Analysis
-
max time kernel
137s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
be84b74cb969421f14f2d0882a5ee7c2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be84b74cb969421f14f2d0882a5ee7c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be84b74cb969421f14f2d0882a5ee7c2_JaffaCakes118.html
-
Size
32KB
-
MD5
be84b74cb969421f14f2d0882a5ee7c2
-
SHA1
9c1d4bb62d9320ed028b85229f164b5f59866eeb
-
SHA256
e3d97d1c0b3e1079903bc6fd0fb7d4620dd553f684fe99f973c18619bada4abd
-
SHA512
dcc1fe2d2864eab8e9e2ce9d9ad7fdfbdd947e03144bfc93ae49625bae1ca1ecbe44ecb6483599d7e2598849d8b43ba19ebb1309aa5a7ba06afefcde0de54767
-
SSDEEP
768:+ZM7pNo9NK+jH3MiXLZx0bCCZUDppbuFzYBHksmrUmH98wnmbpQCmM:MM7p6y+jH3NXLZx0bUE7OP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d053f20490a3098986cfc3467d8cf4aec63dcd0637397869cf245ec77052f636000000000e8000000002000020000000a3a772d8da1a349b09f3e5f22d88715ce2911b05d104d6d79095287bd06c79fa90000000c79a88096a3bdd21b2a05a3813859ee3f51e998693154e098a9fae938f476986cdd8030d8ebeba73ded84ee17ea9fbc7a3b3e88602749b0cc07d38d4478f04403810acf340b2178c484fafd9dc0a969f071c4227ca88ea12e747e93eb3ef7c3633fa38b090e4490a93054acadb3b23d6c3444176a347fa33c160a988602805418295e92dd70ef1daf7a6fe22f918bcf6400000008971086969dc11e4776ce9d08445c157ba5dd87a77c2421a5250725b5b19097187edd9024e131fb66853de157b6bf7babe5a0067188875627b56571f225353b8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430661620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205947061bf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F23B1571-620D-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000008b6b18e242776a9c55d84e76a95e10da28ea7c6d56df94808f338500ed5b96b8000000000e8000000002000020000000fb0a6259278b0867ffc02d03f5ecd867678b2305df7f3aaf8335e356c67f1893200000009557fef92a01e432a50f615af98c3e5168eca7a6ed77b9050794c81366c01991400000008f0808258658e76abbbdc00010a065e211eed6864018738bcdd11dd556b9be10230b3731e4d352d339a9ded4c9ad41af83a9e5e2e1cdab4e1992b53052855ef4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2208 2240 iexplore.exe 29 PID 2240 wrote to memory of 2208 2240 iexplore.exe 29 PID 2240 wrote to memory of 2208 2240 iexplore.exe 29 PID 2240 wrote to memory of 2208 2240 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be84b74cb969421f14f2d0882a5ee7c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58522b8241a949b4d5ff569db935cf55e
SHA14b1256a050d8a1a7d2c6db7f025bb6e89f255c89
SHA2568e0ca37b9a2c920341255cbf66a430efd3520102e9b59cce2b6ea643903f5a54
SHA512dfab41fa6fcd4ff24b59c66b858aabc89adb783a3e733e4dd37621f145513ed6b8a438749e2e60423dbc3ec5ae095f6a5ca4ac312f62adb55f3174dd6249eb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279681f79d5d87d447c8b3eea42f8f9a
SHA1d0d12a92162d0ad9157483a21e3330d4e11d8072
SHA256494c296bd64ac5613e4aa7730d1d6adfa7c9d04a41183a2d2028a8be88864375
SHA51207015eb323798eb1baa988dad3abb5c0a6a4162e50cb5f3a201f2c0ee4fd8e97e13d74265f08631cd2bd4d701edbf0c4d61f24d076681a6c2da855d5353feb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a21618f230f3299ed6e5089dc9dd833
SHA100411130a3d097bf960204b1547c0df89a5c27ba
SHA2561131734d90df532eb7781853dc1f89b58ef3798c5033755bce3bd86429cb0e0e
SHA512b86cc01bb5452cd8637ef30ad8e3cadd288fe8ee42a1bb75c796cf29abb2b1ced4af64358f6afd6b67263b0defef6ebb64ce90ffd2218f417c086d281795836b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be94c1b1b5087e95f563c12535b244c0
SHA1f4ff542a335c6e89c5c8de0e6b3647a8cd7edd3c
SHA25606072e8ae003effbeb4f4cdb758b3f295bc5f2bca5378a56760ceed00a7c0b36
SHA512c615b902fbeb5111d500f1c6c2ff27d76b83c0dfc5afc63880cc684d347847b273995d870b7152d2a7ebd612620a0c617aac2e3c65600139f060efd52c04751d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753ad7d0a24c6f23e31a10416a671992
SHA1d6d6304787da43bdca7fa40c11187bbea83678c5
SHA2562c0bc8a3d42b7183d083993d6ba2a0f8ee94596c17fefe28f1ff17a0f7c5b995
SHA512c8f66e44cef25249f46256befe926470a7dc8f3c8e97dc070e917b98759e5441709bd50c56e762bdfe4a4eab2cadea50af5b034c3d63e9c4d649c4374373f295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ca95f14e427c40ec255077da39e299
SHA101401da7c82ba730d6004dd414c6c455827d3ac7
SHA2566bdc59196f1ff9761184db9ed7b2e3f9b17d4c6a8df57f4aebb95344a310113a
SHA5121f8708b6b1520309a6dd46d309b187adbf527b68b25c86888032c6d2593e9e23521ec2f4e69d4f7942a97e1381427c41512f8866615226c311da6b34af107a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27615afbedefb882aa4ca5bdeeff886
SHA12832491413be90fc8263a67936b9765f53276ba8
SHA256ddca625655a57414d426936b319bc6c6c4bc29c1c2fedb4f227454e99056c6b1
SHA51227b9fa232bb9fdcb03dfc7d0a0ded9245d747cd1c42d93b0382fde28b9aaf31474721423139e164a66c28fbce1e114eb4fe9278fe8c0508a54d4bc9c19c89e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39bda62e04ef54fe2552ac329d88d19
SHA14f7df507c7f5d7dc7a3dd1896940f9d4838c6cb1
SHA256aafb24fb36786c20d3fc2005a5375a356b130121f96ab393f2087795f3d55923
SHA512ef06495f3df8a962418a0718530046af51e334a5352f9424a82b414a48cd7b6420a4cc1be4fa6164581a13ab2490ce1f9b1711d49591a5b1f28b11dfa77d1d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc13f2dbc19e4e7d05419ae63e5a1e5c
SHA1773f6aa0b81da59b983adcaad0a86d76e441d3c3
SHA256ea4b5e59539638706040927123390156bab374ba5c2bd299d83352ff93a8263f
SHA512db9020995f34371598d8c5eab5ca45a59f4dd9aabbc9a3d60120cbd684c5f21360bd65bf4a90a2a619e593b551d8c99488d9031a16440e498f54878acb27bbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456456d6c6830dadd96f161418f5889d
SHA1f69ae11c0882944aff756469cbbfd3fb7d753940
SHA256823c298c3edfb9afc7d0f14d713b806316607d7fef126e1f842ea03a9f7fa624
SHA512306cac971af2e48e0ef595a3433ad49019fda9e45d9f8dc0222c010384fe232f1b1f1b1a3b73ff46a1847607bace0f744f4e9d8c5a6c773aa739e05de789edfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9ae2d648b80a28f685bd3dac0230ed
SHA1ea5ef4775f17f90741dd71347b21aca246fc6fe6
SHA256988c824bf6e9b0bfafc3ffdd232de3822a2939b09d1015bcffb0eda01c89c0fd
SHA5125ffe84b926cc00c4ae216b55901c12181b3f7947595c71856925ee232821cd4817a912b4a50ca84b9bb26035f6858383a85cc00e313df0056ca1f7ba92b31287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a920f706fc194619f156fda6ced46302
SHA157db8766abcf65bd0c3742a31db6ba01bbee1271
SHA25631790bbd9181a72c1133f68a97621d11985b61c6efd7883d190a4976597689de
SHA51257d69cf4bd60b199abe5eb64527c4f90db3dd02e1b168a243c38ebfc2fea96eca5356e4164c6451e8dd315c868b9ec9d1f59eee05ba17ca95bb4702b695c088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a79c3863b36b1dcfe7a70db95ed35c1
SHA135a39afed4027961247fbb42890017b54f03e7e0
SHA2568fa773cd28289fd283f4b1b75f1e41e865aeba490791f1d9ba760c2ded06e8a8
SHA512e50d9f8dc9042196b40220e8457112331ef5a9a3c956b9f861fd1dfb3ee864300105a78e8cd4da487510a6a890f5c1d437131246231c937575d5197088a9e051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bbd0d575c20119b420b85b05a605d1
SHA189cd58c01fbabea7e73b246c5d09638ead5ea013
SHA2561807e7f8d3b265f8058fed487ee4d1030c20cbf21aad867d5c6983d101d20a19
SHA51297c25896c117a2c9883b34cce452335ac7e0ebfba4595230089a71a5c6003fab26de4c4fbf884e7513ed514478451cc398282462a4dfa19dbc834836d5291605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621d2c6ac7728c8c53d77022a717c195
SHA16d732c9bf798371071d3be8ae5b0dcce2fe3f69f
SHA256576e6e2625b39f40bd33bd10639d249a17e65663cfc62ed7ec4e75c68e49717d
SHA512f4e329aa09a6e291b2d05f07963853e6085e314175cc395ef8ce88c0f4953f88baa70ebe688f6f3742c6d4063d9738baa48838d7b23abce3a49f2faed2cd9392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d3c61cd4a8d98bb18d3804995dfa5c
SHA1fd2a25c84b3c19d8068dceb257773dff2f089d57
SHA25694ce7f7f2c1b6d8c7380f293ef7b5681d51894e2b9c44ae267dd3e837c32dcd3
SHA5129eab3b3a473db85143d80bd5a26da39eb973958bad39276ec0ed11d5f54f9402483e1283dfcf572c121c14392a9dd5cffed96424ba523ae174b38c968d7e2e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6666acb668cbd333df89ab7f9f76ec
SHA13b1debe51b8f2af980f81d48070bb6a096fd3420
SHA256b8f75f2ea357a43884faa0a4be9f90fa6659adf0e288e83937fc07e0092b70eb
SHA512b5b8bba1981aa763b7fe938178c25a5bcc81fda5b462557d533fd1faa50fe9e806b21878fbbf44532065fc09d359203c837aa78229b96a3d665efd5de758efae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55018f365919450aa8219be1f47d69b4a
SHA1ded5e1f338d9c96e8724811ffa55b26a7cbc5dfe
SHA256eaee04d224ad80dfd1ed3b078209f9853f4f171144085dd4ab70b860846669b6
SHA51275b18e3e82302e4d5db2bebfe9b4cc2bdf0c8b6a49bf3f2ea069a4e5f1e99df560b5509585243c697cbc6d1a302ff9d67e6eeb9d11bb97c03c512eb3d1d2f469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f6196952d4f55b6f6742d8ad7b9f11
SHA13b337ec046e1e87bdd61b1dbdabff161a954293b
SHA256b2ccc2d4467f4bd83c7f881a3be262d2312f261f93d301281f805b5154e81d39
SHA5125a487757c21b0864a2adcdb7f7d25190c8f150d5d3871558d6ebd95f9ed4202419166851da0c81c3526c88a4c67a7199115ab5b1d5f16067f4135789cb6cc707
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b