Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
3c627bdd9210ce654a237c485ba4241c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c627bdd9210ce654a237c485ba4241c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c627bdd9210ce654a237c485ba4241c_JaffaCakes118.html
-
Size
48KB
-
MD5
3c627bdd9210ce654a237c485ba4241c
-
SHA1
b37a7fc106e236cb8b2625125cd458565a72e9c2
-
SHA256
2bebf4510f93f084de9954b7df142e28d2e13cda9838b4aa26ad8e07454791ac
-
SHA512
e1e52b0d616db5681f0e987d79eb6715cde5dd4da357a72d9f7c8bd0a9a4a9bbf892bca24b959aac3eb4218d62d80952ca64daa83b99d5b2f85a753cc95f4db2
-
SSDEEP
384:7f352c16IwH0MwcIEfwqiXwCJW1czMnlD4Xi/8zVfvDijxCCRuyviYPEAfWKrE1L:7YR8P5+GRsBnZOq3QqpyZ2dXyRT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005f7f75dce2967bc8bb5fbfb38175f809342c670a75751d0187121679cd038055000000000e8000000002000020000000716fc89c053243197745080fd6a295fe41b10a8c2653756e04090e49b4f32c3090000000bd94c94ff0ac13b25667e6a6b7b40d2690a740d63e7eeaeebd3379d8985b84f2e8e76197ff3e14d16e7c71e807bb9551e8ee37c2ae6fd42f23b505a56fba6b2fd5708208e9d53dfcddcb1456374901967eb65deac4dc567faeef3d3be1c2ebab7e3ca38c55a3719a96ada682480c041a9a1de7cfe7031a484c09faace791a46ebbff977652d229b782da0fba2fc08ff8400000004dc7c58f8a5dd8ad04ddbd561328f4a6c113bdd0397776b2c6eaecfaf4c59999371824326c1d95e3471f68ebc51e41b276f16340eaac9819cf8b9ce55894a3c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403ec5ba28d4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426929272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E63C39C1-401B-11EF-B585-FA51B03C324C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000cc87ebdffa4d0d4d884fb34b7e6d05a364172db06d1c630d02885ecab17b4652000000000e800000000200002000000048a94f777bfec6dde18127bff480aaba9f86f7868b869297b2a4fe2886f817f420000000745bd4a0a4df8d2c5d69edc21c34162c739913ab654b98d39e4600e1e41b617b40000000aeb5afe6259adc928fe84cf549417dfceee2e826c84519b410c66b12c56c63d492a43e2f24da60af9b0212b3251672d74b321ae5aa78721cde3f9945638177e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2336 2136 iexplore.exe 30 PID 2136 wrote to memory of 2336 2136 iexplore.exe 30 PID 2136 wrote to memory of 2336 2136 iexplore.exe 30 PID 2136 wrote to memory of 2336 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c627bdd9210ce654a237c485ba4241c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69cfce43121524890612cb263a8f896
SHA1f1ba1ee84a3b0280b37e19483900b2cc6e1fe867
SHA256028c482edbbcd5559b16f0d8b1462f6b5d1afb7e71f7aa9b94d4dccc89c18b71
SHA5121fe2c83e1159a6542e029e4bb58dc2b93ad8d80251560c74ab551659a77aedb0389d1286df53fcc29e70b7749789e08a76899a2cdf460140a552e727b7b22f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55671d4cb645d31341377d281f9f478be
SHA136ac6c0674d3763a3a5d3810019644e6ad903e91
SHA2568e45906494f2c00aa4f6ee92fc54b170e8cddc2e6fab2d67ba023925094cbeb1
SHA512701524f681db5620ca77db83c7c26f114c9761c9e57c265a729958b38b73efb31f72c85568c2ff87e87a12d432b8affc5fd874278efe0472dd2c4bb6afe8eea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e07f824db558c973783b4fcf8ad8c3d
SHA1a21f8775251d133df1081e8feab921095f8662d6
SHA25613e63085f0bb5fda6d9da10fa3ec4dd1d8e3607a2d90fea2b2937366c8e82111
SHA5122a71bb8618deba880c443f3fd9f2316d6c568f483bfd751b4d5c6d6b9419d1e27c956da7614eaef2a34522f02f5ddbac5e24c59ec7f4c2bb61e3f51195cd02c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1d9af3b06ee2613b709adaaed5251b
SHA1d5c587bdd9dfaa518ed745da93f39c2e02121599
SHA2565ac6beb29fd43b4d519c8006a1dd3c51d63338a0a7e5bd11d0202b17dd75c6cb
SHA512fd4f09c20ba16481a032c20336089ea562f06fd43c3d45ee925b83c970226652542c59140c573a6f40c717740e0f16224211f5711e5d2e56886f033914d32d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc8157ef0211774262283d31a8ddbae
SHA1bfe24fc1a3e88a7431bb393e2d931f95e5ded9ae
SHA2568053c890de90f97b52c755dbd64cbbac2af26ef04f052a0c2563d38d057c6352
SHA51218c11fb41c03a444a790bf09085b2959b6a2e36ae8ff647bc9dadcbcc09165a478949d6b4961c1e19be6f3c9b51cb3fa705e793c8055384bc1005fb28561d990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7905a284440de00dea39468b360dc5e
SHA16eb4878d9a0b6d931018380e123394bd457b8e54
SHA256575024f667e4c9ed5069b570d7a7834b307954b5f3964609d8f490750a66f8e8
SHA512c611c4d9ad47c44c7fcc26614f8a2e01796d84b3de99de83e335f6a27c0abb1aab26edea2e0875ccd5ab6376b9e22599b227c990df46f55f10def206f6311b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b191142961c2d62edfcec4adc73bda
SHA1f7fb0559f76c3dfdf72191cbb596a5273200a322
SHA256266e223c07cd4c1450c2576d93486de54a80073ec67d94d106361ffef44f884e
SHA51278a3a5cdcb8a7b1e82f0d33f2f84584dfbc79b256491c31300cc4aafc10d7e49ffae9989573fbde367fefc089ff19f0eda5358638f46fc65b4b3c04ffde6645c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa35a4410bc1b7417d894a89a8ab63d
SHA12b91c861de96444ee3acbec493fc08695c949b2c
SHA256062a264a7aae900d03133c33796f1a538fc9e66c340c765e9897a89afbedb441
SHA512a7f574b8177f19b58b19aadf691b29ff64d0493f9e6cbe3d1313b109b71da143f4870baf4b48b3cb63244ef5b741c41ee0f8144352b72e7076c961a70f481308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3b9e276f80b639557d94402c821cc6
SHA16b6a66bf4a71f1b058ce0b589122f403eb8b9acd
SHA256b900dd3eab88deaa3bac80b25367e931a3d33cafb1e343af1881674309a8e2cc
SHA512e8fc049c8ece59b1933c49e2500526908d8a30167cc54cacef773cd0863a8d42493105d560a64bfc878ee4729c177842e0f284fb4f54d878887e0d0fd0a98ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4cbf210ed577e6ab107dc7a4f26b884
SHA144ee99453f997fcdd45f8b1b59a5228439deaa56
SHA25642e188b6c2364e3308d23568eb3258868a28b215c56b15a88803d5a130f1968b
SHA51276beacef0b89a041f940921c92020fd8aa5f955578091c17eccf3d8653536c3866e4524fa9a54eb257b7a236f9eabca0f721ab8615ee8fe02e5a855fbf832b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df90ee04fff95605950b6aa0d0f7167d
SHA1a87daad19849ef2a5f94968c89de427e42d22c1e
SHA2561bd5726f786e3a44a36f29c17f86096af9eca0872dcadcfc5a3a7921eda7b5c3
SHA512247f43e96d3edb29e0ce69f02fc6f8f9aab99be6000b197e5cce8c5e43f1f9e3a26cfd32a4f5f7b484a7fcddb9a206090d9ff98f980d43c21a07c02bb39964bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058d6149baf87dcd2df52cacd28a9e2b
SHA12a579843b328511013f27cf4b852c18a01dbbb35
SHA256e73ac84ab2ddc9f163fb7d590ef7953f4d8b1f739f34ac87d64106101a29bbd2
SHA512981f6602ecb2678fef7622b3a864c1ee165411036fc0a77a754d4baf69999287d536c5ece8764cac52e83a32f462774dc77499f35e60414b5aab27c4f0adf977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd427de294e13a2f345697ae32dc8ae
SHA1d49a71a71e0d49c31a0dd5cfe5db769791ec0ce9
SHA2566f6f9bb37a586f8646884284b88f56ee541829842764fc7f7f3b9b90f53393fd
SHA5128c85e9dba245f42e446208b28bc439da0df466fc0afe66a403ee9701739c7e0c3e0252dc6f13fc32761f3afccce40b1863addf42fd309e39b30c04f96915a276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512994216d54c7175930e8b7b31b9a124
SHA12ef0e63574c3ee10b36269756947048b82f0cfb6
SHA25678f09eb80c20e9dcbc663ceb058eb4911aa0ee8ebd0b665e36ac9048990e0302
SHA5129ec18a9ba8192ac025008dbaefae60ecfdaedc1d6f32e1ab0f5c82d1038939cdcdd7dcccd2c14a036a4f8bca5e473f309496bb7db59156d53bd6d32de8170f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3033881fc2d44cf00cdb88c6ddcd47d
SHA13e0dc7bba7fb1275054f1639bdfd8d8d9bb03cad
SHA2565ecb1a137c00e329ba532b64d8d7939483fb8c174f3102f5960e7a04e6d007ca
SHA512e9af9e6bcdf11dd2cfd2b9ece9827c604b86e9f66aaa96fbcd8477f71b2e9c9f17331c189513a057d19d9bdc6df8c5a3ece16515e62088f1b8acfbf951d423a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af13267fa844a47c606691fb08515df3
SHA13e3e89103760f8fe52b8de6d68b0972073b48c23
SHA2563960d865489f112d10aa923b982b32cf31bbb92236874c1947c3f4905a087f35
SHA5128002eb542ee30a1fb999577afe1b1ace17bed74968d32f1670623639120aea36c1f99121505b5af1fe68d6841eb05caf4364fab54d89531b468854e0b3483644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bc3031a748337e411c22cb2fda7af6
SHA1179499c76191849ebb01cf3cdb8546a7f7500bb0
SHA2565d98b2bd90e0653353470dead77008cc0def05cc5933ac7b835e9c9a913b626e
SHA51264f816fa723e053a4ddfec5548ed6f7b944603f2e6989da602abdfd9f2f74325f097bb83408fa8c3de3a7bf10d9553aed4db7cd6301a592f1f54b080b0e7861e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd032a81651bea84b33158c00a7e9717
SHA181a11837103270ecf0a21b3fa10e1dcb56c7465f
SHA2568bee46cd37e6a9d840d642842c1211ef624fb076371a810421c160968eb1e287
SHA512d955c2b5af2f77bd49028e36366e3655f2a95d2647c7a74b6ffbb5f018eb9c15195e5e7b25fd0a9925f1d2a8c1ec721ab50249ce30e4f353f8e13c1917b168b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0def6b77be55999f603dabd1407f140
SHA143354cd149ca31d5b7849bae17e44236ce89209f
SHA256eb675414f82706a2519792ab804187fa2c01d29eb7ece5f8fbf509832c702ed8
SHA5126740b6ce7d7f153fb5a2819fb7241b0e9905d5bb4d8df0f9d2b88d5f90d021f504b59ff95c67f828752eb0665d6b90c351be3656f3a91f169e3b1cde58e49dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e5e1e028cd96380209361840671827
SHA16b0c9ec8373f62bf5f6628f06b767195d2b29370
SHA256f7802a5d5f9e2b665dfeaeb7a0de55f347b438a3dc1498af913c16aeaab1d3f7
SHA51248df4d38d65ad8151a0f66d8a0e31ad51d380da4426cf22c3af4c3bab569b5b58ae3595ac0b04585d85cc03685f8e9738cba5e45a75a8703b5e0583279f9b2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a073741719140f20324a373a9b4dc2f
SHA12a44f0c27389e300ae299e9ecf3dfbd02f3013ca
SHA2564905caa94043406f311854e2fb6471f27b3a1a13c23cce55630b02428c18e734
SHA512278b172d2df6a1bcfb241a8804bc0fd1a540341c17cc5b2cf8d54968ae5970f7a5a826849362f46c99ea46d0aec1c6d063f946e58ea16e820900325ca234a88a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b