Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
fa13a3a580fee917a0063ec25c937a60_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa13a3a580fee917a0063ec25c937a60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa13a3a580fee917a0063ec25c937a60_JaffaCakes118.html
-
Size
25KB
-
MD5
fa13a3a580fee917a0063ec25c937a60
-
SHA1
4db9f423481b4a86f7b4357b3bd0ffc46de8a543
-
SHA256
a07eea6e0306088aec0b6753452ae1984d95d660ec92acaaadf6b4ccee1b50bd
-
SHA512
79a060ac8f1c31a234c9fb44bc5681bf4a460381ce90b8e0f732ff1914db4bc1f61f08fbb76b925a032862e361be83a2f5d4c73646c8dbf1154385388fea9b60
-
SSDEEP
192:uW7/ob5nqunQjxn5Q/dnQieoNnBnQOkEntfTnQTbnhnQNYqC2A1pdEX4cwqHXMBm:/Q/oa68Om
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0523a7eb810db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e259a1e0a3dbec2e0b75253606f7d11c566a406a22f70a59bbb9ce5110cb6ead000000000e8000000002000020000000a96194a382b1512f3906d6c63eb9e9a932868fc32f55a12bee226a2f7170bc79900000003165af42b3280846d54834abd9508c684bb2e07a9f9b9fee61dc68e2fce1a726293114e183836da3d971ef5eaa06e2727849ceac241cfb2c8ff9dcc5f476bc2bd3e6068711f7d994f8230b97d1b3a278fa34d746596c3d192f18ff6a1f5d540c34ac1d00316516524a35f043db4dc9e2501fa290a3482ee32a018320d92af09038e23aad3f2235114687a1b73c65dc8b40000000e52d8af72063f3beea29261b70d2a666728d8cfd923c50886a61e9e7327536ce876ec41f66d6109c6db82e9df4e05d620f98c08b55bfcf048f0cb4f882771564 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003b46b45da7a006f628ffcb805dd1bf54cb58c5f27fe83f62bfc7d233680e85d5000000000e8000000002000020000000e7a677e01cba1e8b9fa4073421da951bdfd702400be88d2c516939d7131a7c29200000008495c8ad7478153531eabc0d558ec48a343f426caa0c6471ab87fa8c4ab7e61b40000000f3e89289007b9959048d964b9dc4ffd91a6c0a2fa383b83eb45ee95d26b42f00f186b1a73abc25ba98a7486022a6906340aa7fbeae6220147e5f71db82f697b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433588084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8121D51-7CAB-11EF-9107-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2144 2960 iexplore.exe 30 PID 2960 wrote to memory of 2144 2960 iexplore.exe 30 PID 2960 wrote to memory of 2144 2960 iexplore.exe 30 PID 2960 wrote to memory of 2144 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa13a3a580fee917a0063ec25c937a60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d773b7759969e53054cdd842a0d528
SHA1611dd276fa31bdfecb46d7703b75926907ead28e
SHA2566b56f211493f7af650c3f06b1aa9c74963f7491f18e0ad484ae7332a068c52a3
SHA5123271e2ea1465e6bebefd207742947ab5ded8497540facb4ee8860a7352e17394cfd5c0211f893f9322227590096f8cb381844144b977a4616a9670bfb1b6159b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea027de0fe4690608c431548380011e
SHA126d301505b7527a6a1897af57cb088b16cb7e2eb
SHA25673104045b3e15d910cd086886e1b6f1046fb3afd9d850700bfbd90ff010a6623
SHA51228dc8389a52a649911c82d8da7050b99922b62254787cc07304bbc5726566cf63c5d0dc46e32a7917a3b36f65fb1d406b7d7a4032fd3bef3ec4822794573cb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f60523221448bbb2392bb0cae577c64
SHA144c28799beabb820bafb27c4916c3adf8abc8038
SHA25626be101abae249992a71f4971a279c6a077b73e6d093e12ccf2f3906eea308ba
SHA512923dcf7b074dc08018a90c654646f279be1882e01d6d7e5f84f98a5be404be0ae72dfbcbf4cc6ba656c757eb035d41751e13c02e7bb9e4dc3c458b6185382ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55113b254feb442d2454c2d86482da82f
SHA1af904c62277153abe5e088dc09f2607c43fc6ab7
SHA2569507e5d1f7798e58ea1d99ce3574349f0c358663f127d004474fcffd7a0d2abb
SHA512a0baf1976d06258e4124c9362a996c896bc170643e2cfe81ac4e6a7bb68c13412f8a2d689731530c75a1b4360a0615fc1c70382243ec93eeda1a1ca8f121e149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826384eea89583ffe3303d7723cc3f8f
SHA181f59e6666fcf23ef866820968083d79e9adbf41
SHA256429fb4ef8928e02cba8ab821816f61657d648724029fc0c1c1b6162382020836
SHA51273349e3a4a8f2e27372f1b1e4a4e045c34e2f0233eefdfe5df98a524906049888a250a1ca56e892ba11332be4fd2c657aefcdbdbd85f33080517e766dcb5ab1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9d305a4ddf194cdfd1cd69841b14db
SHA13ee1cd0cc136fbf8e580c95caf239e248b22c3c5
SHA256e8851c4aa862339ce9158b23f29107058ff692af96e992fcf11536b29c57365f
SHA51222dc5c5159c3397fe625f8b867a9597e24d80e27c066246cca296d60c8645b2f13a833673777ca1e5cd5b1ef50418a73bc945141ea7cbf121af3021c8d095b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b229a5e7a1f4aa7f2fdb9fa633a96091
SHA14d56e7f45dd61803f80142ad0a22bc0d25174b30
SHA256ee58063b1a0f5e27e0d6075e0a803f42d77ef163edb5a86781f3820e0b4c70ed
SHA512816b01f5774becdfee2b7c1453e97c89afcc5301f2a490e14e2a2e6a24074c2c084a5c9ce9fdc840d26ae07dda7e9fc301cb731558a5d06bd6f64f176ce9a82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a0980998c0f8108246e8258317ee859
SHA1a4b381249ac3297db2f7b39063df91781adcdab6
SHA25644efcf1cab0be9995a9d910f106999f786646696e286de07000fcdad309be521
SHA51216195198c4dfd1fb2fb805ccc80f7c60868310e7b773a1292e8d4e719bff10ecfee08f2e3bb70b40d65d56aab40655ad5f9b56c77ddcdffb3e9e3348e7a24d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c0198e3fbb96e7a13c897373e83a90
SHA191beca9dd91e3edfd613eb4e58b31de48ce7583b
SHA2568c8da00de5d1385c3d26609b09be56e4f627991d6456fa58fb3fdec1f45e70aa
SHA51227e3ea1fd33efcf6111e29ff85710cb42749aede67db6c3884cb099b9d0ca66e46d5611caeab3e06ce56c845bc187bc5f0fc111794345049b2fbbebb9623e7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3a55bce2fa1581e70ce181cc302ccc
SHA1a3bbd957a6d20433e8187d3fcda992d1092e6659
SHA25646b85cd5c64a4cda8859f5461893a83e31f6d9b73f3dc56ed22a5c1c721634ba
SHA51241109a023867dc5f3e57061afad180f71a3e7850dfee59a59be9acc89e82a24c987fbe618074532dfa0cb2062a3a4315dd9e30db767c101b34ee59bc019fedda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56feae7c42f42bcafbf094697ef2e4b49
SHA1d18c3ae11fcc3ab94c98885b781f8dc0e73ab856
SHA256cdf93f059486c2a859a5fa10fd75ac03b592b0334d60e4f1af30f6532a9340d7
SHA5128aac2e6b5ed605431400160c54f900f73fdf28d040a8ba45af893e74094b5b46f29315d92ea00379aee420a5b0a1fbe78fa9003101c858e7ff90f83fd8b72b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946b17f4a0bcdc0da9079a26fe40b2f3
SHA1a2b3b6ee52995f5617cbdf3d0255dde664f7b872
SHA2561ad8dffd111fd041ab9712d2bd7cdcb8faefa7581ee81917983d05eb35244101
SHA512b366b806c348f56db082fb5f5d04026265fa4abc4de8f817f53451b8b7b7355e515ac42365ed8d3f4cf8d6cf297756d2c4a9928ae6a7735bde237177636b1d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc05ddafd55cc47981da7929c8ea0a92
SHA12959821dd79b913a1471fd11e57f6ce3cd50a2da
SHA2567b1906a5cca6e1fa9db144fa83b6a69ce94b5ce10687f650f0a70ac606ccdf02
SHA51220d85d93d308ad86de6ef503065bb067ed1cc4ad43166d1dac62bb6e36e8bf9821351d3ab712370e4bb12d183dc455f9e060bec773c17a464bbcd99bafb35886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5491953ded3a7ae90b52e7036810b6b
SHA1a98af7cdbd819f12435d378061ea0f1c9fc6b1cd
SHA2567a4efc1e66b45b42d7386c2f37b3e70a09e837672c711f5400196506b0fdcd5f
SHA51294357b4edfeabc90f8f7a2aa6d220e8e51353d6e4bf2d19a8d3c2e343829e541141618f64e102a871ca4e81a3ef3e262e1e80d248c85b96e65046a8add30bf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9378008bbb6cc81ce690bdd3b355b64
SHA127b080457afebe793acb0c48206e419f3d4334f4
SHA256caa0030ec98e1f12c392dbf95fa0eb0f6d6c09b7b980fa2a2dbbe844647eb599
SHA51235cb10bd741bfdb1d0aaba52ae916e65b5e7e83e5a99e03fa967d441e74a4bc6b66ba8b2d64507cb0b34b3ae5901aa352778283c842cb77b257934218d6f9210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf3650b0bacc5e1785d86ee071b162a
SHA140d9d7616936f434ce39589f10aa6340d2945274
SHA2563870bee8ea9d37e810db1a4e071dcf179f058d8b6164989193e0ae64dd11be59
SHA512b11c23b046740376cfe1896aff67399bdb9beabe90d2422611089aa0f8ddd428e7fd2d80f583fbf74c13ac91b0ba36ede6618c325df57237e993d470f76ce9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ce85b46926388f2f077aba50bf25be
SHA1913373a36445aab74f2c60eeac0dfbe0badf2652
SHA256545f4c61b2bb92f86d77d4a08127b4c06e52bf53b67dac5b795a8860067f9c9d
SHA5127f7266b20f8e518844c2a2692901fe31208844e132e145b9c1fdcf83c86f211dfdfaffd9e48b6d0d1ceab0397804e07560cbfd3b2ae60c88be74f96be3df614e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5278814cf527e034c2c6207b5090c8e
SHA1bd97a09dac5335093cc9b660d7c90e824cb7253e
SHA256b079c7fd6b4d4dcd26146a8c0ff22447fe1171e7b4161553a13389f872568408
SHA5125563549e4d147248fbb09b7a59ea3d9ff2d9d2459bf9c9c470c31c07c92b17b0493871ebd4ca26c592bd3e380c06b87851de7415df66993fb7e565327c59891b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c410101d496795e7efeb2f53f41a7d
SHA117edc0b006c99b5b7164d93c587c4e6ef4ab7d41
SHA256cda0feb7341afd452d66115810444e228d79e3bfbb2185e319de96ce92b24349
SHA51227463985ee0fdf4367da6f483f40b9e760dab0ade0206c1c6bb7bce220de0340e59332b6484e72f4ff95df38bf9dbd7b31807d8b67ff314725e06bb1fcd57669
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b