Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html
-
Size
139KB
-
MD5
eaa7babecb80e7e5f1d27e295eedf496
-
SHA1
97532f1f45a3d97491cd7bf2d2ddcf471db431d9
-
SHA256
0443ee11b8e997689c34c638d264ab818123f9c747c108ccb0b197aaef26cf54
-
SHA512
31ab352a7821c1925a4b9fda5e587c167ae002289dc91bf2c20480976a9b7ffc07a37e5cd356a7b61fd274c595680115cc9b91af65b29c6f8bfbfb3637aff91a
-
SSDEEP
1536:SdT/MVleLUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SdLwyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000039e386e1c75d8f0c42f7fd306e4d7f909c11d81c95b9a731c79dad90b3c547000000000e8000000002000020000000db402138c73c4dda6faee41791744c417ac33f25db69700e21442b52610e1d642000000016bae49ff76c144bf22a055199cbd17f997ac5c601dbe7f8274cdd02827d26ce40000000196b34fa9ab77091f4d946f8fa61bd7eea6c2c51fcd6e1c07293ef5d4f4cc64f68c9ea9c2954e5eaa818d34ce820ecd55409d7d078c08a3fc2511c0c7be38421 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000097badd5727878f26d787b2f75e0e441d82372ad2f272eb7b35f2b0142e8d722f000000000e80000000020000200000006a744618afcaaabb1448fe77ee81c3dc62479e95b663f0fa921ce7b526772f4e90000000f040d7aea772f4773eefa120e5907d8f720430bbb2d93542435b58bba3baf8a7e3034e2d85f39d7d33a720533acbd570cf50e4bb8b79054f7c1976d1a6efd160b349e42fc0b170c1e020bb4d306fa74bb43dd7f9c3dc6c65a0b297d1f0c4202df508b6090188d80e2e104fc53499932ede780decffe83a17fdfe386ef9b30689ecd8a3ed28b461d6fd3188dc51abcd7f40000000c29f390c45522edd8b03b440dc87a642e15c040d3427b98331e953b2bd3ff1e57e12645a667f332247eb3ecf77a0488091f6cfc97e41edc6602df9bb83ef4add iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82102091-7646-11EF-86DF-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0083d698530adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 344 IEXPLORE.EXE 344 IEXPLORE.EXE 344 IEXPLORE.EXE 344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 344 2356 iexplore.exe 29 PID 2356 wrote to memory of 344 2356 iexplore.exe 29 PID 2356 wrote to memory of 344 2356 iexplore.exe 29 PID 2356 wrote to memory of 344 2356 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa7babecb80e7e5f1d27e295eedf496_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f78add7a3aa3cc9beee65a177c4505
SHA13270eadb66051d3330f9b479dc403f3c34e662fb
SHA256b00361639fe04f1a2b8e6dc4737a5719c2fd6d98c92f39a012754ad23d896f07
SHA512d80e3a59169507f9fb31d3076e7618373a86547984170d10aeaf82310c1f3ee7884aee9a3b0aff56dea5b633ed15f8ebf4539c14527c321f6dfe521e88b87545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c810ec4fa6d8184cfa5746e338eaf1
SHA104b22ced04fba68dbc2d3973df42ba51310ae80a
SHA256b42efe9cf39ca66848904723d8d5e7472ae58dbf300a4e855f2ee0d0ea7188fa
SHA512ce94db59936ab75a846070764de2b0a93143e0701a047388d23c62436caf63637f6f922fcc079a35a3f6323b1e392a2bdb9cbf3e332d8befd71f43fc7e1829e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a79cc269df8401545274b0e2f03d77
SHA1f8110c06895f1e3e37238f873e9ea365e6f0ca57
SHA256b20e457a4bc323374e2a77b2100047b25733f9d5065da27fa069338809f50534
SHA51257b8d5e6394e4e03203da7bc29389d2d2f15cd0b4beae74d9e4a777275c8063e119c37a74784fe1fbede27796423bca3222090789ea5a77b5e8375b024b7ef39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e92954e4fa1a44f7584c6b0a5355af3
SHA17479591b640ad5a7e2689915bbcf623d0c8aac20
SHA256986fea8c71126dc09c23c24575cd524c3410e1dae7f2b59ba5e0d2f7712224a5
SHA5121ae8def7f6318c77b4daba4152009633ce8953e3e363a8f85be10e3f9b1852edbcaba816c753c9bf457d033489489e9724ad9aeb874a5422d9c536d175490afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcdd7cb59dbcf4b9ea6090877cf39c5
SHA187fd7cb46c21f8bb910433802fb80433a0aba1dc
SHA25681090dc76f4c3d716eb858769ab6ceb08649be441836c1b70869d1682945c20b
SHA5126618de3afff9eda63ea6885ede2ca737a7db38517282d1414a8e274b7dff354fd98ddbdfc2423e70d1ecddb5aa77aaae1eacb9e24f0c4d690455ff1fbd52e305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d608b05849c434ba9448ee00ac4fdc2e
SHA14a9fcfca7383e294d4d594b9148977863e264e6d
SHA2563c6d7bbd2d8377b44809ff07f8d43d6902bace043a380f11196ed79d2ba5194f
SHA512bf5cb521d6fe387dfa36b7975ad5b81ada689ef1c9a679d2e3db3eccbc22a6f7375ead7c1e2d87a8042e6bed986f79af58ae45ddc92162263228242404aac5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60b72550b92ff1cf79a6780cba8c1f2
SHA12238de2fc0b39c317d40e719c32f69f3f8844048
SHA2561274eaa68d107e48821e7958daf26e9de31bdcd209145793c7765a3173615c5e
SHA5123ee76dae7c2f497c527d8925cf5d08db805d55d7a9bace449a6c265d056a3d01ccc287ddf8630e0ef55ccf79d8cf4fff4bc6c10c2020b8fcf87abcb311822518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fbeb8ccee5ee534655acc0ed84deb3
SHA1ca8f79cfac16038b1e29b06686271de5cc0c0fc9
SHA2560681ea1c01973e235f6910981b5760c0d63c676e5881e201271b163bd56c0b83
SHA512b100e80a927f9b99a1a1bbbc1b8629867a2bf88f88feaf68293d3291c250ac0910ccd844f664e59a4be8fd12e3c56f7234a1988e8e73845df9009f160741d25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572306347ae2e1e96810805164bd842bf
SHA1cf7405f2bad32d12f8c8c85b664e11ef672cdac6
SHA256da09d8ded5ed2a8bfc7c806cc84b97680031f66b8a8d29e16d7970edb7a8d86b
SHA5127728fa319f591eb30b459b0cb43b2cbd5ddd08722ebbfc6b0e358104ce46fcf96429246c000d58af684a74302fca1294480c008b064db6739004e0a710745256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb9f02b9f48fe8cd5f0f99b44bc4aa5
SHA1c9a66b60d4835e26a0dc91aa539df3da5530ba1b
SHA256ce548bd10532569a1bbc2e19e58a1e0a4254a7bd1a0eed6cf23ae96743abde16
SHA512cf53e07e16e059870584cd666f9a54720428ae39345a3feebbd0001ce2c0a768ef1883ca8b966146f9692d390b8715b7678b6f8f886d4c9f83a43f3b00dfac26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8760b7b6843b48264a7ba52db149e1
SHA18ab11dc0a19d705c59a7782a4a368b4b9b93840b
SHA25672bcc48e1e60ec8cd1918e04c081b67cff7f8b2d5212ccdaf8ac40abad7a4aba
SHA51275de4397e32b7d5e85fd059ea9b2218527704a55b870773b1407a3ad1038c478c0c257fc6a23e570b7378c6c12256d8f376ef192286993c4a7cb3d3493d5e050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01250db13b11de079176e459f864c6a
SHA197b8a1febb6d2c0661acbe5f8d58cbb38c7de3cd
SHA256872c3b97066882a3eb671b357a63450a46f907de1ce2da6437ca46f26b34a68d
SHA512d71c5c5daa3809796def296d049c79bcce243558caa959cf5495040540968deb019fb9acd23e91dacc2d64e92853110596ec59d180988abfe7dea5b9f56f4fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efaf9144007ed5db42337df823f4817f
SHA1db7e0c299cd5950548fd50a612e60075263df512
SHA2569a123d04009b6c5dd73555e9b2524240b4d4af28d073e901363ff78fabe3feda
SHA5123b61077d7f5c94715717390f2814a4555f82cc25cced6c5ce42e54cb1c5eb6809f858d5449445b819a985fe1ee0ba3579b410135cee5bf2b9015fdde4693df86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f9d5a911587fdbb626f54ca612a833
SHA13a56a6e4e266bd4e30d7a0bb88fbcb02c134b51d
SHA256b404ba7f1126acdfa8f689a0b0afa62ba0c692b790b5c36c983adad2f6964e9b
SHA512fa63c7d0af14fa054063d011b8ecaacb573f23cd333ce8499761d3515105862347c0593276639f2864ab10594e49454b072615e827bcee7dae45a6db69283645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f6dbc35626469f80fab7ed9d939848
SHA19da6053aa938d20b4669b8a27973d86c79620f3a
SHA256226b41c19a7d3241d8f2a51f610c33d6af46cffea9e2c58ef7dbad1f9f8c7c90
SHA51220d708335c023b23f16d22dcf62b7faa1684a90f6a681fc650a299b2a9a6ef6006596d5ff8354d1f9500a730a15209973fb57d49c3608c6f11e661682e2b0687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970d29f50d9530c95a03b14db2395681
SHA1949f1b28f8b9dbf079fa7e11e45eac4a75b967d0
SHA2568bae7822d64f263cd68c069801776c58898034ec7bc294273d5e4f442882ce06
SHA51211c10cf0cda6d2e71a1fde33b29d769fa4324b0304705bc9cc707af462dc69855cc7d6dcf2648b334cd5d5c12a40efc07d57c6b3fa9f1908e5573ec6b7251afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8997585050aa13153772782cf59cb5d
SHA12554f9378195add2e5af4560db8150b7209b6437
SHA256bb1c8cb412ba9ddd5f76c4a52b06f72a62014883ead29b162dbed4757caa2721
SHA5120f0c9b9e9431808799e0a9a8e3839127636867266a2ba1c9bd417b923bcbbcce412d062af90502eab60ab8006831ce043df87dec8193d0c59cf16fbdcc6de92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5fb7054c0f0cce63c2a2698a2989d74
SHA1da40cb948e7f8b90cbc56d8f25b2cf9f000f3777
SHA2568637206b4fdb731ebd6eafd713dcd7cf743240398fab265f0916fd881544142b
SHA5127b65222b004052ca24606eeea736229f5657ed74b99fe5bcee17bb34bd40e24092455770f50241becc943fd58410867abe2f77b6c0dbfc9486f6d62f44d5f74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b803896ca78a737cbea96f067f259fe
SHA1d5befbe00cb111018ffcdb22dcf83ca0a139a02e
SHA25618044ebe2736748f96bb50b0540279e7b5f751f18b56afe3f538a2e86aed4e45
SHA512f02fe33077979d4d0819586ee7dbe10a0ca14c69916c45a287ec3bf974ee1ff07ad8e81564073560ac02077eb0b3e21d86c42e4ea8e786eba513a8b2ad821b11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b