Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
ea8a39388b827c8363d13145b9a5ba1a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8a39388b827c8363d13145b9a5ba1a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8a39388b827c8363d13145b9a5ba1a_JaffaCakes118.html
-
Size
68KB
-
MD5
ea8a39388b827c8363d13145b9a5ba1a
-
SHA1
66e49a38063ddf576520e16ff725540b216cceea
-
SHA256
67f1c5f3e1109f513249ea32570db6d96b5c6c22b0ae27d2e3923bb63b8c24c5
-
SHA512
d041f1c18757036d3ba1eadee978836ed49de9930e47155241d5b0d687387eb0f62689ccfe8c132a01a7492dbeb428c04103820fe10f2ed3d61b51f72bd4ad9b
-
SSDEEP
1536:JfItPt50tRtxtL0tfBtITcNen0tbrga94hcuNnQC:JQRAbTaFBOTcNUq4hcuZX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bf72e5470adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fde9a86c98a11c3a776367dae06187a1b9d26e2ca49884e9687e0a40e5f1c3a8000000000e800000000200002000000019656bcc5648979b2e0c8d80c42aa37981cf359e20aeb9b88c12f12f598539ef90000000b8855ed999ac7c70692dcba575918da0591822052025ec653edd10d675135a96fc7939278ff922fccc654a8f7730416036a9e134c329f6ff5dd94e037048dcf22d97011676e59658f8c43b34a6cbda01cf9329d4139c0c298b564478f0014932c4739b02531af028412981e496e8a76dce04481487f2c37b7c859cab297f4705cead26f735f4d65ab0d44d8c5afa0af840000000b97a84c7f18e47d0a48cd8584084dcdaa5579af13a620b08ddd81b41604e30d3d36c2bb859e16510b0dccda945645f02f3899f260dfcf39a70d0780fd78de160 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FE06941-763B-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d32f1f79bc80b1835a3bb8c3a4d5e8e0372721a72f69619fb363b21a69896ae8000000000e8000000002000020000000bbbb01903ae1140a429191d828e84b2dd51f63b1395aec65c1ae3ddf7ccd451a20000000c1b46f5da2615fa84df0bde6d44341dac8f0ced744cab091ef4fd1142c8b0fb940000000b4f0d87844b9da33354b0cf42ad68b716827ff04bfbcfe55cac21b357d474a2e8cf16097305a89637f240269ef8bb1533299959d01dfb8538b55d93a2bbf7f9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880020" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1592 iexplore.exe 1592 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2816 1592 iexplore.exe 30 PID 1592 wrote to memory of 2816 1592 iexplore.exe 30 PID 1592 wrote to memory of 2816 1592 iexplore.exe 30 PID 1592 wrote to memory of 2816 1592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8a39388b827c8363d13145b9a5ba1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5f21322c4607d7497c9781c7cd7187
SHA1a98e86f242b0d5452199e4596909c3644e984693
SHA25674ac19e83148af90cb203467d5e531857f209d671500d102f9e5dc84ac15473b
SHA5121063dc90abced96d1d08cdc17848bdbf0ce9d6cbad6651f2f080f992f7a45eac80b1003092ed29ea97a44b4121f9b30a27ce83c9c33d4f0645269c04d0a06f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c705ee40f7618a33d509601fa53c02ae
SHA12b302e02119917f64fc7584679b7159232752031
SHA256f236d20d34d442a3274e31c241f6ec546e18d58bd5327f7d3155827142bcb276
SHA512e07cf39d3307b95991d8633f20e28057b597038f5c245659200830c95c2403ef449eaa56f42d445da0ccce70ef04249f0ca91a742f7f894fa5bf9bea08601074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f871b624c14c666bb72a16144f5860db
SHA164473aae9078b7fc07e679e6c951d418b45b88e3
SHA2564af26f485d72489923cd70edd10aad8316e2cb49b79826ad16d608d6f67e85b2
SHA5127098325a4fc03a40bfd7f82557487669a29f1ba0a92da7876cc00d46b71b9568809a4cd2db73d39b0fa0bc4dacbef9680e36b44b481036d709aa7222ea67928e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560fd08bd734479ca3fae9160ba3a3c3d
SHA18c92af9e297336e71646abc98bbed4f6116002c4
SHA256cd51f7c94af17691686781394b3a8b653951fa1d35e010293afcdccdb2101834
SHA512c93e3218b5565d8ea338cf56d1fd037f4b7f39be10982b55f9cc7670f817c96a5529b87c125f0b9f97aa9c53a44efca5fa6d706c9072a4507a5575cf46647b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5e7d7c087106f269341cf2b6e7599b
SHA1830a799084a8365a8fbfb91d072c8a6b92c51c97
SHA2561eb7fc1c24d6066b70971496476cd15c4d8b6115dc9934a49eec662beb917ca8
SHA512f50ff58686e02b2afe323c2fc8596e5bd8372e2225add3d9a8a17a3ee81f99c26719f992f932554c937232d52889d2c02b0e8f5dacfe82dc6a42f7b22fc3801e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7fef9aaf86d975d563b59bac755514
SHA19590721cdeb9caab3bcb5978bc18ca7b989211b5
SHA256699e2de84eee980025c90df35649c9c3daabeb2a78103f0c10252799a1d92a4d
SHA512057712f1b399267a6f5fc4cd84a2c73986fd0eacd27d93721ea8a0a5456a608b0fad26adab3a1b7012bd2fae400bdb04322ea46c286a89dbb35a2a37ce4d2b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8864f9a8f81fdeb0ae01979e9510e9d
SHA10db9ae62d3f6e6f40747653a7575cb4f7a8ac288
SHA256ee828f48fa35f597ec1ee099f22f5da1c5d5f8a428496a572f33bfe3b1c9075f
SHA51270304248c14709ca0889b1717f2beeba198bee21b7bb635f79b71f2fa7da341842cf5dd8e4950baa4bd37161e97ddcb883ed5bc6876c42830248a5f454ee9e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f40e3fbf05261c5599e008439026ae
SHA188fd962a28b1a395e3d9300bf2e9bab9ba1a058d
SHA2560ea9a63833fa36c1c22e5d70021218b5faed5ca49da1c3298058c81e888a2c2d
SHA51227183e859a80dd81b401d35dcb98e29d60ae27bf919088aa97103182289d5145f7fd9ff2135e4f65eb0bf43fb3240ce8e935415a4d0ab2f9214420cb34b7f9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fb34afcd147c0fcb2cd98514687f01
SHA1f774792d0fd3fd988939c162984e95bc13e17478
SHA256bf64970d6100f69c8b6a88db1d15175e23912c6bf96519e38fab9027eb94d4e1
SHA5128719f8d4d60ad515d513b513f8010897e40506bf753cb20d4b46f6d7a936618bf40a5553ccd93acde232cccdc0ce370d0e63351f90f6e7de2ad421aa627612b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b27a2f2d4f9f53824796c368921f61
SHA15f11d963ecebb8445d0dddee96a278e151aedfae
SHA2561d514b1b0d88863eb8fb4b4a60b338a176b962d11b915ddf3ed15a4b39ebd0a6
SHA512f2b54edc32467c6fa5ef84046fce55ab0347b38e3fc2daead37d6e896a20529ed67dab92e2b9072d7c08caf0ed312039d2e4a69c20f7cd88c8c9037c674a073b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d25443511e202294dec42220e544942
SHA19c5b0d043c44223a62b17ba92efdc14177b37d18
SHA2566637d5a7e27445e17be1c6d5627cdcdc398c1d1a9af398bcc1ad5c43a23918d5
SHA5122dfd3713b463237be38f44a6d8aa828ee37c31921904f1ab415f80557521f866f166c1cd4751b61014d70aa55ed72d8dc127065e5e9d00673dfe359d04016ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57039155dbc98bc6417bba32d23f35797
SHA18316890d56a073169f3e963088d2c85a12c41233
SHA2563732066486da698dd04e7ec45770e513fbda7bffc69b384d29f1befb5ff4e30b
SHA512849fab698157ac11be89b78e742733a2930ec0ee3981e0cc2127be703c4094a9ab64b4bfa4d4b8396aa371b12f4b30e04397fbf1f078e5db73963c3c77807942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9083f08cf7e6ed3eb8f97999a8b45cd
SHA14c23d85b549182405d6733e63aae625a70532b09
SHA2562320e33cfe74c79569f82db78c90874ec04899ce8f025948261f64a69ea61fe1
SHA512eb7cc0a60e544dfa56db9e01999e585b617b73f49d459083bbf547148a38e745e778526f4500d6eb1e8165f13dc5080aee51c86b3761a2ebcdd4735db4e7b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d3fa88ec07e92d62fbc1e3c210b758
SHA125fbcff09bbefa2006d14c60d0ce7c4f28e5411e
SHA2565bb2f24d33a7cb8e7ddb283f51734d817880a36fcc6464d9ff96e6c485b28587
SHA51275f5a64bf83448af9b17db870e446527e517db6756f6946995589e6fb8b2131869957b4b9bebf90c9a0dba4fd884e3b1558d84cb6f26140039d04cff71d8905e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc052e3fad7a9bfb3342d73581ddecc0
SHA174d1861df6132594b29cb98d879d12a2c60b7e6b
SHA25694b761d694e3937a31cfc2c9770ba5e0141aa933a5575f1636396f548f171105
SHA512d871a1e17e931216923e0c1a5a757684a490475fc6c6c5c2f18118633fbec1de736cde3b0f2f976248d330887ea1c42d4f9ede9a0149e6892f6b0f39165d957c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af142b55486cf9374831f15ef55e45f7
SHA13a3845a0c849a08ff373197fa49022a75a9b1a73
SHA2561b490c5daae20c5fa428f487ad713bcced605e8daf83bc276a0bb44c2cab08a1
SHA51263e27ef3568121bcce0aeeba1917b84b1a606832cb0d613d1cf074d3b3181b3f230c7e6ca4097aca57e0725235861b8c90f99ae568abcac3beff4419a3376502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475b3587f1f492e28cef2d5126542a5f
SHA124890913e73defcf09308db7daa117d2401d8785
SHA25639f123e4c16d68409054f9aaa8e896929cc56c82896c531e7847bf6a64b1b858
SHA512b02750123fda2bc9ab36a6451857de66cf72c695babf2ced30ba370851daad56c1e978d50f932abd13ddfa2157a2109be03dc4d0fbbc63f5dd0c740182b438d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063971bb816054c5d86078ea3236730c
SHA174771c07c0d89ca8aa629e33a277ba794659396f
SHA256e092c0416a6c84bdd7c98a88012fafe94f2be7ed0f0d3efa892bebce1728905b
SHA512981f2f3bdf86c60cab9af788d8d63079ceae611b2f5d96255841caee0cd364d622bec23229e629dfa742ade474599d34eadca8069253398990be46f546d839ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bf8aab52331ad6fe6f443d8a0f9c9d
SHA1933705bfe51f55f887e20b6b373854bd7b074487
SHA25697fc73651a9d82bdd9ed7339e371bfc5d6f6ee5a7f9198830c2e20f74f256377
SHA512d52391536293930ff57f3182a026d03f34c919412b03ae97bd5db5b46d0993b6e88044bbe13ada7c429d52c0a8bb7e81c657896731b76136d138d9823165679a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38c7a0651b38e509b0583bba442844e
SHA17770ac6c51163be8552155c2226c2b0b0142919b
SHA256c77efcf56b567fee82eea82c49f0afd5164f56126003725da674f3530f55271c
SHA512a19c940531bfab109b4145d799f972a64e670092c3279865486298efdcb9745a773d5fa3368b6cb05910c385d99c8792b1e43b91bf9114b0ae75f310336aad6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711ae9ebddfca487b8e28d423649bcd3
SHA1ed89e0773ab986cfb796bb3c07dcf186bdc22d78
SHA2569acbca6189e14af37a148053213f80d7d55a473fed3ae54c893d50e95c5bb1f8
SHA512cbfd0e7b8055e8f607842342af6f102c9aef95e192d2370fdfdd19377e2fee9917498d71a0fb7be522b015c8346d0271be2512d86389796f26fafdc1dc28e81d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b