Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
fec7fb9030e0c249e8206d6cfc444b0f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec7fb9030e0c249e8206d6cfc444b0f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fec7fb9030e0c249e8206d6cfc444b0f_JaffaCakes118.html
-
Size
35KB
-
MD5
fec7fb9030e0c249e8206d6cfc444b0f
-
SHA1
73cfed2ed4b6f1338b697e81192105f2a8872616
-
SHA256
09789f7b3cb84362e93c9fc54935abc61b9b379f972d7eaaea83302dc17c4ad9
-
SHA512
544226003e339eb075dcd805f3574be1365094504d111e7beeba678f3e1f655a741e2d760050ae72c534eea242d0036921ee5a048ed701bd1aa4ff5a6d21ca46
-
SSDEEP
768:zwx/MDTHrj88hARyZPXFE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TOZOF6DJtxo6lLE:Q/3bJxNV/uuSe/283K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433784305" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f8d7558112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f176b795ec476e132899e18304b1ba03db4cb42ed90b2173ead910ad0c639bd8000000000e8000000002000020000000751d28a18a641a40a0b7f357edbfffd28520206a3b81cc35c048d47b4877f190900000004fc2012bf2577fb9bb2fbff993538b24abb5402658fc3e9cac9db27fe30f96b961ab6cd223dc74931bb27d3c004caa7cc2a10c6c05e6a0e8727a761688c2576b67c4cf7a8d0fd0f833244721917c7ff902dcfc8131f4dcbe4c80b9ec1f4494873450021153c58557b4a290f30bbff187d0c73633e35653cfedcf70c26a595e89862da21769ec42a06c74ad0287388b8c4000000026a5ed94c51390d9a55a1b34e86a9dcdde7719c15847bf70b187e97a6744974e21c9697b9ec31610a8c4a978f34e8b565cdcb1b92d7f881179d9b5de65589950 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E5A5CA1-7E74-11EF-A0FF-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000071f8959d41f836c33c28a993117d886846cf7d6a7f1437ecc5b38d041084bdce000000000e800000000200002000000054f6e673d4bf1c6ed294a2dcd549086ba6517d41d34b2ed1c6ea4ee13b495d18200000003efcc2653fb041a61bafeffad9f33ab3237c7d7ee0f504c149145d1769c1ddc2400000008a9ac82d295b9254dc579cd8cdb9810d763f4119fab6dc58a28612193859a2b17dc37da5d8b3857850301d508e189a5f9e4e3a06fa46f22cb79eeb14a50b9212 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fec7fb9030e0c249e8206d6cfc444b0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bec2f2ad5e0e1632bbacae5f1b04f7
SHA18f6d9c655c5f25745f2338c29285504502694212
SHA256dac76a8fdf4ff8e1f521ab113211d4346b0689a4515ff8e256a79a2e419d76bf
SHA5122a6a41cc5736ed4d0fb6b96346f55dd7d1875d9dc5d14804578ba9702a5b0f532a6342dc4efdd8cb21e34d86cf2b92e15e82a6f4eb95db1dc9f040b5bc55003d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f284b586513f349e61f176c32bff988
SHA1064ce8219cacd935431835ca5b80cae3db2bb90c
SHA256bca471595b8d0bd1caae59d885ee17576f936aee3fadd9d6513b756a4f1ca1d8
SHA5123f9779d4846f8f741a4b797b32f9de73205689eae84f037b7052c2314a8ec7c73d10b7505e0d5981f2a12697b8efba42938e226640cc617babb464e2fdc532da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d191c05e80ad0671c2fb5ab7d16cea
SHA1844daf5c95d9e716764ca752e6d25a11c9823466
SHA256d647d0e9823a2899ef3e15423fe29e7afafddf9675a39184dfb8e3d4a36fbc18
SHA512c49522b726b63936a5c516869a592f992588b5bd7be0a56329b1222a8e31cf2740bd7b2495bc9d825944e83a33eba9e3b526bbd104c13c6056ca12d67cc175fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54281dfe1a1154775642861514f7af9
SHA12b36f7ca5adbccada922a5320624491c2e0bcee3
SHA2561bb2db35ef642c7ccb9facce4e618fb02bc7d3295607114e1ce86e5c419b1686
SHA512f45a0d22e436d67fbb4f74a1352651a4141b480bc2152561cb14d54cb044ce665aad0ded6c7748a1439ddf6d60bb9a387378f090f2ccbfb4651953795e3c54ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53430ce2cfc28e702f507891a5e3e769f
SHA1a992e5e03017186caa78b9caa00d8a99dc8b6700
SHA2568033b832f287c6a1aba25301d31dfc1217379be4e0c335e98aa64b691505c349
SHA512c6d50dab903362818ac37152f93b407c166ca694e909d0ba27435ba1243ce934e66fcc560a14a3fd2397bff45ef5689752370fbfcb97e82afb7f0d163fcf19b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8bb6b20fa779f73381d1ce157d4b1e
SHA1ffe257638542053fab64c45c2514b471fbdacaa0
SHA256aeb37e409711533fe2184d57fb99a97f263f6ac2cca060bd5e68da9163357934
SHA512f8e7a20c7ffba348544c4d57fee04ad5d2c8e91d4996fd5fbe5a8775f0be4168d120a045f3ade7214f543a1ed84fd580516b91f03c1be8e0b959074bd83d6b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593e017e4555c5754e9ca6a8a2dadea5
SHA179f67f6364124a202a1292516968cc5d3f6deb7d
SHA2560b587cfed489b7111486cb8d5b895677a3add2b0f5541d9d10493ae1877fd08a
SHA512d89dd3ddc236a869d00e0f6950546438d242a86bcc27e21bb34e79349c46d58ee7f5bba609e4b30690238be162e0fda4977d366b295cf6d49943d393ab0e43ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b889a47004c5ccdd252a4876b2ee4d
SHA189ee3cd64e37fc235d72413cfdb55f458b512626
SHA2561489f2793b778b3ae2568830c893af0dc0f3b12813f366d807ed0dc7429eddcb
SHA51245476a67c32ab8420e6cf09380f91ffa648ccb8c1ffb17cfc07293e9f9b5585ea985a87e81bc1e46e12d0cc33237fb7d3dd138e568447a551e52d5fb7107929c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13b3d0efc408398f7137eb07bef6523
SHA1194b6f2892ecb43c8854d8ecf7843d3733a69e9b
SHA256b8aa8ca2b2f34d6cdc2a05ffc953ec21b080925ce022b90dd4e91fba91efffeb
SHA512a47429c0ab1d2b06fb45fed2f2a5030e3e84a3b4d5e0406710d2536f1d2d6edbf337480312316bd2a60b6b2124ffa412ee35b6cd7b359a420add12a7e728d8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d013baa1b62f5c7305124e36a81b5f5
SHA13764450d0be0673a5d2360950ecb9a2614b5b7f4
SHA256fc9e48f83fae7e43a284df81f811ed6600321c0439af5ceb3c67339af2912885
SHA51238cef16e9dfc44a73aeebcd13e74e2e8772722f52a6e84401c57f488f4ee1cd896c5e4830e31b75a40b751aca0f500fd86f82bff0415d9339ead2980a7eb81ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1958728c1d5c4e4096eb53760a4a3d
SHA18a8483bbf18c2a1cd8109427bdde19583bebe393
SHA256c1f5a858bf293d0af1c28546339539cf6f688b6efe0e3a9ece22ee43b5f8f8aa
SHA512be59ca2bf2bf3c6a303a582b03cff48594fde6e665f80ae834a064c978e8acce594fd79d9583b05dc2e75adb5f543aec19465fb837af71879f2c6f04a7a6c1a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf7de03437f982d53309bb5024c61eb
SHA1cb0cc5d88e4d83603d929792de66533c522a236f
SHA25608fd1dcff52bfa8a2d69c9ba6a5af4d01d04e347831c8c4a5e2cfdc604988966
SHA512f62148b061c55924b702dae605aaab3dff915c01a8f2d6e925b1e4e447d59cd634f13251719d2bcc923e06d243a6184410512648105b864d27f5062620ec6508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59475aa899c71df118e282b23b2400913
SHA107945758b70d43a62152a5cabeafa0c16c7403a1
SHA2562066efb0b903041e9538f8bd650d59a9b3109563c076edc3e0f9ab10642d6130
SHA51206fedbce64db64d8d213ba27102f00aa5bdd8a2529f4db5fe2c661aa06830ff2d908e70bcb7d453dc97180c5a0f24a9e2a5fb66542e458b3586da5a31425ceab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5f1698f2b929e8b4fd8b768b702d2c
SHA16082629098fa54e1d7e376aad2b9355ab97002d2
SHA256e94e4b0abfb48855b5bb924ea1d5de7be0b598f9a9e0fd2127e093d967a924ce
SHA512601c965e01e0c77cde192f158daf80b6dcf2581b142561b1706bb59266068db0c1fed02bf8712c67a50ce7fd8aa1f311115227f2bca4fbceb35e66696848d910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56784d3074b02efe5c5961d394d07518f
SHA1fd40c27520a7ace7ae3054dabd76be330f03712b
SHA25649a3516576c5e3ddd2efdfe5c60fd794c694297afe22a4913614d964d7e6ae8d
SHA512e76ba3e05d463e48de5dc7b198637e6abed9c6f65459e2c03f71cfb8f08733c8163ab6c6ea43ff5e32a712565964c06d35b62fc70a50699d7f697490ab157c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525bebbfff5c38ad74f969aa077dbb335
SHA1b4318526de5cdc2e7043cd541065b5a9dc720fc8
SHA256765b630de616e18c8234fd569fff49c3ab8676138da22fa7a792934a599d404f
SHA51283e74ecf0ad74b8670d62c1eed93ab99eac4570db6c0a0de182f710e360a9b21a8a7e7bce9adf4f3373dd6c0930d414a99d69d769a583546a585e248d15ce416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5dbd65a7bd0ffdafa367aacdd883bf2
SHA188584796af0076235efaeebd77403f2afbe3c24d
SHA256fb3de3c1f9b367d68b1e500fd4eb507b38900e63c57f5aa4c7eeca6895c0bd6c
SHA512cb52bee6ffd080c7f7ec67423117f51992ab4e2d0c7b7f9218fb65e9f469c45374dce02e6b9ac6d37df61364716d1dd22902c1fbf72630d9edc2ac566a5a19ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9a1dd5f402375cf987eb0236896b93
SHA1d3d8a2dec661004c36d122d2a5222d17efc5cb20
SHA2566668065b1d38024fc6836c070761f0db852ec41bdcf6cb57303362b08f83dd1d
SHA5129425fc35fcaf5c3e330483fe7b8b46868e34c9128d5a62d110e206978e0ae6cf7e8aa734cb718f105097dc1981c329d699e60e38fe8b2591ac18603c5f1a2d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff7966d1427d9d2948571e9d525f2a0
SHA14edeee3ab024a8050811dfac01536e8d60e55639
SHA256e996d1718c39a8adbeef223290fcd0dc4340d78c5ce172dc014aef07bef85eca
SHA5129954de50700c3b53f4780b3f7f07c207d2f2bc31dad1248be5e89d8e852db1ed49c0a3f022a773c829a823132bbd8ba34c5631181fa9d79db60266e0e0a9662f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b