Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
6026c3dea0c535d6b8d7196a5976d0da_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6026c3dea0c535d6b8d7196a5976d0da_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6026c3dea0c535d6b8d7196a5976d0da_JaffaCakes118.html
-
Size
674KB
-
MD5
6026c3dea0c535d6b8d7196a5976d0da
-
SHA1
0cb4d43935ee21012c56eb3c6b7d6963f5c5841d
-
SHA256
60b4a2fb70a253e56c0f16036dd10a4ffdabc55e2b637e1372df8ca83ef67fd3
-
SHA512
013b930e41c705605389aca99318b3420f3b671a4411dbf82bd7de5a2f7c1e8357a94d13c88065811ec6a8396fc7fc55d95c04f68b68e0cf50d9a4551c72a0a5
-
SSDEEP
12288:I5d+X3/5d+X3B5d+X3N5d+X3I5d+X3W5d+X3+:i+v+9+R+C+0+e
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008f2ae32b836b0f60f5e8f47e4bd067cfd32aa484033f2379fffb1957c92daca7000000000e8000000002000020000000e581a8dd205be69d6418654ba4de932726a19aaf5275a0b0ee65b0228883a6522000000086cc53e7688fbb437cb2037a950a9a5cbe11292bfbeb33574523bdf68669e81e4000000074a232a3994a7e0faf2ebf8a7f1b327dd149448a2e88f620981e686bb2730815de3a768ec023ac5d909e82ef1b2cd33016ad371a23dcc0a4c8110b13f774e4a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0de458691dada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000245b76780451903707f18ebbc084660e1233d4916e524aeb359a02c0a53d49aa000000000e800000000200002000000028d064e748d60bc2a3f10cede68a9e40e89be0a746cf4c5f1115ac29cb43cfed90000000e82019a98b23dac44ccbc1a530764a82cc5f3bd57b8519563b2cf40f48751694bf1117ad0b0174d4f5671aa90a0bc627f9fca275a220bd3487605af85ac7dcdcbe8b763b690e23adbfdfbb4a46d67db8d64ac5e5541d088de8b59a58300a257ce1eb0cc8bbf37a583a2d68ae6bf79c899d24194111273c901362ef2d055185e979a427900d09fcc5f43a46d077e94e3a4000000085e7b42f99ae09378c3c71bcfa41a92d9e3365c913e69763e48c2cf5eaef2aefb187adda7c73f224bbd6087c8bdc5397dba7276505ecb382a780ddf0b4d4a4c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427633880" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71F7B7F1-4684-11EF-80ED-4625F4E6DDF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6026c3dea0c535d6b8d7196a5976d0da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab911baa1a42b7fb84b47d021cc596d
SHA19dd7b04740156eec0d52548067b91d2ecab98749
SHA256c2d05f13d4786af86092983cd80d11923367f8ce9bb983179d5bedef9be32707
SHA5125ee8c5f837a9ddc47982e9feccfc47dbbe3eb62464207e436b81dd92ad267737633ea8ecc6e5be29eb2263c516e243c4b4e24c83aef10c2d03d87810cbe27805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51beb973ce511e0cac0e9188ced624976
SHA1a61f778b99162879b4e29ac84712f472d5fa4b6e
SHA2567cc6e0b1621ad60d4d088299e42473fecb95327675693044ff5973b6637c39ab
SHA51280901220c7825a8250c2562b7ade5aa82757619ba3d1fe3025c8ed3b2cdc688f15b346de6bf16a133b5f412750e90141b50c1296ef6a5d9be9d22357ae548d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb72953082f47e2ed322b358e97ed45
SHA1c10f583908ecca43911325c27f3356573da0abb7
SHA256327e1a96baa59793883ecce4ff0d0b4c51fc13e1c858cfd095668f6bb3ece7cb
SHA512318d6720caca48e658f145772ec3c2daee9b554728f3c8ee17935d202f8048faafa6bf7e966f7e42e85eaf0955b4786255f78b43bf5a04d8ca96d434895bc77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d7a2c3d117e7b96568331dd6f76462
SHA14dd1556c967f608647534c2aab4e896c640b3591
SHA256520e6ae2528dc7504aed503a74e28ad05cd66066502697f2ab845e448ffd00f7
SHA51219591559e9b317c7d7b02587f8e6bebbc7b11d616ed6071fbfa06964c3513fd73532103251ed0ae7268fe0cb12b7964c455278291a2dc4cf99614b94fc3a2749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003d30f8287fc71d5487e537d8b1b5bc
SHA163d3e853e5dae5ce3923b76b637e276b83df0f8e
SHA256a4cecf0edf45afc74dd86b18ea26f2b6dd5a1ce0176eca2682d6befd3d8dab7f
SHA512477d82035f3e170db5e8770158ef652753c9a4204d7a3142d53e673f90d41dc9a02b2f050610dbfe7c04e079212fe9fd03bbff9e5c18de0e4c4e9aa99fe3f10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70a6effea95673cfefe01fc6472b23a
SHA177bddad6815ed6fca719b3276ddf3aaa266035a2
SHA256623815fb04c03b9e0b50c633d79a96af4ee02edd6712477709f0b41ceae8d81d
SHA5120126f3b302a58c40c0a29b1b1f19ef253292685c6ba99a51267584b0eb999de09f70df01c38c2cda74d427fea30028d43a34deb9f4f049e36c045efd2aea96e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273a2cd226e1193fb0167f0cdf161cbc
SHA1fd53be359d2bafe84ee89b6bb73556c998834ec3
SHA25614ee715fd118f8da00b721d56f455cb098ffca276879645e39444ea30dc64e93
SHA5123b47d46fda2e652fc95c65640458b7faee05df8aecb5d551387e892da2648521b67368b10d2e24156e8d56b95786546bc20f747e9db59010e99e09a0559c03e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1670e9f77fbe8829e08f1cfc08d9eaf
SHA1a8c8bef9b9389206798626a688a1b5b7aa1b2c75
SHA256926467c2ffd0144010b11f53ba45986fa30678a0a5797133fd199a672feb2aba
SHA512307472a260349599b3ee0fe2409045fece511ef7f13d865f2a34c7c31283d9a972eb38095599f3cc307b2b18e6d294d02b5a78fa075ac62c2d5e6420d46fc784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4cb577d14e75b8a3747aeae92d0b0a
SHA15757f23fbd77d21b3fff29846afa51fe5433f15e
SHA2567e5999c8d80bed1e988f0deaf1d629968d8f0701c90b09a217935ea14ad69d1d
SHA512f216b8b359a40a75aa1dcd60fc666641644fb8081569af34aeccb6ce9bbe1f2c09730873bcbbf6fe99ce8bec9e24c7e9cee4940e9225976291148a522643579c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8b03b73cef08ab7948301146670d54
SHA1ea0286f1bc0ee82d8acd208e9947402811c78dea
SHA256b8b5ccdf302ab6f0250e47fb46b57c07623a53a60e58f7a845225715e459ce6e
SHA5122d3ae3a81e0d3498d4b7b49c7924e638d7521de845ce944f7ca6c8efe0021d04f36f8ffd2a20c5cdc83444ab21ea07b4c4e99e2df22ed79920de512c0942bd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd4960a5512795ad2c904633dadbc7a
SHA1e85399299e59a179d8edfc1f125b137d6b2badc0
SHA256cc11e917b7e56abe5cc293ab64c85275075fa122c6427e3593897ec73ef7e15e
SHA51204af351e2ceb5de02dbe21bbfde037713e0bc4e11c88f63249ddffe7d7fb177b3098268610fcdb4fc15620d0dc365a5319715976e8805fe2b3c8b21687d1defe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92a079e61132f3c03ad2595081b8e64
SHA10dad4e34a0d6f2edacd475533b3e63c3f6eadb45
SHA256de9d7fff626e30da044baffe7ee856b6817364025b0d05b4b2f64eac9e595bf9
SHA5129e8801bf7f7961e0dc08331d702a5dcc638f119a0c5c0c8a03fa8b8666d56b0868166747f702aef3e3f71619a74783cf457f27698af725f2d31ab9f8ae6de0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75e34675638afc551e56a31cce75c43
SHA131a1cc2e2281bd1429e47a0aa767491ca4b6b5c1
SHA256b6ef5c8bb8993603246cc121e3152c08eca5232bd1e6d81dc8c66746e3ca6a05
SHA512de939b7018490b4500f458710f33b17e7b7a1a17a83f2cae4f561285644a197873467fdff9f659dd36f94a812b0982b929e4891574455e23b2edbd5bb9aa44e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2438adb9a2405525be65d2d34b1c53
SHA1be55c828ff04ba106d4d59a8b2aaade554e0ae09
SHA2561464c41779e7e8eb2c8b103ddd3b948e84c5596ff81c9bdc6705333c3f8a903f
SHA512c3216030be1583ffe365c181f2046bca13a225fd560dfa03faa842da84649e5da911fc2bd1b40a4bc7cbe4b0cca59506c80c35c36da0576d695ca7b80e658427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8dac2279b2bc25fd29ea8edad41f96b
SHA13e934d71e6e8ef058947d80299248dfd3f3b3a1e
SHA2563d6c03878c67c71d6df0333b31bdc95070e6a9395307d9c15b629f5d70bf79bb
SHA51274723bbabac6a1f219bc6d4a2962ee344957c089a726dea77692f65bd092214915488374ecd3968021ae8f2510505e654d50a6c09252c1481a07298f2c30d256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592246e1c94cde5a976d80bf9371a1c4c
SHA12b7427dd5af1bb28451e3c2842165bacc5465623
SHA256f773524b8b43105d6179d8216dc9aaeaf9f3f0cfb8bc1833e5b03db2f0659cdc
SHA51235b0419cb9501cdecdec3a7cac756649d12bfd41467f0952765165b4c8068ed54fccb4578c5a524a56103466117e7da734391aae30df803962b8958bdc4d135f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8fc1abbbf919746b18b8b6898facc1
SHA185eb687538201c672e71afe1ace332dff0a0b6be
SHA256c1ac9d3c1e1ae2cbd2bd3324537f20f64b64a16468fa8b80817664a8a97e4ade
SHA512fa949af2d4b3e4fb3a1d1ced9d2cdc2bafda73b6c4114029d38e0aae7868641d7b661a313101fc30d7ed7259b957fa8b757ff73da7af894e354d9f26527dc28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d75cdcbe150e8e0d23a75459c388ee
SHA17759a443d38036d019547399f74acf87ac42d926
SHA2569fc0cba81a5319ecac167ce194ab4a4b6938b0a1873e44abdd024bfa345ce926
SHA512fb79bd853db43efd8b3a5822bdb26503dffe698bf1a242a060033309783904b6b6deffff18c6cb7698b904905fbaa9b9b187a5f765f02a9c53c7568481515b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203bece15e10dc64ce7bd2a5d011bb59
SHA17f6351b56b75dd81bbfc1b5c931efe1f00e57846
SHA256de9759e359f9b7dc89e5bc4bc245aaa8dc2f4ade881fa21a338dedc8cd0652ae
SHA51238d2fb7361b5d0e94ec99d07115419e3f4f127144d9dac0dac04e6dd1162356387bf555429adb7abb650987a5c5e0b4c037ce2f64901e125e0c6b3e2de532e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc87c53fb8e8a0d9cbb8caac9e69c88b
SHA1b1bc10265a3db5dea3555becbf9373b04c43a716
SHA2567f5ab9f0d79dd4b4fdf267dc7819a0da1cc467ff2774bafdae2166ddcb2c1bf6
SHA5123747a9f486f5331dbd0af070bbb36834699cee0e00c8df86b6ee34fa0fa25ab4f8743c68584fbdb25dedba05e80263a4740f4ad2be4109855176bf36bfbcda27
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UK8J8K8\player[1].htm
Filesize669B
MD5d02aca77344012b04d2725672841362a
SHA170b0d3372d2205bc0ae48dd3f7a83d3f4de9d490
SHA25677c40528087017be7c9eee276c5b0aace26d7ba0535848f2b18fba49cf784bbc
SHA51202957ffd4c799a7d598b9a40e257d2863e42e84b82e4d1f4a58168fd5160aaa0251636c6077435862a264318e365d1a1b0c3183491af8961d92184fa0acbe778
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b