Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
6677dd3b49a282670d5d488d351ba382_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6677dd3b49a282670d5d488d351ba382_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6677dd3b49a282670d5d488d351ba382_JaffaCakes118.html
-
Size
21KB
-
MD5
6677dd3b49a282670d5d488d351ba382
-
SHA1
66ea2fa00a975eb620971925a06473deb1a24f19
-
SHA256
c7497291e2ac7b4e3054134c3ebcef3ce9ff5de7e7d9ef1bed3d9264ea0b535d
-
SHA512
4ebc255723da31e41f30240e91e8a78db12812326b4d9a03f9793541bc7c942e83461a9b74a5097a1f55998e4ff8f8e5df0d5923105a4a1febcee4e80b0fc2aa
-
SSDEEP
384:ZmlQuq1uwm9TOq9iNesjKr/En6/JxJrqr6tmJramOrEtpm:ZmGuONemLmbim
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5095494cd0dcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000cf43a259dabd1fc05e0fa76d9b6371045af17cf58a71503c1020a1bd037ae197000000000e80000000020000200000006b815b9b13551937b768d15b618168bc86ce73539378385d1bf912b791aa5a5390000000142f7d1c096feed11746af679d42180301f2e3f653bb243e05551b67ea8b7577a80dacf680f3ae90c171bed087d0090a9ce07d44f10bdcc1bf1e601a2a0b9cc266988475990bb7f52ba6af1ec2c849f52235559b78fcd0a091d6952c846774767bbc248c8eb4b9250588b3394ea9267053a389ab4a7810a6395a6035d063fb7fc449708d246d87a0af69c5521fc2273140000000207f09e41f81d8e26c907f30bbf5f8207a718a03c3bb4977955cdbcbfede145409469f2ba9fa6e6c0c86fd5ec8d714211057d231444896fe876a656ee05e08ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427880844" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73734721-48C3-11EF-8340-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000005a8a75e079f1e104b6f30dd535c116bd6e25375978daa75907b0a42d4c1552a0000000000e80000000020000200000006cb2255dcd8bcf19cee79500b69e08fe656aec59d7fec195ed4bc5caa8bad55c200000001cb3bc6a9ff7c2472f8eaadd7ea7fbfc305ee923b9f50044745d031af10405924000000096bab271f988b9bf0d7518a9372794c98285e8db20630f1adf2b71435a0db59ee657b14a09aedd4b0d0ac2439c041773ec0823270bb1616f2b5e2009aa054f0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2180 2308 iexplore.exe 31 PID 2308 wrote to memory of 2180 2308 iexplore.exe 31 PID 2308 wrote to memory of 2180 2308 iexplore.exe 31 PID 2308 wrote to memory of 2180 2308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6677dd3b49a282670d5d488d351ba382_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f553709fa25835a4ad325fdac5b04d9
SHA1c96308e7e4ae0f9f1dd700bde2f636000abee91d
SHA256b1bdcacfec50799c73f035035e84dcd589c1aa331c690383fbf59635c708ec98
SHA512830c2180b9d83675627c3b2373d493b6389652b967be0fa4997f890f57a8e377e45b1b2e517cb1d7c16e578a0bc6ecabe9dead5c1a4f8e161a2fcad63d1052a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533cbd030730b3dfac80109a832f7fb8d
SHA10a1b877c250c189dd25613dde7ac10ec814caaa0
SHA2568f3147b0408e51de3279bb22be6eca2e47fecd99a45e85d44cd321d018a3512c
SHA51245c184f49956d0194609f19faca194e2dbb1e441c7d7d80953cb67ad2e1547e374393da4b26810e2fae6de9c7c2c14a5af846133b5e7f0b3937c4be90c5ae918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6bf3d08971dc0b9ade3bdbb07ba2c9
SHA167b4a5adb990161553768b1fde2993418884dcd0
SHA256bca41aecd2b94bd5f5744887b29cf5cc0a991c5573c09cf50dad1ea91e5b125a
SHA5126f2e0b6138fee4670e711cda24e736f9733caca4c995c446cd11d68757d691612d375365108d1d2cc1c1ff35896c938bd1dbee6b399219815fc3e40c645be719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060f472319ab15ad0a891d77e76871ac
SHA17544e08db2d0761023a51a6474ede3a6abb42fa9
SHA256de27c9f4a8c1945a4869e3313f3f0105d81bafe8ad3c9b8c2c1dd0b1bc8f3137
SHA5120399467f5b84ceb6ab999856e989409376df5f420ae6bad52f0ff1443cac162405af8d926d4761e3def4ad139c10828b4e288e2f4dc1993ff13a50937a594ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b051244b86853c64e1d7e18d2239995
SHA11f580b3979915623e5bd91595aad3781177d9dc1
SHA2563785559f03896e8f6c097af52dc5a2b18c17252a827d3f0c8c3caae5234081ce
SHA5123ce65eff70d2191f6858ce7528182f84b3e2c1c41c5c43a0a53b5353b04a35afa1c3df43ae21e025fe8fa87348ac4bcd7891e71497561e66a5e5f2870dccb1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c53c5aea055c269ac45a3418d53d1bf
SHA1901040674f2fa0413ba8f1c6da55832f1322e99e
SHA2564e3408e8185093b8e7a3b4f2e934583f2dbc90a74167b51abae6c4fa56ae2b76
SHA512ec6f3fb9cd3807dfef8a0ab75c5d90a79ccb154a2f79a6818b2eb6e0fce0e6dd4f68f7071e4f6d865af2aeaceb50c01782f6b93e39a49ed27e6b806fc08721e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f5f76804d95a2d9b7a014d58bb14c79
SHA1b6351b760db585de956d4fe27a8add0d4df96c06
SHA256da29c56f123eac5d090f53caa3e0474ee881f5eef0d23477e26afa741c34ae91
SHA51296359e3c0842a731666c82b273ea4329f7ccd32947d05ccce21f480b6b6f6cde5db33a983a58bb8bbe81e419a0c7fab5e4b887a1f8a38ac791562c07793fe203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b704b95e08ba9836b34cc09d4848d25
SHA1ee8c6e6412cc6095da50d81ca8b60b152e3c5a3a
SHA25684b3a267872ae2f5fd828543302dd232a35a97450fcbe9d6eb3b2a2b6b615eef
SHA5125bd6a23f3c281f84d7c37898c99b04db7f2abcbf730fbbbad41404da7d4116660c6ec515643d836704bd106bf98841c6796849cd6ff7ad370e204e1ed8cfc6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f1104451ba732c10c9278a1f893906
SHA1c857d101eeef8e11941bb2cf69754c547b556e12
SHA256583c0ed4c71cdaac1e02a629646e298f1f3862eb5d5043d74c2a816cbc3ed937
SHA5126a3cd746411d9646838f64e3d80189680792129cc5503489cf1afc99f703d1c9c8d0e4ab8f53473ace1a71007d039465bc32d191d1f4767b4ca7480554988bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4de4a76894982d59fe10f002fa3ec9
SHA1b7d2c4f1f3aed0e3e0e937481434830e2c2da3b9
SHA2560153d68444d354c17f071ec50069920ceb0f826283673ce7f5a3e1be6c717903
SHA512d3363c74883eb821ee60d4797b7d705a61cfd82c7a09001b398bce97190d896d3437306515cbce30e6ae879fd30c5a134e8e797cd7de0866adb0fa9c19d47ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570fb294802454ac21440c25da14d55ef
SHA15dea88e2ea6b24ecb600fe80f39dab5d0330c2d8
SHA25659924e68d68d90b2dce8a8237b88d76b8aabc087281f463e6614b5c4f4087bff
SHA5122c105cbb5b93d38a4cbe2c1c53ecb0ca9e363bcde8faf8f52202c4e4b735156b920e83e5397f72597889869b16889d1efed7888f10e86f3773d6f9f819ab0168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a944421c1ea17be6b7d41f09bf93f2
SHA19aa5519085de6c452d339d6e7ea4896d8f3727d6
SHA256776197da992bdaeb18b5e9e86ffb29a161109811a9b12ae7023231ae8cddec49
SHA5126275853814896d5906fcf712e54724af206fdd266ef36ace8ffb8ba13b15acc149735f77b5418a0f0785ad5ed9b2d5319ed5039be77efc17bcb0d3bc663161b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e64c7fbe2d11e753778a77688300db
SHA15417acbd5482ad988e8b3f964bc2b2c639000238
SHA2561f8cfc1e78dc6c684d7b61927c2c12cbee379a51f3775a3024e211efbee30321
SHA5122bd873fd337585bfb317f42428c8582d525d71e53b25b644c9c264306a135ffb95162492b2a418662f74afe35fb55401bbc28f4d9d4cd3f19b79723358196249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2917f17e7c163b118b226cb00bc183b
SHA1f9ba6294de8f6cb73a6becb848b3e6c887c43cd9
SHA256bb39a8f8b5f1aad52e71e7fe64824f872caf46e71c5cc9e97d29289b18b7f7af
SHA5120454948b6705f0f3b8aa83c215ec46e54e7472a979866224d41252d8d675f0ca036ceadc0b7e6aba6a33165ae9f0beab0aacdde36b34325c07eaf4bf6a89dd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4a67913042a2920d98b2b87edf3f76
SHA15dfc29061f6f5bf29b2419f8f1dc05c54f11dc51
SHA256f80057060650cd1f73ea9f92a3cbeb8c5849ce0f256448b5f1849c35dfcde401
SHA512ddf1e1861edc5deadbf2dbc85204da819929bbbf01fd8de37b1fdec5a6aafec45f084c6de29063f1351c083c1b001c4f29d150964786d69d56b35f4a903ee5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483d2d3dc7e3335c3e6cc431f9496bba
SHA151da612449ef56e8d6d52b8d08f749b56acfb309
SHA256a60c404bea81a5b03415fa62e27aa64759669d31f462091f1a4bcc7232629019
SHA512d78aa60c829369d7068b81deb80d04b93201532a1fb8d2302cf913d32a5abe9589482e5603c787e1706ce2706026cfe0e77f3ecc54d65ebe98920da3e4290270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49f8d2ac1f161804ddb6fa5cf014b8d
SHA13a56d862acbc5af822f302cfd5f4074282fbfd40
SHA2565a45d3ae45ed36232852c77de802f1c2f0072b4933d2bc62379e466fc87dcf43
SHA512978b112f6b4f463507d35128248b766d7b9b70e6e73dd123dcd5d11e7906599d80ee35b0b29a91064bffc2c6c359f3080415129f1f7c14e6575de5ee275fb323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc91f6edf1bd8335173b0ad661ccfb2
SHA11c338770e3c6c0d3bd293e6dc07ba64b8c19fd4b
SHA256a418d80ff685a1447aae0a60d7720e2079940e38b144c35d04aa3e109f788f14
SHA512caa827494a0541436eaff6bd95d8807235ba676b081e6bc3093663e8ea50782548c2f19c5ba0706519c86707401ac4eb932799e3b9cfeefb46993b118c74d534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239579eda7d8e6e8163999f847c862e1
SHA1c22b21031fae45b3a76d197bd906c47abfa67b06
SHA256ab5598dbcfb022d39442af98437810befb6530f3cac98ef854d11f85fcf32465
SHA512a3fbf44bfd3714dc4848fbe82b8a1a0568bb43d5b42ab1782f33f77d1e1ed1522581761a36b2be6eddc6548b7f15a8bc933f69859c4aafaaabadcc59fd277d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0434a16569a9bde3b56127d0736a774
SHA1a7a0862a74ebead6f19fad689e2e96874b4036f7
SHA2562431f20e12ff21e12f0090333f65bfe07ba00f2ff51b2bb65ea259ea29fdac4a
SHA512d53c68729053570d315485e369fc8777bce85df889519b8fad505ec2050cf7a7df992614c605876d45861827404ee5d0dfd78ceb647804d0cb32e6fa9f704f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe2a2e7bd015529212882a15b8229c7
SHA18c758be6e2e830b867fb448d2721b89ab379d3ef
SHA2561c15cebd4334ef270e7a51a8dcb4ee5cab7c544bcc4ae600f5c6b9667df894fc
SHA5125350d097dac38708349eb605f887caa99120bb48b46df0d60175ed02921ddfb1244330f4a6746f5413b191425b09e7505d5f22cd04c5a7a32e11531cf0d54a02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b