Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
f08f126bd28e2d50693220727b1f5190_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f08f126bd28e2d50693220727b1f5190_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f08f126bd28e2d50693220727b1f5190_JaffaCakes118.html
-
Size
137KB
-
MD5
f08f126bd28e2d50693220727b1f5190
-
SHA1
52440667b7ea2d7606d8fe1026c31118c4e35b05
-
SHA256
9c7212ee6c95f02cfe7d103ab4f28eadf3f44d36b73cbb6a236c8a444cfbb675
-
SHA512
ff3720f26aad71f79d165aa7d5c1416ccd2989383c706b159e958cc9df6d8dff1e3dada4dd6edb1bf79dcf2c3a299de2a643672e4919c7112ef7e0338e2b8d0b
-
SSDEEP
1536:SRu5uRfyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:S4GyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433112621" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000d2e8cf33749f82b84c8204adda60568dd78416ac7febdb08a54c4eed803a0dcb000000000e8000000002000020000000fd479ea697ae3b2e8f6c38853b6f353b4176d17a747c9b8a36b97505e333ae5920000000df44044578e7886de3a32b0faf3a604edc939b354dc411b6cea249f0b8cc6817400000009c5f997909544fd75992ede6fd3fb72d2e600b1b8a8450f76ffd48b66fdff6ffb0177e660d9c97501873d903c01792d11ef473b9f173fa9450be11d8fae92bac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908c1476650cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A185B3E1-7858-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a54f585df78a8b6d8ed0f0304ce6edb107b4c5357c0f6c6aa4aa492128406807000000000e80000000020000200000002323834aa98a1112a21ea4033da27ed6fec11eb3a4fd2c8310fac1fcea4b8ccc9000000018ea24e5589f35734780703013553b5701baebccbfe98cb865e37eb3217b36d05962862623e78108364872611de4a9b5cefb5862e2754ee653884a1bc7553983d2fcf9a62ba75f5d1c35a6d4ad5ad95ee4d0a1f641e5bd1a675b81d2dd26beb51ded2e9f4e45cc15fcdc656513548568b73a9ae516aa18b9bdc762f3f7748d13cd4abc58636550a65a50333b968500d240000000646321cbea1448e219084b3a06959fc8e9e41da9515026a9884eb98d6a8b028bf778af491e0955cdf266745c0196555a0712724a3c8030ae4c88cc9b8cba2df4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1956 2404 iexplore.exe 30 PID 2404 wrote to memory of 1956 2404 iexplore.exe 30 PID 2404 wrote to memory of 1956 2404 iexplore.exe 30 PID 2404 wrote to memory of 1956 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f08f126bd28e2d50693220727b1f5190_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303931bfd1f8e9388e9e82ac30d0dd58
SHA1150ae8ea0d08d609667873e399fbffe0d1e2d273
SHA256c0de111fc1a70b489df4718ab72f72b49c0bfa68edea91c512af4573326fadd9
SHA512ab1299748db69e43885745df2fe35902a3f3a7bd3bd7e48125cbd22b64fd04e7d0e7a40c93c0ec042d61a05ff288925d3b6c1a8cfd53588a2203a1f0df7a05b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523cbaa24b62a0cf4107d1e22b0ca3e02
SHA1ef6d7d3303765e119c00ab030cb6258f18844379
SHA2567ab7fee0b5b3ccd962ed01853c8c54b162e63c8d4984c8fee3f2de1ecab1dcac
SHA51236c4032a0fb75ec712fa50c9885aa51cd6ea7f91d28777c2319caf977a49e2cab1127b98e6c08b175bb4b141b31a3507b1dbcc1f1e3b8d2c3db4955dec7211b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa726339cd641dbabf9b91b67080da02
SHA1e1784dca15d25659ce01b4c5be8619651810db93
SHA25699751e62e73826df07cd6c37808a82994e0f123d7d80357a87d6edec9ea51b8f
SHA51233d998033ed7467a7df7f2605940b7591ed716f886654ddae5080764da294ed084d474b4b9b78641e4a680932ea85fc0b450f1c5bfbf025536c0f2202c0cd8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb4cdfacd8534cdfc25d363ae3403ed
SHA1fa499c56281b364b829629ddaf7e1fddda0995cc
SHA256a6d1fac804dd6a85376252890b43ee462eef099d0b9c96a774558e42f0834d5c
SHA5125bdff9cfd536bebd76601481bfc26d117f2e31b23fed1140714445c8896965a65cb2e0ef41033e55bc75a7a8b8b176d278c03497d665044854319eaa81af8ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a7bd73ff943cb8b08487c3f2e8420b
SHA1ec9bceb107e4378a5d4d797cac7d54023bd11229
SHA256a094022ef71cf47b7391cac4593e99531fde22e0a60d8797d7a172aea88d4d4a
SHA51202b325eac00e7a8fa54e2696242dba1d7b47ed2a6aa7c80ac7db87b7e97f2e70229d91995663ed95eca217275b279fd067f17a2821f26bb3391341cd5f6b68a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805ab8fe1c0df8fdaeef4499447149db
SHA1b9a54b35a4bc07a45ae80c93df21b300e67ae34e
SHA25649a1db9804fee1e38cd32e835b8f7383ef24c8eed9b000bf4e1692fc9cf5f593
SHA512ce22cef687dc246ce277ba7304c78a511f71b5d9236de912aef7a900e5f134d56901b3bdd69ff6a2389ff34a8262c45aa5b499a654112c7e62ecbe6c6c69471b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae0a08cdbbdae76aa5836512e3b49d1
SHA1eeccc254dc37a646e0417c8a10e477532e248552
SHA256d5a6079dd6da827ae88081b35dceb9e7989f02c8ba1f7eb89b50c887656a6212
SHA5124729e5fa9770440940314cf0d4c5fe465a52b90b31478e3858e4ca9ae9eb369bc0955a3c5be451d9ccc948c41213f457ebe5fd2fe4dc32a08f8bb7267721f732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa31625d6afc061a025aa4f79a9eae47
SHA18518d5886e2e6b1341127a799e752f09d942fdbf
SHA256b95a2b1b26190456c6ee0b0152fc13797332e7f68e44878256e4519750303c81
SHA51264d4a0f382a5b163679427c8bd714ad90ff00971b93f03f6ce666d6ba94f95e0a49532aef234d3b81b59e11bc43eb002acd876dd17e89b7e25842141c60f65d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1357d92bd4f19cf35c93db5edfd578
SHA150daf626344133b204dd8e61df59695d3a593608
SHA256a44a6bb53ef487a0f3d93c0b6bda27811b348d0ef546d2414b7eac7d7f44b310
SHA512c701042fc2640698583db08642cdef4e5a12e8fd3543ab891d4c9e0636e3c601e7a7e9e29f3d7e8851c14b56aa89647993e846dbdbaa8e42823ea42c7b275dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d30a8a51e25d078813a14102776475d
SHA154f06206c26d8eedb2ce834967223c58b6a53341
SHA256c91092912e294037cb41e3df8ad6729e99f12f6639151954bb72575bc9bba6af
SHA512b94afdcdbbcc80ba17634c4988501c3617502f7656e5c852fc71c65411f3dbd43d4c3f99a97ff451e5dc352ec41bf55dee227031a07acaa55ff6a377cd5b92f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582431a11095feffd4f734c6371e53c3f
SHA1d47e5f6bb92a4b0990cea7f838d8e69cc66f1ff2
SHA256eb5a6fca4b43c881810b827baf542659d5cb044285c3521d9235f300d807c1d7
SHA512f0c2515e287725816c2a9ad882b3c10db10cf8f9c0f29200df1162d9552b9fd5d8d8f649cefc0ec27188fcbe172b194b473fed062847a88f6e1543f72ac63d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51831ee94e0f579c6a97884ab438ecb63
SHA1a020c620edb300e6f0daecbc53754734edd17ba9
SHA2566ae5e59435572ad937a5d9b31375c884a6420f6211dbefc4360f256101503a6f
SHA5127a8a5cc70058e4fd867861dedc7493e9c14b9bc14b68b8d046014921abb6d2e7c56009e8cea99e474aabb1086e12651eb4785f7b50ab6565cec8d3fe5ee0b1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb50570c5a443b5155ad74941d433c3
SHA186c211cae9878260a390e987c7c086cc3e1e16e7
SHA25685d3a3172f3b414cb455da974bb5beb79db43077db39ce18bcc023739fb8a746
SHA5126665255a96d483cf79372cea5fbc5de3ba13e948ae2141d695ee5fa940cc096d9faf52a520b8e13618fae0baafbfb678027648893872ce8a33ae925ad61488ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ac63aa97a1ec1e4de3497e285168af
SHA1ca84d87bafb37310203fbc507d7290a212a9625b
SHA256b3d67447521cc6abac3e7886c133a8fdd786c8ec6f9035be045af81d1c694fe6
SHA512743e7949a30a3ee0f0ed30a7993ed64fd2ae1628c5accd3dfc6218c1017d2759214091575b71bcffc1cfabdafe57f1637a3ef82c4e1592bd97c4f9c3a0cb37eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507694e0c9e8c4b55924d94ce50cb7115
SHA16f7f30a3fe79f1c919b37e18af8833c23f8f27e0
SHA256bfccbd44058480bb7c6aa05232da7e4fc78bb1c4ce37eb0e3a15b6e408d475d7
SHA5121da70584a1b80beda1c62f75a385c7e9bc898089cf71a75ac0edbb6bedb0e1a43c83a7fce325cb502b8703381e5f152ecb1ab6758792d61584ae69258d767100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596622b532eab1275f32a7d3ff788965f
SHA126908bf9c51b97f1997c2533340dbfb150cce38d
SHA256c0f0510ca9e2560829fe142a2a2b3f5aafe9dfb81e3145774b9a041cae428b91
SHA512ac584372fae1b1994418af226a70a28267b7660f08691b77f511f3521ee1505096e5e3f7f67ed6abf820de4dbaf684b14e89f00f806e0b9c7fe6a973b4718e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf91ca579a589dfd3e604d03b79318df
SHA1473692dde65abfa1aeea6d750f311ce703bc4086
SHA256da358d3b1cbf259939c7b5474ac464adb5ce212101b9be86d5b1e8e771e8ad9c
SHA512f711f92177b4dea9d27306d08d7f349e7807b9222903df3ae1b2e8c4bd9c78e596d0cc3bb89d5f43cdd9178a92911cdbe9024d434a90e8661d44c67c556306d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d670e2986191bdaed0b18e42bb8464
SHA11a2ca9cec81b8ebd9828c57f34e994334ef870ab
SHA256664c5cbb9aed1152b3074fbd3bd4fb61bb6b96ff60c5769e955eb02c4c5a7fb3
SHA512b158945b0b1f7b308cd845fe85be8aa24acb33802ec1a221eb42e38ca84d2a67abbfb637702e83e4c8f0186155701f4c97509c7e11bf4fc9049ada78ab19dc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905927d115c05319ff3aea634d4fa89e
SHA1fd55a39a9bd6c2d8af8c007fe61be85116634e03
SHA256ebeb2cfe010c01ed23231f8897ec4f95e4c1cb4b630cf2957ae7c3e175d93c41
SHA5128efc41abb0bfb4e4552612cef6b67180b9684ac05105c32a5988169afcb65a0386fd10ee282cc3716143ddf4eef5d35e01ac0737a5c95a442ffe08533bba68b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b