Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
d38c60038f33d9bf1e23a0b7d68d8bd2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d38c60038f33d9bf1e23a0b7d68d8bd2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d38c60038f33d9bf1e23a0b7d68d8bd2_JaffaCakes118.html
-
Size
119KB
-
MD5
d38c60038f33d9bf1e23a0b7d68d8bd2
-
SHA1
d8b3feed7aca17a32394eac053d4b01c764b025b
-
SHA256
fc3cb8e97c31f104ad2d3bd8559b8ca7dded3d447ec8635b41c83b861de9a44c
-
SHA512
ed57bf1bd93feae0df3dfffa67b640ca5bf34ee4585aab96897e212fb2c21c9d85edec8c72a9008044a79906b0417115f360e291fc625a5305cd890a823c1b07
-
SSDEEP
1536:SjusyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:SxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000130298f917463ee6e1fcedf07df5116fc7a98ab97905640841bd9fc239b75d88000000000e8000000002000020000000f6b009dc874e548914a42d67624547ef55725090687fe018c5307955ab1ac71890000000347c5a684050b834175d63bd625529b1d3265759e984e5ac4c550716b3e9d4ff247f1b5417648b6a3a6001656fd4b079fe1c02106f9fa184b2bd20d2c41d1e96c345caaa59e21e2aa72292b02311001b6b4564365adcd1f34a441792137b43d79830b3b628354ad3ab0055fe73d5438661aded6e11484797030dcbab78d4e3b398a1c45f0c89feac2efcf2fdbb90342340000000fa9eb49aa7b3488370df0851d730abf062b1130ce7638073dfc7f32852782e1e15447fdd95bce628318a6f7affc7e5dca1d1c445f0e61be661ebb1b6f48bce3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502cbe52a801db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E0C71F1-6D9B-11EF-97BF-72D30ED4C808} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000000ee69c6091aeb40470dc1ee167fa0ab4e5b49466b7cafa768347bbd7f2f0b04000000000e8000000002000020000000b1e60ed5426b9173f586dcded4796167960979e04821bd5a1562b8db880645e820000000a9c05527331af31cff75461f094103bd1480e2f1284afa3d99f357ce90e71c4e40000000cedcec8fb66cd6149b7e1db046f153a994e2c259ab9fc6254437adcb6aa9b3659d1f66367eda7cc7672078efb6a53023c613958abdea2f45fba7c9e1729e3ac5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431931875" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2712 2904 iexplore.exe 30 PID 2904 wrote to memory of 2712 2904 iexplore.exe 30 PID 2904 wrote to memory of 2712 2904 iexplore.exe 30 PID 2904 wrote to memory of 2712 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d38c60038f33d9bf1e23a0b7d68d8bd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545355db8d441f7463351993ad50e0358
SHA1ec7f49ed6eeeeee6993f74ecec3b95cb3b0263b1
SHA256da62a7afe58e17165f3e135122da8335efe43330acd8aeb1851cde053ab66368
SHA512455412a6abbbf975e1424814dcf558903add5c2e35e29c54cb1753574b310b479faa7e355a486ba9d04f76b98e71e262117f7816fe184977138b67743dc647cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fccdfee87722ddba776fa33c613cfac
SHA171e170b175afeaf5958eb6ca4cacfe46e3f6291a
SHA256e496987db07ac22e283c4c438227ae0a330c0a6d18eb56b9b267bda46b26e2a2
SHA512b818d002b6fc0754a48949a9a6d21d73edbd0b1a0885c8e0538578cff8399eedac4d569cd6a8752e1c9fffaec650011af36e9753e6d80a528a0319cd1c77fae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac00215fbeb210f368c45988b1eb22e7
SHA1e571a9f7b2c6b9a1e87cf0889c083dfa7a25d7d5
SHA256b308c9f5cd2218ce0bbefebf8fcab423129e07352ebb0af24160668d302fdbae
SHA512bfecc45c74ab181e76647df551ea6d640ea44b25bb436e3a69e387733f23d1bd16eb7597b44f5a804f3c6c1ea24ebd20df40ee001401b59811c9b1a123be3932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d235ba545240b38447eb911dd42f4a
SHA1036d034a7b38164f66a80ca90852712575a5fef0
SHA25682ad60f8a43d4b8882531e6b4d9ff67e88752962890b0cd73c0d6beb8064010f
SHA5129001ff5ff05d299baac6b2b7ae5556a75bc7d7b20615e19085664674bd3183d03233deb29a5b52fd8afad5a0af62b5f8d31316236db28b3179c8b08c9b5f34c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51496cdd594c9e9175574b57143a09b05
SHA129756bbfdd9d2f0859d39bdd9898caddf50f12f1
SHA256d449be8e708d528290eb005c5921d5ce4e4a9ebb9df6cf0429cdc98805308772
SHA5125964475d6b04cc1171e4984c4be4ecf3f38da1e73cfde8c8a5728b83f557325fdf27f6966a8c1b3d6c11a56f16b5ccd51acc62c5ea12cf37a4791f63e52e9848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28241ee760a25920a7de98d0f01e9fd
SHA142929bcd4cda9ce18f00e4901133467363482a01
SHA2568672ac3e1482ef85b06f9b2bd6a2f8ebaa6a26670e4d8e44192c8ee4937e8943
SHA51252b5c409ff674095ac7211c744ab5e321888d983c4302f57af1547562770522b12f95bf81c94ac42a5254c7c22553d703981f69cf7729faecb3b466e1226c773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce039319ce6a4cb7335cfaa53fcb63c
SHA11b9a4a41c616755b72bf8853f95aa99150182dab
SHA256f0002c1974e442937c3e8d47beb6a73db1da0ff15a6071ebd009c7256a8164fb
SHA5120c4dd863a3dd5b59f7b60ec8a9e34976e6177306828c7857320d5cee3e1a8c51d9962d6bab945ddb59695d557467c142ac5a8697a5c75c56506a23e81934e448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1b1ac542a4f061619513cd6358fd11
SHA176b602045a72c3c25934042f2cb80946d7e6d36a
SHA256fded7b1fcef8235a3eb6da2195836968fa169eadbdd080dc0ec85360581cc508
SHA5128512f5bf3575ab9790c43f1451f9000b218e0b01959c735bb2ec8f599b1faafa1abdec58e3d0e676ef1e496047db29974c512b61c249c40742a517cd8277943d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb786330fdc42ccd314febe7f032f3c
SHA1bcab3c11eaacfab607103c8f859aa8032bac4119
SHA2569795ac3bfa1872ee28403535b165f8bff9fba53104d9ec6f97c7a0c5903e2b88
SHA5127e032183f7f4bce0435933039e6a374569536c84ec36337e56fd3e9e1f7d3b9285370f85a447509486cbd8d759a016d428c0e76c923485f3af59fdceb83d2a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fd97533057789b11df745066fbc76e
SHA1dc5c6964d312d4060106938c189a16cef70c0b3f
SHA2565e4232461eb0d1ed53863fc2fc7dbe658c1ae7f74ab3a664357d6496705e74be
SHA5122e79c2c3804ad6d80c7b1e113d604fd3f7179bf9298afcd9fbc7a7df8aca7d883f0138e679f59e178eb45679ed4103c9081e0928fa22b7bb3830b1680d0a1e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a503da69364d27bf0172be20070ed994
SHA1100cab675b25f10f829a58945599f7de163c5c3d
SHA25640ab2965d1f7570995ecebf240882a0b9ee6c46a513d697a567ac67c22748a5c
SHA51251b9d14c399daff713e1dfcf7133067d599c4aa5a9a12632b28fe294e0b0e7649f74354f93a9755e393baf0a00ed1cc8a5edd8eb65048fa06a1e6448d8301157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7a8a54a5bbd470e28149dc96c1e256
SHA106b0ec1a78b88dd58eb25f6f4323d40c56a58aba
SHA256451e9818e21f3e5e2770642d15df61d35246dd08649cb1d26983fe71123fd19c
SHA5124369a4a46e2eb0ab1920f906f60118099832fa964d1933e33b71a547d32edb76b96de61c51ddcd26caeae29307b52e67a0e701b449912a69e25e89f2f9a33fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a83484189a11300551174197fc1e41e
SHA189cb772a055c55550a57f6b2b7edd0e9c1683ca1
SHA256b1420ee58a87eb52be6ac05482bc335dfec6ff763724e7e7c818b579473047ed
SHA5127304cbaa53e1c0816babe9dff9370caaedc1c4eff071778bf2ed6d5068dfadff29c1347d6283505f85b7582b6c5d2152e11db36732993972009347710cdad3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d59b31a7d2b32bd304da48ca2a82ba5
SHA1ed74ea686e0336f9ce414dcc2c6a5195b0c77c37
SHA256e9e4cabfebafb91245920c35d55385772c1be3526418a30d4e75b65c363e54ae
SHA5122226a3a9ac197906ad9af4b22922a8ff7beb53048b755bb781b51aa0687b9888aa75344494dc7d591750698fe0843f5179b11cab38a3805274a3ce8127114b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c1b81b512e2647911a5ecb9d15d6da
SHA16ff9e1084b8cc6c6de5187e8acf28da4c77ee0ca
SHA25646fa19dfc2951ed848670f5b3931b63c12cf8b9025a8c7c4a62ddd74b664e128
SHA5123c3660c37d6dc8ff40e2183c93fa13748e686fd24e43f0b4540ff17f9285145e7f2974a28aed7920ee9472878e00bc0796f53718d07a8ecf5301dc0e079461cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1f20f0356509452b5e92b2350601ed
SHA1d33bd1a0dc8434d0769b08a244a54a8efc48e40b
SHA256a8fe33a98aec00e6cb82c8f2708350f8b4b407e581ffce84f5428c10a5daf8e3
SHA51294ebcd889fda11838e0ce2044d56a8fa916dc09159b6c30c384a3e3a909b4ab3ce0b55c6047c06e7a33c080357967d5d7dd40c2c2efeca6163f707e81231c846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384bc6abe030ca2e7d2329a82d015a08
SHA1c198ebc9fe8254810af1558e585670e949f64b2f
SHA256d0d12646befeba3bf5fc5e9450561e51eb091a96d31ae51d94466d6a3c44ac1b
SHA512ebf9f2aff420fa17d9b32bc9e4c340f4b52de6806a26d8730c894f0720264b769f294f18118d36df73bcf7774fa0dc84620e245f3bd717807affc72ebe923d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56142232ebf740827b433d0e3454c56c6
SHA11b6a64dc743d6275a72c31223efb7adcb04f3a54
SHA25691efb75c2798915007c7ea37b7cd2f6dfd7570cbfc4d194d81e48a2308cc4645
SHA512e51f0119b09fc0f509629458f2ce5676e95b4cffde4e8bce176258d17203044b7d8626e5c6e92857dfa4ef237a3bdd037b0abeb835fa59ca1496527f8e223256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6a8d57bb931b07bba11e7fea7380bd
SHA1918e39ee0b39ddb4fb2137eb740e6bf11ccd9e58
SHA256fe027f9afb0a757fb14435728326d1ed32a244e2582e8ab8570bcbc6a6a6ba4d
SHA512dd57629b6a94b204186033bf5823d0679129f64a9397790b6a74643b524c74e7d90c3e9c55ed0150cd501e0c146ad5ecfa528f82e30d6be1331b2114ee2bbb3d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b