Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
0984d2b05176462f657a57e8bf321d21_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0984d2b05176462f657a57e8bf321d21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0984d2b05176462f657a57e8bf321d21_JaffaCakes118.html
-
Size
138KB
-
MD5
0984d2b05176462f657a57e8bf321d21
-
SHA1
bc133a9682c2fb7cbcd372a716cd2ce468870548
-
SHA256
4c67bafe88a426414714ef90e64cd56f8d7673f6d47f350b00c9c291b02d2e1f
-
SHA512
343fb5db9db0357b3495531bd6d8d5fcbf8504c054408f5290da74b41995a3f1a616480c795300016e9eed653587800e8100ce82c529f09cba05d340e55f041e
-
SSDEEP
1536:Sf1tFVAOu3S1FK6cRy4OM3SlsP6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EXe:SffbmOsyyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000070b04ab76ddccb1eb65008d8e477a915d20bcf669e0b6c1af155772a91a1f702000000000e8000000002000020000000284b49fe006488875765220fa3cb117a52da2a5467b10668782af2a768d45039200000009c2139103c4fb20b6d5f76c353ddb6c832197a5a1f60153e359a78fa015761d040000000d65259f133d6e760b295898be884c5dba42c5d27f58e12b588b7416301a249005eadf5f0ac3fb5edef334dbb2796ce943c45041d0717c358a6a07f6bf381d9d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3109BB1-808E-11EF-A5E9-FE7389BE724D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000008e694d1454db935306f79b2635632194d1d3e66428691e4fee167d6bb86a4ad000000000e800000000200002000000043e7885580c4069c7a483f28cf0d7bf19751f246937e73e55c25cbf46604e10c90000000b18a84d7d384fee102e4a0b4afd0d29410d600b668d1d930a2d707c0466d5315cf4ee2983f45f1946ef8fdc8c10ddb71780e4ff6d3e02e05180e78369c4d7f9dceba1742977633cb1fd73f523f685547ffe631c79e96be4d7bcc69cda7b1a40d7b2f066b97c8807311bb81dcc71899c7cbcd193294d23fefbbd40b2eb917d3d1791fe082124af3149efcdd09d09673e74000000095d23d32b708a55b48ee40275292b560b2d96f30b6e8632ea3995b121977efa6038bde9d156abbc593ad439b79acb294e304212e42c11a11b239c82aa1fb09bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434015559" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7057bf099c14db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2800 2604 iexplore.exe 30 PID 2604 wrote to memory of 2800 2604 iexplore.exe 30 PID 2604 wrote to memory of 2800 2604 iexplore.exe 30 PID 2604 wrote to memory of 2800 2604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0984d2b05176462f657a57e8bf321d21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39e4ebf2283e5b6b0533550954cc026
SHA1633ddbcc12f71ecb4c5795f9e94c784b535c501e
SHA256afa2ce1dc5f5a3e2ec2cdadf68ef450882f736011a16ce3048e762834b42659d
SHA51226c12fac3a0b58a1281b5cac4d93850008f7a63fb12add0b43abb8756f7416e2dbf56c193e10b9f2e846365b77a8ac0a54157d2318009a960208f256d355f82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359c0f085418f13b53985553b913686d
SHA13d2e9f30397f06ea280891d58ce135510047d3d1
SHA2561ca50e180ed0ab3766532c8911d5e4114711a88786ce40e6b522eb09c69c556b
SHA512c7d32e889fcb8ad130e7ffade7432fa428e706a4edf11e6f0838412d6c8d085992c5091a229e1682681841a7ec9f620acd85db6542e58fcd52d503ecfd41d529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1dcbb3fef2d750f182379ab53b7ea0b
SHA18f9a21cfe19b74767d264d47d45e1d7201d4bec0
SHA256d3784a4bd992d528b3cc2fd3983430634641d3dfd7ed9095aeac6617a3deb85c
SHA5127a470b1e4654c0ce7f81a9bce6726a3fce0a1248cfdf6ddf0b0058381b354ada713edd4c57e33c38b0f4b43715c989fe5816f1ac4406f76413b78cd7e52535a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c1feea1d5b7482bb69dfc592582e05
SHA10ca5da7d099b5d43911183a7f371250663e379eb
SHA25666c90c0d8baf417761619b17d95a499ddc4e21f6004625d7d748eb5e3e4e2a33
SHA5122a37f197c94c393bf286140763e2d2e04ecfd719ca8b14c82c1a20db5161290b4ad7cae333868b77f17018c85760bde6062486181ecd4209f66c00c6a1dffa39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7e6820a689216fcb06b47bd60b1672
SHA132325fd4ebf2199646fc85eb6dda8e14475f419d
SHA25601be2dd3ea21164f3a80187f29b71cf05357d8a41507ebe83b0dbd7a76e3bf35
SHA51202b84b2fa008fc852e68ed7db10825de13b92b9892b68ac6960778f7a975da9df9d03a86add4300fa881c634afb2b4776b7934f43f38609f3e5321efded7a24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59689b3441a3c094153ddf9157efe063c
SHA14e543c2441fa248d3e84c8980730579d571021e5
SHA25667be31d105d3da15761fbc1590d7299a5da755d4b513c82f1c80e277be128d58
SHA51212dc517140fdae5a667ec3f1f9d18d19b3c5441e26315f37543238d0b425262a032a409bda157344776aaaacf8da3fa369da6b569597719a6d2472f87eef7743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5a958dd01cf1625ae8d993f20ce1f7
SHA10be871fed5bef624bf73e5545a362c2332ece313
SHA256cf0a6428affca68b12ca2e2a2cc5974a9a422c0f5f0be82c73fb27c415bb2b40
SHA512191ed13ebdc67dacda36036f751250a660229627e5b7f5e5f8b364885dd2d73ce8e95292d178b5962f5cc98913b22ccaecc372cf680afe52b23fabee363a56e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ecf976aeb28ee57d2dc5644b24b7e8
SHA13f50c7ac436eda0850ac93599ff62cddc664cde1
SHA256f3f6abc4444745153c1e9818fb082f4c19b4ba1e3fade875f38d76c0e48dde5f
SHA51257c39a22ab8406f024c715f49c499a79b0ab90433aaf4add3625a5937db163f211fbe84b26bb91e2c98993510c01c7d3fe2599b4803fef7911ed2c644be205cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2148f358ee56afd9b06c2e463837d62
SHA190e3d51382e2f54a6ec41b4dc5f58a1ec92a4d47
SHA256f38e05ad3730ad51c29cfd48cb870ee7115befb2af09bd3d87a086c28dfc2f07
SHA512f01f5d492c29f94e7bc967171fdd0e3b01aad44108a426caa7e84d806bff205700f67c5ec259e3c56a660966b4b5a03e4f4ee7e25991fd3fb616da83f25e6c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd274950ea40e608e9232dfac44f19a2
SHA169ebf7e1139f4ef03c04fbabcfc6b450f22f7216
SHA2562abdd16261c9e29b66c463cfacb2a42b7d1663afd0e76e7d3c5866810202dcf3
SHA5120005cf3abff3435db30ab92c5d8ba7ff89b060dc274ba852e3524185065dc1ed04249f8fca0530264486e680e7e679d03509284af188664d808f16202a4637f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ac5636c8e70e8144000903a08408b0
SHA11a188adca907438196b2284e58bd1cb0ec78023c
SHA256594bc56ce4ad72ac01cf40c2d9239e4a00178e3c2a4a24b0bc1fb2df985dd6fa
SHA5122c4cdf070c29ec0d35d979e55c1f9f45c569fd2d2805a779d9748816741cf01c18b2cfe1abea9aff1c64bc9d263a3e844a62b9b257f0055958b85f04ee40d522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1896f9329aaa43c518b4c231cd3a11
SHA1a5e8153dc5ce93d52e762f256a58cfe3f4f08c39
SHA2562c8806ace12c6a72a91f4cb831c66e127166812e6d40cc5e9c7ca92e2e68741b
SHA5129aa15ddb030067a066b5b8184e04e02758d7ad5136887d06c4b8cbd7bb3596a8ea89ed43c0f3130dcc8285d852fdd217bc597ee3cff02d66b2bb88a53b5ba063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105a43e69bd722a16dbe91cfdf87b94c
SHA152cc4c97493f389c84e6e727874d0210a1e94299
SHA2561290f965be0cd8874dcbe91b9d372723ed86ba7e6d392ae04279bf52d8a9c2a4
SHA512084f6f63b31b9aaf48be41f99ed88da434542a2f273e26d859e95b93c6e7ecd37cff8207f26e91ae4efadcca8da7cb5c626e5097b7cf6b7c7506140ed61426c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a10cb98d7d646ae1d71acb961bb5a95
SHA15de8d5f528e60ccf576bf7420120e2a1808aca39
SHA2567f221a1a0e55326fc4b48b36e9ef92cb867850202ce38876253579e70cfda93e
SHA512577a86e44eeb273219a6e3abf54541096fe1b01f5993084c0613c3f301db0688dfe050e0f5b0cbf42b9ee071a4a5b50179c54fb2f6fe2e76734def7b246c6a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b961962218ea3710f488d0706c7ec37d
SHA1c5308a84dce63c5ae95faa03d61f275f67cd9c32
SHA25623fd44e0e2cbea1501e22db60bdec71c548427aad66acc2b9ad1a612ed89db02
SHA51220ad5f4125900f22c05e9ac83b01b4119aaeedfd972701d8d47a7d900af1b7971bb9e1b55fce1f1610695e4a66d2c1687d4339ce09b80f6995371dff012eb1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbb5834042623ff3bd415ad4277144a
SHA1ec839de36d0fe4cbb90dc7adfc7482066c1d2e53
SHA256415fe84698091cfff9aed47b87b19ed774b6ab62b8bf13f63125bc0e425e4547
SHA512bc32302dbf27ccdaabf255fc6cfe29ebad4a3e1798d038de03b3e73df4d67859b52239b52d579a3ec83213279b187833b1122431bb7f5ee27b689766e203f0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dfd0d5668abb4ce397f9d9b3e8d395
SHA1bbc4bcdf1d90619aaf77e5360ba7566e39c4eb96
SHA256558e42c46355fcae190ea624385ec8aca02ea475a16903c1b11b25ee8608a5f3
SHA512590a9081ebdf84ec8107b3e49d5e93b352d45334609f682aceaa16f473877bc993ea98c814ebc3b16f02e2db2e32031b771ebc0a98a61cccf468cdf32b830a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532defa8a279aee25a2eabd53c1a99fdd
SHA170c7a4ce898115ab245f3c5b4edcc4f59aca5dcc
SHA256feb6fed6692a84f8c7050438ebe59f6e40ad9fea2adf1729c3e395afd06ff01f
SHA512b2a4109331699773a675cf8b3a05251ac2b9d2310d69050df460984b1016deaa9d5e7ddd6296beb2a3529f81339db91c4a7698ac2b9c8907c6eee1a398384dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed79fc2bb68a11a769f6c69c87fdbf74
SHA18fb7aaf7b2d490f5507423fb408874de942224d6
SHA2569829a5735b40e835a7e96409befb2f36fe48fd213a0218c7f281255da1863224
SHA512c9e07ca60a18debd9a2496698663fb13693cdd3f315e1db610e3e262dc38743858c59d49c1e6d279a4ce4bbc965de139ddb29285ef3b13fd4fce959cc0e69f48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b