Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
0f1d81ce2d6abe6edc6c984741ce3bb1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f1d81ce2d6abe6edc6c984741ce3bb1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0f1d81ce2d6abe6edc6c984741ce3bb1_JaffaCakes118.html
-
Size
174KB
-
MD5
0f1d81ce2d6abe6edc6c984741ce3bb1
-
SHA1
f77c99d1db2223d5bb44a055fa0ca79fd6d823f8
-
SHA256
49649e887e7f0cf5b78e4422c24d848439b32629363555c58bce0b669e4ad6ba
-
SHA512
fa6fc90bd0f991970ecc9cb5ed1f1a9f2b37579dfbf6070005b28c2312d74fce50812991a0bc30a72cda63bde265ad6c6e1c5bbce5aecf45f00ec1640efe13c6
-
SSDEEP
3072:SYUYyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SYOsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D50B5611-3321-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a39ea92ec7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000fd49002d031b60a7985876e4e34d0793f9e118c3c5cc5945ee951d2f9ef16ccf000000000e80000000020000200000007aa968203d54300a92f91d1228171ee41e2994904df057de4953bb2814941b8e9000000010088e9ba9631020ba533d349d31a4b36468e8afe55424e1c34b411199e8e8364193898560990323767379a934918f1d0c968ca29de580cd49a2189c761342816dd608e5896aac4a6639a2f5297a97fcf7ac18e0f2c0b1dee0fde2a0abfcb15791283f4e98ba473b484342d3c1e5c08a6b93e7c90fe1e545b0a5b39a01efd2a0c97fe7cb1825c252dc7e20ccf6aa540540000000203badaf6ee14e4fab6fb5b0d209b1b9b483ff245f13102319c1288839b1f22b6dc5c770bc06a5676087d3f3778725f13b0d9a0a73de699fb13e681bac5b07a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000047e8403d473758912c2d22de161128274c26bc4e6d83af28191b9cc6492662a9000000000e8000000002000020000000657f62d60392f616163f4683b1f65c31a51d32153989b26610960053d07cbc6e200000002dd433761fd5e5372ee7b88c948f20d379c9655878a5b350bf858999dc7a6fb14000000074aff41a47ef6e91b855511cce91dd99650dd4116f679da92faa3c1d5cbc2afc8cdbe2e2220ba05d6c20986444e997eb55ec0f7364df69066b3f0cff6665d7f8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425502454" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2052 2236 iexplore.exe 28 PID 2236 wrote to memory of 2052 2236 iexplore.exe 28 PID 2236 wrote to memory of 2052 2236 iexplore.exe 28 PID 2236 wrote to memory of 2052 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f1d81ce2d6abe6edc6c984741ce3bb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e00aeb33b1c29a7a3a7f562c9e4b40d
SHA118bdfbe3fa02b12aa25096c8caa2ff9fa0cbf2fe
SHA256ed5dcb89602291ede25f2097185c3000a92432931960b09dcbe98f00faf75eed
SHA512b8c2bb91ac134958a222e23e5e62fa0d7918e25403967b5796520c1ab290c4d2b5d5eb60b391918f103eac89e828eede3cb4ce35e678e42dbb3714572f31b8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449e061cce297f414f9ff15c038c0027
SHA19cdf3143c8dd083c1742d3b15e17b0d72201d5e7
SHA25692279be5aebd3b27ad91ad7eaedd83cae0bc231a198fe4affbc9401507b75bf5
SHA512c8ff90cd044b15475cf4a3de1e56fcc64d2df9e22c7a0d67929ef4b22eda9dd9ac116eaea45681547993acb328abee3ed840bc0fbebf9861df520906554baa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba78660b903a37b75d9e56005cfb9a39
SHA165cd4d85c2c83d7163c6219404b749d07ffcce65
SHA256612bf8482bdb3c3a40dcf4afce63ef239d428a7b801e1fe2edefe09c066af73b
SHA5121b5bbc03e9212ac5119d9be48be1aeb728b0a62f6cba7ff3eeee6d7e5fd8ad342a444362dbbc501b4acecab77b12245e169a10bcc3e7c05430262fd2a00bb98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1593582332e58ba251f95d7733afe2e
SHA13c04e6cb6731525c855447a59e35486dfda27659
SHA256e3b21c9b80f3e0990e568f8b1266043d56876b1a75de4e48392f101566c22fe4
SHA512684166c755bb8a8bc02c4acb4954170b14ccaa7a5fc60c8955f3f052f2217ec9e4186f49eedbcb9024d0700216088fea177ea99a03085be840de9cd61387531d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585533304b318f40f919d762c15845ddd
SHA15668600543068979f30c3f53367dd5d694472af0
SHA256abcbd7c550fcf46ff1ca74337cf90d27f2ffde983999476d19efb3e7f051a2e8
SHA512e539949a8a2d0ee98956efebcac93d51211a9f3ffedcb3f487fe572781020fe5de06215747852fa44f5d596b023eae7dde4a9fff843674be532083b859047e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a47cb614ca737d290875cd4ec15f4fd
SHA14d0508141de8af1cf22df8fdc798daf284d53c5f
SHA25699519fb93675ad8e414db2915e13a07ca498afcbfe93178f4528beefb9f70bec
SHA512b151a8bf6ce8494a3d8d7ca0711784a3d3385805a4e6cacde3f1512e5e2aaab4d26c5ec00480e53e3e7fd291c916580801fa4d0ad49381ae97aaf4de1fd85c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1750d312cfd87b00428b227c7e7c32
SHA11e865fb2db9fb1f7fc514805d47350130d355eef
SHA25628e5f3449a22d98c04789a618964a5805f30f15534a650f5095be91540076ea6
SHA5128563fb9c26b2ee1bb81327101a6ee38e9813b7ccdb0e36e96e7521bcfaedc66876abd6e95d2d1865637edc432c080047a74205087b6d4f0643fa41c5f9f4f738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3d5c5abb0f06ae9fbe68524b95d973
SHA1008201637916068294a95f798c2bc2189366b42c
SHA2568889dd3513f69ac1f36dd45ce5ab98348f63e7b966fde1c3b4195cf1a0511bf8
SHA512f2d7f0ede22804f0a2e2bc1392a6f2d82bcdee528c1a28d3bf143810db6f1fbb93608839275d055314871e4336e2fca7dd989c98185a4dcc387f9d618839ec37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02c1cc59a24e7378916da3568568826
SHA1bbdd415df1297913ab197256ec1d9376010fb8cd
SHA256e398ef51e605b840caa651d343732d08b40074316ffc33f7195218662a6c0ccf
SHA512707a895e5b18c571eea48a1673e75521ada6fe3d69e85aea63b483fa9a09315a7396b56b5c7002d58251fe3af3f015c68a06046f88fb08d38901aa79468c2c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6acd55cc4a43bb1ccceb7093176062e
SHA1c6c71dccf9ad135d3826a17a5881c3646faf3a44
SHA256fa9b1b147aae4cce3d3038d2d158b50a7e1c4df5574da07000d454fd31bbfe1a
SHA512d2630a62eb346f2442964313a773e51a0bc01cbea5f8c1552f613a80166fdb5a48dbce2c8df5cebf167759feff5671510cc16baad3c10894e2f857b293365879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc078622719d1e3ad92612bba64bec04
SHA1c1b6ebae2f2787d451f3ab5e56bd34e9f9647c54
SHA25650049be3d05f95a9f244ab02d856eea84b4b84f867a4db026850d11679278f51
SHA51228d7cc31e1d8e770ee6ffc37b272d570aebf0ce84c858cd17329143884020314be167442f8c490542c933c09edf70ea356b09f902e7508cfd28ddc4be79ef805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a883393add44a8c4f4d8799fa0d030aa
SHA1f06bc2538182fdae37f44a5fa468ae654d04b02a
SHA2569e6e5842b30ea0a2dbb5d15e4fc0a033ff2c92fb742a7e862375713b678dfe76
SHA51291c0bd24f408c60bf3ff6e47106c8e99643d27af0f1c0a03ab95399e05f1d89f7b661c548f48eb6cdd05e65646a03d92bec0e562626f14cd4b02f7ffb3006432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e75ab0590cfb696c711c859f258201
SHA16afaf023afadde0301c1ff54bbf224bbb582c240
SHA25658f6a5397b4ab2db3423903cac466be25d90d8a0ba99cfd436d847f9c8443229
SHA512a29d191d4d8efd9b8a80cf1fb24e148d070405a7ad5dad08b397eb0a957e5b6c29f56b0653ac4617e06df75684e0e4ee9e7122c4a7030f1029d2a7dd9891351d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524346b1b5f0c76c8c7fa643481054f49
SHA199c1586b7a4784b6de42da08c11b6aa109901572
SHA256994b0e99aed9f5fa23e6b2d481e87deedf8546e0c1cc9ca1db0e420f3bcb9a53
SHA512de419dc7493cbcf8cead5867d49f9abb11230c66c890cc1da178b144e87c93736dc6ced443b1b2f88970618830756c165d9466e05033d41ffeb66960676196ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83e0f2bc5a9bf8a3ba042f19b2f34bd
SHA1979057588006ee52a6bf0e351a687bf0a0247745
SHA256b6ae7296e692525c583e3744f4997976bbe06b2d8d8801c1acbdc09837ec7cea
SHA512f9dce7fc83bf24ecc806fe36213646cc8868f8ce75ba4e88b0619d3d6f0da69292d120d31f05341032022ed1ef189f0cb0a6e9e475743fcae24856c78a9175f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32636e3d97df3b18cde6d73b8f176a0
SHA1ab45cfb711fb948b5b6f45dec63b3da3d532c73b
SHA2569f4d0cb82d79245af26daa7d9c0a359e08caf9196d0a217cd1a1aca99437cee3
SHA5124ebb1033b9a4c5a2db68b32f9fd2bcc1d0e3817d958ccea84b4ed0558df7ec242c999166bbb93c0f38a3b415358eb82ea8560d7a8a3a21e773d4612599313be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf2fcfc37f3603ef57edf9984871634
SHA10141bdf56a77733629f4b7ab14af0bfe36ee4472
SHA256d2624f88e02f4e787fb136686cbade494ec5a42d36c4eefbe9210136b2dc314f
SHA51282c3771d7e283b40d1c2d81796888e78801a2127dc7d586fac9e35bc66b49b7ca49768089e676108da7623b91d86a4d566a69a4f299b371c437a82fd4bdf2aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbb5f153b2d18048a6ffab64e2242e8
SHA1b2ecd3cb1e3436aaf5bd8cf5d2a3622d98cf9266
SHA25616b7044d4dbb9ad529a89331914cb192279965bca7c6a0c9d54a45b9f913670d
SHA5128de95b38fc6d935a418b32aa93b2e32add2c16a9f34720f1d4d8fad6b14f8b99e88809e0b562a0c8bf001b64ad9a5b2d6c48e36868cf10a20b7b37ab91136d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c7ce200390f9684871b2a02384cc76
SHA130098f53f8db2646a3b606034706047e0c8e6b5e
SHA2563e28f92b15c714ccdf10c36175011146f9c2c41ae7fc662a8c3a51aafea06d8c
SHA51210699f081fcf0cfe1f18cf3729a5eabd8d4b42409b3d76e7b735678df6b6b7eb138905419cf2a3966665e881f745da076b125518cda047abdbca09fcf1e369ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538203fac9e30f1ba9bdc0896a72c98d2
SHA1fb4dd0636b394a689e145eaa4b6038d3ba195e27
SHA256386f69091ab6deee127149b6cbdb596fbf0fcc2c9ed7e05b9ec8108eb3a7c77e
SHA512d333e96b9a2ab28bde2847601d467c06e61e6521193e27b9d0d6573e774527ad608d719256fc302a55b5fb16b54b6cd541ad13fa6a2a94e8742ba96c142be248
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b