Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
08a2ce1e8557e4a1391489184f80ca54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08a2ce1e8557e4a1391489184f80ca54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08a2ce1e8557e4a1391489184f80ca54_JaffaCakes118.html
-
Size
139KB
-
MD5
08a2ce1e8557e4a1391489184f80ca54
-
SHA1
57f69781882f89515dc632aae2985241bd9506a2
-
SHA256
3b8636317a2083f1c44c2882dfe920ee498112388bbc618317c92fb856a429ec
-
SHA512
ff35a74b1004aa67d6d2378bf9b571334eec94bdfd607088b31f83163b4c4ec0d6a233618c3c0a8b5c57593fcda5755c17cbf1bb17234fbe403464d1b140f316
-
SSDEEP
1536:S8sRHX86HhH7YmJNuIhemNl8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:S8sTImMyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000480136a2b5db06e845394e89e0491d748f7892112cb2b92675903fc10e8620d5000000000e8000000002000020000000d32ac167e173b3164852b1d20833de9a944340351808e8d14b28f61a6c0233a190000000eaca84610032b70fdbcf4bd4efbf73b75c982289dec5a3f4b66cce9566fe59f1d205e2c7cae37e93bb286bce84b1a7e382c5bcc939358b2f228fdc9ab60329f70a05d3ecf8e94512cdb573b0a2d6874ec05af99d3888bc118cc1854abd908c8ed1564e44ef8b91d4bfa3d77b9617fef339f62194c94ee54ccf8c108207d9c2dca235eb967a43def5962200875beb2967400000007c09ef149d5ce970fb290b9cfdff2a72c7b2500dd2aec482b4c764760e5d260eb8a4c3152801d28c4fd804178eb68f3c2f1da75fecc0e31aebdf66d56505fa56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CABFA2D1-806D-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f914ae74fad4f981391d0bb75cac341d1ee796b8813d8a37f1a0995d5cef93c4000000000e8000000002000020000000abc5eabd5578dc5488a8cf9908a1cf207bf10341dd7a45813ebe9e35c7784d9120000000275cd6536e2d3112ec58340f6f3f2494e8c94899393c4844bb6e459aa50ad2d0400000001972876b6f1e4cc5286099340eb88e339f23ad2611fab529c1cdbefb2ef48e6391d75ebc82607b02a43a899528e0a7ac32a218cf25821a586ff2b530ab05b2eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434001320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e688e27a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08a2ce1e8557e4a1391489184f80ca54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50953cb825f88720043ca06f1e3cc1f04
SHA15754da2af08bb6e94f70d27d1112c3b222eef62c
SHA256b62b60c3868b98c940472c877528a233b1ae5c22bbc550712ba24324cdaf08cd
SHA512debacd2d1be47c9a5c299f6d9d6c17ed2b6339d908ad442b4b27fb8db72e0b57375961bbe1ef87b70202a6bdaa90c39b29ae14ffc47acb3743878617cd2c9c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df92745d1caa489fa4574750c4a3bc6d
SHA1a8eb59e79827a9756b0e5810006187136a6e3011
SHA256ee2133c446d52a38367159d2815fe7268b5f1a277e946e2fe4b243ea277d5d5a
SHA51255051b9a66e195255e40a105d1f18db85ba9695cd19482ce08038003c1edda7c580ab30754dbfa5805b0ca2d53bc292f3f1c8b58d86197fe2bc29d19e0de3c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542df531af866044aa27ff8042ccaa3ba
SHA1b1537b102d2ce3da208fe7a6da6425f68a54cd09
SHA2562f6fe60195347069342ef3d2738b9be63e04f8ef8874795da481326bafe75558
SHA51290dfa3abc3388b429ef54f981196a6ad8b42f71262d46422cd166791c7cc4a208fb4272185d810eacc83b33241a5faa9f1598a5d6376764d657c05de51369268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66f8db0dd3e8c1fb3777b410bd5bf0e
SHA1b9f79c8435f6054f724d528f063b06d0185ae3f5
SHA25646abaa7f6c9b8380f8305816b5260057b599978f43dac68f58e183071e993bd1
SHA512ed8e6dcfd95375301d8e43e5ac037b7cb76da73831853b1051b228f8d0c88103661fa0f5c02de1921f40417498b3901f4a99566c0c43f7d2aa80e66fe6cf4229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c878f4e70fb3e8df78e10cb319b19ab
SHA1433f54915eb25b77256328965c7f81dea0f2ee81
SHA2567b7a1abd9ce50a8bf3dcca33a3debb7ed1ca872257a28dfe6e40503bf8b6ea07
SHA512ae7282b0185fec34c85d497d58fdf13650a4692bad67b4dbcab250e8db624497359befad43774917116b2b39c0611155d13c0ea3c7b981124fcabfd6acdd73db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3b7bad366cc70bf17a5a66a6208548
SHA1c34a89bf17126ed1ecc2b41aa902334f19e6aa15
SHA256ffc139894fb1d94408a69732f3a57ccb072eda36f14cba59792da5fcd6e4f3d6
SHA512cb2df8d7f7024bf04750f94ea568f08c36d37f90c1bdd5c97a11d350e26fe665fa55d22e33a7a71eef590c1e8eaf1e0f5b8682e79bd44291fc6920c513b49009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f3e0fa631155f4d420bbfb82331e6a
SHA14c115b1b1cbc8055b87be99168fa5dc91df06ceb
SHA25676022240e2c2ea3a4b95b35c2541837746ce5e1af13d9217b11e5307fef32754
SHA512b13b89e102181f4185211636b495f7de831f8d495d1dc4dfd63efb1301d2a936872bd0e8a217916fb96a9e2fa70e0738314727b1aa790958310430fb12ddade0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2384dbce2a8d71c18f49aa5fabc4731
SHA16c9d3270c6d7234219c546cc1b293be664f72c76
SHA256164d867b5c0b0ed91e8d0a4d25acc7d27c3a52d3a430dcdcc73c2d42bc3d36c8
SHA51299317aaf24ca0f99ceb13eb34875f1f5b0f62fe4771faed86aa9da5799d6244815ea55e90c82f178a615b512f090aedd958852d54d1bfd804d7f32c331d11acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ff476bfc5d31d962e408545c384fa6
SHA16af29c7b23b28e3241992432902d29361f830535
SHA256df713c81b7e117d4cd49fb76cf727baa8074a8e9a1612650d5624796bece6152
SHA51296b86857e8df26e3a263f278a45041bf122690ef4427577caf97503004f1bd61a85f249d30730d23ac342d6420d07e9c4deb5efe2a39f44d1c2f8cc27fcaa355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56150ee7f02092d5681e2ed58faf8a7
SHA150b4e17e5c84a41dfacdcdb75d31ac2b35c2251d
SHA2569c5b94f074446808f507ce23cf19c0bf1df15da91cfc2baaed410c968898e13f
SHA512bcee4183ad2b17cebee6b4ac7f006eaed77532876d1360184062d6d9c5aaee8edc48ad8f70eaf1ba0def69e62c4a22dee2d67c9621e3442f530e31028e655b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52706e43e037a0d887e13a552bf9d3dab
SHA150a10a01c52330846bdd67f254bd58696d839b5b
SHA2560bd2079b80c2717482e82bda3a6da9b61b599e967b4ad73380895a42fd9d945a
SHA51206bc75c9f3699bde7db00ff61aeb15c1e46ae3a0884f2a8baced3e5d17e8df80b49955374e5b9baf3904db0bfc9cdfbbfceb5512ec16f1d228849abc7f833158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6cba99ac160e2c71f7e42cfeb398a1
SHA12b85b569ce1b5cc5821961da510b91b381828571
SHA256bfe45ed732d415ce18e622403b06217c835472533f9da110a735dfea43bb7461
SHA512e16409ebee8d5cad72ac851c9f512893d05e51311b9d6b12403c3ea67f5409884e1b7b400678bd564834ec107049ecb93117f095b8879ea0f9934ee8410febd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800beceb5eaf48f0d31daded88f9eef6
SHA163e44cc2aece7089c4838cc371fc209e96ba09b0
SHA256271e42f5a5efc74fe3f1639930b44dc3257ab6f495206d33c31dfff347d9bc5f
SHA512e1487a710b05001b1c0581377fec34f01fdfce2876b207cf39ef2e2fdad659ef09c6357daf8959c87556b19bea8c3e7c1c327413438c8fc708096916ab3aa288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d805ad0affb96a9051e38f672a0177f4
SHA10434136897d49bd25b509079c8a29c1195d98d80
SHA2561aa85f9d816485014c1feef3852b9d1fa44644f1afda0427d7f38db6851ff528
SHA51297158039e7cfc9398bd5432416a47d4cf55e9ec8f180e4a91900a094ba099f5abc2dacd1dfd2df0433948a7673be7614553f15b55b24b1e169bc92a2d9ce364e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a69d67d058e6a3d04a5ac27f3e5f17
SHA1c67fbd12eafd3e67143c5d6e4748e3ac622fdbab
SHA25678b4a9e59b3df0ca7cd689006b3f47f20bba3d24eeaee3abba04e077ec54d142
SHA5124119224e599b651af53f65226613d4d06d51deeda35b429564d0a521a705646cce3617cfc75403ab9c97e5f55b7a25409f9d3154cb1fe446f6f5d8e8aba70550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808fa9b55f4c9788ab9560ee12de80d0
SHA133005846a3e6f585da91deda8c0b48b0f6dc162a
SHA25615a7ae664c47565140348bad41c817291613ba8e1e5acbaf41541044a4eaf761
SHA512e8ce1472d7c3bc4f8ef56a805eb1744507b4c4a8b3b3e83473e4035af44a31bf0542034ca9a89f6bcec8eb389fcdc997f3246ea60b56cc15bc59b67e52aa7b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a4448a641e21c3bc8432b4707f95b7
SHA10cb8fe507d86b21457e2f727f4138b14bebe422d
SHA2569080e5585388491bce51fc59f6442265ba3c62d43ef28c90f4ffb30889fe0128
SHA5125f4275a1b1321484e9efb5ec6fe3ed9f55dc0e66f54c2af12a0b6dd54d5590a9b1134431b8383e46969cf3f8f7a10d009ca2eabd673e14dec19b688a0d4c2fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d8b9313a1064140da476ef85bcd6cb
SHA182179bb8e1980fe870cf3c405bee16818c735832
SHA256aa3f34c6c49ffde421da44dd28b8bea949effb4f32e34ae1b0dee5d6becc5402
SHA51232bcf275fcc291eb8765fc75cdab2d0ebf493efc2855c143c12760a79dadce34cb1e3940a7c919af79882e3ed3ceb5267b9fe174a1ea435b55e2215f9eaa1146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a73e5875110c17bdd52038b4f2881d0
SHA1ed29df635b35917bc8951fd359f38a312c93fe77
SHA2566ffbeaee81dd48eb9aba0c6bbf1ca5c3290cf8340e0455ae6186bec119950447
SHA5124eca7f14fb65bea088537d65ae93f780391e4953d6b22ef1557e232d0c408d90a6b11efcaf903d456241c8aadf4a97519da939808acb12ca1796bad92d3c56ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b