Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
e09520daa9c0f90ead8d5efbbf7f7ecb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e09520daa9c0f90ead8d5efbbf7f7ecb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e09520daa9c0f90ead8d5efbbf7f7ecb_JaffaCakes118.html
-
Size
214KB
-
MD5
e09520daa9c0f90ead8d5efbbf7f7ecb
-
SHA1
8db60cffa94d7aa19d35f45fafd0d8c423adceab
-
SHA256
39adaf47a7057c3d5e8b097de58b2077de417d7df6048a6bf5a18acef3c68dab
-
SHA512
19db5f8b4ff3e39ab07e4aa304ee7f128f8189f6632411fabc09307f1c7511ca456ec9e083a618159cff52c9c08c6deeb6093a7454b38a1eaa182fdf67af05f8
-
SSDEEP
3072:brhB9CyHxX7Be7iAvtLPbAwuBNKifXTJb:vz9VxLY7iAVLTBQJlb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A077261-72B7-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0006a2dc406db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000241825a147de2c3bd993991f3a2c3888ad857c90a99318bf807bfbc9b4c09861000000000e80000000020000200000000113b13017e8027705214eadf1c8a854466a9e2daae78375916bd2ba1ad5c4209000000078a6313bcd79eb37f1bedc26125ac10dc0d9798d2eb9374a4db3a703502ce32e9b9cf85b2bc9e290a177d8ce2a225c795301e4d39c204d1502f6e645ab7f6a126419204c9a0917a15fb8a0bc8136ada53af5f63a02fffbc8abe71b4807482c7ae13865e272c8fc2cda632ab8c3bc4cea2547a996d53b9741515cd35a63189629f8aaa568a6178c38efed2a0966838e9a400000006191d48dcdae0bb6b099e8fc418f7935807f5b7b49627b8a89a6e78c523d73607b008e382b00bc91f9f7b21ad7643ef93a37fc6db034dc2b168bf5ba8c689741 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432493488" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000008f8988d88fea895088f3aba5620126174bf3b3158e7d84e2aabfa27ec43b8c000000000e8000000002000020000000f20ebe40331f235f5cd6bf671e89243c5c50034ac54fe652b07d5286fac0e9b92000000056e4b9e73b53289e5429a14c37ba3de2568dc770a1df878dfa8239ccf0aebecc40000000a4a79577f9ccfaba52eaaafca7585c915de7274349d43b9129b9725fc5868ca8e0cba206e51566951d1fcc798b92448a22927748a8e35d142a776fe0d365f777 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2384 2760 iexplore.exe 30 PID 2760 wrote to memory of 2384 2760 iexplore.exe 30 PID 2760 wrote to memory of 2384 2760 iexplore.exe 30 PID 2760 wrote to memory of 2384 2760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e09520daa9c0f90ead8d5efbbf7f7ecb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b0cdfe9c77abdeac20b2fb2972abce
SHA16107ba1e5f7c7847cc34a7fdf926864d1d1cd18f
SHA256774e65d9b8f14e027618f0a57c592a91c6a76bb9b20b33bc404e2108281eb08b
SHA51262114d04c21a8f904edf998df1ba8967245c1189856fb402e35235ba338e26709cfb7125da89b2eef6f598873191abaf679534bdec9b6aeffdae296fa679ddd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd7d90444f90cbf623e892f8bf2d841
SHA1005d8202b8ce5dc72b4a08b7ef7a142bdeaf66bf
SHA256db40d6e16e5a0302e04cb30db022ca1b2861d84bb88eee2e3f9bb0b90e9d50ae
SHA51267528bd1e80532e59a987df5b3c6fa401e3566eab8af4a35fa8bbc758fb41ab3876a359044d5325f920065230f24ba68225681c3672cf0b40afe7d6bb95181bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501564ba77c3ca60f8c1de32e9c94faa3
SHA1f59259336aaf20f25ab0a263d0543f7c24bf3138
SHA256a53d3334bd067ce2344e2f8bc82c482d55039aad5fee3cabc9a6113345af0ea7
SHA512efbf1cd1b6b4a0cdab9a2588410d64f3b3fdaf4f1ce83f304217a13005d8055fac1c787f940a8761faabfdacdaaf420919b6f47e8c7fab13c8469eeba4e0da20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c0c0b4aaf1e245de3ead489574315d
SHA1d5a7718025471e1ac96fc829833514fc5afae58e
SHA25654640c8965b3ed9e1875093195a12c9cd5d6203ae2202f09d0d10a68fca03039
SHA5121337626ee5d5be2888eaf3029ebfb9d3a48e56f4ab23ccce25c7769de76bf6942e8c7c9a3c5fe1ad00a7f6787bab18651468a3e3553a070d32e6e43dcf1b5298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806f77c13b0084180fc2ea50370b4faa
SHA121828e6964d3982aceae422231995259d53d9bde
SHA256e8e77236128b60da9d6ba08bf8ca66c3c844fa73bb9eb520e3b045499d1f6c89
SHA5124658481c9a0e96eecd5fa9d9c5fbd62a269c359c239cd57ad11b084ffb5fa3b93c87ca07fd39c02b4d2f1f231f0f96e7d82aea1898ac22801c7a77090a85a8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fd57d7aac863443f1513822a784b2d
SHA1042743c527ba10b8ee7bf267c2a4cfb3c8041074
SHA25655f5957d6b9ad93233b643c3c8a2a80286db8f6abafe79d2fffb2d7065befe07
SHA51235457d99cab34af70b2be90eaae5a8b6d2601753a109271142304dd74c78ee9f22340d2611cb740ba5338c6f42242fe5704067d343c95c82053f64a7903bac4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3c64f721b64f2efb78b55bde993e67
SHA19eb27255ed17298ccca08cdc6e44ae87459d5c34
SHA256d62663d9fa4dc7659780c0e0fe2bede3b67fb52fa69bdae04f4085b04ba7ce03
SHA512973c7d97e4b43e2e1e9ff82de9b7fea7d2983ac5e3c08510e7c7c41331f7015bf4a9eb74e2dfc1f80afbbb6c17e2c09f43dfebcb16162bacde913b81529f5d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d929a821d047280ec0ceec1ff22024
SHA17da2d8419b55826dfa7e0178b3c2a45b6bd54d31
SHA2566424d9bda708f9986aba9c34d0886fe3e1c822c6337e069f739706d1fc84747e
SHA51259b317c9c4aab59bc437187010b54c824897137a75932e372565127f51c77699c9404c296a62374c200d5f4a878864507e584373e46af79169b960429bba3731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c246e4fde7b7aaaec229237b283f638d
SHA18882636824859becbfef6d6e71554d215a264632
SHA256ef05025e9d5d9d3b6506ac8cfe466b80f10faebfa82a7d5fe18ae6c3a6f27275
SHA512505e5078407bd989ef8bbfc0c0155861d4c000d779014002082e638efa449bcc74b1eb8846f7f3ea4bd7940298b91ca6fb42668ace7cec855b523bc635245b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20f3b7119c34ef80e3b681adeb55cc8
SHA1e84a5069d83bc0363eea4def4afa9946d1d30562
SHA256b2e6ceea233da556f96ffcd1d7591fea859c1da8b0b81396c5b366acc4f0317d
SHA5125872146d6bc853bdc424218090cb4c8b15c36d6f16df671568ae84b6a2308ef695f880e498cd1f27f118c749cbf9bfa63839c213b46e98385674eb1db66ad498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202bb2c2a783e39a0929b43fec9bb832
SHA120cb7d7072f1bde05572e0fa4caa822d11f6e03e
SHA25692172a648119aede9f9a2134259e45d95ecb5b9f6f98f89811d0cc98d4cc6b5f
SHA51219f66d1df6fc43cf7101704c3015daa6b254ffcad8bd263170ba9a8f3c5aefd5ac9be6b7f7c8444fa4e96460ffa38d59bfafcf509ca91d7527849d68b150c5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccc0837b39bb86770e7cbdc4cfb4a9a
SHA1125df3de825adb4b9ef1e17707983f19821464f6
SHA256af42cc2a84a5050a638d467b20d3879264204d2e7c41988c6d942eac0e8058d6
SHA512b7aa0518d27bb86257d0cb70c0a50ee18d3db4c9664e0031029b01c817b198d6a4f35554f94c4f767f87e67a400a79c6f40769590278234133ceaf6a4861f5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df89ed156a23a613ff6ade037b148fa0
SHA105a7cfff2d40521180fca73a0e2e1b1bf3bceec9
SHA25695911d2e42e155780b35bb8d6431a30aa48a5d60d3b2415f8d93d83313442621
SHA5124668c642a67dfb2eda51caddf52b8a2162b55d594a3eb66fee653c5c47546ff0872b133d9754be42986e130ae07ebd896aad6138021926ba56e24b8f8a3ed555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da3b2038352dc1c42faab1cd6932b92
SHA17afab3bfb7042629c3336b3a4e3d568294485769
SHA2561de20fbf8dc8960bbb0144f043b4c1cbff2c581c9e08bcc8c4c0b78f6a6184e0
SHA512dc750b639b94b249e737dea7953478a4fcb3f246998cc50290f678d87e54242fc6f8fd7d69d92e45bf0aa86a7b884210c5bcf1e323ac61d30c1eccf8d0fb3b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3edb3731abc0fe8eed46b89ab3e8c95
SHA1367d8ddbd3f2dbf7c5ecf706ccc7591dee99beda
SHA2568c4f0f9b1463e03e7645830e9ae1deb19979a2f2da614da492dff9fb34484570
SHA512da5425d987e203b83ee34eaa6392e0e4b1ee00cd9cd9ea31acdd67b36bbc69fa017a6c32338de64c2a05abbd8ec80c84ffe81faf4166ffa191a012db4fc3a89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58508768655f2c01134401304db96d8bb
SHA1db6f18510101b5e5280a7500b4aed87e3b567021
SHA2566aae10057e5f21c0cd18bd126e10bb8336405adb57122c35e9e9c6ab6ea46773
SHA5127d408257452f57009cfdcd9c018da0c32f8d4efdd408d4c51f819116d089b990a4495967f586b88a190de962e7309e4cc6ee710af286e9654b5ca061b5de45aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f89e85d64eb157b3bddc314304d11f
SHA19a866bd2a1032816a0d6571c50bde657b1361ccd
SHA256559f172f765d61e3ae894bf7699b76d427077f644284095ec124f6d5b18556f7
SHA5124f3b8cfc905f5fceb2fb232e9f65e39f4af3755d4b2dbc94c2805d39c0962754a1fee4be21376e8b1c1f1f3f54e9c9ae7e77e0e045e9a7f35cf4dcb262af7398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcf0b57646fd44d74d5a0f4eb0da730
SHA16a8bd46e5e179a1c8d6d9443e8d81b1e23e1981e
SHA256c6ec871f8c7e0876a3292d2c3e02047493a4ba95bea50169b5dfcf51553a4cce
SHA51224a27ad5b2db61e7fc6b52a20a29e893c5e52cfda77b67172c9c2bf1c1f7762e5d2ce8d98302076c49e9492fd0ff6b549304d57ccf543939ea6bbace67bf9131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f5a5c343c2078a968bb93454723786
SHA119f2317af95ad6173a903b657cb2138a5b5e9ed8
SHA2566e79e67c05abb8061d01d1f3f7f4ceff0cf94ba0bd184dd57b37849e0b558546
SHA51270d736763c698f61b83a984b5b414540260e25ef88f22518c85d05b1e9839bfe956fd8f378f61a17f6c2a6e72ec6874d4f8d25e7912f05c366c64d7dc9060f75
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b