Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
dcd2fd72ba034a621eeac821f2ac9d6d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcd2fd72ba034a621eeac821f2ac9d6d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcd2fd72ba034a621eeac821f2ac9d6d_JaffaCakes118.html
-
Size
30KB
-
MD5
dcd2fd72ba034a621eeac821f2ac9d6d
-
SHA1
e92260918de0fdd828f8d3f91f6c3306a77a5d2c
-
SHA256
9af6dce93b02a7317db73f45fe7d99384422215708a12356229c39a83c74e370
-
SHA512
d7a768853390c682852956a735ea98fefb72aac0bbc453310196a20297650f4227cf38c433607942b3092f21700cf038e4418cf8a48b81ead4b7cd541013d0ab
-
SSDEEP
192:uWzjb5nNGnQjxn5Q/XBnQiekNnznQOkEntjHnQTbnpnQEoMCc0AHDSQBAXJ1+mPo:DQ/VW0s+YAXL+mPrbZRF5H5EO9a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432328164" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705aef024305db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CA96B81-7136-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e679ae535f7a4370d21347ca732fbcc4abe1b9d68215a1af6488fe035a4786d3000000000e80000000020000200000001bf11df2b36665cffc4f0ef202336d589c7ae4212bf254847bfd946b442f9f6490000000faa8a29a32d6dcea1d23abcc432e032ed247dbc0263cfee6a7066c068580c229bde70a633b8f950041fee665c68d92f0a770959c7f2b7ee0dd37e6d02588a244dc71c50c6d3ab680c614abeaebc5dbf1b3c77c811d2343e011e12430cb15e296c5deb8b7525867ebfe19dca1a1a516d7e9f7ded59babf5c809933d46ca6aeaa526979e0bf85fb80f914b487a2d84fe4f40000000739038d7d8b52c232b2387b4cc9bc8d2246625b38b8db0bd9c3d694024caf7aeb9e20cd65f3d0b4140c1aa08db15df43345205f5785e5c3c339004c1df07be6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000016d4d012dc29fa53af8c4f6682f564a23a72eface2c332a214262f16d87d1db8000000000e800000000200002000000078142bbcebc89d048fd477209643cf2861fbddbf220bf0a65e19fa1e7e9b222720000000202d6067bef6c5d5dcc914d527f78142c221175a564ab477306c21494035a4f840000000e1ef910753b413bfcdc7a0e642905d4e5393edb05e652bdd884331228540a89bd36441800c1e5699f39609a59c25feb6e92bbf51b30e45c06a55202a7718da0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 868 iexplore.exe 868 iexplore.exe 348 IEXPLORE.EXE 348 IEXPLORE.EXE 348 IEXPLORE.EXE 348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 868 wrote to memory of 348 868 iexplore.exe 31 PID 868 wrote to memory of 348 868 iexplore.exe 31 PID 868 wrote to memory of 348 868 iexplore.exe 31 PID 868 wrote to memory of 348 868 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcd2fd72ba034a621eeac821f2ac9d6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a46a9a898b38ab1492d4bc86cbbfc3
SHA1e5fa5a7015fc7ecceb49f25d48794e233ecfb9fb
SHA2565e0c3d163bd1d0fb468c2b79c637ed80f655fb67a89a8f6e3790ada8dc9b5bb0
SHA51286aab6fc9af45de134606a9f4690ab5208b77f6bc8030612ab1d89eefeae91de8995596f0657291268ac83080a20c828283f61054a6fa89dd101a692fad13231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52297874efb596a405183dc43aac4ace6
SHA10eace01a949c348058c272b2ea75490a08b99396
SHA2567b3c9edf1dedd58f8418738e28784448d49f0d0abb832e6e92fc6d2b12046d4d
SHA51224f5dfd10e4b36196a8c984f02495a979584f26be6acb7c10557838a7b71b5b1355dfba7027caaa897e57060fb8237c9cfc4ed670d19bd0983e4807f46d75da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1a41038294f0d4e973c6ef12145984
SHA1aa1ef073989e68ce20a027cf29f15792ef587014
SHA256f2bab2001e3221b815f1a418fac83229d30f34cbaa70b40e473d3163763c31d3
SHA5129b7a908048a95fb03a406c1baefe10b0461f1eff7ff91842751b19fa654c0ffaf8c8285d91d48d4f2db5332ef04b176eea4903f30d5569d6a514056b8a33cff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d550037a8817c13396e33e7d7a71daa4
SHA19c0899c06ce2de42c9a51ebb8f025ff983f71b27
SHA256f8aeb5a49621d489ae1aa28b7b47a8a27c6b26902e5b2ecfa4e98d4bd5b79596
SHA5127d43a50a1d62a24546d391711f0cb381e75ebec8bf307268e6d63539486c4d5f228c1e0f622e79edd3a47bd80ee3c4c3dc3a5decdef1c2fc7e270059c4fca5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55782af30b2e62e45a2b98b340b61a3df
SHA1e718617008e64896bf37d9261deba006834adf1b
SHA2568bde6a926ef9843c86f8657a51f6e893d29fbc36026aec9de0b90dd75290ba42
SHA512facb0db3d42aa9678f03232c28ed41a99d2c255d8436ba21e5bf0314f94707461be50044e0580ab49d6afbbc257fc21575de814cff5dade762abe257839470b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c385393d15ea24b4f08c9d7e08d0577a
SHA1cde9443f9b2d16dc4c19a26a7f3293f3635fae90
SHA256ae5db166e9fd8e7ac151b417861a49f2024ce6bc02a56d745f76d2ca9b5b7032
SHA512b7a9e6716637dd9f796368ae97d6c6d17b8466a4f5abd09b1096a616cb23f0f595a70430fc6e97a63e9a330772686409014975003540912cc3f7f2d7ad6bd017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bce42fc365b574dd455a9ed4e6351d
SHA1814c05f0e3f745dc73b90ef4d970779bcacb14af
SHA256c13198bfaa321816b5b003cf8c96af7d3e21d3efe687d98f3adecc790449c3c0
SHA512bf1d6eb2b2c229b91724a0bd33bd0bfd7a452828a0175a9e870efb395e9dc925218b42fd6a39d5e397abf2316fb6c7583c85df1d23e1b387f41c19d63c6e9568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913bcb628b67b05d663f7628d9ebab0d
SHA19aead1658f9414a8231854e2cfa5e88074337839
SHA2567bcfb7eab61bd1c4a112d9a09514ca34da85d92a0f888cae14a84a711e75ed23
SHA51258b905b8fb16ec995a3e3d3aa2fdc99d1b9f0bfa1c9c351bbcc2c724556d8fa343eb78311c79039b0ead553e11ef3ff963f657d402e78093ff7c2445daf34d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ee82e26908fb6a611205c286cca403
SHA1ea5e1a6d4ff8178552588c4132f729e8f01ca7a2
SHA25683bca67e81a93923b24dc6d2b8c14fefb5080a3aa8bc72952fc8c9ffdaa31045
SHA512a8f84df7af8476b718322cde8039722911b398daa65f1099d284d52e9798ad2912756c413028055b6cea3897622954668c9de6c4eb23ac80f8c8838a2f525e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598a0a690e33e0dba9cf4e51f12cefae
SHA12ec1205453ad5230935ea0be67996a95649f995e
SHA25641741175499c92a39983c4c1da6759a185c17218facdb159cee878f65d52d715
SHA51297212a052b4d8407f5a54cc3893bb07e889b4b5c5e6d8e9f6682406c956ac73f27e223898511d7d81454dd47fb6a2855d7deafa20a43544a82de72d46a115dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f6dd3614b3e904c1a830aee86f584d
SHA1798a4e09744bf2e82cf1ee8dee334d7876003d1b
SHA2569c23833c167f222f617cb6e10cad530dd8b53a377348c33fe3cef567d85b805c
SHA512cd74271b5cf03257471312e47e0686d3eb4469a63fb75481e4e5485d0c7629487f7b0fd62408cb244dceb14c73139494f04c60994450d0b3f59b380084ada07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef7134feedf86fa990778eca7eea484
SHA13240a7d529c64bc9af26f7cc9f9e0c23074e2d0b
SHA2567f8b74c3befc00a58e6e24ecea3f20ac2b848b90e0ea32cef161822f0558f516
SHA51237b38d1f4f75ddd49ac495367b539d7f993c4dd8c9210528c607cf703ca3682502a25df203c507651f8bfa1161957883d26f0e7b74c757eff25614b1b6a90451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c23a11b079d4ef9f8e71ab20869b7be
SHA1c0a3cf1898ff17760f8326101c974085cc7e2023
SHA25603ea1c0d753a21f84124b6c725a34338b374547b58022d3af359c16162de1434
SHA512674cccd6acdf7b75ec308ac4957367fe0ccb1098c3471a72d0bbc5440d9cffae5e3bac9aef2ae9c5ca267caf6370d30ebb066a249d37fb8ca733b919fb87e505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cefec447fced748d765658ce72df18e
SHA15148d1f221ff81ce6a09167d27953a1a5e723478
SHA2565beb5cf6d3772e54a85e78980b145bebacd26cd7e058aa40571b6989e0587378
SHA51226dfeb255b9cb3f7ee44d3c160f70ebc15f174aa9d3a5737060d736915d0d1259fe41cda6ee5ad7e3307304f0b3a50eab730e79051f9eb5cdf6a562ad4ffd30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55d0ea8ac3fa76859b5fd661ae89c3c
SHA1d0ddc9a90b9fd9c1db56db61e2002749f52881ec
SHA256e475dafe06e5bd71a6a0bf67169123f4ccc9bfa885057ecdadd3f09b6263682e
SHA512121fcd4fe2306f8288a567e5f72bfcffd5b4d9a54ffe2bcf2730dac9bf9933ca951d4fd270921020aefc642be3fb0c769e059ddcdaa4bab7e812ddaefa5a1a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519e1d69c3cbaa87fca6b10907c952a6
SHA18c00ac8856c4e84ae60ead37948c75176c11fd8d
SHA256c86b25596db7885bc5c52ca02dd7c6173f932a5169fb6dc18cc5ee9639487eeb
SHA512c5b67fb184531c9649a3b601e40cba1d5ca474a1ecfe86d7b1cd33f94ad7e6ac190e400feea264dfcc854192f59fc86409c467df075dab3806ddbc538d824bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c0b98f1a5d9b54caa73ae8efaee848
SHA10f3aba481106af75d51d6c4df93402335c05f38b
SHA2562924985006210945d0113586cad796b5ba4e4f1746536e66b990fe7433f15797
SHA51269096f8bd25dfa368a099340795df6b2b4289aafa4b3b181a7adc5dc9375edea3ebac321d4441b25ce8a9e384ab5e2fe064b6f021b60f1ba8f27298fa572397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389ac5328f6e25f8bbf684d045cb0df8
SHA1a8bfaade350dca1f33baa1ec937d1572f3470e6e
SHA2567afcfb5294fd7600d95e08c9373cf1b430f371bf6b2c37e1ef0f53770d6ae7bf
SHA51294f01b99f1f4c5eab74a92ad81113d7626bd708070d2a7fb4d8f8a9b788dcff80a19eacafbab1582141f4fc976785e864dfa2ffb5bbb8097cfd1177b0d7068cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db29c9f74c46c7d887c83a23796a3e1b
SHA184cbae2e22bdaae14e6a785aa721206265fa205c
SHA256283537f0a7d4e1a3c2e1f0b596b9f3374b6192fcaf93b26d00e5c6a4291bb00e
SHA512461209ba55ff27adb34dbd8eb18cfa3f0233eb47a3d08f0e5dcb9b0f2a68c29649b198ef51eda46e07699bb708fc4b7e3911d01b783d9029d059017e934ca9b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b