Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
98bf1f0ce2827b4fdd6f0785573ec17c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
98bf1f0ce2827b4fdd6f0785573ec17c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98bf1f0ce2827b4fdd6f0785573ec17c_JaffaCakes118.html
-
Size
94KB
-
MD5
98bf1f0ce2827b4fdd6f0785573ec17c
-
SHA1
12b5f2ade533a8f4332a5d50958b7c578b646130
-
SHA256
1d975b2f70a4808ae0b623e29ab34c46241df6da6d8bee43855fea5eff635484
-
SHA512
2243b3c0c56eb514faa2fbce8fdaba900d359bb0815393014c207c50605e9822628f33d4466e147bd67484a5f5b598ff399710d82ea8a3f61cdf9e92d987de79
-
SSDEEP
1536:WMLiNfg8JhAxxfMz4KkBtWFLK7LvrQtCZyLZbDiBdkrY8mgHC+qpEyW:WAiICuBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0241add6cb7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ef1236f02ddba4895fb16b3c9edd484a46742d6ac71bb4cd278be58f5f3fea17000000000e8000000002000020000000b5eae44356eb62b03f28e2d07f4d3f98e25c7cdd9663ff4e4cdf7d0e665b5ab1900000000faae981f19ef3a01c511614eac5d840a48a7482b5a83194dc614c17c3e97dbc3fd33bc357ae2668609226791e30a76595712cacfc2a48046f83f4e9fbb8054322d4a7d5dd2d2f30187560d5867906cee8a9d00e98af742ceaafe3ab66a6558b28fdfaaf303d2dc1ca03dfc77d8c1d8368d759f2e01399a04676052727d1cedf3d8cd39d32065907325675bef401e71a4000000072a2449edb5ab2f8f3c26acfcfa1c22286cb74bb62c5e7184eeba1de50de3b9cbf075fe746f25aa98ddd9315e41b53245cf6a7fc0d20c17e3643a092896bfe5b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423769946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05D655A1-2360-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000020b89454c978f2b677ff39ba0455995a99cb647fcec5daf141e62a8007ccbd0a000000000e80000000020000200000001cb11d8454b227a3a8a0a7c18626587b74fb27d9568c5f7d95a78c087a716f7f20000000151261376a2da37b5af8ef3c1bc925ac72a6a3691b01f24145f4c0e0db3bcbec4000000091639466d8b7175d2f62f8903377eae22071dc8ebf9766163b12e7dc8c9fd8f3776c6956aa53bed5ac347da93ae1a644cb6db9b815cf5e7df5afc69addeb68ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2240 1952 iexplore.exe 28 PID 1952 wrote to memory of 2240 1952 iexplore.exe 28 PID 1952 wrote to memory of 2240 1952 iexplore.exe 28 PID 1952 wrote to memory of 2240 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98bf1f0ce2827b4fdd6f0785573ec17c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb78da49b0f82e85252d865e9ed173d0
SHA15e763e35e1c26bbe77f1da54e201913d055f1980
SHA25673602970ad11f002649ffec9c34237b5b03369f0271daca62fe60e0f46f8076b
SHA5126384ed5a1d9d3a69a853e95b0f0c768fb223da10c98742f83ad8f17a9b35ee90929f71149a39d9e2d60e3d679b8ba51f7376ca87b924db39abcb75d8cd14c3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8c14b30020f2b8510b8041eb305a99
SHA1fa9d80143ff082e267b6133fe6410c6443d83102
SHA25603948b170812b2080efb50f4fc48c31a9097cdd83517045f9727842553291611
SHA512eefeae22204d2828f392807f7cf6d4fe7b1631042694fbc4bd519f7104ba866a8e3a9606bf49303584c43fd45f247f4f9ff1775fc7d393fb82ac57b92391f0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e123724fab966c78de15c4a613476d12
SHA135f43e4777afe58271a3e535ce4e80049edc1c2c
SHA2563f3f039494063dddc614f6bc8dafe2db2d5b6c7b83c8b244c49a345b91112722
SHA512ebdfab8c1bdee47f6015093797b00a30566a85c2a50e7a51cef700600d975ba76f535d5d4be514846f0807a177c1b4b525c15de0f57d0cbd8fa7058c49fd3dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996d13f7d6f52e81deaf6f51a4cb562f
SHA130c19dc05cbad41d14904ed09e79705a1037e62b
SHA256ee7c3e2a5506594e1bf1bb5a3f03334d5e9f45484afb2c6ac9cfce7d5dace7e0
SHA5123b5539d280b5410edafa87d6034df71ff2f2c8520b32ea2d0fba9c3660e4d1ba188520c009d9294a6a036ff475dc8b16b84b2724d979da4b3a953b4bcb2b9821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3321f0028f27fc052839c2046371b5
SHA1d30eae1ca9b56d59fb6a123f9cad6972541d9038
SHA25633f7c411464631338e51a1ceca785c2676c0b4fc8e89a3ebf0c6b80a14616d18
SHA51219836e6a56ac5aa811b327407d46fbdf816f9c0193025f18df528b7eccad3799d102571548b7d5df1143974e5eb01291e4504d26731e9adbf9bd1cad3429da79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f1e0db28fb45a0376684c1b2ddb96f
SHA1e83c1c5dabac0bd0ce02de45f33d3f9adb32acc8
SHA2560a041956e76c5d8fb5ad91e160c6177d4d32f9e6a40d50f2d8cbe2da06706646
SHA512f909ebc8420a69bad83865f00441227bc8a3f932f7939247aa1a9349344768b6eb56e605db0b98fac3ac661649fe5dd7685dcd5df0feb43f90504be4590f9fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06681aa463cf349b0d02684f5216e4d
SHA15080bcb893355cc41ecdcfaa62184c2d9073b785
SHA25667564c4acfbd2a559462d76ad6831c12ee285df797ca3d1c502d8cee370a067c
SHA512cbb873ab4f2f3190def868dcbb37c901e8a7f989b3c041c92f9930c415c0a0e4b0a0fa8676881c7984b9f08fe0b0c68f20584dcaf0ba65d39ed1f67c39605af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39e32af0cc33de8ae1204096171d16a
SHA13f02a208695dc76a2434a7d130f860b64f2c5dde
SHA256002718f95a6f5070eebe807c0557d51d8765261d4163a54330bc20d5be83cea1
SHA5123636a0d2360489bc66908f4e78e3ef0e3464d2754c995570083bdd26efb83929ce1d4448bd14f841df49e545792fc29aba4822e08161ce029088462605628db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52266bd2e1b8e5065ee92abdcb84e5e26
SHA1c2b687183d96b030bb76037913e4a223af3b0f33
SHA256583a26505328607a6c5ae0454195f36ec9ba02adbadd381531674562c48bc814
SHA5124282fda7415db016b2ce57b66e04ba1bbd21da971bd851ceed57c03486e1bcd53010d0d1069d67ffba99f431136a3f0a53e84da3eb9ee62b7b095d3a098725f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a3258feee5f821e04cbd50f787a2e2
SHA1aeca0a65c80f0438c6955b4a8df1dee4f39148b6
SHA256afde7644dd69973c4c59c7f0d63f34239fa9d0e1cdb5ff089a46b55c3f9e264c
SHA5125137f3f5055155390b954caef28b16b8d09ae7cadf1eccffafc8f48459a2f048370362a92e90850ae79d0518dbec797d4a892c857a42883c1efdb69f6e8ecc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7debb975aebab20c66eb1ac92c55bef
SHA141f19adb11a17520b82c3e0b573890d46e24a7b0
SHA256ff1fbf92f618594a087d23000f02316341e77cb24f14fcc32ba77b8f1f5fa30b
SHA5121cfbc056070f22ebb6cf53b05bd36866d5a293771920b2e4d767ce6fec5ee32f808f4bda4c6506b7c669ede6430091c78d3b8f87b244e26f0aeb60b47104e7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738dc3b18d25390d80f0b4734a39d893
SHA18ae6a6d979de3551466c6a2b36ec69a9dc410c3b
SHA256949b9462fb3f2fc545180f6c4f077bf672244979c4b254b4f3b3c466f625ae94
SHA512cf0f41e6f8d2b2bb15dc5c04e72d0faa45f5cdbbf9d350af95ef8c1c557b2199ae9a62cfea89bc336041908263116f5711b2782cd403631f8337819ea5eeffc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c91e7eccacc62a7f879c405f056da8b
SHA100eb8a45624e19dea4e89d65501f216ef8529e5f
SHA2561933f0671be55291e419cc412df13e64984e4e4f88b80e4ce4426d6b2f7207ed
SHA512941f0a7f28e2bdf71bddbb1066da4e9bff768b252469ca898b3afa29303eabc3e5957867c70b98c871d7d03291edbb1329352af4726caa3de7c4e4a53487ebf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fd50e031c547592b90cbac1ba86eea
SHA15eff671f4117be531665b51ad92d47b5d8a3b539
SHA256848cb3cae8a9ef5df8fca385336ca8c46182d7475cab19306add89a175af14f0
SHA5120335452bb481314e6f9691345aa565db3cdbc322b95be4e896728521bd90e2c1413fd1af897e3168f253b6b46d259adb249050be7e13d95b522bb6516636fe30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49afd890e91feed4064da63ece23538
SHA1e9cd1b5001f2cc01366dc45375e66a6abb1a3aa1
SHA256fae380c366ca99c9babf271868567e83ac67907dbbcd83e861201508e3d10aa9
SHA51236b3e1072814c8181c5b11741af965f0de8e2e58754c5f33230cefd4af623d38dc77ba61988eeb6ad711542c47d0cbd99a3ba91e3af5a0b301315fc87f85e1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eed8bb5a635aa8f6cf2595f268f2522
SHA1958987d6bc0a2a0968225a8cf668dd240bedc389
SHA256670957245ce0da58450cc02b54505907360479e66ffb7771bc5afdaef597ed4c
SHA512c0784acf442d278bcb3b062ac389b5d827b4561fd64460353658cdb4cfd9951da0559ffbc92571d8f6d8bd0aeb8a7ca1e440c6f4d53d8159df2e3e55476526fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b9905914d1700301ba15caadf9f9bb
SHA1351eee1c5df3687b1dd3578a02b8f628356b77a0
SHA2562833237651feacdbf5733b420470eee8c4d83fab176cc18ec5a9933b5f7cc590
SHA512add96757ed08f62403fe9cbd73fa4bcef8b4bcd87c752ea628362ac806db5d1c89dc07da8d9d1e183d583a44af84d58a41a4dfa114272faec0c42a4a6df476e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f5e19838325aff91a0c82cd067fb07
SHA18b98d7b3388f85b1790c204657607a53076b59f3
SHA2561e3efdee9f152e85db1bc0bdeb36749225422c3919ebd7777c931648cc27bc5f
SHA51295c8ac7fae0a36906195be53acdca14dd8ffe13e258618e766f7d21ea9df2a5f61ecaaa0411fd49052758f94ed6529ab430f3287257dcdb67d42acf77ee159c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e68655d988274dd43ae5d2ad8dcb3d
SHA1f40729d4edb327a38325068efc16d39eb90791ac
SHA256006735b6575b1f8a3e96105345e6082bd5255dafe344a969458eeb3b7872b4e6
SHA512345b532dc62d601a4762b2f369e7403acfd7bd6eafc9e43c561201995598aadc7b5143e7551bd4212c35e1a475e66f916dccdf2b71f62649790408c7aec3d91f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b