Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
ae204a41282bbbe408ee2da15afbc324_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae204a41282bbbe408ee2da15afbc324_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ae204a41282bbbe408ee2da15afbc324_JaffaCakes118.html
-
Size
40KB
-
MD5
ae204a41282bbbe408ee2da15afbc324
-
SHA1
a75fc2e6b1136ced40bc297706f87c7a0f71f0fe
-
SHA256
801b0dfb36d02f13d6ada7f3d4c395e13802297b9e19d111b2ab1e91558431ef
-
SHA512
1bf72ee767d934a61d87f6364eeefbf88a92f08aa247cf9c98d0c08732b5dacef425f22aba80eba2352010d6b0a1b181c46c18f87e086af55ea5c582d5ac0c17
-
SSDEEP
768:g3hoHPFWmTJYOjIjkVh6WBGbJOEtkudimk5lrD1iPtkpSLIdp:gRoHPFWmTJYOjIgVh6WBGMEtkudimk5T
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424611453" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DB59531-2B07-11EF-8144-CE80800B5EC6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000261086e053caea2d3f9fe3a68ce28f0e93cc1ca895c1a3e811dac6aefd96230e000000000e80000000020000200000007cb68de5af2c2fab257e542813d4b8646a47129bf3e541bff20017742cbbf52c200000008cb54dc3512dcaa41cc2d63ed92901f4199444011482377d8822049749823cdc400000007f6a5c0ab9e666edc36407b735ed71c82c43a36a1b3188f78d29b1753b680bab8495c0fe33bf103562b1a0047b53350951b3c7219609846fd38c5749cf235583 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000007f70840ea629fd7187e05e6f32c88545178d2bf62889249a433794ccafeef88a000000000e8000000002000020000000d3bccba83b22a899bef66e3360d130d9327fde1210895a2049b12efd60bc55f190000000252daacb314b6282bc39567e0f24d6ed6e70e6b0c888df36b981b9e2d6d0ccc2da902b246fe1712c28a79f9536f97d274127d53d624b7817f0425cd1c98823eec93d87fbfa5f91c9e04f60b92c17f9705f90eede198b5ee55abdab2ace478f55312c491d2d52201b6e08ab2117cc67bafce393624bbc6615940cab97f6f4190b1f97d1336d7625f94d32737d629a2c1940000000abe390904346586f65c0811489cb5b48ccf4f04435eddd91eb13032f7e99f62453c8b116c201fc4b1630afc2980e81fff2549078e3b76ba1cfc0c736a66e6023 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f1642314bfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2100 1688 iexplore.exe 28 PID 1688 wrote to memory of 2100 1688 iexplore.exe 28 PID 1688 wrote to memory of 2100 1688 iexplore.exe 28 PID 1688 wrote to memory of 2100 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae204a41282bbbe408ee2da15afbc324_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da17ea4c9e290b98308ade769da24658
SHA1ae0a98aaba56f343432822c7e6bd60db6fb54a5b
SHA25693b8b6e8e3ea0b448bc4a009347d21bd34006ea568013763f7ba5b88a144685d
SHA51229f9da169cb6ea9a088796ca819c41b5faca167ce19dab22953927dc87461ea8328aba8052f5c8087fa48355a7caa1655ee2cbd15e230eb475960ecec7133587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b609a227abc9702e415cbaa993d38e01
SHA1d9b4eea2e4f1d451936a0152612f8a0ca3629f7f
SHA256c6053685b5067ae0c1becac57fe8d2210b9e46c46c8a23384487aa11ba466544
SHA512351f5cc3b601ebeab4c151715c52d005b88f42d16e002884f616e57966ebc16e16682bb7d102159816579c994acd208c5e9594d97b4205d224396443f0bb6f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f596464cc6ecc844af8eeb0e1d256b7
SHA168ce8a35068e8fd81255f70d055f9cb2729693d2
SHA2560bd10148a9ef1e45ede914ec4fd579fe8bdfb92e92979c4bffb54ae7b78cc920
SHA5129467e9c852ed7fe6d5d81da0096580917c04b138673f65486873fc2fa74901f3abd4ee9c1ea4d02416808c629c4fc58416ee7cb10f80bdcc1d958d4d0992e952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06c23233e11d6695b8d659bd605a0d9
SHA1902b9368caf07449968a1acf795ae9ee98ab3bac
SHA2569e1ae7566a8aebf909408fbbb39c14cc6bfb4da440642723309ee221c32e0311
SHA512b37a5063e0bf244c335373e1193d590ac5a506c585e3211b5a3ba4fbd4175b349e1683628df5ae231ba37fbf84db141733bc6a6920650fd5753a9626884ead84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57159e6bedcf604c0bbd29eec59665af7
SHA1ebeb083f362c2e38d90592108168b6a461a22bc1
SHA2569e85f85fa2447d34ca1552fff7c9fe485b75a2f31d2413bbf351cb6d6762fcdf
SHA512834fa4c554696b8feca634aac59f3136eebf69d406d0799c46be936a4c759ea49927752984ebca43d790efdc8c150e18da8fab5515ad1c7102e3729c01db2bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52758df28f1848741691f2019e93373
SHA1e3ed4e115d385e7ed518c228c6bd79e31895b200
SHA2560d3a49de8fbc2d35b03255a41836886b5feac907e1f34eeb04ac02d08b07c08a
SHA512ea71ba6cd044c8cf09aae61127903c9a4c537752935cf7937c26215741c7f0a06d67f4718c3b0f7e33d3f71470966eb5d6abcd83f21592bce4783fd148726851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6af258fe057d2eb9cf86f59e68aa69
SHA1057b684d5448c0d6ba7830436b339f600b5235df
SHA256fe1ee286d18455ce41ee61315704c53d80bc480c4d2a215be46801c85d5c1d68
SHA512f97f9c3fed3964804739790979cba01f1a5d2618938f7f4ab79443ebbb6d44ecc8ef045af9f77b50d79e494a75becf78aa75bf60003d2d961384188ea20100e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da54893ff1fc58cbd0c611e07cab03d9
SHA19b5e353b6999b44139016653739ecd4e766a0fc1
SHA256fed64b3989d2980aee18126ee206352509dfcc7725ca3d0b656b7986d595989a
SHA51295888d11656565282bae17e123a6a9d8faf5b555327a87673844ecc19b51cf81401dddf2cdc072f097493338b07bbf7122971aeb8426949d8195bbb18672ccaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa2b64e2363f070bb457b3cfb50e732
SHA1fcbe07ceb0b00f6f1fb0c1ca7188772de9888e83
SHA25663c7e0ba11e06e9950146e3948530fe04bb28e498d509d73490e64f4ea62d677
SHA51275eb0d40c25d959c96dd7cfc4ba2a88a7eeab10d60a2082fffd1f046f38b9f7ba73fee5d8fe27790e6f37d2c1b81db595a30ce3a0101817c7845894ee5a06087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572542cd9242fffe538ceeee26ec25fc7
SHA1d807ea4dcd55387e17eeaef451a7f504b44b3514
SHA256f3b93334361fb92030e39852453d7a93bf60093f1212914cecdc8f6d057fb38e
SHA512e6ae2f6f0fd85b3651fe2cee8a4ddbf69494e3d30359801cfef6f02ea120de575536fea9ddcef5dc1f21333d723ab09174a348d2dcd1bc25dafcfb250d25b719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf68d1e5c7284152b122791d6978e774
SHA1aa9c2a927f57bfc2d747a30464bba8c1c34329a4
SHA2566e24d9b8cea1aeed4193cb9b3936fdb9c2ee2a96aeec9503f910f0dd1e74dc50
SHA51255d94caa69d20792b04dfa72878e333329913d1ee03ba03bc9b018a6fea27d2ddcbdd4fb204d18bddb45b470ec081f849114ffc86eb5e98ee64e82ed4346e66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9937a7499b7216046198b8e1a5e2d85
SHA1cfa9325ac53fa7e6c8065c60424bb85e5d3afb78
SHA2564f090f4026ccedfb7d161bc826c405f53cb6599f7ceb78e18b0d415d35a4d45d
SHA51292ba08f65d8bb6ecaf7c65b87173f5ca25848b80a6b9e92154a641c0f45c03ea7ea528518832e07e0ba3c04a3f6e55a41168e4a52caed2799b9221aa2dedeeb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df87e7846cfeef44f7fbb3d1f68b68c3
SHA12b004808147a2178f2b6cd78f438cd783e6eb6c0
SHA2567721a38af747b5dcc9ab7a37ced66e1972ad0bd569db1b86e40bfbd2a8f4c4dc
SHA512f72de15adafe7099c6ccccf48df7d3e2772cacdba562d090d54dcb11e3f3c8a38316223158d83cee1c8709edc3ded4ae3d26672e9491eed35727c2b4be4f0140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690bf2dae6eb56094271c03ff51696b5
SHA12d2903572a376268aae849d66ab9295dcbe80a48
SHA2564f0646c0d36599408750eb5e6464b2dbfa4095ca88c8dca7cda040b9f842d7b4
SHA5121f987f63160d4703c13f2ce1b998a5b8d6370028e70bdb65a993a66b66ef15f70a2fe4d188812db4c8c7731f524cc390fdf3c5e443f2f6f8d4bd8781ecee88bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bf2edc48191c3dab072d6f9a767b5a
SHA164e86b87161d1d69bdf8e9907a5f772a594c4372
SHA2569bd9f75f5fdb607c4fa54e8d50b3c48ba049ed888cfa484b33b7c27ecb5f1a26
SHA512deed1df9ed039f3eda4a3bb314233774803f86357b5a095b1b6681ddabba8cfe4923955d2759c8a4ce723c7b7276e2a746a2ba2d3385c6a72e05c0c99c18a797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d56c7152fae8f8a8ac71d95b0855f1
SHA198be930194afc5d2d74b9a1e89c8cc31e0a04e7d
SHA2567cf35671edb2cc0041f3c33caf3fb4fb7ff1f1749910dda852c99baf8fc03de9
SHA5124e3b9df70d67b172871cc8acba8e2ac145ab299f13f21c5c8071334c6270382097c9215b13670b73bca38e463f2d5af8f2dcebb81a324c39bddb08e1f0565230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bcd6d71300cf9d302d0ebbb0c05ef0
SHA16f8d61f502b004e442824f42af95c35ad1d0d34f
SHA256f747dcde7955ab618234ba70bd7182961eab61bdefc979396ca66e175abe0650
SHA512b6c19b74c0e00595ff562c942b440e7250a8cfc23afd5cbd484c26b28e5741a2f39a5c01394387f7a8a4e8202b43b8b1da9f24969f6feb2d45fdbb3d18062f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c946f43f082651475bc57bf6a5dd15
SHA1a5711f564ba6a3de3a737c7bf2bd680a70a1cbf2
SHA256b466d817df057a6c7456c69682c082249fe06387659fdf82bb3d8926826f3e5f
SHA5120730dd83d9caf06e43b962cf08b63bae98073ceafc1af88a2e4bdaee56830a354cf83fa81024265b72068bf31f9e3ee3093ae6b480cd6a55aca3f2468a113b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f785f7a29c03b9e27485b05ed9eec28
SHA1be791539024f6e706354e031b8d4ad6844c041e9
SHA256927030a87e7964900bfc2c927b177845e9a876d0eecd3c14e3b19f0eca1bfe87
SHA512d7919358bddcfc9e48f48e5ce7d992177a62f088e39e1217132e934afc10b9f297020539f065b20ae03979d38264910a21437810856aa7ea680cf73d17a77456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c895c6b34c73fc23c47aa7df10fc4594
SHA11c26728d473c29ab41544cf24562f00eba06afce
SHA256c84b18b3de320aa00b5b9d5ecb7549d34b1ae6a45a7fc4249948102b88490533
SHA512ba161ffad503d1210c7cf374318457e7f7e8159c34b5ff18032d28d5b45a9a2e10935b47446221768f04bf08f26f4ee8c48a41c06aa9ec487654d3985def21d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\HoverFX[1].js
Filesize33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b