Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
eaa4a8fdc00b71fc46b5af3b7db0251a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa4a8fdc00b71fc46b5af3b7db0251a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa4a8fdc00b71fc46b5af3b7db0251a_JaffaCakes118.html
-
Size
39KB
-
MD5
eaa4a8fdc00b71fc46b5af3b7db0251a
-
SHA1
1cd7e3c2bf901c2d8c1dc4885517fcdf085c34f8
-
SHA256
7024f22212817d6e1cb4b3c47bcc47066673534a1aec5bb1ae5b764ebe675127
-
SHA512
028d13abe167c890d65a91396bbfd3d7c6b8bfe9f95abf195243ee69a257a9e417eed4eb2eadd0f8562b19e82de4f2529baccfb311d88862b0f35b1a973f3fbe
-
SSDEEP
192:uw32b5nHCnQjxn5Q/fnQie+NnbnQOkEnthRnQTbntnQmS4xSzahJXuMddMIetUYj:OQ/Obxg2JIbSJg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A0F6091-7645-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4008b50f520adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008c16b779c9bf6f4e8344da096b70870fc9e677b1cbeb7a246fe74fbca28abc64000000000e8000000002000020000000a4a0051225484f19f1239e7b8344cf9accc5039dec078c5a40362cb8ff749f4690000000e6acf0a9513d978e42193783ead5030cdacdf256da15008ef9e9513d4a8ed92e3405a5393ba21c2c0e03fc8f1e1e2fbc22e8d64925fa9853e722ac4022df427c005bd92934f7f0d8d92bc1979ba0b040cdf508b10bad4cf2ec1096f0458b249a67e557da6652a97baee6aca2285396bac3c0bca4dbcb963bd3098729965fd7a1e43e668277b192d82cae72587cc85cf340000000568197768c4ce01dfda87f616d9a229d09b46a4c60dc03db6e872ff00b4dc50668edb46a8918b363b59acb53569d011ecce171f4113027348dd14b38409b9299 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000bd3531eef42b93296b4453f942d75ec4f0cf7911865f2bbf6dbf4374862a54d9000000000e8000000002000020000000e41ea5c2cba8f9b811e6ddce84977dd7d809bcdb6e3df87eaecd687dc4d2d9112000000054f9af2cbb771b4c7dd42f73a1755ccf072aeca8ac887ec2ef369259ee7e129d400000006f936172c0611c699c849d8bd8e12cc281b2961c2c06e042e995f46ed8ff35dd994930696b5e18c8dfe9aab75011a0bdd4472251976ca940b2255c91f4566a4e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2220 2068 iexplore.exe 29 PID 2068 wrote to memory of 2220 2068 iexplore.exe 29 PID 2068 wrote to memory of 2220 2068 iexplore.exe 29 PID 2068 wrote to memory of 2220 2068 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa4a8fdc00b71fc46b5af3b7db0251a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34bcba5de3da2b47b20c91b334f8298
SHA13fe021f2da4acae36541e73471b4ee611cc3ea83
SHA256c25e3fa61880dc3244774d2649b01ce72e4512a73aa135a0d6f2b53066adaa50
SHA5123a0717e9689da4c5a7b771841c9b3f8eb6595b9ff0d2ca1871abf572ce890bca4b542f1d847c752b5f5ac6239d2010c2457e463626b02af86150851d5de4322d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c55358403c5bc15eda274db6a96996
SHA1ea65b6f8c658d5ed44c0c8c86f04b9376f67cd9f
SHA256f73c92fb153a4b69aec358b70300b7db5ca5223e65557bd07de320bca9264865
SHA512930f45039db4c76052017feff74ead989c4dbb337adbfc852adaca2bf08034310c3266e673338662184a0fc0d8e12b6e08a31230f7611d8eef84272c58fd5278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542092e5b9ae8d1566a5075737dc9bd64
SHA1f3adf591fd6565e1c2ac3e8907e09963a460f97f
SHA2560fedcd59d7d23d6824db5a0c5b4e6c8dbe61321a7996a610746167063af11262
SHA512a0cf74f545ee473128fe5b0fa0aee4cb46ee98a7e2817b6a24a0a008834be29da0065adeaf82a42b825c0a0f8b2fe4127052f75eccdd24338617c9ddcf931e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d7ae80c390c82a9c9cd9556da2f829
SHA17b93305d556c67965291b6017fa843b0512fbe4a
SHA25646e755244f1b83709112598ba3b632085554fe167b5171099493bf4307058072
SHA512a13aa487cc31bf2422746d2cc6e2664fac94bedbba06d470ca626ecb0e9be45324d1975a1584113d4e6baa88ed65857e9d6a547da84c8f370b23cace01287e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba46b26e4e0385c743242008b291b8c6
SHA1d5062357c49df1546c2124664bfbe9b0de86c06d
SHA2565f85e284b607d4c921de78030a3035ac5e27584c8be0ffefe58436468b1f0005
SHA51266b5a49affcd25af37adcb116aead531d94d30572fffd389c13ce55c7b466b9b7620c3c265adb0ee40625501d61e9cbf1eefb47bf592e5ba080049f8c4d706ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71aa0daa2ddbde7ae8aa98df1bdc48a
SHA1dc3eb79f8b4c95d43382250b3edf9821199a2293
SHA2562961eafca483bcfdfcd630d9f9166197b9fabce141026f9d7c2fe70a9459252c
SHA5120480fe0a935c56bd0e8c605fdaf037e8292627651cb8c21851184323cf03d79619413bc43364d4bbc94f3b7abd0815938f58fa8795f5a65754f8d6f8a3e503bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579949cadee0446ecbd1e13e53f721043
SHA12c0ecaf30e73f75578a7f57465bf6ed0af3df398
SHA2569cd1adc83c74ddcd3da4c194d68bda68bc3210bb4b5c891fdd47b36fce5a8d47
SHA5127ed80d4764683012cda60b7de54c86f1f85c1c5e19e41e79d8b504d482ca2c261394b03e58ca2371abe5dee8bf41a88c6b52ef0730a6bb5ad9df341309bf9888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570fb77cf24a73d08e561d715b558450c
SHA1fbbd8fcdb8092545e7b0dc66d290967b581fb583
SHA256222e20ef0b41a4e51a8d66b1a3fcc75bdfd2ae13a60cfa7c03a8f34bb0cdf1c8
SHA51280eccdb0e6b75c4243d7ec120290f9fe857749a47b3b1c06b850f73e02a273a9175f6ac5434ee78711d6de010634dc44521711ddf1ff5dcf4fb1e9f44ef7dc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1e14e637e7e069f44535e66dd96b54
SHA13d678581f3912a0043b68c4323c85f7ae2644646
SHA2566dcaa8cdfa99632759b9a53a4a1a9d52e6094cfb0cd8222d851f38db852ab7fb
SHA5127798329e41d0aca369d59bcca97639fa6e9e79e1fd8c1193a959c50356387f7ef67f018a23151aae811fc75e5f9608956d738713bfd6593ec3c7ba014b5f5eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc13823518a305cb10b31ccc8fc3864
SHA1645161089dc4e942cb4666770a7aba9b14954996
SHA256d35ce0ae9e230d22ac45872d5579164dbd2ad1fcda15cc5335ef2ecd8cdde3c6
SHA5128db091c62c2511a682d86b39e3f55ad199769d03ab9b8235c4c92de4f591fccc7afa4e5ec84750452330b541c4ae4dcd9fdf9f85f2ea65d8c1907ed16e4a72f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fb04830b09db34b80f4700e9870879
SHA10ef2270d8704f4589770453ad80470e69914adbe
SHA2566ab75dbfb126f5aef94b68742d75d419965db6b1d5633cf8564db13eebcdd65b
SHA512ccecbd17735f34f74c201e1bfabc20fad87c073a22c09438689f029de3bba549ce6c159d3a6c05cdc7490ed4427ac087cfb4c882109a6ac719caab7526d50636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e59fc06c20dcf0b5a2b142c95a1ceff
SHA11186b86cbf4b9f5ae7beaf7b7d13155510685af1
SHA256bc440656fa4011d27f03ca6297be738b9b2efb5f409122f515251ad7a2c5e83d
SHA512a5ffc32410ed9e2fdfab57f626585f5798a29c5ed8a833b1fdb9ecc091e0520b9cfdd078d830a776a18c6f49ae83e03ca808400f67c2f2af66181d3095c46d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58602636cfe94709b6f9f26493fc162da
SHA108c2a5a76f68ec8af0601e9c93455d469f8cdd59
SHA25605c564e7929e7b424db1316fd021d0c87f78df74ae9e38405fbbd63d55c3ee40
SHA51251c6fa8585bc2aedec4a0c6e3f19b2ee89829edf542b66f0417410ba13ecbb5b92d68bc6a06d114b3446a09b4864def0c1420d46fffede1fded8634b38389f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a48ec77c1a8abb489b38176cb76fb2d
SHA1f7c604359c515d4c175d672b6910712218d38060
SHA2563aaca7e271413ae0a09d2349bd6d57a8fd126100396953f2bd91db2488d65c3a
SHA51228a223358a4f6ebe37c9caed59087f275631fb0f9a2b48e4103ebe5a6564aca5e789594361bd1a36c07ffbb0d6bdaa95a56208768f82a9550851d6fc1e425de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cab4dfdbaed0675ff72b20fddc857e2
SHA1494f630393d9a99f00f17a152fbb17a29d07a135
SHA256a25b911128cb204ec1fd00e240410506ea1a4d631c445ddacad960b355467cb4
SHA512038fe5dec62e93aa204bc49f24b43d75bbfc11190a0155be2e9dc0cef918e4985646f4a0af2b69aa924c613581d26afb22db672d3c453b89c00c3b9fbe54003d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aaa3365be304f9c6a80d102c5ae2caf
SHA1080a5920aaa5e61d76aa679d31b68f305a20c60a
SHA25664db4e80f0a3c3ac37a1ff1753861ef293d138d241d1f4ed4da788ed8e99476f
SHA51264fb3d72c06d4fd0f08255d8231270770be732345a0d59457382f648797d1442c93475d16c38bdf2cb2772296aca52c08550ce99482308cc0e19bc5ab5243f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b05d33431c5c026d7b7afc2db32009
SHA1c33513ab7634771ddb850a4605807cff095e4e57
SHA2566a2af1946aa89d38866b263d285886d76a0b7efc44d492f4e776f1c1d65f8275
SHA51237c1c6a643aa5337cc0a944e044139cc8d863a9eacf6f4f2471fb4dbac12408c6d8cbfc8969ea23ff3826da5144796947f4111aeb6eb7fa21755b7a8af49939e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654c7ffc4d760089fabff9f74608deee
SHA12f28400fd3d17fb500ce4edd8c99a133c051c7e6
SHA256279136cb27770f11d25ece900eac10d5dd4f4e0363f54d11a946beff1fef6c94
SHA5127c723798749f4ac42ce32a277c4bfe1c0ee7c125956ac661396e84a66c051c0ec60c64c4576d1fca1e5d3af871170091de7e476aa9e9eb82652944d495a68460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6ddcb39e16ec63fd8fb8ec21944b2f
SHA193b82688154080a83351ef54ec53327c4cab5483
SHA256dd0a3111c266dc0c5135429b51bab54190bc4b704b54340ff5c10fefa06ba9e4
SHA512284be8bfbf66adad07a208ef3eaac31067b9cb324ab076e45daff922331b4adb88a2b80944dded1e7632d3ad08af0cc69933d62e687bfd87d22464a8f73adacf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b