Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ea9f7611df60d88c7e43ba724abc1171_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9f7611df60d88c7e43ba724abc1171_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9f7611df60d88c7e43ba724abc1171_JaffaCakes118.html
-
Size
214KB
-
MD5
ea9f7611df60d88c7e43ba724abc1171
-
SHA1
1defc8d34a29970125466e999ec4d6b3ca0e3f4f
-
SHA256
196535395ad243813a48b658bbec9ab21b18b5d1a1595fe86b1989ab957cc865
-
SHA512
e9ce0c316378a00b066415493e58fcca2c0e0b1fce0c78fc5902fe204a93e82a8802547276e008a83c3c80838ea47ac5e229b54838b01a9d8bff5bb714b5565a
-
SSDEEP
3072:9rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJY:Bz9VxLY7iAVLTBQJlY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103bfc49500adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34DB89C1-7643-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000064e62cff00d8adf2c79b23be28054235d0d1e61a8acafe3b8b68f11b6c4dfc6e000000000e8000000002000020000000722cd41297fa9be1526c3e3aed3a080d02f83e1f94e6122f97c7ad03dff054af200000002d26b9eac381ef6f4eb5ce3ddc0bbff132b29c987d1e0fb154ce25c23949638d400000009d5ba73f7d643dba4089d97841147c34ab8d18000559d809aa03b202562a34a51295ef94c0b302bd33969f940ed49dd41737a8e0f46bda811b96a089c9978b6e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883517" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000202bf20221ff2ec6ecf8a2f97e426833da425de8c48eb175945c66a8ae06257000000000e8000000002000020000000547fe0e1c09d2f24258d5233f28efd0c6856117021f33c73ace4c3522afb131690000000b36309704703dafe336969653b6205a0c202f911284c26cd37a258735af1e203a513a2428b31f682164cf7fe5001bf59e9259090e5a3a48206a2374b5560bad466026b1a59c6770b5ba0fd7b922a4d0f14d594ccd98ba61321b61250cfe6b2b1f7732a4607ee81900316229be9d16fdbef5ef3ba6b1f8170554d2692be6b885f96d0f0ef8bf4e7d21d99ac1b11a6d183400000006a78e4aef8f0a6f4b594057ab2890bc2d85575100625fa56c639b56a75303d36b9e081c5fdf10378b13f657fd052a852be28aa3119ff4023ffe16a828d95e9cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9f7611df60d88c7e43ba724abc1171_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7409d375e148a8b56f4c3062a16be5a
SHA16473137310db4187271bac79747d0364ff7d900a
SHA256e5ec8965368062c0a9d26597384b889349d8398f2d942a87bdef98a2887c1461
SHA512f244a087758cabd8ab7f833beab2368bb11c51cbc1803f8b545d12a975dfa1d38401292c3450c9398da6a7f3c734ad5aea4fd925218440f0a1af816a480cc54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2293b49b10b8134c3da57360e80c1f
SHA1f73c765ffdfd1d57561767246989100d04a2bf3a
SHA256e8d37ef62e05db98b129fae24122a7cecb59030f6fb3c13adad78c2a0246bceb
SHA5126832482a7da104f5c6c3656f8027d869fac5cf22b7d052d93dc79ae67b1f15d3428b8801cbb2e77834b893b10e275f0ff9f29438c4379efc987e932338ac31d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e579872efda5fa12288bde41979c48e8
SHA1dffca4b946139228a6f1652b410aba6f1d9e6403
SHA2567eabe7ed4b86d8798627c97ce970a0cebf8ba33b451ba18bd4dd286878a1913d
SHA512aaa21d5f31cf01dc59f571da713963b4d2346617e9e2a21c829c0fe336f1b55e83a842e9ac0e8b73a9dfa2ec4de992ebdb2a74f41d33c0cb1eb3888aa430e753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57248ac7c0e58ebc2c5a02486e0112ec2
SHA1727ce5ddd412d43b6051ae7d9c8c2f649651de2f
SHA25608a87115731c1d2696d7967406221d1607ce8ff7b64305c23da9e9890954e8a9
SHA51200703a93dacf3b5d0def748f4d8db372a441b600f6d235edefc6ff37f4cdb872d13146e93e07eedef41a673b908dfeabb9d5ebc399fee80f6758a96561de85a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0441b14bc3582a2a76bced4d59c93a
SHA1fc733654ce4148313ed6cb1a3ec9a4a3b557daf9
SHA2568f8e0174660eb2c9e3cd8678564ec7516f5727cec46c362805576e4f8d2792a4
SHA512f1b3e3427bbeb8a1e95293aff55581bf1d33b56f8381bae71d6d2a1a01d29c5ff73b4d6d7f283e833d85ca35e86b402d4dad22b80dd6ea86c46545c736ee806e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d3489bba6c67a05180fbf19443acf9
SHA180c7946c967653d630f6951076249ed22221bc1f
SHA2562839c8418e4b7e8abb7aa8a5d4c6b2ce7ffb430b53120e218a6e60039ba412b4
SHA512b38b8f46704d0adecdaad18b29ea29880d09111711f822887436d14a132105756c3ecd4e52889aa7e2eeae456c9c93f21e991f6c3f33a678a46409c418b60f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f74a911990e065c37c891f0199204c
SHA18798080c8d9d416e5a85131075f462f4942c7326
SHA256d488d86305fa47f9dc3dbb145d503cf8b72d0f21c124594af0cf3a8406014311
SHA512db9f867021d09a1ed9e6e64a0df9768b5b52269d62e9b7a2e6bac596716bb5842ecf33d4fe61d5c0fb39a157d99b2f473a1b196eca5e6b1c6170f7a07b064fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c049b9428df4733a9990abab1ab6522c
SHA1612f0b799d1815d25c155d3aed038e463c5e0764
SHA2564f7de2f89f45af25e56a84e9bd46496cac1bf056e49ac6162c29af3ee86a5e66
SHA51269587a0d96fa70da8d7d430b289bc294b59e0d8f28687804527d4074e9d43cbad5f1717f8972ab97139fc2163facd2cc074a04b7338927daeb1d5891293d6898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9e13c597c6a7aa31c6e5514e4e3828
SHA17ca340f03e2dcdabb4874667e0d2b127e7188a86
SHA256f5d65788947648b94b3684dcdbd4c2405c59a3a067747dedbea1a74e8f9ea7a3
SHA5124200bbf2003662d4719bca63ebe30320f31a0de7fc1cd5a9a8a05a6d783b74bf2bb8b89295acf5cba51cb0a706ca0e5046c654ae535b2ebf461c75e1dd67f607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef9e439fef452a4a5f9067a6d125f1e
SHA1b27a30febb27e7c7bc0c6e1896c48ae2671ade2d
SHA256e184e2df1b03faca82a521d9d3fcd7efd8a6a6c9364393389bd265f8a0ccdddd
SHA512ee23bc5e034e461f4f7880b2ab74de59884ee042f8b75ff9c902e5a0d00f164dfb21fdfdc08c0c5a374cdd7303e4233d23427c4ef544c8b53149b4673fcec1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61f52738f0144387dabe34a6650dedb
SHA1bb066b0798381599d3db1773987a57c21a9c04af
SHA25602fedbdf5972019e396cd3bda144e1e93c3ab9a0c53fad716d45d735a484ae48
SHA5125897f02157a8947ccbc43a6578b0659d91ea837f06dfe8f5506a3a85c888f9b27517026cdb20f2a7b47adacd9ac4e3669603d719c83b58bac0190d75198fc7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649592f5fcf647628668ec81028d8690
SHA1225f9976a74369f00902333e1f6e743b3d6cd47a
SHA256d00afb9ba83782baba6e69de80beef9d6cee035c873ae96a541735f95cf25461
SHA512d33f1902ec4fa660f4e2a6c193191eb1ab47bbb70a312011d2db072527dbe604f0aff63d6faea34194c43efc9c5f4536c3c3e4e02f00fceb6055c39e4bd1384e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad37b7f19584d1e35d1eea2a40393da6
SHA104cbb73a51f4dc20c84f9feb2b319280cf9186a8
SHA256f4359d41512cdcd30f6502f2b64a44e63eb7005bddde093649c36d576648fcc1
SHA512eaca041c8cb43dcd9104f6c4fbc8e14951f800a8792e59ddb70c5c2525ff1cade093e8f56dbfbcaead779bf6a4a7c933719dc4fdfab279c9a372043498712dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57241b9cf53c63d4cb16e52931d79948f
SHA1378c2e2c55334231acc8e35b535c9abfce374908
SHA2561609185e851946f6efbaee6f84c69d0582e686667af2192eb8617386ca4e1401
SHA5122f7c7925cbe9ebd860b6430821cc065392eb78b6a0bcf72913747b9fa07262679757fe781f7ab419f896e60b6a6102928f606913a407ac5c7fa56940a6151f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0aa0c49a4ecc37b2c7524064298be3
SHA1aa9dcf19337d6690fac301b43cc8b0ba14be6cfb
SHA256fd34b4469f12dfa3758d55e6072f1c4acf3d6f18b550b270fd9a0172d5883277
SHA5128b0f913fe118292745b182df6b37da006866cd9eb887b9f1f7df6b1655e2c68201adb08ccd2972bcc91937bacb4c2039fccf14858444204c58ce8cfda713dbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75a40f84df5f26f0760df0ab801983b
SHA12882a11df50baa2dfb21ead5d8a176cbba18f452
SHA25650b3f4b610e626a8fc2d387266bc39898b7c2c3660af5c814f9c48cc3afdea41
SHA512dfab7bd1482fafdfb98d7dfbfd6373ae0dc1d85666f50e799bdca513d981c8f9dd619c7a85896d25a3ff913a82bb89f785c9b421841ec5c7a3e999244cab282d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1fcb4f7443da4c05f41e2ba0c0eb3e
SHA1f6c20028254f37ff637310e06b4028e6a69aa72d
SHA2568599413b04c6620d7344ccc6b1ea8868eb7bedd100f080ad9e2a6f90f25fe939
SHA5128a68e00a2429c8d6dcb9a544062316807ce21bd0fa90d30b62ef343612311af59d45a08c4ce8f9e55d74bc8202f90eff2e382203cae87a5f57ac5572819fc130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ea1d366efd81cfb695043121ad0413
SHA17f6c1af0fabc881e2ad7e92a2ee71febabc05ea5
SHA2560f48fb885ff58aa4fc8e8640e935e76c211c67f768e1ed6714c924d12e8274a3
SHA512dca99e3300659fdacbb8e12bbf59c1b266560bf3a31653cdd6369cce519f749a26beaaec11dc72630d2635f68ad54c51f4962c85934a4bbeab6acde34b9aefe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514eeb4323fd4ffbaed7707dd7c6d58b7
SHA16833747337e7b77b9ed8fa40753f581434194673
SHA25650748d9f753f67f400350be5ab229391b00f44d52b1b3d91759e09e8d9a9f97d
SHA512f8a75593b9d81413c235818ceff87e55c8387f390548964d729e742054fe3e9da32c6aef47ba121d9af8327d236cdc2ee5ac479197b6bd4e6b5ff427f777f02c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b