Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
08387d4efca43a0c3e7962287cdcad53_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08387d4efca43a0c3e7962287cdcad53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08387d4efca43a0c3e7962287cdcad53_JaffaCakes118.html
-
Size
13KB
-
MD5
08387d4efca43a0c3e7962287cdcad53
-
SHA1
04094e045657a37aff4195f7aedcfb7ac994696c
-
SHA256
a0abb4b5380455c218382968500109dedb55fbfb78b242a3e2684efd4c705b72
-
SHA512
63d465b92699afceb88335693d3f4f4735607b07f5f21a510b3a9861c4703d880037d3c3586d1ae0590a4e27b41c7a9ee9f358640256843d035c874897eb5c2a
-
SSDEEP
384:V3gE0/e6mGfySy1flWiZY8Wx+LOrFJPyl:VQE02D11Wx+qJal
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e686296914db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CA58061-805C-11EF-841E-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d4730a2cad8aa519658e7f3b0c539966d617f0e6a58afbaa123ecb6140137e90000000000e80000000020000200000009a6bee6b521cfba008f6c5a731d584e7271d2899ebcb2166b43913dab36dc9669000000088b52d54c531895b37c491f192a0c423434ca25ca33d54684260ccf2230ac9f40c7be5096a0418095bc20760ead06e63ed4ece632c1a3018db18d44024b944db68b297751d66194aef5250a5acdf1279c919e07165cbcb2cdca479a82dbf277e150912dc941e6904adbfabe4dd18afb2f485ecd3e6d06e19db90ee584ec7766fa038870ecf7f6f88227c2c2b6782daa840000000649ddff6a5bffe2daeb7ed264f4d5afe44c7c9d4c79fbd64877b0331f79ccd20222f905b9312e89ffc298cabde36dc948b58258030a8942ba7f8785f4a1d0d27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d3a26ebdfdac4595c7fa79338e52b54e8c8bf21d9ee5acd2d6a5acfe92b62dab000000000e80000000020000200000004987643e682d91ecd243ca15a1447018473b1490e2a1c4eb9452eecc131ca5e520000000f64a014ad76f048358ff895d805707dc3602c097c3897fce09f1014f56e6802c400000001354e60718f0f792f3998b60440e5ec1fee8c71ff3f1763d321fc8f8da877bfb7b201cfcb59b2bd71ebb2a04f1752ca6fa18072a77f0647c8e71abb8fd2e2885 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1464 2328 iexplore.exe 31 PID 2328 wrote to memory of 1464 2328 iexplore.exe 31 PID 2328 wrote to memory of 1464 2328 iexplore.exe 31 PID 2328 wrote to memory of 1464 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08387d4efca43a0c3e7962287cdcad53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5dac6a552ff24bbd3605217dd93644
SHA1da7a7719d6d6c4c1b9f09490d2968cc915f6d948
SHA256c7b4447bc00474159d1a0e773fda79e49e5ce139364bfe48aa059f14d33eeffa
SHA51298f567f14665ccb4af0a13e134f745562a21a4766d7021ffec71af0a0f64e0f3daf89cc37f796bee0d8112d79db58728b57d04ae777b182ef88ffcc870a0249e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa02842e106f8cf7a1d9a0326d062b91
SHA12634d5c04468e26626574ed8bcf1cdfc2b00f9bf
SHA256eae178218ca71425449dd78ed56a1552c0772d22bece5365cc5c021671ba62c3
SHA512e0e7ac02fa2f38c0ba3470845006c8678d44c5a91d432761071fe1caa4ad0fe2ae1b3789b418124fca19a3f639221f32160b7056f88eb152f5bcbd6d10ffb4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e3bd66ea8112e1aa4c7c14dddeb25f
SHA1a33bc9b2164209e3aba6fb405f63fc27bc825924
SHA2564ec97efcb22a2917e92e08c741f21e111e70f5ad1069f87695f8b8e36d72d7f7
SHA5123844659ca0a86c6704dc32e611dfd7fcfeaf503589c82ba7540fcf6f79a04a7a1435c6316715bce6e9f6dcab649db36e2fbae85d4fc221f018043eab244708b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ac63c498e81003e99e872c98a340a1
SHA1c62bc01d843428cdc642c1caa7bc27da728b59b1
SHA25635d655f86f021b627d4e53ce7897748723277eff73cf633820bcd7a2d6e1b0d2
SHA51291a8ac2eb548e0de58b97149f44576001fc5c39892910504745a5cac50911961a51c81eeb4737fdde2bef7f267919c26be84c0278bfed512e27b9e76392f3c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec1920a6f35e91476f3ae82eb9d90ac
SHA101c60445c5a006c336f11db3675039c37e86d618
SHA2569891f3a97d93fc8e6b460fe5be59ae5a5c349be56cf05e21513d2ba563aa8adb
SHA512573736f2663a05d08ec3acbf25354d1f121ab710ef525216ebaf7bf24b2fa3108044c1ab7627099aae9223fbd734b7742ad9dbb9c317ff7d33da13ba7ac126ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455e54724db1376bf4b795da274c763f
SHA18970cb87341ae658509a102518695c2e565a77d7
SHA2564d035b1c2a2e282ca51bb7eca2f616636a6e0264a4ced6ac1b880af5e94cb395
SHA512972be96e1983109e0e6d648cacb3c0dde83ae6de9c890d524855c8ff2e9df32a44fb6c1057afa6b454be7505c619542d16374c0f42fe2ea367b69b1295ff8466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e48d903a9b27528c938e9e2f4f34894
SHA1e66d091441987ba54a5b1e109dc7e1fa2a38c4c3
SHA256f064c9da438486fd9d2b8fcadfc3936bbb63afcb73937b97cadafcb431a7c19d
SHA5123ce52840ce90f27c8e05d8833d2ac2d0cae2b413ad4a3e0bc6e70cac8477ea8c59c5503209e11e553ba2ba284476cf7520da13c98c3db413239f4bf76ab3dcf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585291780441d27c9659b8908e8b401a2
SHA1bdb1e8911e365aa86fd8ca79cb812c97b1e16065
SHA256f990a7463301458cfef3f6a073abfedcb1305db758ef576306849bbfaac7ab84
SHA5121cd7a4afa720a8db8881261fb681595b60d9c5def78d0c3d28687c5a54f385a4c9ce59642b13996ce31187767b2bf7f9a4b525b0995b156e4c5236fbbf98a907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8164901da8c3f97d410399d64b2fb0
SHA19dd549b595744c230f264a1919d988fe38404983
SHA2567894a75d5928125349bbb58a32f0b4d59795df04688326e1db9c5cd794dee8b9
SHA512b6c3c598e80f119808ad87074462710ea3c4b585529b3dd31ee628596c743a87b6f7a9865e211ef3295b9d14c91a304a8158ffb64b6add6e2099e75e829da265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e050734f3e91956f8f89d2ebcceb9b1c
SHA115c3f60620d3d87d39fa566999f135332780d5ce
SHA25650d192a60f39c4266bfefba268f744bcdc45c6146098e8707b5144cf72e7ee42
SHA512db986ce573bf5d87eff4724133897ae6fb129c8dd32f88972127570e2e087508a8682914f5f9789323ad058ca0322ce7875fdb0d7e926581509d8e4cb53b3aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69cf3e6eb815e8d1c56f22aee5810be
SHA1751925370de30b4dd05ae6711c0e4cbed4ae0d27
SHA256533c2c2d0ad65eec835e8b6eb4978030c36e40b1365b834de2c8d3d5fd9048ea
SHA51279fc0976de01867c9209df061ff1e767f661ff21f43e5f17fb80987fabc1b564ae81972fe71cf6948e939bdfe4f0bebcb7b2ae30d55964bf6e4e96bf0915ef2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be9939880d1115e7c6fec8f81343816
SHA1a7c8203e26567c0a181a0330af274ae3204b66a1
SHA2564f08a1ac988094297570ea9e6bca9ddc069a89c5dd0ef993e94f1cacf8e013c2
SHA512717c75b8b9db9650ff7b989102cb257335ce4bef88ab5e9e060f58e2059b93480a772c85d2d638a6e8ea8beee0fd33068f9d5af47114c3d994f969f1c9cf6100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53018dbe02f0585d3f3df669e23b40cf7
SHA143ce01848f841eb80370de5d629f12b1b202656d
SHA256bb82f2e01c1012f076810d2a91c0d22fca8d7527d7f0c96710eec276e106199f
SHA512fd4b7ed76e3a8ed063b43d7017eaadae5675fc01b4f32e5c48e0d20b945bd367e1e865902dde368f67243a821554a301c1c66bda59f11d2c52bbf4c4d7c9bbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1fde8dc019446e773bb85ec8573b91
SHA1d75015b3d6017179c7958399d6651c9c1cd1bf60
SHA2563fc86240820d68669f3cbccb4046235705d952447e3d9ecb8f46905819a9bd7c
SHA512a7633116a179aac6ebf4a340b1e6a1a6c5cc425791db496b1c6c889ed8f74224ad5649e47f52998190f9c6c860681c602071427606df1134fb3398b1ac2e0141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552615585398c1d3967059760171d3ad9
SHA191ea468b33d601777cd4fc7ecd0a4004f5c41b59
SHA2563f1943490aa34c8e35f48f0394a8d688f950a0986d384cc0a38a45044039b94e
SHA5123fc8e299155830349459083460553a0364f96c9da579c85542dc4e60858c1e158d573d335feef905714715829cdbcf53edc5ba15abd93d8a4a8292256d757d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cab67cd77c411af4f4b57529ee57d0
SHA1a5c7773545260c0ad5aca236719625f9410b7fe9
SHA25669b2c2e0959265620ff079800158c236056a543f0f01f1fccb68b6a2830b237b
SHA51275c621bf3d2c8ccc7d3ae41f378dd58ec345c6ecd3f8a8720e93246e2ef8f222a31421f0dc74b2908526ed4a706773f634d1e54557ec236049615de254ccf5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ab254802e91a63fa3a4c9bb343d6bb
SHA1c02e84d29a42044e60efd2164703e595f00404f8
SHA256746f865266fa09d7fff8220ece98407e680a4b27719f5cf171cf83cfc43fb638
SHA5120d2b3e6791b41301fed0c7c8bdde8e89880e0d63f3f3e30fbdd95ecd072c73f3675c39ac1c53d480c61b25845e78f24186f774c0513c81adede1a416672e5e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11cdba7f40aefa321bba6343183dcce
SHA16f6ceebeb6b6b1d95f412b12234860cd2f9792a2
SHA256bae7c9d1fcb2eccdb08e4ea265cab8cd9c3c607770d0f055d0a10e038ae369d2
SHA512fed9696bb97337547c0d3a35609be000f1fdf0566b71c4ead22ddc70e5279ca4d74e5d6d992a9362ff5dfe891d57a9e4e93a5fec4f1a5796345e408219d64055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27c32bfcce9de685100578d55c102b7
SHA178aabacb2105105f3de27705074498f6c6c08f66
SHA256aeaf1fa333fbdc24b8b98bfd1015494053aebe002e7dae64a82a5e4eced34d8f
SHA51282f571d79073d8d64d8e6a9b1e2636e2f2e1ad974c5df1c07bd30b17afca32a939628ad8e1e403ca46b34c5d67b6c0235f16f0fc3a7b04b1200e0734d8b3401f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b