Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
424dc870985648d9699de967c7742748_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
424dc870985648d9699de967c7742748_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
424dc870985648d9699de967c7742748_JaffaCakes118.html
-
Size
9KB
-
MD5
424dc870985648d9699de967c7742748
-
SHA1
99ff35453f23aa9a24b27ee4048880e0498d575f
-
SHA256
183172efab49c199ea8162f2b9a3e21911eff85428ddef47ec51eea395ab3cfe
-
SHA512
32252e9bf363a9b02d4c6b8e44a8d1d37e67d615e7c4b44f4ceb03e76ec044d26e3e379bf4da86edc0b08d0bbe00f08f015e6a98f0154c0e511f7809fd91ac22
-
SSDEEP
96:uzVs+ux7tQtLLY1k9o84d12ef7CSTUiGT/kwnpbft8lVHcEZ7ru7f:csz7tQtAYS/jObf6PHb76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07bbabf3ad5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427046958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d66aa5a1a1eccff95b63635dd4c4c19fb7e5e26be7f9c0f9eafc201e0109c717000000000e800000000200002000000086f829fb902d65cd2256e9c2d1355ed3f97b039c24232edc89555a06c10700d0200000004814c636c343ecf548fc8ce60f1b47ae7e69be2f1e6df37bfb7f8706e2427ec940000000dd03f7b6414c2dffae48ffa9b456c94d2e20531e585bef1cca494f4346dedcef9c060e274c082c6c386001eca2e4a5f7c721b3eabaad6be035107b66a974e4b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f981c64e31875ccc7750bfd68bcc4efcc7c693109a8e41b5ac3031dc85fa43cb000000000e80000000020000200000007354077ddfea62c9388e74d7524f479b5b835c8a10af3f8d266f86ae4f35e02f900000006848212c8ffdccdd10d0e42540f2ffeef3a521cd6e9f3d070cba755dc110b598b6b47509d5355c075d842a0b74fd213630d65050429618360e6e3a45043cdadec675710d235d9d136d2527176105f8d4a814c2d8a853ae1aa4ed2044f8c30f7a4bdce7ed29cb68b464a053697cb4ca695df066c15b6522ec65f9d9771046f37d4f36bc074dc216f5b02e36c2fd58753340000000769e0f9064687e6eda790eeb1555dcccda271b2d77ba03ff4e59f42900efbe728e8a78cc8f7855ad48e41c0af7a3b4234db2c21b39a4e9a03fabdad382aa2c75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E92A1E01-412D-11EF-9225-4E18907FF899} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2384 2512 iexplore.exe 30 PID 2512 wrote to memory of 2384 2512 iexplore.exe 30 PID 2512 wrote to memory of 2384 2512 iexplore.exe 30 PID 2512 wrote to memory of 2384 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\424dc870985648d9699de967c7742748_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db2d9b23c52e10b24a11e36a420826fb
SHA1c30b4f8dec29dab2a5c67be8a685e724c5e65aba
SHA256edd1705b75e8d435b6d729e5e39355c0cfc89064078a11b67ba146e18fa82549
SHA51258c064aa0761124c66c493f80ba68c832159d0179a77f4d0d6119f32a043a2db4d226d23bdbcd59e6f28e01ae265cd796eab34229cc05848ce0f7180e3fb1561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5996e2825e48780a492bfd6765e477d0a
SHA1264448615b36b220b4d20c3ce450f9063b9ec4b0
SHA2563e08877747473ea9784ee7f2e5ce47cdee704ef5397af8e5c3e5d36dfe39ccea
SHA512fad6048c91cd95b0f86de991aa66e46dc2bd100650af897011ce101b9e22ffec01fb45f669cb2d6280127c0c84d5cd23f8044ffa23226fad2dcc26de02763dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab390604d94e1468ad1ed55d8e85c231
SHA1f94dae09c40d136cf4f86acb99e0a62480c5984a
SHA25682c4183c8e15f08056a7ad876de0e09c9a0a3845bc439b7aa914af1ed7b277a1
SHA5120adeb8e91781902cb4e0aed6c58f04b09ad124f497852120849f7a50c33b2958fe9c773a5d8c889dabb5f6bb74aa79a387f7e70f5b32c802785e6cb543a0a5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552b50193b1428a731ee5e0a9d74c7537
SHA1f33b9ea59d431caacac07dea045780f5935d014e
SHA256a032fe7acad030e269ee8aab140756c1374c09384188cb7088160bb4987f2b52
SHA512ab6f159f8f667a4c2b6defe481097fb903ce74ae955630108a3c39630e8980c6987d7fa6d3d5fcc074f46601a80aa7207e22e019d73cf57facfaaecd5f8b660e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b4f58e7857a87693fd149e64f5ffb02b
SHA174d7abb5d5e8b23a786a45b70d5f260ee97866e5
SHA25657960417bafb917a3c1dee5124623daa67b3226f571ee8cdf21d85d3ca84f718
SHA512f62ee66bb87143e13042782b327e454da28cc3603e4e37e4c45d5637fd00c5cce670f08174596d100c18bc8f3046d4d021ad363954146cc90eb274ed42963f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506638ae2a918694421b4a018c23671b2
SHA1abe49670289ea0c9cefcc437506793aed9905b80
SHA2562430b57c625611813a397905ca62dc1f5fe24d4bdb97b6a1402d6442911367e6
SHA512c5f6cf6de87db7536d511e721c94e960029c3be681e5a42588c720dd0450a471f79e9e62a22f0d7971e5e0bf82ace6645003f98bac86bf97a4cff3ffd5b3d973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd17c9f0e297ae4416cdee4f65f1ec67
SHA19d9f7a44e010953c7c5905882f826f7167331b2e
SHA256fc62136f03ef4c2562c309e87adc320dfa0a6f1d51a990d63f7d001028a22eb3
SHA512e42ddd50ab0bb97f529f740222c93de438378e2c86f88613dfdd16ee791749abbbc941c5038025b7ec54c463d13b70f869de60b4230e40e06129e8f3e6179fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d25e240ab1820dbd887c3416e85b6aa
SHA1268312b81282c3603cba2e5e287afefa50353f31
SHA25633f045f28bacdb4a53a258661bba21e52f740b72e98888e2a91e70ae257b474e
SHA512f1c52be00941f25f208477981f1c9300bfda17415a07d31f7a536dcac67bcb588a88a390da77200986d6f30f8aebbf2feb29280bb19290435388901debcfeb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59637c882a18b419807b2c541fac678e1
SHA1d25c5ebe8064a180eca314a66809be5aea14ae83
SHA256abc57b76a6300845b24da661ab1e224d7098ea66a461be2914fff12f6fc7c2b9
SHA512b47318ddf1eae6d832d95f9fabc1ba70974b504e95e3b5bbbc34f577e8e75b91c83b22fb04d36086ecf812dbc3d950a0cb396959a0581b80babf7afbd045c81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d399b999338a42f90c3768906366921
SHA132af309fc6152af68ca76758a81e2a12a1821c6f
SHA2565c781500688991bd234a6afad5f6000229e15bd6c25a8daa19198c17182a08a1
SHA51256fcbc1f322497f5e9703a7766a385abfc572c0a2c9c3c9d5ae442caa5012dbfffe8d608de62074f0d7323fc8b12359bd279c7dc91954d3075d26038010aabc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3434fbb9189cedf38f21ccaaa445dc5
SHA16d7e0f42b0377903da0af13cb88c4a91a2578724
SHA2561eaf9a613bf781b11e9ee4f8271956913ea6abe729765cac2442ff5ccb395504
SHA5128ad60fe8528292a5d0c0d92500856124e4c3e5486a30602ee8fb66583efa96648bf9fb77bcd831ea8c7dc491df40ff51900565f814405437263e9e02e3a6bf11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b01ee292f64d9466ba08ce9a902db820
SHA15f64dd977e9a7ee24c311178f9d33f88fd83abe6
SHA2560385854fa08363600e96f476acfd8c3094fa1538792493a856f9ace1765d8e58
SHA5126edbd5f2f2927527fa85d4b53db74737d2a37c1476e486f84c09402aa759bb6c659f3ba882cdfd2848f07f8c262cd9c84446918d8799ab4dce674fad2ec9d24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a0eb632cbc18eb3323d0bc7ffe42f2b
SHA12316009ece78e5f2600c236eabae01002886ec29
SHA2563b32efb06976bfc9719c31a43806add0603a1b4aa154b70ec7037af5836b5bcc
SHA512312523a62d46e111c169e31ac72ad3766343b7f1df7b1f987624d392468a82632f0548aaa60a0a29db4c706e191d3ff4f15d90e5abaa7a57324643d1b4c81007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d54a8734c0d900d63fd17bb5d642da7e
SHA168fbca98ff03165c882257acbf14c8f51de3ec07
SHA2565500380e65fe119ab7289836eb3be793740c7462bc9773413d3960034b6aeb9c
SHA51221e4a83c71839d52b437def5d722bbb08c05d738a3a3c77ff471b28318f9814b5dc8987cc8c795a2855964ae7ca0d0b09446fe80b4b713a6ed2d480635097f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8c20a064de8e15f862552033ad37028
SHA11d20e9a49d371d283f74077d0282577cf30262ba
SHA256a51fc4bea03b7ee3f2daf2e8703e7daaa50a1a6b0f7675bf667e8b29f42ae0d2
SHA512c4b9f86b709e1c1acd6b185afdd94c3ad20f2871df0a45ec01c237eee8b9b132ea2673aa8211d40fe50074e1178e384abea47c9d0429a9d356cb6ea1d251e91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce6f9e949513e1a2f369b8dfc9fc30c0
SHA1eca623201dafb0df2877cf600d8661334398c726
SHA256151eba5fb5b941cf6511cf963ffca53868ec669407462e95fcedd9fed913b8b8
SHA5122baf077795e5626ddf41c6d4350601c79e0d6ad17c25588a63f2fa523101af9a2097a38d4389cf805d107b4d5e6338d5481d96db14bc2f0529c3847468cc983f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f667efc804869fe572ca684f1063590e
SHA1bcf10a66865ec913d620f8fa851cbb417c395fe8
SHA256a8b1a0b0bf4d1995c69e2ad3888421f52813a2e763b82aab4e611fd9536faff2
SHA5123e8d4b84cce1857067f0ed78e6060f2e649832570ca56cf04364f2560c3a0de61a8415773e7035f4d834e3bf8ffd145a7ffde46020401de258f89799d06488a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559b3970f54f12b81ff6af5e751005049
SHA1331a5d5d7abd66a4e7cda7304cb88696222c40a0
SHA256c84c8f168777eccb988571748f10b0d89ea2cb726ff624ef77f29c89fbace5c4
SHA512f73b082a0a04f5b6378a36e31eb4eb54a24f572fda1488f50d245293c4d341e65d1687a6d73cefb338180a7eab959de03f759578fe2b83958461ed4b1e18b79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511b2a8fc86bdf4f990bf0d5565991ce0
SHA14fd3f58a1dfd87a8a8d95a6025a6a082f76bf013
SHA2568ba3ad5a128b0b648117482507d7e3e3371bba6bee6b8a85f86a2a1613d8fd8b
SHA5120bb987d418adacd6e0dc65ff84fd37a65b39959e165692261670c8b77b1688164f750e57e538d9071ffa4f6ca5aad5047e7f8aecac95a875fb50ff86595161ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d2712c1d974a60f42a580ecf2f39f73
SHA1d8e0b8d797d8713d2bcacb7d055dd31e9e6e37f6
SHA2564ab4aa9782c96816f0091f6f500ff1368238ac266388e4c5de46185c8e6e4b4d
SHA51213a63c46b0610ff92434cc6ca24daeeb28c7a163f5ba9fc4a3846922dce20fba9387a04cbe7cd53113deb112029b1905355ebab5b53a409d6c60ec12b46c94b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f77ca48f8eddf5c377f9cb16a3cd793
SHA1983932fc845c098c5174b833d34d0c54fcfe150b
SHA2568f2582db4c007949048a139bdf5bdeef3802bfd0a995ac2ab8b7affd8355b01c
SHA5120f0ba53edbdb2c7a34cb28c201e24a2daecdb5e81480dbffecba31ce246280dfb85c2ba2dc467057d75d1e6167e1073beb0c86df3715ed450fc1e918f5cffbf1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b