Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
d45f3bebd187276e8c3d9cfb8d91762f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d45f3bebd187276e8c3d9cfb8d91762f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d45f3bebd187276e8c3d9cfb8d91762f_JaffaCakes118.html
-
Size
31KB
-
MD5
d45f3bebd187276e8c3d9cfb8d91762f
-
SHA1
84a15c3b0f1a365532c47fc70a52906bc005ef66
-
SHA256
d1db0b31da88bc5791dbdcd386a712830da638af502635945aceedd63293caed
-
SHA512
e084f99041d63cee018f5d816c3f1a8ab4b15c90c7c4a2e48009d456062cef124b9cfcf7cee71b6f44f644b2dbfbbd3073f5514ab1ba40d391b8dafa47296da7
-
SSDEEP
192:uw/jb5nF2nQjxn5Q/dnQieoNnrnQOkEntzrnQTbnRnQmSRhxtJBo6Nc3StcBPWab:PQ/qMxXESsLC3U/Qi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2F16531-6DDE-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0023199eb01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431960766" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000008b158f2692187f7c578d0eb91b5ce84675edbed03f1ea7f17319810590c4cd2e000000000e8000000002000020000000c2fdfa98b9ac2b1158b7cb16577f4be9b29fae1a79717c615694bd984225ace02000000093f060b70c004b4bb79c111acd99e520f9dd25b31dfcf81adbf633bbb71edbfd40000000918cacf168b0896d5b7b92f6daca75b96770ec6c7fb0f73749a9be027773e4220570c868f3c1a967310d1cad170318e512f0fb58481922e02761ffd55661745d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a254b7dd16a2e4c69aefee44333cc4fa7d53c657df82e0f39eb7b8e77d234acd000000000e8000000002000020000000bebc613e1897e3201c2300f59c5734c1c69dc363ea0d3017e53a977181ed030d90000000a46a0c68f811f4a1ebdf4674fb56d6a13b5c9a5f1da11eff3c79779921d3467acd3c1734c4819cbe38f7305b565a951492692860620ca52d498d46c117970df45e79a64b63ab8ee04104492477d36df4e550bc00b9332197661727cf84807ee2adc1a4aad4a1c2d0671cd550bb2be9788388d8b0dd1e3e95c66e07f466bf508c8c2b628f550aa99e2c7bf80182a9ac5640000000e77857678b7e39e77bf8802678bea19d2ed18d3aeaf35803ba3edbd48e9c28bd00ec64763e68b2bdb247b631074cfbfb78f7b2901c2d16c4d53ed4580b36256c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 iexplore.exe 2900 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2976 2900 iexplore.exe 30 PID 2900 wrote to memory of 2976 2900 iexplore.exe 30 PID 2900 wrote to memory of 2976 2900 iexplore.exe 30 PID 2900 wrote to memory of 2976 2900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d45f3bebd187276e8c3d9cfb8d91762f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2ae14bd42cf3f258ab58870099fe96
SHA11ffef5b0a08933521ded77c8be6c4ec98b1ab61b
SHA2561aba22f4d4d82aee477a01852ecfb6feac2351008fced5e365542515fff912ba
SHA51231d9173efc7bba02576de440b03904a02d4acb39ec5ed3624bf8e85be0e0a6fc7f52992e03f95c0b7eea4b4115304750a7df8cd0e5873c28ca3379cfc4d746fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759551c816e294c798856b8c4063b120
SHA1a22e560cdf02c9e4b2e87092b79f77d47acc8485
SHA256edb5184e0f2b3cd8a39962e0e9ce5ee780358b67a087e4ce664c080a308d72c1
SHA512a7ff219efd59f55688a54242ec6d26a9c9df7250c7cd541af2dd3d1c16859ad47250f7458e4bd6795cb6c76ff65a09c0d7be4be0f77749d460fb27fe02a3542b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6aca6e4d90255b724960fc58138e3cb
SHA10757fb45039e93522d58d32d145980a9b6b9bf86
SHA2566f4f09b52f3f16970dc963a90d07aba08e7f526776b83ca15e5990ee96874780
SHA5125ee2e4f9d9f19e71fe15727d598ae9ef69d6292cc4131d7d33fb09b6b367568ba3548d2b39b8ee39e355a4ae989771fc548d520a472239bf435ccb125d7bb136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556baa029707f4332118190ba0547a04
SHA14bc74b9d5aea247d826dc8b9152d4e6f06b8b860
SHA2561dd0990d3a5b20ca245d843ad90540f437b6ee515c3c6398a141f811d81a7801
SHA5120cadc65ce6e63cd8cd421aa935488cd6f81fec2941366b14835ee820adfa27aa39616671ad533110e3d7e53689feb1e220ff375a2bd36cceabfee398f8ecec74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a65dddcb5210ef281d9f36aa9765db7
SHA115e7242120ea453ebb33f5d00627ce7cdb66cf16
SHA25676c67196dc09726d9774126f36eae84da1b1733e149985b20b59a8673a5fcbcd
SHA51257ed0a5fc67c7a190c12ff879bf699207f73cdc3abdba714df98e50425f10af9a1f4c85c457c26453f6ee0104c23d8f14510730cfba3d0ce27cd4dd3071516f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d1c31e18e1bfc242b7757fb1622a17
SHA1855c34d1be5b0d9ff515b09f11e83353493bed63
SHA256e16911afbf49feb0cc38cc221128a65b77d1934b1f6c5ad52045e70b21cd1308
SHA5122c0fae501f2c2f4e36e556cf8e5b708f12e314df2b4051304856c43c10737f8611afff0b426197d6416e219edffc94277996c8e69700e1418dfe1919f68b9dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe0f5b508657252a158cae5b18c448d
SHA18048566f1f0a8fc92bbc92e5e050ae31d0f885c8
SHA256918b0eb0fbd716c0a908b63c38bc7531e57b1716ea0ebbc016e718a85b8f1bbb
SHA5123c78dda34da82b75625088b5fe4b678ab7e4c1231c15d2ba1281a42cba760245e1174b626abe63971e74c331de75cc5d8b228a31c13842afbfbf6ffe5f022f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527289c2e7cbd393774bf2d1755d4e285
SHA11b7b282a8f1635ec3f79945b2ffdef62931c1b75
SHA2561e8cb99163a703feb74b8d892857baf8e85f7d6c6b949cee73c3c7c53b7dea5f
SHA5122445ae5c8976fead6515a7c3a696c8c5455a5427baccb45781b8353c04949a3561fe0190fcee3e93a6029da35ab948aa80d2e2a4ab0442ff42e722016b35e936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6350d5e02079ff27c1e1a1b26e93e6
SHA1bf8ad64018644ab2352538b6234f4b30fb90ba61
SHA256762122438d96b14ae5587dbbb484bc077b08b4a5c29dfd49040399cd52743f7a
SHA512a39ac7b411cfec79c5ba1670b69ec3d0042f75914577a7e499da60991bb3080b9151a3d3c89e76787e9cb5eb30d2e7232c0b7cfd4afd14cc1c91779d7d551c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b698259b21051583767b279521ea0d
SHA11da418296ee1af1924cae05c17fafe6ff6b03747
SHA256e5c1050a41caad2c8366710c83aa95f35c72598fd61eff38834f77f233b9e939
SHA512bcbe2a3c870f0d8d8961020dd4ed3712996261fdcfbda9b31f95879fab73565941634a850da632fd3f693dd3bb63027958b7290723332a003b90403a59915200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f7b81b2549a45bcae1c0a284bb7ecd
SHA169eda51f577f1ef904d9061d6858600756e2ea74
SHA25618e4961fb63fc2712fb4c6b7e3877922441d0da71653b371229cfebc07e62efc
SHA51207ebee357c6c4fc8581b17d1bc063ba84deaa1127285fa7afb44a628d988ba048b70ff8196c013e31b40c34e31bcdad2eec3e59d91b9f4fa0cbe7e7ff2235d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d196bfe96e0d610bcbec9441568911
SHA1101172b3dae24ca9fce0c88065d09e233f11d68d
SHA2566dcdfd5c9b3f15407c78390a66b800f3a5706c94137feb10119ab1f980e9e11c
SHA512bb05ca718c6479071146c5a710569d6e237db10827959206c379d703bdcbb9208bc8537ecfc736db77de069ab545acf1fe9bc2aa1c2e5d124bd0d621752c5935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710ab40ece981cf70452548622d4e036
SHA1ac08c8b1f077b07a4098864556d10d8ec6735581
SHA25688a22ad34dba2337c436f646e8aea67b5b202b69653d772215639304f15487eb
SHA512803265b09be018d6733f2d292971a6b5ed7515fbc2504493d7e326c1ac40f9a17a06a54862b9e033778c42398f2bf201d4efbcd674d31e621f81ccdde50e8a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657b2705d9b2bd6ba03daf8240c62540
SHA13d5b67d93d34794383291a9229c740fa84f94af8
SHA2568c6f8a37cd0e5a61505c613d463f70e4d1b1d1a29ea4f53950909ae5723b25a0
SHA5127ea921c7bb4ceb2fcf1eb306a3449059efa65349acddb1e68e7caf038c6fa89554431b6dad86fc94cc7f5f4043a3912ea310076ad0b5f31985923d18960e2d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da026a0bb9e1ecca9d7256c85e4495e1
SHA1a0a446923f0dde9b3c1be8de098fa9e7f730edf6
SHA256c5bb64b5f05630638745a94d1b37d46334bf3b590f1cced814cffadfe55b65e8
SHA512d708e0414d0ef7b057070ee5f9d664a8ba5247bec3ab22a403f7146fcff2053f5156087af7a33155495228c4f43630d637a1d77b32dd566db8bc6e7f85bf7504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56163a8642de5dca6da575ecfd1a088dd
SHA111fdeb944cf5919d275366803d853d86467cca06
SHA25661c66216bc80d09ef47f593815ce517371fac0a807779324fa3652242ca97037
SHA51291de5a816662c3a9c5d7db17a42bafcf8f7a9a22a6622fb0eb48d5df827497bc1767ef8af471a147ee6f8c051c1814d55c8c987b487c54678ac961799e47efe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ba1545047d3466b60c60056badf54f
SHA1c17953c14c12d8a8455666be7a3cbc31bbae03f7
SHA25663c6b22eca909e43e9d583013cc0bdab0775a67b66e6391359327980c2d3573e
SHA51254cad91fc5f56dfd1334e4974cb3b7a0f074d997691df10e8202b969b15172dfa17bf48722b34e99134b7af0184570c122e2eeed7cd114542b2e0c6f2cfc7511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb485992028854b2441de3108dd6e593
SHA1a5000d9253eae8541376ad5a7717040d04aa323f
SHA256186bafbb275cf1faf38a3398dabbd5b5788b2e0dce6ce82b289bc9e6f8a69a55
SHA512f58b0d5dc7c720ef0e204d57aabf87d43c27cc667f782cc92e611560e60c596883450da75d6343e3c254c92d6cbdea43f44e30783ea638bc2cea98f49c3c1589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea79de854c8aa9bab1dc0eeb70b090c
SHA18c59db8cce13aba613ab6b883cfbf2a899ce2b13
SHA25627b9c0ca2c48143cd65701a0273f4129f38a8b5dca767f2cd0f20d42edfc992d
SHA512511b6fa6d59f59d8fa472c527bc43da4ed26d132963434859c172406be72fbd9ceba2576f68ad011a519b3d2ad1736cf2b2aac8b61da3b66f0e2efaed1ff0ae0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b