Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
f0b6b99d5d0488e64ccc91a5d5d193d1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0b6b99d5d0488e64ccc91a5d5d193d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0b6b99d5d0488e64ccc91a5d5d193d1_JaffaCakes118.html
-
Size
23KB
-
MD5
f0b6b99d5d0488e64ccc91a5d5d193d1
-
SHA1
acaeb898af0d57cda0780239361abd82da508e1c
-
SHA256
3ea40e017c56ea97cf35035f2b61fd52e8d07c32652c5c7ecbe1781775dbb546
-
SHA512
3ff1cc094680b4c237615d5b723314efe05aac3b5b0a66ff8e6acbd17eb72f5a9beefb147817cb564c517c882e84ff27975c6507f0aca3d0a2a2d56de3730b2f
-
SSDEEP
192:uWgtXev2xWQjb5nV6xfRdggwIMlqehnQjxn5Q/vXnQie7yNnNkrnQOkEntZLqIng:dQ/iYO2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006bf7218ad0b19356d3348244167134df30df53f017e3c83a03a3e05d7ade5883000000000e8000000002000020000000d5e3b2e982937dfcf951d0fd0bd5d6577e283797d0cd86ee381278917f9e85a79000000099aaf68483df2d3309779ca7807700e2d6dfbd30c824624e121474f4ad8941f49dea2515bdb9355ef6292e79d3dd5bca1c1bd15a765370a5c30883f99479780d45fe299ef2f6643df1c2cab722c5d69caa5dc14f9d37234782620042c103cd2f59b795e1981d55247c3c20c0bc48b529f4a8cbc6d6a06786faa190f0416ec8155e355bc4b9b35f6b92e31244d377daa440000000d223e4bde80ba6505039760b5e2f38d77e30a8c11856b2e01210ee8d8375f0264d36a2a470806ebe4d437a672e2da28d165167a79376dba8c9b7dd684a7b55e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE1B6371-7866-11EF-A02E-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004535833f6b78cd32aedac6658e03f2754dbe04cc7a5708484253a1fd22681c14000000000e800000000200002000000045b7292c920e2884786d2d0ddb63dd33ed225a69c9f56ec379d170dccbed802020000000afcf6cbb5591e5b20dcaaf29340578d2dec25c30405554aeef495c5cf5ddfe26400000005504cfe42665665cb29c809a91cfa2a2cb042c60007633e4dc3d5d8ae65d5885916e309f8441bfb9549d8cc89e8debffe389fd71baae3823c92c6da08d47a2ec iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cf5494730cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433118681" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2960 2496 iexplore.exe 30 PID 2496 wrote to memory of 2960 2496 iexplore.exe 30 PID 2496 wrote to memory of 2960 2496 iexplore.exe 30 PID 2496 wrote to memory of 2960 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0b6b99d5d0488e64ccc91a5d5d193d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdcd875081a3fd159e62b853282a1ad
SHA1c0d5a4123dd7fc270ae983e5058c957a8828070e
SHA2565c599f36d5b08ef238cd8f940a43435f0030324ae9b05ac2917769c0be51b200
SHA5126ee3e758806629a9f04c146c6ee72bb542f845f44e1711d5b34152d76e614ccc2000a05caffcdadbd3079afa5db526262aa012373f16c0ef5dbe737b4e9cd32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339d1c7c252d496f1c21e93547c98809
SHA1bc9fd1d0d9e2315794977f9c8d49977628014069
SHA25616f24bd25b92bdcb178116a651c56a50f9906cfe73a8497eb55ec0db02104089
SHA512a1a56e658c6dc916fd7db9f2889b222b7d812443e79508b3af618b8095a701ecfe52a28979e8078f688d48d9f2de15a1375f08f7860969e55865b4bd4c1a9fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0b9bf627213b82f0b7b7ecebe4f95d
SHA1d5cde7d72342b8f8032ea0bc92727ac73ace9558
SHA25634e88252297c16cd3cc58badc7071b391250189289ce994bd235172b1ad1523a
SHA512e6031acd5348ce52c1adab25804480ea73d2bdc15d626b0ab14612e62abf2c81a408e7222bb1bd6a992ee0b0f664a6340143c933ea2aa18cee96e44eecaeed13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310dce9739931bb124bbdd45af9f99d5
SHA14938a7786181b527d661072985b71ab00045c84b
SHA2567b15c3f91396dc1e8c2cf10a35b131684061eb5caa196d0fc352098d4e442cc2
SHA512c408ad0a86ba3baae3848020f3f168fd60fcdfe8e81f99085446417ebee16a31f0015c2d7f1893c985f45926dc2763db98f42def5d381ea65bf732ef18a24d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def3ffd8cc1784f1ca5e64e08747aece
SHA177eb582df14862986d7f062e5b3899e77a8e2286
SHA2567ea7cd00aca77c0d091063613d3f1896c5053fabeb63201b32d4631552cb5af2
SHA512dce046f84b97f97991ed01f64998f15521ce8997f4b54c667a69c56fb25acd4312398b05337af8e60a650162a94835137a04974d2a3847648f0587c47f416b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bd7225ecd5eb6875de441b11c5eee8
SHA1464746d0d17582686970c24556b602f96ed0e9ff
SHA2566ce3d25a77f7dceac0855bc85d78c2889151e11b8c570e82da7e10d32f13882a
SHA51200d54435d0fab6306714d3c91920bba6eb16791787033935a76f6d423080075ca5497591640ade1de83c1c0c2b203e172c4f76060a653ffff8a8d3e658b8ae6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c543c71584426d13463a67577bf8f232
SHA121caed2e1b162e657298c655f998976561db9610
SHA25679fdf0e60202f6dd7e4afe5ad18334062ed10b5e12299b019d41fe6ef55ded2b
SHA5124a8b89e05f352bba94d9dbafbce76fa51a2d323cc478fe033a129f0f1662ceca7e0a030eccfa2ced9c10695b7af1bdc5e7e204b3d2eaed5a07b0194aac5d000a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf8b73daf5604531aba6266be8b2182
SHA15434f2cac0646ae5759b51ddd81210de80b0d48a
SHA256d86b7d90ec40cfbc6b460460b58bc5ac07dbba53a45e195dad79131393eb236b
SHA512fec5077be9a087ef11c16b0d0f8e1e04a4c84c6303d4fd2fe7fefdba1cd1031e181dd7a09d029b149672c782d517ea0fc135cf25d41d16d4c004205ee950291a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851d3bfa1c414bc202dde6e53ec649e5
SHA1150c41251ebe46753dd9ffd796690510bdeeb551
SHA256dc5f6c7ee9f01b133e0cf98b7aa19cc5687c4e6c66f789769193c158bf14c1f5
SHA51247e7489353a3fcf95b1ebf7000ab73e7f6d3c81da50a0051079c09ca58b765439cfa8a1e718b93daf4c3ad37abd2a97593177b2ad83a0452bf921b3a87d77b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3cdfcab5dfcfd00130922daff91ce1a
SHA1487e7a833730925fdc7c0cdac4c778e16b6414c1
SHA256fdcbf329aeacaae3020e1cb9ca969c6ec7f31042f6d2339c8471b84205789ff2
SHA512b0bb0b1f90a80f3c68f25bcea8e6be36612652246910c22bcdcc08dd5888214621c8e8b749dcbad87838126cefa9afd758ab031e4e05e832f6fed924ddecb8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db0ca65e47023a17e4e5bcb4c136cd4
SHA1479922df78790bf6d5b9c12be8b14ee1b765e565
SHA256f2aba6441c179db2d28a0523690d207cd3216835228643a296de939f5870a559
SHA51260f2729817a9a4194aa884dc30169062ff104695606a6f33d47015b8cf7d8239ef48a41dd4835970f9f26bcb251bbdc773d8af7af81e4eb868ca092d6f9f5241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eb9303026926c4c4abbd80d1068049
SHA16a282521e6670b232c08fe3d0d8e1d6f0df7caf3
SHA256aa099d3c18724c254258dd71f65f5be8a2a32c4a2c7c4be500338ae3e8dc31f8
SHA512639f763833b14f9c4f07cdf8b77e49017c0080f7a8ecf5a99931498154271ea3933e7b2deda50e477c9fb632030cebb4b92140d527ef78976e40bbc269cf0d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ae4cc8d13ed2342d45af48a17c0ccb
SHA1d74e7fd9f39a3fa5ec20fe466a2f91c974c4bfbc
SHA25611decac5f818a6824425d6c41f7b4b3372c00668eaac4b2e06237d0e7a54481f
SHA512759c6b9cc2392ca3dabff182e6e5bb271a6b0c2d70123a57de19115349b3aeeb1db09e6e1287f7b7ac0e45c5234ed8a44a46b947f8d46acbb821f9a5f68868ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eff9ae1acec36df3388d3a00b34250e
SHA130bfc96c556c096875dcdc087721a1e479799291
SHA25633ceb8443c2c097317bd5c887167b05025ef5fab2b162a36b9a146e98e7885ed
SHA512895bbc620475f42f6b0a8d1df49a61acf08358d7b0b2441405de308c875bb25536cb38d6965ad9514a20192c2fbbfda189876d201b7e52bd473568174401fe12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de00c9f0a879bb3d187d404512045d30
SHA173c30f3612bf37241f977eb64aaa11e57bfd6a92
SHA256ee20bb97ef02553d9e8f5324767376d128efa081a095dd4f55696587522608c7
SHA512acf3730fbb8717e16a125e0f06a6398b3d596498eef17c3884b0c49ab499d5faecdc92903a5ec051e925363a10eb6595b194f1c180c24728a2ea8d70084f7611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bf7b5cf28f52302036e12e1ce6bd0f
SHA10ff393890a119224f4c32f1080a55422173c929d
SHA256a1bf4d3f510b0d7abe74d0a8d5586b422e9ab1e93badf5249ccb3e742c3bcc6e
SHA51294bd6268d8d884a1f0993e8c68884dfcbe3eec3daf680195b18cda900f8056f4b35f343a2c87168c4cab6d5c21d1e39fa4735b2b5afd268e0638a7e6b33a7d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523326a9d97580d9836b0c17266362676
SHA10d284705897f55e9f2d125f61630a8bb2eab10a4
SHA256fc15944eb8132fe0d8fbc45ad02d50ec900b4d30f7055020fe4ab3a4ed6ed395
SHA512a0e1636b35542b7320d95a433909ad72e89537076896cb2fae9da0a0f37cd534aa200f77c37629bab620f24caa47d4fe5fc023bfd2d9e9c8aba5c06994566726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de48b76316bfa47c9748addf2137e20c
SHA1ca376afad865cecd983d0bc67272b090fd64efdf
SHA256bff86ca73f6ea7b6f9f3b5b54f0c5a30155c2dc987969d3e2fad6b1ff9f02dfd
SHA512cd66ab2227dbec6c835601fcf365c080ce26dd3fe9ba61bf886909cf8e697b82da69fc14d5e65e2e2bbd80383d243aa05cf439b203097f0be62acadc53274585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8938f29e38ad2c8959288332387b28
SHA182c0d7e578e0ff7a40421a5b813059e2a51572d8
SHA256753628f568c1b3ad20dad9f290a3c493860eb57404af9ff7724ca8a6ea9ddc5e
SHA5126636838996f0ce905fab18b194d9f2fd13f7af37de4ecdb52f716932cd17720b492807dc3e5845a22a81c9843377fee902b23470f5b1a2dbcdea46a08a226d62
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b