Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
244cd88c3179ba7dd0743fde1b030ef2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
244cd88c3179ba7dd0743fde1b030ef2_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
244cd88c3179ba7dd0743fde1b030ef2_JaffaCakes118.html
-
Size
53KB
-
MD5
244cd88c3179ba7dd0743fde1b030ef2
-
SHA1
c25d0b28f5db66a1d1500af0fe8d440c8621ddd5
-
SHA256
18893b2ed308e5ae084b995b8405acf31f767e21d8a79aabd3cf88384ad7f33b
-
SHA512
083bd8122882432360f8cc2bf22a6344a230e3b139212430b71798303fa03c82a0e5056aba3cdb1d1c7c14bf47c1743cdbc1c7125ff78c5bc6beaaf5d1f4d4cc
-
SSDEEP
1536:CkgUiIakTqGivi+PyUArunlYKz63Nj+q5VyvR0w2AzTICbbAo/F/t9M/dNwIUTDq:CkgUiIakTqGivi+PyUArunlYKz63Nj+o
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000afc5d3e6f8c6657a672dbc0b7edb30858b6a80ca21804b698b0ee3469423e77b000000000e8000000002000020000000514271041a55814c7f597e81e0b94633ce7c02248a5cc812c65f8b1c37cfb2a990000000cf34ad8dcbb6aa29d91b35551a63e460eff86e2ff1b38665c0c618a3b9117e098658a24518f4793647b7d88a1a9b22d4a858d7a3db8ac4e8e1f39c8e848c7c8da7f9597e13f6a78b1b3c0a541ad76cf36b17dd3dc6aa1a938b1cdcf11241c84a61e1e82da37caf4d0e4f020d829a4f5f756ae6e714c0a408695ea47391915a9cf008001cfa8e70d15512fe29a78d3c6b400000006beae052e07d7083cbfc69038a25c68fed8c6a92dcdd1630d8b631b0fb37e849caf0656a52ca528638be20d61d7e1eaa8fb7a089ad8aa38c09e651150accea72 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426221434" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5031cfabb8cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000f8e67999421aa97bc9fe33b809b44fa706adadd7b2ca245daecf5ddb1fcd83ae000000000e8000000002000020000000a761ef3d5e6116b94d85637357b5786055d4b14d87c47b9558024aee6a124b50200000008991a143d6c72985196b0be04e1acb83060b5b929c04180ec24b750d2b5ee1e040000000786e04ee2fc6599b9f1a5702a0b69ecc5e83e4f354dea9f0c6c646d6b179d4341168829b315278d3d6099d0f97950379580caf342aceadc95e6c15d18d1ef6d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5F2CA01-39AB-11EF-A5CD-D671A15513D2} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1956 1640 iexplore.exe 28 PID 1640 wrote to memory of 1956 1640 iexplore.exe 28 PID 1640 wrote to memory of 1956 1640 iexplore.exe 28 PID 1640 wrote to memory of 1956 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\244cd88c3179ba7dd0743fde1b030ef2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905f1dd8d06ae31119cac32cc67e734a
SHA137d81204d89e1d2aca346f5b402e9640952c75dd
SHA256c27ecb563c1577d47ea9a964c890644c2d619d4b4c83fdc74958729ebf5900a1
SHA5120bfb01ac3acec117de2b2481f42046e8d88bd2edc94b499a44c3d29c77c4705554b487bc00ea6bbd741754c0907041b4b93f1b71f11a57875300aaa66239493f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1d306848cd4fc3c3e1a5eb46c57eb5
SHA10cd975ef745f2dedf27a90bede3e6d60dd10baae
SHA2566bbe7757140b99eb8dd1d207abe5f4fa83d1d5ac49a218af2379a5b43914e9bb
SHA5124fc66a62a139ebb1be3019b733ad18f8c3626f9363d9adb6e4c6a1196478babe43ad631cafc8f6e243410384e41c76697dc2b4f034ba0a02ebcfd9593300f5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc7f6e73122b7b7ebf651e6a517e774
SHA10518ed628b751df72bf1d5b41b14ef2c2b5b8673
SHA256ff1e52a8a3113bab8b7c8dc73a35e6cb8b254cbde6f1e78d16699966fbdea499
SHA512f39ea6fccb8b3f5c2845a0f142b3a4807794d715c5e3a71993f788b80b8792dbed2fa8212a40d4f21b5e1f565cd3dd1fb275d0efa839c071b39820cf940d8ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbc2454f85f3153ecd4d932ac5bdcfd
SHA12ea483a01da7c31cd79e30085b6c6fafad76ad8f
SHA2561caf37e63a79cc6e90b09dc1d04b913e9f9398d3c06f6b12313562bbe770f8af
SHA512647a488144a7bcd63ae9214d95dfe1f247adafde2538e00041734bf3daca2a93b1ed632cf432a72daa0d342779bad69a2b91652f234eae7ab02ccd20b811d7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22caea7e82038b27cfc0bc57ed29a07
SHA1c11d03076f9abe846a8a07e28a1acc3493aab6b3
SHA256516439b80be23f0f585352c933ab3d228e7f2115a9a8278dfc941ce8abe1e308
SHA512a8a82f5f3ffc7034e732c88c26520fd3c91539ae445bb7f53c1a044e1fb6c4734dbf000acde064fb5494ef218ee5349c454093bb0b4283b2f4f58d543a44ca21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd3ea77504b8ae78a8ebadf157f439d
SHA145968b5255cf9dfe702dea1eca87f7f1e7282b55
SHA2561fb0d82b7c9fb149f6c416d455216a429c85ae12641b608579487e8e96d40016
SHA512183ec59eb13899964aeb0c9e3c0133e025ed9da5f6ebf1b690c42ba350dbada01c97097b7403abb6c0caac1a28d7535ca39d01fa02588adf0907a621e3be88fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350803b1d5d7587c9b5082c77c952fbc
SHA14b2cbf513228828a931df70af8eedbb7a34fdb57
SHA25600c11a03af6cfce2738b3a8b76579877fc8b6d7f4332fcdc11347ba373bf6a6b
SHA512dd462b891957f6c4169e70210421e7ba7b5872ded64c37a1d20e6788037093ccd470c2d15031cd83b4daba5178fde26f3a6eef98f1bafa2ffddab7894deb219b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b884bccf59e07eaf78b9260b38a307
SHA1842e3b98b146c348a01b7605be282f8f83b8133e
SHA256bb24347a96ed5e9d46d3f3a8fdcb74a26b7b39f46ce95ca6ab946896db2822c3
SHA5127325950c4d7c2c02ed9cc8e06d1ea015de8a22555ff150f93ff91bd70de784cea7d2986d8b21a1bbdcbefcf068c9c9cee2cd5cb7b55bd76381953cc6481765d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529148b887b4d78180de6ce7b7f71c26b
SHA1a54a55b7bc64b18358e1080557a75c2acee9080c
SHA2567073ff9d29f122295dfdf0af5150038ca00ef48809cea68106db8d4943cc6c94
SHA512623479bef767584f5377f9116fb0296dbee6d53d6ade2c30bc47f2a7e0e4e51ffe19b4f1d0383cdf3e11756a447af13bd0602886de32712780b3951a380e3521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59843e261aa8050be92fc8c0674ab390b
SHA1abed9fa837a62e493e4d45b97094de8364e0a374
SHA256d10c07ffa8f3b241940979ede6fbbd39807dd3026b40933bb199137a430c6910
SHA5125742c2ed761417b97dcb522a7ecf820b098ba66af7c7a3d6b856dfd2cf13b8ad5c083b1dcebb843bee750864c9144d525ab3840f50d4e97cea6df273bfc2a4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593de8c36256ef60d804d7f42c157de81
SHA1feee10983cfcd01e41694f2e0e3a7c4f4d27d736
SHA256835b2ae66ac37b33b6fdeb8d9f9e2a393d30002103784fb6feb66920c82b8bdf
SHA512fa087c1cd62441dbf12e9a63daa5ab8808442e3b2a006c906bd9ce0213c4d34013da07cdaa192471658ce31b4ffe6b0f452587c1d2862f1c8c14bc14a13f92ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cdfeb58c838644b95c374a5c920e1f
SHA1f1812f9971bfb1a325f49d38092742d3c3641a44
SHA256d0e33e0f7e0dc6a831bf8b9221d764ddffd4a617b55dd27a43d6e1d216ad5d92
SHA5127e91e56c44fdf02800d1111ed04ed18a50d04aa0562c5c84c748cb446d38c482af05915a43af89ef6f6d9b9cb7f8439d6449afcda232045270f3a19cd797b8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa107f366c860cb0f726f9810624cab7
SHA11776a5aa41eed7e7f5cf0b6483f48241b0b1e5b4
SHA2569da67fb4ab1d789c49948ed26528696906b986aa0d0062969e60d64121a85d1e
SHA512f187979a154341df5318609e269fe0e7a54399a8b81b8f86da87665651d712f185f4e81252d04abe6365f2b3ddfb9c81fd3c4d7ac0cbd22f5baaf3b6944027fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9888af066bd45ffb445558d9c1a8248
SHA1cc21d563b19d6f9c934908121cdda8e61535e251
SHA256f694ab5675cffc01e9b3d7660dad41fcd02d586fcfbe2fe9126a3373c3d47e0f
SHA51272dc764170a3b8cb576bfdd476c74d3442c4542dc5f7a400af8e9a5837fd6511a42b6b5ee9a3067185494a96921ff386da6f4583df7b8b5899b66a4dbd6ad934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3ee7745d089c80ff5f08dc372c282e
SHA1d8dc88bc9cc22aacd3a5d680771c887d62605d16
SHA2567dcd1b25cf8a1b3f31865f56286ca1770dd2458716bf41f1000ed771a0cdc0af
SHA51201dfdcef2720a6595a338b50348061887c077703b72769a0846b56a333653567e5550a301c2c4fa90ed2d399e79f633d56c0d774db74bfa4b8f10584559b8b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cbe6cb596da8b71f359bb7b4192fe9
SHA16d5961f4f886b2462d56e026179d1db7f3a25d23
SHA2562c8132ab3dc72a7f1ce090c970ec67f0ad2c5fe23f95c2d17e8075c342511479
SHA51201c245ad241063ffdeffa357a74439a5d1e96aff0b1af9cb8c86f1122969f625ffe26105c81c4c006d9b68bd71e21261c3521e77409674e2e7b356ac14576e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7e8ee6b58f9f17ca90f0e19dd403fd
SHA175a322990d16150d31db7e72a38a471f5e895643
SHA25668e5725ec7211d2ed3942e9c3815ba3ce0d57ba717c531f3584eb0c42be2e0d3
SHA512e650482958001dcdf85ff24c8faddba724145bf325a84850000b5eb9ae4a73ebad00e465e77dba27ee75edf5ce7fda391539955356b90b90f71229cbe5ede984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fd67af4a3ec9eba0d8e48abcf19f4f
SHA155ab4c3cf614c0ee4568b9ccd5763eacc0041189
SHA25690f0d7adc08b00f5e12a2333e31a06662636454300cbab5cd30e1a9580d5fe86
SHA512793b55a8fa093ed12b5f70f1346e188ad9ea65d0668311288b4bfe0e9f82045c4c6b339381d2001629775403950b740298e9a51b1cfb6a656c606a2cf25dc483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c500696fadce8a82f27f29d917bbcfab
SHA15311ece27d21b17c699a34c3e5a90ebf5294b39b
SHA256e4ef6d4157fcb2879e5cb3bf206790a9a327cf3754c5723931fc2d2a0b345b84
SHA512997a03c193d145b65da0054aa6a4ed2d311a7c1f2ea882bcd6be4138e90d598211f5bd48c5cf8ff13c33231c8ecb9bc1ee9d3bb62cfe07eb06294ccad02f5ca3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b