dcc3ff7673be9779696853
SHA5127112be6131a335329c76aa24dee9358bbe69e5d14793da9d2f745e95de7b61546bff2624f165a642892332a21b9206e7a7cf4d40379b385f0a77df49272f1dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6b16282bc9f7052b3e180b8a16008c
SHA1e9ea40c926d93f9bc871c92a11df050de39c648a
SHA256724429f6a6fbb290cdef19931b3794d1e7e7cc25fc8f0f2d5754df4101826df6
SHA5129a635bb3c06abb51bf623d135eae08deaec8e00411adbee23439e47e4944a6098905e6efaa9f59fec75a587f0c93e154af9e5da36e8cb883c2bf3b357f08bd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d27b5390935061125088f488d942e69
SHA183d2aaa42a5108b18289c9c2123eae156e6cc14f
SHA2564d3356c5228e5f5a6eeea3085a7e7c792c89eaa64a2fc4e507510fd9f643611f
SHA512a0fd5c6924505e2828b8cef27f33f88deb3a96c136000ad0471a9d18ad9236ab412f6dc33890861fe571171cfb0b55c3d1cdf4f1edc966a3e7a099863f48dc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19d865535a8bbedec79128fffdc8a42
SHA16204d245a1d1eb94db26f5653c9ae97eebbb651a
SHA2561b4e8e18c23d7e69ea36c6f1c96fb722e27c7d27b1e011d1c8355cc604ef4b06
SHA5124c6164bce4e9e97ee553011966b2c347f6069e7a2eeaa21e7a00123ff9905e3e92886079112043cb1df6dce835c864f8a402cb2a5051616b9323fba70087ea92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6c2a2e84414261d02edf3a2dd37a08
SHA1c9f9cbaa9f95a59b759bdfd02b817d9ab45da992
SHA256ccf4687938a546151f1cf606ac5f344dae0899b019a2f37040e90c51af3cdbb5
SHA5121e03fa3df3b9dd01793621d03ea1103c9d59d1d28a02db2165b115a798b60c270a5e16d4ad914e8f63665d0cee1f760435d79862dbb8dad612e5b2c6798b503d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539fb892b7c3d89949af5bb24bd6e528
SHA17226c6c2713a6cbd4f943e3dce83cb3179f5cbf1
SHA2560b1bea8c810898a7746b74e2f00c66c2d2cbef23621e2a773b41cebc24849546
SHA5129057fc6ff194c88ac803e2f4d9d8e25172d5fe3b3b589c201e605dbe504ac69faad24815563d795f5a4d2873a3b7c1f59affc053c096259dbcc48c8775976d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06a8f6a80dec726af346bdcf06f460c
SHA132d6adbad25f9d3410bafb6c2c7529a755ff0ed1
SHA256c36c6796ccfcff91fe372a07edde8766529b56fe2ecee803eff79c663d6ac8f3
SHA5126d3941a7774f16044ae25b7750e87b255aab62646d12cebf66fa7175edcec28a70e721929aac35e3df4f42274fe4f4740938255841e588a72b139aef5eb023d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9db12680e4f2ff6f38670e07104e8c
SHA17affb4f4a47897b4b9039cefd3cb7c11285dbbd3
SHA256fe6511108a2568ece0de58852b2d2100ede8475fa3e1d9a3285fce466c64b929
SHA51264b966fe30a29d969e00c873c1e5c269fd19ffc3c9e477aab8fa9b4dae68e8631ab277dea7be94c6495c9540806ddd0c817a679beb62cc0c9403a590245bab09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583053406304ae2a094538f7fd8a30f1c
SHA12d507c2a18bb14067cc582854cd6f5a3f4696376
SHA25646b0834e18a64365146a150aab74235931b3f2aa00c828f01880663a46df1d78
SHA5123450ecc4090e3f32a6077fbaa48fb67f6893b07fd50e09d7de4f0f2fbbef9f884d35ee1c92905f416c4063ab5906ec3dbf01950de07ec78a7cf1d3d172c79bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c713bb53b31e2e5bc6cc8c0f4b2aad4f
SHA1b5b4c6fa6de7efc87e2ec7b8d2254e103657dcd6
SHA256fd084b26fb5543fcfed0d555e6ce55f99be5540694a0edd2f2753ea8a61592d0
SHA512c086d95483016676f84e0770c8a60e83ba8189c6f9a7febd3f11500021db09c3f7a073a65385cf4d5fef06324650cd322d6d8fcb7547cf1a4010737eb409c606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955d0ca55a5732f08e23d8a0a6a07319
SHA1d40edeeee6b45356189899b901b0a92ca5f48e83
SHA256bfe95b00db11cc201c588024d55047715f0a1ba7e2ba66429b04ef037bb71b1e
SHA51236d495981b1dce2b5e795a36aa225c751f4995c1ae69442d981fd21eb70cfa124a54fab338d80256fdaac3a2d623f11c16c000d75302e561c77d89428ed0c025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba2610fc2db4c67f4ecfe1b5a96bdf3
SHA1e89bc12a28a2506ec69aa9874e6c5fb443816319
SHA2566c2e8d1aa92e1211d902f23d866f1884afd4d9c36c9b33e98c6c5ff9a6d18f90
SHA512555f6b4c75f04462eb92e8a6d457928c1f38606b5d7b76e2ce642b43878fe495e618d2bd78f3b15e70e3efe339a846e08371d2494a93e6723f75a2069d2da47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7c425ff511f1ea508faaba0dc79742
SHA1b59c64f21a9ff91631ac2685154c4e849fd273ff
SHA256d045a843cd4746ec7d9cb9d39331b4c34247629b3712b749c3dc8bb771dd2a52
SHA5127385259ec0ce324251c1db4c2d4389bea94335a8eb29abcb502551b7bef703b3915581cedaae0ed281b059ce61b4fb64bfae155644551973d33080a18d2f19a7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b