Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
4c59d6f838caa709f3c61b01ed1d1bdc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c59d6f838caa709f3c61b01ed1d1bdc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c59d6f838caa709f3c61b01ed1d1bdc_JaffaCakes118.html
-
Size
123KB
-
MD5
4c59d6f838caa709f3c61b01ed1d1bdc
-
SHA1
ac3e84ebff62959da84e56ec927ecb58f4020bfb
-
SHA256
61a36296b27467e85fa024c2f33c9205f1ca1cd9be0be5f582f5604782003c67
-
SHA512
bacdde3b3f406da36306f6978daf836ad4602dede15eb0834e1054f21894913f9ccab6e25f27c301f1ed7fd02035934fd07808a209418283416abcc9cdea7701
-
SSDEEP
1536:TZ6KBjQhVkA8PBxSRgW+VritJS2CmbFwa+B/:sKS567srdPvG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427257046" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EC80101-4317-11EF-B161-F296DB73ED53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f4324bf463c9ec3f8ecee57a572a5a25986a840adaaa34d6b0a6006935561b83000000000e80000000020000200000009420b0a1d7667d420fceab4b62c4a78f68a9737e1b151139dd55a6fe55551cba20000000b86196e3d6b5e378be972e79e62556ad59c9f4666509f7febd4bc84df68d727040000000b7b55fcf257e3d2b7a1fa7d28274e04a3c58527f68408f92a54f806f200ddf35b64b7e35bc97331778267e098fccfa5c449ab77352890043800ef99265ef7433 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000006a27c47b6fa31f9bde50249bc6a0cf2634e8c2171dc6062c9be950ace8d83970000000000e800000000200002000000015d70465eacc81dc4cd2b9b6f7f489b2bb31de550a699d569c0589113fd65ce99000000025ec3356bd6c3caead30c2e1d205568114908eec25191d7b964dfc13780880a89bdf9a7f9986261ae25aea95e2d3d8a97da4501c1d7dac43e6b7725c01ac1023b3ea317d34eb66a3c9df94744144040a6166951c519258ca0e558bafd3832bc4e7535c28f8dc6f88b3c64ba0e168f66e09a2a1d1c52d4216d7e8c26dab9078d50c90ce808b289d749a1fd70f8606192740000000c93a2e8fbe897d24bcaedd00bbc50107b5086170594a6cdad531179d0fa143edde6645b569358ac4c330c55264b2907b6556e6e3af973065fd38d32411b1e86a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b37dfa23d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2832 3056 iexplore.exe 30 PID 3056 wrote to memory of 2832 3056 iexplore.exe 30 PID 3056 wrote to memory of 2832 3056 iexplore.exe 30 PID 3056 wrote to memory of 2832 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c59d6f838caa709f3c61b01ed1d1bdc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558eb0f8730075d8a297f965d6aa6425b
SHA1575ae9565d293be04b0eb2e695d64f00b666e79c
SHA256bad6848da93c6b47dddbc8c059af72ba041034bf0f2ed90910c8412873119630
SHA512000e2bba4b95b7c36f5c8ed021bead74f0a52ded5cf3a0d86172778d795227c6590e9f599b136d759cd12bb15e3583bf4ca988b1d8638988d805f540455f495a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50acadb986a7d6913c4a31927ca654b00
SHA155a2f410e1e44f9af4fea9a6fd9bce75fe7e0089
SHA25663bc20836af54f72b94a0c8f1c570a463310f31eb141b41a6201195762f0ddc2
SHA5125d6070af94ec4d4820cb17dc13c6ef1086d3e9fe116fa9e186a24f8fb71f7e862c292a9ab0aefa98e9890d61bc4627692ab9ba85a6ce8ff4bbda9bd9f4623d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb07705c30eed65e056e1282c06f938f
SHA1b25ea9bcbca313dbd57e5cd58b37b7f3875b4093
SHA2567aa455c7299721177fa8257e4acb8275e752c9c15486282597d1f2a8b70b6905
SHA5120d57299395043b1caa08bfa80cb4e8151fad3a1d173d7ebd485665a32847d9e3154f164daea499a92ab1283b14844222ada8d87b9b908abdc5bf57d1f07bae1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548aed7d76acc90be28547f35fbbc1445
SHA10a216c94796ff8290a47a935eda76fd82a02dace
SHA256115058d692b59567d7bb35ff2ca97679dff192ee92f0a0900aff052ee2c32dc7
SHA512dfbbcba71869bc0d78ff3ea59b3cfa20b13737f11d171c56eedd3a644319645d428ffe9ff361615b90aaf5207db43ff88b73a91b87e1ee54040e7261690bda37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6e8d04b0d39bab4f0b5833f9644c618
SHA1bf904079145c51d63322b4e9df9330ddcb5b9b81
SHA25691771ef3f1df35ae511332259df6435ea27b60014ae77ad0489080afdc192632
SHA5123e1632143129bf7c9ff37d331dc1f2e54482e1af9fad426af31b01ee136caaf068358598b7ea7f45881d4972e8eeeff09a706d4c1ffe3b795c599d703a89b940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562c2d323cecd7b16098e83026c6e3549
SHA1ddb9b432f15312cf4771263f7de7596f00e543de
SHA2567caebe536ffe62c41c420e2b3fd1b4e5179cf2805f83e232dd58040dcfb7c287
SHA512e4c8564c59c418ae798a2e6b37e8f826ec767e28cf68957894b0fbbf6ffb6d75dc5f9293a1bf5493991509114dc901022c0d94d4b0be5244befdf171bed97d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce5e81e40eee81a9c566635d7cfef3d8
SHA1bb46dd007640f1ba78d0407304318dd5141d66b6
SHA256a6d374b1de7b38cb99eade8f30bd6d2b42a48dc0d6b8105711e5df22b7a4fb98
SHA512009d97f2fca40d7355748385e860ca19e4e4de0da951eda5217a487dadbc47cec3864b96051fe38957992f684ce6adaeac5e304c2cf8ded73b37dd1138049288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afee804033f1511e48fb469d97ba9de2
SHA1ef781a30bf1e4f358d931cdfa37e76c37c50e787
SHA256acbacfc4015ae8a62ba8bcfa06c565b8a51af0033fea7a6c1160eaeac6a3e763
SHA512a7d7d44cc3b6f5994ddaaa74ff6ab7b5d4a05e415158ce8166218962933562da8dae3a481f904074ee3d46eae9287f16fcbfe7348b9aff6019e0272bf27ac9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f913220978abd92e91621f8a4b14316b
SHA1f08f1a12c6350f5a21fc4e3b32eda9881a78ff60
SHA256e89d69d9e4edf09d016dc6d4a17e328813ae69ad6c17f384d4312efe3336c340
SHA5122da61cde9c67bea76bd54e2e58b7f87202d188a988d24cbda0e81881b0402dc8e3c4e75e319b2bdf9c1ea76b1cb6c1527d5f2d8afb8da8c0d0f9db73d4c584ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD571e0080664e3cbb100336aa80ff01c19
SHA1842ec88f4878fcc9e4602000028adee96b765965
SHA256d9faad15de6dfbfc6ed868f7a99ef9dcc4547e7fc91eb901553323de4ae741b3
SHA51280e5be6b734d7706fe383dc085e83893232f3d8d7049c39baed13b6585b2a460a6ed201709cd87bcfaee7c0db7b1e9612b139f41896fe0612faafedd932a2cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5459c2381188d0bce088b3b807c777799
SHA1a7e94eaf34a3f3acba8304985b963995db9d8fe8
SHA256c7bcac6c2bd0d8eb0b4ee438e3923984ee177cd92fcb4941352003a96c4b2507
SHA5128c4e8dc130a9168a4b4e67eb3059b76cd271b5e09f668cd610e3776dcc9c42696bc77751b3cbcccecff199ac9c4d748983ea55049733a2308a3f6d84ea6774fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5deecbab0deb9140c6d673ef6758236d4
SHA16062917fbfd89b1df1177273f159e8994ec75277
SHA256c7b1074593929540b2a1a570582be957fb2d11bd43c3dc504d325ec90faa88bb
SHA512c732d3b93cd3dbf6e3a88e1630413d600c00bde0cfebb18e96e91c2225b720009f3ed9054b573cc8709bbd15c3b2e9bdc3372c8575753ee1739edb874838a78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dddee417df9b250b18ad3b9c0a59a93e
SHA1f5b73c1818c1e2ede0fe94e62d6099e119d74134
SHA25621fb674b0bf262835b325de96f3a0b34b17bb97ca5ec39baed7602123f0b7366
SHA512447cc859b66a8a280a4a252cfcc7ee1378b3454d68633308642a773b4e7354b0bf327a80ad6184205906e79e563cbe154d8be8d5da8560775cca862916246af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5add358dc30085d0c9d6e484d6f912a88
SHA13d9b333b7b3277e2ca4be252991f6d2f1257a7e3
SHA256739f45a6e9d40707d4e3ec0b54fa0ef6bfb5b7802629369b3ff71d8e2d6bf306
SHA512c2013dbdb6c312e94487f4d4dc096ca2e2d1ba76d39ed81cefbad4cd87119f0b3701b10f5b301daa6ece82f7cc44273a7a95ccc31a0b5df5b12bc949920a15dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5351fac934073de6db0a2184d22281e18
SHA19f2700312baf644c183cb9c0915a82d34d5294a3
SHA25684d8e637debbfc20341709dcd7b0a548c7cb835b93a4748f10a0773ab5304386
SHA512c016d364cf92468bdf5cf9b14dae5fb134c802f50e7c00bf98e67e429937e98920198c23e804cc358bedd10b7530164e210426206b87fdcd74d50e5887de59a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c661aeb440c54196f34797f75409b0a7
SHA142f2f6c48b019313ed249c4ab9bdf333c895a3af
SHA2567a08a388bf19047595fa53f0dc26d644fe30d9df508092f4e2a26afe13466f5e
SHA51225e0549d632486c8ceab4b0850593938257ca73c807f1dc49a41b1ba8cd5cf53cc72f7c46568afa3c35840f7cc242c2a1467ac4cd96de879616e98ed3fe16ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5810ea955128adcf43291b9a47a31c82b
SHA1ba114d366bead4aae98d71ce28bf059a0da5b8f4
SHA256b16d49c4e92cd2f339b4cd6194060fb11781ba1fead9e0a3071614b96d0247a3
SHA512834f86de41ed4dcd9b729ace29b27a531071593b26f0ec60f3a0feb1f1034d168e71f0b8637a1dcf25af0d264ac72847a251e279e30f537f15935383e97af1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b412908a5166a4e00e4907b9cde3b16
SHA167bffba9e73dca5f2016d616da8d2b601b02caf7
SHA25690570e721f8c5d29fe3ba069bb783638c3f7847e126ae96c8957a7a9521cb554
SHA512d24de9eeb64a5d8db64546082781058f4725e2c73f38923536a588689f2ecb2f969ac90996c9404c191392faadd7df03c37ec360c4296006d0c8b546f9c743ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9aa87c69b68ff7fe64efe8006e470a8
SHA1275528c08576234296a1bde853ee131ddf908b34
SHA25673e9fce05228ffab6b93d37df4a36a77b77316d5ba2398520d7b078030d46240
SHA512783914f0d1ad325a55b69dbcb1516ac1c7e01eeaae9ab9f0e081f3e4fb941f9a6d8072b509930db0835ac7c6a1e44eb353ac7f13379fed7bb102c5814b46e325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f773330c07261994ebedf76d69979b73
SHA1b1d73b8277676067287c961460c13821ffbfee6d
SHA25654b5563f91888c2e4cb8a27cee4bd8bdfc3fcc043febf5b45934b94182ccfd2d
SHA512d3e2608c43385949a8c83416ff0ee638b7dfe2053ac978ea61bd891b143de319f9224cc98dfad7970a492f68adec2a2917cb173ab54b7e5af1aa88379998522f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7246a8864964b5c001c76410b545a7e
SHA11516950e318e4f64528992e6288e45bbf11ab3cc
SHA256a1c4714bb511993ed29e677264ae34a043e232720837f13714d5607745656625
SHA512e9082bb7a1e00d6777ed9e9d13145b175c78369c984a381db0dc2b1f0b1725630a8a97813858c6d5438096e47ced1cdb94d314e08ab4287e813eaf4b80d96f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9e02a39d8e518b401254a978262120f
SHA16e233db5ca3a47bcc760deb7f68f1433eeb4f5e4
SHA256120e199137a7a434aaaa343bca99088cc2ad042324a6c675fc60c323b5e3b614
SHA512b7996f397e3114fe3604a23ef4d1d9da2d8bfa0d67c9eb3211aaac989d1ccb57ae0e52ae6995845eaaf5a79b4559f052f93cc1e4c8809b7962ed9feb1c26b171
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b