Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
4b82970bea934900b5cb50ea1c39733d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b82970bea934900b5cb50ea1c39733d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4b82970bea934900b5cb50ea1c39733d_JaffaCakes118.html
-
Size
52KB
-
MD5
4b82970bea934900b5cb50ea1c39733d
-
SHA1
1a3149c53c8894b473fecc5b5ec8a25216c2011f
-
SHA256
52c012b4781c4969955fbbc7b362b6272fc822153a63ebfb2a9b60cb2cc42bdf
-
SHA512
0297ffbb16340664d19d5cfdbffb0a613f1b874eda7a42745b376c4ff56d041a1fa0459416cc683a0c64f6568c1796cce57873dcb9d2e14021be76b546fdb27e
-
SSDEEP
384:nmN5FUuMVxcEqUobJhJs+zzvPLdSYKhy7twhiukigTUVrIJ11azrWXwclcYcjcF1:SRghlMxwUnPvN/qRG77S1ER1zYMD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005b70d72cb138a1798b20a7b215d5d8e61901e5a0dcc0d079b45cc6b7c72a3ce8000000000e8000000002000020000000fc4152748e2d9046b8f58ea3323635f48b8cb4048dbd05a64de68b0b2b4f7aa490000000abfd3c91e1fb7bcbe30ebf5e115466718e12dfc390a163d6f3c0cef5a673fbf8d10108b91ca7da0234a8822ecca3b8ffe9db86b74dc58596dace39db6ceacb5279e08ecf4f6d6cf02121a8cc8593e4da471cf07c1d098bfc2b6aeb40a0611abdfe11687283bdb04635f64518f28bb079fdd604fa159274de2ced8e693493c091e76a3485010d1f53381d96d6b9b0613840000000bd23547743e3fc55e4426087920d6c027a9d6fc2cca4481360eefac408958931ec0fa8a3b884e704fbfa914e16c38792eb1b6018e312799692a340dfac84be55 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427241355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e03e5cffd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84D6C811-42F2-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006b64a291d27eb515e1238e57d9fd3a3a1fd1d92bb3b9dbb9042a8b496d7013a3000000000e8000000002000020000000ed42e1de726bb3478498018ccdaa1d818b1e5a6d30e6be98b2411f89ba934ba42000000000f69f00c8014880ac2545a481ee2013148ec6cc1f77df572b06c296010d9ad04000000009c821509b9c19bee4a65bbbf31e515ef7d4b215e5c46ef9be13c283e7a212637925bd99240e224a64a21d3055ee6988ed80ef00a9f804352867e0a1a37fc987 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2304 2072 iexplore.exe 31 PID 2072 wrote to memory of 2304 2072 iexplore.exe 31 PID 2072 wrote to memory of 2304 2072 iexplore.exe 31 PID 2072 wrote to memory of 2304 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b82970bea934900b5cb50ea1c39733d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58328262384da791c9c512482fdb728e4
SHA1e0e181aae77867b7bf21130f6fba804451dcabcb
SHA2567353280ca6aaaff8b1f7f4f0e2bdabe0d9715ba2818ff03b8a9f3bffcdd6c2a7
SHA5127c9d4cd77da2bbd58ae733a91f66d1cad4cb2c4e33d09ca6ab3c9b5514389477b11f5a79cea4674f9639eb53fba709f141cfc29539571336545fc43195260aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94866eac3e5c69c7af6e6e7d8e9e6cf
SHA1f1a2bd452f54dee1be449e04ad7b625e85dfe1b6
SHA2564a8583ed9082b91bcfbc5c15797ff044e78128ca8668c51ecb984c3cb9b3a532
SHA512deeb7629296388af95951b0b51b22d4602e50512bb6bb9d137cd622248c003cbbdc40acb45b2a4784836f3097bd30884b0886ce106c22e564743033dabdd3567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f7ee84ed7cb8d3867110eb6b650ef5
SHA1ee25b009a8b5f7788c8b8da270649287169ba45b
SHA256d5b0923c7a9a1e841bdbd9e9dc74de6455296e75fe25f5a02e34ab155f8a6cca
SHA512473b182428d6c722c30307d0cd991469e62bf12d784690ae149c2366a1223f044f7d4df4cc23a4c7ea6fa737f51cf4acfbeca93885122e10844b122e18770c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1c48881001d1bb1f60d70e951f9ada
SHA18e08e74c3df5cece79c59da855a4a8c1fa609a6b
SHA25677f644593dd3e0c7d484e807d61e8fee24921d6a8fc11c57e8e610a60b36d5f3
SHA512201d48a7e5737f1f3fb85d3577d1d273dd95461e0c0d7041334b0b7e93fb7723ca646766bbfc54c758401486e10d59e17231ae8453000d62f1980011a68eaae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5875f42a75e746aa85b276db671674507
SHA1b2de32a4c297921feeddab9240c07224d9a521d5
SHA2562788380ca4c5495258fd54e551b933c6585de8c49b8206674a36da54d1473279
SHA512fb9c57aa3c60f3b7eb24cb405c373399505ac59b337da7c6ffe8c455769d8b93dcf5afb57c6c058671f7545a31f73d9564268c3061bfe02637fbfb462f7404de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8745b7eb548f095738f1f573bfabaef
SHA1ba11d67b474f132b60dfa1715550dbf20476bc64
SHA256c50492ee59a6e42cd2a002c7f10080dc901ab54b2f63889e96f97d925c227e59
SHA5126b7bbedabe139fe4a3bb8cdfba320ea4297d1aa076008954fefaea614744fa4dfbb1aa8742882875119d46deb87286db01b75acb1647256c311bf57dbf68f6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a0e5eab4d4949b6cc03d2bbd5ff3fb
SHA122c5999500baf2ed1243db95acc4dcddd8c5964d
SHA256d47b19011e675dbd1e1048e1258a9e1b2cd65f4b7357de1bc4263ed10355c50b
SHA5122c2fcb1985ce54e168409c136c50aa8e3e697c24f67b885d1156d5f0fbe8ff1215c3f32194909e828cd938261524f53b53a711860f464a681e8910047e0fe819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf7fa9a34b83af3fc90278d2f0c7124
SHA1a83ee5fc6c871b1048269a00a8255008b30497c0
SHA256e2155b8a52a5ad8378ac256fc1d58bf2736504b801fbb6ee0b6015e29d3b7a33
SHA512967be9a1f0a4934479b3da7c6b5cd9ba03cb28e4976c2bc95a21f3109b8ebfdaa248f7e9663afdbd1ef6ad9d330eaba2a701268b5114b138ae05827d9d8b6219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1382e7c16ce59230d2db55cc289f82
SHA1b46d30d295e825fd8c741a1815f9e2069bbb9ce3
SHA256d096579804a1ce848f5a84d54f4611e7e1a6bdd262680d31952c66a86aef262c
SHA51293bfd6f1c33000712a7fd6864141f4a667e5ee5c65cd1401752e3f2834c174084a88521a86e0311336841e115c84521f9dfb660b856f7b898ae3e9ad7c11ca5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ecd6d99d5581dcb96d1cd427056c6e1
SHA13912505e0eedbf3f2fbc870241e4427c49799606
SHA25672a50a43147f1a32a58d79d761b02648febab4e25057edf5e70e9e462f4a243e
SHA5121111360c515205aafd25c89aafe5de67c23c59ca877efecdf1ac872a3dd28ee558814be4f11b5b13913f6a7b31defa1de6e37120c34ded73f21e3feabd427029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ce9467bf5bcec6ad8fa523f07de48e
SHA102988af2a7acaf4b6b8e3d2a30cd422c9a3418ac
SHA2568965843bfedf0eabffef13365675e5269983ce45cae2dbab43d9b203fa4e3278
SHA512a0a4b01479697b1eed4308883ea1f3df3b717c9d9aef3bada345c45c2c95abae4899e048985638f83bd26841301858e6c4a6cf669b0b392cc77f057b1cda2f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898532e173ffb305ce63042439428084
SHA143a730ba5da55cc71cfebffeb008f62d0c376329
SHA256c8689f77d5e3b78cc158c2e933a02143c5ac46327e258e733fc5a1322e79e402
SHA512b6572562f70fcb8daaa0db7b2adc531bac9290f15e569161cfc780c9728dfc932f361f01af7d5edd0552831608689834bf24d2556d33bac302b5c7c876bd37b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e0d80c85a62af0f291bb0c821f19e7
SHA15f1d87f9eaa80cb39dabe04e6192a94e25d60c00
SHA256fc6873c0bef51cb9343fd9616fb688ff4e4f4031ee2d366ce1e808f4aba71d27
SHA5128f1881b86473aaac5063a9a13016863a548fa2e2990bb90f3ecddbc8ee78b54d265f35ed9128d75b45773e588caa9e24964665b1a87e4f19f821d44c4acfecd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11ca12e3247b29214dd53021d21dbad
SHA1b54df86bc06e7cf47a0d7f9316b13723ce56e042
SHA25633350bf18cdaf75990afe28cf72c7c7c15f287568bf45a5c6489bb51988da3a7
SHA512d9d77ee0520a1586af8f4cd468c67d516a83c5427240c7b48dae5e75cd94f034e0187434e65a69a792e6b9b3251eedefd8da5b6c261cfa369528a74904cf9177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6db2489829389417d784a32207c45c2
SHA1a54e516f14cfd78d176e0b13c8c6a060e79b9202
SHA2562d798ab0d62a87994dc57e5edb918f606d1ebb83474fdc4feb2151f023b2551a
SHA512f32a522032adf84777d07d0fc6e4e5dd37f4d091767f88d0589ba743f1b203662304bea8dd0c0a1448a798952cd6394dedcf381d7ad2aa8ced40cf9036691d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c428fab8fe16d7e4259394408a9a676
SHA1376ac5f2cf0edeb0c53c5a2c41b1950e895b31ab
SHA25607631fe7f7eea8867b8106aeceae7bfdb3f4a762177046b239a1fca70a885ab3
SHA512605af7fa408ea5b36798fd2139a96530af6dba81977f8c3d0cdac8178b4f64cbd8d86c27dead0f9fcd4ac340f2d38eaa63e4d1e7bf5c92ff746f7f937b2c0543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e66ed3eb8df082f99133219d298304
SHA152e3be9fb74b917f8a52e8e830f093e8690fde15
SHA25653449f06ace042c5049d537bce4413c0e9ac2c7e68bd2a6f3a025fe28f64462c
SHA51240e44a4b6ab3bc87ce5355b1f7192754f693bc26f13c06b70ea4ebe705d91239b9b871d0e4ca4e9946d64ede5ddd965a03589a086706432fc004d48fdbd1ba4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab0a4a98cbc929b4f53b69157b0a597
SHA16b621d3b626a39eea9f3f22da293e7f2f685c74d
SHA2564c3abd7c39b4dc8d69522f88f52cf824d6bbd9767c15acd428e143b0999c9853
SHA51224a47fda1f308eacccf9980abbc342a914d3ee9b17a108ec3d40217f7a7cffa51f865ed590cf5a92d9b7381f6f29eeffb4d924aa720462f4f5cb64021227e575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8dad0a9337a90ea799526f5d0502794
SHA1e3c81aeb24e8ae9170e0abbb40364873b7d974b0
SHA256ec849213fc005ec38de7a8894c59143aa995e177d2e1efa34d12580f74cd4a6c
SHA5123943dcf9dbe4fb8b700e34b55eb2343fc559ecbaef5d5dcc162cdc8b5a97eca0c7c5606e947fef85ef7d0ca5599228f757b08729e060bf757d7554be9df1f89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57304c08228dd3a944f5f7f3b043cb8ca
SHA1d54e2225f395ff25627427cee0cafa739ab17b51
SHA25600c1be799ee4fd329c0cf1cd33c436bb0cccba450e952ccd9e72a6d15f0125f2
SHA5124256a38b6b33dcf67e9e1f8df17243ca1fa940abf22814499c2011b440e1dbaefeb72f8bdbd8869a464519d598014dbc2c5a94d7b6c8597920f7fa382c6412ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9b0b7e97078ac50c2bed1d62757157
SHA16977a84b16b73dbf0ea713adaf1e5a62cda3f9d2
SHA256610a1c861fbdddc468e14a9406e7e0bfc7a6a6a82206b9385dc0bb19adf9331a
SHA512c46c5fb1c42c9476105245730532d27bc7e3e6917ff87dd64a5cfdd246551fd199e106eefb472efc6ce798fd421452fde0e77ddff162db0ad2ef9c4e26ab8e71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b