Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
ef5d07525d610253b4fb97792f989b0f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef5d07525d610253b4fb97792f989b0f_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ef5d07525d610253b4fb97792f989b0f_JaffaCakes118.html
-
Size
31KB
-
MD5
ef5d07525d610253b4fb97792f989b0f
-
SHA1
d28c6810609c365fd7fa3a6574f443a4ea71b76d
-
SHA256
6f8d08dd7680fe66468ddea783c4afa8f9185c5617518ae1060b294ae2668ed0
-
SHA512
39af3efde18f597ca38e563307d37056804005e000e00d8888614e819230b4659167bfd3d857e4f02f10afe6db6ba09ef9680d68b42c346285777dc39da3174f
-
SSDEEP
192:uw/9b5nfWnQjxn5Q/XnQieONn2ePnQOkEnt1FnQTbnJnQmS9xTDUIlG3YtcBPQaO:/Q/EeIqxf2YsZCVchQR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301056e9fb0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000222c217aaa6e0f6d8d3287a0724710fa767fbe9fea84fbcf13728d764e67638a000000000e80000000020000200000006549e761ecee1bd2617ee74d5d0ef68c389c8cfe86bebf1bb476ffee902b7e1020000000587686765668611260f1583941abf660c96f5fd4b983d6fa060ce548bc3bb15340000000c2919463931db162b20a73a6ecd65cf8a613a949387219e18cf575238f73a63d2fe15f2a9de10d54a612141b0f3d9ba6dd27d63889e8e5ec89d14a0f1c8e4eae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13145F31-77EF-11EF-AAC7-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e6e5a9aadd2754883cd68faa00ead399372e3e946762d60f0b907845dc22b3b0000000000e8000000002000020000000a306f6be3e569b347348d5228affebafffefc95e86008524404976f2d97de55b900000004ddccb4311ed1e5a84f0aae8199ce1ff2155b827c1aedb1361d8e6a7fdfe4b392399f1b2a2c3497a78529074553d434c3ad5f9d82672b0d59d03c2dc176119040f866b30d19d7d63a2c1186e1a4a7aeddeecb490c59a784505c258f327193f039e0a0344f48bde7c24257a5386086fdc6d2f06dfd4aaef9e07166891eac9b9f36e373fefa566bf7c8fd965f3c9a434154000000033b029fe11ee525a0cb029785fe0cc5e726882ceddff28e4977deef5e050794028b482be2689856faff090148654fa55732d04c5e90dffe8db4bd9734e2a8b55 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433067284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1496 1732 iexplore.exe 30 PID 1732 wrote to memory of 1496 1732 iexplore.exe 30 PID 1732 wrote to memory of 1496 1732 iexplore.exe 30 PID 1732 wrote to memory of 1496 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef5d07525d610253b4fb97792f989b0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09675fa9af00c9c55d0306d940e3c98
SHA1422c3ceb027a06723d5ef85a6292a3f13ac53a90
SHA256e93fe03ddb0a1b4099f86c4d7035e7ef9d962f01edefd87f017ab0ff4040e4fb
SHA512b8c9b6909f73c378ad32e4ffb2b3523905cd9632332f571715230004e45c06213fcb3ee26184afa8a037d5e40b0326c094a7a04fe079d59aaa83117b4a117b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dd9c728b6e4da89416beee95baf8a3
SHA17993df56353763bbcf99453d720c6bc4d6d951dc
SHA256797a0b6cdfc2ff2a982e15089278124d16886c5e745c8127e513a94e894e043e
SHA512a392555412e8821639618073e38ecd0d62d57199ac2c60a0c16408e482789be0093f400d39feac9e5e4494675028b2b9c57c98e30a592ec00b1d7dd8d5a3ac81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3c0e2436496c78555b8bba1a635c46
SHA1808dd79665afe6d613b5ee9030ab1b08c4fde762
SHA25678b36dcd086862423f2767999f1f9cee34715b781cdb948b27ab4dbba83f43a3
SHA51275a233ec195605fcaa2c537babd0a4edf500a3a7fc5d01a9b6fa38cdf156ecc9785092d3ba4e9a72335b884907557ca45a23cbbf829e369b8514f755b47bc774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3754f044c3d5aa082ed851dc5a28918
SHA1a68ff5610e0182dc4bd2317f250da8ff15ece325
SHA256303ca4677f8c3d4d69df3558ac554eea06290cab596bddff8491f51f16b0b2fa
SHA5128dbd962804e01aab6e4fe25b6a57249d418d9a9b7d1e7d9282d42adf5af7b34358bc43814eadfed55f298c66140d13cde4c24775699e79a41fdada5a579d9625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff783d89acebcf5b19e2fb275b2b8f6
SHA1c09390955147dc0734a9e9dd83ddf9ac3661c38b
SHA256d7846d98718a9204d82c59ae2293491ee4835414b6b135d3b7389171f99faf85
SHA512d2d70268eed93b20d57c2e73c3ba24def6fc38a3ffa22c0533f9ce816df7913467a7fd2cb09839437217bfcb9b82aa53710931ed5559aa61e3f342dd4460f99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c7c4bc5342cd2d55bcfe076cc09297
SHA1f15810892b295bb308e380b180df85d428da3b27
SHA25608771c01cb7b247ed496f7fafbe1c22d5715cdbb901346e34e4d37b40ddfe697
SHA512b32d747fd70fb54951e543ae5c3c9d090e8ec7cf1a080526a51d42c545170ac8d7985030cec6105bc0e907029999bec94fcf89c6e88e155fb6ea2fcbdbcd2ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd91c009a6c6ac64eac18c8c8c1993e4
SHA18f4fbb35d7395e326108420c8bf4235868ba038b
SHA256d158ff98b2c8300faf18b343f9285e20f4070acfc8491997fbf59bf2a348e7e1
SHA512682429399829ab9508704727581ec310f73878b3c5563ce4bd3cf38e456d72ae5c06a74a87b4c561ffabc24dc9c2d19e3a73b42a2914901d81211cad1c87bb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ab0eb7f1d18819df5c5616e4d0f89c
SHA1e1ed28a1d97e671ab8adfffbe7e99dd97faafd6c
SHA25632ad8c0475b587b1ac3895857bbff0844eac1fc16118781646fb54b00e8c9ff0
SHA512e2b7a667080f1b1970af614c6581040d2af26e077a6306f0b5b10fabe7f605ced361ed0283a03e9bf1a682b065aeaf89d30608494a3cdc61b2ba9355937f7c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af632a2079d4bd03ed397d7d53869cf
SHA1e15026fd392ede477d4142bc20ee8dbb9e1abee5
SHA256489332807bd567f90f7c3a13bcec33222372f66d9307db499ada77d05c40916f
SHA512d95a5bb1c25fd9eedcf1c249f5515f55ba5d500ab867e4e678abd2266c844a7cc5de8b5f536de9f21da93a781e8128cf1dfce9425c047d812c9cd4c6d9255125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c54e13d56e861a99dac36ca4c7aecbb
SHA1f2a3a63af888d08138285b05b49f4606f1ec490a
SHA2569606352f7640ac3e023724c40a8243c12849992a97dbdf44bc122129e3b28b2e
SHA51226a3a499c03f4f586a6d9e70551dc0e7c91bf22924039952923fa017c6e74abb38be451df1721c6e736fdf51ffd931ca33770c8f0a5594a6418a16015757cf4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1636d7333f646581e93a9730eeea72
SHA186d594a9f75bc78e6b1aa04ca6fa6d5e6cb01a59
SHA256fa42da193611759285bbca3caba9f61ff885a29820fdb848c7311be164ff62b4
SHA512f0785b4249244b820fb4d0070e610bd347353f52e6106ab934ea364dd894eea19c468fc15a6ba6762a3cefc5b663bf96c91bd8a7a574c9b63518eb2624c6f6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e9ab04b38e52a03630db64cfe7ca24
SHA1078234d88a36c05988ae964dc14c12bdedade683
SHA2564134b6e0f28ecefd704e863bb7768f76decd2bbb3eb157ebd05476e8304227f2
SHA512f9d8aee0865dca40f2dbde686758e218e3c6bac2fb4f69ed24a4df3d98be7315d99437e34865e1ef44568e525b5e04e474f089e80519501532989e68e0261810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504843c919d5b7b615ec2a033305a5ae2
SHA1afa8fd2492e6223fe908e2c35285e14b34808bfd
SHA256aa8fed52714b1f6644fba3d1903f0d3f0733b616b30905ee63e4c53587e7251f
SHA5120aaa5473276cc9611eaca8d0cbca59cc2a86d472f34b856992536652f63c906a8c06691e2cc696c0c755df572c796dde9a47afb14685dda364647f42989bcf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a937b1047e3be4fc367759baa4e7d1
SHA114ab90d87a682c8fcd1b3406bb535fcd394d87e1
SHA256e9cf4843efa5703e511a5eebb95ea8c68dd6410f4922bee8113ae20d09da5588
SHA5122b84bc644e63225f9432e140f8a2a1740271baab2c86c3854d5a8f3e7ea5d49c38705d5192e482282a843fbc2573b44cbc87a6c64e289c0baf1dd8dbbea82381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525bdcb17aa2daa07b228ff554dd6f3b5
SHA1e882b48ccb3888d2d70d970bb28420b253bd0856
SHA2563226dafe5554e148704a6c64b2aa8bcb5c716e3d496b8cd02aa2fc36d8684e13
SHA512c5cdd008d4a284c93e89c3b30e61ddcd1902d06421bf5fccc4c0e264e5deddee647455cd1b84f961a12a3e2e16e7c7b1ed8c7391c2eb41869d9989cf1f6e17cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcab97020a4fb1e6b83f0c5abbcc99b
SHA1c2fee22ea1d3eca1609df472bf9511e0bfd59761
SHA25656e8e22bb38ea7f3ccdf17b6e6fdfb77dfee4588252cfe2a093ce30d8d73eba9
SHA5121a8f6b44b77967b23acffffc91c087b15e0ee23be9516e0ddde30d2906ecd7330dfbcbb1d851e627467c82526896cd7a75ad892de5bb06a6855319987c9e7b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fdfe8437ab3a210077233127cd49cfb
SHA1845f3aabbb79cbe78c36a32279fef7a05c25bae8
SHA2569bf4b32260c0f6cfcd392d9fc5a26faff0e757fc848d168c9f17fd9ba3d95a12
SHA512ac0fff2a80742fd68f7d245208fddf3ce83e08bd15746e991546128f2213706a36229cdd76a3f3ac06c0b7a7849c904eaaa1df5d92b07695bb75217611bdc6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cedd50db387bfa0f98415d25b39d86c
SHA133bdf646b70bb229469651d8e7ff66c2b190330b
SHA2567e0afc034daa237be956618b718236b0f0b30a25d6c708ae19d93002efdf6283
SHA512f59eb944f58ba71c0e7e11f58cf18d272f31b7d641c57fb98211edd3319d33e6774e89c6f33db495c79df9420ca1e35223369c6b5d05f55ec298b4acec0e676d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac84a2d734c9e4a80f7b52a1bffacfe
SHA127a9c9b4cc393473030a363c987500cc6dd56fc5
SHA256d276fa334cb693d027b6d551e2e0bf7b3eaa35d0f58b19d06f33ab26f19541ac
SHA512f74523063e4a5108c5495fcfb29f99ff42e2dd72faf56d7518b932fbd8b35336058a926a825f8dc406f32422fb9e43585d136462f648b5bd53107a4d0515a97e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b