Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
cf9b735d7fedd9855a2bef0d6027fd35_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf9b735d7fedd9855a2bef0d6027fd35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf9b735d7fedd9855a2bef0d6027fd35_JaffaCakes118.html
-
Size
42KB
-
MD5
cf9b735d7fedd9855a2bef0d6027fd35
-
SHA1
151af665e4ba5f8395c6a0574e0df132e782db1f
-
SHA256
a3ce2bf2261bfdb911f30f8e2945d4c4016efee15b553a2499119ec092e67c69
-
SHA512
45655629b3e69990fedf51cf7625abac09c09f4f0454e433673ea5648726b1804dd36c87dd5623db20185893c6479f92869b55bad48198e0797046a7927f4cf6
-
SSDEEP
192:uwXib5nzKnQjxn5Q/bnQieiNn0nQOkEntV1nQTbnFnQmSDxyz+h4TC3pW/fZpfy2:OQ/ZMxAS4kWYr/mV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431790056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b91f684159e2478a6903925596c2f1790fe9acc28d68447a1bb897ec83cc2c39000000000e8000000002000020000000a2076da7256ca2e38f33199a703896d91a6d36fdc750835e6217fd5f62293a1090000000519edf87c0b6e8904c0e9ae186210654e3d0e684db06f203044ba1c68cf92ce4b69c885f7094ee8131fa1df5fc0d15e7929226195555637eefdf97a1fa4fb8e5f052c055b2661d32ed55c0354af83d2367426b8a57b62d4d11601142779de65d211171d90779de5c5ddc14c9d09d127489369c83cd9f309362bbc511f94f09c85ede40105cfb68769dc8cb6695687f6740000000ba2874e85f046c7c25b57084cfa676fb17f17b08e9504202a72d298c908bb2eba31a3c604ace494f3d4d1a9227de1a8dc12ea8d9c4f188fdf2016c0d507aa610 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006e896c294939f5a7fd47457e3f3e7c1264acf763f7fdb66cc34fd5b0f5d77ad4000000000e8000000002000020000000edfa24c7550d4818e3b7e4a7ead665126311ba12cb800a0e8ba98f3edc6c5da920000000d41af64be211071b46912de9a3acde5725509ea340b1a70a3514eedf096bea7740000000c10f924532bd141c0e1813484df86204b93067011ee7be7072c047f3aaaab63e3e0fcf08305563e3fa71d305fc0bceadeaede5d6e9c79286df9a7e8554bddea5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B481A31-6C51-11EF-B38B-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e38e215e00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2524 3000 iexplore.exe 30 PID 3000 wrote to memory of 2524 3000 iexplore.exe 30 PID 3000 wrote to memory of 2524 3000 iexplore.exe 30 PID 3000 wrote to memory of 2524 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf9b735d7fedd9855a2bef0d6027fd35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9301047229590ef11ea1a40586265f
SHA179893c94a6c032087aa0263b9936b3052fa8a53e
SHA25674f243a4a955247993e655c1098958dd64e68c03f940bb938b559f2ed8ae9c97
SHA51269e18ffa2100a2612802543ad93cd6ad73ac4a5c8c48a1042e966e043de779fc10e64edf0fc1f6a30061cd53a248ef81cabb050d3ed00e278ea7168975bb7cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a58b56850b0e1327f1ac5c75ab250f
SHA145cbf4fe0b513343a53619a65a516202006fffa0
SHA256d0f1c2de65527a7c849a0518f0a558054936976e9c46bf44c6ff6674d8f4a2b3
SHA5125a47132e29e6b3c23bacfb1c1495350a48cd703642ea524cf21248d1ce5d9246055627919ba1cdf4adfd0f518093db81dad59f99657776528c7b75b846fa6e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9196a9d9c26f36c14b28dd7bb7ed4d
SHA1a78f89e56aafd23d367481a06be1dd76f6b1a9ca
SHA25623c918b2331b03a273abf62c44a1cd4de1414a151924c4e2a6a054356f0194c6
SHA5126cd712be9b2dc88e2d11d32a25c89aedcac89e29173e778b94be482bab6c3005e2194046256e447441efdf9c3087eec9c42667a790d82fb53fce2818496e7547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460c9a888c5df7be403e01867fc9dd3e
SHA1dfed158086375a67cab787ee170cc4f6e3a3de0c
SHA256cf26a145a0826688233476898c0018079462ad2843ad923f5a1faa8a08ef1e76
SHA5122440c3f465da52a6d3b22c19b47f6db6c5898aaefaf031e5f08b381160f84f215aa21c8e0cc7f9cd70962784c707943d4a2287b05d5ffbaa6bcea856ef16a518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ec4e693e427978b5d4391062bc6a5e
SHA1ad5c71d113da22383ad792b09084236cde839da4
SHA2567763b890b7ac29788b12172166507865097615fad7f44867715aee3abe489736
SHA5122547d7673156e16e76c03894d49375426965f5c4f979c949dbac2830afc9fa4e579ccf271cb0baf737f6ea4c305c2c41ab48659f264951c7d849bea58a4402b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573207d71652183ffe893cc2b39e8aca7
SHA10e154d048be8e44c4dd4a17772ee674de542a662
SHA2567e3e10c3a14e277f81644deb9c1714ab61b7bfa347dc874373ed787687b6b1d0
SHA51211c643c9323dc255d56aa7e34ef0132fa7ecff5ea4db65ea066692ee458585d385529106c780e64087c622eeb19f807e0cf56781664bfb4eacac9ebc41a59b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b369401b48e5986a4c541a6a1bdd02
SHA1b20cb721a50345558acd842afa3a38a4f6c89bf4
SHA256d6b6c78f19096d564d3646d546973e67d42002fa85660f9f0517bc5871e72aee
SHA512c3501956d48a01574a09731b6711dc80ebb11f801639fa673d544a7bd6c10f5bb8253cdd58e772dab4f79a7d3d3b8cb707b1cfc17327309e184624802e9662a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c8ea92b61ac903bac00c056585e71f
SHA10ba9082b6e27cb9503b9d0ee145ea753794cfce5
SHA256283485d0d86c811ee0357aa2d8ca47582e3d930812b2e75f3434e7c7ff6f6dcc
SHA51224e1de917d133d76fe2b6363aa934e4dbb1bddceb113341d8e459b202d4c8f9c7c3255b55b7a1d1ed640175ddc4b5ac0abc69a4ec6d46dadb0d9c1fc459b526c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf36521209addd0659c181fcadb18c44
SHA144e2b172fea129f1e1bfe01b4e7439425ccde759
SHA25679accd164ddba65a6fc7519951cff1dbc7f3c494459036eda577366571f731d7
SHA512e298ec6882eb887348205cad8f32c6020625272c08e5caa8f211adefdf3839fa54d0ed96d405bc83abeaaba3afcf7dc10e7a3d2a38607702ea32c4294ebb21ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790f84bb99fc2f953efcc81382b25c56
SHA19f8aab17a57b750df4183d312b08bb5e1a935f77
SHA256fbe340b2ef036fb50a3cf1d9d1dcc656f4c53efaf68bc6c97f0b1f5069b92808
SHA512823162101a539ea7799e2a428dd4b4f7a29259ac305c397f830d25d46ffeab0a2c3fffcf328c89677895c5ae026b6d25e5b2eff7e93835f29ed64c6776a7f557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b994a9ba216759c1f1bb48f3bb42c96
SHA11af656fd428695a751b245e9f9b1c5c1eec32633
SHA25667e5dd297c6a649da20da4ad2f480fe5d0a52d094bdf5f9fb8fde53fdc5e405a
SHA5122f8647227a0fabefaf4ebdc27210a5008ff23c8484999fd05f21284e93c967c95fa1d3d58f7d6cf8be95c2b1503baeb1c25188523764ba923ca8e1402e6dfb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed15cd8ba4de4acdc9ade705c002bf1f
SHA173edbefe924c7a8e321d849ae270dba89141e2c7
SHA25623bf0f978ca7c43246cdb0ff7563a195e0651f0592a954ed51c556c1cba95757
SHA51223bd4797d2f2bdd20e89ba973aa39e4665323ae240811914c7e3e3855c6f4281c0c56d37e450ee5965f63f7ee89607cc09ae35f24dc6d90e23ac1b0677cf2057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb082249af11c1aa5c0b43d10fab6d2
SHA14825d012d744344f9c1d58f684fd7771d5efece0
SHA25666965a86e4edf0ad97c6c3fa6cdb38694c7aecb9f06f4db198463ee8f9ebf891
SHA5120c02a35573a709d4d449c0e4ef7accdeeb84d675d522b863ffbc5469b5d7d4c355afb466a58bbbdd03ed3700f76f59974a6c783eef57d5fa499ccdac21a7d6fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d0df525842ad6ef6e0120f86e69819
SHA102fb83c9e3b9ab5e550eccc00f4f4349eeb41315
SHA256e532c8bb440d17f7b4c322fd10f08136bfba2db71cb2c37a5c326781e91743b7
SHA51273468d7d83b08766438f7499aca43c4c1925c4c931317c6ab93a10ef17d9f3af8f5ad4ea45f5a5b4ef7c529011258ea2ca91d9533f7580427b0a7745fc9383d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54dcbfa2174b3e7bd4bd43d9c41c76d
SHA1b7a6515d1c26368d979476cd84b4798c618d3240
SHA256ca3f262d9af2b18bbf7be83c4ded286548726e7585495c7b4774ce7728eeed57
SHA512ea59ca727450b568759138664012dae102aa3b34e2bd248736f4ab399e65bc1710d1ab2175e2e1ea8ba1ade3428303fc86868252d9cf044e9415faceed6064dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415c0a1115a3c6e26b8ca42dde0f9a18
SHA1744bbcb146bbeae1b1e09e314eb27ecd081421e4
SHA25635766997c7fbb8971c9acaf1445a7dce28058b68b862feadddb7e93934541714
SHA512218a4d04853cb288bb219c22efb88b8d1cf0efd097e1e13b31cd55a06ead35c6d8d71989e1f7bce02c30115902e20011980c02c8e9d47c3b8691fe141d509e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79767aa3653ba67b09baaf10f0c05e5
SHA1ad4b585e6e4d39f6ccc03fa18e782409f26477a9
SHA256078dd0ff56d1137b2fda2b9f997b4814d15e0d2228556d4ac46e38957d027e1c
SHA512578645da2161c43cbcd0ddbd646f7fd6c52f30916940d160966555772929e92577e72c61f66b866c7c10fa98d0ed86e1d722b232cbae5ebcfd15dbf0e0c501f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7969e1d9902d9455baf658e628c7589
SHA1c0a19ac8e15aa338c4ed128c3fdb777d678af0ca
SHA256d1bd7c26bae106b026778afdb231134eeedd508e828e98a691cc6fc830aafc1f
SHA512f93d8dbf0e191679df3a3ac0a2f1b40b6a81bef96fb8f12877ca25fc7e4ade6659fc04200e44dbcb455aadc3edcfbe879af569657df39cd31f761bdaf84c771d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff1768ea6b3748bb8dec900401bc535
SHA1db2357abc1fd9478b56591246e98e4bd032a5c41
SHA25634b1354076d30ce057ef45e4a355e2e250ecb45bc330735572c7a8349ace0cf7
SHA512470283cc89c6b6153d3f63e584a28081d90b47be17eb3f376abcf7610be622a01d0560ad217207525924b5dc84461797488f549abe470190a2d121989d1a2935
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b