Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
e1c3f3d292e87688ba717deb7d56d4bc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1c3f3d292e87688ba717deb7d56d4bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1c3f3d292e87688ba717deb7d56d4bc_JaffaCakes118.html
-
Size
23KB
-
MD5
e1c3f3d292e87688ba717deb7d56d4bc
-
SHA1
d291c545da5d95ca3a441179236b3ec0ae86d528
-
SHA256
2a04f93a7d8be1489d9abb4ef7e42479636ccf0b4f158ba0cae12ea34b8b7da3
-
SHA512
e71ba41defb5f174f2aa5c92a194e7b9517a0be1e70f6edd287860ca3737c9b4599cfdce30b2b7dd855666c610659fa34750c637fecfa404fa3bda1cbf175e8b
-
SSDEEP
192:uwHnb5nRinQjxn5Q/EnQienNnGnQOkEntYWnQTbnFnQ+GLnLnQtLqMBHqnYnQ7tW:zQ/xGM9D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C987821-7321-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8097c5f22d07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432539019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000004e0fd391e0711c72e408a9ff29fde6237d5791ebbad1a39980ef95f1fc985001000000000e80000000020000200000008b480ac022fac03b0e4676695cd8798c6fa312da1d4678e7c1ae9ea39c8e781090000000f67ed6530f823ffc5f85789f4c4ba56b18ded5803901a13eb88ac27e933169603ace727681fd40f784108f50382ec898f5fdcdc9fc314cb10994980b7209729e63578d269e1e5745485c9a21fab4938e3bd5712e4066acbef1cfda9e3e8e41c6139668fc39e56e9058d7e577c122d999acf2f1ce47829d84306ad2f41c18bd2697a3f44806c7ba6899b37a2c316afba440000000ebde8b83a8d9281767d4d629bc101b195513352cb8cf4ec9d80ca668d7f9d6ef04f0bf7fe1c4c68d615b27e14e82a363e5f68924721c4ffd6f8535de2ca19d17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000338a6e5a00aef3ab4da7662075828f980edd0af2415b9c8cfccab956b891baef000000000e80000000020000200000006149b3c16b9caefc756b52fc9900e92651b3e53044f06df2dee1dafd024eb2bc20000000b5fda82183ab82a0995f2f5e21b9e58e6384177aa1fd33afd2c672e469c014de400000002e484a5f5c7347c370e7aaa722b865df53401c2bb5b21ee30b21bc67535da4f78ff4b87e668c439793ac3780fbf895345ed63fc39b87a7dc4fa254cfe4cae1e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 764 iexplore.exe 764 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 764 wrote to memory of 2392 764 iexplore.exe 30 PID 764 wrote to memory of 2392 764 iexplore.exe 30 PID 764 wrote to memory of 2392 764 iexplore.exe 30 PID 764 wrote to memory of 2392 764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1c3f3d292e87688ba717deb7d56d4bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b589e9262574d6bff078fcee5b48fd
SHA109dbc6290d1ea82d6aed9984cf598a47c6e10a57
SHA2568de64bdeea794dbca45a09af19611b02d7960d9dc0fda682810e8d558d2d3a55
SHA51292fbacedce0f8c2775d03ae4c4230f388adf17bd23edf164d79179ca2a9ddddcd923b08d0d02833fb18b0d85737dd07197a3c5bfaf06d6e792b9dd957a45ee63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2413d1af60f44fb3ce4b6a027e26077
SHA10ffd1aa6efbb2fb9838d8d7b6503996491038df5
SHA256bb824105903f0523b36002affca51da00a604e04ec46ea986a0d8000af2ab58a
SHA512caa41189a0031a92f24c90b91c22387300b6033ad3e3df41a3e315a6eb46a62ec8c2829b71499028cca8512a4636783b160e7d405f6b5c19d7dfcecc80be59d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7165ce79cdbd6eb5832511e6667761e
SHA15e85a3a0cd88d881155e367d8ff51aa280fe6a12
SHA256c44caee3237962e6397dda7669e077fb9db745dcc4bcd4f12ad2012381ca6931
SHA512d27b1ec5b6a3dc15130a325fee2280f0becbea1e4d067d890f5288f66b9e618f01ef37fc4515e230097d318481f59343c7d03b67dfdae6d32f8c9d207eec16e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cde37ba5559b55640a3e78d67be0292
SHA1bde9fb5484b72e452783cd2313ff7ff9184f88f6
SHA25630c60083d85337be9c2a939fd0eac92db662782497210d989b87c5e71ec787f2
SHA512583b1cf520a6c266259adcdf71e994c45ee10c2619e87f258a84afeb7932564c6e547522dfbb005fb7f8cc2c91369e7cd1934f4859c634550ba82ea8b73fb97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b09fdc8a00d70af284717c3c7ec4156
SHA1018c0d2aa9d3c66e22079cb84a3dc0c5cd29eb38
SHA25604641a0f236803eb5edcf80d329db797041ef754ab85a5111894b0a41b55b8c9
SHA5129c00e63de90f830f85a6ee56f2f6f9c95d5192dcc29e94340ad6b3fbb6a14b409531abb56a4b6b684e71ee8cacd2593ed803ddb539e3a2a91f60ad40d1e9b4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a7763418ce6c1be5d33a0fa6fc77ef4
SHA1f5e7428757cf4cf8d694df8a71ca6c242d143539
SHA256836bf5356093d99256bc7c1530aa56942531b236a373260b2c89f2e82df859ef
SHA512ad4c38412b7f7b0e47c0fd5d50c68c0d21f3f38cbe13348d3371410733653fbf1982eac3077eecb9f2f4149e1f25b5ede3ddfd7e3e04151ace1d306a5f7d1eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ee28610cabfc8a4945921e4d03a492
SHA1468f35c5e3347e254b0a025765ffc4dbb764dc57
SHA256b0e988eb6b5137318a70f623602af87ef5a190fd77e2e9c1f8d10e655858e981
SHA512cd94bfa2c7d7ce8e2864e784b124ce07de9a5724268b9e320a4139ab42af73c33367d0f788ca1f6fe54eef65054ee0fa358d2fb5e5e26ef89af0c8a40a42ecb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ada2d91a85d857a3de3a2b7188a90d
SHA1a584380c410c06e34ab09588fea1b7cabf0df5ab
SHA2565678e565547257e25d14fa985af69b2c2d987dd4b53be91d5cdd854f75e9443b
SHA51299445129510c7212ce67ee9d219a669475dd5b5a3861a31094f9ea474a2a206a40d156f1c6c4208a4190a467f6dd0207f9aabc0122e48fc545d8957fcddefeb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbe798bb1560336b531a47efb2fd170
SHA1f7acb3c96d98d23bcaf00e4061acd69407903522
SHA25648790ecc9e63ee2446bd0473b89f682ff126cecaa9adff6103f66fa4ff2ba16b
SHA51238ed68933ba70c74708b93efa3d8e4eecd9621be4e4783b2695a1058c36bf90e986fcdc0ffcd5176f4ed28b90989ce999f8019f6fa1aae2c5bc119c33bfe3c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cf48d5020074623c829371e96b9a04
SHA133839d7019b04768ab1df1830b2bb5aefa54eb92
SHA256635937c6579826a15a6db36dc6b0b904597e346f30eb453e93fb03ecd115dd4e
SHA51203bb148172b2d6426e8124217c56bdf98f607159efa345d317dae182b13353b5efd8552384d77caaf0e9f26095ab2b95fdd033a61ed44f0432825fa902f89ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6926aec100dce9e294939dac0b737f
SHA1d0af3bd8ca838f4ae1498c60042c606bcc592497
SHA256fc12ad1aa26e8bd1bf0cf1c5b8014a92a8ae585380d1df22ee200c849529be01
SHA512d0d76d85a573d08f8b28189d188ccea26082313b80bb20acc4a87b2b2da8788ce3731ecea5875ff873bcbb80f4d6c2353dc06be7a46454d7cc948b2ca5a18421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce0716c4951ae3a1d8d55cbf81e10b2
SHA1450f34d838fe9beeb018b70209fbecc0fe29d22d
SHA256eac9197d23a50385cb6db1bf956e65f4a1769412949dca29a89a09f99af99019
SHA512aa5d0c77f04e7b908fe073e2f544cf0d0dc7193838f555a7247a84f420e60629cfc18f077d73e81861ca6d0dd862d091246c9d0563f89957cd722a027a91d610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56283e2d364e536f921568cdf1704ea9c
SHA1cc89f1a0ffe5baeb1daa81bf975c89fa2bd6248d
SHA2566a9317dc721244a7baf92667c07b3ae775125610f1d6cda3361fe77d9ba8d5cc
SHA51247aceef518f527385dd5bb8fc2a5817e15d860c6bbf2330b7138aa0efb0f259dde82b114f5829940a1ab7a70fca515d129808fea3ac1e26f7e617a0958c449da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4eba9e2162d137e8263016c7738251d
SHA1564c3ed0253ffb279b4a8a3389369f000103aa16
SHA2569f695db5fc408b5338fa06158b61c20584d95e5df01e94688c914bbab2ddeb78
SHA51211546afb9d551b0b06d7baa98df0e5073dda5d683822bcbe65818b7b1d4316394aac189b460f1612b62b6b30e0804fe45bb001136ef2390130b6c9352e10d7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ded894e403b1070305ef1b70629c6f
SHA16b7c61abbdb11dbcb853495a125dd8f7cced2f78
SHA256f648e607e5f4e5866b8176cbe68b3f6e978e301f16c5729a7d417fa7cb45ade8
SHA5124b6a5c85eba6013a6e18e55d7684c101402bfda54d0bd2cbe7759e87d7c9ef0b86d4f1c6a8ffd2394849b537afcee8e6afa2f08c7f2bd6c7372f10bcbbb65950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c97c4f78bc34c6c5c9072fcbbc3a7c
SHA1fe6d156876a8bda4dfae1469114f281d6edd8fbf
SHA2560e69b8d85db4073ec9fc16417e4b14a8b0f6a9e0dc12c6f00548116c4c4db5fb
SHA512117b5485eaaaa57eb01c624046040b2a0cd2d40bf494d8e27342e8f0d5f990eb884f055784bbdb740d0becc53a3afe61d65a021e9f2068e3532146930070073d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5e699f6b379eac2f5781746fc2ea32
SHA18bb111f65231ad5e7e35da8d5e10498d149c40fc
SHA2564abbfa09bd6a7168f7d0a5688f68d51608db590eb93b2ce5eea4c6f1912dfefb
SHA51276694614897b649ffc1bdaa4c298333f474bcd7d60999bf25ee1a7c16d903ba42bc8eb395c918d2992056f48e695236a9140684675194fd94a871bbe39ab4541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb23b4edca44b303dcf877cd7eb5cb9
SHA1939dd54967b8adcfccb7e746e0e91a6e08e11eb4
SHA2569618a5044cdbd11d17882c84edd1ab1151719faf8c4c7f1d68ab7277fe3719ac
SHA512b7321a4225fe373d03a5b7ed761b821ce004888d5690bed2285341b792167729458c924bcd8d24b6f6da94a24d66c1222977ceeb948ea0a2f9c7d4d3475e61ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4bd3ceb5e48388f9c51c277797da696
SHA1ad8bd697e4b4cb52a89395f3ee4981824d934842
SHA256f1fbe94dd9e75ca3c62768e64cfc81c2f9b1962c2ce024cf2ff051a0a3b6d32c
SHA5129a0db7d5e034ae781d9ac46b545710e6831fa0276c57cc405c5385314b0e8fd38aead3de9b9cd4acf5208bc227976e7aba9db92d5fb663d4c31f0bc51ad620cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b