Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
3c035b452f635fac02d0b4178a9541d1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c035b452f635fac02d0b4178a9541d1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c035b452f635fac02d0b4178a9541d1_JaffaCakes118.html
-
Size
2KB
-
MD5
3c035b452f635fac02d0b4178a9541d1
-
SHA1
9edfee5b262a964a3a1d8e3ccc2256ee1e3fc600
-
SHA256
c2c5778427d216be0dd0a7c665ee934fe184914d46654bd85b32ea8e997a0562
-
SHA512
0ab6f85b4d5ce823612e85ce6320104347233087d4e727bb235d771d04e809f3a20b958739a34a58694b61bbd89b01652781b6cdf56649646246de4260cd2702
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000497ad1c81101082e74aa03597e1dee4ebf199f78dc2e4459cdac01feb784f21d000000000e800000000200002000000079e15d7c1103ad66148047d1f6d14c633707197a9675fe2bb96451891fd4fbd120000000c92984bb7c9f93a4b249cb16e534a437494462cb13d3d7b3a4b558e29ad6d0ba400000000aacba4c15e85f45e76467c0e224660d3e556d8e73a37988a73a6ce3787ee2b2dedf7c67e493d3af2686a4006008d3b436b1283e05c7ab7b9ef997d3a1eb2421 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0016ffb015d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000045fc33473b9326fc3180007d3626460b886010e85915d016232093fd61d1461b000000000e80000000020000200000009db1cb01daee54f743e4b0e2da6b4d926e15fcded89e75a236010421023b06f090000000d6f1c56297a82002a4b6c77fc7e61903e945227c793c2f3acc89244e8d7ba2e8ebfacef4b989e37f146ddf8c962366724c2242ee5d914e5268bc1df3f90c144ed882f81f8291c334367fe8fe8ff6da4d545876e89acc429fae325ad337394c2e308e541f6fddeba1565f5d2dc924b17bc788a9086c176ecb3a0f549c8be6d33619bdb14611abc6042a64ae50b4030e22400000001f03084457e57119c6fe5afdfc5368353feeaae72cb9362702b9cce99519bd6c2e9aa715cb43d816465686662c2c8d7c0a833676ef1582633d2a79eadc383452 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426921091" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA233841-4008-11EF-A372-5E92D6109A20} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1192 2116 iexplore.exe 30 PID 2116 wrote to memory of 1192 2116 iexplore.exe 30 PID 2116 wrote to memory of 1192 2116 iexplore.exe 30 PID 2116 wrote to memory of 1192 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c035b452f635fac02d0b4178a9541d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d062a20a8e753aaa970643be40541134
SHA19df9f3299a8a030e8230bfbf349dbfa99f1397ec
SHA2562c8e958562e844386e6f46f19244f50d616aa51ba51385dbd652f044c89283da
SHA5122dac75010977559ca11ed5318d91704c556f73780a1045af955bfc6b771e58a3e42eba0babc54fe551b9002c45ab012d1738f818694716dbb0ced5d998391e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d34cd9555626523dfb664b377b1b14
SHA1b7d7eafc91040291d8e208e5e150ca1b9157254b
SHA2567924a3cc04df5a01ed708f014b22b8d0b38b613863532e5e4a92e5e419d0308e
SHA512be35667d93e021f2879a45815a6a829d3938ef586bb0e7c816a804be7f97bca48f27950aff2b9b6c3723f0ab0ad3ec14b199cf025ca0054ba390220141b7df0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0be130da3b7359020d55f028f627035
SHA15c23603bd1a4eb575021b55bdd25b3fcc241c1ee
SHA2561fc76984643a078bd9a8a82172782de3550c2765cb0337fad79a6d39b51e1e5f
SHA5127f00b6e6250851e384c36986f6975a1a71b07941f48b1736b51abe7fecdc28372d2f2ff1980d37cfbf59bb06df3963f4edd22076658ff24cbf5e37d944440b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f74664d1096aaa7a3dde966ebc053b
SHA14a8cb98e13aeb201223a029bd49ae110c926323f
SHA2562603c355bbcd3e429e4fa105656c988b155e33bef35ee94b12a42219ae22df65
SHA5122b5eef189e4954f99bf0a288ac58283b7538b6c8089645e51f3b9a57364a41a7aba80fe177dcf232cd7f92cfdd80fcedbe3f99a4691f18fbf23e13537de10e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4292ed07cf160dbbf5d66ed5513dd72
SHA1ff1e65f1e4a1f12164686c6961c7491304f29d35
SHA256a0757c24be57ba18f8a12db35ad2547bea3b3c9a1c2dbe31b6bcd2ea815e19b6
SHA5121d4c77460c6caa9f02d25e1a3630c2734848a10d71f704b7d47695ccd37ed0b108c84f3123bfe7f1d89f69fca7533574078493d45ba3df43a6745be36c810a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e11c387ad1a4ac6956dbca5c6e87f31
SHA1cca752b6c4a37c4a6c87f4901ecff40f103e7671
SHA256e5e038579feec78713454e8768241ccbfe76a86c95bd91d1f7a416c8d2327f23
SHA51240ad1781a87c3e1dd956155e8cb18292d910b776c045e0cccbdb86dc63a54c4325a082b4ac74ef759e27ba573178a73b104cee8f2b63d04155c0ebc9e07b38ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a5993daa59a5cfdce30b10d097b209
SHA13a65578f8f598f67f2f777036f5936b31f9f45d0
SHA256a921edbfb13b4e6dd45edd410b241b833be5a39430123704dbcbba41b710eaa9
SHA512808aa5fcb65830ba87fb39f7c78380a4f2976aade06a3964e2132ca0b9158136c3fc642b3b06503717dfa4ecea727fced6a8f1c4ec401b41dabccec4ad358a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ced1e3f3833983da289b590bb43d8f
SHA1e1d15bd2334c48a0b7bc61094a0098919b94bde0
SHA2569446c8908c5e79aa4e5b2bd681c18c046639d2de9e04469b096e7f7341a27fc6
SHA512af6ef2522cbcd7ef9302b34103b62d4412377dcf7e65615e8aebfccdb1c2343afc3a61cf7977a2be5e9137cc2798606e0f2f563d48860df125fde2fbd765c99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed484eaf7e7f60066d7469e4a1aac64
SHA19d97a7fff2e23b2d4bec0ebc12cb7f3866d19783
SHA2564d53d00434eaf434cefa60afe4929369ce8b1c4082866189100fb52a732a12b3
SHA5124b68bd8809f31cc63fb423a2b42540651c576f931ca55d94cb686c447c8f4381b71ffe3509dabeb6e2fc45973542bf12bd3a841ea9dcb0dd71bbb3eaaf00c607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7a6139912ef593dc17c9ac7501f454
SHA1dc964c9145ab4f692fee82608a17a781b92d75a9
SHA25670e059172e2795d56c468cc6e54b16b76ad47479fb5ed5c9c8f23f92ff355ec6
SHA512f13c07ab8abc1889c077af20ee8057df778a4c604ba6ebdb4aa7cb3dbefde91294c0f5a462d9627a6c566a19d3e0b59e3270524ea31cb75f55410416935e5ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591df192908135867bf850a634a997998
SHA11b4d0ee79a559ecc28354b14d441aef5b4508b94
SHA256fe4bce8774cbd9999999a873e2b8b826c0bdf366cdded5e3f75bbd70270d47aa
SHA512258ec5f7f2ac052c056a30ffda50c1019280c4e3094e94404258f2a24c37310fcd20158b3fbfee9907e9d729313a7be9eac6b3b25b893874366a801d133fc04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192aa6abd7cf2ab50b4835a3f931b67b
SHA10fab25558d76b98ed68a649f2a9dc03c5123cc4f
SHA256527647ed10102fd6e24e11674d724ea29f379feb614bd8bbd682befbb0a68e54
SHA512a2418caf9a66e346c9e0c0cc931fdb5bbacf3efe037cc74dfb41ec542932282a2310ecc08be30fc48c3097388dadf811a375bfc9a092cad985b076059bae7705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51971d74ac63b35e958251f0bcda1a6a4
SHA1ed6e14852d0cdcc7998650223135b9c234f1dc38
SHA2568fb625f2248b2ce412bd64d85962c3374fa520d8a1601d0dc0b9e01ba7b8d82d
SHA51263f6ac4489319df4a99c61578244351f0a377ed012ba711475dbe24381a96d5003647aa91812cd532ddb4a95608b7ebad980bcfb64269028cb208b10dcc21322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dd2be0472e7e1b36ecd7daec9c409e
SHA1b8546f0ca012b26126de491a6f60bd4f8137bd04
SHA256a454281648070fe2d21f7ca0730a0f5abae18479d347bca3c9a9a3cee04cb292
SHA5128855252c6da18f1d15e2b05105b505d6d657c78db0cb8560913e383653e76283ca3ab0d8d33ff03642909cdc7a5f046a70665a7347f7eaf77c4d7ecf22d4b955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea634ed2e674d05e52e71095b8d4019
SHA11f55d20842487aa03d6ce30ee917b5ba276a0c1b
SHA256e4040ea8233d3e64bc363a32f30114ae1a861a89892c89022aae33b212daaf91
SHA512c1d121202c4bea94a4a0f8e2563268012fc55d104c508bf7f72976c3d36dcbada1382782917895670ee2bac8c607b2fc2ad35ede82099960381fa7058e07eb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585da3f99169cddddaba2752e761ece8
SHA10c6ca574fdb08f17f6ef934f6f8204ac623faa56
SHA25665061bdbf46430443b506e873f72f437b5918176ec3c207cfa2ae501a07789ff
SHA512b9e70a708690bf9e2117ee31eb780fcf63720f0ed227d2b7cfcbf693460328411b442a425dcb401ed98d39b031522efd8fc2e089d390f461606346a269386073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b7f8f26ce705c9ca9b4393beaa1749
SHA1c0ea04db585eb95a85adad790d020745d00ca648
SHA2560cfdfa0a9256bd08f84790ec005df4ff39be88a5dc4e99230465551b21ae5ebf
SHA5124e1ad79e00c0cd7481f09cab66265ae22acf9ec4a046f0d49d4063833c184a58eaad36db989b9cb07ee327052d935e1debc34a0bd314f31d374a751f9e961c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535575a4cce65dad5d857891d9592e2c8
SHA102b66b95610c7499d8eda5684ee0ea43a7078137
SHA2564d56b04b008c392f808ece007bacea4d5330e1e3d07b641be5a3aee073f2368f
SHA5120bb814354d0d2c84b0a60559eeb2a2741fe49915dba5c7e07d2aa7373807910b835f8fb8a937b4acf00483e80e01aa6bc148d466bdfadfc6d0ad1be11b8d141e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927e22864b3ece0d4f2a129d0e96c98d
SHA1a477cb3374da95cd16d3f903371d3ed5264fb5a9
SHA256b8d3c032f17ca6a9f0132458d7025100240480c891c2b898b276348bea12c18f
SHA512fd1888a010e00947a8a97c30534146db459de4e76e87c6bc893895e640764f3472d2dc1a1027d0847f0f602405b4f79f6211e7c6e0631a5a0b008f76d7ad8439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e165ff0e339e3aad4493223fc0ed2e37
SHA1656a184f922514decae7bbddf6ea8239ee2485ba
SHA256d89585a1e3ddca27eb514d9f75734f3bd9b51f6c76423e641b2c004c332ccb84
SHA512b7d71f5179dacd62d25d18c0b339468ab898e06036bf78268d10d2aa4a5bf041d2b68343c5ef4076414c30d30be4f9a3a5ccbc8b9f87ac60974dd9bb9d690ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7bb7fc6246f2240a7702cea880eaec
SHA1cf679fa9f8cf4c70217f06635b0b42e355d9cb8b
SHA256af116ecb4f7f8eaca27901821d008e3c4aaa6cf39ae057074a44e23fcbbbd461
SHA5122ef5ce53b3ef2e118cf1e8ef9a2e547e83d7278c9e597227a5de9a17b8b4c10a7fb02ff7eae9bb249469f23a45efc413b191cf01c0d046798a13d3f051c83d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc920bf2bb716f63d13aa922a14d487
SHA18c14f4acf7ce3acd49a075753dc725d6cfdccbe5
SHA25603982a38b18ead3200a794a289bbd780f8bbd1f27e080caf70fa907502a24225
SHA51253ef9d2d95b6ca42109a3e4c782cbcf4be014952012acd99ab92d0f52869ae46b2ec1adc19a309277b14e3a56f351cae30bdf0aed7d0ff610232a860a01c042f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b