Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
dfb834f8c172c797e440afa095943be0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb834f8c172c797e440afa095943be0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfb834f8c172c797e440afa095943be0_JaffaCakes118.html
-
Size
190KB
-
MD5
dfb834f8c172c797e440afa095943be0
-
SHA1
6bb3061f695b14c77bcf5ff1533f9ef0afb03f13
-
SHA256
1d51a9a1fbbc00f3704a41252176fa1b58a56c164322a8ad0054d2e8b965a74e
-
SHA512
9005d65c9798036bbf1906c619716bd1d56cede7e1b0c632e2e8180a128e07b30b66bd9dad3b71e72e7a6ec0c60e7943feeb3edfda5b02c4e9b5bfc3e7b295a5
-
SSDEEP
1536:S3bJQ/Gl9MeTKmjSzy43iGfxKKQg0wv0RQgPyLi+rffMxqNisaQx4V5roEIfGJZI:S3KwMEgeyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432459949" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303ac9187606db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000001e2826f1d7e1f5fb01643af6f5bf3b0ffd78f149abe24ec4124098841be4517000000000e80000000020000200000006e5b9dd06afcc359a53c190fe1a043606636ae0a4d6e983876e9b3c8a73c42792000000098e0e64c778659739fa5ccdb23014caf26e2b4ef7d906ced01bc81ebc8a63db7400000005d5f48f39233baf6c23ac607238e14289989fee4a2aa601577ec579f05d6012fcf31584038c226844a950c468628bba23a089768edba81fe7c15cc00b08285b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{029E15F1-7269-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005ac850f6601f4dd729e03627ca34a93d257923c0da5c21bd8783d3c5ec9ae53c000000000e80000000020000200000005e399c346da10eb5c02b518859ea2f7aa1dfe6e0bfce019e5e7006854e85c85990000000ce90f91e76e32e5ef0cd4e55c31f989d9ec1362f64ae8df6c5a9662df4673fd619b1fb93b725406f5cbae6031efd8f386020861634dc005b13e665dd6a8dc016471542ea6f554f934986a07951d9fc823007905dfb96177a179c58d8e12557fc4c711bd95b3269e9401ae4ad0ea127a8364bebf635ab17bdf31a8cde4cb7d8e1e8bb249d1dd90952f1e58c20293e4ff1400000005409ae50d43ec16a5df711457afe643a73d0612e555dc636949286a72dd4ff68e2e715dae3549de58f560c6e6035917b8b183bfbd680ee7ac0630d0d005a5519 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3028 2096 iexplore.exe 30 PID 2096 wrote to memory of 3028 2096 iexplore.exe 30 PID 2096 wrote to memory of 3028 2096 iexplore.exe 30 PID 2096 wrote to memory of 3028 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfb834f8c172c797e440afa095943be0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f21c99c8c1b334d16be91d9518eb68e
SHA18a29e688781d39e6610471f7edf49ce84ed8094c
SHA2561588f669698a4af04b1df71b08551a44f75ce5ff1a3ad5ecdc209b0ffa5b055d
SHA512899ee1c06e25715e5e55933ab25673997e8b9c3400f36623e9e2d8631e1e436e3fd06c1d1419d723a8de68736a0b8ae972e22e620045f53572d81a6017a6a3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b3b7e2766a2afe04b7abe32075f17d
SHA1e5a1a379daf9875d9575f16f0c6157944ca5bdc7
SHA25679e019bef82303bde72976296beda03768495faeb6bae74ddb8a50ab880293c3
SHA512287f6a89577b3620bb63122a796b61f32ede4d23533096854303288eb094a09413ab319e635c424bde74b163a76a024de582f656a961b45d7d46c81160b04062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368ef18ed76adb6afdb5ff4b64d9519e
SHA19c1adf42a8f78b6003e117a6a161bb2f7bc6c739
SHA256ade0bd8d391b2704298997142569fb552a3d193c7223da99da561701e2ef2ab6
SHA512af151b9c8451a1ba58a7a44afbf047e6616372b465e7ef75a67ef6daf14714d44daeddab5c491b5bc2b3459ce1a27ae395dc51fc88c39f8044f678cacd2a018f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e525132b05608993f8eba4af0938694
SHA159fb8839ad383fc061d058eafc9961aa32fb008c
SHA2563b62779c721aa1d8c292d65fb3fa02812c7aefa63196ff9508352007daafe861
SHA5129f15da8d982294b1168cbd819045f1427e81b9f6d53b0a074661c6f3ffb8c488bf56d6e29409884843e2edd1f84fe61e02d7d1fb104542072e6c70808eae907a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4bf00fae0cc6b0c5b43a9d15c7ada1
SHA1d46f3c5b627e0e1f6851d35dd1316cb443ce8595
SHA256c0db66e6ec6758a7abbd0a7c74ad265e137d70906b09cf4ae91d84b11c61a702
SHA5124213ce20817c429e9310cd1d29e0c0a21802e0a3c14d23acc40621696bea888dda38bf54d1a5abac78fc6c095e3a0a11cc604119ad56f79f9d13f7e7199bdfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9a9d0de77dbd12329060f733804a5e
SHA1593b2caff0885119df4e81b505f3996f7415e2eb
SHA256afe3e2bdec1578937f6f720e01689771289c94dbbe51295a0172e78c14c33542
SHA5122008a06dce3ba1e620d959df6a86fb7a730e5308b0d0211b9d5ce7b53937ccf1b554bfef8ebf23b71f00342605f6d303b87b2357afe51b5d7e8432cf896627c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b897f531e3d59eef87005a308e0374
SHA1319f454e26c4e8847a88b8ee79f8f300f8b15d16
SHA256f9f3f2846bae0510942b991017d448b11b908b77dbea6cb3dc9fda679396f2b6
SHA5124948a093d70a73a0546de6b212970769f07b35733254fd45b0ec3e4b0564b5a79d80694526c4bcc259550145c2cf6487b3ede7bb505870da26b858441037c4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b3f93cffd712bdf9cff418e5bd9aca
SHA1b6cda276ce8d9a70f4ff5a27e55bd4385287983d
SHA25678171c944fcca465f2f8d3ba6e9f8ea283b22f0b1283ae0fa10b5cde99f95bce
SHA5129ad4d0af5c5e33db6ad3036ee71169be3a9d82473df04a3a994a869dd20a4d0140f141aa96c5e2301f6016a8cf839835c16c91c963e42233c454f0c04609c356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9e29b3f687789d98a8160e6ce4c0c1
SHA1ca434bea9ed27cc8e09b67b75ec048366e73dd9c
SHA2563043dfd91a1e16fcab31e2d54741bd7d7f4bae0f0ded8aced8d30bb35b639220
SHA512220d6e179eabe9bd64de70e8c0f338b5a3362aa24055f7f7aea978ee0fd60677e5d24eb00e3e84fe5022b30b46e52db0848c55892b2aaf49456460589dc4794c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c57c143309ca2d30c64d254c999f053
SHA170ffa0ae16ff3169adcef7a930cacae4b62ee9cb
SHA256d8051f70e346dbe75da1191e4e850b6e5b1a28e0fb8ced1836e70941c99e9a19
SHA51232416f372c36072d8020b5992b6ca4fe7c47c22dcb79b78ad1814f5a768fab28508d4d71535c98ab77a6a3adb5e108348bec048f6ada24f511d5324c18184f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248f1a2935f016badfadf50e208a4410
SHA11b4a74397d2d4c4563e94c6c603fd41691739f6c
SHA256ec016f0875f5dceb5fda3b250f99bb860149cc6740495c923b22b33f87634fe9
SHA512bca0ad95f0ed6cf87e9f80a0cb6bf7fd88594d0bcd02e3e0b2d6d3b89826d05cd400fe4c7f0c884d275fa41ea81fea03fd9043f788d4a0eeac47d6d56290e3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567db07d12ad7117890322cb685c2d2f0
SHA1b746d67a6c70882a38d3f5bc5132cdb2470f7974
SHA25690c153645307e55703cb29518ace247a9f1599f37a8638efa7c4921a06b41277
SHA5129d2a3563367580d9508d5c6ecd97b544212efc22ec6e8366f8817c636a69c378d86b1855c2f8a17afa5094ad9b679fdc19b3eacb0ded74be0691b7daf44c3898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f869a574b370adb2053024a7c2adbd
SHA1224410a2e3a47af8e165704ea3292c0e32899b2c
SHA25646e6889a2d49430497b4e4ba0fe7f36e654567fda8c3a0ea282468c147643beb
SHA512206cf9396b134d721f7fdfeaff877bd3730d2b579accb83e6b315348adbc75ba596f373dd718e0571a2a364b56a495cc90031a9bf57eeeea712de47056a82725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0f922ac71c7c9529ca093bf115f456
SHA13aaf226d8259bf4d9c9a2b41ed845a03cbbfe326
SHA25683c9a0ba32e42cc588d04104b0096d734d77cadc67fec68de4986caa2f4c0fa0
SHA512c5b15d903faf1cace4a17ccb636e6cdebb8b64e0cf4813cb6bd3c67476a03bedb855746ac69008e44f197241cdb08bf81151c3659d3437a30ef260ffb6850846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b961c0309ca209cf4c2a850c2ac36231
SHA13d6bd2045ed2c7b81f8cc90841053ef5db52e481
SHA25616025e39ee5360a7564a3c05df9a504d42feabef3321f0a8fa4f958ba2ab36a2
SHA512cc9206ad245b10d74e158d40e94cb78be9d15d27df6fe26fd4594942a076b6a6d8c7bca2ba2dce500ee052c0fde42d7e08db6031bd7b46b3e7b80938feb6427d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68b14d05bd2747aa5652cd41dd3d104
SHA1e870612d8744959eac51d977813998c333b66a4e
SHA256bd2646579d22c3c8de5e86f00f5785e08089c43568cf276cbfc8434be2481bef
SHA512b40708850282256ecb895bd95cc64132822f39b3e0749e864d6b25fcec49e051c9d7414aa1bb569699409da03ec2e6351df1abbbc2ee5d4f0da04551dc04ab75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34205f52e4e806c6ac90854998ad449
SHA13313cc81edcfae0799773d4608bd508dc0527e0b
SHA256cb1d1a00876751479f8694c3c706fc18492206d04911909afd54bcec9fad792a
SHA5123334781c28154f7fc57ccc352032e39a8e36de3536606f1459b9208cfb14a2065f6b088742fe3cda0f6b9b74d1f3ba65cd067262fe76442e8bad1133f469f109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b75a0f9e38a9f1fee88487ff87f617
SHA1dc9c187e47a85a46c9e83e4a5c05498ab6bee968
SHA256d4bc09aed31820020eafd7ea3dd3471a89018958859d35f74767157b7578af84
SHA5127f9308b885960f5cac03f85645b7a48f3314122f450259ec70a2c880b51257178e1bca7a5d319b1a534fddb2ca263ac95f2e9ec1b365986d56c2cbd386f8767e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d129bb8175d20d990dee7ca76959d5c
SHA10b4f80b6caf0f82a306ce2ded4bbe3ffa27e70c8
SHA256d39a0f760517dabd3b733680add20221db8e051ec9fe4c75d237b7af26627f22
SHA512d536e030b50446239ea7a2932cc848712b7e2f30cc4529e96bc9e71a25fc8d81f4ccf3727bdceba95dac3c220adfbba0aa39f0dbbb5c9dd2e146625fdcdaabe9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b