Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
a6abbf79590c9d9ca0156986f942558a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6abbf79590c9d9ca0156986f942558a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a6abbf79590c9d9ca0156986f942558a_JaffaCakes118.html
-
Size
275KB
-
MD5
a6abbf79590c9d9ca0156986f942558a
-
SHA1
a611b0aba7b51429bc2831ec4e1cfd46e9dad391
-
SHA256
916f66ca5382fdc6a2b34aa88472b8ad710d0bdcb8b8dbc1611e9c4c35eceb8a
-
SHA512
e72d1e00005e09041d41e590c072c2880fddbb51c6305dabd5e91e50d1fa0b1211deb528505ffb6158169488b7d4b193b167ece1fd01e64823ad4e4d9e626052
-
SSDEEP
3072:CZibOnYmghf0RqTSfhixYu0pNrhs0Q9D0srNWdh4Ad06CmBrUO1bvVqwmQuFJl6Y:CZibO30Nih87dV6Ee/YyM
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000d4e0e20d38c999db91dbbd1dde09930f071ae050475e1631b71be08535a7ce6a000000000e8000000002000020000000d6a84dd61078f2549b60ad5f7437fc26276f44e792edc60baa9270e319817694900000004f30bdfe157d5cc740010cf86265aedc63ce8a5e4ab40138122806a5eec784e6dae9d2895a0023b62dabe7c3d9e4d95bad70e407b2624a1bd72aad309ef71c98a49a961dab37100091db9902a7e1dcc9c0f4c87687f69e60d479bc209cbacf566ea0c435b68f6fb72bf63d07af866f4bc36b114d40fc7e7b20bb0e29912883de6a03d45e1925a8ee2327439e03f5992e40000000213e6ac4ae685b4190bcaf2ef786ac866e5379f90644fba0549cd563335ff66bd78edb6e8e770c05e17344c28d8faa018a8403ae928297b6602fb6d62d0cf3ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424476325" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFE41BA1-29CC-11EF-B3FC-D2ACEE0A983D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bc0286d9bdda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000001990e77cc015bbee7ab695f5dddd1acab9b108d10c0e15d854690425e98697a0000000000e80000000020000200000002f7ec7df226911457ed89c6f91f6c462bf09b598499e7766b683073c9139f65d200000003b665051cfa7110c2aa16614137edb6b8f8dc6701d20f58e86be4533558609c2400000004a4c130cbbf38c85e3576d7186e0427ee647ef838813772f32b8804a142f5990875b1f699a26a7bd1246c1598c4aa8170c7668c29ccebee5413a1e3a3848bdfa iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2996 iexplore.exe 2996 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2996 wrote to memory of 2516 2996 iexplore.exe IEXPLORE.EXE PID 2996 wrote to memory of 2516 2996 iexplore.exe IEXPLORE.EXE PID 2996 wrote to memory of 2516 2996 iexplore.exe IEXPLORE.EXE PID 2996 wrote to memory of 2516 2996 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6abbf79590c9d9ca0156986f942558a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a14c94e2cc88264413740bdefa7fa9
SHA136f9f4ad9efe2aede9132cb1c957247bc3f00fc0
SHA2561240a25792ec4d02b6504484d5b4a4a359a49ada1cc66756c266f2d8a6bd3906
SHA51287703f0f0d3231292b77d3e4d0098a1508568fadaaac2d4ca4ec52614ded18c4a7821815af21ffff51080853fa8c24864df6633d096344617ebceb1accc311c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f805248a89229694aa585d9c967b677f
SHA1d3cdeec5983d0104caae5c78a5d506dfc193ca92
SHA256bf109a0dd770f8a2aa608a68a46ae0fae7dda7740dad016333780ec159a3e2be
SHA51223259e3dbf5c2e7a8ddbfc692d1bf3c65059109b13992b95d6e2cd9c54d5155e887e5f8321652439e0738f8db65ee24b63cf3be457c49aa59b368af3f8755d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778380146587140c3970fdeacd835245
SHA1cbeb19674cbc6e27f7128b642f2e522d0c871626
SHA25632dc953b657f3cadf04bfab6d3805eca728973ca6f4f56afa0784dc7cf854c57
SHA512df733753b1c4f1f313db7954c5d599d0e299dd624bcdd927119d1013918c47fedc5241b5c3e7ad4ebf489bc3379e7fbd7d3012145babe367db2ca433691481eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee0f5fc4e24b7c97e14272b962b7dff
SHA19e8020ceaee57a3a24cd93ddf32e34db637daf6a
SHA256e356458ee20c8ac373fa3d43e9eb58bd2c75fa743f6e50ebfa358151a8719760
SHA51264713b6f6bff34939d1abcf6bbbab04343d304cdcbdd8127baedc440acde2fbb8072c470b5d435ca24946871da90460fe362048467683e621228c11c2848b0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37329d72c30861baf8242e001604c0d
SHA1af35d4628024bb9094e78f7464725456b7699f3c
SHA2560dc81910e876e6d209896a26a1dc5f507cb70c897ed02d190d3f5c5561bc2340
SHA512b4d858ac93deb015ad0f9c1516c99c849e4cf888be848e06f713b8f2d535fec9702bc704af3577967e4d820df264d494214b30e751cdd7be8db932422597b17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b91b7b952b35ccff8e36d7b7089123e
SHA1af1dbd36fe5b26f11201b8ca44644f974083c766
SHA2569464cf8b2864f1e7e928678250a821acd30c03f6f129a6762e65363e5a0362b6
SHA51247021e3788638ee83feefeb7dc7d777da623258c8decff8d54b13bee39f88f46cca00af5454634542de5faf4db419159434df7e26a8d840ba43830b4eb22da3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524aa139286f1a533d76027a8dce3b04
SHA1dc298939163e85f50555461550088369e031d100
SHA25660ae517e067189ba4fdca941a75384bea149d7dfbda9cb463e74298cd8c33f50
SHA512bd0ef5488c947247448698df1575305a7626fbd857bfd16b950c9c309208c8786a26ed3c9133c2bd857a3b565d70a2595f1453a039450cdd834cf97d26d2156d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060fd49b96a92ff77c4dc0ac35cffce0
SHA10ff793d46af265104b1c8308108de46ef2e81daf
SHA256aa816444f9f7761162d61d710fab100b9291250fce012b6873c52d0d61577cd4
SHA512cc144b95c68e888dee5ccb52fb91e0dbad981f9be1386b489a607fbfa219a74bf9a2283528edfbaa4ad5dcfec25303327f4ca07f47b61023277671d81f93bfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c7da26309ae72be77081c8cdf944db
SHA1f88c13b73671dda11e28aedee7cc517beffe2560
SHA25601090b603ea47a45cfd9d42a2a7f961ef1f44009d27bb4672e73486e5534828f
SHA512f173e6307dfa8db1e77165316b08bd0ad5beb9f0d3edd6299e36da6a6c47ff05d9df1b514a657ec1bf0eea22fbd0918132c78f1df3dbddafb81702ff7ceb8f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57537ccc40f95db54947853bb6ad02f62
SHA1c0c57d1b27b5f2d3dde581b6dcbc741df9a9ba18
SHA2560650c6ddcfdcf45536677ba8e41eb1ef857476cd9554d1d7d09074555c66690a
SHA512aaf3c819551adac3d9fb18563e172dc75f5dc00539a2d1ceb4081405c0d0fbfd593dd0c1b0f32c6dc7ab6228355eac1d41ce193bf637c0135a1f5d4095532de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3e7c021fc76d0366c67b034c053658
SHA102a25236931b3664cad5ab4a28063097ac215f08
SHA25621cea929bb07d4c8c8f8b876696702aab199dafb2f3e180914fd41bfcb36b9f4
SHA5129909f068dd710dd171b00b3e8a16303bcca5d8d8ab8099b46c2325879779a21bb348eb0bd7ca5fa1f6e44805fdc19458c40c802d906fa9b0dc82128785a73a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f38ba2558259a21be0debb451c86d3d
SHA1af03b8f9557e7a81f4bb7fde6de9df8469083d89
SHA256ef8f6b0b83ab625e9f5d56e878b4779eb101079dd00028225bbca8b697b543bf
SHA512752860c7d740bb7b6cdd3ec2a167ac7c89dc21bf6479c2ea90fc7edbe4a342810a489f325eea9fcd6b2be1a923a295c7b532e597f35a60850171081e520df297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8f73c0155f8cf8113519daba12912f
SHA14b99b2d2738a060ae31e5af1c06ce70accf6b884
SHA256689834b858e6e6327475a6ccb188aafb72a117f7a90bb9bf0dc24d15d7fd88fe
SHA512da0a80b77b374c898e687509fb32a4d17d1bb6ebdb2bbe8b34b7466bd387621f078af09e3d3161d72362ea591da5a944acc600700fe4f1b5501c57e9936ae61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2267214819a1da20994f1b763e7b8ea
SHA1a042bcd9749cc618e962464071014fb75989294e
SHA256e662aa3259b7bcd1150807c6f0b80a8f99dc02c554c6150cac10d10b899d8d10
SHA512ebb2ce0eb81a79a33177a2a6f5b29765388f7f873beada7bb0fbbd182a6869777997143cb043c8a7be1382d7a47c2ec8f0c2c8e42865b91f9c2ffb016c70d832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d60b6522ee11184d3e3b91942832d3
SHA1ede24ebc55e2e120fcf2419f670b9fe3d715f597
SHA25630ae398fd9d53a630306a229a166e9cd7ac295b654160fa1210fa0c1e3a985aa
SHA512f1b34a296121a86e78f3df731d4d0e865eca57cb815e9d56458fc6ad18c468b770c8b66a4b7043f4da4f5ecedee0a9464fd90ce47c5bb9d6c041434c4726c2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e128232b28a0d77d616969c3ed19a4
SHA1a1075d83d82cdd3a7b9a333a23af1aebaaf4625a
SHA256024837e105f830d5a88df46b871f6b7b47db5fbfadb37cf8bf6b7ca86e8a30da
SHA512a2447fdd5d250defa64585f5a4869bb9a73a89f8a9e31f1d86025c149136b63136842b0c62102d2ae470a1f0cbaff57bf1fbe2a06f284f1c4400c54c0db78270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5343f18f88eacc1e9db1445dfe1b3d
SHA196512d55b3835b9f3889c6971acf5b79c7694f5f
SHA25622e8e3e507836fa2ea1c7b27a6ece05419e5a3d770f5bbfb397f3ea1895c2fec
SHA512ed3eccd6c64778787eeb05e4eb174a487a6492d6c22b340a2bb7f1a2cb3ebba0061a6a38d26b0f77dd3db4be0324daac77148eda8076e91c4aff22037b2dfcbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ce60cfb7aef2b1e5af40820967c184
SHA10e7274c947bb464d75a2475e82f28c271c33e9c0
SHA256f254e024fb0151958d8fc98d275b55b602637b2dd707823fdbedf6695013afbe
SHA512e65640a9aa88cff55fe0d3c4c2b4f45d8abce6c7ededd02c734051cb4c348abaf4b1fe1f505d5511c0ba538b03c9f8c217beb3b3945d43661bb6650fe543da7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246ab4f11e99ab43cb1e4cad24c27bc8
SHA1dd7dbbda22fcc4bd25156e2296c38de7b8783121
SHA25665feafcba5df1545e25213ea84b654560427cbc7181f53accaef10893b2b7842
SHA5120363aa595da559c97cd63267be2f7ae8edd84362189f0fb00a45cf776cfde5962f37a2e564a053c93255f9272aee8b77158c397c2fcc2f2fc8c6b8c41a616f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5cc6b09f4954dd36e1301adc3619e2e
SHA16e709d7e796b3d84fccbcf2eb5a6ac796158f544
SHA256cc5ce51315f13a3f9569fcd02f63372668d9bafe908caab497f1d025542a40ea
SHA51267ebc31104498a8d44705bc722330f7ed23553eb54c2bbf84cf0844183c4d05e30ce48bfa9cb017d894d1dba72e43b80fc37936353f712f6bd0398f6c98db690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12c1690819d4f594f5e99c7b315fb0f
SHA10dedd6145190dd230c108951ef559ebd6f440f31
SHA256814b8d6c6b70c8a48f5ac5ae7460964ec4b3db4de87e14d7fb77555d1aced563
SHA512e3bf412efbb05df562bdf681b5f6e4515e4248c8e24df6e5b6fdd428e43f2dbe08c928e463ace0d50266f15bc801ac5154080a471e02a6ecbf4b44e87f8cc39a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b