Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
0ae7b63849e3d7309b28f6889a5b6bac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ae7b63849e3d7309b28f6889a5b6bac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ae7b63849e3d7309b28f6889a5b6bac_JaffaCakes118.html
-
Size
39KB
-
MD5
0ae7b63849e3d7309b28f6889a5b6bac
-
SHA1
8a1a9f831d5f4d4d743571b65381be2cd93b1981
-
SHA256
486c12740c43a7b803a813c07a6604ce1aa319c99f81c37c55d7bb5a4cfc0ff0
-
SHA512
e0951bcafcdb22d20efa1abbc5b6b5392c80551e0b048961c574b23af3f757e069f1359e3f67d8a990f888745dc37703c091eec7126cb2f2cf655f59a96bbb4d
-
SSDEEP
192:uwPbb5n1inQjxn5Q/YnQie7Nn+nQOkEntE6nQTbnlnQOgHcwqYScwqY2cwqYQ3qD:jQ/TPKQ53qJBAKF3X/xf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fecacdcf14db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000977fd110038437def0b234f6cf39f7699e1636bce9827394d05ace79c068f6b0000000000e8000000002000020000000319195d961e10ff1b1ba477fc5a24e54a846a4f24189e8d156aba97efd671ab590000000426daeb39ececc9c4d7df55a9df9c34f8447eb794fbb7c91d63a86a80abd660a0afd9e6795e9e3568a6e1cf89be0d7cd8cab0dd3ceb4b734aa96164376b8bccb3bfa7d3e29a7ab1ec96a95fa1786106f23f2aa6f5a64209fba588bb2678e16dd25398d470e96b57841177e1d2295f0b4276d6334a1bb933f6144c00abb834d6f46f7be9b3f02efab5b1909166ba4603140000000f6ab9b170d5e56c7e290f82c57dad9027742f808ded40b8c9a903ffd789c97777860062244c363954fa40fdc26fc9d9ea32f41db91b51013aaf0c1379467da36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F91776D1-80C2-11EF-AC61-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000d3b1d2876e51fd0c238b8975b3311a5bc8104bb929be974abd45c48fa91ca330000000000e8000000002000020000000e49c920d57fcef1ea0c05a153e8448711aac3c50020baab7ba3cd0271dc3112a20000000e69f70b318cbd757281abfc1d570cdbf914a38bc6d32bb7c51f96cc1e088a6f840000000a0cebb0e97fee1ca8f63d7a99c66c070b2a102b1e5a02a5e926447828428b40ea6bc775a7fa9d878ae2748138313e5d7255221c8548a7622b90903fe1876b30c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434037903" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2712 2688 iexplore.exe 30 PID 2688 wrote to memory of 2712 2688 iexplore.exe 30 PID 2688 wrote to memory of 2712 2688 iexplore.exe 30 PID 2688 wrote to memory of 2712 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ae7b63849e3d7309b28f6889a5b6bac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016ad4211597d53b3176bb6386d42687
SHA1367f5574c5efb57ac66d70095d29ab133ee9dd52
SHA256e21c80e63f3bf3e83259781bf607d5eabc4127a94578d7ef6a3d7d3db4f99b56
SHA51201fd9d806a39e40ab61dc35132308579ee55c7724337bf43f1d204ccdfead16ca0935486e3bc6ca1c2ddede17b49290f884af6a91f04678809790c80edfb0fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37b5e1fbd8155e590daf0274c202075
SHA19d023becd7b8ac698cbfc38eb5bb8951f151927e
SHA25697ea741312c3740a19dd175cf940d055606bd6e4c5e3ba8b4bf3181e75c960e7
SHA512d193b80ea90d3ca8a8fe506962aa2a2ca44dea2164c41c65f8966c6f2e6534b9e0313399b703f6f624c37c61a765d2b600bc258a7881fbc980f461395115125b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54baf41b962b136000f6c81c59d5f8b4c
SHA1416a2b57998f58ba018bd13a51251e2fa0052b70
SHA256f22b9eae5c3e85ea1c62bc70a99865c304e9546fc01dc7806044e469f088d735
SHA51270eb75f1d74fd02c6e05804363807972578c398850058fd94de492f006612e8c01c41d8519195897eaa2c7ba9d4dbf1426e27a37cbf2c4a24c37c3a9bf21e761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541aba997540003b6b1f63b8fe3a6b81f
SHA1805d1b3cc12192f7fb6f104728d635aa80feade7
SHA256fc0599fc813ade90c33da08e7377ed8bf0edfcba624a0fe585a6d7d4af683e73
SHA512fc3d9d7b1d1be6aad6c2531f50a2f73bd6cbd50bcfcb65cb43250f8c486ed6ea9cd7bfa5af7f1689f43aa112cb70d25153ffded1fe7e0b82f14e07198f84f383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f53a752422f33bed20114296619d56
SHA1a0ef684aeb4619eb1bf35d8909a6b276685fa950
SHA25651efd91ac0a5f6bdf007b5318e2645b4866e570dff9d2202d7bf79c7710f4167
SHA51282e6ae2af0c20f687b789dc3cf1408f40e4804ba454be2890ef51418e4ccd345de9489a58ec54134361e4d3e6066d66dc2085fd5c855c66db9434802ad27f52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eed3018c2670c86a90723e8b0bbabda
SHA14687bdbda1727454595c42af8b0a9de3a9de0f1b
SHA256a4979a34b83a1dff1353738020508bdff193aa95c2d076dcf837cc1432d88e75
SHA5128aa8cb8546823f6c51b8c7acdf4e5e99f00c03b30a210a0f7a47d26e40c19ac9f75e53ac1d73676444425e11e946135eba5502060cc6b82018ad7365585fdec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd2cbb76f020dc84a4e33841bdd8469c
SHA1e5bfdfc7721927ceab9a75467b795460673368f6
SHA256c3b770a80b891c63d1236004058e788c16133d601d457eccdc33b8fce007453a
SHA512cef6e37f5f710fd8d37acfbb651bed2fef688f31a8ad18e93a979b2b15c20007cf76a57893973ca0b4a436f21c350a8f0689e1e7cafe935ec9d6a7837d8e4350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65a82fad3a9f42dcc61faa0e38d088f
SHA171cf4c2ae33e7365b96a4476396c8b743d8362f1
SHA25655e088665402b51b0f4c677d59fef7c852659a24ef2d858b549642da844e5419
SHA51266e1b0710a185e4b4afb58b2c256e5a6fc73cd07ff8c5fdf059c05dce562f500fd88ae15fd8c70d1755d8c9d994d456073034471539ed9e079436f4c037ca060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e25f1252081ad2038ec0e34a4bcd62
SHA191cab22a94514bec6d55886143d1caa3b9130096
SHA25639374ab5c1f015bb7c6e32718a823a0f41fb1399942aa74b2028932caaffa360
SHA51259a7a8e7312adad5c769d4926b4fbbb79be5bce8a76178f62a215ab8ba402b5ffaada645235a5b2c391217fedddf49a130e1489d7f73455ed4104a8ba38dbebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329bfcd96b2e227e7e5f821ffd36c8a7
SHA199d2dc816b7c00cb08481ab45bf27f7b8f79a9b7
SHA256e7aba748ad6adf23ea479c5beab2b354e4522eb447d628c7c607a27d6624e762
SHA512985a988dd3f8b398fa6dc40eb7a89ed94bfa32b59a756ef62e6c29f9bf3dac2843b8ec67959c47ca9e1d664859f13ae65396e0ac62ae2d4ac9370d6c6d5d69ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59146c004a28470f5805a94079ffd4ec5
SHA1984557b0f1cdc004af09266cc57c488f2117a98d
SHA256bd13bb247a7025d6f4e66038b1435e4cc82c81c6e8f53480f680d0af1fa63e53
SHA512aeb6847d857c3b912443f82b826952e5cfa7df65e708c4bb9605458f309e4aee05852e7297feaec44def63c6852acf67636f604dd913595505710149e690ddaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61db65fd8310cffb4c733db573a2c33
SHA10659546b387a3e5b49cda149fffd52f45a9e9fd7
SHA256948d12c62409f541b686f0cda6f8becdcbfc0eea2cb5d4e9cf60b9158ba3db39
SHA5126b6288b62cdd32a971b1ba5962adc5854b71d6ed01251903a4c2846039cfa0f79d812f3aebf77dc341b6c39115e2945c69df6c4d8be3c50523bf458021719ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df16e62553cd6e3acf0a8d38deda280c
SHA153fbb4896a762213da4660c2bf3257701927a5ec
SHA2566987069358d8b3eb30ea5278f7f9c3e386defca3ef051bfb57432b92c7198300
SHA512f74f55938ddb39278c2da291164d2e55759e9e90cdf4836551c9a9c7467d0c6f141fa775cb7cbbe119b96ecb40f17a8cffe4ee668902cb49dc9a24bbde786f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012b6130516b1b0e32768f231cf7287b
SHA1de57048d1bbbbd1ecda268f8e939fa411d5d41ae
SHA256e81b069246bf84749267a085ab2eeb8c60282327a5d653a13285014c7f5072d3
SHA512cf97579e48e92960e255488c801297762a7c6c91408fcf948ea313e225eb48ea0ec236d23727f9977a45b5e7ab9f906b74c8497d534a465509bd71a3e328a63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b446133cfa416926420a2c9262755a84
SHA11eac4e5eb48698947b65fa8139966ef4216e4494
SHA256fb8b601685bd0f8bd9d3226a958a2cc87983faad67fc51b70b0345441742007e
SHA5124f9529d488be36c1243faaffd342b30bf3536ba0977ba610aebe8a31d3a906bf2f02e63534ca8ef374260198169f7317b0326e7fcb8bb162d4c13d3297056820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317d31dbc40c15f45ea649cb4f656dbb
SHA1d073f49d57c223375b26494ef12f25cd8df2c35f
SHA25643bb3878cd963a24b2abf5b81364575ed2c87ce71dd118dc9547169220465e42
SHA512414e82430f8a169c03a39481b324144f2b32db9ae586eb09f5463d1a8831d60300f64a825f5aa031b8c7ae1246d75bbd3cccfd9cc3a028db5b2aa981ceea6d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e018f68ccade9d6949da1558c3d6a242
SHA1a304251e0903465da140b73a9851c056ec300245
SHA256612bf39198c102f17ec48674259a8b97d7323809babc7a0b36bdc521e35038f2
SHA512ca1512ac4673fb61ead3c2b4265ef4f266ca1466300b47ba427ba4f6387f93d2d97d60444bc9fcb9a9094ebebc1e1487623c86b2058bfc21935beb1500344be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544eaedc106c1bb6475a14df02d96eed4
SHA1021dba66712b9186afe7f76276f2e84f8f93d7ec
SHA2565b40c95a06d94efde7431cb444d69cbbbf8560464d3a1cb21c49b5722561c1e8
SHA512302a1df799fc9dbb781d6fbcaef313778244c676afc5a99b236ab7aa585f69bec296597528c4091716db5f68b265c7f0e5e4db92b230a0950f0d4cece234b207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8cfcb106a09ea91b4529fc898a7fc7
SHA19dddc2089e9e2416cc51451a1f8fc2f6523b9a97
SHA25663a6e41bdc62529a50a234d2bb7d5601b63132fdd85cdb2e28e6b820a01b1de6
SHA512a09b7ac39300ad01d30721b86416118e807a272ee8709411c808b59749801d38ab746c3935a55ad9281580e2fdaf33d1bb2b68457855ff66b520520df5875574
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b