Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
dfc4ae7394b856429aca8b1a0d3042d0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfc4ae7394b856429aca8b1a0d3042d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfc4ae7394b856429aca8b1a0d3042d0_JaffaCakes118.html
-
Size
34KB
-
MD5
dfc4ae7394b856429aca8b1a0d3042d0
-
SHA1
bfff85b14a5439d63c2b9c427094297850f037b2
-
SHA256
25000327b26d4384c894ab4631232e9d03c6846649dd554871bc190574025fbf
-
SHA512
5ba23f237ff89a49f2372c9125c1a46024d982db800c8fca28ef745fd7669cd793cfc1001c65f0543a1dc72b256b8fe1153a48569d5c8d6cc7df4b5e712c517d
-
SSDEEP
192:uw3eb5niOnQjxn5Q/xnQiecNnUnQOkEntTbnQTbnRnQOgAcwqY+cwqYI4cwqYKcL:9Q/XkY1cy0dQugQ6020d/LqFUCEepa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432462064" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05887c57a06db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF416201-726D-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000acbfc41be7d79c53c670af23f882e2a5e9a719bb1c60a239f84633a70dfe7762000000000e8000000002000020000000b4093d8665c3a2b3d205c85399d8379c460b7dbd295566f0b26e1b1b3d336c722000000009f5af9c39eaa0d6916c63f0a73151f263236b388277ed2dbca59d9db198ad1f400000002175b3e80d03402051dc5bd0a2c08e56c78caeca88ab9e438e731150eefdf7014785bf02966c636e6af5b356a99d33078bab42c453073029d02642b697aeb77e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000045680c1ab98c491ac112d3cb943a39fe46282ef98ccc029c31e9d04a5ff3770c000000000e8000000002000020000000e79c4f2876d4cb7b360bc4eb915361f9fdfb168c1cb3f221bab31174073068c0900000006ca401c883c3157ccda59857a18ffc84ec0fa49999fb71f3056dccad320092bedb6bdd09289e88e6842e32ed0b5f0c32aafb1b4d3d5b50f6208a1e928f432762a6c958bfc8f524cd00b5951fc56cca604b56002e9417cf8480b7b8b0bb3714fc2546b0039d3e3a34d5a01db3c7bd45a526a0b78c73d95d4e987d54755a4e1590074dd4d0d351722af12995750836350f40000000f9c48f247b0908e3030095bddc9ec8e4bfba6e0ea6de44d1a45a9897435d0ccd76c85b31c2e38c2e8579e83f26a0f2f701a03a704f2ed8dff6d3fc77a58642ae iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2064 2152 iexplore.exe 30 PID 2152 wrote to memory of 2064 2152 iexplore.exe 30 PID 2152 wrote to memory of 2064 2152 iexplore.exe 30 PID 2152 wrote to memory of 2064 2152 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfc4ae7394b856429aca8b1a0d3042d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b2a62c9f67d92a8024e00618578f42
SHA15e223e3d4978a6f7480628d270284d6743bf0f3f
SHA25665937d61b50d75cba90146ba1df9bd2bab107aba115718f9ae2bf3691056864f
SHA51245a17cb4774e0af01094e80ead899cb8bcde069147f24ec6d12209827b2c8d46b1dfbcfd15f872c3c4f9ff754db44d3828555ecafe027edab9592883bdd2d91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879aec005054de14a0622d5234e3389d
SHA1f667f87d9c0011682e508c5608680b0302604492
SHA25696baf3cc32b78827f779f614e0af58f9226684c1093595d3e87f3f170dfc2101
SHA512367d4377b5122ccd3fbc0d8a5656ba1356536707e49590458a246b0c834975f251ec2edebbe9bf4e9905c017a37ea70cbf5c1a8b54722e32e787b6e3e9c2ffa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15b089a22d9b9c6f182f765d19a68ba
SHA1d754ec3db579aa2401a80df387b7267cc89734df
SHA2560fba7e567040aabda3f98012249c5499cbc580ca014d81ba139253a2e28d8dc1
SHA512df24a030a13de4fb47e8564070407c694cded92918b5f930aaadd42090d6e7413364599ea0966922e1acd351a891efd8c6cc36530b11f6aa493d30ea0020fd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b699479dda261b5f640fdf6e5c9dcfb8
SHA1950221db97df3d441e7fb209045f1343eb0770f1
SHA256f7a9ad5ad2b3a3992e632aaa2f0a6e4e19e5fa44e3c647a09fb73c53e8287e1d
SHA512a73eec8dbb6156f5a567bcaa2a7f693646391d47104cc487332489752b1d122d511999bece711e63770f5ddd5d983837c1ccfa17536f7b52f8585adf5d24aa38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0df08dfaeac7e245d52f28386a5aa9
SHA1c564dc05d184833830794e5235ad3efff4ab8627
SHA256c888fbfece1195b8c9f21a81b5b85dbf43f43e981366765d161beeb5e6e70752
SHA51255a493756f19f1b7ad90b652ce651f99cc30c556517f67f5905406004195963810f3a6ff7f3747fcb6af64620d2bba73760c14656c24f433043d8df907a7710a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c9fef4eecd45656fef239d88931633
SHA1c365d16e269b01147c1c275e8bb52cb416ce2389
SHA256f22e66243844198435c79cf5db4061f4a12de94655cb1fc63b7e80f199d36967
SHA512715627d7f455593fc27663e76a9256c1f0a5a824a90cdbb3b59884241b9a37da9bf7865fef481def97a4a4f3298667531cb4953a2980a1c597728630454bce57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533708434f32f0534c0dd970ce750413b
SHA1c6dcea46e790a79af8dea1bde95f169d3aef7b85
SHA256af2718e45322df31923b6555e05b2f06bbe4ca394efea6edaf6f89bcfc34e4fc
SHA512e45539b8515cc506c7c59c7cbaa9a72f483fdb23e7f974cea2ed554927c35f46c6fe415e2cf2bc6d5f37a533288a261c7ccd5338eb22d5e958d9eba1268830ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586260af7ab707a7236e7fe7ed1e8def2
SHA15f663451775e9cf5c55dbb82118a74cbfa622aea
SHA2569ef5462bec5d80354f0f1f5f778dd1fd3db49a9a1e837e575ff35f55b99301a7
SHA51212b6e93a51481b040d34ed61cb8f33b5ca7cb1bcf5feb06f7284b1960667ff7234085db71617ba3940ddc70f6264004a95549c81b56fa126d25179c4f8d42606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e90e32d425b9a1f412683c5f84138ef
SHA113e974a2d66f884aaef6aa85c90a9c912c9fda46
SHA256906259ef24e94b7d460bb1f15de61d4f325aeb637a1b343c1ed8025aec78e06b
SHA512b54bb0136388b4ee7aeae55eadee4de9981871f47a6388bbd8269565359ce15e3f35d3a91783fe314028419b433a4eb14e973d8f34924758885756c62a5d44a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52414341c1505db899960768014bef21c
SHA14ea80ec5a74cead59efddcf6d5cf1552bf742693
SHA25611401a386282948fae776070f321e435453224b7d18ac64e2ab4f20be92c6aa0
SHA5125237b3f4c8950ca37b7cfd7afac8922eb64c12907ceabfffbbf43c47527fb78b6638fe3475a1b501e853584accf599d1250eff952fac12b39c4adb26b803bdfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57059b349abf031540028eb284206b021
SHA17741023d8ed18139da06bc718f85b310529750a2
SHA256a5a567c71b5298cebd15d47390863cd2ec9fbe0848e8b3740abbc29eb4d87e3b
SHA5125c69434453d9dc446a926ee40f257b01c0122f381a201a476b9bae1174dd00c8d106faf9768409f0f3a3c9c08227af313bf80c8fd11d2e6123dd41f4d73dd025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3e27ef7499d98b9a810cf12de656d6
SHA1f2541e0a85812c52f528a4af78cc6244ac66fe3b
SHA256069413501855a33bef7823faad7c54afe40e51da9e653ec12e47790e0d4cecb2
SHA5123d29ccf75fdb95c71d5428510279fd9ba0af57b001b89d15fb99df16cebdeb67bf5cbfe299d7245ac2e58bfe127134df94c425cd0b9575a429631e4610eb5cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091c3e71c3794db575abad28e37a21dd
SHA132153b5312c4f094a61791c2fee5b7f8ab068dfe
SHA2566864ffafff55974157eabd93fb87587c49c3477cdbb8c0728f520cbbb7a6d8ef
SHA51296a47e6df144a3d806b309143dc84fcc0f519e1f2f82a708658e3e5f7a4dd13ae2767d525d16be422b9e6c36dd22c186f73a2a578d8f0f84e602e3ed2e61acf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da02aa215e79759c4839412a21c4d7a3
SHA199f63a2315e697101c12e09539db9c3481860a96
SHA256cfd97eec4181b3a7fe0eaf07926428d8aa28ba12b0ec6ec22ba40194e9d22be3
SHA512fb62064438f9a7ff68632f0780de8b64057f2ccfd5dfbf44f0b547c6cf25dce6f49f361604c14e035240ff49bccd722915b29357fea245a570a91ac25a126a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb61d433cae0a4faf3696d9d0316fdd
SHA1e3b0f2c6d0919516ff516995fc7862d56be622b6
SHA25697630bcbd030d7d8b5c8053390ca646f1b9b2d0bedbaab153e98cb454fbb4666
SHA512815db21b410c25e5815aa5dc228b9ec0409fe06089ae486855524ccbdaa677c44fab046216071648a3bb96ef2c298e45234e2537ce1a9b1228a45a9b9fc0fcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dd2475258dcaca322d658827372e73
SHA1465cd9d2b205a8710fe0b166d1f5e1034cfd27c6
SHA256f4c5ab33601a77688dd75cf4328f346d6aa7b63f3828ded087db2e45eea0d6a1
SHA512ce8ce3ffa532c5dc4adf02a9abadcdcb8a68f9d1abeac96d3b590eb4f40ea4dfbfa227b0467f89c03203d3bfb9da09811b67bb3a8d521752f7edf7fd547c1619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc7be84c0a935e80b21ca675bc9ebf4
SHA183aac2d8af049576390b4009cbe14ef721bd4fde
SHA256e11c6b955dfa9473a4430e472436831ceb41495b19498e7f7b94da3b51a4eb96
SHA512281846281f07c167492df4f0c321d266a8c547fb3e07d8bf10f1bc910bebd680c0624cfa028570c9ec7a11c906e31ac9b6c8b150a5df14a8f4c0fcb0d8343e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2b7666c2aab3424f1b4e5195be7cda
SHA1a9b13fe076a57cc6e61c651a1239cd1817bc7564
SHA256d255335feae4de96a1aa5f1e01c2d5cfc9cc44c92a89c3e1eacf87f25a9e930d
SHA512f8c6eb15e160e237d22b0182ad1a1191a3be6be4f14dd84b5b687c7cfdc0834bbb100bbff20193974276aa39898983d269fe6fc368d4a2f088bab0595c02d50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca889c0b438739e4f36949f0e265974
SHA1a9b1cb5a6a456a956bde67da05ba80e9b49b1060
SHA2566a3dbf8677956657442d27fe0d4f3af3232086d29e8b71c6537d8aeb1bca2a05
SHA512f2faedc44965f4c20e1d7e3bc8c71486ff6fd6bf3a065c3becefc443a9b1a808c05205a924dcd75ae1d4cbb9616550fd8a376da9dc79c0019dea193d6c2e7bef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b