Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
eb47df66963397c6000f55b5b2017575_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb47df66963397c6000f55b5b2017575_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb47df66963397c6000f55b5b2017575_JaffaCakes118.html
-
Size
26KB
-
MD5
eb47df66963397c6000f55b5b2017575
-
SHA1
e122acf5b8f91038bd80079f992aa2c9e43affdb
-
SHA256
010f4c5bd0ea5f2580e3e5c8700059188daa48fe804b95865445709b16635b71
-
SHA512
190e2bc9050917214383a2d6d1461e4f68f091e6436ca0040958ce920d641e1fc126a3589827e753cc7b97b38184a4da2fb57c96dd05b0ee7b215c22b164129d
-
SSDEEP
192:uqdjHJb5nrqnQjxn5Q/anQieBNnqnQOkEnt+yDnQTbn1nQRCJVevo7NtgFo+NzQ3:nZQ/0ygcv/nvX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ae6dd6e33ca703e830596aed5e4e9bbefcde9ee30eca6f8ec6bf4107abe76cab000000000e80000000020000200000002c25b806c85384b23987f0f110578a2dac7824798f2299adae15679ef7b9ec6e90000000427d86db3af40d3bd1b343e01f1d17e11d5b1b8eddfedf90cde9e7a2c762ff19ec970587521de48e81190b9024014b4806f2f7128a6a48a79b97e762397696888a883d0e1aa7342a40a73bdd706df2c295d5c2e0e72265a5972f6ca76cc4855a31df371477277f6aab99f71117782334ac2c3355dca127957a02cea51f84e55a3d0abe3487bed3f5e77e8809ef2368dc400000008ccbefc1f7074ec26c06725cb2c726f25f5bcee7d5549f7860f952e50d0f12ca138e84d3c5bf66aded1f44b7ebef3923c0ebafeabe3f82809f2624d10c34b874 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432908706" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9EDE9A1-767D-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c272af8a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000010f207dda7ec9345fd4823305fb30d136fbccb2406fe9523dcda21f5a5da22a3000000000e80000000020000200000006538ceda4abbeb2a55cb2fbddfd4c726bc892e766b7860b31c771feaca20ae8b200000000e5dcf9991c6cf93d7950b206a25643868db6401977b38be66fff56331ca01ed40000000a928a38816188a5e3b674f58549a245707493d6df0494b0b14b4fcd223b8083f4837358a89a330a8cce8ecaa7f8c8b40f67bfe3df6776c2e8bae615389fae03a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb47df66963397c6000f55b5b2017575_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cc06a7f2580f7cef42ab54fe216cc3
SHA1cbcee2e866010a2e5dddc33daffb77c7403c3f24
SHA25680dc193e2eb76ec3eeb37ade9e47bde23b97aa02d1aee2381f98af31e886f5a8
SHA512f706359661106a87c53023688d816ac7c224896faa54a7654b9902741b78059554fcff5a7ca3a1ae72851198d8b6dbea768931aec203fc3d1501a4943d73034f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1af1a7b482bd809ef76cbee752d7dd
SHA18d5ac576f6761eecff11dc4146bf16957ee2fc50
SHA2568c6ee3aa1e163dfaec01eed3810e39ebd3dea2ca63c6b3194892e0ab5d4c2a86
SHA512de53b1dc5bf1cf51f272ee3cb62b274bd4950d1b6947b3df95fbcf66147d2c8f19489d5b53d644cd1ce904712c9022007a2f333031b517986dc3a71e6d0b53ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beed4184545f32dd852f497454610927
SHA1144a1b74a0842b6c10d15c2c8489085accd541b7
SHA2561294dec00d2b076a46736da7e296e553425ba70d38321bd7793a47c304f41697
SHA5126008756ea0b24eec0a667bae405a6770fcc5b85a8fc0b91cea470ec916447e6402f36edce9b9ab9f07e929350783eb9a5f1873e1fbd9fd01a9a0c1fc2f9d9cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e79095954fc3829fd2034dbad8e02a
SHA19a306a91a9f13b240e94f0c78acd7f52e392b846
SHA256104280a3bfc4d534493bcce7101693d17b8682670e779ed9137c32140494de04
SHA512f3913dcf2b73a1251eb6569c710f1e0bbcb73bc396016a69c5bbbd332799692c784b2a38669c4740532ef3890b3bd7168dfeb799e712c936e83ec153377879c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9699e05900bb0bddb4a7123b67db8e2
SHA1ed09b694226537ce8af7987046f67ac3c72d602d
SHA256e7ee58f13c3ac8d27cc5b70b5729bfa57062d743440e5e566b08242d1492ab06
SHA5122c41e5ca9eb5ab3c91731c11434d76cb577705f3759d59d0526565310eb77433cd335e6dc813c5dd761c5da637f08c16b60253f32d9b8297b866d235be0b26f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554af9726e0c971476bf8c8d4ff25f3bb
SHA15c69bfbd14951700fb50a4f30b0792e58efe4c5d
SHA2566333765683a8f12cecbd7e89cee5111a633399e4f14ed44ff8a9d97aadd86316
SHA51253828c4d4e366c85dfcc136985b420aeb2591166a59dd9811f932fa5e2f0e8719d4601182c9ddb02a530b3bd2705db600501878db95cc1e76e96c3682f9b0272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02b7a9db1d36db8784e688ae2f3b2b7
SHA1829e85ea4bcdca2c5f9d500491c3311e85c0765e
SHA2568625414925bb2f4579c1ef869315552ffed27f1c962fc63346e9f3066973cea0
SHA51286f4f011c5b8eeddeb246d51e2a14ec2e2f3138f356e02f685e9dee313698782b972524a74b8a19bedd1a55d452abb469702bd99b2ae4bda65ef8a0badef9bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52282f2913ef1fe06e4da51d1806e31c2
SHA12fadf9256ab299053895c25fc816145680889479
SHA2565354e5f0d7a1dd41bd980e828d589079fc69eb0c2cb6576edda87b58b4733bd3
SHA512fec59830dc900e4ffc192b89ff5b631b4160faadfd0574cefc4a1bb0f1ab54481e5b6935677d70858d03c58737ba3da08334e438e9c3179d23fb7ef916c065bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d7579aa6dfe6315fc8e363690821d4
SHA1e59c245e5f0449dbb7b7446f0e7a840cdec559b1
SHA2569222f40c1bb2aea599fb1d5a0187bd349d98038b4d6c45def07c5e4730e070b8
SHA512a237470b87108bf6a52c778ce21bde3156f6ac488179e6b5787fb9a4a145369807d6f6e82946c07cb85fe1adf58d73e40bd5e57ad1c9201be732fdb28ab70de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58add7c81406f92ec3a3787ca6637acb1
SHA1ae15825afbd75ef7067d1e5643e06707bffe8ce9
SHA256179c9721748acb9bcc3c8cc0e8259ae3482163e6eb04905195742accce3fbf05
SHA512e08f7efbb96fb0ab970e8bb1b0a7f72c64b7a96026f8998ad0900295c43552b629f19f1cb028ffd4a1b0feaa80608cfdd089a2d6cafd0f5de5055e635921655f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea58e7d06185076ed78f753d5ded4ce
SHA1ad4ebc2a45e1e0cb76d8d21b2556bf8934e1d6db
SHA256e580fb4f889347e49af49d544e92a38e0addc240597a85ef34c500092a8e85fd
SHA5120e3d10f92990bbbdb8d774d135868cfe8120a4f2080d7a9a921b01e15ab7203c923996be83c0c06682b3992ebabf9f78f1b14a3f1e8fd0605e01f37a3ef9f6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b925bd807674e65c6d89b91268b124e9
SHA162dc5a96e27faf8904025f96d8f19d8c6265547e
SHA256414ba53fab82a36e872ad752eb5486cf1462b6901a4ca0d97afe791ef8bf4eaa
SHA5121b902eb08ff7f37343ed383e9403820423d85d46b3f15787b0038825e6049b00a1e948b0f93b0129312660b2f57ef8d2d1fc6195bcf82188fe84f9200dd37242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22b14fd5c5472b8e847c1be9598242b
SHA19873e92d5d908948d40ed81ff8aa3e64f072ae33
SHA2568fa82bcdee011481f6e10a421a48cadadcfa7e16a43cd433222b00c79ef99034
SHA5120a7d4a08f2061d3eaeeda8920310e52bd60bac7f26d5b64f4fd334c8b76c161af70d4b7d58265cf4ad4f66ddd12547bbd5fda87c94be9fde98559fa5505a55b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae53c3230646f59694ce28f49e34ba5
SHA1c0effaf72c0575c4fb7836ed0ca46a0042570dee
SHA25622e692984f61868ffa994ca40c31dfed56417e923ed1578740e90ec0106c0c02
SHA512a770aaff301a1600b020cad83da28004c71b157e3b503bf8869acd4656b2cd8dbabc36edac71ed6f615021d212c2fcf3d09533ffdc2f48f06a177dbf226576fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c26a309ff527ce2cc4d36830f4e1875
SHA1fe26a56cb3ffa2d66158a97de26bb122d7bf8293
SHA2566a1e541c4bd33d195e10236067aa935dfa7556af8cb60081da28cc0067959a3a
SHA512c80d6081585f09c50440f0e0b590bcdf3cfa7858d7b1eabfb41e349738f762341593f7b805fa950d5f1ca27312e296dd4f33e96a6afa5dd26c632da742ed30d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57505de80931f777fd62626e13f5b2eb0
SHA1ab13c4ea5d3e08bd927c4d7653e4b3804267f864
SHA2568f09eb261f90d7a2438de03c0b1c6ece923c35e10ed1b61461c38abb3eb09b4d
SHA5126a0e68b23eab7cd08874a26560d6def50299c2c664ded7a0f9afaa6f4eb3e84a613041dcea86b3ef82f600b8a16d33b6010f517e79a27fcfb49d780534cc6d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcd4af886a33e232629097083d533aa
SHA1833a239a7829c7215d24ffb683360e69fd0377a9
SHA2569c32d0407466b51cdcedd9409a975fab0cd74e060a60633a1b252888edd0594f
SHA512c0f3ccef43677847c0de67f7fc5c0cb7abf5063c6e693e2bb0dd34958e72ed1964261a6ff223999c4630332cc000aeb77061b0a0fc20b4d2ba1b292c417ab150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adda7ad3ef78f4dcbd2d996d60ead4d
SHA104425ec90a8d5950fe9715b3c37cbafbdedd3ba8
SHA2567d2b8f6ed7233e08afe96770dfff30a209b9276582dd2c041887ba469b455c3e
SHA5122c951971c442ff64a15ac15e04dc55a047ec6812ec51253b3761dd2aa87075103d683d604d317778ad136326f8573929c79e7dcacf91e575999e243c5d81a18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51157d962bff15f5e7e57063e3baf628f
SHA15a24164752b9b44d03d5320e243cb5cc0468f34a
SHA256a03ff9f7da35e13191888cfb40cc19a8fe0a9c032962337f686ca616694bf15e
SHA5129c6679d777868068b7279640ad102118589f6cc77eb2f646f8f019859aa08e89aea73e626c74e68eb8d13e57a3a9ba418d56c204e65bec511775faa30722a3a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b