Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
d3cdab24df9bbe8ae7c951d1b4e37b6a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3cdab24df9bbe8ae7c951d1b4e37b6a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3cdab24df9bbe8ae7c951d1b4e37b6a_JaffaCakes118.html
-
Size
3KB
-
MD5
d3cdab24df9bbe8ae7c951d1b4e37b6a
-
SHA1
58c12ce363726fb3ac41b6576f7e6df5eff8177a
-
SHA256
795a802dad8b15840d3fa938faea09a2c28d04f21a944f89046eb8032e620e78
-
SHA512
d062f5c24c8a9929ed8ab8ed6fd394d9097b3ae2d2c98e8666e2106b4788089cbc2a05430a3fbc1ff633194c540af18b46eb1454580605782693a511a9c17e32
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006ba59a230b9dc5490ab5482c495540f1256ce4b42f762a21043345efe4fbee52000000000e80000000020000200000000dca3cb26edf4dac149a0a73087e586bd60465ad5fb029912fed0f9ef628089290000000a8dc878ebe226f2ee3b66eb942db6f5e75e9b258e4a62a9c38e5a4ebd59a87f748b3cb905deed789796d578dae6f09f8b9ddff29b44c33c45389dc049a349d2e89117eba51daf96669887b98b79039cf0d874246cc0a581735e8b2c9cb0a107a8c0e005aac6fdbb565e8fcb8fdaca5c9842ab5ff2bc49116862bb1111dab5bb62eb7a7b8412241e46fa888b5b1ef76bd40000000e97b3e3484297fc400c17bb36eb015284ef8448f82762f9d9be1ebcb4347d80f9f5488a82b72bdb5061aa6953ba979a414ebef1606aa5b1862a393ce232632c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56F59F01-6DB0-11EF-8632-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6088b42bbd01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431940829" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bc09f01e83354d725c2d6b9b10f98261b2616c1881635ecdfb85f51fb4175221000000000e80000000020000200000002774a4171297ec3f003fedc9ce895ceeb9fbd05e738fa48c95d1ad8aedfddd3f20000000ff1855c69386ff3306a79c0981bddf425cb306608219009eb09f1d3917e4d8e940000000e332da99b5cbc107c28973d7b8c4bc3d0cd68b02aa81b591d82c6b6de3ed9da609adfb0e51e067eeb3d9d8686b36807fd861554d04d2081650d827225bb07a29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2792 2728 iexplore.exe 30 PID 2728 wrote to memory of 2792 2728 iexplore.exe 30 PID 2728 wrote to memory of 2792 2728 iexplore.exe 30 PID 2728 wrote to memory of 2792 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3cdab24df9bbe8ae7c951d1b4e37b6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e92373b88ff5365b354e0928a4b260d
SHA114a5bf3d9f9985802e8128b05d8637b6a594530e
SHA25660cb8b522eb0b2c7cef030f7f51622a5bcba823fbd877f63e226c9d00240fa5a
SHA512112af8366d5aa362f0db7e045b72aaabef9628b689c5150190ea2fe9c187ec19bb791824ff935803590597a00988274c9fc021915ec4dc604e3db3727a8006dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53aa64eed892575f9a099ffbfb44c57
SHA1095c64f2e5d84af98bb6d5ea6b7b9a193620bb91
SHA256417bd9adacaf5081baf3c1ab9ab0eb8de11c4d211aead9d34f2d7490728c71d6
SHA51246ff9507d50d567a229ce06964f383915316cb14cedee591d83c0e8742c8be8bdeec7d74811508279f1746db4d0d5537166d170cf7dc39ef82bb6a7dd524d806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046294cfd1b86bf5cea8c50ba97f0fd0
SHA127b46631d0abe5ae834d662affa4a4e8cc57fba8
SHA256073e3ed0e16996011a83dc490e2ba25fe04b6c43c398ec4241208e1c0b73207f
SHA5125ccb71d19c8d88e6cb796d4732f70d1dccc0905e4feafa2eb8b61d64f5dcd58a6634390b4aa99e7e9105f8dfea9bb2fc01b071d5527095eadc0f67f94729409a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6a493b084f209a377441f45004cbb9
SHA110b7b20761dfca00f80bf650add5021002cca10f
SHA256eb3f763f5ec502c30d7e3e852a4b732c91a1df61f487291efb38d34729cff58c
SHA51234b58bd8c492592d72f7e871d645d6b4822980441775911c6dceff2395459a72934aebe798d96b5a624f99feb1a78aa46fafb5d10810df7140cbda7d03e68a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a036fc482359115ce33dc44f2ff4f77a
SHA1265bbbd3565e8ce8ce836caaf0759f6cd7e8ef39
SHA256844892b71ae5fe8684ade5a9208fd408723517fc48d373ce6e00720254da63ea
SHA5125fbfda7ac010ff79727354f76527d0ae7a68987a6db71b396edb19fa64fff71a036e8ad3338267cca5218ef95e1f85fd48eea05ef1dcde9ab6197c8e18523235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf21604443a2d889de764b2711b8d2c9
SHA130ba92e0b5b7263c00c3b48bc9b501d47acd576c
SHA256af0c63d259f37f4804dde6c0958b7e1106090186ee034c20f68487a271e6b1ec
SHA51266af9d3861ae0b406033ca9c98d84447d153a4767eceea6c0fb26e4afc755b7b0a1b905ca1413788a8a723373982af36c3e43247d51d965dd81ead1ce9104aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50887784d4a2afa69045dd7ef7e8ca82e
SHA1520acbd720aa36efeb0518a158c7cc9c2e75404c
SHA25659be1c534729fa3eeb29f7cac502eebf8645e9bdb2cf0ec016dbe963fc71645a
SHA5124cd92b2b2ddefe76361ff3db6ff3111593c17769d1ee847c7a8d9c40bce4963557cbb64d77ba05eff7f952785ef7f57b0bce3e8878dd0ca5e0ff233e308fed89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d7ba99825250ab80193dd3f4e2e9b1
SHA154ea44ef64400dbc9f9542a02ce4b5e653048da9
SHA2564501bbdec00db6ddb0412c1bdfc24b3bc56fea314593d9006ba8e291f6892bd6
SHA5127fa5eb88bcb4ae35c9dccd46d883b1a3aaaecfa5f128ac0996436845c91c03170ffa36f225f7a81eff8ffd0974f2d3f49b8d89a33752aab9345ee65be36be7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced4c2c6e0da9b277708e9f73200a712
SHA1711d75da85a4232d0248570f98053d97dc50ca75
SHA2560cb28f9d4913001aefd8cc62b2fd5cd4f12ecc6f3f2803b77fa1c704819b7556
SHA5121961880d7e3e2cc5d728f4a9f4f20cff564139a519176d475522ae6428e010e062bd71799ea7a4eaa16ce0cb769f6c915cb4828c3a907b8f8f80325c15aa616c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55913c63cbdabee7b1508d57aacd69e8e
SHA1cfc9424a42893e28baa9a80e48084623f99b5079
SHA256a15e402cb9a6f51d9bba2c1ab4b5d7771658e0dd0b380ae94ef0059ec11eef47
SHA5123a650fcc4e83bdd0087a367feeea822979e16b5d04287f5e497877f9e0413b2178b15de20206aa3026dcabf9c362e7fb48655b35ebf055fe26ef9f43481a4366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57501f56f60564308b10294d57add99
SHA1b5dce6d44599eecec488762166c80fd69ec650da
SHA256a086521a6ee7181c1e99a3427b7b438766fd8e644866fe87012b4796e1f97a8f
SHA512b03cd571f9e5130ead44e85cf61a1633c7742e68874b4dee5e7fa24dbd5eb436012dfbfb177d1eef8621cf58205a15a7c36c277a0d794b4c072729d6679fa4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc64e07a58c68be39e567d13fd4e759c
SHA11bf9ebe9b2957ede4c0b8cdcde15be7d534e16fd
SHA256d0dd8cbb8bcf69710325ce789ca9e7aaafd9d669e8fead39f49bc978399388ca
SHA5127bbb5c31c0fd7a0cb6606c28647d8b548832adcb478ff190f83879c15717d67abd3ee7080f4c88ef2cc291f8a5fa5911ca46888ea64dd52bd40b22d2fb5d2d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adda6ac54ae7c8be9ec97d1542455aec
SHA1ce6f2b9302e21f5676f8fbffcc4d04e1e2eab6d1
SHA256f4dac6de766bfd1aceca80cd47cfeea6cc24a89d787330eb10bcf1fe2e885350
SHA51207d0f238d8fdaeac3be4a5daaec6e97d08637683c27d6e14c0e5b08baf5a7e725168b8861d033c51bba7192b7651d4af39ba4e2b9bbb394f4585f74e139d42c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e7c31f7357b1e2d410beb446c6c92a
SHA1e990d5cf0d21ea32a8002d4887d96efdd2a552ec
SHA25690274bf6d320dbcafc0541a51c180a2227391f019df38219c283fdf596b020f2
SHA5124fe0db84c23bf0d0d4df29b265d14055975a5f1737ff319a6e3b1cfd82d65da2b4da242d334cdeb572cbc8edc29d45f00c682b7ed7aaeaa464dfd9a43b49d5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e197c5cd230d75dffae76412d7deb7f3
SHA1ad6a69b8a5c3203638bfdea749f0ca57c2265d78
SHA2568cd17968fb24eb0c182fcad0353bd2efe98d0b07a6d52a7f1082918ef5ce208e
SHA5122454d5e6ec227517edb5f3481e45f1cdd35fda2461f47dd7a3bc470533207068e6209945ac5fd5a20cde49a28f14a52d8a835b757707cedc78caf12620176ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15a98bdb25ff0beaa1569ba4d95f2f7
SHA132f4b0ba2919edfc625fca8c33b9f5dc8f31fc5c
SHA256598a121a76db0ce6a69c5c789395c40d6633000ff56acd9b0da2ac2068fe105b
SHA51257691918bd002dd0e73a56a90d0c0203c257416335900b26df13c34130acdaed5283512674f23ec5e96b12b701846aaae5679f072cc609ce92228eb1f5efa51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bddea58a6f46513249c71ddcc0a6d8
SHA11e9c3e3b6f30adf77cb575bfe8b2989e97cb6fb3
SHA2568d1555b44cced5d0601497fae86df9bfc0f895bd8c213392d1c238f95a22101b
SHA512558704a5178136283d6d4bac59ea7301b3af7476f4bec6fba3398180cf973ade977859ca9c02243cd17309d1d5dbbcce98074f1afc40b539fc45a465cceca994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245e23956b9d49c2bb32b3ae76f74348
SHA1b60682b5125f0d209df1cc62545f8219c850dc1b
SHA25644ee1fa6388540ef7c4bf7ec2b12f48b7c3e2128a0c368be3e53a75defe7eb7c
SHA512d7912ca4912d94cad53f22c29e14dbc91793f606f5b9ed25d191e563462bc7d616519350bb5b049ddc31dc2465aca86a36343e8204d9ab3886c47268c3a797d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b784adf5ce7215967b07f3ebc4264e48
SHA102e146355150628f5ae940785d4429cb4c87af42
SHA256001111bef56a08e2c622b4ae599943bce31405d79d9418f8318357f3dc7ae965
SHA512214ac9a08c8dffc3af920cf5263a68c6ec13df7def6c23d094e132af7e4e6688612fd221bef95354927bd7a8299461c14a79c3e8c437a29e252bf560d8849371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9e50fc4e292e4f85bf00160702cedc
SHA120523cba3dd333535f2c94fb85cfe909088620b9
SHA2565cde2c13741a953616ae664695c41189d2ea915f77eaaed379e4abe9ad45fa40
SHA51223070666443765905e9d54b0189b3216066a7fdd46fc9282375fb39e2c9fd152060c465ccede0f63232ce3fb806df924033456358b2521500c5dfceec8ec27c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c26405996d949c5359ae71f10e6e28
SHA13959aefef1388c84989ec5ee557121e26e73c8df
SHA2568b3cc7cc915d2aa74ac0fcef65d6e5d07e70ad685f82b38b2b3a4da1a2a05286
SHA51263ba8abc8a84982b25e9fad4aa8f345ac3094c32c6d5678c512322668a910669571609ebca1541927500b288547b88a70bb084eee95fe0cccbb84b90b9c83510
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b