Analysis
-
max time kernel
139s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
f9f384542adbee160a0de41edb17748f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9f384542adbee160a0de41edb17748f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9f384542adbee160a0de41edb17748f_JaffaCakes118.html
-
Size
3KB
-
MD5
f9f384542adbee160a0de41edb17748f
-
SHA1
e758a38d7b2dffff3431f0465c2363357aab4f48
-
SHA256
f0ea0dd180ed2b7eb56ae384e6ce76a366b91035e276d7cc79a9e0f63e9804b8
-
SHA512
7edb178b87d872bdb9342e3b8af752b21f31f5ad811be507dff0a5f16ce2c24b96df419e4463c2721e1c32e16b7a7b11f4a13ba5aea7614dfdf89e8056bb93a8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c44e63ab10db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007af33ca6a6d533d773e91e1c9a8f8afb520f28123c9985796532db58346908f5000000000e80000000020000200000001c2beff645207aa26674ac5991455e96de049c7bd09041b782f7c1c944ed630190000000a5d5360f893db22512e24590c35b2777a30d042586ff99d8526d15fcc5fae918f4a20e3e4912f09800b038d392f19ae9d1041220a4511216529f3f96e2c12cde7507bbb5ed3d5b306e35a4136906a7ebb8aa8c8326236912cb955d8023e4465e97c41c0f6c09c1c715870461666d4759887af5e7f11e390ed1f070d67af7f4db3b2eb35d3a95d18e4240c5ba4e5c00db400000004c583f3fa07e13a2c3e468ef9508c475cb11bc6447a83b19b9caacbfb12b7935913fcbe71325bddfb6c2eae880e7167d5d84f33ba3c90dfa080daa1e1338f8a8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433582464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EC54A51-7C9E-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008bfaefb31e354c405b568d143966c596be6482e5d72d9529d881499c4f65a84e000000000e800000000200002000000022d0d7e8438f0b322303024c05aad0d46d82f00810949562765b704771ad2c0c2000000096016ab5dcef19ff635f9a0766955f90517cb0470f3d1f7853a0675f80afcc4a400000005e3413012797c99d5e183de376cb5465057b75771f4c64a1cd29210824171a67677283657c81a22ceb07b02fb1abf818cc04023a8e05df44aa2e0a92eb979407 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9f384542adbee160a0de41edb17748f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8fe2508506f97ef896aeea348e67b0
SHA1b6503dfbbc8cc1edb03e549b4d05db6b29c43c67
SHA256629d0a28be4b4df622e40faf735f80c80c68dd61fd57f6404004e6d0de53cc13
SHA512ad46bda1feab34d40caeabbbc0ee74031153a6ff1abf03143a5639aae00caf471845ef277df10d19e59a5e18e56ca60b3a49496c0309887fa0478845ff1a9958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525874e26fc1719ace1dc414501acf7a2
SHA1be4f91f56c723b1515afebccd599559422f62125
SHA2564f56558f1c81f3be876dfc9c80183871227cd2668ec2e4e8119c42e739e34bec
SHA5121d5ee0c099ad4df59fc27ec6da244de45faa4f7825f7a2e04a92cee0c480c89ffe7c3238a241cc10b6ed21d5b78ad9fb33d3a693d3bedd13b345152d316f17ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ffa8e7f17140e81e89439b69a23417
SHA19119774bb0a9324eaa2784a984d86fdf26536064
SHA2569cc92b82ca2005372883ce2e8ccb42e93f97e7ba0a8db7819fcfd087f051b20c
SHA51271ade5e5b357ad508e3374598b03c2beb5a95310586cf8628d49aa1c0069c48f8bb6e7d6d3f4b3965b049967aee87dbf16771c6b7d3505be96a0dad61eceb1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f114b0c36dd00879c6145de50fa48d
SHA178966747dcd8bb7c520bf65f8cc452a27eaa2c4f
SHA256f5fec27231d2d58eea0fefca3b576c017b834e22b9e1444beef7a51448d8f53c
SHA5123e7d2ce19f27b6ef7115aa7206859a9a0630eb9d20ef6d81699099f412448e3254339829dfed1ae39e48aaac2fecb4bf763ea6e184ad047cf43ef1f76863f1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572492db1c814389bf80be53c8ce31cdc
SHA1b51e57880899a430e06c4ec96bce7b148008a5c0
SHA2560196f829fb19465fe56cb491c5f2d2cd8c7d6e2fdf6ac006e70f890a2d039db9
SHA51236e856a4b09236a5caaa23af4fc756eb34aa56b302366ce22b22fdbcc12e6c00983c7da0ab3a6a046019b10a91ff10b6cecc6e67bcc7294d7f8b4413e3b40781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58293b1b9a745e62dcc57c810b64da2b7
SHA13346a456486c555d02cc3fe5d65c60a8ce8d5feb
SHA2566a54a4c1949430a366e84ed78391b1ef17419f7b259c7ab22bcf15c0c651d72d
SHA512bcaad8afcad8d4f06009d400799fd6f17a2952634df17c43a663cab0f45ac5954ec67786bbabfcb6d2462a21f5d7f99a389d41301a4bc1b212965dd847b08a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c9d63b349159ed649de278a91a0785
SHA14f94698a595590bf206af883aea595cbb7961cf7
SHA25695600e79ebc44f42ca7baa8a7f936beb1c397e69703749e447822835b8314e74
SHA5127be7cdf76e2a3087a305daeb199f6a321015e057f3826d6e60f13ea014b91036a9d4f30f94b1f24fe2d623b489022d6960f4735e78ea1c1aeef30dbdd4b81c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53847739545103970fcd0c255955b92f5
SHA1cef00a64c48816c3a3e58c403198ea57a2141764
SHA256abae467780276cc2b69c160e08658922d510ef691e0fcb8a9039f5d46a52eddc
SHA5129008d5eccc0809935bc2a02b422f5bb91e4ce1be0187e87c4390c7991c98b5f2ad34f5320b940eea3895d8614ff4f287c2fa7373ff2bebe9534f14c3fc11fed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de940485c21cc0019bea2040bbf81a9
SHA16d26940b675e909590e163c4ec2bf9670f608596
SHA2563c6a5ae00be30a1851b459d7391c20d3d3dcacd967507225736c7a5d89c6fd02
SHA512f7eb53a31fd5f6ba534cc7d78c2f013d2fa6b8ea739fa8a7f9d8fb6bee0152593a95778f04995985e26286617f57fa1ad92334b802009a65d45c605ccaef4ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30b5611bdcaa5d436ad99d6ace09380
SHA1a7897054a1edf2514cfe7d8663e5c29cbc8dae36
SHA256da176966e3e1178f4907c739924a08132c0f011551cb51c38f6ab88776eb2cf7
SHA51276d21b4cfc76b5feb4357542de8c6928e5df0030a9945f9b5c27f1ecee20d9e66f0798665c34c4c2e696c88637142fa1ad982718dae170e691bbc214b9fdca1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94855ef9574d46f0392db5763b79258
SHA1706356a4b428652ddacf6195663032e6ec94998a
SHA25642d8c97665b13704ec673f74d8e440282a38adfae6b87838a0db64e715ea7aaa
SHA512189ec35c2a1afe7923fdf5cdf13b0d79f2b17e483c625667b7195ed5e82fc6907ff6d9718b3846e83f54b55d5d650c4878970dda9f267fbdace97b8d01d5c483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554db92c85f6dcc5c3d4b4b0f04152b4e
SHA11684ee412d0b71cf74fc87044010e3c55a17ca32
SHA25612a185b5a9a13f146e5973781837ce5546d9b84acfc3a37daec69e8d4819419a
SHA51205809551ff84ef6a67944fb6f13442c54a7a14133386151afab38bc27cc13e6be60a699a7f888d548c8f9c361130320826711cc7c5e4d3699492b0f4aa41e145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f97eeafa9470436631e79ca1fbbffad
SHA19f97dcfadc470bb3b166aa601ad280d98ae3cfdd
SHA2566e42b34e7b4160f6e2429c418c99cd882f527728e3354bf37bf967ff35b80cf2
SHA5120e052138ce23d59949496305b304e1acebe0421ec78f6f87833408616616d855f0c95619d5a3881513120ac5ea7ef6589731a8a8a1c15ce134bfdcdb91d3a72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ad31e671b8c860b19fba9e0690b5df
SHA136d6c7d7923e77da4a7143babb56ebbaa20f2dea
SHA256e35dedbd83afa815112acea4ae609610cd6830f4d777ff7887d15d29c484adae
SHA5125146a7d7855b6e66ab3e41b679aab4fbd8b95a0b11083892db96fe2b4022e068aaaadb4cf8eb7311ad2ef65741f1f75fbd67bedbcc63fabe415b1fcc0e89a2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa116695d9ff1857e534a1b11e550790
SHA1ab6d14a67e9c46dc2ba49ef95cd0423794ffba93
SHA256ac20a1996e51c2fba5f13413419a52eba43ccdc52afa5e23c4219a52152b49cb
SHA512888baf01935bf234a8f9ea789b4a777208f6eab4828afc3ca3107b598a9f667207fb23c48d346830b8086aafe1f65d779e2d92b04a0b51c0eed68e11031816fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fffe4c7b1769cfaafb696a55c9c4073
SHA1b460412ba6b11813bf3939117d42a255a62a8f7b
SHA256b1a1e4f6656725fbaea41da66fd1c3a16f5647eb3fe9472641c55de7acee3876
SHA51240d3ecd455b8cc2ea78dd69a6545aa1f7878c0da83815ce6b82a839c0fee862738c29f33c6aa827422674205f31adbf102e1a5ce24d87bb99d1c529b98dcc6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fadd44ac9cef0d647e9afd97c3b023
SHA1e8f8c0ac7a062349ef109c7bd4cb57220c379eac
SHA25630337ab3f0a5df8878f69424b5a5f0da84fcb7fc2472b9346a6336ee42ac7a01
SHA5120fb8d9fd10be55a4d07f25aad602ce91304bfaa221aeac3ad234c8215372a190fca2fdd9b2d93c7aecf71d09bd3b07922c99b1a0032cbc47feb553edcc771256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59313feb15dd5d9b113014a2a1890dc47
SHA188520c4b848d348c2daea2e009f24d8b416fb589
SHA256ed7dfba9613b7379f1fb1886a9125bdacf95e1abac87e39425220d18332d8a55
SHA512213e0c3ecad3b882b503fcf9c3dc99c7ca0c976b0026098b133668e8cb1df1fd2b0710fec86051b914b05243a825ad0bb569bdc3f967cbb6145c4189a2f8c987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547348cd23fc1f658081cc8fde38de9cc
SHA110528851ad833fd56d6d09f288bc8fc74ee86fee
SHA2568105f269ae41be3233a7e2f198a157e13fa45be54911c3c8e10cb4f191c51cfb
SHA512d26022bdebae4ad10b41b54eab0a08ba29715b6d86241e7b41f10e3499b88c5cd17b324f31da6b97f7f0fc74613a5866f4ee8758549e50c3d0ab8fcaf28b177d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b