Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
c0db8a42929ef5263c24be74f020af14_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0db8a42929ef5263c24be74f020af14_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0db8a42929ef5263c24be74f020af14_JaffaCakes118.html
-
Size
17KB
-
MD5
c0db8a42929ef5263c24be74f020af14
-
SHA1
e8d6042276e1a9ff0077254b9eb1f0c6bb796222
-
SHA256
060583ab1eee953eef34993ecd4fbb096011f02f820df4b6c9ea4467050d38bf
-
SHA512
804f691cd7702473ee4031b28c264a355f98383ae6f9b9d3003663b8258a82f79f422d68bfcb85b60e93c54afbc3681a36fa41edcec7ac9c0730e9f00e7a8b34
-
SSDEEP
384:dNuKoy+7BGulPVWJFee/cYr6UOLdjfNOu:dN6y+7BGu5VE5nTOBLNOu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606c38c0f3f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000055e799fd4b698d847d20cb6abeea828f51bbe2332df5f34f7cfc8f53d95d23df000000000e8000000002000020000000177fe9dd518b791b368d36caad04cea9a80ace373be841232c1740a3b99235f5900000004c162a6f6b12df689a1156ec5c355f18a4d7c799225a8c9b03e5bd9052c7c642f154b68fc7b22fe1b41def13f11659bc2a59fa4185e89cd35fed1bc0a4114010c1e51c0ee0d957160db41b76689465e9a2723f3ec3137bf056e2df8d2c0b6faed445211338e7c964b37daaeaba57b5d72ca609bdf46d020f2aba9720e504a0860d04b0e6c7a16a3a4b1c151da4a53d82400000009e61f7694df796fce62bec9cdb5088d0c0501755ee72a215c334a7570aa84fd756fbb720c9dd738b7bbb64f80f095e43629abfc095178ddf9e03b3de27fb0ce4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000005503fee422c1ee6db66eeb4b80d24a6e10476756c80b382777c1588b8aa951b1000000000e8000000002000020000000055b434e214f98eec44657e1958b9b444467bfe22c971a321b669968e87c8edb20000000d2b4ca034ab9732c7c09cda195a08fa85f29f13e77205b4466d0ca9fb27e6bab400000006b96351e384ffa488769abd13709c95268db0f2c7b420a4025b996a3b5ec93b8cd66d0d8baf55258ed7eb11ba7c088f9d76ebebb8e0d67acca14c57884e3906a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7402EB1-62E6-11EF-853E-4605CC5911A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430754801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2200 2384 iexplore.exe 30 PID 2384 wrote to memory of 2200 2384 iexplore.exe 30 PID 2384 wrote to memory of 2200 2384 iexplore.exe 30 PID 2384 wrote to memory of 2200 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0db8a42929ef5263c24be74f020af14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e448c190d54b0a971e6f63945ec2827e
SHA1038efc013f96861038dc62d1b1e1e4a84169fd6a
SHA256ec696a06b3a005115fe598091e5d9b096bb893b6cc5cd030eb2e8630e497100d
SHA5120095840f9c9b9fafd7368281ebeab2a72c2f528f07053aac9186802810abcafdce5e07b18ad4a33edfeabf10fdd31e9e32323ae39bedd4a7b9e6a359d97f1fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c39655b244800255b19114be725683
SHA1fec6f76ad17886f29fcc1d48026971a195a8ae36
SHA256511fcf23fb1f15fabbb8990a72d6e4ee2039334226e81c0ddf642ab7350c5fc5
SHA512c027231c778e339c5944415fd56ed05f5ced575e2db01ab60c8a030a46f17ef8dd9d0497df4d4fc4426d73db37a4c479d5d3c80ab1e5d4fd8036f0dbce03a73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc43a232a0d8dd39cb027ea62bf520c
SHA163d3ac506df86bb4eb368124de5ff0a2af00da57
SHA25690d0bd0a611f8806fa417393b904e49cb99e74c1ad99aa8d53f562051165affa
SHA512011df2c8e9ff1478829ae46302dc4d8c7307ff10561f429b520a16a92eba922355438e26690b5ff74be3a3aa054efef549e866d04bd638c5d3b8f64307f57d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b84e5c5b699d6aaecb2a9eba1ed2cde
SHA1e36a608b760126b48be8e7f92bb1964bfd57c2f6
SHA256db560b612c9887a6e2253f3c63000b54a90025cc71616577f5b7dcc3735bad31
SHA5121ce8259a5ac6afe5f4a09ea1e7a8d29a017ac022d7ad013bfcfadce49d8d35c5981958479e9fb676c2f428a7b3de158f8b862101c88afe795f4c1f2811609e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53620f2cbd3f580e1b9db411a71ef7c64
SHA14b24b7902120e4381761403f935985fff6083b3f
SHA256e333f5fc4f9c1a5adc71984cbf018ba2ceae569e798790cc4d1aaff8057d5584
SHA5126da5fc792cfae415d403434570a9e1e6e9ee410024a15b11e53951b5fa3cd960504e845f54fb440dd199896c31ba29586eac1f0f93a7dcf5b1945549fde2f9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb098a17dba3c282ddd8567763a94959
SHA1939644f905dcf2591143e2984af31b73c66b7d9e
SHA2566c0d85e9529f9e93fe3433c149373b13e6bd21b7dfd7b16b7b599cc4eb47ddaa
SHA512249da23397d86e731f7519ad823cd552cfe224b69a04f0ca99ad8f9ae29b4b21009a22d9007d1591262157a8e114c84003b114432fc4aaca42b014deb4ae8e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301434ab7204092a535587a6c8c64aa4
SHA1b24f6672f34e3d79bf7212888101b278ec0ee912
SHA2564cfdf144c705185ae322f4f4106b1e68d665606bb8a66e841c0e259b0baf8bc8
SHA512c8492ec0fbb206ad42cae672455dcea1b76a893e33a4630d5aa8ac83291b2c811577fee691d9e88bd3fe5838d1694225f332fe0001093aa04d96a1d5c13ee38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733533dd03ec2488638f6e078374348f
SHA11570ca82036059af3cec6a02c9b74d0beb7e7ddd
SHA256c271d134f4a4d5772b6b15a741894cd559fdc8a15154cb77020492f4b35ef269
SHA512e6aa9f4bd94f5523499fe8ef6656c38609ead50fa5d18679647daa9ab90efed91b1c7142c08435847761eb05b8def890c834828c60ba7ecd14983f0dd3ff3f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f258faf2872a0de6ae8a656fc1f63b0
SHA1b8e785beb711cdc75cdc030497c91773fd2d5412
SHA2564376d553c5a73036c86febde7abb67be5ff94be90c5517196dee1300d608d771
SHA512dcdcc208c9d9623bbfa146ed390446199051fc030b06c8382f00ffac7c789c08d362c697038025fbfb6f33393c2020fc2e629eeedef35903fb69617f618664a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798d870fec51b5408e65c7eff9d08e76
SHA1dd2f51441ae723531a22bc092981d5d05d39300c
SHA256d36a07f3286e617382074a5b782fc475933fed5551a27a98ee117cedd008b7f4
SHA512baedfdeb7620bc1f8bad2bead3972187a69fda34129c857f6138a72cbc45e2efb744cdc88e57c0bb7fda56b76673840d08449092880a6eae1afc5913469fbec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d608428e630f468e1ebdf6fce8196361
SHA1f8dfc8cdbd2de015ea48a54c8ace19a994197434
SHA256a87b2fc8dfcaacd8bc892ccde7ea27b25a43950706932ef9a111c48171ced64b
SHA5129571a846e9dd555e6c35c9eb69cd40c70fff6c690f94c5d445c64d81d61085635a185d4414a4cb4088615172aca99ec85a0c92a932b9ee34d7569a320e0c730d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17fe1953a6eb08820a90b4bb5c4f677
SHA1ae1c025cebba1f5dfa0ef15a48eed0df6218a41b
SHA25633bba669637986d695d00553f24ad415f5375b5d17c1138f5f8c346213297bdc
SHA512e19189c45c71c8514e767bb1a6c8395a12e3229aec0ec11ad01b03b13f49cfc00a26b4652015039496c6045a4b6e993fd3bb28b346c5f5543c3a7a6615288b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee51a2ea3f8ecb3e1b3b244b3cb83357
SHA1add1c1384d933e5710681c82262bd4b8d0cbac3b
SHA256c02b18ec698bc6c5c0713e424faed206d6f0c7641a4841770f9e6ede4de64fec
SHA5129b9f1ddacf99ba0b5123b8483d9030bda68e7945fccb1451a876ec10820f5c9b4296aa7ed089e657d948e1f2ae69a53a3dcc42a1c7a58783e9dc1841d086116d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334f3a186b30fb18cff89c71a2ea2b6c
SHA1681dcc735bb372817d501a47660be8ea38ad2f85
SHA2569d1b80bc2437428eba1019fed0709fb7814a883fc34b9e5971cd8257b602d040
SHA51215c3d9113383fc27c9369919b3276c450259736728d3432138c8ac14016bad5b310912c9d38fa19ce2e8300cc696d2cd61940358e4391f04a19d858514a1b1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c51655733c72510fefd2eb771cfecec
SHA1ad2b85fac58b5ed74a86e8ed307fe8ca35768d76
SHA256fffbbc0ed045450979603482fd79b4ef24ff9d906c6076921e48daa6b4fa988c
SHA512a5596f1506fe434706c5a85205f320456ee35c0e31522beaebaa4667cc32f920545ddd7e40ca0d9a5a2153154fc8c767e5a774822881fce7eb1c8ee1b5b0356f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288d303cf070d2dccca533a5d6a40e15
SHA1dfcbb6cbd253753be8fd01534de9a6bdd66bbfd6
SHA256af1ea3ee2adb9fa2ed9d43b94b4aff25bf5037e2eb0c999099d3dbdf151dd927
SHA5120129ae3d06faf9de7e05a7998ee64d2a8aee5545b8c4d9223b551cfd3660f541cb9f027014db4d53caaca343de81c84510726e7132c80f8832e96d96ea204b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b401f0f253661218311b0a3871cd24e4
SHA1048a235b9f58df9707b62e3b64281262070b63a6
SHA25652effba5af94bc9d24c9006c9b239d9d131e8e6c68ea3b05f2de48db1c4b176e
SHA512d09ed19d579b1c7a224310a8f8522672bbd7cb3a6a013aad44ce2d70791132991be38f4f6b1ffacb00a7ce6ae1972cc7f5493bbc8ae4064e60365fa2ff2b99c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefb7383775c650f4a6810fe5d807cfb
SHA1ed431856b3d18e03bda94c2c3e03856c811e8137
SHA256fa06474a15438ac31e419b8e037f630ae8092bb988c6fa2dce6de573531dbc25
SHA5123d3a1cd4135b5b3c691267019b8fce12c5d6aaa966eac4ed9e3d571e7f8bfa484fa2b9ee408fc6a9bf385e7bc016a81ad32965ba2655fc3ead1fab7e2bcde01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266220fadafef9a6fca25c20fdda3de1
SHA1396f07f9bb3c7533af358f2da83cfcc7e6bae25c
SHA2564fc414381f665bb7f52c33dc89d3f224b00d9032373e4424d048bc4fdccbf0aa
SHA5126c33a4bb00562d47d80197e32a0cb87b5bfa63d62024bb31562dbf9410c0a346a1012899baeb96b6057c08549e34700cdcc30c01a429d2d7e466ac64568c3d13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b