Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
eb50ea6f46b0784c87cd0a01ea80726f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb50ea6f46b0784c87cd0a01ea80726f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb50ea6f46b0784c87cd0a01ea80726f_JaffaCakes118.html
-
Size
172KB
-
MD5
eb50ea6f46b0784c87cd0a01ea80726f
-
SHA1
d1c3c2113223f412db16d72a477a87361f20600d
-
SHA256
194feddef89a794740f968c76747732ee745e5d4c8fa92f29e17cd96064d6eca
-
SHA512
81b013b10f0c2f615042217bc0ff619382842decacdd2bde5ff428f99d5a80a1157f7822aa52e61bfacb7acf712dc8a8d31c409aa66507fc9700900921158fb4
-
SSDEEP
3072:SX3SGvhdduvGcGvIloorKXiggcRaiwMTYdpAYjq6gHEDNLY81Djtf551yfkMY+BL:SHTvhdduvGcGvIloorKXiggcRaiwMTYg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001348f2eeb501d440363339bdbc7e166be3deeec4cf5e57a647bdc0c640db5e7a000000000e800000000200002000000066d0ac1d8df787393753a34f65b6037215d35d861550c18bbec540de573f8897900000001a679a88cfd245349b3918b4c605a3165d67d3322565b13ef16a8d4c3c4970a415ce96eeb6ba21bb47e452978ee59c2f9f8f83703aedd1320762442142213dbb9ea453d458c2e74ca1d8dfefa7fa79ab7978119c3e4fa668f949da20c6973db224f924892fc243c0b5c02580b6397d22b5af4ab40c820e37547a37c24e16ce5f009a9fc4f750ad2f181709b3a7ef46884000000061d16ff0ef3f92ee784ee8ff687c4cf4b1a1d640097dca576f88b533f3c76745a903e57f0aec83b554617c4068e7514c308dbcddabdb215bb52b7da93b48dbb5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432910116" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000064d6cb275a03e7faf2e1d24895ffa315d5b5c3440c38570b29e6cdaeb9b44a98000000000e80000000020000200000000796791a885e1d2f9b42c3d2f384f54d04dbad0432167ac44276380cac3c691220000000df2bd7f94d473818c993c8af7fc17a4f3201cc2ee186caf79561fb9bcbaddb7c4000000057d7f08acb7123430a7c488ae4ee63d23703dce68874d3bb85756acc0f152e309a8fd9b71ae1342df3dfc2ec526a6d44ad3a43e124431c07a1a519435aa23a3d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203038f88d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23AAD641-7681-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3052 2976 iexplore.exe 30 PID 2976 wrote to memory of 3052 2976 iexplore.exe 30 PID 2976 wrote to memory of 3052 2976 iexplore.exe 30 PID 2976 wrote to memory of 3052 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb50ea6f46b0784c87cd0a01ea80726f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57766161a04939d547cee240db7ec1b87
SHA133ca82d90445ce4aab323307f9cdcdc51eb3c1ea
SHA25634b80305a0ea8ce1dbb5dbb8d34c9525ef1875d384e7d538fdebadfe2804cb73
SHA512fe3713e6e04ce45ceee47ef40cef5d604d21750a7f4473b20f42a72667d4d9c03f979d46ec65b0d3db580f2332b1cd3ef8cba8500826257afe179a678de81937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b28a25881bc54190c339dd6315dd04
SHA15f5028aa291dbd95fdbf89b2c7edeb50cb67a781
SHA25606569010bed17dc9c448b90efcc104f3f3b672c69b46a1e8ada5cf2e16c993fd
SHA51284969e70bf7cafdd5471b7ac0790faa9ecef81c1df2cd41baa02d6154865f670a5aa77c905d23cc58e6f548040f6f077c9f7a924efa5f6cbafaab465859c5217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989941c6c3bdccc087419f3b8511990d
SHA16abb59d0996347dab942d4c0e5e29892dc803461
SHA25661f044c373c039dba75f608f8102d356df46f508a092ecf3056818d50fec46cf
SHA5127097b1596c2bba32d3b9d3a5c9f0cda3d0806962d7c5a73510c06632b35f9afe3c0416057de372aeba7053d07d2d29ccb7e32c0b303e58da15ff3e50b5c2a118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784047554bb55e162f9cfabc8516d2d0
SHA11985168792c2ce5ee47f26122cfbd9f0aa0ee729
SHA256a1b880fe458d4c964b264f2d05f8097da5b6be2e332f9db3ab0af6eeae126cd3
SHA512c14457a2119bbee0d81e7cf833792aac02b81e4ac945602b32ab34217470aae7719f71d8eeb49b5018100bce908047509cbfdd9ea38d7c5a933c45d0962944ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d7aecb4d08ea6b89d6c33f48cd2037
SHA1a2fa03f624ddc819dcd1b83748dc3517a77039b0
SHA2563608a8a4ffd295c036d665eebf301f0242f163aea61dfbab892b8e035fd27345
SHA512adab642a70a12e5d5436a5c41dca319c6b83b318478cbc963461867d6a525ad43e1625359c46de802310ac793ce7a12fc9fdbee63bf72c423c92206410004479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e6b46f2c1172044e6609ea148671f6
SHA1e024ad21304d6fe5e44a258f40fd0907f1d040bb
SHA25617b40ad9ad3ffae4c691643b8c6bf7206374ff2b9599da4bc1ed835d0a1e1148
SHA5125a9357734e17ac8a4de1fe41a29775db79128ee48832c6e26a2866d226a6ac0e6e59c8837008d7d818c18ce25877c0bc47d60103376fe937649448f0b3940638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85199480e60bd44630cfcf143b0764b
SHA1c701ba10454bf6abc5f41c16843e07d670444d79
SHA25658ff0981f68b5968d56f8e43798da882321658afc181213fc4509f5b070cf9a4
SHA5127308519a556dfec44ade47d0582bf2954b199d2096ebd49a3223bae39b72d23b7431ad2772101c3f453ca1f31bcbc5f183191c650f065b4ebf309e78c40600e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c64ca6e0ba7d3f6e9ec9a4a0c910027
SHA1ba18abbffc1115d769246a2cc5268e495f01be13
SHA2564f7e53fab197efb97fd794d8ebac24a35dcda72643262d31b1a2b5c292bf280e
SHA512b84122f8bae54a3c41a8da45d2308be39c7a37234e22dcb7e430f06ae82c97442a2b5d7a5873f7a4bc5c62b6eb7aedfab2ab41f2597edc86dc9c7480f2f210c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf020b5f41b7a7ccb5852cf67efbba3
SHA1cefae7dbc4d321acec2302b2d04e015456f01b3b
SHA25657e5d5e84f8c5fb2c2f2ad0a128d06c5c5c39048d67773a082af3423fda1db50
SHA512c31f43f35f1f19a272767500dbdeb85b8e030903b8d43f27312966eeb3fc3a93b9984365cc6e34f63728bdfff2ea0ec4396e95c01c709f24f9654940f45ac977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c933705128453f3dc94994b25ea172
SHA1d54ccbfcf4271e0e4e9396339405411ebd972f12
SHA2561f282a62b0c60108eb0d409d4b49728d22ab7ea33f464b03be535ab781892377
SHA5127024364151f918fd5556a466c75b13ccdfcfa68770908ec2a2bc8b685d1f312651e428b47f20f64501b6a99d6d3fad3e7fdbc0efd8ea59595f1328633975d056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7b4c850c393fdb45010adc618a9f25
SHA148e0ab35165425a7421bf0816532ea1e99420ec3
SHA2569fdb37f74bc0b60d1e29b992554cca78631471b328ea479fa520adeb61b090ae
SHA512464454ca956056c0698d22bf179b252cd2eefd4145a91324762b2f7f7dd12969f34d2d11a70664083d7f3266c03d322a991c8667359436a7e396b1ecb3d9466b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5243044521a2801b8fdb630a4081958
SHA19cefdc182abcaf904feb375064159fd193ee7c66
SHA256830f489a075a1647e86a465e552f7289d76cc923e0efa75d128aa04fcca1273e
SHA5124117e81257ec844eba2aeaf58324f29ef23d40a179aef05145d819aafbe315a0f85cc3f04decb99220a3c6c013d4b14fb366a8c17dac66d0bf4a3b79c8655770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c5e70160431c18c9ef30a851a11a32
SHA1b97b25e6816d3e04d97ba33d4b0a915f74ffa2bc
SHA25629c77087fa80787003c386188765327edfb254d6263417500bff085e11699924
SHA512f9f0ed5a16c96bb09ecad1e3c0be177384e9d30009696537bb3cac450e8a62fd7450cea7f4465dfa9630c2394e0afc74becb176d2202d2bed81a2dab28532e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53baf13c075d31fe362959d83481c6fc8
SHA1d8c031a2618bf30a524323a49f0fb4186c0b094d
SHA256e9b1a638fd1cbb841a7ba23d5dc7a73c5387e7ad2d98eff7d5359c789208168d
SHA512ae4fa8e49a45b4298b36b18db2dacd5d1ea3b6004155f537a57bc4a6ff89bcc908ce50dccfa89bbf27c6d209c92d5d76cbbc26bce0267a63fd358a38b3e12b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ba92fbce79033cd4978d0b94429de9
SHA1332d7df58c678103452cbd18ede75a8b5c5d4d7d
SHA2569b83e605c4e473a70abc6e2e8b354ac8272d7f7132231bb999660c7570c906cb
SHA512c1a32ab70c1fc6a8a1f706d211f0995e4199360c15d3fc32c168042a9a3eb0426194e250804efe24a38cd73b55cdc0679f37df78086f0e21696843927a56c4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f854918ea1c4f0291907614b23a20f
SHA16e034fc929c3ae65873d827e001f7bdbb62b0fd7
SHA2566f5e28f1490e28d8ef9f129ebc9b30af19fa285e8ed700c980e3edb3291464c1
SHA512ff42f0bfb9db188b9ec56b0715e703a5a1e701ddc5263807feaea4b5d7d70c823062503cdb92df30196262f1cda47279167cd81f09ee092fdfbbb8ff7dd21105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e4e3bed70dc73048794acf5d6ef990
SHA144963ea20a269a1df9e4611fc55e5f2017666159
SHA256f2987d83213dcdf608497b93a5338b2081f60d71fa2c3eb2e79d0d242a802353
SHA5126bedaea0aad2817245b326690f59994eadc99012d1dd501fab90c8a0edf621ac1eba40582f2698ac2bf268d99ba97dd6c9a926c382ffbf12a863173ae3868044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1802850e664dddef6559cf23238a1b
SHA137b486aea474c097859c33369b36e7f809fadcce
SHA25673b7745710b20d334c6d564672326deaf931bf97b3d05a1d643ccd2a5d4bd0ca
SHA512abd6b4782384712781054d6295b7d3bd1637b0584501011aa66990ccd66a7c845041e5221fcc3bc4c9b4d058092498e608e3af2d4d723f530a0148640713f276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54027a81e95a64ac26c348ff3be90cb46
SHA1c3bb3bc2fc35ad9a7a6052797f05eb065cfe22e9
SHA25602ba3e673a914e9fc3a91756d95990fde4a246d1d4351533190de7bc274a9494
SHA5129d8876b2e4c0f411755ba21e4c6fe7dc8711b7364baf086191f871c94737379f5e1c2392a5a66be03008c6399cbdb468d708475bb613561963b5e5b243a35161
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b