Analysis
-
max time kernel
78s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html
-
Size
14KB
-
MD5
421bccccac9cf9deb9deb1050fca6d78
-
SHA1
0eab81339cbfd76dcf4068ed10b5932fbf1405c5
-
SHA256
9e7a2dde43e76bd96635a26e562e3bcc1877cc366529fb511f4e8ea4e4de0aa1
-
SHA512
d86d72cd48d701ca06e968cea5f874a03b7bd8cd242ff370e173f9bff6a42f2fc7e2e0e5603c8b96636074671b59a2700dafa696258ed1faeec2ebece3a4ce71
-
SSDEEP
192:S1NGEKqSJChDD8JB4i4qMRU6RoK18lGQ8S23yf9Sm5715:SOqSJChD8JBuW6RPynyylSmB15
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000160eda6088f1add38ad77e8c5f38453b7908ffe61d3959d6d8a8ed848883a3c1000000000e800000000200002000000085ca50bdf4582eeff4ebe63599775f750677b34e88099813099a23c15728b4ff20000000bd465f0276fb874c050c6d87645c45a3bb5812058ef49b78194e07df1c00afe8400000008e5ddb7ad8f8a95bb1427da49acc006d77acf144b6f53a4bc2b5eedb75a6916583a477dd4556f814be0b6b65833e2759c873f6642d7f642f6ab0c69039aa2db0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427043580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AF611E1-4126-11EF-BEE2-725FF0DF1EEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000004e01af60c15635f5fdc03ecc5787c3d55d688780dbe788188d7ece2fba4df525000000000e8000000002000020000000b02f20d4a8632a19cd499ba5660552afe6cd4e175b79fc73cb53180db9596dfa9000000092c1e5bda31ad0b49bd0a87c3c11690880f7c7e83a775430cba9a25d9d3b34a874b30f36a842b5353ba1cdfcb118d7793557475e189336d4a8835fa046904a7cbf3113a74fdad0f8b7093c8f06c0cd0930c7fe89e2e743c5bc213d25aba1c9b7ec6fe91989753b47dc4e2f4a18c5305a13750161ae75d072326ece81f3cacd0572853e7734d035d755e1c3112b9723d340000000c1baa642fb47ea2026e25bfcef0fb43517accace30731628f9a891bafc0faade1cebf9531e4785b8394d81000c811ab09875d5fb9c4baf65cf6080606d2984af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9075abfb32d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1360 iexplore.exe 1360 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2284 1360 iexplore.exe 29 PID 1360 wrote to memory of 2284 1360 iexplore.exe 29 PID 1360 wrote to memory of 2284 1360 iexplore.exe 29 PID 1360 wrote to memory of 2284 1360 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f63be37a42e390a67d847d650e0c2e
SHA1288f9764c6bcead5d61137349a0e1b9e9e8605b7
SHA2568543314ff11e516d5cd126f3b602e02917c59773831a610596405c7e10133bef
SHA512460e0ff6068159bc7efa2488fc956823f8793ac3a9a8065badec6563926b1f1f16d400f0b0b0cbaf8337146d29e82983109e9d7a780ce32258038788f07d199a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6ee90e5413524e6a41acb6bf19b59b
SHA1bf0d9f6ac930693a4489c2b2bc96b41f03cf47e0
SHA256dfcfbb7b56d12679cc07850512ea71193d1c073364c7150f0190e3d145a26d2f
SHA512ba89cea0162c27b9263948ddea9c7d27cac6f90911caeedce396ae8822e5c48708bbeccc8c30451c575f8a63757af9ddd1619e1f9608c6100df50e5acd87f719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d5d48332a982a0e9d4a6b01a115412
SHA1d635f99d50a3975eac7b7bea2a565ab8ab66f84b
SHA256c3d84ef3a7e5c13f4f80a91eae77c82ff525ceff947a5ac1ece2a8687c02b124
SHA512549560c4f9e84dca43d4793506c203d668bc9904a7df7e765718e77eb8870c73c2d93cfe4bb3955915fa827d9746101bb30602501c5009066903583d89064054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512517530a92bab5a5cd1dad8cb97cd91
SHA14398dad67b0168fbf295bc6d3a930ee757322ee2
SHA2567d45a62c6ee1168f6a07632f90ceca6031afec40b15819b095c32a818a954918
SHA51230fedec19da436d1260a5a3eda25ce42a9565487ee3ab8c883be905962b99c6c9ca50192c257be9d0372767eedf87269385d6378e8f875d004b2c32c1904eda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ca2031176d23c581475d62db467184
SHA1a75a484531b3559af280d9d88de8105409ac6b6a
SHA2563081363466b25580e64c038aaa8424a071b42408a4087035b2c5e855ed7f32eb
SHA51225957608fb9911c6318a3a2bc95974c449cbcc1c4ca3517a599c25b9fa229bc307e77da2dbf8f3c6f7489fd7cdb2efaa1b2073a6dbde35115deeed327efdf7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2036ffdcbc84938bebe8b473f765601
SHA147c812fe561edd5c7d4ca9d01e6c9a2244821624
SHA256627b6324bd67057002a6274544f6d227d46d964d37fafde4c6e458cfb59d1e71
SHA5127d7a32851cc309ea4c5f7b5d982e9ab020383f012e18194acdddd39fe01942f2f4b175eb243fbef90767390d51ee19bf525feaccab8a2bcb6057e4c31621f190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239c89e621be4520bc6ae94be8440287
SHA1ece4dfc56aa52c7460f3b546d9cfca429e3ea2f5
SHA256dc45b6702cece32c2fd214da821af8d92bc289ec5b33828beae9db7296b3fb85
SHA512a7965b0937473e60547a0647f6d428a5500e23a475d34dbfb00b2e8247fe8e022dcb51ee4b81fa267ad2912bc228f0a5418469f8e55569b250bdbbe08436aa95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc35588b74df525b984dc938b661a87
SHA1aaa4716b1861ec8c89bf4e96d16e8a14429598f8
SHA256d1b0f5a14e6cd8a9626bd01b19619d8cfbc53f652cdcac03e27a6e25e5441398
SHA5127dab7be115b12a1effed477e13b3c8a88631a0e4aaafcef9d071c1f2c1eaacfe74991862aace888cafea4df5eddaba113016bcab9b0c64ea902f04d0bc2fea4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7135c2def3e7e19ff639052b33d99b
SHA18692ab6d11448c24830314795ee66c50515bce37
SHA256cc1a8a15af47860cd359ce2fbf33c96348f2db522ec90b9c10dcb50a688f579f
SHA512c17a51e3c8199d48f3c52a290f3579c65dda29ed660bea3f7d9ede3cb93f50c095221b7871a98a49bb55d16f0842a34602dd1e6cff3874c15021a7917644be8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b343d1f2aff56b2137443e133fb8ab3f
SHA164c6cac477d2982795495dd0d6ee2b166acd83b4
SHA256fe2c603f595f7a249a406121ee01a96fea6cf22c74130135b488d84ca4d5fe02
SHA512ea36ffb5855b7f2f4bbc82eaf053d8bc8f8ff68ff71851ce8b649385ccc454acec07244557f98f43f58de11ae721aca203d816390cd5e55e5b2c721f1ad60e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959a9f10524b69c29ab69fa6a7f547bb
SHA1fd36d9993e0765a9647bfc25bf5206b2817ce0e4
SHA25676e48cfd63c69f26f86679fc3f5e1f933ac452ceb75ebc7df02e60e49a880f53
SHA512bf109e97b64b2b6a5cca96b199ca57e823545a3c1b1eb105782b937adfc8434177682e2ee3ea807d9d6774b8ca3211ffe4c58e6284c7cf976f49ffd17969527e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b1d494330e9b3417ae182fb87fd015
SHA142fe2817f4637488154c7ce5c75c588832e1c92c
SHA25617c783ed46f52b14d7d9bc89f74b26b7a81f6c21595ee9ef1d719aafdfe78725
SHA5120a862029d4ff952e4b22f4ac98040e018984357d7a67dbb818f78efb4295512e71a1296a7530d84315cdddabdd2999bd45400eac786484598afd39577c70676a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4e44bf2677b540e4b54fc1801cbb82
SHA196e8ded9015d455ff0ec44d0708e5d8b76968db5
SHA256088abc447c8ada0bc11444c4e06c78e1102b2c8d2c58d1f236e1292c97dc5b0c
SHA512ded215a0d2588b9bd4a9c6ad513cfac0ddf272c54603f60272865a3771deeb1af6596a62419bf9e5a6d33cc2fc6eba953ec5bcabee82d54daafb149336a32b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f874aa89aab8d0fddf139bc7c8d53365
SHA1ed27f90f5b04735b612acb1cb3392796365fae6e
SHA256303a1000947279059dc99c59d2db422678d762c2842199ae7dac87ad2d69f69e
SHA5127face1b67a8029cfd8bf503c13462513cc5ccc06b025277cecf976e45c4fad62f2bea288a769a617cf6cc0bcb07499e74edd8110bde8886882565047b60b868f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537359b9598eaa1d2a859fcf3dd36b6de
SHA117ebbe0c7096b593cbb6d134efd5365ac8e6840e
SHA2565e82e370f5630a4f2ee86b0307765f02cd4256f67876f711f71d483004ce63b9
SHA51228936440fec1a3aeeecc7e5d1bb43461ca0b78bd71db7abb940e57a1ee4ffbc1d9bc4b5f68a8c81211528f30cd35b26e36ab7add07a58e2f03f430b67abde818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59daa7f524694cb6033ce7274ad606912
SHA1726e0b111c6994a781f0ba0118372c9d65bd86fa
SHA2569415c3466934414d513a558bd801bd447e6f53f1366e0b5dfb1023ecc4f052b2
SHA512d15af5b18e86c5f0a6b38991dd576f4e80de25ef6f5f94d1a1f35fe55383ee50ac8698f353c825c8d7dd140ab96d2e28aa2e0f65f86c80832ba53c1a7d8835f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3b971391c67f27d68f89c028830894
SHA1ee4361e7b8284469888634c46531534d8e591e4d
SHA25650c56acde2b102b248044d3163bce01f9148aed5c43fe225007be33f58bbfc19
SHA5125415cc9d42d4674c1d06022393f88c85ff2c14bb62f689988aafe66db652ef08101c8e99ff22bc18fee487955fd69295131b06a5f97cf86833a03a87989ab444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ac50ccd336587752ece9312cb9f888
SHA16d3cb3f282b23ed32e55e66bde853954cd6f37db
SHA256e63d0e408808a14878973fc4bf44c78dcdfea6d3c9e7d432af05be5eeebdaadf
SHA512f63a8dbebf01f5114376ead7223d4c1fbbe4c6609d53c3ac1dd02b7b0fbf261279b177b4a36894da181129de42aeadfcbb97c021058f6be53bce3c3b8b6ebb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59658b3a987d2b1f48f088fe09519ce0b
SHA164bb795539eabf5a20526f1a6bd2bcf62478460c
SHA256e271baa7963824cebc9966fa5115073d698a4ae0d9fa8f2a1ee06a3019529c08
SHA512bf35a349a74eb875881fa74eac00c44522779c9fa5d90c7a7d31a20e55c1012ebf60a7e081d03e574fd4bc010b395cf5441f2b279a83e6099e4796a2ec44a865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed00609a980884dc73b7b2cd50cacbe
SHA1eb09ee7b07ecb2d4b94d59873781dfa7f43f6ae5
SHA256eaadc55c652d250a4eb856bf8331874777778bf1b13d77295ab07e0da8dfdce4
SHA512928bdde82bdeb6b53c9b530f15f3943422a9d8776a613855493d0dea5619e861427d4f30633c00dfc152eb002b1c16759829163fa30104eacb58aa635040ad78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c163f08892e7f3415066ca56e443aa
SHA154a07feac3db278c44ff708a359ed2036ebba0e6
SHA256f15a5eeedf59666240e894d65361b31b90350ddca1e4d0d4b3c4635345c46bfc
SHA512da3385227f2d6f43f68c8354732d3d18ebbbc5da3b463b34702beab1073b5bce4c6a2e8fbdeb15e4add76e5ca11dee7c00fa234b2e57a239d3b1c265ee11ce39
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b