Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
b52e09247e39e79272b42e52b9550a9e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b52e09247e39e79272b42e52b9550a9e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b52e09247e39e79272b42e52b9550a9e_JaffaCakes118.html
-
Size
462KB
-
MD5
b52e09247e39e79272b42e52b9550a9e
-
SHA1
e700335897b65cbb9fbb926b7d512c8242869dbc
-
SHA256
b56a64f3204de9aff7bb294ef798843e631f451c04c55eaccff7d8b9e5baf206
-
SHA512
cca08ab8ef5629271849fe3b3d3305fed54adf5991075c98a2aa848e7801d2b3ba286c71a519d3d37dbb7a44c97e55eec49bc84ad75f2a02d96c72272ac7cb80
-
SSDEEP
6144:SfsMYod+X3oI+YnGsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3K5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50C46B31-2C23-11EF-BD87-DEB4B2C1951C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000d0bf61cd75efc82b059dd7c1689ddecce75d1036e8316aa05c3a9d0a1522d143000000000e8000000002000020000000e94e8fbf529ce46d69c2d4f5605d309b47b9fc9e86795e24354434ca0989295c200000005bdcab154a5731d5c040ba889c9d5e3bc033b134cd11456cec7c1181d21e4a6d400000007b95a36e3c18c7218061ce8649668b5d839e855cb3ca44b3f80a26cfb2361dbb6827df5dffc65c9ed74e194e122a36c11cdb0a21c3a4f707b11d20075c231098 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03e8a2930c0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000f185780bda4ca88042ef9145eabc56a163af94327c86acee5a704293f01e7b49000000000e80000000020000200000008bbe3d02fdf5f3946092b5aefbc5a9936b8fe8277d3ba4e64a1ac90dde1671f6900000006bfaafbe95ac38336fda69bd7159f1d92d02a9e0475d9f88793bd2ddf4742ed3f01d8fc858dc52a15d3af5e8b6378b7390fd49185a286b38dadb6430696db42cc408cd980daca9841cee0e5e44b52ee28d75bfcc1e08b6be73fbf19e7ba536d6d1b5dfcf720f20319ad38c0f910495c66651a07c5ae2cf4b8d90844a0dc67bbcb691c8b6e8baf670e9d4f3910f9077224000000006ce3b17831d3bfd8c6e0e859fac996ed1c64a059f8cfeeeeedd3a98c4eac88b907fc6db6a3988d5e5cd6515c0ced869e6978b57d2995c947fc745f00642c55b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424733435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1936 2180 iexplore.exe 28 PID 2180 wrote to memory of 1936 2180 iexplore.exe 28 PID 2180 wrote to memory of 1936 2180 iexplore.exe 28 PID 2180 wrote to memory of 1936 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b52e09247e39e79272b42e52b9550a9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53220d25b2e0c0aa923c9117fdc8330f7
SHA18ea85df314d7779b1b527bb68380d1b8d258e0ff
SHA25694696421363fc8dd3cc27b31e1d6abfe28f7f8ffa34a1e295adf71bdf30e53f9
SHA512576c14043db09f5c13a1c5f13fbd3f9cc89450f7040721b3e3193a23e9aec5bdb4234f714eeaa329c994075cf788014958af4b6d7f99153f7a7875415a663dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768b55535a819b79c248bcfdb515d0a5
SHA1526f88792bd9c0d4ffc2d548de5da6a0fe3e61e7
SHA2564462208c7e6339c4e952f0edb4843fcbbb68b77704adb987cb7b7fb3773d43f5
SHA512008518e9adb0f432394962ffa3a2995b9371a97e0ab552abc2084eab2bc878bba2541b975eb3d4bafd6d3657361f2d904df3836fbcbe5bb1ff9733c637ed0053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf2b32768368a5c0ea7b526324e3d85
SHA15ff838e17abb49dd23ff36c98c4213b2185308be
SHA256f821a737989b2e6ac26f3af10f46d2c67c2a73ba6fd92c1c88d9bb0ef08bc89b
SHA5127e4d9d410e67fc69e68fe26cee49f72de30fc7b35c6ad72d179191431f944fd86c00150c51df82efed43e38c2d1e4894e7d114b29bade8d9c5f375e105a26ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13f67b3517a5b2288d928fb1a7ba1ae
SHA129a572067757f2469add81013deec72620467075
SHA256ba754133d341916f6f41e7f29847b7f281c0e334ad63f8a3b47855b37612eca5
SHA5125a3833e2b1c59378173cf283bc478c207b22a87ff201c8b56bc49bcb142f27bfd616691d7d62193c567df4f73e906cdb3b1176415749805fc494feee7545050e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580da6671a6b30fc4f93b58cb1f0f2461
SHA1a48dda9d86307848263ebe612ab75b2d8fb9b93d
SHA256c043f7a5a8a1910690bd238b0fc87d8599e0c52323e559cca6c53ec4650e96eb
SHA5124711f9b6154ec5dbbe478f42525f1ef994f5d2a8dbb70f651dc067baedb5dff1adbc3e440da76012b043b2d6f483c6aa369f5a6fee9406e3ce01b5585be67746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603b47b031e302a849da867a682b3543
SHA1be77e4074cc0c9d7716c56f27b843527e1834f20
SHA256a9372e408d0496f8999fb5bca4236c52901f7351cc0416da9e33e9be0bfdc7c9
SHA5122eb9f87a9d2a2e24675984ec2f240ca5d9ed76d73a543d0633f6ff2c9d5e40c04596b3258f082e5149c89a815a60a336ea1c3b6de6c67e79620e1e8547c7e5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9d3b9f79551f5caaffcd0b59282853
SHA19d4d07963319c93114745cd0d12577015555d5cb
SHA25682b449f1509ec2592fe8b60613c841613eddbac0da47900087701cfb56703746
SHA512e6f52d0aef15815a2192ad131d49d5f52f6e2038387604120c26024a9c7fbbcba15cdf033f4688d96b29fb81b0253f5ef3914e32021beeb3c6d58e9c84ca2ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c337af771ddad12721871566c18404
SHA122f0b6d451347c18c2126ced3cd462b6aa8d22af
SHA256b4ae47b90a921a295c43f6fc48a0abd0f68a43251e6d8b6a6dc078648a8d7144
SHA5123669208ee35696a9fd1e30798c53926bbaf55009b5033e2c0dfd2e7b4a01e90f0d14493b6ed89e3a870f5192dad406a7476e961003ca01ea05d2283716b25d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26eb124a290d6feb4fafeb6eb0e8234
SHA1bb5841ffaa2e46a3c7b5a415abdd8471a3f14316
SHA256e459177347b7c63e4f281d984905719f2def47eb785fe5c7e7a806440741bf48
SHA512af5266ae5508413a400ae8b712fe18f695e1651b45c859046c42944ea229d8cd972fff4256b527c5a09d0fce5041938c7c3fb00a9e775d11f93af71dd25721ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caca3f47ee200520111b8fa7086b9fb2
SHA1f0cf85b7ecb611d758804b903c74545b860f1c98
SHA256e8c7370ad2d341cfdc62ddd2f9e439d4f9519f0af181671536036d1c68dcbccb
SHA512376933a82a7045a494c16395cf9cf7dad4c41a3bf268b5378cd608c3b83248aced6bce80b9114d3852204d6033a424f40481feac89148537007e88af07779b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54000283e32e1d2d1f1f3af84ff98cb06
SHA1ee81f7b42735d7d7172efadcf4fa7afd32842014
SHA25601096f08cd99b635e8e86eb096bbad100638bf296970a0cf8df974e731a8d8e3
SHA5129bb618359641d4c069e53678d00f475a61cc3c2449456d0af6bd79db0a321e3d1e8d64bb45441042d3ee02383625085d78201b481de858ecc85004103f45c8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3c744523f2a3dc130463462d91aeda
SHA1cc690e2b12e74966dc004d6bbe3ebbf8f18f5f36
SHA25651699424527ceb001492af422986ba56cff6964b4f8ada719e7055573438d395
SHA512e71018afaa9c6cedcc3d2a2a181e72809c29bf497cee8c5bced4cd96edeb3df069df57aca0831f1240bb2e8946fc04ac89052d014d7cff6a79bb68e6aa388f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0229e9585728eebf30e38096a9eccb8
SHA12fdd93ae5325a61da5df50d98db4d0433fcca69f
SHA2566f524f18b4f45b90742ab0a7689a973acd370a8dc72ae9d3358e7611b01121b9
SHA5127f11d65378d7bb16fdef362656db7975fd52dad63bfde60b9b30184332aaa58dc5a0c305714de4098134460fde2f231156502e9d9eaa05df77d315bd07def57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55253b5240c7a096690fcda17bb58c063
SHA1f2ebde12d37a533b5de2e61abb258fdd3eabcec0
SHA256fb961cec7d44863af17c7078cdcac1b55eb4ec094cb9279b7a3619b6535800a1
SHA512523fbd6c2664d3effcaa2168d3b59dfd876730e935180000739424b5f302d34f2c3a0b63ac500e883567e51211e51eb2d8cd9a65ca45a117995ad68aff3b17dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0c6b865071b39857500ffb47836027
SHA1fc73d6e35e4db911a2884831688d9adf0f49762c
SHA25662f4b79bb35ecbe655f813996478d5ad6c3eaa521ce1c1657b44c2398ddc419a
SHA5126b464c59c0e0d00ee9bf8cd054635b43e6b6303d4cd1e4c1ddff01af52bb847683b4c740003438591b959bb346a6fc2de361ace18f828d5ea3a665a7c51c3622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861ccb1409cf022d59df6bc9eb9fc3f6
SHA14aaabfe36dfb242c9a6e13cf9ff096c975deb9aa
SHA256e3e47014e8287322e2f7ca525f927bb3370087123158334c27bee0bdf846c806
SHA51266afe2861a48d4b80b393dcf9ade43081c91df6829f5285d9422a5d8bd096fda8eaefd6864385d081e907a2623423866f43cc1010ffb80037ac8a6765eb211d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d221dc7b437cea454bdc07b6a7c10660
SHA1d08f06f1b6f838f0dfe0cf31e6bee090bf555549
SHA256961c3cb2548c7a85c9807771728e9f73f838d74c8b2fc46614a4436a3435e00e
SHA512b23a15301a329de69cf11594dd7126fb064a7ab9b6343d0fc1684ec752bbb221cdd3251b4910dca8d2e290d945492652dce92b42cf9032f9d883f07c465d1693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba741f71ff35b145fd2f686dcc9f49da
SHA1e867b0d7ff30e446f83481a930211c8032787922
SHA2560204182599ad7df62ff373143b631eaff29f92c17f782918d6233d2e2e2ea1a9
SHA512a2beb00dc80bd493d4510f6f171cf3d97a7c2336d52c2fb7efe3a0037bcd4b0beec0462b84a0d1cb193a3f8db94151bcd3eaef90e8d47c29a54175a032bc7adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502cfa364141d6bb5cdd40691918530e5
SHA13ed05118c6e3e8c62a47de801cab84809e7bb025
SHA256a4162affba425d284733e6aea7c899e940dfdc7abb5a9c22e35da82b0f545697
SHA512f025086ed9da128c374f66f954344455da1cfb42ff0f674cade1051faee8765d14803de00a65254ce47b581a722f20811c28a3e1b09208758a72509a159b7eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723fca417468d800cf14acffbe226798
SHA1f95b3cc259e49a58918af5982afbfc9d24e0b311
SHA256bdad215a87999356d998e19b2f7c5e30d1a1c0e925e5f675eda98e2f4420d89d
SHA512544ee16fb7725bc549efce258efbbce149c06969e71dd51976b45e0cda99cb703fbf91f7319dfb2cb27555fd3aeee8f112fec2ec92fe231eeb6c40c3647bbec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745d65e774e427d3d9f26e0e35347235
SHA1d66bb85d6902abcea8bd321daf16e91cbc660aca
SHA256e5ae15202e86038fb8a9bce40ed73e54ba1f621aced00e6b68e0228946504024
SHA51294d83b725ac66e331aeec9744b2b6411b0d7f88bd89bc536df4522d54b7f9046b4723fd545dc4e9fd3cb4d02683362ecf797466ed3177183287b93e104644c59
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b