Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
a053e7e5a94ce9983a525c755d16c113_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a053e7e5a94ce9983a525c755d16c113_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a053e7e5a94ce9983a525c755d16c113_JaffaCakes118.html
-
Size
17KB
-
MD5
a053e7e5a94ce9983a525c755d16c113
-
SHA1
111edf0a1ebd783248ca4d5dbe21073d8699c8ca
-
SHA256
a5b334714b39b7302e86d1d5be0fb20c8dff2ece1e6940304e5b955ca83dcbfe
-
SHA512
0ba8f3c36a567fbaf5defc7c73a30c98da27c91dc1166f2a5ae9aa80c53c05b1effc7002788aec5bd818aabb85b455cc3a6529e240d09775f595d99fa9cb1b51
-
SSDEEP
192:rty8CR7uzDlt437+mmGk8pafknZ5nYsdIUkBw8okn6RZblW5+lPL6QokwB:ER7uzDlS3LBpafknZ5nSUd8odgQo7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ae968b32f0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000004c491421d4bd41996e122f425a5ceee0fd18629f30da57d54e590f43634ef37c000000000e8000000002000020000000ce342e54aeb3681511132660d1eae5bb1ca9718613d2da9f2a8e8d070b999b2c90000000ca87661b4bada9c84ceaede5874ff5899b48eab33ec41f72c22e3a1c87211cd89c7687ae0aed36ba6a7e6112d97957960dbaad3f24d718ed257743d7fc4accfbac6937d9fab57ea7447dcf14920de317ec5c092c23bb7c58b9377baa9da263238fa78837e4383fe7ad7966cb824d15c7b12f92c97aaed8ca0bdc9e001fbaa64e27e2777a2e68feda0d9bf7c375487aba4000000070e04346a173f17a90d00580c3817e0809b00671d814e5a93a4fea77785938cf4b0da2d8ef4ac079636aa0209b7c42746cd5a886f1c99d3bd4d23cc97ddb15b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000ea1c70d6979da8c996a034abd5f51caf113ed3de871a7b3b15a92bdb9556c762000000000e8000000002000020000000a8bb9b4eae68f9395cf80b48e4b5b5d7517bcd461212134853bce2cc81873db720000000e877728de5cb2ca23c8653a4d7957ccca988057eef60640eb0872ee81c025fd9400000007c9cbc9dcf6a37c4aeb6e381f2a2227d9cb68f2574b8ab95bd33568c6f606b91b01dcd561a8c508de2ae1fcf032ec86ad91f490ea96f16ae92856ab6939dfda9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8003F8C1-5C25-11EF-991F-E297BF49BD91} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430012028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2068 3044 iexplore.exe 30 PID 3044 wrote to memory of 2068 3044 iexplore.exe 30 PID 3044 wrote to memory of 2068 3044 iexplore.exe 30 PID 3044 wrote to memory of 2068 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a053e7e5a94ce9983a525c755d16c113_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cef235b1d71040ac1eb3bd3b3948f18
SHA1a6b2195cdab8ff258e7653f8707dd1208953d5a6
SHA256243e0c286578cef8b6d922b1c06675c570573183f63df321348fcca985a1a545
SHA51294e9b89f7cee3dd8da8704161ac1d4a6e80f77717823a109a61bbb67d2518921145edfb68e8334e000e6f802979d5914a3f6cc7fa19e3d86daa8f26c5626bc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ac3d6e7dcd4c509e0952e4def7ada0
SHA1a06ce5cbab1ecaffa4a34883c049675bc0b2315b
SHA25667519c39d3de0ab0a7883e489a9916f31d06bfef507c759d6d32c78935465cf9
SHA512798313283285948162c634efc3d132213dc6da2c0d391777f4f522bec5e4e21a1afea7d0f6935099eb331bda963c76be06a6b79aed0d160e86bd36b89fc8c076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e3b58ad9e841bfb2a5c362a7f20a8d
SHA1230a671071d7f3fda85cdbb803f571a98ed1f0e2
SHA2564df6d6085d64fabe8cc1b90ae1f7a1a3829d3037578e5839cda34e29a9cf0462
SHA51245173b383adc417c36f39093bc0d3221ce552fdb1104cfc55a362199fdf733b6b380c113c45b1e05fbddb084d32c1b92a2e60b3f528161696400844fe9213120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f33dcd574aede273ff0cda199041cd0
SHA1d87dd95ce665dbfe33af41ed92bbb5767a48dac6
SHA25614d1d427b9a33497b92ea44844a0e8cde8eafb19ebfcc4969b2c38c74f401b92
SHA5123b1a285248e84f40b0d0a2b52262d65a228016cae85301cbb73cee628b1a1e4550fc146162bb1f50835ff80ed5da4cc235df885f6b1edb5f4f6052551e4045e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156c737e36d4fbd3fe60bb55ca3dc03e
SHA163f11405e6bc2a4c4e51273b7aa5d6d3f9ca2a52
SHA25637a8b3023dfd1175b16293bec904957fbb1c3f0716de14212d15eecdd1505135
SHA512488ef08cde8fd6d06afe706be2e161aa5e6b857c4d76759b0c87c80a8dcffbe40abaa7190a5454b3b144a6e1362160a4eca01d486b6f315610f23233b8b0de18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d099d19028541bc008c6e5466aef43fa
SHA119256b26d992292089a3a17d92eca4867a43f96f
SHA256ed3001e8d42f9791e9ea018dfc32a895341d8eb429c725f9de67ee4bad0f0434
SHA512549a1eb296b512646ad16fd1d57aefae8cd8393d67166c00f8ca11cf91a45391b9d703c44342c8fe2761747b6721def4ccf0384e9ee2339568b32768ea2f1d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51177a2358971bd3ac1f3d70aea75a0bd
SHA1521d4b7b4b7e74f253d73cfc7a6028e9d813d819
SHA256e1eba154e077dab1cfc5f1c57e41d212af6f7240047ae1f3256214d2014208ea
SHA512602f2766c56a7e7245a7553d740be97c9659f52ae906f7faa27077a785c9a1dd660c78a9000c56628c50daa2063e6aba8ec4790539e04b6616cca8aee6b970f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c696bd50520523f5487d7b0c969b4f31
SHA16074d1579d1881bf62099b702c9811d8f24dbb1a
SHA256f1c129073393d72dd21853ed21bbb47981b9de1c43c30a87427037162b2e94ee
SHA512b8d959e766e633a264bc74e93029264f820d4f7b705a15deb53c9c48763b651945f7faa8817a83539fc53b59ba8487b50afa693af4008f430990ce8ad804e120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9dfe762f4a0427c9360e2d5ae6e4059
SHA182d2cc55ad207090b8c83a9e578fbea3dd6e1e86
SHA256f445f4df5ae26920111309f0d06a489c20aa3c8fdbb600bd368eb4537200a9dd
SHA5121c66de9e5b79cf98e812a89e907f220e1fa9e5607c94d916e20426c706d71a437d4192879a57ea37ef8a98344719cb25913e5f662ef5412ed8eb590512d4d7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda0725010177741e84dc5b12722666d
SHA1fed4125e660389d5a3297c774aba71ea41b6cf5a
SHA2564fea4890bd5f8b8a4c1a78fbfa7827d239e031f7ee2165f0425adb33991d2848
SHA512c10cc507f7988a27ffbdff344d6973efa49b566504fc18f166fa95a131e5736de121912b1bb186068a010f6109576df355fbf53f873f8ffe19d3c9a7e828a5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee277e3057a875ba305af5bcf3b5d71
SHA123cc2f0ea66ccb96bf2e12035a46e6c6e5f4be98
SHA256d06862989e7d84772a236ee0e1daf713cb1203360c3d8d1d77d7997e6b11d271
SHA51285584a138944c2264a859df27e84a9d3adab7ba34bb0d55b13da7e3aa259691efa616772b86238b0eb7528fba881fd514774c7873c773c5501de4a640f0f7882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46c237e4bc7e56230d8321979177ccc
SHA172489ba90ceb4f8798b6adeedaf7060741b747be
SHA2560f1355adfd8a5fce6ca07d03705a3b367efb76316650b90287237642b0b1d79c
SHA51251bf67a689d6196559fa0ccacc2e9ded5061e2a16f845383e2887bca68559e472958bb0f8c8a203a168d80cb51b23c3420211456022ce1169b3c623f3d404728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b489eaa59455b522db0b180c569ffb0e
SHA128a254a604f9d03cab5b296a0a9bb2106ed0d720
SHA256b49d6b516811d1711049b4bc87604510959da65b7906826e36d8d33ce9a3adab
SHA5122f650f429a70a33631782ef6eaa5bc73c645f8312d79a41ba9b1c4b5f7cac1ed887b06bd4c41e018d4df5122ee84594f1e6421e88a657226685d1c0552d02d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587143c028fa26a07a60c13062ba2a5b0
SHA1a2bfe8581bf8f3267b24129ca5053a3182fefa42
SHA25662292193d63bacd8287bd58c760c3282695abd057f92db1c85befa0fe44a83e3
SHA512b8e7f09643362fcedcf60762d8f3b528f973a5331a2d24d06182d6ca89e2b8fa70ecde90494b2e8ee056230ea6d042275062c608988344046ed3ff39f1a63bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52494e5031eaf707e4ac2839961b5bb07
SHA12364b7db419ccb416ef07938f1b6a125e49e84b9
SHA256da57b4900dfb029266c6636f399771f6feeade5c785ed5464bca01f2e2b221ea
SHA5121c546b096bc7a452484d5da047619a73dc622edc0efa0ec1bd689c03a0c1f7bc843e949c63ea428aa42313635272a5ad7df4c94127b6004f5b2a03683931b54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ddba98bdc75ddabb47ea332697e826
SHA12f565c64a26dab859f60c2160a20fb2aa131d71f
SHA256938d6788c7634dca8e351e022a120249d9c40bfefb4db02b76980cf8369af36a
SHA51258520e4368b23abc85b1f7f99b6cf0e286ae9aca8a01ee70fdecf192a36d799af87aef536aad214b3a60a68988893d613ab54f48fdbad46cfc1301d587771b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6418ec102ab16ed46b8d4fc92749405
SHA1956e82d456578996e5f14c544c1a6262a65a866b
SHA256a98e64f58f6f808c99b51a7414e760d12b2501d61cd0b84c8dfe0cc7367a8ac9
SHA512d9b9b571860230ca0f23c6e0c9ee7a94fd80831c886a2b6de56a963e8a2a45560117d28fe3e447a21ad1f8ec9c08e002b87d35658c740705b3aa839f6082f7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52306a19ca7046311d97580aae078ca4a
SHA1d763f603663903a94d6b9aaf85b6b678536dae48
SHA2568d0606400e7d3a19a7deb7c3900f228b2ad4257562b2b807b48941de13a3bec2
SHA5121ad5e8c520ab53853be2f0826c157a7d30f0f8172a845c8a85f59d950d8759fdd8a59de056b419f9ab3e8b924edf595fc1444d1ed6dc5783abe122368282ca2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3948b607fc729918629539850a36139
SHA1d788ee06ec5d3844f780c41eadcb053093499ea5
SHA256534af56fd7cc6419fc3c613360697ca51403361a022f8c9c082ae98e5ce8f256
SHA5127745a5cfdc79a4a289e348def9da6288f1d87ab4b972a4a860a2f8fc449f06e97d715954202243863db3146c3e208eabb4c8d43bf06fc7cc58e04760e2b46ebc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b