Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
f0a1d72286707a5a8cfe8ff46bb0a0bb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0a1d72286707a5a8cfe8ff46bb0a0bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0a1d72286707a5a8cfe8ff46bb0a0bb_JaffaCakes118.html
-
Size
23KB
-
MD5
f0a1d72286707a5a8cfe8ff46bb0a0bb
-
SHA1
5e51e26937f254404955b495121ace2929f34c08
-
SHA256
e7e6c834fc4cac4bd62457477d21149b71943481b4d79055efe482ba398905dc
-
SHA512
38f38585075dfacb41c41264ddbf72f719890e270a163c590dfa2873a38ebf16da24d642fec14a973423f190bc25245768ad40e0271144127ee2ae35e95c9bfb
-
SSDEEP
192:uWngb5no2nQjxn5Q/nnQieGNnUnQOkEnttVnQTbnZnQECnQt8wMBmqnYnQ7tnyY4:NQ/S4T
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000001ac7fd40d798ac172553dcc06621b96b796f6ddb7561a1a1d27c94eb977bf699000000000e80000000020000200000001dcfb4607c7be78bcfb87d3e48f6977332e430048454a356df473ff2480a2926200000005f8817ca809f47eebaa51ddf6384e970b5b01d87b12ffb05ce8f41696a1dd7d740000000c48a27cca884e46fc5e9d0c2a7860979ca5b6b9230c964487af8ef9b2970e8af8d4934501c5908826c88b6633cc638655901fc9aefecc7832b1421b525022d02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f027e76b0cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000047290e510bab3ae11b21e09edad4deb69620344bc1744e00ec72c75999c6a4ea000000000e80000000020000200000006aeb2ae53c6a7189ca1cf2b16331e44999d888efad180db2bf341d94ad5b8d149000000029183b8b7d2a77f0c50dca7ffdaa7e00e213da1c25a590140290a743012e6f0aa3511af8e07db733b08188ec13131b6a0fe2cc8d9cd25fd0d03b11e76bfe4e76ce116a57ac19e624426aebba9fe3db65b65c24cfdc6b58df42374a6a5fe6fd2d45fd3bf44c19b5f953caad02c08492727865e36384b33f3751dcd8233f85d7f5260e1a82aac479e5e2efbf0de1ad09394000000057a3fd7ba97455ae8b9f615d5dac1c73ba574be0fd1bd1eb7fb7aff2a1ed5c7dc5180bcabbc8ca9f15d09146cc58764c45e3bd202c9de1541800e50085f0ba2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433115385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10F19221-785F-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2064 2172 iexplore.exe 30 PID 2172 wrote to memory of 2064 2172 iexplore.exe 30 PID 2172 wrote to memory of 2064 2172 iexplore.exe 30 PID 2172 wrote to memory of 2064 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0a1d72286707a5a8cfe8ff46bb0a0bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b00b0bf90a75d7907b0fc5a71387a1
SHA13991712987aa5329a7e647334c302bd0fc12f724
SHA25671bb3e783857f357d4031e138542bc101bd6da93885949a9590e54676d81a30f
SHA512f67dbd3137aea4a2fc5bd8be11494c6524e89e28e34d2b5fa7947621634a8aa41fafae7b87fc14ee0b522a783c535f9ea4f470c087b2091ff46d1deed936c6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e16b3a90fe849bef73af902c79febca1
SHA1be15a82845b9574d074886a4a7a1ff9cec7c9d09
SHA25619f2e63be0f577f2a5f8de77d7a971dcb4251c0548da3ea595a6e4e041b58ef5
SHA512f0a883b3f756cc477331f11259772ba1349d7c6e88ffd62db27804595ce3caec10944f1d13ce5b48a7adbc0b56a22dae67f0309345a1e51f1a419535f7c7c5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230a9537094f0f6e7f258786cafacc0e
SHA1105824800934f6853149ee5aa9bf254de774d09d
SHA2562c04955f8669f61de37796e7288bfceedf42adcca06dac04f080445eafe0e722
SHA5125f826a0b3466fb1699511a7a28899e8e558ee20f2894f0078bf41805a605f6c476612354ddd6cc34f26b26aafb258b1cf20e54b5794427ed2d9f80f8a68df893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae69c43d719c10ff54ecb190aab64fe1
SHA160859ab685587653a1129ad2ec5c9b4cf31169c5
SHA256fe1272cc3211bad0c59efe28fcfcd842d86c572595e206006c4bc5ebfa72e1b9
SHA51252c04f12ab0d9bd7e8b127f818ea1a3e35fb69bc78ac66344fb4a5bc8af51576e9522988506d463b4d48823d2006f67ab824ae63edcf0319601b1f281833fa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e69b76aa9b7471d0416964f2662511
SHA113d713bdcd085ef878094237d66e31a10612535b
SHA256cdf2c291a635c463cf0045beb6145dd0bec88b99b6eff76f45a1773e66eaa848
SHA5120794bd5e411aade7e15163a4be2153980b2d0d9d014312953b681dee36cd2869d84e80954307a5e8f80e55689bf7b351ed5d0f6e4a32179575618bd8f4dda6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50652ecced63f93e6f42528dae95946b0
SHA17eef2c90e80019d83e523218cccb566ff8fa8244
SHA256daf30e8a51d98a73bde0649872a9a64a23e8ef207b039fc5fa935a7b5389386a
SHA5120d15d0c5896fab6e80425ca5d94b22b4b62516d654a013e0da68a32d8f5d9164ab4f9c0b763c8a4006c71c6dd060c6c23bacaf818247c118d49d96a8f918d881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe53b7f940dc75e0d2c16227b0e9920
SHA1dd339f11944ee2771ec1ac4a89e92fe8cb1c43fa
SHA2566136af5faf53870b9d0c696cb8e636c7f804a550f15352a2ecfa9710ad51aef9
SHA512d80e5f61355e0a399bb5fdc28285c8be9ddf95496bfdf438444b2d07b6a6aa1e8e4706f142b617ced27406cdbb376502f3473c06ccd7de03a19fd0895f94dc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc63c228310acb0f7be1b7f41b968ca4
SHA1eaa8b04d1007f2c9614d1c6117e70c034facc9b0
SHA25618046cee8c7508e70d60281dd267ec6d1874ef89097658c48b35af46910b6f5f
SHA512134dba2c1f980cb776708930d0757e8b74ac46871b9093d19615489b728a55a90cc3a6fd23d61bb8111a069485e3537f053bedfdd2964964f37551ae9f157c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b3d630598cf763a12b73111c4bdc9c
SHA1f43697ab4b319bafc18232c64760a3ac6a8a0ad2
SHA25650cc179d4e657dce53a62b5cb034714060633edd06a3ac9f445e604afdba0230
SHA512fe5562791e56ef578b5d57cb5ca21c657419759c2d809d61431b0fc5c74232c8edda1a79e5251cd413b6e6d53daa7966bb4888dac8cdd2824531a8f4e8c1014f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ababfe863603cca1c29ecd1c80d4af34
SHA193d38e36e637ca2a5598e9dbb68c9174d0dd83f7
SHA256c3e658679f02f6b4817cbfc2830dcc0c7868042ac83f8000745c031e99bc7667
SHA512062d772dd79ef2afcf0ecae04113a7764294a94c41ea9473aae057efd32ff9af3b5966b12b0b2dbed2d4e0f12e88d329bb5a20cc9b46cfed8a305d2a0b1fb4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b851d8ca6f288e639318eb97abc9a8
SHA1398d4bdcc514e2d18f3e9d6b06df61e8013d5018
SHA25603bc6c3c0db5afd9c1a54f477f7d360fa32702b241261992a5d616d3c01247f9
SHA5122f72ea21aee6567891fa7893fbb13ad6b5e89ea5932baa10b937868e44b9ffed761f0b0be73a2425bc95c8aa85e5e8c7664b598eb1d19f158fc1112ad7ec1711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51007ab5723925ca63a576dbc7568cf64
SHA179946c6f81d357765621b46f3fe682deac7b3a0e
SHA25616b9b392e74a2ef391860ba7144d26e83a8ef51bdc0751dedf9ce966ae9f34ea
SHA512969db14fc74690857fb7640669a42407b699aac2596ef88b82faf23849fa3054960e257d741de782ae6b728dec62946044840db1773dca77f0548c65b713dc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a45eaa4fd252f7865e2a3e5b4db0f3
SHA1566f946075a5d9472afa3d4cb420ba7d3035d56e
SHA25602d0bf99709ca24a070110863a396d667e76c42d805ec2f57e1939c718b03f89
SHA512c86ca8b14d72c0260cc9f4da2b27bc0e1c73059a7b5112fd5512ea93b6e7554b73ecf1218f16e0c9c90897583ce64775e214d327ef419122bb8eb4bcdbe4d1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b4fb798e4350a218d9e3504ccbc5c1
SHA102455fd3c24539e5e05dc08b10c84875b4395c89
SHA256609a977c998925126723151e325cbfb4aaa0935cd7800d98fb1745e0bf315865
SHA512f65f1df8f49306693c7a7954daa65e362ee33f156cd3bf3d3c66b486239d82dba970107c1c26d64be5a8e40d2e04913ec2e20eeb5847edcb47a8c0608d550ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d65b7f932831c7e23dcc7edea411fa
SHA16ed933f5cf18dcd9d0f61265150f189f667a5b01
SHA256af81d4b6ae184b5d10c176a39132b4bdc47bbeb751e68cabd0e717e496ace217
SHA51242e20df13ec08d1811003246dd436a4e2cabaf2094c65d9b0c9273072d0fb77b33d494705de1dd3239b061f6a42c69586a9eefcae18cc65dc95ab145f4eca5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50aef45ce2365059cea41c3b643810e
SHA154c5c58b9a960a6768875ed9bc28dc5fc6555fc2
SHA256a7b78ed7380efd01721ba80d0d85c7ef6f6830dd7733f7f93d8ca2e069940b83
SHA512f358064107bf67e578273f3fd43eed06656045fce6015963734ab8341211ee007cedba252e58d0e07d1825a1e9590c41a13961c6c0281fbcf01f24f1fd2e0468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac38b74ec22cd12f3680ad020939b3f3
SHA17eadea4221faf154b439f5b89e19bc2b09dce859
SHA256eb9ac813e515e5284cab71df9d3a584b0234285508ddc6a104e1d8df6c056ec4
SHA5120b517c4be99b4e07d22a35811ec47d905044871cbf72ed728043d7f9ac3062937c03274846ad33c67ffd7d9ffb4dbbb4402c5b6ae863b1a15cf0a5401cc07a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb764b4dc99f7b53c0557c69e479148
SHA11229a30d6ab24532dac74ed78af9d86bfa170496
SHA256d0f657d47157875ed66816a7984b86d5adc99d3f860f7a758c24c5725f0d1a40
SHA512e6740edd5d14698b17c58586932363da5f2d6ecaf89995efacc011d0337f7f733a5f7b094a91ebdbbcd7c5caf852225b64fa3e522fb2d5e24e697f02934f1e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934610f6e884e4377e0950278a99400b
SHA165a9c9fbdf4c740ab4a409904d270d93b0f7e5e7
SHA256b89bcbfab5e097d286d43225f608c1172013b91a3396fc4b71a454e5bcdc73c7
SHA512793c053875f7e60c0ab6e1917cb7c21f0981e784c0bc5722f004f642b09cbfd61341529932be55809490acba3e3d0b2493784ca1cd05d55337d2f5d0ee48952a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b