Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
5fbb7aefc70b6188762cc8fd17e0db05_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5fbb7aefc70b6188762cc8fd17e0db05_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5fbb7aefc70b6188762cc8fd17e0db05_JaffaCakes118.html
-
Size
44KB
-
MD5
5fbb7aefc70b6188762cc8fd17e0db05
-
SHA1
a49a7a45f5f606b01db5c6cf2032cd0a0401dc46
-
SHA256
a23248c76db716924f164e95753409ec5ae3df4b4d13fe370eb552627b2eef68
-
SHA512
90b158bb739313834de9a1f4682dd42ac40904d9ea81ce20ff07de6741d8ff0d77049dd923fa370205b6bcd9d4b205028d657f4029630a601c282042b7a3bc1b
-
SSDEEP
768:FGM3qAQU9WMGafTIiYuQ2fyKJ1qzRAdrklCV/F:QEQU9WxkTIiYU/qzUrkwN
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000766c5fa39af598f336523905805a38a3acfeb690ee10c04a5e47d3a5c445cf8e000000000e8000000002000020000000344bed445e9bcb99d1052bdf15ad421f70f361ed2d8e64dc6c74ebdd14684acd200000002963eea6545e3df00dba341d07bd7449c1ba764897848932a677ae4ae089ccaa400000005a7d16b213a1b6f116fe39a5b502253e9276213cbf829a30c43803b44d9b513ad781bd1063f75b6e6550394d2d45826bb32dc0c78287bd4e2f98c5cdc2307c0b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f24df37ddada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EC25DF1-4671-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427625580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000bcd4a9aaf9184cef06732d02737ccb163256a618f3fcda209cbe4117ed228086000000000e80000000020000200000003e93c43547edb59b8b8e67fd099dfb3a46d6a542adf23e8ba0aca1fe6854cfa890000000df27147b8d94f8fe69d90d5923a892b80966d20b1d3735f851025a718c27f523e06ac93172e926145bd4ddb1d13ce08b935878e90472003ae4e1a2009b96b5fd5c25b6de5ca8eedd4ce11e77a9d4121a6b26cde7f9e0474ee52a968470f8fc97c33d33c746bd394f1d6433307bead6b6389c402c5d05eac7eb5fb5a3879543c04b6d0fb9ac05622c83c1666c2465a44a40000000357a303b5a5e899bc4193afe22cedc8f081a613e108dfffee22186be30e61327536f0c4248bfd4825a23172c158fdddad7b579b2f15c152ef4760a8d62835301 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2376 1984 iexplore.exe 30 PID 1984 wrote to memory of 2376 1984 iexplore.exe 30 PID 1984 wrote to memory of 2376 1984 iexplore.exe 30 PID 1984 wrote to memory of 2376 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fbb7aefc70b6188762cc8fd17e0db05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e684a6bcfa858f625d0d81f895f729
SHA12c758eb38eae5e286b7a2704c9084825b20bad23
SHA256c743f97edf37c4e7207240a9d10a219b103a8cd05fa4cdbb1406ac68f765bab3
SHA51250421007479beb2664f16f67fa113adf19df591ee7217a6c51cd82124e7944ef6c98a0187783781b4a0221f13bb4d8b21179c220652c69dbf8f04d758a5f8f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30afa3361daa65ba57237d4872ebde0
SHA19af8e41100331c050ecb60bc861ee730c4df5699
SHA256f066ee61d35b60f4d0195c36fe216fec7c6c73da94d5b2db326926c6cfc99f50
SHA512b712b5f53c92e2801db03972a7144f667ee9e93800afc1e4ecddce735dd7d2d0b44b89105ec8b79e026c9fb9641963b3b4a511e99ed4b591e8adb2e53daea36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e34aee16bfcde689810c96eb29f19b
SHA1b9670ef4ca3ed6a2efe3765dacf5b6943d357d37
SHA25617b9914ec47512aa56ce3b2881c09cdb2de3a42a4e1645efe6f6e920ed268007
SHA512aa3846e9ba100a746a7669407fc76b776be7e7233f50b2640c3afb44e36db2aa62d3e062baad7afade30b91b2ab7f2533ad8d9c8ef311925fec980ddbedc94a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633f355d3b17297a6319326ef917ea9b
SHA1efffba0a6c63eb6aa7a2a32a130c07c5edffab34
SHA256cd7883c251cb3ef5d8cd433b95ec45b77f3e44b51216dd3b166e299ad9e3f92b
SHA5128e01cb4c0ad9d881160d792d043b81661eff9b278ec9cf2b03fdd9daaa4d892cade08aa11eca61fd369ecbeb513f2165c7cd5e527dad663f73fc284276c8a72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307cde2858de8c82e08915becb7aaafe
SHA1b276124fc9569bf46f51b326c34be81fddaa9b8d
SHA25665b80fa1168d3aeef5d70d570ef4d4e38d77c0b352cb33de6b35bc59d924e1d9
SHA51237a1e82410bf291c3d586fabd97ef09da4e7df9cc4536826b56346ce91e25a394fa168a59a2a7f29dd5b4a8f5a4ecdb47a00585c0eb857d5ede84abadb971457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192241dcd24f0fa048053535d7c992a4
SHA140309ff69c735f0529f949267302410510eec6cf
SHA2563c69812209d194ef520f73bbd809b8fd9a83c07c66fb4544be68b56164951bc3
SHA512cc0781a2b8902f397e71bc3058b9da71485457689674c3263bd2ff2de3575b253260c16cc0c4639340436f3eb5d73e7021365fb117d9771a9e743eec63f4d663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489677ed89f3c5ff0ed72de18d8c5ff0
SHA10832d1f9e3a9130af2fbe9505991b95c1c2206ca
SHA256373976666a35200b90400df6bcb3befdb0410ba1f2a2efcf97df10a0dee79040
SHA51276ab5961cba078ad3f9eb69218e3b6f6a4b742f5812c93f3c75621d53425151e460cfdb5afd6c99dc857932a7166e837d5388423e61d21f63d98bc1b666b76c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332baed1fc3605cb2f18ce0668a8631a
SHA13accb104b01d9b1b41195dd9288ec1295e9bdd61
SHA2565029330bddff07c5e861d1c26652431a4d998277d7cc405ecf2e538e4f9193fa
SHA5124ea804c24d1754855245eca8d7649883580b245e30ee3ed0397291e179aa7559cd9cd26eb64d4322643780cb99d87b8ce722328264e420dbbd676f2276f916c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bafec95460fdf998062bc68caad7af2b
SHA19bda4853153170296f9b8c2d3b96f5eef1b1aace
SHA25692e4cec39dd59b22ee2b50d487312699c71db33785c67ca3210fdcc2595ea779
SHA512014df0135e2ab72b59ee2045593f5ea650393fff6b404f3515768eb6b9240c5f8dadd7886b03bcbd038c1286cd4a2db65a9851ed55b7a2b3e9ea7411112e183c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61eba4cd0926bd67623abf197850794
SHA12e63b9cc3aa79cf285f2a76cbebd3d662c8bcfd2
SHA25601c287457d55a3ee651404d35eae757c9b45e638e1931d3c6f3a4a9727e407aa
SHA512eac3da0b779c936e7e4297e9c58e1ec1d5853e36d4f8671f6c352567519593adeed9b53c5aef8ed293be700607763b691a1bcc8b821700b38fbe6aa1f55f6bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6782f45a00c44358d4c75d56fed0b88
SHA1cbb541e9e35ff45743487372a9703dfd25fa649c
SHA25630b17fe838aeeeac76b4ec97f102981dadcfc4fec987b15f67b3ce5b0f5c3667
SHA512cc2b586ccf1bd49c71cdcdb89139dafb92d3c16d286e7c20f24849882c3c2d71edca6409bdb141ec888676682d668a7adab9c37fc12cfc78ab7c00d418f0036c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ace780b0e1872b14c1cfc682de854d7
SHA13770eef1518c2942e813df9c3218f74513d045bd
SHA256b1ce50e4c26555ace4af87433b185123e86955cd481fb27c503ee433871d4294
SHA5120cb5d20e2eeea2a4e3df7c7841d27d151b45cf4cb435355dda73b9ec85ab8a35b655d70884cf7e6e65a06b3d8bd33ef79878ed73eafc9be2d57cd48276bdbed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2108ca02dceff062d7d1418c4d5563
SHA1e22d84d9a4feb5e6463ffabbc44829a7f5f4ae2c
SHA256534fe6d5e90bbabe98a2f34a556a092ef8c1f3407482f554745c36dfc7dd0f20
SHA512c12e20f42d266bbb457a08b5937184f7459157da8f6b12a035b34aea7199f176182dbd12844135a6b21fe458ba6374ad2b9f6e96ab49cf2a277889d4644e2507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091210abf107068cbdc772835e350d19
SHA185c67b4c18a322472c394a2f6368c66a942a9148
SHA2567808ef32e52ca64a7a95eee13535e4f6a8ccf9b1920452a4d2e8ec5eaf03d1b4
SHA5125b69695ea9c673f9cc7e5660732d6e08610f7cf12670ddb005cbcf2ac12346f5f2045f01438127d6e918fc4a4d5b28f4da8da1ec6c6702bf58f9a320cc2503da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0536911f40202c8af9ff1e8a593593
SHA1e6e5b8c939fa56da43f452e6e002b985b6909d92
SHA256001ce852860297d998001b9234956c0225aade62de09adb2647deef1411c6088
SHA5124c8e2c8664fde72c1920622de6e65b2648506469b85402c16e53462614130329e03eaad60004c6b8f042b9cff6327c80bc040294dc84c76c80e69446ac27bc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235fce8530aa35f384b3bb8d5a82febf
SHA1220eda730660bedbd1fecb1f22bd461fb21838f5
SHA256a48449665223e556643020305d2f08f22b1c73cc5ec720664f1b06439d531f2d
SHA5125b28048d0bc26e1d775960630555e0beb9fb9ca4d08f0ff26d955751aad912177922e19f3b062ae5f196b91141f928b9ae36ae648a48a04d3762ec3129c39786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888adcb00517b3e6626c50ac4433d15f
SHA176951f81d72e9bc1b5c64992c7010abf28b28249
SHA256a402edde979154b8c1dc8b6fd8b8c6c432da498188444b9663868c0589a8ef22
SHA512fcd2fddd6e37c93661141a433c2ba928738724676989934714e45f132b795972145bb799190a5bc9e1158de139f17f706ba547e516c8e639faab9107f6b64dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57446f89a8e31df984725a505d954c45a
SHA1b35507ec419f5afc336a8c51a43ff0da9bf4c52f
SHA256bca6eeb1f20021b08ab0fde4477513cadab8cb59a7d7d4e00a71c84b2ba40014
SHA5128af191fcbf4863d9f5caf9fc48b1732a1b1b64481650e0908510c580a544e35953520873cbf3c40fb35e7e46f6f8e686527b743772a1446f6ad9dc4d4e078cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50140095f5fc36b50f40c8314c7cea66a
SHA174e74349d1f5e03bf7d748354b57450b858eb72e
SHA2569bf8eeb4095a63739ddcf175a13228bcf529baeac28b042f8506a79ce6e94dc4
SHA5120d6d126fa0673100001917549d9b0701bc2525e4ed6ddebfd0a869e09d6f7a8e98e49f1b618001d12bc44f2f3a3bac2bdb97f8c75a186dd1b0aaebcf71df5240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60b522bc2e57ab217f5ad2a3d1fbb41
SHA144c46044c775ba3b7caa754986f0d38d041fa173
SHA2561c07f4ddb11073345ca6b2a1c85c583946d18ecb7f4b6dfacaf80c7a0694fce4
SHA512c0eaefe1862ca6444edde2011c728b8a954d8bdaefe3e64cd4de4a5f1705e98c1397a71ef2e16718c6d0702ec40115b3090e8f02007b78cf4abf8c17d71aa0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9605a26163084467121e87b5743278
SHA189277555d328c64934e18ed16fa6725d5810dc71
SHA256da6046a100af7b01e60949c2947493d74ee6cfddb4dcc30cd00e2cef93db43a2
SHA512a68275a2eadcaa7e3e8934cd2393de6ce76287fff98999343a1771875eb542e1e6f2d8c888c81dd77a30dd68d5147d1ced149c61cb1a75448cf4915868b082ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b