Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
ddbbd5b88b2be2c7b2a8ca720f795506_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ddbbd5b88b2be2c7b2a8ca720f795506_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddbbd5b88b2be2c7b2a8ca720f795506_JaffaCakes118.html
-
Size
23KB
-
MD5
ddbbd5b88b2be2c7b2a8ca720f795506
-
SHA1
1a7a71f18b04085ac3b42cb6ca091b7611338509
-
SHA256
3f23d24093be4341b39f7573d1dd13940c69b0a4a6060a7bed758114414f6028
-
SHA512
c3ed38f501e90cc51338b724017c53973de7330c0d0fe875f54e2be7dfacfbc5fc385b7913cf3b27a0c681718f613760c190f7200aaee13a5ada2954ff831766
-
SSDEEP
192:uWbob5nC2nQjxn5Q/FnQieoNnTnQOkEnt3TnQTbnxnQuCnQtqwMBIqnYnQ7tn2YH:XQ/TKe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000053b5a5ff23bad13960517773ba6de001176dc9202e697d8001cbb66eade1fdf1000000000e8000000002000020000000f10dc63133bcfb24619c3b83558389f44fbdd13cab648537f7b1842ac79d672790000000a0d3530f5b255524258b0fc64399c8dc7a3c74ce55b0fe0883dcef62b2e4ef3cb95913d7618897fe93ce20207ab9975ab254e5ea16ed327e3373aaee742d5f8d7cd784281a7ec2c8f4be8e3c96d5a8c083972b932211f791fd3b334bd660dd4a63dd787cfa5a1d3b1d4444a8edf824d3bb774e2389688f9757761c84e1229cad02ce1879fc154074666b17e817ef924c40000000d613608fa0568606c2c9e240209f6a0079446835ed6a277a472e5d2374baf8d5af086c160696fe194090e8edaf6f700c1b8dbc782c33eb08413254c4caa80c5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{247DA721-718E-11EF-838F-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09369f99a05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432365946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004ef39f5d7910e05102861636fb4cc65553d0ef36d6b2d86a59663628b18236b8000000000e80000000020000200000007d8e1e37efcc5e6405db6f7afb3e7673b6a03a456bdc0d83c4a720ec936e3e80200000006eafacad000c5559d9b3f98538476dbbb37a2a12c26550d558b953c61e9cbdc240000000d05ecdcffedb4a4c664771feb9d4426318ff7e41b10f5c81040139ea915dfd507c7b586e3189c644536c937c3cb566cfb24afab79d99467f7a766f7607513e7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddbbd5b88b2be2c7b2a8ca720f795506_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab2ddc35dac2404dd4a4ba9dbc7c4f2
SHA1f5a555bcd7160df5f0f0506f9c83d5320f15505c
SHA25692eca040597e8fd848ff2cdeac82c0f989fc8965ab9053f2a1bac967675e023a
SHA512d72a92a6c27925468d269efded0a2ff6e0f17c7d6456931ae243ce017bf279e2d7a0629c3c314efdabd80df54780ba3a2b03e74d66e8753ed9234bfe18d6d024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5fde96cca7c802228dc244c5a77712
SHA1aedb88ce47b87249b0c6a1ee4e65ebe6ab325e1b
SHA256429e56a99ecba05ba6be2a1b53c0d473087c9ad9eef394f2594f654d490a8339
SHA5126b4afda50c8b39a8273ba9d1ec9680a11d20db4fea7f575ebf5b621c1023cdd155039bde2e7c3148a4869f27221016269c9a18ebe46385239258b064515283e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f98e6e30d98af88ac7c425d5e14583
SHA121ac3c6e6e3741559b5eb845fb4d0d5a82a3d8a2
SHA25698d0f78fa0c11f03570f01aff597a2704be6d2b2c11080b240d9138811051da9
SHA512ed0ef1e0297dd5ab8d8e7e889ee654d92b7278d07e38fefc05bb3d783f384db9df35d103e00ac729a6a138de9625304c35d050c2e087dabfc9cd0b9710fcb447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b9b94ca3b67ef4a8f239bbb0fabf9e
SHA178f15feb97ebace26557ca3d58279a5ef4baf8b5
SHA256c7fccc61954387c3f6efa4e11676ff4e7ddf3e3d8df079b547dc526113f6b971
SHA512d16de94026dc92fd3d8ff9735ada60424bc7d096cdebe3b4a73bd3e72d94b0fc3002d288b67c0fda6db55f1f506d0d022127c75a6b4491875ab746c61298a582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8477675abfe2869f7eb058684942907
SHA1dd295eef99f93e72fea7eaca90ff04dff4c397e3
SHA256d880083fc31941bce34fe6ccbe05f650d89024b9d1112523d0bf7cc2d49769ea
SHA512179da7f5b689d473680e0e2272a1ed31fe10a41c79f27618226d1928eea2ec1aaf2894701b7d4c32dff578b0a13c5531dcd84577990c2f321dddfe391ebf5306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4342a4a3b9c86dfa02a1bd75681dbdf
SHA18ff4a0140cd6b0022225fee558efcc0a630489ee
SHA2560134da396bb4e6fce17bb7b71fad000f10f476090e90d11bbb45053577d00440
SHA5127c761e21f19e7144446d8cc5340d49e15c9418c1e3cd7a6823a9821c6aa85e96a3a7b25bc5f120f4a54b14ac13da7181cd6dd8828bc4e88b284ccd0b9f06f611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f27ff655602fedd685b9244c050f4a8
SHA19e0c671d6999996fc8b26c711d83f992ff39bde0
SHA256e042f584374eb369257f26ab84ae12017499fa7b7d5be34b5ff2ca116ca1af2c
SHA512d9e2bf2658bfeee1e96c3fde1b7a812454969ec8933a8b207ee6ee232c5cc05bcfa3ac83078eba2b4e6939b3cef76229b71d81d87f3904d4db075f997a66c17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad903306a7513c2af4e894d6fc24ca8e
SHA1b31c944731f77e903ce988da00841b8c6f7e904c
SHA256319de12184f8b833ef6666080be1a214b61d85e6d4a69734195133df00b270b0
SHA512284d893cad01e929586f45847373e7173aa147f29a7e1293fcbfad3404f2104779acd6e8405590633b3b523857dc9c2cf05f262fcd3c8f8162d295002c630ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c374d1dbcd4d9603aee9bdde5817cf7e
SHA179eee3d30590def252dd1cf2658c52e8a876ee97
SHA25670181fb53a91e8fa8a3896294d7e9268479ba51afcc81105ca74598efd994ff3
SHA51234b66bc083fc3d90d53eac43c0c5d29cd52244d511ce0c0883ca47eaf09a9a9dbfea51692ec1c8957cf92f557df8299661aa4aab0041a7aee5984cfaf91877cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d28feb39dbff9a06aaf5473465792ab
SHA1ad066d255919c227b0876f93c684a38fbc5278f8
SHA25676822947a95607222cc8a41f66cd184a3af3a1ec6b3ec27096d1f0ec74f1e62e
SHA5121c6065330a0269a2edc81bd205438b503e7b1d4f9b1d7357b00ec54ea38d647178216f0d7a13ac600bdcef384dbc14b32133ce68f15a4a564c32ec124e3d16d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b96f2db88ffc7a626019eeef1979193
SHA14a797548c0fa1e7f58190a65fee73f59449283c6
SHA2563ca4a0e127b760785aca14af50bea8277e2e094a625479dd701a40cd9df01397
SHA51210d83c1dbddff7eedbe2bcb86c1ae6e5901f06d0e320ea664d2fdeaf5bf93910dfa380b48fd16f2fdda9185c14b908f0568b5e4e2583e487de0e5b8f350a856a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611f22a927905e12c3c7b3621e07c55c
SHA11c215f81d8f26b67bc1e701e2a22ea26c3930894
SHA2564591246e39b4c91c037e1511d6c39a2aca9a1e85365808dd291262ce7d16a332
SHA5127a5c09e14e40075dd74abad24414918ef2b648e3b17f860e075ba5cc6cfa5f35858617359c1617291eb0b31a1341dcf9f99261855ca9da61b4630caa21009486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bcd5293918d1640409a8f25561f7272
SHA19f021f6130f6abd75c9cb7816511d58a974fac40
SHA256b5c065275d80e58cb47d3d96d13371e2d1814003f03c132f4060d793740d0317
SHA512cc5271cea1b530da9597cc650a21c4647b727be93d63ac059795c8a38421c259123a52c9834a488be922fbfdb2f775f91c7b9fc1c59414cfebcb547538025a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ea13c723f07fd0ebdf1cc03c56b8d9
SHA1509c97833c0cc46c997d3dec5b5fab760f9458fd
SHA2567dc019fee7280e2f3f774e78fefcb177dff6725c63d6b68fb19a07ac98c813b9
SHA512953cdccd08ecd01962a67ac2269b669e2c482785b5cbfaa7a32e23e3f3bf1151dc1a3d3ea3545ce2d56d52460eaadff4f938c851c7314693b56869016900bc2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987a4fe8e17ace921feb4196464bf554
SHA13e4654c66c240c25b8c38f16b9aac3851e3b43a6
SHA25649fbc7d7d6db925c89b1412d74daaef64d5828c07dd5a1b5ede70b3d82a451b0
SHA51231e8325456125dfc40c8d172a1a2e589375d7fbb352afce78359e4714f484ed39e3d159e489b22660933d6285c7d214a53b14be3f22e1662874fd8156ed2bc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bbd4ec36cd01bfaaed2e1cba42b3b0
SHA15e7ca146cf556bc1cbb9f8753a0483a895b8f8c4
SHA256944b9c764dfe00798d009d716112548a17bef63edaba2450a3cfb4e13f093d3a
SHA51246cfd7fb3f5695ba1c47c442616db75a73270a45bf716a581b60e9db14afff6ee74ffe72122b6d35326cb6b95dde89da99981cddf4183b8ba60f37ec09beea92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56315b368b38b2879ceb32c27210b9f75
SHA16994ff21c871cca90e308bbd3e77621545561d11
SHA25614133f072fbd009b9bd1c909ecb62adc7049689716d56dbaca501fb25fb5a39f
SHA512e1752bca5512b7745c0f3bee27e648b49d4923efd55af5e8860e2d6205c53047f7a91de34ac2aa593a9ec8dd254f3dbb69dab987f46c3428cf560ee2783a4ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb11f73dbf0b7bcd32ebf648123c0320
SHA169fb69fd2455ca60ce11573a2b779e3e21ee7894
SHA25610be1561667c9a26fd997dc8ebbb8130d6fdbbcd1cce9e04e4bb596025dc4064
SHA51220b143cdeca99d5b123be5f95bf30a6ca50c225e19de79e612bb90cd39e07a96ab5114cd2b672dac55b9353916bc07054b687effa06cc9531c5d51471659d1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72f44964c7b90817c842655dc0ce50c
SHA100561c869157cde9b4c1c860823d094bd8a4ae39
SHA2562c924f53df091c0e179d8f62689e47aeb7c9f3c81a293be5fa30565933249357
SHA5120a038e3f2cf6613bd9082f88286955844980ec203ef17727038d96a91ab308e03a9f4167dfd35ac04df44b487abd97234673d00942354ad11c08e4228131a00b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b