Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
ef289244863765934cf182e916bc0ada_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef289244863765934cf182e916bc0ada_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef289244863765934cf182e916bc0ada_JaffaCakes118.html
-
Size
42KB
-
MD5
ef289244863765934cf182e916bc0ada
-
SHA1
fe89208827154f24ae51f7afdc125eea7c35b45e
-
SHA256
f978adb1d34c477abee3f667c123066b58158384f4be6ab87f0a3211fa6f7168
-
SHA512
bfb6dfff75e0b9b4443d3993480862ff63f7fd0bd7ae99c865794304cb30f7f610a26903ffbfbc9b21dd4c9e78e8bea55b26ef6b22e8ab61d6d836eabee78d86
-
SSDEEP
192:uwLlb5nORIdnQjxn5Q/InQierNn70nQOkEntQanQTbn1nQmS/xfUias2POHQZzBQ:SQ/xpMxci5Ce04OmJevjmTW/qVc08uDh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03f5363e80bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433058902" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E6C2D21-77DB-11EF-873B-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b7f2236df771fcb28c438930860637f7fa15765255d1b5efb95754382cd026b4000000000e80000000020000200000006248079772055b4723f2caa6cc5fd9d3a65f4fb66656342bc6e315e253a09f0d9000000048802558a5fb29ad519339b4a5d90d9692d0ce007657371bf4aac887044d25f218dab0407acc0dfb96a99f88faa2384c6a633fe8b643299457856a03010d958a723363eb339131af75c76a663b2cd8cc7dd0a375df102762189c71cafe7df1958c6dfdf75034933d5e913497ed64e03afd0d29f62848299913b36d39f3293a0d7d6738879a03483bf6b18f76d17b28c0400000005ff341be4542e248965f4e2cfac8de72488fa8c561dcf1f7ca2d3bee67fc21c2d47b6ab9abb236860ffeffbcc6658f1e90f6c5c6c72ac67e6dc5cf94af5ae4cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a695edc832958bb5601f1549c2d2513b1e6a3269ebc94ca608bb322780f3748d000000000e8000000002000020000000ce14ec669ad5a3c9a4348b106c5769adfe5ada696801ae66b7f63a7c05228a282000000076b0c8cfcd7d778fbde5362ba8a80cda3493bdec4c38cfb27f3a0fedd275b67b40000000a9d98c14161c74b2bce5e3e7f7125a3ab53e7f40b749a6f6f93eaff7264b0184a92871021fdbac8f4baf811b95504fd2ecd7433a24207ad3bf763248faf21e1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef289244863765934cf182e916bc0ada_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54409e23bd1b5391bfaaa2701b03ee572
SHA126165330f7f20340760f11b20b7bee9a98a7c2c8
SHA2564af6bad08fd8f0e6c0ccc55985046322cebd9990bfbdc1f4a91795129092fed3
SHA51274cf853094527974920f9f7852632d4934632567fd76d7f8e276ac66317806222dc205d5230bc43b7b762cdef3ac4a9f8e4ef504c9bf1c8ec30d92d3dc17c66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92a8204e4726b4928cf525657cdf391
SHA1522e873ca7177483ce8c6e7251084a117d90e614
SHA2565d4e17a2b41f494d61e6f54a35edbc4f77c3381448fa15d63469a010154c6662
SHA512d6569168a7c2a414400f944106116c830df916b38960b71e768c9028d56e0d4e8888a970c5daf3723ece33ea84be74119344657f2354b42932e94788c99c9531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2eac8f993d25aca16062f6b64fd8ae
SHA1e9135fc2187e588c6b3bfba42f6b3d0aefaa5a10
SHA25629288200ccd25031be844b1d753628af4359920f1bdf13fe343e627fbc855f59
SHA512140e177f6e2f6f6214545542077ebcc6c8d969e723cff976dad83e59d8074ebbb295ea8ffb8d5480acf61728f4e0cb19f4a613df8457d8b90998bb0554e78a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971b0e06f296396f71953822d921dc36
SHA1f91206ff0488f154c9c24b174c30f0f8afbad0a7
SHA2567c41cd320fd9a2f9f553126bf31a382dea1fcfb9791d5bc385dd82a0fc495ab1
SHA5125efe04b505d6572315c40020e128d2e860956b690f10ded579a7937d08cf679f568bf4b6b68f90f88a8075af8df3c07cd41898d273d2826cc8f6407306bfae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff68af83f9d46ba09a8e114794087e5a
SHA1b0a7a9244df6b9b6d8c3c006ade25368aad57e6b
SHA2569203ccc8a03cbfa306aefce87b62e463e3f80ed69353b8c6505ce4afb7f1ec0c
SHA5122e10fe7a6043440a575a5906fd0adf85ee18023cc98e2eb49fc5817611206022b74c908d6703339e3efcf38d7477808ea54b52de68831f90b6fc56a01d9e9706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559834c8297163dc00dbc3287b63f47f9
SHA116af88266b459f64619fbe8aebf7bc009ddb620b
SHA256d5bdd51dc2e657e6b7440850178d2c253a93430de8181f12d6d03e29d7921b69
SHA512170bc6e2cd68e7a5a1f6a9e1d12d81c0f74f777d76b9ae6a92943c58a6c004f4c31dee660860f81d670eca320ffa65537466e50061cb0582cb11236ee0dfcf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5408bd5af57067daa82ee0d2d03790836
SHA18e8146393ac85cbb974adea47a820435bd6da776
SHA256e58004e3ebc2e91ad3f8a378a92c828e98492fd2556d47358840388a5c56ec3d
SHA512e8c5a015b51941f89d1229bd6a9743ab5b6dba371387971fefbfb20223d8b75524947c95644644e628bc8181488b52f4c9c67e9cc53a4e2cba3e09b3897eb1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518592fb27ef1654a104357e07f43fbcc
SHA15fd8f1202962b94f528ab9377c72dd6b15c1e25d
SHA256065e526b0996181bb2545320cfeb7aea295a7431adfb85bbd5aa11b344955226
SHA512b3a031307f2f0e953b25430bde2738d837bbc8b79d7d4616fe5cc1efeee15500d5835dd27cd10616a4d115b04eea7df543e90dd3d5bdc47c94d842c2d5783c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ef094b789ebe725831cc0adc1556ed
SHA1be3ebbb3760e0a134665bdb6cc6bd765bac33f49
SHA256006ab58855b866113d495e514a16ca60280e52453556c185a1b9959dec575e52
SHA512a4004a8e47c32853ac3b47fa11594a715278dd0c9bddb0ae23c9744307812728c2bc321d3a3f42a0c4fefcc9a5a9837d2b554c19bd676abf0c9751ad29162430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c46d8cb2ef1e5424411912aea08faa
SHA1e3030a8a7f4a8a768fa8876cf17c2b14430bde63
SHA25670f051137931a78c9937e97def0d7661b30cb0c6c9b60191d3c8db3c4cc2b3c9
SHA51200fdcd6e852cc7b83fbf9e746336bb1e5766c0457d4ff6a5788c4a7e6a04f6a72c4012e0b5503a8fe0a87d5cec457e8f2911afb2f7d883e64176afce166dccaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9cafc2ad770efe9d815fdd0497fe9d
SHA179dd0e6446f0438f4549fb6b296b51c6946e93a0
SHA256b554728f90fca9b045d6b2f8f2ff398cf7a3956cb1a376ef1b9c07845de4f297
SHA51267eed519304a19198c2587e32a38d350ce1b824b3a3f49456d3cd1eef01db38001a01c6db46e323ca5c0dc04f697af2f3b09a16dddf622a4009242774e6d4aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d374b7d277ceb8460c2c5680daa6011
SHA1f2f9a87301bc743f98afc5576832227288471276
SHA2560e466e80bad2fd40f2da69d4cb4fd17d33e29560631772e83f2c336581cbd338
SHA512c805242b859336b34d161370b48762629a1d9554c03361926ebf1da99b9e898dd21d76ab8c74c7148f207bf9bb21e28f1f9908cff8d60c5cab2ca9fe2abb5b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca0a5a53aaee9f61299b09f27953a67
SHA11107729c45c5b588e913e4f27653684073b9e1b2
SHA2562e43269ba4f5870d29db04fe26719fb7944f1fb7aa17b86bba609060db001b3e
SHA512ceddb4fb423931c16247c71b5cb5871414dac6aa93378e7726b590c1ea29423a62ecce27ce9e95597330ea8d599e4c613645bd50166fff965967fc26358e42af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadbe20a1bfc59de0e97fdf8ef27acf9
SHA1978ae651e45c5c163408727b9ae398dbfc5fc034
SHA256d13deab62f0b21421e8c4e6423216f90e11e5f2efed9354c134324132db26af2
SHA512e0de19eb6a2125b09506e86faad6feff2c84f62005c82236755fc91c09e36dd8205a927bbc7f12e375a5c2e2cc8e0c187c534d8360c5c54b2145e974431e0249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c0aa6bbf07f499a5398f1fe0a36c93
SHA1b0bdda150f998d34adf8d2400643677ff1424232
SHA256929aa5acc76bb636732a0072f95dc8bfe3ebf167be4003b67e1334408376c367
SHA5121efcdfd0df7d5dca11afe6d8cc05105091175ea4f2a4d441bc5566430a5cd878a2781c0a2f525c229418845cc871cf0b633eb5336a7be8cb0d1cf6a761eff16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b185f5d306893462f0d59c5fa7854ce9
SHA18d43c59117c4774a32fb061bfb4012771cf06db3
SHA256bb136878c9d8b760fb3180c876c8a500b6a8d02309a0c690cb0e0e915b899a68
SHA512d7464db9b34ecae5eb0e87c6e0c44012b564d3750a7a2ab0b57f6463fce65f65abceeb3cdc63315d7e75a799aca673fa406ac42170bd59f55500d34ba5037739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c28848eb26d60cc89cd721692a2072
SHA1ca8593caec1efba315175eb8e6ef37f5cf88459f
SHA256e007be53d7419074b127f0e3930a7a5af5eddff29797631b266b18cc8d1d3964
SHA5125c1a52729a2f022e7db8337fa1f746a7d71c1c5624401d766b41fef9c9c2fafa55d61d441d4e7d60098fed085a437d49fb3ce326f66eddd2ffd18283cc5fd308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd927c1ca4b7a8b6c46b8504837225c
SHA1750ceefcf854ceccf8d7242cabf06b5978c8db97
SHA256bc72a11115aa6b8fb0ba714594c01e293952f24134e28aa0835430b6c3472785
SHA512963bcd4b9f4fc7689d158b2d9cc44a5e7b7e6e18ef1b10c3ed3075bfe401819d908e536826522175180d11356572d0640e51f450d6eb409b09bbba7c33cd1332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436ce555b208ef887c78b88fd7fa1172
SHA1094e67600eb089e4033b9981baf8e88e3929c43a
SHA256272bd2110574e29e4d9666fc01b091bb4946bc8f58edeab5a66c748c9fd79ffa
SHA51247adaa475917e62d7307fbd7558dee248e2d9c2367e64c7442464ec3e39d40c6777f700aa5261db0cf9981ada8f1211b0fc51d38572b7eb98277e8defefef67a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b