Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 09:42
Behavioral task
behavioral1
Sample
d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe
-
Size
102KB
-
MD5
d60f8f55703f062edf65f86ab497d82b
-
SHA1
3f916d324d4e535d8c646093b7e67377b41e4bf8
-
SHA256
310889f9394bf282eb2ba6b9b35a0b7fdd26696bab528906f7bfc27b12759885
-
SHA512
4b75718cefc0f119522d93b871baa3fa30684725420caa23586cdeda909d9fc5a3dca6ae33e0367decd558850641a270deb12f7cff30e23163d6e81bcd732948
-
SSDEEP
3072:dquJJzb7fCLDilwA1K96YFAoutPdai7hRt:EuP+ewAK9xAoSPw0v
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2076-2-0x0000000000400000-0x0000000000436000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009cae523525a9d4e754785a722f02e3eabd55fc88453a73b27a20cc32dd6b6111000000000e8000000002000020000000e24fe3df3b5143d59c715943e0066e30ad1400820c90781f530e9f6b3b5cfad620000000e0895ba625cb54fb1176b10135be96c31faafe9d7faef5edb68d741d7cfb8faf400000002424304cb617959a72f095f6b05e15762d5c1ba6d4da2833e661b806ab9524429bec4d068b935d2d98d2e6e931160666547affa5e0f0b6c037126d445cec8464 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4FC9361-6E8F-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000003ea147db672a734413283b8ca0bd5615ca69c40da6e5b1e9a544489bda08fca000000000e800000000200002000000021b31adae3cf820cb6c69c549d0ee5bfdf365c7847120acd3f588d9bd927f78c9000000010a32d54b1e0a269f8729324e46b300dd73f68cbff5eec2358b8b0ee756df24d2bdb7e0922ab1a9423186d715bd7ba5726511070130c626ac0c2d7bef8e947236207d43a687aaea6ed14f8def0820c1a1eda6ad2a9e7b435adbda9de47ba0b578f9ca8797478e52050a771eee5280e2a1f5f6484b38edc658e970ab20458fceddfa1c6e68d6d8c9be0ed2a593663ce3c4000000058945df77f5128932b738f6ac3cfe79a598a90bc5448ce921fdc844b007583d64a1a743454dd6fe5a88ca091b6937d5e9f7a65902cf856c29b09dbeaa3163eb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c097a99c02db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432036818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1628 2076 d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe 32 PID 2076 wrote to memory of 1628 2076 d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe 32 PID 2076 wrote to memory of 1628 2076 d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe 32 PID 2076 wrote to memory of 1628 2076 d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2872 1628 iexplore.exe 33 PID 1628 wrote to memory of 2872 1628 iexplore.exe 33 PID 1628 wrote to memory of 2872 1628 iexplore.exe 33 PID 1628 wrote to memory of 2872 1628 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d60f8f55703f062edf65f86ab497d82b_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://download.citrixonline.com/failure.html?startMode=Join&theme=g2wus&locale=en_US&displayMode=Join&productName=g2m&cat=DLAppCommFailure2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58814f646623275db6deb78b81028c7bd
SHA105c472924709eb6e2f6da51c39eb9f9f8cff5aad
SHA256d15ffbd741759b1f65299286061242119c7d7fbd9686beaaca64251534379e3d
SHA512f1c4824bfd97d25ab72e07e16a98500622f40545e060221555c35624ebddc2a59e790020151f0974d57b1294b9b48b890bfc0c11d533aad642e2eece0b9335c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4976bea36e9163de775d50fddaef1d2
SHA15f9c59b086e3bf8e2c738cf2820922aca2ec7b7b
SHA2567f10df1dea9e042e5c80edecfc5428e69baed3b4ff65d9c54506bb659d31dace
SHA51233bc2bcb396bc8a3167dd4fff87dfc428cdf116044df1eda9104935f9bd253089fde2224c85efd8377706daccb0e17597e35753a06cb7d86b601da6febabff45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacbc3bf8a1465f2f5fbdaa098798370
SHA172f7eee565195f2933891926cf77566e006a0a8b
SHA2565da056f2a6e1d2504a9b6d208fe987ece28050d854a5497b18c6cbce7512f648
SHA512718e0bbdb3f485953869248ab4045f6e23132a7db3359b6472046f2e80b738fc7bb121894b93048056c5d4c06cfb3e13da1bb9123ffdef782fae55ff4e3cfc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9eb4e1737e9a9b019f658ded3870db4
SHA1fb0c3e454548dcf457844db7acd6e0e7b9014327
SHA256930220fd06f5b3e2474cb664895d6303e01616bd739b9f138a6e64a29971b69f
SHA512365fb10558f3e277708432bae4e6f5a2f288585470949550654b307005d813b13560dd50e3e4ef447978a7895bf72b2f60ee86f610c562cee6dd78b993d2cb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d7fef395dde7e8604d389fba92eb02
SHA1dcb0d5035274caf5eac52bd245d467566eaf0f1b
SHA2562b1ab306f611edb6b426276758043ccfc5918717e69a9ec6a45527105f016a28
SHA512c2108f8749fd03ed46469f3c8643f9272f1d9c595acf123be8e1eba95c883ebeab8cb18c70183346121c7a5f303985152be5861cea2aad69e979ca53a1fd693e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9055f3043780fbf805447e8784f5635
SHA1ce6fb6524b80a64fee1dd115e4c94ab79b8f7a0a
SHA256d0347a45899a327fe12780e0034a116368b241b631c271ffb1720878f4190bc4
SHA51202ede93ed60ec1d878253c2889fb078f52d61f09a61a75cd92bf1ed64eb63090fd8c08da83d6b8c868d9bdea1648bf3b9900bfdf0cb2a2203f6d020bdd1aaea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50218e17923eccbdc8243f2f7b26816f0
SHA1d7b4711c0e1cf17a9ffcadef23ae5546a2dcd19c
SHA2561cd55e43e8e6661e72a18b16d5e87aa5a531b44fad7bada3829f72eceb836a07
SHA5120390ba91dd1f3a0d37f4ba9b3f7899d3de834b0cffe3d784200caefbe6f51ece1ea93d96ff224a155a7490fa41dc2cfdec19f48d900757fe014e3cd44ba395e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56292152f613ef530aafe00f71bacd797
SHA136557ec754b676760a06507759c807d05fbd626e
SHA256f0c611087ca978269126e06432ef4cd4e563e65a6ab4dab1965b9883f06ddeca
SHA5127a71cb6d33a1ef4b576ff086f3fa890f19e8da5e4e3f0b40a79ef11f021ec3fe2290eea45c427f8398dfa60302f43a23f8b037311222ef693ceb81cf0d5037b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557883fad5857426f2d3f719b2f2f78cf
SHA1fb1bc19ec05b2361e07a316e2ec2a1476c6064c9
SHA256f559477cefb12cee4b3a2847bad28c4c3fe2ea3aacecf047c89d6063c8da30f4
SHA5121d897e9cb29cbe97896f312a92df024f2e19807084aaef403258b35dcc46841e83a9d47e545e6700c49e735b3559b9fed5ad12b5e3db75d2a37f51271e32c6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4db5b359c2eb2cd5f20c9af1f5a401f
SHA1038ce06af7d665f84c450b9f92a37ff0d502618f
SHA256b26031fab41d5d8d761efca215ecf3a829555dde4043ef06466355c0d7e29038
SHA51277e56f83544fb8520ff9558abce40a89ffc2f1823d2ca621144c9bc4a05686b1cf87d2ef933506c0b370904c0499cf98234b4d019edebe6b8e42e27891f6bea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2bc18f18562a9e2e9b6996b0fdd5c7
SHA101edcef97409a662f35effcb5f35a423d0fe8a52
SHA256af8efea474dbe5145fe9876f042565ac4cd2837449d79ff4f3f17453f726d5da
SHA512d3b86fb6080af97f38f34074b05830c24f806eb2ec173976adac5dce389c5ad0533920dc91cff10fcf52e9246eeca197f9b31a2b6e1a3a34fe78c86f001da1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e593daa23e44bab0656296679cc9a7
SHA19f09f6fbe718349876287403d7725c0c902b9290
SHA256b0539ea8c3d90c1cdee4222a208e44048359df1eed896050244182fdb60d48b8
SHA5122114c9f8d463848dfd2de1e348e8bcea93dd3bd2ad3c42b9dad064d39c8e0aab6e3b7306bb40db2485a64d49517aa2a83c1021977f70e749bfe03a53e87b0ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542bdfb0e774b4db72f723bfc3dae8154
SHA11183513a87581ca67d6b25587f56883a307c1d3c
SHA256d199a42a3e40635f8437f1bd2d4b3f9beec54ea869adebab969b129719d99893
SHA51225e5aabd4107998b0621cbaca2739186cd91d7c7df7a4f0315e0dcc9414431e94c8cd7b85c815c4b2a379e2d09408c41f2fbfba4d3e6ab6c513b7f570880ae72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805b80081ecab8c4914c50673ac1423e
SHA18cff31df790600c49be0d13fef6a14aa4774f281
SHA25634f863ec9e36a53012147a210caf41f3aa2a0c3a50dd84ff80e1d746434baa59
SHA512b040065b0aef9606b3483d18bfbb02d649d03a584e03ab3b947c3be4cf1cdc151bef28bc5acc8de79747b156cb96fc1768af947b8c2138560fb9852649bf137e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f90e812f25dc2a9f74809650ddf7a6
SHA197be7de727bd20de7efbf39f8c102fba71c04c4b
SHA25660dd0efb0b9ea0402acad5fbcc47b4932f1348d6bd462571fe183b9186533482
SHA512ca5647a79b2156761ad90d9a13ec0d9264bc42b85712002cb12ce91c26ef45f7c59513e423f8268e53a023cd7a8136922e7feb692d7c8db9d9c74829306e100b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd62d7dd2add06d94cda0f243ca44760
SHA16895c5774d90dc42494f85dbfe95e0a09929abdd
SHA2567c3f878a11a460ac221c2552a04262f2d8482e2820ee40d266ba9649e907d4a4
SHA5121db2823f2d46317636de600e3083879445b58dab5bcb84ad3dbc3eefc286b72a1dc94c4037bc6b445e38439a4d2924fedd611e59b62aba5abbffdb22c8028fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d353030b72b9af148892d623b592fd72
SHA16542910fb8e2617770b6859f10e8dc8c398bf7f4
SHA256a10a8cdabaa02e913b104f3d30c09544e97c1f0e235129066dfd829c00295b8f
SHA512e7b15a972bf498faa958a47d69681e9600fbf7d2aeb830a1859c3168205bc0d9701459c54523606c9aa6eb5208d28156102837867eba0588c42a57fa245f7c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519112592daef50b7eb40cdec98fa3e93
SHA1a30405cf9d3e2dfe47fa86bcd57cb194dda5676c
SHA25679cd557b08c9c3df23321935990d54dcf0dcbe466f25b3147b4ee1cdb56344a5
SHA51267d198b6c30ba408938306064381081b8c5eb47f15ed96f043a5a5272c87ac309a6091b0268f58b9c2f80f794286b06d74f7b6bffe2fe4abc1680202a2b85d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542b18eab940f90cd74e17ebc7208820
SHA1bf089517e4ea4a317e48e8b42522caa544019de8
SHA256e84508401eba22a0e1fcf53956e549a2ba8c533dc06759c953d9c5d68a383907
SHA5123e718ce06ce192adc945155bb9965c1544f84c84bf6086662dc68fb30d674daabe96233eaba5dc02c8a3f47b8f8ee1698e96326048793e03725e3a272932c268
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b