Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
c265fb5f526be5e652a0076df64af4b1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c265fb5f526be5e652a0076df64af4b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c265fb5f526be5e652a0076df64af4b1_JaffaCakes118.html
-
Size
3KB
-
MD5
c265fb5f526be5e652a0076df64af4b1
-
SHA1
dcf9a894f759062ea7b96185118d81bfbb4bb903
-
SHA256
bb6a0ce0c5d90bbd4d4906c24449b574bc1a2b628802839dd284432799d77c7e
-
SHA512
d9b3afe2f778b01fae4615df30841905bb71cd7087f82299b4e270cdc913f116ada7dca11b9db1b1a29c0c326bca5160865966d4ab30bd12f589392cae570dfb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09F50921-636F-11EF-BB68-FA57F1690589} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ceeb9b9dadd2c9a0247b039220cff0d2b51acf2edcab8144c6a5c87916852aa3000000000e8000000002000020000000fc0208fb11e79b2cdee0387aca2ecd505faa90d067f439748cadba8f1c6b3a7c9000000012c9487a49844d624a62475b5148b5fc20e08b6dafe2390a84c1583a42d4944cf4033bf315a46209c417d11135d392f61c27b0b361816f49f54e4f7aab7ccbd16214040dc45b44158264ec3150df5a6e9df62317f4efabd5b85e3710ef3c16dd965b542e838e6e5ccd56e96fdb735dd99a31c2001dc9f97b40979b799540767e59b274317917224f3004a7c003378045400000001f13366166e1cc36cda3bf8d2fa6ccbc45d868a0a153b5d6e3afff326d12067ae775bbf333134148864fc267896b82e908e474a98e16b08b53072989b56d2625 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f719df7bf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000af563cddbf988f2aaaad5ba8e47db4646f6f0702232da99a5aac1c6e8d1a0162000000000e8000000002000020000000ca8301f7a96bd1246df62d1d454170a95392cee9f23503017c9feea487bf5e5120000000c3634f12d7b12aec1e1a58c84b3172f59796f723408d462ce9b52042f80f0274400000000520193a7d2572e55386feb97c536b16f6c3199d352ff622d5923b767044f27c43e850af8818f8eae65a6f7855febc238f184e562fd274679fc034e73f596527 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430813272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2360 2172 iexplore.exe 29 PID 2172 wrote to memory of 2360 2172 iexplore.exe 29 PID 2172 wrote to memory of 2360 2172 iexplore.exe 29 PID 2172 wrote to memory of 2360 2172 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c265fb5f526be5e652a0076df64af4b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe40e77d3a1ba73409c6a4b38f8f741
SHA147b8d910f7b23c025b1399382b461097d6055b6c
SHA256786952deda27b7c7ebaa17521b153bac63cdf37f26ed8ddfd15c9720bf22c9eb
SHA51228b1323bc9ce51e378fabe35c6a8046faae596f36103a4a1d8f91f5550fdd872d7a442e12cef5c31e43d51720a9da3ee9fc4fc0cbb14aa26e674ba21cc68f229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54669a4fa1de6d913a39b2807d72c6003
SHA1bc89f27027498ef1fe0e006118e2f50238690ef8
SHA2565c9ce71f6484d35eb14df01e0e8354afe6ec7aedcf58c8819da54fc9b1894dc0
SHA512c725a1be3635832f77a9495f94249e1f97b16183dfff30781466b1099a414201c51d0b041a1217bd64ca6117396ab86a835355aa3889c737acd46a00e1cbb8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f093212a193a079fc6ca58ffed732b
SHA1712e65ce55104634a103395913c32b956ebc0db8
SHA25632beaacea76f45f1070c8dac54d2cab4e25cead577559fcc36e2795ff3ca3c57
SHA51262610f98d6d0024c2e9c062bc5d6c33605a008ab1b7e211780313465c7096a046cec8a479c34ca0d11614a92765d91416cc7937e22f12f5e5e4b07ce81534b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8f43f3c06e277ef4c45bf53bb7b7fa
SHA1ce82775f7364195075b2c3278b3c9cfa09791655
SHA2563b81575186023131ad3464fd1dae230472b5aae30f8775154b23f60573107d24
SHA512dc59a17b78c2879b4f5c60e0da212c3d1e9b6bf0c96cd4f7e0013b6e5f3c52e4b059261910c6602d444756363fadfd4c1ada7f73ffe9052122058274cc2790a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e53022c08b87913bdc18c41fcdc304
SHA1b84cc13d216d97ee2dcb4940858d2a2718f80521
SHA256d83220784fc9cb409838af680e0f98bed4c39d736d9f85849f2d7151249c9856
SHA512cd46436fe30af92a37bc067867aae5dc3b789efb55938f2b71756ae437f765d4585177c4558b9987d94ee19eaee5b4a35f04fbf831cb020dc7f0c3c97c8a6d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39375713f931e53bed3aa0a337d6a4f
SHA1f0805e9093b9bcd0a8671e67db78205c334accbc
SHA25658c7b77ddd85b91ddfeb1289a4eb73ab9af641ce3545090ff6add954451e8873
SHA51285647c4f03d536e085fde18e00ae35a3f201ae700ea18079bf44e3b748f51d03dc7d20b2985395771a0fead109bd686cce19a022776afa4f5bfb20de642250db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f66b4f2d26cf9fc54fe78fd031ad92e
SHA1d67815e0050ad44fe320e07d9b081887d8e21244
SHA25631f842997452d79571fe5b5b9699e1134562456ba203662ea24802f04b3c3e84
SHA51269c7c7e2863aa82fd1c3cadcf29ee770269fb1e04024e0fad8bfbaa8cc5ad59926592bb4ef9ec8dd6a09cce95c110baf465b1e77a3179249a2ebc35e655c4744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511282effedd474c876b61371957dc701
SHA1af9828ba603ac82c847f36b2ec4e090c0590b94f
SHA256801c21e358e7ea2b0aee57fbd4ee953b65505b9c5d381abad58116f4771ec38b
SHA51289e96df574497508cbf427fc16b89da230a44b4b72c87697c7f7176cdc7d97fa355a37f34c2b472a1d2aed6b8e58c714293fc6d16a9048d524909f0eca1421ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c054b0baec235034dea08918a40ccbd8
SHA10f64f807c0e468e6dc04d6e51a0a3ca9b31c746f
SHA2568652408346fefe5dcfef0a6d629400639eca53e1fee17efa69426851476d2f15
SHA51227517dbe564afefbb635fc38d07e04292e886c944b32838c34a6ebcb34419e47bfc9e070ca6fa1279de7619315f5ed6fc2a34ff58f2d53b105c1dffafba40c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca07601bcd6a322439b10a602a17a24c
SHA12639462b17dad427c76b0bbfdd1a2a2bf69b51df
SHA2566a3355e1d04c6551162e844f1977f136070ebd36fd79f09d4b17cc2771924c0f
SHA5125cd15e29f7b045d35cdcf15657ff30ab4e77ca4e0ace4efc936f1e7bfd0259f2e1b29e30054303064412e3b8580a528f4bc3029f021b091b2e803b5639c4075b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08d00eada9b6e591c93f3e6d54e501c
SHA1537a26ec8a33f2cf0cc308d37ec64f690f52b248
SHA2569bf253b121215aee060947c09e27d0cef0413a27a5e9bda8e525eb2508212cc7
SHA5126628610ce81cbf0a819e5d614f88fda7eb8ae52c61baa7f23b6c9c33f4d2ff2ceeb5397662ed39893aa56a9e39aac65ed8d09aad1367ab0e5b2fecae17728a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595995a93f2d51a2ed37014f253c281c7
SHA18a4727b39c41ca1c0fd98f4f98b3ffc699b0fb41
SHA2563c44ca119ea52afc115734118b69b514750544083428373fc9904700ded64041
SHA512554caff9ab7de68814120470642c245394baac9b0a2fb1ac3d811b0d4ede2a810bdbb76482a81ea600355f565830c5bdbe56028e74fc095b54842683b24a6fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc8fdcc4b22403756fde5bcb45e46432
SHA1979db58c6f2ef5ba28f0bfe20150c7f421831c4f
SHA25606ff01af2bbaf03bf70360e2421a5914c05edf4a1e425d7780e8153fcbb72b93
SHA5127c9fd96741aaf2fe75bc242e59a4e4d3fc1ac56fdfd46340dbfddfb8bbd5d8f544a15fadb554b8fa5e21f86fb849e968835eeac55cfbdee44a69b6c02f6671c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab336d8025b7f331ffd9b6306ec53efc
SHA12374b010b9fc8abf5090ea8d8b1cf31d92bf5490
SHA256b50625ac9b82276f87fc4e6dcd8bd381f23dec32a7634597143f086ffb6358c8
SHA51229797da5104a103570c4df7a1a23619dcecf932edc5c7b16f107d9c0d768bddc49564dab2761040e2031d2f7eb27ecd29327d78dd01874f9cadaa0e4026233ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c57ba8b6a4fd01b65a33fe8ffa64517
SHA12af3024997ef1e77fd8602762facbf2b171bac3b
SHA2562e979ca4421ea0296cdedcaf6de411fd48211a5423abf4e8fb533fddada6ea04
SHA512c0cbf244787a9ecb8e4daebfca1b0e8750fa95839f9d8aea6ccd1776107d39b15516e5e8ec539655a1391ba8b971043e899f07ef451933becf5381c091caffb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d341658b58ba817a160307098447145b
SHA176a3c79c9c03b3025a6dbf2c8b64a11a7cdf6041
SHA256946b704dfbf368b2e0e148a462437ce62f3bc7d06c1cf6164e21eb75417ab3dc
SHA512450e12276bc0bc594e6206e83e83034ac0d482e410811ec2eeabc1650a59d13cd8d3aa38efb76c273c65a0e030b51e82aba4b50678f0a22c479e026cf5040659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d64901cac268a0f09067cff7339cdc
SHA128facbbdc5fd9a4bd49595481adfb8eccf38ce92
SHA256e626526fb78cb203507427681f1bf57a9830ea24b119c0be455f6054bb7ee909
SHA5124afef62bca545d20cfaeabdf0c9c1e19aa010e6aad13ba80935ea29c3f4fc401376dca02ac55e19cf3fa9fe22075271a392adf64c8c5c85073ce2ff0e2723133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d16b032a391ae191a9401391eafc269
SHA1e1c87764535faa6e4e572480ed80dc830a77d719
SHA2563e2bef37a36eb92ec025d4efc739cbe03d485c7239b64ac8d192313d35ed7022
SHA512b35ce183279c59a157c8b85067f63b8946783dea05c35f8964499174c3b1d9d5416a5aeafc75d0c531e57f04bf5472301066c21e0f08b2526eee688170794ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543df1627813ee71fd28adb8d84f917d8
SHA1c64c60c6dab8417668a7f3e2ecc3c859204026ca
SHA256ec3fefd253c4d5b8faedb4531e336609faa1acd643e9851461ab338261240d99
SHA512f80f9dff0111d71d0afc0ce65fb2f53ff17570d8f8e2549d28dd166786125138a5bb7941e1a4663ad86f96bfb299b721a417627db67758f3735ac0dddbbba456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589605459903e177c958440e8e49b4de
SHA1ea4a13a31aa8bd885503a89ad5291ff09a2e868b
SHA2569be7a10e8d67edf558275a47ef9f3ce6d51f8dc200b2b812c80573db29fb2712
SHA512fcc7c906b93a20b004bb2ca938353ed03537b0dc00fb99ac4f030b4760fd2c604864a3d1e484c4ab6f622be96e7fb5d67051bbabd551ed437db986befd3aafe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc292acc5cc58636c4fb8f449fa52de7
SHA19ceab0c4ae7bdb0a570564a56a4da22897adb5f7
SHA2569b6677df93f5dee4cd8c8ebd545893680725040c21072bb94a54c2b7438811d2
SHA512ee1776264fe3b8d6a070227a9665392e3fd440a3b34bf9169b8013d8221a4d8263e8ced7c80fd409a91580fee0d3391e276a3400baecd6ca95518e9e4bd88c39
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b