Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
4ac9b8e17730359b96050c692cd748e3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ac9b8e17730359b96050c692cd748e3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4ac9b8e17730359b96050c692cd748e3_JaffaCakes118.html
-
Size
7KB
-
MD5
4ac9b8e17730359b96050c692cd748e3
-
SHA1
b73b80f52042840bbc5c3525d9387e338fbf20eb
-
SHA256
155a42aa8f57eb1aa1b1c939a2d3511eca35ece306954033cccb971faa430a57
-
SHA512
840bba4b24832f3286c4ac9a3b8b0b5efb161c8fbd2be47e8a5f0f6c34a5ffbebad7ed37606ed2efe4bcbfea430939156d88a5748ca2d93a1ee9de87b6fe384a
-
SSDEEP
192:SI3ionxuIuuz1hMF36olKGmNvfu046uw1aPves:SIahuzfMFflpv3v
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000002ab5d4c9b8e427602b3b44d8f57b5801f3d81f034bef980edb6c4d04df13e6bf000000000e80000000020000200000004c58189bab9d474603f94bce355a4318b847b19b084786e29d7010111be9d37120000000b600b98d196f3b218acd0643f204339ac038bec5436433afdbb636e9b455da5b40000000825601ef2cb6242f678e669796b87aa9631c8d47561bb499bf5db10f80dc6b58fbf56cef1cf5990e6ea21d22f20e4555e697c5f4572fc0d1d9c424824720bf5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427228238" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7077e8ebe0d6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ce40e78aac5aea93e183201cfa2325635037b1f7f6954aaecba515a6004d7e55000000000e8000000002000020000000364873de7ca8117e0d60453532ecc9f7007865c90cbe45708c0ca4299aad389a900000001625d164dfdfed5487012cb8ffe381a4dd3efb7fd905a8278cf7208f05364ceeed0a3674fc1eda60249f4746242d4957dc6ff7e4eed79f9da946f5e6f74ee9dc29548c351e154cbc39ce23a220c62f63f80c6c76ff94d1d70f6a61846394aa4277d397329193ed09d61a0975b79eb7a2db3f4c73117e8d088b716af91e047243fb19abc918b2db157a12be41322f246740000000538a3d1c468fce6927f17b275a49a3c9791bc30ea3a3df07189701979ee9a5c39024a1d4f06e7990ac4b3b02700a6a88db5eea500c46cfa18730de31a85bf900 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC7F5A41-42D3-11EF-B580-F235D470040A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2320 2336 iexplore.exe 30 PID 2336 wrote to memory of 2320 2336 iexplore.exe 30 PID 2336 wrote to memory of 2320 2336 iexplore.exe 30 PID 2336 wrote to memory of 2320 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ac9b8e17730359b96050c692cd748e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6e4942596602675988de4f3458ca7f
SHA1c7589105779970813ad8cc61b296ae9ac400dd1d
SHA2564c0ed9748088d6fa91863f18c680c2a422282a9582b6733b60c05b7a5739292c
SHA51279ce564d2dc1e3dc1ed98bfc288c2b3a3124e1a461e502db298fc6478ba4ba48425e2e7afedcde66229cccfe00598eef574837ee8a8e4a9749cf44fc9640aef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f161570ae0c405124ccd713d8c9b466
SHA18eae79c04763061afb514426b8375d24a90eb143
SHA2566aff7edb383ee4cc981ecd41ac5934c2b05c8fcf1c1a7ae69035be7ae904ef88
SHA512224635c0a418f0258b2827ffd0cf3103d43a6ded060864d36dcd5a29482bf9f56896b5154ea537acb1119eba0231150752336b11172b7727f538fc32a462d26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a935609888d68e3fdc3576bd75538e93
SHA1b451d688dc569125c784a368312757ce39e9633f
SHA2566ba7e97a17a68f5a7c9394db5db79a2bac5264a8d0ab4ec7590e4b90f00902e8
SHA5123a7ace20d5ead4e0aa43095989f2a7fb94f8e395972a312b290870fff139a3c7de3b5708c504c78900c77d38b46c5306c05be1fe88d42c6e035528077f321bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bff794e6ab484a212c4f7951ae8c91
SHA1713d5b65ed9023f548d586d67ced7986e728763c
SHA256fbb89d12481906e5161364f9bd7605fd28f26d2bb0e5dd6177b3c921ee2f37f4
SHA512dd25e15070bbb5e37b642571bbf5300ea8ab9e0de732b47f02c5e519c6b4f3a89b0525d7d4e990b1ed941da69d34fa713d06bd9efdcc3e4e3c52bed5e66691c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfb067e62b4f42fa9c9b6d69326b8b8
SHA1617b22909131a5ee0593e92b81bf6a238d59f730
SHA2569652d0068cffaa6e49bd57de9a012b7b7521552cc969d82ac7d4f3e96736626a
SHA5120083005305b00d1ce062fca5ff067a05d895129ac836e56c4cd6ee52fa1bbad442feb4972f281716ab2201f341326866500a39c3665f9617c219231d583413ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579db5b60c68403ac450aaf742711731d
SHA16f683f8e09d305224e7c72ad6d60291171a3e4e9
SHA256330ca4eb8af174c5013199a58a795cc54b55e751f2e5307ec703479d0e92490f
SHA512df588f6e0d42ffb5144b7c42335de71e70f7653fa30bb9efba7ded102e54a069a4e80aad35d8b18603817d989ad6bf228f90c6f05140c79ca61b2191963d0b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdea3973b979ae0be628fa40b93f373c
SHA1867b1463a06c0d04913ec6c57f8d99e31bbebf19
SHA25647447141cf3b48fc8f5be3f0fb051d48e5e3a9a9e7dff5ecdcdad0a6e4ae994e
SHA512763f94e46ef20118599fecacfca4354df017d5fa7652bdecc8049c702dcfe0a1e6dd4e09897a383ec17032782eafa196d0c2b27876b40d7d4ad213d21723d5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5af27665eeddd914f03dcc64ed9555b
SHA1e7197e19db5b464311dab44a3ec2ae40962bf2db
SHA25678cfe261ebe3084a62163ea6e6ebb3b58a0ee69048a25992dc2d5bd003a745c4
SHA51212a62d1e757eba8b7ceec8bda7e7798c18ef1859be655c695b81b0767826c243ee1326ab460350eb255cb35415c512d79f24b71eef7b56da53c511ecafc0d0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ab25a5c7980d11f3d68e78e9ece1e0
SHA1235f1c8db12b01059023d1a0f6c5aa91f222c8de
SHA2569c646ae47edf0f1961f539b6875fcd29983da8a6bd76f75f620ca111e4be80fe
SHA51295f908d99b75c99228c47e92f580840cf8529a27ca0f8f08922aa9eb7ac3c7bf418093dd340908ed2d03a344db1457cbf62383b5fc00392f5bc54e03b9d584b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f893c4e054f458c978d3664b6b98e507
SHA19db24f3f55cbd7fc88c387d5ce11250e687ad7e6
SHA25629d189897e4d55f4dcf1e0d9b9e77e38dda7d4fb1c42f3bf8038eb598c01f2ee
SHA512814b14ea723cade86848005411765f56a2e258fb2e96b96d74ac06abbf5c7c6402d7912f7b7681f289b7c737c4f1c7055bae9f02edd89a3eceec852c4ef62c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4a8fcb92ea6d9a5507a2aedfef2d59
SHA171d625cf8d515bfecd775a41e4188f22641e29ed
SHA2562183d2a74d96d424fc9a961e7e2913bf98b3b32c94cce5bfbbc94e6fabecb4f9
SHA512a2c58ad254f857f0785cc68d44de17375eb40e0c1a6109e6e4f23334f6c79cf128bdbc318a9dfd6d7853fa3324306a77a6d168c824ee57954ddae8729ca91af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f235c44d25c7d9b4fccdaddfb56260
SHA19cc5c8acd007c48caf7fa2ab850a9d095b0acb73
SHA2565faae79e898c63934d237d8e905c791c43bc1dd4f7e56db1018f9917698c388c
SHA512ba38b454577324aae4468a326c283dea0c1dd06e332b8f8af72613d4d654a6717d52e3c47336446115e996c9746cf3e4ff1f5d7a87e6207556dc78d4abf91730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9209c40db64155fb4c26f9bb26670cd
SHA1ca06e93a11ab6f294b1d3e90d57c5af11ce4b4fc
SHA256384483b9e57d396b0d11f78b4bfabca67d93317c4a14d2e0a67fbe9d84f33b70
SHA5125a8247ba0bca2f2deb71a29d72deb81afc68bade249d15385dbec61f65f259e35497feb70517ee39091ed7945819b2818217161be439858b3708f47049eb455e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54028238d20eff07c4b4934fe1d4ec77e
SHA10edeb076502a758186e2df4550bc68f4f89360cf
SHA2563a14e2ff2389483fbf8be4fa66eb6bba666170838eccfe245d37d3dd9fd8468f
SHA512790ed85be4a1dac4332ad6c86503f8546cb3c14a3c394f4445ea97dde74667c76af3102caa5067f01a53feb32bb43862bf5685d6621f8eb02074be2adf1ff883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8433f0b4c87bde4c1ec06297fc4ed0
SHA1cae55c026c2a5a7a07d9f0fa2aba4390729a0dd2
SHA2561860ebdfa0925bb9dcbf099956724f4a9fdc5019a21cfe3fd09a11cdd16b9719
SHA51279091b461042cfb7e902b02da22d4e947c19ebfd31711e41725e8fd991e0724d291f1deb64163aab14ff4130e0d0838e838afbf72d6e5a8ec17e57c31ef31273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c678f0d8b39249ccf29fa2fc8f531f08
SHA163bd511efb8be475bfcdf396c251a7b3db69220a
SHA256ddf426f1f0f1ecbae1069be2b75e1200d79868a59a9b639b7c35d659655c522b
SHA5122ef79ef75518e7b3a9699dd87cda209b8c8ce2bc5e74a18003c93c201e09703f83def1ddff4af21e33c077ea137a383f429ce47e1023a1a6cc7792502be32598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cffd44ca4bff68df949154ef0683c7
SHA1af5d848054a6c90b2b1466de118c09a992a972e9
SHA256b97566cb7617c4713ce6390bd6f565a6f8c6af6ba950ef32952f07485fff60a3
SHA512c877849f24ee77c347026ba5e0f1a0004d763a1ff80d46bf27148b831fb99d265a6170f1c9e02bb108883cdf9ffbecde9d1e76c1b4b71790623ddf1042e1130e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f24c34ab323b492c1e95290bb06bcec
SHA153f05682aee18da8aa2b67c6caba1bfeb5414252
SHA256b2b585ee413fdcc107576f80958e985808fcba0a7f48e4981dd0792fedecbdf9
SHA512f465ef8ee204f048d9a5593ce8cabe8bbbd29f66ed553314eacccc99a3e0e3c200c128ecc12df7f41ab1e87fa57836031ae0deba0796c12cf98a8de6adb2be68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83739e4f02aa1f5c38677d7d99eadbe
SHA159f1d861d92d692f8468f404956212d24f01dc97
SHA256319805b1cbd8e6fb1db16f6e0ea10daee9b1372e29dadc87cb4dac3358807f9a
SHA5129fa1313ebdebf7bc088560d468c132fc3003b3d2af5dbe4b64869f87adcfe33b5cc90add75e05c3d3e6410536293b38d2101034a909e4b468f8ac315e28e3457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac5fafe70cdf3663f01728a3170af41
SHA169d1efb9c7ccb592fdbf947a43d852c612e46804
SHA2565744f6f71ce090c59e102e656e795f069b23358fc8ad763b455e0997d6583835
SHA512aaf398b951ebeabef160d1e71c74011f81ea5406a7c0b3daaba4e42f9f29cf5d72667bacf02b2a9cc1e3a9dcf435b677094d73a91039f81851566ae2fd406790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c24096796f8acea6fdf66a106f6a3c8
SHA19297e67177b4760d0af5bceb3fca9033b6160857
SHA256c3491cf8e17fdefdd0427b5634b35c2a87aa0061833cd1128e9a5d71027e22ec
SHA5129983141b13588160b899c3a9fc005c2bd167b0ab68f6c330d0d34ba1f3941731944aece50f005984726103648f4eca77621bbdd7d5a916fd0ea6d498e3c405e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b