Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
e189feaa09f77ce2da41a6ede98e8ec1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e189feaa09f77ce2da41a6ede98e8ec1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e189feaa09f77ce2da41a6ede98e8ec1_JaffaCakes118.html
-
Size
34KB
-
MD5
e189feaa09f77ce2da41a6ede98e8ec1
-
SHA1
a545ef679422d63addeb48d307366ff4d0430340
-
SHA256
8a1ee4d447ebf8e127c440637ed19eb4b81ae4318bf48b4822476add68431c28
-
SHA512
17990094d1530fe07b124d980e0cac497781acb5e4dbe8bbe993889c0a34659f91c556c954712f71c2475fa0deed41e1c356d7ebbb908dbc89c04fb403ef9c71
-
SSDEEP
768:rukdtgutDcJSsS+zMT/e5NgRL9LXD2+oTdMT4d8eTd5LbLVLdSYudzoOdwAZdhub:JhonF5fRBYJboaeR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001a7e3a91a404c6f0aba29b5fccceed3307d1186ee0182d3caa4e1a0f678ca792000000000e8000000002000020000000a6873fc9051cd80cea93a626d3785804b6e46f0e0997d166eb4edc9bb27717549000000040a856cde59dfa2962797120dd5cc2c287486e98d72d0595e2af75b39d6068e7d08024f8e0e245c16b16fb2c408593d7e39b2e65dedfb061e733d01b494b4c2c5b9a643ee53f8cca520746e29ad2b076d64f7d0d50f632336d0e06e69660fae686ab922f12f8e260e3256ef6b1d31a752fa087ddbca14e307e63351e8b5b45c9a7b4413eb5117d5515d9c4cdb4d1872140000000b2838d9c5ee2820019c17e1013d726fd5cf23551d1eaf7b016ff9ae9485a5c9a1a8389ee782572a85f5104281d9d81a16cc173bef06201fb7aabfd33c42cd1fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007f8d661610923892faf4179685899b1a97ec402213e3e73e36de37c7ca441ed9000000000e8000000002000020000000ce965fa6d310dceb8fecea1d8d48f2cdb0fa06679753fb66a91cc0635b5ca7ed2000000039b5da3c9f13e72c7ca8fcc0de30eb1602f7cdea1da67bd729ce6e402323d4c840000000e1d2e67dc6c2d1c2581c9ff4ef1589b7adf1134e2442ce458d828e8320e8bff7b9549588fea684b2c0d34fcd658c7461f4ce30e3757c1eded070caaa16aac6aa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b001fa021807db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CAB1211-730B-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432529598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1232 iexplore.exe 1232 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2524 1232 iexplore.exe 30 PID 1232 wrote to memory of 2524 1232 iexplore.exe 30 PID 1232 wrote to memory of 2524 1232 iexplore.exe 30 PID 1232 wrote to memory of 2524 1232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e189feaa09f77ce2da41a6ede98e8ec1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52877aa91496651049ea5349badb0c3e7
SHA18f32ae870ef95cdd1ac3826341db3c9581353fe5
SHA2566d8315dfc1a588507e55a8288fcde245b1f536df786ece59c6edda7af63d5e71
SHA512e78417da3b65a09c55a895f39043caf1545bb63e8be618eb5858156cb0a85efc978f292f197a2cc24c9e9f5d02af138dfd32c36962db9a5ded0bad88e31daf28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527cbdfc874096d0d64bd01ae8b6321b8
SHA167d092fa9b2b1bc6e8a8b77798bf94ca4bbbf68b
SHA256838a34380ccd931124eba604685d991572c576a41119d499e4ea122e12281d0e
SHA5123c883f66908a851c043c9b1cd8039ebd572178e30ce1d09d48d9cea0e4ea576f3327e438080350d38998e35222873a073128bfdb4cc1a0679ae2514e8d06e6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbbc668f98635a83ae4685eb9393408
SHA12cecc20bf3066c088a43695f45a0e09795a03ee7
SHA256758ec9862093ab5e8f64e7d50ba2f1ade2a80412515488129dbd3a7baa548d08
SHA512faf4ba1faee58ac82b12ce9065d661924d7ebb94998a011a10d9dbfe89efcf3d6b57211f8c93a88fd7c17bba68bd85c0e7c66b2f036970d450b8be21255122a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584439b91eace944c831f01ed49a2ea74
SHA135948972c6645af0eb2a781d84b2d32b3313afaa
SHA256bdc2dabafd603883da99914d0d08093941cc94b3fe17062c67190a6566ec8e39
SHA512ec585f9418ee076058f018b1b664fade0f63863c7312c69d0f58d77868f5806a365a49330a75dfc574617296fe38b6f98d29a24c0763585a304f2f6a7301b68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff446a4f93c03f7496858b3aaed6466
SHA104fe3c7abec20282e4aaaa464421916a45812c3c
SHA256cfb5de598d3db04907a1c8fa41aeebc6871314762bde661322fd0123d4fbcfef
SHA512a08d09beccf7e557786c518da1628b8d6e031e6ddaa0ad59046a1bfa41b19f66d5ef5be379842c6090c85a53547854212f0e91a3ea8d6e4a65c20c9dcd106d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cb4e03f12ad1338f50187a0173d162
SHA149967e138a03c55216456dbf8d4ee15f8e5cd94e
SHA256e9be09a96b43c19223ebeb903ce8e28e3e6e190c9c18d3d94c1f6f1e5f1ddfc2
SHA512e5ff1742ea13c7093570521249254ab808e805cbde15e8b348b149d549506dc721fc805712a5efb96669505baf3f46dcfd417e76ef973dbf41603330ebb262da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299da3ce7f4465ef7fcfdbfebb3a0a15
SHA1c001fda25772b329782781c94c1c1d82abd5e5e1
SHA256fc13bb414b47295beaa44bd5b48dec01dc8e2beb8f29308608f29d5dba605ec9
SHA512d0c5729d86124773607e8deb103e782075ac6970276314b59c7157d24d58882ecc1d1fa93f53e815f236791d469202e5ae07318083718f0e8e84a2297d2030f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fbb7be52136759ffa0b912b8798561
SHA16060d1e1e35e560d477b7373a998284a5b5a7d9f
SHA256c249fb2c40f58cbde03148fd9df65edd950e689efb5cf644b44cac3725c320bd
SHA5124c0ebb4213701c0922daf1aefa8c5840c0eac9d7df383f649162daeae32c06614cb1cdae0444f188669c8053256e0ef7db30b617c2b5bc18b3a92cba43ed9598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dad853fd28fc0364bcdc348352cdf59
SHA141e59d6771896f7d7f250fafc50c05fdc52bd557
SHA2569de377898bb592db974754a9b0f2d7fe1a9c4cb45069bbbd6a0b353c8628bae9
SHA512dc48a9e81835af2cd0208ed9c62fd4eafc61dc3e7ec2d7ff30c42276b2b6bc7dcc783c15acd9550f61eec0b78afb3afb531ebbc58c5fbe40ef8927f95ac4123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df728421c881ae93bde2b40b10f711e
SHA1e59d269219d0e3a1f88e8c0a6a175466edc1ca6e
SHA2565232b72681a6239fcc332a23ec95abb103b52505573f980168cf3b2ca282b45b
SHA512f5fccfb896cc8e3fd831021e7a8666ed0249549828f88a56298ae74ac77e14a1d73374fdf5de902e24787c7fd657ad2d346fd0a809c093db36c3e053db865db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133aaef63efecc6f8571dcbc916476c8
SHA1b4bf9a53e140ccd108d91b072f5eb9833355a33a
SHA2563e9362f1c75ebdd6b3920ab9afbfe3a5db2a45666b50bfcb67af91d33fa2dadd
SHA512361108dc74d5ccf3902b10e1c70d103040bc41422bfb7b5e9835625d0465b593f08409e7eb392e531a5040428e5834c5a79f28c78f08755d69c417e0b946319c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e4dadd591dd65a629aa85c7dd72797
SHA145ba4f3a1bee1915dbec640101669cf1f9b11ed6
SHA256c250c41d74c76a5e7e6cec559004a5ed25a828de3cdbedf52ed5303103a91f1e
SHA5126cbd17061d5d24f46984db1d63a9de1e27f78e4be5771dd1f5e14237a2d607ebf16b657800c46d099b4fb3e849acc2dcb8977b2e412effd13ba9676b29116bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1d0dad30e208a4a24b2d7cc3d49fe2
SHA1fd7324827e9933f410d4cf531a6eeb4238354d5a
SHA256b6a6b6c9d85d61712681d6d301e7b4ee18c01e59306fe52f31943db2aa2b0383
SHA512b33e7d9f3de36a8d842c4fe57d2fbbbec3a773bffb10ec709c7df2dc5b20cddeb0c40981dbc637fcaa5ac87583ede9b387a8a5d609ee34d2300ec858bff382c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de0a2165c7e77ab30b00dfc1515ce2a
SHA1ff713bdf7feff207a3013e3beb459a2b7c66a41c
SHA256d55dd4c23fb58c8e768e677321c0e39976862e865034dcdfefa4aa8275c2b311
SHA5125530f2370174ff4c810464c9d330237ea0c8abce0d41aee865bbcb0e5b535ea2085d2b2fa08463d67fa7430810cc7d2d8d7f88f02a94baef35d38832de6d7ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c87ec9bd0b036172b9f11f4af9ab5cd
SHA1e9482279408864889c2c18a6e8d5706dc7dbcf2d
SHA2566f7fa672ced66fda096a6efe80b8820a5e173b7cc61f5be154e29c7e5a61a16a
SHA512f45b28cf296f43f17f1ba597df99f7e447121b2e0d8e696a97c9714d654ee8271a5e042c2ceae468f6361604d1e5466f2dff18432c7f35fe75d46f79205a29e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8f89127885838f7677d515ffe21eb4
SHA1f864209cb4bbaed026b2718fad337f46795594c5
SHA2567398591ee15fe7f8c2702a64f7dc882eb6ea30dd5b135ae5286b335bb96b1aab
SHA51272a6086ce396bb6918c99d67381d2d144aeac38cea9e4e94701c1fa08288ef60af27d68c195d68ed81edbed82849ff0b3fa0aee52c42f211245cdcd7a887d3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad03fb60af99af7bf1886cea4cd91b5
SHA187cb70514f5ba56282663fca07f4e447cf046b97
SHA2567774bf2ba4803f733f781bb77f1ab19611d1f0834447b86b8d0976fed43e9ee6
SHA512bf1f7a50dbecd9534fbb84a701f5ebbc2850f76d7e684b9f24f440ec390169adc20ef93805c87a7713185b07284857e0ce509570d470281b87633ea836ec765c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff6be0c4e0cd8cf83be2940878dfae6
SHA1ada70f00243e402939167a0b06f88694825bef33
SHA256a46c35cb2dc6176030e58bd0c5c381754fa048353c1e4996eff8de998607f6c1
SHA512d9b82d1f679d5c6ef1e31291721d7901127868962db6bd9ed092c00d264b21d95a71f1cf4494a2b083df2f573f48dfa406d384b8e8baf21ba31ea96c397dd4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb708a1fbc3325ceff4438900702863
SHA196be9bf794593a4ce4a59cdff1430b2ad4b7bd43
SHA256ab614a04294b0c8188a1bf1356cd174fd89f52ed1fe8cef07617de0e0b537c1d
SHA512941515b82cf669d60bb7f18419fdc4bf51bf9ee0974d2f3e2061395f80918dbeba7f5d4f0e7a0b4135d05e0045dacfd5fe8ecd2b66571f653fe7752f5b8521fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b