Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html
-
Size
22KB
-
MD5
cea3eab62cb5dc062856c4074eb8c684
-
SHA1
cd09f1f0b0882d8c6e53d5f9082de83d910d9e17
-
SHA256
1164674b087f29c1bc3031177cadfae8d7896c0f95584ad95d5f9e5375362b80
-
SHA512
71b326b50b311f4db990cbb0022be69fcae63bdb86514d20b7a953af7ab8b0fcab45a080e80e1c87e6bdfe5bbab09bcaecfeb1df1fa6c2449af9866e6fa7a878
-
SSDEEP
192:uwP6b5nTwpeUnQjxn5Q/fnQieeNnw9nQOkEnt1FnQTbn5nQmS9xN5xHMB+qnYnQp:qZQ/mySxUr0k
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f012663c1400db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67BDB701-6C07-11EF-AC30-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003995b1d4034ce366031ae4e7ac23529a5fc94aef2d18efbe638ad0d3991a7d5c000000000e8000000002000020000000d96eb5ef486561785aff512b1a5c35879247fb615178eaa11eabba9e0f4719e9900000008a112f95046425f2d8bc775e38e66eca675d0c7b83a43a37bb2d61b88f2ddaf20fb6ff76804d8abb4b1bb8618c62ef9bb56e1dbc865f4792beb72a4f0027c6b06368d5848fc3c79ddc2d0efc6d42492204f8e6388bab48c23f98d011ad6fbacd1c133244107793d8ada8348670ccea0ae91cfd12e786c2a5682e4ccc3240475d64ce169f8ee1589a74463c6928226e7240000000a7e09549b20b3d20724ea84a0f1ce4aaa6e95ac2d367d08770d2a23b2f00df606f8552f6daf413a7551b4b4ab4e67bd700f4b8f70ce0edecc6bb0fa9dec7343d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000cc466f2089b64d69c3804dcb9cb1b277f4b66de89f6c8c7f6f7ded3549a1e7f5000000000e8000000002000020000000561184fc987bdba1f310ff8bab7b3306031f64b236e74f363976f858c9dc358520000000752c78fd3def9dc95ca665049828a0688f15ec6a5166b8071300be3f39c3391040000000cb18e72b5d810733231c6d37608151aeb3e7aa9d8c4c8e51f011cee931e0db30f7c8a10a5cb92ad718686dc661a4c4fdc4553ec4fdf3ea81b4caf9dc3f04bae9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431758320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2880 2800 iexplore.exe 30 PID 2800 wrote to memory of 2880 2800 iexplore.exe 30 PID 2800 wrote to memory of 2880 2800 iexplore.exe 30 PID 2800 wrote to memory of 2880 2800 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354c8023dcde6759bd0e9cc5c9e9a2b8
SHA168868c2ec9ac905141040652fa1f8ac6bc348402
SHA256d9d43e6719aea92bb48c6b1d3054c860fc120cb1da97a23696be94056c0a6639
SHA512e1e3f32c0f70efcf3a4780f87a2ee31bed21574d7b4b98536cb7a406554b0178629fa1fa5d85ab8011b6b24620e6f2768923761a8a62d2b7a13ae0cf54ff4e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12677cc04fe34c9e53b6053d72eaed2
SHA1a022d3477f10bd275e6890913c7c002f4b847ffd
SHA256efa48c4a43b17162c557f2495eedd7ac5f2b270a65b83b2a63281e2fe40c1190
SHA512562332da97c09da2f1614b68d207a6b1a8cdb807326ada741f961d177fceba270fe01506f8aa9f8e8d90461192f1a5dc3f60f9e186e1df4aa363c49be3d2b92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24a0767645516628da126db4034cbd2
SHA12d180f0b723b9db74650072a32e21faa5f64afed
SHA256c5248d9117947689b88456b6706ddcfc9605ee6d7f3c525075595469a7a1de24
SHA512cdd93f786fb7b9e00e5cdca73f837fdc1cd3b37ce90cc966c8be4f082592bb09bc4ef6ee83a0a4098bd8aca908dc6b226326e0636987902f434b24824e2553b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c637fe22f5ae8698fda941b8bbff57e
SHA18f2319c2ce718b5ca751f60a72b80e82eb93d29d
SHA256faf59cf4b29f28487edff464168235e6b981b058edd1c4d3c2fabd38c3fabf5e
SHA5128307e03551d2db15dc8b7276182960e20ba3eabe0a54fd0e3d634a788a8d714386c6aba34054df398a5b4c2d35429f98e005a2b6096bb03393b6dc666b809560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d64feedf02b1ddf381bfd6a7bc3f97
SHA1b617f9448159348cb0c9cbfaa2f3f65f3a8e8594
SHA25661b703d4fa79079e8e947254f33a4e8f91a5d4ff0e5003faf88fe6840013fbd5
SHA512af86e2d1596407a8e8857b147f701aed05733145d456ae11c502431d5dfd6e969758811492debe9da4cea467d8f9ca04f714cdca9eb6eb9784bbcb229efef66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783f9506ede45151743a23415a8aea6a
SHA1c18990e64dbaadace79b14fd8b4fb1b550d69af6
SHA256d76099f4b3661b3b93f9b0c6f47bdc466e78fbf201bc824cf1332ca6192a5cf2
SHA512020d4e6506db19e321b20794acc4d37ee8c89dbd9675e97eea562d9c264bd281e4dbe3d2285d0acca67834615bc0376c2e9af0aa6d51a7d8fcededbcbd00cd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c69ffb3352fef25961ee2fbf1428d51
SHA1d59b26cfd6526a01e6e62a26f7b0a5e02d6ce083
SHA25639bf0fef7f1100866cf98b4bdce6017a123a456f6a8f8ee006e0b8b03128521b
SHA5123814a85adbc12132446d81bac5217ba292583d7a2f843101fadd6883e4fca4474746cd78743e3b47a004cd19a6c84cffae2a7652508ab3c5aaaf624af40073b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c94167b355bb84262d999bcc7020876
SHA1a69a9297e991e66d00d5989a8c36d467f4197b2a
SHA2562aa23146bf3298653f8756c8d6ecd72cb0166b69c42208b0fbb0d3892e3e4d21
SHA512f9b809cd65e69fd22517e6536c35f24add9e809503e6450ac0a2419253ad10a8f38ed600e0ab66dd13ac3991ab5ed2cdff545799da24cbd090445ec263bcdc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52927a317353b0c89e5dc57190a9a3cbc
SHA17614727fc6e764a1baad4ed06ecf9b84712f9fb4
SHA25688b30a72c50cbfa42f57a4913f0db47b766d71ac4b7b2d9717a59301a5450472
SHA512f152c20b08563d456e58062f19cbe27982d53760f85b8c1ee741f63458bae86575b8defea7427c9a41f95c73807fec0c476a881554207255e9a4b617a52f406d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e476d8487d831ef554905975cd768b
SHA1ae6f1b3b5dcd1bd279ca1bcdf1033531241355c2
SHA2563d064aa5d3f46a502b8bd11f9a5ca0129702e7109b7461f6b261fb92c7281ec5
SHA51219914cbd6c84c1c23eb2e67fad6892f39205398401405008ff901ebfdd753b03f86d030e610f5974cb60790a408ac60e97146a664f82cd25cd61a15a53959449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f24f9a60e6bc86361cbe02dcc27eeba
SHA15d7739c837e54fde18617dd1730668c8625df978
SHA2562796f6d2014f8b64ae7d012ba5a42f3ee39371aa96ee474c682a70568753d29e
SHA512858755470f542dced65c342515ab3c905f5ef3bd703d1ce73d99b1788082e38d8d079bd6ed50bb6639cc5d93893fd1cfa3e1337a85f49e7dd38dfc6bba8a85a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f726a71049b4a805c8348de908caad
SHA164918af496aba4ba8a0cb18993c4e76890f11592
SHA256d1170130dca162bb840acc09c7c4b446c9467bbb1342f8c6e8399954570506e2
SHA51271b48c58796ca1f8e2ecdbaecc0199418bc890203d36178db596039a751ee9c4dd3d786bed7350ee00bf9bb2f99561ea822b4800e81244c2cbd1b4ba33a3ba9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409eecb7cce21626c8bcc1abf8d30c1a
SHA1d86a0c78ee9403a3d6caac699a24360d2e5cebb6
SHA256dd80a501d8bcf6661bc1e1b127aa048947d4283a13edca4eb718a2dc0ec502bb
SHA512af2bcedf8ef3a4ffdae94eeb59a3542369c8ece30cc3754ab6a956bc3c22fed796fbe8fcb47dd2a5a2d768fb1770c92c69cdd7a82af93772418db4b062029b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b010141f901a0a52151fd50358762d
SHA1b393e26fb8e2d2da9ad46a395e87ef2d19d3c5aa
SHA25697c0b622540ff68bfef49d2e34b7f73f8a626aac6e57fb331fd8cd251372c370
SHA5127c23726c6053d6041c99804d2b6d4b566ac78229782dfae5449c3e0f57f362a3957fd192e6b97640795e07f3a35a0bc997b64915fd41a191e7feb026e221ad37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0171318901f0377cf19097116d66a4a
SHA197a7156c9a19068b87829d8ed84d7e89e48e07fc
SHA256bfca38d83eb553789fb7bbe2f989ce7a86c40d61a31b533ff81c32e2544514cc
SHA51258d4492559e0671d9642e1f433833acdb9e08599d8acc610e35c0fb5eb6bd635cb1e0c508a7abe4b423f04ceefeed51c83d21942200562d456525c4d9432af4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581228cf8adfe54c5f6a2588601c60714
SHA120462963a136d3673c373f865f9a5de72895beeb
SHA2560923c5f5a8790893144a5c9cf1e8ba2d29609ac2542a098060a2c52c44e525ac
SHA51295dc6c1068f8f6405839d71ece90f58d31f33467848116cdd9e965344e03c712fcd7188f2bdd829b04acfb3b69863e1a3c642bb7e55615041022b558587ca5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ddfcc9c89129bcc04342613fdff4b0
SHA1857afc29acb0d2dbb3736ab5ad9e32b12b507b50
SHA25633e9dec8b11ec0d72c03d6853cc80760a18440b85f9b5fb97ed466ebde46ac1f
SHA512ccee4e12af5c40c1fbef937a6ec5b4681c34082bc34acf69829cb4a83c1d562f501fefab5b32279fefa3e28850b16f2a917478bc69a2412dc79270c2d34353a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c15ae528debfaec3aca9c62f6bd51bfc
SHA174c8621682c89e261e88a748e31a20b46d3cc5d4
SHA256a1c71d9e03d276128f9b788cda3cf4c868f2b90d32c99edd78d9425e5f95472e
SHA512be57bfb277a6ac9f950a71cdbb817020af3920396efbcca204971fa7c9c36e897c753abd15015887ee598e05e265cda729655abb6c49e7f091cd9bacedde7e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd50971e8a467dfaaecb288fcb506197
SHA165ffecca82b396f1ab1a861528da51ce089b82b8
SHA2563417bdf53998d41a56150428c96ec73705f8f17b5c0cce4aa81385ef5fe92545
SHA512597853e6b41d801618741d83d6f75825887dc72ef8d4fde16ac980362b926e508d721fc2ce3f3e5f97a6997c6426a2b20a1885e7614874eac4e729c7009971fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b