Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
a82c14a984657e505e09139b3842c232_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a82c14a984657e505e09139b3842c232_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a82c14a984657e505e09139b3842c232_JaffaCakes118.html
-
Size
6KB
-
MD5
a82c14a984657e505e09139b3842c232
-
SHA1
08492d594bdd0a2766c158610560a5ccc1c971a9
-
SHA256
c629a9a9d2854d9e1a5dd4b1a60331ee28a8dffe5041fdcfd2778294dffd0bc8
-
SHA512
2c9ca4173735375b16e5d3f7a6973527e0389685c77f67f177dcd70b01caa3426c303b0422c124af2986b88c16e09e5aa635e07700db1f14bc68e5b8fca2cb41
-
SSDEEP
96:3hb3MHTf3H5Tqg2Q0awxbZ6u8zFpZGtWhWJPZDsV:3hb3WDH5TqZVcNzFjGtWoM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F323EA61-2A0F-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ce295465070005408fa344a9424d0edd0000000002000000000010660000000100002000000072b38864527910fce1259f2b978703328c26b3371e6442cb55caab3414984ac0000000000e800000000200002000000021cc264f4c5517f6a6598794b9c4dd51079af82084498cec52b8a9380db6d26520000000a74deca33f2fa54743d9bd1ae7bf7d867ef6acdf1065d7b75c53ec3518f2357a4000000098a778e8ba67894eee086ff46445da553efee7d24b6202ecd564665eb6767310b66fa8dd52ce033d4fa0db0574c9877aacd2dc2328a5ed2dff6a2ab76dd503e2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ce295465070005408fa344a9424d0edd0000000002000000000010660000000100002000000048c15cedb11ec77033b13aea88127f3117546c8619fb4dfd71203f47bc9bdf7c000000000e800000000200002000000055ffacd5a16fa1b7cafbe091820e42544a49259180050e0dc33e4c6df48bed8890000000ecf36d127415e0d57dd70b5eaa1c5c6055a7c1656e46bbddb8aaa8bab34c7e2c743dee1c4b9ccdeab976d2684ab94419ace6083f5965b72fd0447803397cadffaa903dcac3b403d046c418088aded91fb5dabc31a7ef75c653b10afbca51166cd6d432f88a8d56cb9c1e31f197f21a5cdae4fac57def2ccbbf610036fc4661cc24f84ee3f08be74b99b83ea3b235c230400000007d36b87cfede902ce8518af73c3b87ea483a1d22e143033862bde54720e3f826f837b4c9c74aec68cd4c12b5a8ef9d294b627ce622374f17919cfa2fe0f98590 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424505214" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01aa7c71cbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2096 2880 iexplore.exe 28 PID 2880 wrote to memory of 2096 2880 iexplore.exe 28 PID 2880 wrote to memory of 2096 2880 iexplore.exe 28 PID 2880 wrote to memory of 2096 2880 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a82c14a984657e505e09139b3842c232_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafa268a18f80834cab7e49b38de862c
SHA1b8f33f9a3b62433e20932de1a86d265e3e5f7275
SHA256fdbc54f7fb47f92e4d5d9dfa050df06b647638a66ae2d7a1158b432a2cab6ab0
SHA5128430ef0bee0ee1b922422c4992f67e249d1c7f5c42e39f23417cc289be883ebd713c5736a1393ee6f9f3ea85cd4ee93b800beb21829b443c3f4aeafce0f00916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a52c77630c7914e00a6462e9cf9e42b
SHA161810a11e31a13109b6f22a697295320134e88f3
SHA256e8faa6eb9b2a2ae17129a84319b28f29bbdd0ae6a09e4c19613f25df221802b8
SHA512bdc305097ab53b02aaa9f6c0f271b22b5d4c9e476ef9d4dc4bfbb7287734232f849ace010b0fef81fed4552663ad3ebca8da9521b11750c1502291fbba50cdf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4436ad0b8fed2ace4f507bdb9a39df8
SHA1d734865ca6644062df2e8e1a05b22566a4779219
SHA2567ccfef8049576f3e2cd568c9ad8312a908d35de82f3821961c38637548c8e99f
SHA512334e8f631068bfc6000bc9492b521696e848f55d36908ca1155bc77e738f622bc87f3aba181a7b9f46c0073b9a0b6e29ae3e48ea408aadc0645519313d65cf04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b924a794f9e44ffd4d681b1e9b8e9373
SHA193a9d6b636514f03dc4759ccbb6b473dd6efe70d
SHA2561922d2a2477a0728eeacf780c496e297feca8572bf7c8de1559401c87ac0cb2b
SHA5125fcb569bd8898d0bebfae6460c1e045f3a592a25994e60cd5fc314447036cacf773410cb3a56e5d7d87033b39a778a199373cc8fb330e20a3b46113b1f555373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03400757410400742c8fa9dfe465a34
SHA15c7cbae29b9cfae9ed25ae6c4502d1a236b538cc
SHA2560b67e2a3bbbddcd755d9c3773d6f5b117b9d1a9dacdb5082813bf1d4c0c8460d
SHA5122bb608f6d9f53e8fe5ed252b6d71e5cf4a17c30299709408eaa59fdf8d4a69ef2d5446ffd794c54fcc3b715fe17085dd5f46cac47595c13da864559331b67bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b721ef2ae7c18333aa1918a6c8cb1a3
SHA1f1a1d046b654e91f2684bcb61b922a068b61f46e
SHA256e400a07394c8885eb588a5682490865c246947ab3862359010e5437b2ccbfea5
SHA512335f38ce1536adc4438e626619de83ecded2d1eaa2e6e850412061d700724ac54e31ab6d775a01cc493fd48dc90e28fb0946681c36bd6f84afb4112490ce64bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c25578af248d9e3ac051e76987a09f4
SHA1b3b82a022e34e1d840f9d8f22b9b6fb74ad8f113
SHA256583fcb3894a81131974b505c8320b1359686844fc90418d3848bbe8ef5c2018a
SHA512ad31983e503aab56a73fed91d75ffeaad6b7b4729f4d75305b2d26bde509f05c93bd3fa5058488320672dd076dac263ee7193fa6cbb5537f714d76ae330587b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa6d3dc5772c83e9d20a14a93303649
SHA1015a9cf2da17c6123816390b2cbe796ce23195c8
SHA256d65f72f5c87a53737ce2504eb4461081da6459c0383b043c51a9300f561371c4
SHA51235a4c657d17102ff6127cde66766a079889e00c54acf32d0b56be9be318c6a6b0946424b2f122ca42df63597db4168b5bded3e1930fb879edb116539bcc2d69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ebcdc9dbeb493547866f3dbb851388
SHA114530b14c321fc9c1a219a6f08e4d4685b3943f5
SHA256e05f78e2ec2594089fd69125728fe9834cfd5a3a8cf771e73dd6d16498d99f20
SHA512ce1237b37fdd3ac07cec2935919dddc16af2a9744ed4cdf1707666b2af5559af6a0ffb186d8439d60970582b11f00e517c00e76cc621710a07d4adef6f4e9ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1156f1affc698d72ba3c6a5e94cd94
SHA1aa265fdf5db263c452c21ee87c1953f240c455a4
SHA25692f6705f67193093c5677f45f2cd7f32c6defb766da072f157b5ea67ccfd5721
SHA512ea8c425f8b4fd5ffcae916ef1353c5570a088f935d5d7bed02a4bfeb2cd7a6cdc0b3790afabdcca1fdfad11bdcfbe67a9cf4c10862fc6cecb30065bbe55b76fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a0e4eb9e45dec8414d60c092b71694
SHA1c56acf01cd5dd9d2a31dbdf40936fe3060b1399e
SHA256dd22fd7b351a93c364145e138c217d90f776f0b9b3a6484013bd6674184da725
SHA51222d5581bc4273114e9168494c2b9d780fd58b49250ab0f6d0c25130dbd74b253c3a27a2318a69fd85d0c6518e2b51ddd6357a1abf5be14e9023127ca25872d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1dc8a39ce1e48345fd939ac039a5ea4
SHA1f6300db9d91bd14ebf43328d6eed9f3731d5f914
SHA2560d8c77d436b3997bb9dc6198706857544b6c8473ec8fbe94f7fc2edddf381f79
SHA512348a69c3a8fc5c5b79ec6abd4d2ebb6f4f60ae0ba4c6251f53a9fea535fe44b65576e0ea6a6b43e7bc81131c9b0b9b20788772bc442ae037e2da8adf355b18db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f3c17a94076eaa3ed844f4d14dd645
SHA14997ef92f41509c09225e59d87e7145fd9ba3109
SHA256354333d344b091c4878c813bb7ce288316668a314564e440440c26335545512f
SHA51295a8f6ad41f6eb8bbafbe870c6bb05c5e9fa83e5fd36bf984b9bad72a2d4487b9389948ae4dc4c4b109ecf8c2ee4d04f887bf3d3d430abd21be2eb37aca6af42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b2a92ccb039a1e22eda12961fd422b6
SHA189b3e12ba86d01ca662d7f87f060a1f1d0ccc8fa
SHA2561acf4414b0d35f70ba24d06a58847a63579ca61a98735b4ecb2a4c3c94dd358b
SHA512d07dcc9f2f10a04deb4f1a28dd37b8b9791f0e8e040f5507b9a00ff3984727f345bdbc1b2dee6b51bf4e810f4213bf0605089511cf5f0a88bd17417d8bb9b793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54befda6c65d2dd61cb9cc08b7ea70e4b
SHA11a5978ef4c1213ff97f52c6b1244fd901043c429
SHA2566d61c40ba24f0fc16b773680a86e19e41cdc8740fae99f7f9a9fa1be42478e55
SHA512c40a0815d14ca15278388f4ebecae24670e6634fccf9050a4668367b091ae3e34ad88084d17645c5854ab1436441441914fce901beb892d565d43c9d875c4bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554cba07c8b1d5495098273c04e1530d2
SHA149c76127dec7132d59ad3069bd2ee1a06fbea314
SHA256688b96c12aec45921c5cd15762c99cd639387c694ed8ef52565b97cdb6a9ca94
SHA512ca5e8efc2fd4a6ef364ab3a0257f7cd403cb2784d34118cbc179c3ff19cc362ad3ad7f20cd787a3c1df47510901e03372723f91fd3a792eb38203b6953448cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c616431adc68905a0ec8df7cbee8cd9
SHA106c6b90af2fd62acad6caa436616635bccff6508
SHA2566080d4a55648bc8cd2d3a7e4b568d0e06bf3b2f563cf2167a872b763d7fd35cf
SHA512c63b3d39e1ea47f17b3d4c5e16fdda119abf74194bd5f3714e5ef24ddd876c21e328d0dccd2402d68a483ff5dc3308e6db35acbd37222c534a204929f73c7c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb446c9304383306716d2b3b3cc4686
SHA1da08c9f9fe8fe8faecdfd90a1a1b40ec3b0a891d
SHA2561ccec1470c67fba3b4306e3402f6ab3a738cc59ac14612213f9e006d0fe13e70
SHA512b9ca2a6b05d0cbad2b66e3748da1d8ee7a7bcd1cf390d2dcb052d136281e2453508a71207e1263cc3cb2be8994bfbc5bd554b8d57a7fa801c7213dcf68ff1c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59641aeaaf09a1799af5e6c046b796f88
SHA1c3763589ecb32b298b8a59900fd3f963c0ca5f16
SHA2564971b776dc61ae761d65ca49a3749f0d4dae3e2f6874f60e2afb1d49059f943b
SHA512637b4e3c32bde35b9179961d72eb5215677bec69aec00e56e2a02e9ec0f8298bbb6919e99120b4f047894202ca882aa47d8ed3ee574e51112e73e47aa7977cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbea19b382ee33b18dc137d7b0f6704
SHA1063f93b12caeff44bec39c7f834ce66767648d51
SHA2561b54a66ac3c7db292156339a971c80bbf3442a3158319b535009cd9165d50cad
SHA51238abad9aaab6684a5175f009aa0eaeeb6374c2dede6e9410333956c2c8e0e1d49bc5d4b2aac9ba5b7771c9a1be98d54d0ea178e9dfccf23ff9b9920bb1a17e61
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b