Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
3b0d9be53bd2a553654d6b6bb88210ca_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b0d9be53bd2a553654d6b6bb88210ca_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3b0d9be53bd2a553654d6b6bb88210ca_JaffaCakes118.html
-
Size
7KB
-
MD5
3b0d9be53bd2a553654d6b6bb88210ca
-
SHA1
6c5ebb079347d75d3cfc2e4bbf272ac5b26a2710
-
SHA256
06cb74efb25cd395f7392ed41db99f3087ba5c8471c8f8c5461c7c106f0a3c17
-
SHA512
1648a529689c7ec29860bc019e921113af603a90c3f17c36221f2afc0b29259450ddfa74832998b38dab1db6eefe6e33ddb331b78e641a46126aef1fa2891073
-
SSDEEP
192:wU+4Sdj7ujjLCnW+MSmqZfZ8XOreDMbp3Qsc7Y:pgijQvB64kMFX
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000006afa82120aac3cfffb0b3b4d7476c7c9d23a5376ad9ab47dc9aa745ebca7808a000000000e8000000002000020000000b4893f06783453d83391f662dfa8ed61f763127bc840cf84126fef2c74ba23b220000000dd64abed438618ef9ff3e6377ddc59407cce7cd7864c6dc237f085aa918b363140000000f495318039c6fabad762e6c09fd29e2f1ffb7849bf687452b8a63736690790b50d84abce08fec78e916973aadb603bf2ea5ae9ab91cd71ad586929498f3486ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426900663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A8CFE71-3FD9-11EF-B4D0-D238DC34531D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fffa20e6d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000f8e0aa507ca8dee7ec53645fd947529c3cfbea64298b533abdea3e01cfcb47f8000000000e800000000200002000000089206a15f4a0b99803d895d31aabdc27d3f23d6c2958ddb50be1c6e7271b2661900000007a50e40574cdd4a1e80242d75f9e37d0d8a8c2af8a8708f8abbc0827d6628a7bdb91114323c3e1565215dd8cd8388cebad9f7495d752c36d79f40eb72b55f85d6ee6bc176b201eb036ff50ee4dda163452af6814255bd7ee84d188d9b3b775ac33c9f11497fc461920d408ba1b4e0d74784b10c32fed2f287fbc5d5d6914c39e4f92e7ac18f175673a3d3a6d1831f935400000001d7fd98e58c1ae120adabb49284b500e8e3cf2616e55627ad742d528073e86caeefda3483c134d45a44e6d3e75ddb69598747724766db24ea9f6a9aa69f861ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2084 2116 iexplore.exe 31 PID 2116 wrote to memory of 2084 2116 iexplore.exe 31 PID 2116 wrote to memory of 2084 2116 iexplore.exe 31 PID 2116 wrote to memory of 2084 2116 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b0d9be53bd2a553654d6b6bb88210ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d115b3a93eb4d913f61fc9303b9307
SHA1cc66e72891031ff3e397cd35566cc85ca141e434
SHA25650ebf294179343812a8fa14825da09df130b724f54c920395c8217f4bde8de5f
SHA512a46ed4bc0a7cf9431c4328b0cecc95630af991fc84f7323be417c9bd8aacc5825c33a616357f6e1a9c5e0a8d6c64d0863b0546c35621b6c31d15d154ffa67177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064ca8171a101196d156282134647499
SHA1b829d56f2daf8e54ef644ba87151ee33724b2aad
SHA2566979ad84b7a2012c98e1f50583b8cb78789d41055fafdb96b55dfb8231e11359
SHA512975c7372ba73e86b3e34874617f368cdaa5714612c61ce7c84f40a5e5d1e49d3544d28d86393cdf3ba5ffbb9a4ce3aa953c772e4e104fd77a558128bc1ffc3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c47756a2204d8900998a79a9da4fae0
SHA138101e110b04ffcb7296cfaa3ddbb96740314ffc
SHA2565004e3305481e4a8e2b9b5bfeabc273b19a8064bbfe699036fe1f371b78f226c
SHA512d63c00218422cb0be8984d7aa7cdea5e5407dda4af8fc2d3c1e69b0c2907f604421202f7cdbe7ed5cb175ae5ad2ff63bfa1735a88f1119370428e9876dc3742c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f18f5a03372c12af9cfb1894e98418
SHA153379efe3588a4e1a005702887611b3e2b6899b1
SHA256e68ff8ab50141830947abcec5968276eb78d64a6e96aff4532d9ad7a008eecf7
SHA512d58cb9132461b7b17f962b0d1e60846089e56e910740fd8d9fdce7e67e7678950e966c23cacc122862655720903a2c2c9b8237de3ba4d85f3274c7264ee4b114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e4ed8ac70bad714bfc747527e9f5ac
SHA196eed2b6fcc7105822223dfac0f5749785d4a2f6
SHA25640af4ecdac9890f10ad438b61f9e6b18dd3383beac5b6e42263f7ebeabe43fbe
SHA512aa8d37e5fd28a54ea33e2df7b62081b277be4ffd9c9d00a48c53f379d569d2cb535df39694faace95844df528eed2353dda1803c65e8e7cb95914003b67f77ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1edd13297ce862ef0bad4fdaa2119a
SHA1cdcbdb47475bcd4187080b41593b4b4bba7c616a
SHA256742e9f5a7abe5d635119ee3bda108cd3a3f0c1c293227cc2f883da69084e9b2e
SHA512337dbfa41254885f976227b9a7d1cfe5138a026f0518ebab2b2e2dea59fb90d3499831b30f7548d5b9fc9a772c6e0698927213bf24b07f2a01f35c057fe8cbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548c118871d68529f3a87217f2ee9f80
SHA10b086d850fed483750198273c9dc29a143be83c1
SHA2564a2fa8c31cfc13fd6e28a81340560832626b740202ef363b58d9baf9eaf9c620
SHA51248924488986cf3c38cf0a7a6ae37b1a64f17efd42048348c2854c368cc13f5dd109dca7cf00b65940c8ae2f458c1058834bb9f2ffd4bfedfe8c795ded2adea1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed650a92e7cbe6bfeb046a0604c469a
SHA196e874c373196b94a12e479906d30e2cd5a1fb99
SHA2569e6cbad28fedcb1a6ffcffe5c8742167bb1243f2aea49e10bec6a42a29a49845
SHA512a8117efb05b92c497f6aa37782aa84469f88fdd5025af762c8a000e5e4c0547bd9fabdd1df35ce496e133e50d1404c7fdd14cd30272c6be117989264e1c53719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfc604095f5feec869696dd65c2f57f
SHA18f30529bc67b96ae2c54090070971d8797e65a34
SHA2566cead8e92d7bb50e20d08af03a0c37012ff16800641fc99cecec513c28691b7d
SHA5121b3ce521ee77114601c683a148869249667d78ce9d4effd89963c251ebe8c89c6020aca4f63a5c3779c05f001096e6a38f0b57198857d8655fbb1cae30b87342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b037bcefbe3696e20f8dd0a83eeace91
SHA153e8b4183e3536f8bca7da70dd6512c418bcd971
SHA256332bdba8b13456074c66f35072c06f528a42b74876e16e6ae632e075892aa595
SHA5122075cd4d8f0449051d6502b1bd478dd08977fe6dd9567755edea224d3928757b434b9d14c7f1260b6ffbd9df0f3d44e93afadced154df937b2d73502f8878b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017722bf2c34d26e62ceddb213faf3d2
SHA170f8d2fbdcb6fc7b470cbde3006e784213e9928c
SHA256f97ba16f3c3412556060a85a5c66f99741fba8c01f0c1d1c94167892d86f5542
SHA5124c2565d4618e96160e96788109f585095b50cdf74f23f9cf2190fb6b58f62be04e532af86c3b9437ee6a46805307300861a91811b1a8df69d576fa36b00f6467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347de5b59a901060fded449c904120ec
SHA1f7a1996580563e10b1e36c36301c52378fdd6108
SHA256fc4028a716e496e15b22777490b3194e598f534e27fef1f0c6c4b2025b4d4b3b
SHA512850031f5cd4c2cd96a1e3c394ee34d20d5dd394016c7d7695ded71fa87cc8f2086b853014873f68f0e54c852fefdb1a5977a8e9297b3008fee912573023f2a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b962c840b8a2313d22168f24c3caa156
SHA115a07ef76aee29000ad82006059212c0ed76456a
SHA256d2d16c4272e46a9bba7cfd8f0901806dd26381d92903bb94bfe70b4215b5d616
SHA5124400bef37fc09c77311700a9079700d5e7af4a7f290f84ffab7c55d40dbadc0f2afa27a8df6df8330985ecf6a2081efbc15a15c587bd87fce1e11e0873270d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2ea3bb2d2aa9b4a3a14b322e71c677
SHA11b79493fba6f60389dfbca24d920bb25827185e1
SHA256f3e82684335d89b62491e6e1f8a8d996fb3b9e4d2188c7a56a89ed54db5683a9
SHA512ac2394dd2c6aadc80d37a828618731b640947090289b23c24137f867bf64e3010f0a4df4e6456840534730316f65b05bce459a107354cc363d0aab18b405db52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7f9321e13ccf6af01ee3d566b23657
SHA123d42f2a4b6d5765d02926043adf58e40b2ee412
SHA256f690d816539ed8f8eb3e27806ade43ecadea6933b0cd991f70425b1b5b14798e
SHA512c81ac6de4de9012df1ac795283fc7f8cc36f7ccac21bad0f73a9d17f0f1f459d1de2d75196a31c968d6106fef6c8ec77e6fa6fd20b42b8fac4084b90b1bd9c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780fda35a533a7a382811b6652e5c0c5
SHA1cead61b45fc2e1b153919ca2a686c2dd9e2ef993
SHA256fbda7a9bc7964da1a93c6039d699aede36e1bfea3dd8b237919729583ca91cf9
SHA512bcf50c31777728f85710665e092fb689d21ab249afea386a6f78cab79e04c4ca0be97ec453050571c4cb946742b78821606a680c447dbf62504e774b1d8df255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ca71418defc2793dc092962876a0f9
SHA132c0dab69371732429c02dc4e3abbdb43f98aefc
SHA256c478b353da413519ed2d0d3a833131ad000b4496448c4a1f36d72e92b8da6da6
SHA512ddd29af1c40d6d2847c6203cef5cb38361e1571bcc82473013e63234d804b2d3b68b0693f500d49474d9708dfeccacaf74a6cae39d36a80d4437c26a547df1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ab9032998eb6006b8c03073b39b809
SHA1dcf8c0692dab3878e359747ee86133778cfdcf92
SHA25653525182e7bdf0452c4ce8ff274afc0c6ca71ef9288e427f6c88d37f8295ef79
SHA5128d70ce8a92ae5bf4be872fc93c8d458e99f60a42de54d0301b817efb05a72da362f795465d614cf4e29727766b06a38ee7d722bf300f5a23de91bf93b7a40a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694efaa0cff668c5acd41df9bd268371
SHA13c3d39cfd61bbb4f4c42fc90b34d5227cffc3300
SHA256e3ea21684410d7992a04f6d4c2adabf9b855ec308fe17c7741313718d161a14d
SHA512caef931f241acb7cea367048aba69743db52bd5a8d8fb0b34bb388b7da9f0da1ba135c47e2b827c85686e204031344417a73800913be13e5f05182f4d140de73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55570c1f015af6af91a73031769e99ce9
SHA1709f8952eecda1141f7f2d7e4a14390c57f59222
SHA256b173b8245944613dae6bfed2ce3268a4beeff272230442a6858f419205867abc
SHA512b27abd16d4588988ee81287875b1b8f59ca2d7c6a3b0574e4788d723299dbd0d38c56dfdc5a09fb7f7289461aa031b607ca46a3ba164f56a803433a36d489393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f338325e3fe8da433da782fea61fff
SHA14561c614bc85f29081c131a854f4232297a33f40
SHA256aa63e068a2fbf1fd5966a52810fa69d874bcf21b307e555660cd2f28d6491c97
SHA512f77031dcf38eb03a1fe51d4d75c0e7106bef3c141db816999a5284b56b732b73f6a7c93f41c20d19a904a2f822db963bfb4b900599d39bdb3d3efe6f86bb3057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d671f16eaad367f82997a385328d84f2
SHA1a9ca710d9686b263b35ff90eab42a72e69364fda
SHA256a8ffe5e2090ace56f4ec2c49786148ca1c29577466f1e135869e04414047ba99
SHA51212be0fd7d3013c035b7b5674e5724983ff4d129c28061612d405ae9d8ca393da30f773cc11c2cfa303a0b62dfde986ef39ae9ecb69e49494ded965c3ebeaf9de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b