Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
a5cd85fe8aad9766fb5990bb71feae64_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a5cd85fe8aad9766fb5990bb71feae64_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a5cd85fe8aad9766fb5990bb71feae64_JaffaCakes118.html
-
Size
13KB
-
MD5
a5cd85fe8aad9766fb5990bb71feae64
-
SHA1
9c07246cf55797f727ef1cf9289797292e9d75ed
-
SHA256
018146af06ac65b9578e2d216808c2ddc4a040434fb6c5f915c402b144d1a39d
-
SHA512
867149008880029595d52d195384e656976da192cf16b09c680cafa5a643c0efb9911344d3e8a119dcb872a85c60e4e5e540c98459a1c4300ab5ed85704709f9
-
SSDEEP
384:CyifTe/ayTAQFAi7hy1wSPMy25/1x9MpPNWIB:CyiqQQFAi7hIRMp1xmPko
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424447414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000011e51e58ec71f8057de10b6496cad2c0598e851d0c60b466c9a420b81400e271000000000e8000000002000020000000e2d41af3d55cc2e62ee8c701c09ff8a3176ae65699b3b598bd23d59f3ff3d24690000000ad0a56ffcde535d182d6a966378346a68f8b20e41f36fcc33f998e4d06689cb360883e7ccd71305796c6d65f773a8742b2d1d3a5f8af74170e72581eec20f3d64c2f66c4fee1cbb7fb9d851326bedf06d2b98eedbd668e63ab827462b8eb53ad59cb5ef7b01b9b22d450909376ac56a7e4ea994317908f1ca60f517b20a431f7cd63794e78cb7ac6681869d340baca4e400000000b8debd6ffa4dd5aa90c4124c45a2b09a569b48e3f25c1235d353e3401c1a5b7734ee6deddb7ab2fc7f7fe5d2c00e7c7967cd8ce43ed70356fc06e381befb206 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000005b8f15dafe45a87b5f356e191558a70ae307a67de8df2d2be89b91c0afec887c000000000e80000000020000200000007e0a6f74ee47ace58573910907caf681b25ecdbe49c80279e247402cc4341a0620000000dcbf63610c1a95e225e1c7f63968341df36b3277d2e9e433632bbbe089e4a236400000005b282a0ba13322cf1f6f0b07bc306d58c7083de2ade1e4b857b1b6cd4a00709e7ba75ae51a7de0e867f2af08ff16923ee501d9f69216abae385c1930e5f1b6f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F8A53B1-2989-11EF-AAC6-46C1B5BE3FA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2051de3496bdda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1460 3020 iexplore.exe 28 PID 3020 wrote to memory of 1460 3020 iexplore.exe 28 PID 3020 wrote to memory of 1460 3020 iexplore.exe 28 PID 3020 wrote to memory of 1460 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5cd85fe8aad9766fb5990bb71feae64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53073c5da5f2a469fa404322d0fa067ff
SHA13e0b9f5e8b4704fbb0aff6ebbcffff3e95f48797
SHA25630a3e7e92cde8b059b8e2a10e9b0c417119e76e875c182918c3900c7d45c30e3
SHA512843bdd833a72a21bce7dd457f4c0a87a45061691929752598c5917d87665cd078323ca449e218853f7178da8bb52a5e995d2d060fff833b320661425f34eaddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2060f142b008f124d51d9679a54dcf
SHA18e54c97c5f0f176bb19fbc89e8d814b2eb3c9b99
SHA2569a78b73aa632c0c4bb26b97a146f0fa03e492a1057f22427a8483c156cc9e03e
SHA512add59c4557800f26ad7dd0434798393a11423841c074287e41d0ac5e0893d8366a9eb99580dca7168e7e9e96fd40378a265de0edb4d65b4e78b9ca76154b04b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf28174656e2d15584959791c7eeb07
SHA1485da2b2c4baee0bc777c26aabe3c0965949ff0b
SHA25659eef48b496957519a8cd45faf3018d7c7f5658651dae437ed7efb4ed913db95
SHA512b45ca0aaa8639716f7e70b5d2b247388f69dec2f66e322cd86d21047fd393a9d56bb86bfe90b7bed7d7c3e3ce54739d1340debc60e19fb05712c85b383ac521b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580302ef51163207bb54d58338bcdf0c8
SHA1b2f0c7d1ec49899b99bf3bb3423227a02c1006c3
SHA256138d43989d061fa48aa46eda8f8515700db4c8757336b18e8791866b0035f327
SHA512f869f6190f7956c57b57094176a9c1dd580e56f9f477522f618e8def6a93b815b7c20e730b1f0c1e21ecd4cdfaec513c2fadb131dd9488211e08161ec75fe9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7314697acc0eb275ee50b6208dac7b
SHA1a0fbb40f77079b8676f8de5a48930b40866c18b0
SHA256832c40d8451d7cfd67f3ac8601e0231542c055092be91fd1914621a8421c6370
SHA51259b934d5aa020ebb1e1b68fbf0a1daac9d6d12535da23c02066442fccf7deb94b77ad537e386a4495bbf7f7d79d248f0b7eeeb39c1a403434aa77c29c20933b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e6bcac8c600723f9b7fd6bc860949e
SHA1c1eacac3073fe2bfb3c1a4edd59245f523dfb380
SHA256b50616c72c94c13e433fd9a895fcdf236323ff3519cae0141f18c5c846779e11
SHA5121a62509aa724f0c438e7019e30650d9740d96c8bd5cf4f43768350bacdf5c868d25e50366fc0f39db7aa050cd19012db06ab826de3c8ccba1a680e625248a81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945feecdead2bb93b5bbcaefad9e88ce
SHA177f687c29ad41cb04628af297dc080096ca87538
SHA25663a9aba6f50e19f9f85f95deb28355267e86a0a95e0ea194fb48149577b3428f
SHA5124d0c809623fc5e171f259266247531cd2eacded5c609561d154b86cb49b7bfc86cfa09ce91844ac241d7508a2d9e382f50cd141f055a00a73525a3b1998e8fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ae36fc0b576b32b8807d15531e2d46
SHA136d11b767f38aaedff46f9100a4ffb790d8559d5
SHA256ee4c9eeb70a5eb85d93a678dc9cc673313b17b3fc98ad1d41e9b9c66aff5c00b
SHA51282d96446f994c44382453b2f22f0f0d2d4848cd9aaeccb6b15cb71c51ab339656f74665ba6e7490161764aa1fcd8d997e52b9f1fe9836efe19e7d38259a3e565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53437faf09751980e1f483121117be4b8
SHA11b7a92108576f5a8322a4f3c5195df1f6a6d0399
SHA256cc24b63e36929669211139d0dd16574edcd4fa23f51eb767b089b37c0c68d516
SHA512fd358e21d4f9dbfa855197279577645ccb4ae10567f806fa8e503b583d8b46b6d05c66c42601691a61daab37548b0d5a931bbe268783b3898e672e62c4c132db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a79d40022f31b0af5fae03deed6f6084
SHA15ff9aa135893bbc1aa126ee444e6a59ab522a547
SHA256eca2e881a3b9f155ba5ad7f91f426276c4cdad4c855ef975d29a6bd65ca0c1ea
SHA512ef04d3335323b2f29ed2fe20ea69396def30d875add1a84653058161edd93ecb0b84b4329496290d8103a6ac60645d8633d44d6c849f3d8bfc6320984f8afb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5ea9aa4b809e493bf0aa634799f4f6
SHA17468d70dcb0c3a27a7237af35e6318cb8ac33fee
SHA256e487454760a5b0ad4393d255afed120f66118128ff0913d101cafe5264e56114
SHA512b7a2c4c8ae47e1d37c8c0fae2cd58798c1ebfa39d5c33c19b721bd8cb151300d1e492a32dcd87afc74af40639ad92ad7328753de9ff74d39675c84a9c0baf11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ecc220806b5d2dd5c254e5347df51f
SHA1ca6c0e6ad0034172102cb3edf4164900a7e6d35d
SHA256880f8f0fb063f2137ad5084cac10fbf84b917981309dc2bf581976a0b2da87c6
SHA512a117ebe2cef4fc168647d54b537720d5503200a4d8aa94080b2351e1a342f8375155067caefabe79cdaf1610373ce7b733e3e1d7a453971542f91821665487e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b8a865cf7b01678b589e6fcba77f91
SHA191beb90c1b940e68728c24e0fd74ed510c51deee
SHA256a2aadb9929911e537f415ae7e32ca04eeaa93a3b092b0d2e9f298a6413a17810
SHA51237dc1c343d52e65b3e77f7b011fb20c2fb5a18bb7fba470b9f3ebab70798123f532a2227f41179ed61f23f292f8b432a348591042b567be48a35ebcf3ca0bd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3035c1f5f23591104b1f00baabf0101
SHA1c3034a048dd879413d0c865f0f084debd92fbf05
SHA256f2fddb69d527c945747bbe9363c4201e6235b08f16719e77d2e84f15f407c94b
SHA512ff0f095d58f14c9638395c077db976576ad8a7d4913cae7a784f4af1d954695478d9f62ee1a639599b878d9a30a9b03c4f7b927816acc87d7aa657de1e55c9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c5a5fc4fc1e2067d91eabc4c9329f7
SHA1700b44a15805b876ded981232e9c46a7081925bc
SHA256b9f3c08538603607725991f7794f47994ba195107d6aa0eab882cb5430ab6a1b
SHA512d508072f3896c38db4f1a3dac30b617a77a7b398ff02c68e9053229628257266e10777f7d958562dcbfd0549a130c5a038c23100d0aee002e2882388ac4077d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27adc87de382cd988db8759451015c9
SHA109d19f422d3e2ff7ce1a2f766e1863712288cafd
SHA256976b34ff61df263fdf30391a7e99f061cd08778c87955b116cd7aac1b70802dc
SHA5122a2f4f437a9327807b4d4f200b00b433341b7481ad690af7f81c60005385b8b9ee0b6eee1ccf81aff3e101d4971f0ad52ca831dc17d680ed702abb4b75a268b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a353fe8b333a46bdc3bd21da05380302
SHA1892b3c1f963d0db83299ee99b398721baaec0e8f
SHA256c170e09de21a000accd6cfe7033549caed023de759a9fcc82569fdefd99e4d9d
SHA5122b2a7e5c2e2b75b23369be31fc1aad0ab9de59a39f2b5f483e886a9e468389f481e3f2ea71c7a438ff0cc8da1868bd139141f3d2aa5239af1a916b7206d4f24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ee498a05732580ac8073f9dbc568dd
SHA161f763ced9bea88ee677f8bb126769a11a611685
SHA2568726d254feb1aac05cc633dd2ca766d364b0fbc1ed2edc604fa04af55b7569ce
SHA5127a5e29adfb30b056e9a91ddb3551024885ed9ef27919ff3196f4982a35e8e40d36508dc67c54b2e479797959e920dea9d7bf7d455b71dfa4409fdc84fa1f6fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51095db85d9d8dd66a302a8919fae9722
SHA13993386b2ba862e30968360284c6bc689d5d9231
SHA2566ecefc609eb257335c74e1d1200fc2d02fa15bdd61eee6dabe601b52e798de2b
SHA5129d02e4283319d994084538a0658400ecaac89f64493d9c446ae96975b2123586ab1b4c08854cff4959c95c5a78c5158459cb8cd19c79370546bbcd7a1df68ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4427abcf3a8298c69af474488f304d9
SHA17428c9eafcba02b81fe69337be16693cc000dea0
SHA25623094a687eb05d6cab95ee67e29cf3d7f1bd616d6aac08b331de2f06b53837ad
SHA512259b3968c05dbaa55dddd3e82a6fc72fd101185b75402dd855f87809725a5ea3efbc1783a5fc4f92635def28d26a8ea968b23f4c982c94b77d1e67e8e63c4072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56931bee929282e7f8a7ef2a7340b6e1e
SHA10a21579fd976afc1d2a9ef561a944db399095321
SHA256dcd0390d7b37cb88bcf2e7139c57c1d46be29b203779239da927c87b371e4365
SHA512023bdcfc29c5222b8f1e7e4ea67cc9fa7839f94dd5f5e9475b96a66bc680fb8fd9b54359810be897e6b5b1ae212894f96542ccaaa14d96c7dd29301b62c22072
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b