Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
e10ce775c673d2900f2cc41a4c015daf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e10ce775c673d2900f2cc41a4c015daf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e10ce775c673d2900f2cc41a4c015daf_JaffaCakes118.html
-
Size
39KB
-
MD5
e10ce775c673d2900f2cc41a4c015daf
-
SHA1
c48829b8ecb6c72b7ed9213d543323b506630272
-
SHA256
2c329c4776597078f98cd33f212fc9b9270dcd11e1b3a3561442b6351ab4808e
-
SHA512
491ee44e336e85e73d5065aa3690d8893249028954c49009585b4009c333e73eac74badaa9cca2abfecff56c3e45a6172b0af67a55fb55c34f9a707e9c9bb619
-
SSDEEP
192:uwPmb5nHsZnQjxn5Q/XnQie2Nn1nQOkEnthZnQTbn1nQmSWxKzahdXuY9posk0i7:DKQ/AXx42dCYIJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432510432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b209493c8102d04c9f6adffc9671f68aaf34482725a06d294996867e5048cd76000000000e800000000200002000000096a28cd455d28637b5a2c9420a32f3d17104b430c32fc1695ef5fff887d487d620000000903b82af7391a6115096153b988cfcbf6e316965e45506adbb50c10cd4375b744000000097f93186f21064abf93ae0028e8d749939d2a2ba0e83e8c6d9cc6abfd13cdfbf1e8669366513308bab2452c04ca5e90ae5b5d6f6da6af12d2c8f36f8be92b100 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404f2a63eb06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CD452F1-72DE-11EF-AA3C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000bc2ee8d4bc93ceadf26091c4122e69e14c4499eae8e2b42911ab84499c549509000000000e800000000200002000000077e7a724a7264a5bb20d2f028918dd83d08eae7af65f7e81d997f4cb20c4f06b90000000ba250b371cb17f4b6bb885f9093b16d274c38591f8152053c3fbc3aea1da7eed25aca80fef5bd67b2e0347a89591ca2936fc5c9b3a0c64528129570a586954a6ee1efed97d585fa9d49072a710938ebf967c896132341b45e369a90ca4604ad0600d71f0ad7cd5d2028178586d41ac1c2b3ce110decde1623f211a7fbad5e55334032c40e63c0f9cf16837d067cb20b6400000006bd565250ceabfeb7afcb94920817b5ce88acf23192b0939b64e919900e28e0ca878091e94f9e74165a4198df6cdff3228d2730e62124a9fb5a640e86b6df3f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2316 1644 iexplore.exe 31 PID 1644 wrote to memory of 2316 1644 iexplore.exe 31 PID 1644 wrote to memory of 2316 1644 iexplore.exe 31 PID 1644 wrote to memory of 2316 1644 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e10ce775c673d2900f2cc41a4c015daf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540be6acc0578e29c0172d219f62ba29b
SHA174f9c00bbff744c2d7ea1cca44061c06863a8afc
SHA256296a28be23bce0d3c1058287bf787d66b35aa972431aeca050292312bbe9bd63
SHA5123d54de87f5c420eb2d5e2fb0499c763a253b7059637a89771ff09d041df1590a3d01f25a85714761a06b66cc1e36082c08cc69b43b2706775c86265035342cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577884a1859c59e08fd0bd81b45627c20
SHA1ff65f794ee3b4f59b231311c61e6a3cbab9a3d2e
SHA2567a17c0b32410786ddf27104f4415a36f0bcc64c2751ef5ef315542c0f21d246d
SHA512aa65ae4e5c176c8a9b1f0a0f97417dee759bb4fb85dba36686c18ff1b5ef516bf77557ea9bd521ff945a9590c5d6483a58bad51dfc49f0003e64923843c87848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53280b0092a8468bcf3c8a8f029257a7a
SHA1de7672e043b1453f4827dedf0ac07ebed9c9fce4
SHA25612b3b1430c02388ebec2bec159c205eabe41afb688c1695a2d7f36af657cbe57
SHA5123f5be185d7dc192983b9dc6a19efc62c48602fb10f5c1e2b874e00d46fc8c4dac29e2ecbac2804e6b386065844f554da24784038c7cff6d496af8100845ee793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d3fdc26e2a73b2fdbaccc50a4c5339
SHA102e9d1b2c2dc27978153a5b5d463d99c7db4de77
SHA256b0813717b9f7a5e2e96be821b2d4a2558cbb4d22677ee040baba4b3a2246609d
SHA512bfda7e9d6661ad5f83c73dbf86d33f5a1adef4abfbe404a221e1718e577148f21c62c60a90ef6ca0c50e5ffc8349c9ef2f8659784a0b3ee1d72cfe898be8d09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed7bd56de80c84859275f88314eee9e
SHA10d67b4c16d2de72299b7c18e32fb50f3c1e33ea3
SHA2568551a39e0e712636a96daa80ca3653df1064a01f3b97a020cb28f52a5d751f8a
SHA51260040f4f86ec2cc8c3362484e7d2bd047e23c6a57f673f8e5017eaf6c92b403854805337512ec682dbc67fc52d649da10d41c256b18d3cbb59dd8713b6c4002a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a35905fc0a209c8ea122d7e9edae7708
SHA17e70299d4c1f0e957fa06db0c26dccebe454f1bb
SHA25621056cbd656ab5043db5069a79445773d0abbfe3ad0ede2f4fa075a26957913c
SHA51241383b2fcb6f17aa7939719a3f9afebf7597509644521540441540cd9710e71eafc796d2ae0db1551a71d9d01bbdbc8d37519ab22b88f99011ef918a226a7f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41ff91c1add53600c3fd4ba44a2072d
SHA1074a8238bb888fdd402fb244356f494fbeae25e1
SHA256e5e58b1619bf477e83504f765d522f8c9d8657da33bfdd84b19d821310c9f2a1
SHA512015ad1b0845c18ef775f9276ffdb7655eda7f43441c39a17ec0381c694f3e8d80d879493e4b86e236b414504136b677ea11753e497af57d496480af74c4b7455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590edfc4105489559b811655196611bea
SHA11bec55760aa69914d09bdff3be043962c7b07242
SHA2563a8297acca108061cee96f8ca6acf5963a0bcdb2fc9dea6eaab264af42509a16
SHA512f21d685dce1e3d122415d26fafe9ce8b2ea37eb96f2c88bcccf1af212f33a400e81a456f81fe04bdbd6c03c121c360edc5c93fde4ddf78bfe801c74437a08814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3107aa25d2854adb523d38e2a9ff11d
SHA16ca40a539b63d4822c62e366b5ea223572fa6656
SHA256d019d0137932a0fe0ed417afc43e292740d2dc4f6a16cf4b8b29a88f9af7d311
SHA512783336811e4ffacfbdb5530e8ae5b57624b8aacb9522115521a2e1b75ec8ef7ebaa10b0904dd6902c5b3e8d715f320987d9f6753d70cc4505e4509f0c6010ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56253b735950885c9a2e4bfd086280ad1
SHA1b57aa9c8a2beead413ef3a48539f14c9b21dd84f
SHA256f7ca59bd81e52a7717fd445296fdb63d5bd7b1284e383a28b87892a3161d6499
SHA512b1c557725162a879654db4caa923353a562afa4df3dd03c2be306ab5a5d25f9ea06aa0978b4cf1d682f48555eab8ecf6fe26400c17876f27c121f7ed51cf4089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5140140c602a1484824cf31721e6fe9
SHA1b171998a89a28e716a6fde37f9c8bcf4168501c1
SHA2566ebfea9ba6373067d798abce90a3a4b1fc365bddea1aa29a4ac1bb4059aecd7a
SHA51225c44d9119152f26537beb5c6b40e2886a0db7c96449f83e79827db988375b1748ec50e8f4c7c632ef44962fd3225bf6d4e681302c8057e317c038a0a25a0583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2a65e8439aea225fd7d58325bdd4a1
SHA106146d76ccf2cb47d6b2978f378805510808b0c4
SHA25658109706649f45e0f7ca06240de210803a802ab7eb418b598eea9db97e12528f
SHA512246f06f786211c27ae3d6489564f356dd64ba302337af3f93d18af852b4435868bf6e3a22c0ed28267ff007406f23493a8ef79028d0dc713c8ee21f47cd736dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f47d70336a835d9f3b95a4fe48c0a72
SHA188bed1768dea9ac59ff2e6ad3de38f8edea7b965
SHA2562c75e2908f82bbd0c6b6a6d2497d6d3073cfddaa4b46f5dcadebc0a98c1b738f
SHA512ad1dfe122291d01346f96a5c2747c40127e149b46ee152ffc46654128c50db865555e071e6b4e74afb129a5cefc792378022fa0b174d2138648fe3cd79f3a298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cff1eb9c9874a0c96ec3c91b386722e
SHA11f1e91a054a11922e812e41fb4721b3e69b6896c
SHA256c1ac034b5a41b31a3c05d086e4ff05750ba5ded2143e6bc0ac65bc2b7a24b3a8
SHA512b9104367d1de91a2026f3c8453e42f429eade44e08523f92b0ce4d5a7350c84eaa0ac18b8482a6fd78707b9b6621eb37289b4484decdcb8e8bd9d9b897ba1186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be246b7caa773cf146f886090c167cd
SHA1c7d0425576504b8d62716a71d9272e0d722ec9ae
SHA25649af0008cf23e4125549ee6ae5f80154fb3a4d9aabe94a1ea665d3113f578597
SHA512df1489e5c7e6078d435e65742a5714f68de1b5d0f71ee04920b5587f411c379e75b9a4795f8075a5e8cb168cff94d376f6597e16a00463328a428348b302d0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2056251e563f5c24899c0fc5a6368b
SHA1aa08452972d52db5b3c6fdbbc9e88c25b3a6478b
SHA2566bbc9c0f363e66f19cf64643cc19c1f78eb293db7448fac737000bd2c381b2b3
SHA512b132e7b81d86b2b94c5c476d1f0ff92044c600e1023815d3f8e72c415311c509618a687de9e6bc06edd11492b32815dc99262a487196dce4bb822f2ba972018a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6641e988c3ee4448df67d8dda27fb3
SHA1e81dd38c1ac79fd3463cb8ebdfe6a53c2e2a255e
SHA2569080296e44b40bb61769610ce11252c7f3ac664da038dba61706fa405fd26a2b
SHA51293bdb294f1a81cfdd143ccb150b93b4765286529684a2bd17f6b4b2d9c3a6f67939869a34861c29b2b4ba83314fbd1b22b45f21b55fafeb750da0ff39ffe1ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a6405b529f5bee6ba2dd99a80a75d8
SHA150ed1953876d50478e0c2c4b434eeca6769e72eb
SHA256c1bf8b6257930c1a34d00fa4d14ebd500265014a46cb9a38874fd40518d38601
SHA51225e69f34b81214eb6fc738bcf0b2488ab6aeb9e5cc920d4c8ffa36d27973742cd8ddac3b116ab405da26458c82d0d10856238d9054ae0e5f4f2b82bd9a0179ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c627a37a5062672dbbbaec9d63622603
SHA108801ff6a2d1ca73d2c25ef43ccca1b12e3b83cf
SHA256958f6d2ca9976878b704b3faf75c592ea0f276956c34485018ea0bf0135f68d7
SHA5120f4eb2dd6a090f7b4875b663dd923d6980b8118655aae7851c510223ab798615a22d526495e63364f270be471fc55dd17401191af5d40fdba3b80a63be3faf4a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b