Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
ea8713f4c4125b551056d3117f9a1352_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea8713f4c4125b551056d3117f9a1352_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8713f4c4125b551056d3117f9a1352_JaffaCakes118.html
-
Size
23KB
-
MD5
ea8713f4c4125b551056d3117f9a1352
-
SHA1
7935caad14957ca3bb1ab4d37449ccfdc29b471f
-
SHA256
e3d6fcd9e453535e32959647403be56f137d666bad2491bf089884580766404d
-
SHA512
3e647728acf7b0e26c3e2035c8be5928831878e6a7b4b04870d328fb6b580c158705de78ed5a38878df2dbfbe3c12ae926b755da8f1d8381fafb6a24f2c79d21
-
SSDEEP
192:uw3Mb5nmOnQjxn5Q/9nQie4Nn2Q5nQOkEntzDnQTbnRnQPGLnLnQtGqMBYqnYnQ/:jQ/sQ7G3iA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f30d0092042d114e75f6f5e04ada23ef302229b53757fd86ac63fd23d89d3f4a000000000e80000000020000200000009bcdb7c077b1ff3f42a1274898e371692e1a5e649b3a8e9a568eb0ebeb340019200000007422f1e301356653441c606d002244dc5da4d9fbfa52a2f90e6c7df34794610a400000000fb0af6b8a57fd7596e3d84d7d105537f2afd75fad5b856238d71b430eb9c84625732a896c3b2c7fd0f3f77c702c2d6b2aa6822138694318758f6d419974e69d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000aa9683da2f153ec5223b29806f4be81dda36034a312f423d2f2dc0b8a18f2f1f000000000e8000000002000020000000df0114312daec7a7bd1288b7d2fdb8f3b66090836d7241f9cfc3a710ccfe931f9000000078e07dd55860f0199ff856c9b6d1d439fe70d5018d4db5e50cf5502b5f4850244f5dab602ae84ee2e7e781315b142ad46bf0d3c330ca31bb7dc39d2ce1b79e3ff6301e21a1c16fb85cb49ade846e4520356811a343720649897eab6893bc6343100ccca5c3d8644738c51b9f44bb18f834496d19243d0416eed5ab8b26e2fdccecd693518776a8c8ec60d667cb941f32400000008f1690b056de4be26723b78b3737210d4bf379bd919e067cd6942c12b5c559706d3b774922e2def2822cc7feae0844c5b720ddd6e7f2f7059ebbf75158f343d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5BCBBC1-7639-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879491" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d65aaa460adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2680 1900 iexplore.exe 30 PID 1900 wrote to memory of 2680 1900 iexplore.exe 30 PID 1900 wrote to memory of 2680 1900 iexplore.exe 30 PID 1900 wrote to memory of 2680 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8713f4c4125b551056d3117f9a1352_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54affbdf77fe9910090f61960e229cf34
SHA179cd888b7419ee03fdf562f3c25826b0bbfd7faa
SHA25611ca6cdd80827dd984b4262bfc321c3684086393d8a6cf1e7955c56a47211664
SHA5124be86d9478e71efe8dfdc3d3c7764752cbe7851010ccd6336f1182a49bfcfa0e6f7e82f466832e6c81894fcf6f40692149227aa23df9960e9c30a4d1e430169e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb05b97422a34a18c6fbe6b538bcf57
SHA19ad3ed55d0bdef4a06956a6d4b77714204e30bc8
SHA256042c029b1792aff34c6399e501ed086ef27cbc17c7e98ed37c06ae24d7e48526
SHA5126b03558524e1042a99444304304bc520b7eb721dcdd46c83aab2fb18d1442741ca44749182728c039330668357ee567f5689424319e3c6791518e0d83ba5216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582be4b96a83e50aa96befdd5531f2b4b
SHA1bdf30a2a2054a4d2cf1681afa7e887bbfcea57e4
SHA256296810464d769c753ba5722a592c01f688959776bcbb9e93bda9a0eddaf844c9
SHA51298c867a04913a96d623525c9a06da5461f8c7a71eee2561889389c9045e20f510cdd20196a2ca72bc3511b5fc2bcad90316e76ed57458057529147873b28fc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1dea98dcfa3ac02c012069680110aa6
SHA1ccc7d1aa0cad84bacbce08c93766a39c3f8f4a46
SHA256d290a542c4ca3147b50dfd06f929933a06acd5575a85079986b5e198ce91c424
SHA512f6fe4854174050b52810ccb690e8d71ea1f681ce77502d435aa084d160d0615a2df4f05ebbf3f36b3e4590acad6c2f62400a1c682567f9aad0b9b539e7ece480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528945a8b5d278907b51f8fbf4d071d1d
SHA157c73ddd1e413f5e16751c3adccaab932fe0139b
SHA2569937eb00a1e1feb22680ce1eb6161bfe721db4efb550bcbf0ae69482584cd34d
SHA51240f983d6399dcee7561e8fb72c450827bccf2a04284a75b5d505d0cb5c66ec98d8b54e2d2c44739a00ec8cb98aabbca8b9eb24672812b2f160b410d2078725d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5e176a16a97e73486348acfc03bc93
SHA1eb6d2a8efe58be6c05cf32478e0034840a18bdd3
SHA256d34ee58129dff74ea93e9bef9c2b324f9f1ca1c919ce383ed20c0636a5623a72
SHA512866d3553ecc9a601b2c8ec5811842216806125f3941c6725ab244c12e720702921435c722691ef7efbcaad55dfa55aae964828fa826feff8006b64edf6254c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd921e4d569b5c6c24aeecf759afda1c
SHA1bbedbf849b31c0cbc35bfd01a608d1803ea65685
SHA256e9b8bcb157ae130be483b01bf994f6b7ae54dac619c41d95c449fb5d6b2ede48
SHA512107cc4c43cf98d7b87768d86064e4c2fa6235d07c47400dc7952e72bd317f49454c025a3b9fa0fe2be852c654850eb9a09b3b27427c14ce42d44bc505fb14159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599213253f5092a6d9ba5b066f9ca95c5
SHA1975b777b489a079818291f053b7bd645b2d35843
SHA25631a2f8328ead388a3cbfad50624cdfc16b6707634e74029a292edecbd9505260
SHA5127339d2ed834ef50a5fcf92e77b43f0526e1b9d215f41ce889bac3d100d84b425a2f1ffb0123c41d5996db46fe5b5151adca25c298437e8b47e8f6f98e64cadfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc388cd560e20b1a8b69be604fdef68
SHA108d369237aa80a8f3fa68738623866d885374d87
SHA256c4a2c2bba468b04683d6d3419a8e46b9ab9a195e06a4454bcceab801f76bf966
SHA5128aa2f36cb6d918a307da1ee55d6f2c3ccdfa902ab0aabdfc381af63d0c1c0aaa24e1c54abade03e9ec68dea629591c22712d48e12eef2fb97191f6aa8ae41d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1bf14b89d88e41ac9fc4ea54a96858
SHA14080ebff54e7faaa7ed81e41944ec586555fb6cf
SHA256c308d3b9a504dca5d6094094f843b6b5b1f835cef44dfe6e75f9799b94940048
SHA51212368234b4d351fd6e09f81d08346ffca5274cc73230ef96fbaaf8bbc7f54f43f28a8e2e4548201afd4f1b1a545b117ba619829aef39bc5bba87e6f5ca626131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abde236bd33927c5effb4a7a98b8ff3a
SHA173489c8c78dbba693473b7f973a9994befa279cd
SHA256f87238bd9ba8f1814d3b80e11e1154e8f9a5a7d3d6dfbf139b3c5fe3e967aaf9
SHA512d82009e026c72c93203ee37edaee2b50c3677e97bd653f83205c05bfd5936ffe4c24ead5ec2f81238e98ace036af7f00b65855845d55b09e353a32c9b93bfe35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573181e3fdb57566ec50bfc381abe9c5
SHA1fbff08ab7339a0e5f1c514b2f97bd4b3673507fe
SHA25687ac36e97baa01c00f681eb26bee6f8fcabc8b2b9c7815ef3384189443731b04
SHA5123abd783d1be67db6e9354d734ff73394cfa0fa458308364ac7a061054a5ee5cb912cbbf46f13fa98b917ce43ef37fc6437aa4d31958736428396af65b77a75c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b107e151ef14186124400c918ed900e
SHA1918fffc45f39b45db0d68889257625a02fb94779
SHA256f74225f72afb47cc427006e79766adcab5e7dbe634a02485e7e4ed4e74d65cb0
SHA512866317c4217a83622d02e25a63089fbffb23275845e4b5538e1d5d12421b5a084edd69e2d65416496375fa6b93a139db6cc7cc73ccf8aae85c0e2dd93ad52a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1eedb4d3a7ee0f551e02e5cf3cae3b
SHA149568f70f605c122e9340467abd665d4942950ac
SHA25682d9c8ab2064c169ca6159ddc0b9bd220ff0c9d27e08e07785039b83c3ac04d1
SHA5122fe6f9b2426564e5a868b4973b1e2c25eb96c3d0be17c53349c270edc527b66b0e837532ffc4113de8ed71e1c356c1b4ce551d75a1f08d74baf096a9da79497a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b6c2b579c2f421eae016fbbd669be0
SHA1b33538b91f89337a0d981be75352ef1020fb6620
SHA2561f4a3e47d1b272c421d766cb9ed31ed45e222d45ac219103bfcca6e6296f7eb7
SHA5125cccd8384b7f9691b281fba006c510fa65ef6516273cceebcd2d0279e9af6a46dd7f971e8d469d7e2d3e3accd6ace27659905a17d4e60b2d1b29c7092f7b934f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1943772c463e7c26617c6de5166ea0
SHA19ab7ecfa0e17a964aba680be744118553d15beeb
SHA256660d60114016f540a57e29f8ac8d721a1af969b9e682a69f9638f3915a6f2d0e
SHA512cee2fccfe2bd8a9cfa486d7d9ea1e80469b8fd305022ab7e4b0f4b7be72369b7d36fbf306a58f332f51f5eea970a1e0fcbc67be36d24b360a53d46cd044f8b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d496b80076b028d2eee920bbabe2e78
SHA1c97a29e541481452be3b12a2c5a50842d28b5df6
SHA256e1fb38f9e05060aeef9b394336fb6f9a7f0b5565e5e124e335b367093c613879
SHA5120474112f62ee75d6d902cc18ebec805970809374cc2190dd6b04ee256fe34a25889d6479d2242630869e0fa7b642585c70e4ead0aa135db9b3b9e6fbaea4a442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e8f5bba8193f631839be1d1ad019a5
SHA1c7b7b0762575f714aaa886bcd770a802cea41d64
SHA256353cc09c4faa477bee136eb8ccd91eff78c279652c1cbbe0e18b07e9856598a1
SHA512005ff3199232983a4ead4c6252aa19722dde59c70ea99f59b41d135d01b4322445d8e4996c21aa93d991bef9106894ee1ffd3a6fc51e921538a84feaa0786df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a643f03ae5491c008cf6f450a757ac08
SHA1c7c1ff03e0700a00690ad3bf06e541c05e141a87
SHA256ecd64c9d2484bfed4dd3633388a15db4342bf11c6f69095b72ecd6b0afa6c7f8
SHA512f8860b33cb176052451960a72cd46abd7dba3cd26da8f8e20ed23eabc2a1b818ca5c6d9b1855701174d742821f1ce65346fa6a0a3b260552805bc9d133eef52f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b