Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
eab2d5f561a9118b96a3379d8d66da5f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab2d5f561a9118b96a3379d8d66da5f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab2d5f561a9118b96a3379d8d66da5f_JaffaCakes118.html
-
Size
51KB
-
MD5
eab2d5f561a9118b96a3379d8d66da5f
-
SHA1
e09201f84770c0649d969f12e6aa20ea1ad43a61
-
SHA256
80b6298d9fc9064edd951308917d56bf46f714c0c985ea3224777e0063f15e72
-
SHA512
4a7f79b84680f2bc18cbba0b1de1061276971285343013e57fa7ac7b22664ea95d7b645bab1a14355ef606aea5628dc90c9f2a49205f1e1d23649c0446fd0620
-
SSDEEP
1536:qq9lH7ItB0I13HKCo0i5qUHPVmWvgLU/WQNJTcNXC+3vb+e4IPRDww:T9lH7ItBRu+/b+uRDww
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B212C231-764A-11EF-B6DF-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e4edf63f51a6920bca2feb3d2221189509cf9411bf49a6c5022b4030d1cfd40f000000000e8000000002000020000000278ec4a17c33aa1041ae55c5be1ad78333919e558ef92727e8fab227d8378b539000000044a0ea14cbd806e42bc3acd8f059bfad1c6dc0cb400fbf111f9768eabfe9d2c2ab6c3e058e75ca75a2cf5ba32a75a67752ea2cbf4eca52aa4cb729a15a29d5af575b0e7b2deefdda25db5c907376ededba7779d83370a21f74fac1483bb3de2240d15359a7ee525606dd78f8e669d1d2ec34e7e616a2b1de0565f9735992ec8cbfbbb8148dd40366f14deb8f4156c83d40000000399d8c32c0609d5ba888016c434435aa766b9f6d7a261615cc78ebd5f3e9b56b941ec0c0768cde23cc8f47ce76e7ba377bf2fda6b19b59b2fcdd2171250a9740 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50632e8a570adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001c1541aa1f200974ed9c007d746c526f2b2d1fea78f812f4be2846195a537207000000000e80000000020000200000008b6016b26d22176991e78aaf89d839ab8bca21acf1a4e2f7afda6aeb334f8bcc20000000ef6a5bdffe7f4ef12e6fc73829ded9b828bc43aa8705bbec1404be10992c374140000000c4d2f3abfb3187d1278b65f7710df18a3a17b341b937bde0a5e86f76911a48ae0a43aad3d8f391f42e635cc780772fed6fbae09700e370b49f6b5f3ee3d01f87 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab2d5f561a9118b96a3379d8d66da5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD5117b6c44cf5c1f12cebb55880c044b1b
SHA1b83e6fa63bd85fe3412c726c89ba725f3cc4cbef
SHA256d77fc966234be1cb1a78ad6bb9e1131419d709106636986edd5bf22db9a8b4f3
SHA5124c74739c2463bd47d1742b4b24c36732aae5854d0a7d56546449f929f1fee841a6e387db644792a24a8b11673c3b4a59310c0e1df5206ab545e47ecf60310439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532f8af4ab9e35bbde21462ca91730b5
SHA1c29292b5ebc1e43c8cd42e6197252b98b0658a1b
SHA2567ee32fbe5af6afb8730bd956f99529ce53b883de1bbfa96a71aed25dc4c15f47
SHA51205ef9097e36e2b059eaab4bb2f6f102af0c18f93f4a0a2f8dbc4a05c7c4c4356813ab880428fc949a0382bccae698a088cbe24fdb7acbe6d52bb9a5d849d4b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8842f57a7a4e71b6f1d0c6ca79e940b
SHA1bef9ae80d2e9b5bfe156c9cc367e5d591526b55b
SHA256808e203473838534fce18691e1088fc4d0ff48ed2f8204e1166e1017c1c570ed
SHA5125c9477a5a5de3581ff2ee6929c0879bfa96688d0f9d226efcea9c78db4b928d3b2a8a9c4445b7176ab9d8f30991b7e6ff6e0930c396dcae547367184612a7087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561500874df46271aa859310aef9d9cc1
SHA1dba829956f34b44ded9ba1e5e7d86242589f1764
SHA2562298a30d5bac98d594a6f90ffcaa9b938f5f750aee658f1266fb020b36365778
SHA51215799ebc202ff0da8d66d87a5bcb46e4585ed25037fbe0289368025b1bce3234456f630885d76e37b6d02adbee08ecfd12af85b2785b48e09c1e7f62062a8a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fc5c0a6490d379b5284d0ab721f049
SHA11c27605456569806138ae68cf00b642af8c7b6de
SHA256af19d8b6151f4525e8d2da9a62770d42af743dc4b621ffc474044edd12404149
SHA512d19f6a414b053ac07b032669d4bc28099ea8e62172ac693d900320076e3d90930d1aa866ceef37de751bdcbabf6580155f0842ccd653dfd022f83d91a0dfed35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57666f605fea60ceac7c6e1b6adf54d6a
SHA15d116e44ffc59c8f51e0300b6a0c46e550767f4b
SHA2569bee38efc8942934dcc4c09255102ddfb46b25057cc57729a7914d93c91ad952
SHA5121fcdc6b76b642e437d650e4f54c3185c5ea2cf4312f326aaa2166cdc01f5b68e622efe5c6591f609510172cd90108985b7fabd4121fcdafd691e71fbf4d1dc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3e18a82acd5810d5b8178f65161f4b
SHA174ebe85c88a1c6294c3619fc24c5aa20ef7cd820
SHA256dcb34a84af68e5ac35b76a21475c79efd76126d49521ca2a5a82b54e9fa6ccb3
SHA512a3e799476da76fbd43f42e040ab4f00d177463161c27289adbdab68dcc469cd2e2babef3f6b5f3a8d9b47371c95194a6a8e0b77025c48febeb8848f1fda70ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4f735ea2660f83f04de4dc8363d4a8
SHA1e73a47a66fcc700e8dbcd67a20ef1dc6953ecc57
SHA2566fd7354e675b8312a5abecd57d162291c1dcc5a2ef9d67dde71f555c287f702d
SHA5123569a2f083aa20e38cf8faed8e9935d94388b3986869dc32bddf83e2205315707a94e663b7824b2f7b4b1c233480e9a6f182398bb6d730ef3a027072b710c4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59355529e0408a8a3d56bfa253dc89e03
SHA1932dd8616f279a4a16ef3b6c74c2eacb33aa1f86
SHA256bf986388bb85eb52aebc3efccb4a6e287ab898402deadae46479175eca18dbd0
SHA512e780968f841aa723d95ee36cec0f0d9b4f5daffce02be70ef42b161e1cbc609edddf96ec731d3d0037673b821fe89ba999a0f5b5e5da9fd554974a8367b541ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508defc77d996c536b30ccf6d311b4657
SHA19ab982045bc8eabe88f8c9c8657b4427a2b41eb8
SHA256b3429b49ff2a2948a2d452b3bd2ea1a883fbd76926471880778cdc8ac28ab7ff
SHA512732ff81aeb5140243ac9435007db7c9d1fae61fe739233511c580bceddc5cb4434ab44dfe754536bd377d73996dc1c8ecf39f524fb5d064433d6095063296a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f720aa1dfbfa51c52dcfef2a9325b20d
SHA166af9ade305a7092443b3ce9d2c09ecec61a5fb6
SHA256aabe496e188dcc7bf971c6320838817e23fb8a831276f9e3d155d6df1db5c2df
SHA512fc6566f63d11b96589f4066ddd12d6aafa9c52fda247343f489e78dcb690363ea0d17cb41ad5568b376f5b169e815a47121b2dd60ec0b777bb6da4c13f0d38ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742e1114b69ac0e1fb49d95b2194f99d
SHA1ea7db779c7bdce619d8162077e15609fad019372
SHA2569ada4e859d0bdb42cdbff9e05e677f22e04f827213e86d40b5d516f17002d358
SHA512d9bb2895a1c41d4955f79bf50d4f744b091aa1f2a1c126f8f942eda41675bf8cb8557f568de3816f62ac77c420e1b658abaca50102993f238f6cbccf17f67296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa358ddfa9ed2a9307d137ffc208242
SHA1aeede026136d67e51ab14102f75dee371649a580
SHA256a6f236a8a5b1ed3553b958c797147ddcfed0d8f28d184b1aa049244df091f9af
SHA512b6f7e98dfa4897f37a1a8f4489a842a3a1c6771f5f2bf403dce09886121e5830f2e50928cfe5e59455a00d8ce410968b13f5bbdc4c795e3e111b9d6024db396f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2fcb39f8dcf7b37e2d3f1a4b17b9a18
SHA1e2e90cbed2f72a38f3cead418752c172fdb1ad52
SHA256e68388d3253c981947148dc5253838d879b1bb91730d01dd9d1bff3bc716d48a
SHA512c1c1403cf5a82e1c31b7f637663398006b40f4a3af88e37aeed4438d9e92b3bf02553bedd4597ee623b229def3f5ae3725c98382640fdca18817cda55f9dd124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ff14968121a3f3067a06cbe5f473d1
SHA1c393353e33d958b05d2d7ac86eedf7bf67d24018
SHA25650ce989d54917035c238c1f0b5fd1aa26738dd0cd4b5644e12338a036585abac
SHA512504224184595e4e62d54b744716857554a2be5b16e7ac14690a9b973789d390f8c0ae0b75dcfcdfbaac93a8e5ebc06c85b6b253b2c8ea38d6c878e9606976083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f10612d9baa8800438116f9f25ce4d
SHA1f267bb80b990d037c71caad3698e2463e982b232
SHA25682f6a4b50accca379d9d8e12a82480c64b80354689ef3bc8f7589d8ac7a940d2
SHA512fdd82f98520b34058f3b8fa2c8b905c93845c55089acd3eabfa22ed3eb594f3c2e3238b9ebdb7f50d243eb0cd5c62b219553a7aad58b83e6be2e906d98865f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83a38612f019677380322be010bdcf9
SHA1b9c19e348a0df07904a5b19c392fdf97e6890364
SHA256df8ea5cf053f917248d74249d83eb01e3918444b3418a749160d4140dfffff19
SHA5128a8fb8b929ec05d8bd811654432d186bc14a1d18e370ebcecf0fc161a91a85b6f0fcd21ce02d17177383166b1376694bc8e447d51c51845f74d81b32f340614b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c0f24f3690723785d3facaca1d9abd
SHA1f1f1f0e296cce9a4e5ba97b864774a4e2378bb6f
SHA2566eadc103bb30bb153979337e72e6779db0678af1583d6de14ffc8c71f6066778
SHA51274d673c12eabc2b36067c35e4c1485f2f866e6a7d1fc4ce10f88ca9692ad02d4a4f09e381895ca330c692349ae9f5b69d975ffa0bf62627cab7cb5d8f5a30211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db774fda0cbb451d24e780574fc9f5c6
SHA18add8de53e3f26c8da695dce54b84c2449e017a5
SHA256a6d51a6f202dfd237151198a92c3dc6c8f3bcfdb2c34cefb4f10fc1a306b6771
SHA5126e2cd00574f3f3fe18ff12371652820afcb3b3443f719ca53312c7eb105629aa24d85b27a1efd534448c1a9748dde1a566a2ec57074a13b51ecb5faefcb92aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ee9b738fce451415d30cd96c3034a3
SHA1692ea7f2c944c99fda2e8af08262c49a47fd2a81
SHA256d789b0e74928d4a50cd5dae8982185560bc4449c28a6e63f421a92016eaa57c2
SHA5120f31106d2cab722a8bf3561b0e3fcf0cd1aabdb0fe2859b64884dbcaa656ce67e9a13c5684ca2558115f1d6d4df130793a9847c8382d50539fa70bfb0288f5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32f283b4ee17f7c47339b94cf073f8c
SHA11319432026c4b4448c2a25a24d17fa93ba475bfb
SHA2566e04f1cfba94262ebafcb51dad06dc0cac5cde709a032e3940d085eb9dcb97d0
SHA5124ab994155056e88c3b3887c9eef1f7e1c38a3a4338f4fbca6d7e8c45f81da0a6535fe2a70883c0dc9a846863b4f0774cf50a9ec932873623b125619e86227997
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b