Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html
-
Size
201KB
-
MD5
ea9ebf3bd088332e0ce3e11806ab2213
-
SHA1
8c153c6d36de2e91f86595430afff0c16a5d6fe1
-
SHA256
a0543ead16e288b59524a519c84da187c43b7fe3b01fc713bc2d69a5a4dd0c0c
-
SHA512
876c628f1cc2e6d299c144ae82b119fb5449c5dd8785a1a8dca56cbc80d51f4db72542c0c4b6bdf82d96d978064c0fff123227df03e3f2092d7a532641e7f592
-
SSDEEP
1536:kaCL88vAAagB8KEdiBYscpnX+yOrLofTK/NnuEtHNA6GvM:dC8nXLmD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000041db5aa77d7d57bbca178efa8feecdb8dc0b3b639022883b1e5d91bf13861509000000000e8000000002000020000000b58d04b70c16aefc92743cecc6bd3b94ef53715a7124ae40be514a1622e4b97b900000000224b1197249e038274373b351962d4b535e01fb039c6725f8897a074fd7d01a43bc850add12c7a6d11f8cd3c7a58b6b1450e8a23cdf0f28dcb55568fd2ae76d711d5d329eb9a275dbaeeadbd154671a08b369b0c3caf4e4d7c5d897ccc6ad92011d86a8ee86d4021c4ea9bb60235a2b51c9899a32bd4d2783107ccacf8cb7113b3d1378f258bd32e5480caab50c1f064000000065c17a3832ecd18d787eee3a472facc2da74e2353a98641af6a4f1c6c0e5e941e27dc308597ea7ddf52cc4b0e898645b356cae70903ba4a976e7b45dbe625883 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA3A6D61-7642-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b690c94f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006fdf823d82115666f480434582d35be0d3a2043ed9e8acc0c8598f654f29c03c000000000e8000000002000020000000d738666d75be6f647f1630596933f4e9a9bb0ea543ca47da33f61a1b0fbe746320000000646aafe4c337f28628cd4c7fd2c571a5cb3d5474c0f16955eb0d6cae94a2720e4000000038a48dfdc9f0c2cd73a94470bff719c6e64490d7844837cf6970baf334b83d705d22bda0216218b60b8ded12aa32c92f203fee71f27e1954c07f691ad73244d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2576 1744 iexplore.exe 30 PID 1744 wrote to memory of 2576 1744 iexplore.exe 30 PID 1744 wrote to memory of 2576 1744 iexplore.exe 30 PID 1744 wrote to memory of 2576 1744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9ebf3bd088332e0ce3e11806ab2213_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58185851f4a27b261e515769ee14e15e7
SHA1a8c66824976b1c3eec839d2e41fb8b0162f8d648
SHA25643a157b16b22f77342b1b21dbd840181729df1ed10767a1c9a64b925faecf9f7
SHA5125a7daa9d5e5b4c4b01c1d96373f73636292d3f5e47e7a01e62a363a6e3e78c99c77af635911feeca64d80bf22dd09fec7c312bee0a3c5e19b17d20167bc789aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060318f168606ae1add9dec5412569ce
SHA1cce630230a2b62a8effb89d5b447ca235a34d45a
SHA2566178038b8e8da80a50fbcd0aadf1956aa0a97b93636ab5c58e890e42e0b0c872
SHA5127eae6441236fa56eaec5880d5255d6f495810da74914f7ea6ae2906fafd46e8ca44e10ad57cdf1b09cbe24ce8d886feb2448a1e5e0a9ba13a6075af0e55f0f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d475a508db8004fa02931e7d58518d
SHA1fa21611ba382d53174c2a417e61684ed564f7f4d
SHA2563f617582f4c2ee02f97da364a9d0d0ff920eb1e64df7dff9b3779a4f78c4ba70
SHA5128becc024abc2f4f94be60523bb115ed93c5c20918063cdc8973f1148f25b8240a5603d46e4d1461f68cb457a4b318b03e5a91e39c6b1fb36e6fe2e0d2f047678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918f16e731c3f9baf4c0cdf5e41a8fc6
SHA18f8c5238f8b6404236a3669538579e51ccc2d987
SHA2569aaacd03775ee94b3ae26cec964bc21e06eff3006931f80c8ea261eff86e524d
SHA5128ff2a25acdc3f3b704c1c343ed2296a6018cdb8012fc5743e0fd984f59772695dd4781496db892fb2f73e6ec87f93758700e120478d11a72e629592a52be62ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd82469994f446abef45fa17dcbe53d0
SHA19e73e465c45a8869a5d48222881c5bc16d8e9339
SHA25622a62474ce7183e0333170ecf5af7d568c669f6346628ae2089ceacd0c034328
SHA512b598116d528c6a44d7e903dbd21ede48cdd5af39887c4f1f1fc3f00ad71cf85008ce9723607419da7096d8c8403239641529093336a5e7d7016e2187159f30bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58479f084a060fb3dbc8b000e2805d3e9
SHA1b31edc90a166fdea220ee88a4b0812e9abfd1003
SHA256511b99a64a4e4464c4f482988059a8e3fddb9bb5c1fda8b846481ae06fafd7cf
SHA5129df67054f1b0dcfd3600d291e9dd66f7e286e6092e511c051d34521467a08715b346f0d6fa2e96454c70b222b1b847b9f0c15bcf91542b30d35eee86bbb4e78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee60fe0eb667423e3ecb7f8dee77908d
SHA16e94d2b9b7750da69a516f2200397eb0ca6f6a56
SHA256e5fd678318b518f917edc5ab84d3ccf5d87b99fd2af99cab1b8e8816c029aa5d
SHA512ad2b8c001a3db4024f4f8e2e62b555af95f4be91a5b77b89cd6190f15dcaef76b608125b085ccaf7c939b614bd10574a0a43a0bd1dbb6c302449c92c8b8f51cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f91840632e1fa0f19884dbe88e6b52
SHA10a223ccd5560480178508c7b0bd157099312217d
SHA256bcebb2b9ec9d4201dd10279b7cb262edffc42270004ed87e7d5e646975d76af4
SHA512a7b0e885916d8b244ceca6fe4ba72b835bcef422f9d8fc314ee801b2aaa109b315a3e9a42be6269191c57f028e475ba0185bdd10393b6556973eb5a3d5200c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f181b562dcab0c1c07af40b66b1e4e4
SHA1b24ee15bcb9ff07c99a29aeb4566938e02d3d1c3
SHA2568eb4325237427feb4a455d8a2996d16531cbb16dfca6ce5610b99f0bd9928540
SHA512157eb1a292849c1f6388e0d123573e6bfecdc424c99469087c42a6efdd2b94fb65e8506cd038fa453c56c1fe22422376a1cbe7c51b0852f8f0205e824a624da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8f348344a6b2381bd9039a6246a0e0
SHA1949d1eeb3114b968c548109dfd1edbc0de453f1a
SHA256f9641f5f76a92ae0b16cab7a51e860c07e018bfba5a945fd335fa7296db60d23
SHA5122f27ee4593d807c069e47b3c149bfc2c9c97be1b220e3aae8e8d89974d81387053ed92cdacd13f55c16c4ff5cf06b54b56e949f592214f43c86cd49e6413397d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ab0b51060b9255b312d1e21de626a2
SHA1b17ff6cd0c06f4f79bc71c015b320d21621c5157
SHA256d5ceb0205b3794b025b4a47771b7d6edfaab446a65f116b498dbaad1865746c7
SHA512b2fc40e42930b5044f943cb0e5e730e6ca0b7da37fe2ad421efdfd0ce3bb5acc0e2add6c5846c3300656810ad93babe739eb0dcef759373e3d05e1a2ae501505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa87db95a33715582ecae81ca42b5bb7
SHA18b4fc6db0265c9c4b495aba79330f702b14fc5eb
SHA2563f7642a7fd37cc3cff8f2367969a87ef3ab84396f40b4997400c139fa9d1e37c
SHA51263abc7e88737bfb1ac8b3f92233809199c44caeee431c4f2e048a213626acf4658effeb6182040524dfe83dd462ec8d7c56decaf420f6ec5a104d6a03817f5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc3ef8135c3525c7e216f19da17fa68
SHA1a90d0e77c3085f5ec1d395355e9e136a4e5b6552
SHA256ea76e0505cad6cbd2b622c75e02662951525dc3c71a14a8436e0c6cac2adbd79
SHA512a0b3299f7060bc0b0b36dec86a799a540222a9b4955eb75dd5126272c6fee89f180d5eb17f8553d8761c3771f4a24764f214daf81bbd8f2e1fd0e8cfcea3942c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e834231ae579c9f852fd30ff5322aa
SHA151f817aeac410663125e1cb32677caac51be2aec
SHA256b1aeea11ab8956033a09433ee5a9ed25c2991be71cbf28f235b6fc9422621b9f
SHA5124565d04fba24bc3997ab9286bddedd79aed3f8d4c605fa2667b507bc91ca37bc1a10154df908f82a8115183587ea4a82f525ca898819736f0d4d9e592c17995d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0e8e63d42305e40d13df321fb0f21b
SHA1b064f530ed116d64d92cff6ba6e08731e5641593
SHA2560ea68ed7f69d1a10ab9938c56f6535609dcfcd0225cc7d2678fbaf6ddef55c05
SHA512dd7d9d5709dd342c99f202cc8fccd025572618d38519b46349d17aae528d6fb7ca5fe2362028be381fce5ea1466bce8d252832a710972c3d9e76fbb0053463e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59805d952e466c749ef3ed32550010622
SHA14664510c8970f8d64612c9d6780a1aac131b7894
SHA2565acee49884eaa70ff8be776ef9cfcf69e53b895fad558501a18c93c6b2ed1733
SHA5128efdc096ef2f430f235c3b858efde9bc3965bce637e49f27f002139643ca1b2a8889deef68c9c13b8dccc17f62886d43061e1541aea35e496733df6f9edf79da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505f87992372ecdbcb519bc65d9392c2
SHA115af32d27ee88994a9b75827188783424dd2dd30
SHA256d05e71fe49b082e6ebaf85b28af1c9595b1e7af283cdd86d72fa37527f8e7ca7
SHA512e3efe013290744812c80fbd8faa57fac60e7d8200bb45b8637cebdbea4b478cc97fcadcb0e148da50c4e43c50a626dbbf7c16c3c01135028268b06be9ef1bff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf1da3ca0c14c6429389fd4f1f9fcc3
SHA18e6a08665d8aa3620971fc882e57a03b44a97815
SHA2566e44529455dd4b6e26d5753d47059cebc8ee896d0b70f0152686ec74286f24c5
SHA512f01e9134eaab1311d728937ba87993f73b255aebcc830832f00f82180390cfb24964817175e8c1fe7b8682b927afc770e6d01702ae2b3f6f0e36362142c2b2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1aa18b7b414e5122f56d2d0dbbbc409
SHA1500b3fe0ba1d41d5c21541399be526d457e361b9
SHA256df225d6cb6c1bc01c622445f82a4edea2f2e4f041fe5a27290b5fb2dc7b4cdcc
SHA5121660df8f80a8aa6d0a20dee6179bcd2b0b514445ac0d0f32e966cef85fc3384fc2b32d0a0aee6b6beeb3acac4a9bd274e1b97913fdf53a643e4af0279f85b769
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b