Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
324870b7c5941d97d3c4581a5c4a7135_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
324870b7c5941d97d3c4581a5c4a7135_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
324870b7c5941d97d3c4581a5c4a7135_JaffaCakes118.html
-
Size
17KB
-
MD5
324870b7c5941d97d3c4581a5c4a7135
-
SHA1
23f91673e095b243e3b94a1eff0ad4d1b4a20174
-
SHA256
9d375b78a0cf4bed9496baba5b06c8d112b0b3c4180d793e63b08a94a764baa2
-
SHA512
85bf19e2ba952c3ea603e09fd58fe549d4a3b6979eba80d09b5d3a57e1fd3c331b45d2eae0cd46d3b8052a911557bccd7742acc55d2943847413ab81ea66f45d
-
SSDEEP
384:iAjJyttIPAAjJyttIPzRAlLVoIa9RQTH56dd:tjMttIDjMttI7RA9ARQgd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C34FB11-3E49-11EF-B65B-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426728868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2832 2208 iexplore.exe 30 PID 2208 wrote to memory of 2180 2208 iexplore.exe 34 PID 2208 wrote to memory of 2180 2208 iexplore.exe 34 PID 2208 wrote to memory of 2180 2208 iexplore.exe 34 PID 2208 wrote to memory of 2180 2208 iexplore.exe 34 PID 2208 wrote to memory of 2560 2208 iexplore.exe 35 PID 2208 wrote to memory of 2560 2208 iexplore.exe 35 PID 2208 wrote to memory of 2560 2208 iexplore.exe 35 PID 2208 wrote to memory of 2560 2208 iexplore.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\324870b7c5941d97d3c4581a5c4a7135_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:340994 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:537609 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e17d316ada45a92a9a119b3562bcf5
SHA1ab7c242ad3e988c75befc70e7a2e5606a80fb2f0
SHA25622f21afefea0a092399fecf23d981da15960e3d7142c6aebf6d18a06ed8025f1
SHA5120b64776a899949e1c540ab047205ddd0ea5395b2cd4d751be99b608da55848aed6876efe0c88b5a4163b8a89567c04af9232d807325a1f033b9f26a3bbfeeab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d6e45a01ec30664fb3888c19da6199
SHA17a53194ee09d13b98f2f61b96016bb4b2f946793
SHA256eaca44d6ac14be3e744c14d63522d150edf43cdb497103d1336ffe1e0c5356f0
SHA5128101c4917daa3d12a2ea5b84dfd440cf62a9b5b18ac647c41e73f7764af5ea58bd10405672818d74e1956050dbbe089a8ab93289ea1adfaaae270134dcee3a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be18e9888bff056939acf1cbbd43dae2
SHA11288b4d31763959bb3a241b8e30de4616e03bd6a
SHA256d3bc0fe6b20682cc8a3631e50aba487ae5328d87951bccf010faa25664ef20e1
SHA512eebd95b428a18b2d8ca5264cf370d84f07f88adbcd9b90de8eec275549a7c91014b39d1902c7d74d2767a7fde9434713d8b6f6a4d821a5c9e582e9bb78336810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7db7cdbc375c38ad7706478f4692e1b
SHA1bb1383e78de33f6f50305b2e42a7e0893a00b593
SHA256ffe05b26ce3eadcb8d5f549431081735b8305a9f45d53481639e7e0d2c3d8001
SHA5120c2b332870cc57a078862aa6f67972dbda4a6d74704f8c81121699f893b8f975e48c737774f155fca6bef00b6893871d3cc7eef34cdd31d0ff48e48ab113b58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f69ac1ef7a678154f3fabb524b1f29a
SHA15614f68548d7b08e21183c4ac117de12eff5d12b
SHA256b8cea15ab86b5ab76b31e32ad342a352178d65b51077eb27a9d4cbbc24528f7b
SHA512f59ab5c7489c84586a3867ab8e32a17b0783e7138ebf64e0053a844ad7a6cdfa5d2b4b48325f50e2945c62e5aaae420fddd2288b582317bfd701a603412d39be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5147b604beb38d9534edbb15f9f609
SHA1eb4e8eea6708dcd73661461e314fe54e5683b63c
SHA2565072086f4601aa6a4807ddae67ff74b067d396f6a96175210741b009b8dca17b
SHA51287b0669bd9e403c99a1a6d042557adfc222b55728dbcd88e114088f6866797c95906c7accfa5d5a9b2ac11fe4989e39ceb5ee6324c618fd29235a604616440c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0ef7a126d86b939fc586e7773c64fe
SHA1ff19107ebc22a53d17bcfe0544ac82f83781e921
SHA256d5801bb13da18afb9ee1c2b285e2c28a1936d18119b0e50d4ae301c99f78cd1f
SHA5121c8ddb45edfcb09652c7c4ad912c6091cdffc38250359b6f6b68618ecd457c801bc5e1ebf9c9d6a449a967e384d43c20b7e99181d884fd48fbfb94f97ffdc339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54e4437fbda93b7d8d33de42575c38e
SHA13478571c142d720473a3e96d01405ebb83b13d90
SHA256276c0ad15ef8b121ccf58b5560caa8fdbe5f453edd784c9384d3a177776a30fc
SHA512c282d12084c0a056ab45e7265d0dd87cfe9add6742f958ec96587ab840f179b92f7a55848ed17f77e054e9612f2496bc609f77bb1387176342aafc15b0a36143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6670e7b013efd561c4677b17219e7ff
SHA173d1b4aa521d7153b91a51c30a7b64f7f5282837
SHA256fd06d2569675a1c232a521934519a5a1f4cdfb43abcae12836d50a25a1244b57
SHA512deb2b450777b3dda9734f745fb136826b57abe7808d98dca7f99b3dbdcf38629c2fa24420e69124a86eade16d14b416df78a333fc335dcde8db0876d6a9b28f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079473dc16e996e586561f9505f5a031
SHA16ab2efad5acc2393abed7e96e16442577ac592dc
SHA2564177c8f98a7ba9bc34820c75390cf425856b360cd0295467412835a1cb7e14f7
SHA51205164b5da0e9a9c20e5973c642d68506538253cfc2b85b3a051a24ae2370ce79ab0294bdc306b5eea08943ff9cdd0eeed068afcdb100377df215500680950d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c96ee2d4d147b85e95729c6c8d1096a
SHA117308e904ebfb7a372e17ca8248de4bb84804c24
SHA2561c22eefc3419eebc203d311e58a6b74507005765c7d4cafea24c00eab0ac8485
SHA512e01a70e76e318c18e8653e341c0852ccecb4af18afbf526b1fd9a91c1ff7c1ed5e5237e4267b84d212acfa9f8f1204cc8689c9d261bd5a62e8eedac053795099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7236683534c1c5bc6196059c27f917
SHA1cb0d35acea5d13d964da8f85f9698dd5299c975e
SHA2569b17e34c03d8a655274ba7f73874405e882337419c79257706591aa8626271f5
SHA512ab1b0348adb5017b72c137857c80ded9a27b7e5572c781cfdef9dab88c953ed615bfc09b7dfc8d2d5c850d5d1be12de31d4ef23acee2bf7d78ec382fccf69438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c5eadbab5f5adcedff19bc06bd44fe
SHA163d2fb453ca27466526d1f83e4720c0a3cf4b1a5
SHA25642d3d0054013beb533892ffaf5792f8835000a296e725b91342d53440bed7044
SHA5121d687e5ed6eb6c90286e8797d60f7f2b009915cce5323a788ea3e368d55d3a1b83e71325da2d1618012b01f5e85ce8271725c613fe446bb88f6120b34772393b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7077da3ac7eb813951fe028edc713ff
SHA1e5c56b29c73eee498eec465588388eb5726a9eb1
SHA25644ce92cc3860ceb61eee159d010dc9c9ffb59d6acea4e3b9aeacfd6aa71985ec
SHA512fc5318c20fa371610eacb9a31533cb09b9a867017c4a64df29494e00452d4d72e5a3e039f9a0c63df81ff8a4815319c2caa46e807b53bfc5eeb91dd99214bb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea95c742a6af2e4a92c1ad0901730af
SHA12f6a77a40ae6a464b1a5e1ac7b4b95e8fe633e4d
SHA256be78d9e8e6b51f111ef2c9d4c0597b53a4a90718447ca403917c1a7711f7cd04
SHA512a74fbd19cb8517b4ee654b0070fd0e53b3f4cc206c3932372802c58ca0fec9583678a6943bc4e2f478c39f5161ba2ac622f60de475abae906db96a69c9e40801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e13f13e99c7602833bcc02f733f30ae
SHA1609dda98c239ddb57db3760bfe29d0dba211f61e
SHA25605de5defaf5315d4cbf9ae626b6f1f2eb1238cc089c850c4a2b967569b626d88
SHA512703e9f5768c4920077dbb6797d83f5c62de7455d43f2ed0948bbcbdc2c89f6a6d42f9875dde2516ed9488460f0a90086891c31c4891d740e6035851f5fefe352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab366487343d4f1cd00c6c650269619a
SHA19766244f80b8f8e074e94159a649fc76573e9ee3
SHA256ca86d8d39a07453eaa15852f73e9c7371d0ef3be6c8a1411d38c22292626738f
SHA512d8486303df92fa91f70ecef7fe75dd670cf6d2b2bcfc18446814e15c4a921fd9e43394b8e568b45528ed919098ca5cea85a1f34e3f103d293a14a52f872cd3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d364e82920bde313468e61530c85391d
SHA19bc08787b514c18b3c84c9e97690aab9981411c0
SHA2560707a4d9df24a1adf8e89790b9046c7ffd25c5dea0e47ede1201396a7ac637fa
SHA512ca7aaad13f108ed9ec3043ecca806895f8231018e46a2703ed5368120bc91a6a4b85947e431ec6052aa7ab26006ab9f6bd5cfb02ecada39a86b98571407dc711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2062aa87c56058da2eba5348d4a631
SHA168c8f24d425bda06aae776f7d513731f947076ad
SHA256cf6bf9376a80a6b4f53b821bab50a98022974ab971c949c2506f648442877e3b
SHA512ffbd56cca5b1ebd6b2e8522ca671c1b65f788a579044ca5880b71848e0848c324417633079d317bc4b782e262c497838cf3944f8abd97f9af86d956fc361929e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480087e1b7fb9a1257fc72755928d908
SHA1edcf82fbda4e7b171665fd105516edc035447598
SHA2562ee735610567abb369c4d5a680ba3850d651ededdbdf460e8a311024e960b761
SHA512937c8ab1fc8b4af113357f36a48f1d81f618319be3239e8fcde56a657d6438a2595a561ce702debb576759506d22698e0d2d7c10b4971d6047262481a9292eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e7f72ddc4427355dd173bd91ecfcd4
SHA1f0e2d4f5b7c26bc209f96292253cd1fca16474c3
SHA2564dadee86b4d12105f934365fe77fa3851e1523932bde77c1864ac20ccf9565a6
SHA512c2e5f6c7fa0374c7d86dd965ef4b1d0d9856c9bb503b935f9730002ee136e4b9dcc7892b7c3f9e3cd95966459396b29b02c69ae70a9cf03729ab37fe4a66a0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af46f6020934d52e3453c2e83378bd17
SHA1b393b90078a189582c58645db44a38d7fe1a1c13
SHA25634c6974bdb9454bdd3f476d64c544e3ae9b41c2141ca0012336fe84ec79d69a5
SHA51269434d9c0d5a4d408922085885b9386431b679447e6fed7260bad69128047327a9304c5b584686489e953ed433011d21bfca409b62581ce2e2f18039ffba6311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340b93377b2a74e896d0fa15fb37411b
SHA1cfde048569dccc84d376fbecb06df52ef7a0c09c
SHA25628a9bcc458c89ef61a798c6560e056e925f23e072cd1ff9d69f61a386a9cc112
SHA512eaf82112ab57b2748123c5bb8cf23296d795105ab1a85a40b7609fbd5b35a4b46e872c8213956c9060d9deddee9557be4b0a39f2f59a46a0cff7fe552ba875b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\IEZGTP5P.htm
Filesize13KB
MD5670f614085084ee3b358482cb8fb6e78
SHA1a1eb2302e0a9cc683d91d87b46ca1813b4177195
SHA256cfaeae1d1ee9ceef3d0f2423812f0df1222d40f75a38892f48bcd8de24a84c62
SHA512b284ab1a11f8db81568157c5872a7a4c53dee042a379d774e618aefb1a9ff9c2dc2c5740fd09b61089d359ffa10d608e0c4f5f932203a626fb9780c0bcb613b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b