Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
63cb0e139d1f0e2af192ee34361e250a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
63cb0e139d1f0e2af192ee34361e250a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
63cb0e139d1f0e2af192ee34361e250a_JaffaCakes118.html
-
Size
57KB
-
MD5
63cb0e139d1f0e2af192ee34361e250a
-
SHA1
fd165c9023c2b3133e3380f5fa731fdfc3e7288a
-
SHA256
c0751a3826f855531218a39da1987561bb23baa3a2793a5f526affd2d7824e68
-
SHA512
2c379fc750a960f53088cefa2695164bb2c7a72cd165cd9b85bf1e32444237fdafff91f856599145520b847bc5d51e0b2628124acdd6cb0a51309580f4220149
-
SSDEEP
1536:gQZBCCOdS0IxCwt4Tfsf0fyf9f2fdfpf6fvfNfcfAfffxfgfpfgf3fJfBf7zfqfi:gk200Ixgkc61OlByH1EonpYRIPB5Tzy6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cbc8c14fdcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000008dd3c6fb4a50d8750efc5362eed1acbd4e98afde77fbfe013cebd0a11316790d000000000e8000000002000020000000de39d3f48d1ae2403bc9c7dcade4f5e1bbc2c84e7efa0e5ecb1f8e0759f9ff1f90000000daa46704c89d892b1fbf51a3ab3d2eb61256c6d225aa8c68a686035a334b9e941ee54746d15330c5e9aa7bf5484ae7366c2a5b2c8a215910dda8e10956ee9698ac76aa378df3341cbe68342f8f5a10799d6f386e5d7779962247cd5c8270c62586b92b3e93cee56939c8cc2876fb04fd916bc30e79f02008f193b58a67c973a51dc4d477b795056bfa4043b7853d7cac40000000cac4001af1af55b4b8c8fcc53ea387d8b2ec2a508e0c8cc09c5e6cbf58998ce5874d71778266eaf721780a8d1ef1f636ecfd17da63b50fe4b5244272630d4432 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427825639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f88e3388135583efbd0b6750b3e3bef135b50c65b522db069da1f8afb4a0f222000000000e8000000002000020000000122630f28ca6ebd12d867ffd91301aea9cb3a2d92f3cfc719791e82509bc4ca720000000b24b535432c3d18f6f3d0c94702fd237378425e2d6373eb0a9d9b823cb55f46c40000000a9fedcb7e707ec075e49723c6be03caa29dd2fb5e7dbca922a8476bec1821a3810b81b5d44ccdea1812c499caa80593f65470a2caadb3b462e56bae1f089a93a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAA741B1-4842-11EF-BC23-6A4552514C55} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2192 2036 iexplore.exe 30 PID 2036 wrote to memory of 2192 2036 iexplore.exe 30 PID 2036 wrote to memory of 2192 2036 iexplore.exe 30 PID 2036 wrote to memory of 2192 2036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63cb0e139d1f0e2af192ee34361e250a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51798fbbbe41c03efe8f5315cc82705ac
SHA16903dfbbaa44772fd576d68d2cde5edd336336f1
SHA256f7493f421f6ab8be40d137851e312862737bfb21db75c81daf267047e75ff4e2
SHA5122daec7c6f4730cfc7ac190f0d84a2553d3af5afba805af40e03668a0977e9349c21c1622e46e9eb38e3b3374b8834e37d2506805f09a1c2ad08b908d45db3751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9034796d9bc00899f860cf02d449ba
SHA1f211bebc9856d50d9476404ec0e53a64ef9590b4
SHA256b5abcee0da655061bffc77e26e45e6419184cd455dae86d1e9989b69791f8a41
SHA512c04897ed25cbde922598f9d2d048fa617c11ab0ddfeb0e941505941062a57b49c1e31f71bc686c9cc1b5dfa6066c447fe28f54debf0d2f9067c3e65e04e89eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a168d7b8ab7ac95a1504ca43c4bfb834
SHA12d1ca31733029d131a777fb06549d972c7553bbf
SHA256c9ae99997f5776147a2b43a9f1c7d54539f4c9d3500e02a77bdb6d69bcf38885
SHA512b19fefca1d02f55c08a38dc691c5e8ac3e62e3c1f83eb6d1bd39e274523f60de5eebacc95aa147a4d6c4948d2950149221933fc61876911b86229d86c0d63270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e6660d9e8f7a4f88158c9d46bab7d7
SHA1f13e353cf93e38642a58b89003723d4a720e8a9e
SHA25652a5f24e6fcc3f7efcfa0d039e174867552b424579e976e86855039810012135
SHA5124f6c23be694bc231b4d187aaa49a9856fd789a111183b70c98eac9993e9271133ce4a6e2e46cce536a38c7a2383bbd14535a0f096c121cea7ce12fd5da7f6c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58adf66eb488b4ed8a1c8b650870b2253
SHA157f1188f409185df7884da38d36e89d04956b4f9
SHA256bc3411836a70e3aee4a0493abce6bf9a85ca34c4c033a95680330349690f1d02
SHA51295239d7af880897941404b6833db2a4ac25f1ae38ad0c68f1cb089a5aa2cdb67afa804e2aac05d27bfc30fbd39e46260b0743dc7906d185649d9d427c882005e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1aa03b3dec32adf42f84eaeb57d70b6
SHA17b24300ffd943c491248b3fea16833a6e8f926f3
SHA256aa4769b330beae23ec713f978c66bed36b01839308a056e0fade684050d6be6c
SHA5127c7778f047134f5f657bf7c19e1e0760a638b260ae10942c7cf2e2c5212525a615c30350eaaf93ddd08eccbdef7fd22f66c2002f3ea1320cd59fda1aea714736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584059ebdfa045dbbb0621b99bf19daac
SHA170469629c07fd41f2e902ae09a4b7ba926a054c8
SHA2566a9b063e6b0908d98f89f5857d143d1d2a13c4a190b09c68f8b7a5455b50f39d
SHA512aabe89905e14f0edb4da0f9757545aeee1f674952547108f2909855897cbcb5ff7e3c0ed7f3837acf09c91663e1bc32ac151c4ab814c99765ae33a810685c958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6d887e5a9298ae619394a72cd0a2ad
SHA12f28c0871ae5ac75ed41d871e919d6b7315bf6a3
SHA256ef2d65fe12982be04b8f9e06530f01b4c29896d58dec88db4ad3af9b49c6ccce
SHA512597f889ad6c20467dd0bed8544278f59b1c7c87bed40e094b3582f9c82e9fafe4f4158f68f7eaa2bed2abc09620b911fe102237f7a118ae9136dc1047722984d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ab936e581da647042a29f89825bf12
SHA16c2783bfae28ad8d2c766970a935021342987a64
SHA256156cc591aa1f9209c44a78fb88f6992f46794b0b3a209d72cfe224d5a29d67cf
SHA51208e77fc942ac9ae9fd6b049279f466e58e016ab6d8c4d67fdf193322c5ab64163ed680666ed6cabb3406608339026083d5e63144e0e51e9435bf2fc2ece74179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4539a53010f6dbe7d921606dc46c472
SHA156a0e6f5b80ccc9a03285d08920ea16135151aed
SHA2561d7f9f7482ad3042cc8548064c5161d484ce4ab41e6d3d626bf345f5f97973cb
SHA512dff8390b727e5b4e7865b36c70e4c6b029a3e5efd5a79528eaf9022c02e78e4775e8543b6e0a19f4e170cb7682ab2b65d1ef38c141429d6c067cfb396069a207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec48e586869c9844e2694d2c43ed0af2
SHA1bf84415341c428534ce3a5c9bbc0937a4bc5da11
SHA256914ba05307f07d7275604ee17f3fbc4f067afd5f5ebe32578dddd750b8b32116
SHA512a43ebac4647fe36660ac31697cd4b986b737aecfeb7f2495c21b04b61761ffb86d146c509a727a7ddae42ecdbb3382f02c87aa3228f0276b0432b554747a4126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d86bd342d230a9950a012a2d13d1e18
SHA1f6e4ed40851f67d5b13c78d16d39a781f841abc5
SHA256d28cab871caa476a157623dc6f1067e155917b2d0adf75f8fb78e8cf9ed142cd
SHA51220fe528caae2023e1bcaf43f74762d722e441b062784c75744a6c2fe3c7f19a94f54a6f68335f588a50f90379b9ee31e08221db0c92b13d1d58f0c01fe0142b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa20efd519ffc4d1c1302e3c3b4f47d
SHA15e42427d0fa2468cbf3fc8b46bf3b67c29150a9f
SHA25639fda5199a730ca072905c1e55725549cd781794f8b65a346cd8d011507e0ad1
SHA5128c642919876b50c798618f8821b04d4bcc3d6774a2231949b020b9f7c9314f597a76ca94dc9f12de78b7ea713f98585bb96bf08c03752b3e50c3e09ce0e625f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c446a414fa555c4b352c79ccf4d82c
SHA13a0e51fa2fdfd4a4abfb52c35214db0ca6762661
SHA2567a4ea1d2415d2feaa5ac99a0cddaeb945f275d0cbf26a87a301407752fb5494a
SHA5122cc61b12321ae271b77cf2bee69011edac295fef61b2307e1466215a77b8ea20f7968a15fe20c620d17e65de8414d06965fa274067dc8bdf8ff35bb7d9635c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c748e745cf8afa4a65f06813f21cd0c7
SHA1573e6d787847051feaeaa41644d93733e1e36e1c
SHA256e4bf128d6b1e3fc04bbf8311b777d63d5d8c334bd947728f20b36593a4862101
SHA512644761471b8ab7bdf51ba98e5463bb337f2e24db0b194b387da7bb7a27e9c92a8b611e134e2e30768a8a9d89bd8287c707249f44e97670b1066189b94248baa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9242936c57afb855244af063ab26b63
SHA1fb344999d1dd69b3ee33b5d22c1f63acc526e00c
SHA25691491aea8e151b854d7e7e18960ca7af948440d2033eac7cd48800e3915be831
SHA512d1788e8306aa6d056eb283c4ce0f13a68948d4618130d616461f6b51afa73b2f892c639288b697a249de3ff8d25c0cd6ab384705dfd884919989caa711ab1281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4ba95c8b31a4726480a4d03d7a5fab
SHA1437ed95ccd9a8c0c23fdb425ac4237a5c3bd6034
SHA256960303cd19b7737ef0a9bf965bb4e16d74ccc7a5fd0776190d71223814acadb4
SHA512c482b5116d3b83c358249ef0c1bf28d231f390e641314ee2343403b328ef6627ab30f87c078f91879f8a17b61dc8cf498b15eecd40304159df6d91c61022665a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb05d6d1fa26944552b44cf9b1796af
SHA1244448c2896645c4e26076094302fe83e3cb2a6a
SHA256b910cb4ce631b9a9f64cc41d3742d6d11672a549b6fee42cf815ad6614f30e9f
SHA512d1c3566dbb19cd13ad01913d6adb6e52e2cf6772d446c1d0aa0b79c8b682e6790d4d5306803747b745eb7ae34d28f1cc5f263867d371b9ce3d31b583d147e013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df6ac911bd39069931f0c9425596d53
SHA12c5ff08795ced80bcfa701cf209f0c2d749c9ca9
SHA2568bd191a0a75c64a4fd73114e19a8f8c4330da91cb804634f3015cd75476d6d0c
SHA512b14fda6e160367db2745e6452e07f4c182e8beb8e8ea5cd09c28291a870cb97bd950b3b1cd673c360f6548f0dbc64a3bb945c075a0a8e662cce0475ef2f89d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f519da051bf10f939adc5ecfc06b7a
SHA1cc8ffd1505229506b5f92fdcd90252cbdbd48fe3
SHA25690511b54e3caf686ec559e3981ec0e012499d388dfdce77e0e344b54da98cde3
SHA512b7141fbf9669163816a796e04c5927d6d9c84716cbe34347a4034ed7a79b0773f366a3d04b34b0a79e733819a9f648134954ca7b6d129896e10ac157fe606a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57febd27af04ff2b7ad2fdccfa628c353
SHA1b7858ee394223478fd908638b1883bbb6bd4c984
SHA256c22361b17ad59ee41e1e6a976ae6e9f6e95c017f0c6f69db5e51fa0412e686a8
SHA512be0e04d13288cc12f75bc9b4d0038c7d4cfd16c3c66226f1c7fdd7fbf2f9003171275b103811d68fb0d12191fb89f1184256f3a8cc20674d1fb6d4a747b3c192
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b