Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
0e67f717fe37997fb4c46ee9ddb9d2ef_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0e67f717fe37997fb4c46ee9ddb9d2ef_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e67f717fe37997fb4c46ee9ddb9d2ef_JaffaCakes118.html
-
Size
11KB
-
MD5
0e67f717fe37997fb4c46ee9ddb9d2ef
-
SHA1
1642e96f7d84a0cd58a4eea3cc356e2f69cf0ea9
-
SHA256
da6bc70ea3631b9f18b939c9e4a9514b6ce7f5d0bbd765ec8d909188645ea958
-
SHA512
c3d2fc602acbc1c7f2d0385704690b9fefa6b2c6e149d32a17f4815d7fb30d0cc6bb9ce8ff85f7251ecaf50c7da4317d046feaa8c53cfe762fa235f73c2cbac9
-
SSDEEP
96:uzVs+ux78HYdLLY1k9o84d12ef7CSTU3GT/ku3pYepFfrUMzqzFliFHlVHcEZ7r+:csz7WYdAYS/SSYCfU0HPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A92CFAD1-32FE-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bf92b0b6e43d2aa608fd17832dec72157ed5870a7889dad906e9cb9cdf867f20000000000e80000000020000200000006ce61665a954c90a6704b3b07c4098403c9bb16efcfb3c59757d40712f2087ac90000000865b76cca41fb8c94f2e85a6efb12f76a0f3c8e48078f36a2a1e33268065e887f1b1ea5b607d3299b4c28aa5667919f22bf788608a6747394331b5130c32fd281fb0ea2c69dbd02db93b9b3af44794269c3c7523564ae449bb9b8eeae6884f8b1ebfb2c1353bb95e0ef9b168a970a10b38b052fa54395959323d7e9f54e13ffb171c7e2bf5b38445c0ad53959e2c6f0440000000a490badda20369f5768bb530fbe059039e6b24cb3822b3c094ddfc8c6c2e1f975511c8a3f381caf0d1fc75199a5517664432a6bd8c4b1c59fa52b5162b3e7d15 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009705ae6f9e0cb65a50e1eb54362406f6a8f7420c2c4654cffc52dd673df0ba63000000000e80000000020000200000001b1a1fea2dd67755181c68b29f19d54926eea0a93c328b435ea14cc24f4a0e6720000000a0022836b6918e85e067d819e97e432a06499796d700960b07a881dfefa6342b40000000f82daf638bd2aa56a67c588187f3ac1c995c9fdd05e7cc04b08b27c8a3269cf6f3f51d28dbfad4423c7e69b69a0385b591d2c0b81e819677b76bd2581c25ecd5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425487349" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2073217e0bc7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2912 1680 iexplore.exe 28 PID 1680 wrote to memory of 2912 1680 iexplore.exe 28 PID 1680 wrote to memory of 2912 1680 iexplore.exe 28 PID 1680 wrote to memory of 2912 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e67f717fe37997fb4c46ee9ddb9d2ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de1352c289b6f8cd3264aa9a3a05e12
SHA14845ba334a5ad85f78c6e5baaf182401db2869cf
SHA2569a0b9403cfa11b5265c300d770f3dde6294dcb7ef4081d159422b6941873a397
SHA512661928fcdcdf92ffca456799f59d54a5b9987d86a920029aa6c6a6628b64a7da39ca0d3a36168f7fb634a32c716726b822f92f1b1c380a9ea27e376e4e2ac325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57187f55fa92a634171bc56a21099ef
SHA16a0443a519be6350c970c65de2c5e91d64f9d9ae
SHA256e80a9505c8537510f7a7fffdbecc709f9bc1cc90b5b0db13cd6cde8156ee2b01
SHA512c3273ec2fccb7225947aedbb0190d9a3f996bbe8229ae3d7cfd35e7a18d80bc2cd44e167fdc3503beb4fc5084631f228037b0a32337f6f6dc227bdb11107f50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0df069d9de9d8c90c3e4e1481467e89
SHA18e78d7f85949e8d1a9a95d60d5735fcad2bee77a
SHA256ba5eeff855027cd66e7b0ecc603ab85df345bbb00ab48aad023a46826e15e6df
SHA51219873c4316381a346b1e208a696fc84a4f8f3290440061f67f8b4b59df66a1c1bb4e2b94cc8268204309615129d72e726fdf55e749d731725d49b1f25d7e4577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8da2d0f67677a45a95e89b7bb5d75d
SHA1b7e1e41aa7de0c628ec8f7618ee25a04d4f8aa31
SHA2561aec16fb8ec2139d0bfda177a7de8a8e1016471490fbb4643c769ffa2f0781b6
SHA5120191efbf5b20e1146f701c4a124c6fecb0d1226e2a6da44fefb7555603d6f6d77534c11e8910d189c264a18c5edf71c4cffbc21631dc9d27cab0455703152510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55837a65d5e93bab43dc6efef7b30a0e5
SHA1a9c740192ffdc70973b06bb20dc54a143617dc57
SHA25681c23587cea00294af44326d656d01a7433c94a1bfbfe1255f9085913892d5f9
SHA5125b5865364035f7dd62472bfcf9b0c2d3df8279ce2d26b35b31879e86904d7acda85bf2197ab9d2f77d5698ff14a51bfe9c50aecb15f8f21732ed81a3978baa19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099864c9948c4d15def6011218342611
SHA126e39c67a0e2ac2c60f900b08f212c09940b8886
SHA25657eb204c767b98cdde9993a011d0e04569a5d080f2773d7b82ab68c68765ee19
SHA512a7556d9fe0f11113a5ece7bf46986899b390a53776eb5d346d19933cd8f897dc8282d7fd1ce6b5744cc5d61755941d3af42ab1f7c3f40dc5dc00a9c923376e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65a49b3842df7bde1c83768edee3f52
SHA1c038f91e524e319bd4c299c623aacd325bd3ea41
SHA25662eacb0d4362ca32cb688ee2004cb1671a34a6501a18d6381a2547286ca1bab7
SHA512d4bf1232813c2ecb21624447558fba1eecad86ed4700357aed8deb8c381476cc23f89e3329483f1816230c3141544c83e93845387cee8d6f691033bf89a9d8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44b41d981e2a054957f70fab48f7052
SHA17829720b9e427e6cfbba6a4459500bdc273073a1
SHA256744d872611f508c3d49477ceae71006413d6c9f439fe7b17dd9cffffcb49fa8f
SHA512bdee32ff9c6063de63b5bf4490c5a5526112b244769a6349da77c12b381792cc8a3fd47bc3a2a296d2e4d286b08426fc7f5321758bc8a56490e39632e413acf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f81406fb052b8a8b3501a0ad44c8e00
SHA12cc90211f74714494ff92dd0b94f2a3ab5e79f85
SHA2567e4e712de52790993cc3edf29eac4b8974d87801301c057c2583a0ceefa1f56e
SHA512156bb3c0f96984789ae3c049d4ce88e59ee604ca387e48ccf8d9de5bc989070a4a19f6b963910cb5093268bc69063e5fdbe96cbcf8e1a3d517e5243b79cf1414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ca7f3e462e3669169e93b3e9f22702
SHA122674889585221784eabd59b622cf52937852683
SHA25628ff8777418fad86a1493e2e5b6d31a125fcc0b38cf63aab864e45a11aedd14c
SHA51265fee10170ede7363d062da7909244fc69d1b7bf029f32c3198e134b98171bc9381a27ffad6d91f5a7ab89a951f753b8b0c53ac560076036c7809bfc6533043d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186c511c1c8451b6c0c9c53fd529ab83
SHA1208a3b90af07efec66de4162502db0d19e0a5868
SHA256a8a9bd9e64b1c08fc3d991e08b4b601604781da375d7b3ef3f22a60fc122f0ac
SHA512217af3edcc0f61a1caf4c0d723c15918f86c6158c9552ba9e307a4d987622b21cec3e83578c81f2d9ae2720375c8d751783c55f306becb59eaa48f9768bf7689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e9d34e719c321e200994f96cf8d378
SHA1fa311074f49a86b52f7bf168a0f070a1874683ef
SHA256f5443c8e611552e6f0aaf375981cda8766419b51c80e56c3423dcef0e6563089
SHA512e2168d67784fc7f5c5c743b0dadfed6c9530b4a19fa9f45bde8b674f6f8d132215a3b510235e615529e029a9d7d431b341d0f15dac490fc91b25764603689b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96e80f9d0e98b277a987161a129613d
SHA19e5674598f35ebccc6a046fc79aaa986f5482e62
SHA256516122d67e11cd5205776fad4db62dc2bcf52c8b63cac9e72f558649313e9a6e
SHA5121a682e0f7abb1557922a3b058a0aa617ea4075c54cbb23d2624908c09d385f1daca9994e373b7af07d8905c702a930bac0f16d9c7f0bb425ee4b6b43bb3c7ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f48ad9d51fc96adc406b6b0abcff34e
SHA1bf9be35a2826f9ef0aa33006954a42e4cec11341
SHA25613cac0dfca279ef494ca9cf7baf66b633d53cad593ea6a3263aa67c5f417a14c
SHA512af995417027bd60185d1874988b0c90ba2c4c1b62be40f2a537cb7b32d86e183e79620dfbe916622cc6edb7b461ac9ef3288b60550273170981a48fc6e4c41df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57581fabb969451dc72411283f9a97724
SHA1aceeae7f6ea64e192fda4a5f76171ebbaaaa6890
SHA2562a159887e3f9b9247515bba5d11e6e3d2f2a8e8c3078c225887cdd64467bf033
SHA5127e9b012962c3ab3d325ae570fb281afac792fc213e82fad772d2a68edaf55581a79cb4695c4303275b22efe64e2abbd1001e8e1834ec18e0bb2b98f391eb67a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26e38844cc729f13621c88b4a516024
SHA13a3edab3dd881bde9e987857edeb37917258b8a0
SHA256a0912b1bae0accbc91cac7748c74c528863ac187e6ee0320cf0f2586f530f0a4
SHA5123e2a42d1ede7673400591ff4989f378417f9170e8c04f8db66fec7c6e30529a79aebfe47fc81579ff15d6886c66b7156a02e88815bfc59d9d5bd49e5f1587a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715b6bdd22b1000ad9fe49e36c5deb41
SHA12b58d766251a1497f03d99180f8c2215f2832042
SHA25658e287e47b40cb6f02c4f7ad92c947292d4031ddfe41a36e992e86baaf917923
SHA51279067f9d455a2e00cc6bcbeaa6366efe1f2f5f0f8b687d2d3537238296965da492e6073178b08fe49eda60e8935b65060d818e6fd44486e744a6b6e06bd918cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e42eac9cb772c4383a6e8296e2402a
SHA1eec955cac46904aca41ae4f8ccd0c93414f72d5c
SHA25696f76c31437917b8396637cb9eccc5569b48b5dbc5122ba548e103ce4ff4c62c
SHA5122bca6bc18f705925be9ee1d8c59aba2b0a4806d8b2bec8f9be7069266bf7d875d4a4c701aa979bccde2977fb3d4f550db7f166677f072bc3f9016e582c08aec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51879805de996975f808da7362d36984e
SHA1d2a337c66d6330eaad5956cc875a827c7f74c552
SHA2561d28d73fdbea60bab77d65a1d72e7bd426a418eca0ede613c357ebea6ae5fb7c
SHA512186f21f4cc29ee159129a373b99cbb3266f57c0cd340b571ebbfb59530007bf74007b408b447c53ef0d17eb4b2d604f04ce23c6daabf2afa5e2fef8695c03b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8f808fbc0a27ca8a40b796ac26845c
SHA1557782fcb95daa954fade226319e1f75a9462c64
SHA2569272c21cb7a643f05be455f8d7f1f6bfe336f92e5d638ba9499acef4b0196c27
SHA5120fda427de1aefd71acea58f06fe019dcebf42421309bab5f2a26ba2023c4e455e54cdce70915f6b1fb2537c58c864ab8baacf9560eb4c73f1a0c6430922c005c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724cbadcfdddc90b075479f592ea7206
SHA1ae8fead92f54764c77f108f53f29708d26f266a2
SHA2566efd2c85ef8df36e78b2f3870ca3c47f226edde3b5f4629562bc32b59df4b847
SHA512cf268b1b4b15f4591783a20a6cfb4cec1d75a06ca9123868f32231628aa8eaf0ab773916a16c0df477e0a96ab7d543ccae76e746f045a980dd05d82ae7815dde
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b