Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
0d34ac3c221c3a786145cd4c32bbc178_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d34ac3c221c3a786145cd4c32bbc178_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d34ac3c221c3a786145cd4c32bbc178_JaffaCakes118.html
-
Size
350KB
-
MD5
0d34ac3c221c3a786145cd4c32bbc178
-
SHA1
9c19a038acc3953897b0502e0dc6433ba43f9897
-
SHA256
d075ad0afc3f536b2266013c199b595448543d15472cc85d282d0a2c3eab0c80
-
SHA512
dfdc45bc9fa40843d4653c7c74c1b164acc2ca271836419287ed3264c0679faa45b3f38d1ff2da9a73b97aba985b671215b5d4e1d91c602c6b42c43f989f1606
-
SSDEEP
6144:afvsMYod+X3oI+YWsMYod+X3oI+Y3qsMYod+X3oI+Y4:C5d+X3m5d+X3ZI5d+X3a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b0347ca4db0a8259bcb1d5129d442b4b2759f4ba551fae55498da5cac15a7383000000000e8000000002000020000000244f140fc36dc4b59b33f43a9439e239aa89b9c67a229e935389340cbacb832820000000e7b942371661d7a0872313ef9cda1a238fe5b88f0983b8cb97c681e2a63b4cde400000003b22dd0aeb7bc529074a20a457f12174f477e81b4255220f52c12652ae6e7dbcf75e6820d1855e9c6a570cc4880d3947e66a2aea1ebb6317161a86cee065ab35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01c99a62f15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000af469ec41333c14efd1b0766179f6c608d932914ce18b310000ac8227f727990000000000e8000000002000020000000ccc6e8f983f0bd44781c67a84bf0b96b27e093f5edd4ef766fe142ff25e99a3f9000000001dad12591c5e24fcb914792588f7113d2c93794f9870985d491e18c66427ffdb6c0188c193165fd430d8b07956081b10733d9d312b175ad8288dfda092b5c6de93e07c65813d3b0a5d41e257485a7af36222567dc2cf2e391cb8e728c7f40d6167c2575b1253a9307cd3ef3e2388460a7731a28db8bd1267ad480dd1300cffcca1612063cc92686e8db0bbe35f29006400000003439e3663cb44d03a07289cf2ab6010b95052f30ced043281f06d1ccaf1a7213e6b58eccf7f5b203fb9907dd65476bf36683ffcbf720a4bce0d266b19cdba684 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434079063" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDC4B2D1-8122-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d34ac3c221c3a786145cd4c32bbc178_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522be517f7e49ce09919c91a8563da380
SHA13f6aaefd7aad14c421b20b0e8e85006a9e07d20a
SHA2569ed16552c84f4727dc13efc50e3209da5dd621673daadf762909ec2aa2c8d928
SHA5124da29633f737ee5daab89a173f102622e5745d1a8812f90220eb2e8cdbc0307d6e1ebf6f77bb623e2ad586129ad66441a92dec1757115f7cebba121257e76842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b08e140d41fd09506beaca9259f1c5
SHA1831ebcca8e90d7d1489798ea5030365f10c485b2
SHA2562e4e273eccc5a96ad758d5a716e5289e6ac4379b017448ba88b7961ed73c1013
SHA512b9b79462887a2c9633bd37f2f5ab660119b2bdcd172ffb9496034070c42941de93b698534e2e89a2db642faebbb11cae9721589306a53ec2d7f9eb08927b4b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdafe273143b598daacd451d1a0b91be
SHA1fd5779f5da3c9393e27ae35c5e3e4b28df65e37d
SHA256135b615d8379d3a6b0f52e77cc9ed015a0ed34d43e442777b1814f36fa1784e3
SHA5120e66f8da12e4211912dc250d020f65161d83684c90d6771059414c1d1e76a4ee93b7f3b3e9cadf4107dccb3d00fb278e8bd78f7125d44b3088e64de5963ce49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f8064d3b5ae1070cedd157e2e71bf1
SHA1832e2ec31e64ef8372feecdf80aef23f52b3ea16
SHA2562ee18406bc84fbbda03e966d5e967037a5052696f851953785e7fe8a1b9c5ec9
SHA51280bf4861dce66089d4a2b7fe9b73990fc5bd596c7771c24eeb59b6ec6eefbcd3a5695a78fbc53c50599cd2b5a5d4ef131f49163b3fbc8c008cc3b9c2f5cff610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54700f8f21fa4576182e0b3754aca31a1
SHA1bc0de1af90f5cfdcd5c064ebc5e73511747ef185
SHA256e6c8284d02c53329c2b2dda4b49c12beea8f1bf2e370487d4cdda3dd21f98422
SHA5120a37b95fc644903994456078269798f084edf9a01e6a35a7819f650702985e40df120cbaebf4587b7b232825fd5d8699374e79f140db206f3698f71ad7dbad72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da55e5c00102b6fd42d527c0e630e460
SHA1a1471b615f333c235508cc56f682d0d19091fa4b
SHA2568cfc67e46ca1cc54d63b10b6985641f6b8778b7e2a939951e7ca0e69a265ee40
SHA5129cdb1da37fbd77d01967f07a108dd88310cf678847b132fb1416309dbf43d1d7ac94a9a47a3acf4ac5659d9f106438add71053b31cb1691daa624112b757c361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1ff5e2608a2087e31f83fe812deeab
SHA17ee17919c0b7eab5aa034eb130dd2bd5719bfe7e
SHA2568ac23fd385ed1c327295ca7fc7fa488386ea26b01d4c249d396ac74ec92d4f74
SHA5121de2bd1c99c7365be32f9f55e751940d1c93ce28f841a5e0140e01b4d03b213fb7fb6169493e924a31c3d22deb24ba1672760b9e01e6a5a81b6661b50f561088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52478f45e0f696327c122080c07081475
SHA19b29fa99bf4a73a6d723fbe623a0047488fc42e5
SHA2567f63973aa534a8d8f11d2455279c9b6ea7a671c9f74f16397b100d3cadedeb9b
SHA512ba9cfeee3df77181ce9470bfa4803d313ee061de739313d08a1b0094fcd0f67bb8afb5d3cfc43282a4bdaf34c034417ebd17c2ec171194e2a33f1a54542088bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b613e898c295ab67c7e5ab1aea844fd
SHA1a6ec8d62042937d089ca7e4385f9ea5ce62760e7
SHA256ee66ce5fc1a265dfacfbac0832a75e2f7a5509ba5d8db69f81257b46e404eaef
SHA512b5eca649defcd8ba72c049ca90188fb7963b536bc4484d6b7464672548c50f98d9787e6cc0cabd62d77db1076e8c7a7832db05633a26b8ab64ef48e6c15b3080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8aea1eaf5e3e13cb7a6b7ea29355d50
SHA17b2fa5ff2df6db18b5aa3d8e40b7e4d748fa56a1
SHA2560aa385a5303a5b8a9bc04dac2525595f0ebc0e8a5ba17ea74ce2ccab204e4a4a
SHA512c9416643ac5fa094254d79291cce0dbdf5436de64df45f66169c15d534b04d01d803ca1242383fc09189136ee2dcfbb17044f6ef8735d144025f1aa8b3da04a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f818bcde53acdf12ea4c685a4cd15263
SHA1d58a6d15e350a32d446c4bd060b627d031deffbc
SHA256ad6f7254d3b35e7f8f8636e69274216549c5b2d46b1e4ca3d2f80b3f1adef2f2
SHA512668023623edb34ad4e7ec1e7b2c883ce320799756381d87f72a69a22d3fe2251f46dd032b93909b8cdacc20a371b8e89f546fb26bc189641f82578a9a5837436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d36b36b910f409be33dd889c525656
SHA1725ee30bdd132bbab914ec35ce9cda20e1fb96e9
SHA256d4bcd4b69aa28f8adeabcdea8146de8f31814fe9132efcc0122f6bc4bb38c689
SHA512793d81b2d2d45d6ec19d12f69d95bd89c85a701bc1ce546c6ddc153e8ef6b924bb0dab6979ce2af7e1d29d8effc106aac533b2d3ccc043bcea6232f5d34bb7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdaca82f5cc44a90fbc47be70b987d1f
SHA12a6079e45f6ad1a5a73e970ddefabbcb3913d99e
SHA256f6f8fdd59476751bbdc30742d9cd5d6d6179890dade273f986afbc8ccdcd9f59
SHA5120178091b9b674eef593c17bfd459c89ad4d409419a5029b86b57c1aeef4b76cb8910dcf34d50c1a78c0bca67f23ea6cf92b49fd3e1114d256e45cb2cd239d3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d34e10fded4d909554827a88715a80
SHA17f4c06bdd8bb013b783e19fcec475673470e6e70
SHA25682eb7e06192b33368e324fddf52217e6933508648eff8c92d8dc2ab120892ac8
SHA51255bc825d8812798c33802ad2a6dd14f27145dc4042a7018156abdc242f6760ad39bfe6ec8d3ba940a41fe8c20285c1e672944f424d6f34396026de5d22968cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa661409263a2ada055332b58c9873c
SHA1dd4642cd8a61e6095a9792cbf005d637978fbf91
SHA25616c51288f3103258b540dd5098748d4d7602739edc1b752ce74cdc8284d3731f
SHA512825c471a711d32e6e12664b334badfbe2e9c994239806ee398b951f480fc2f8bc5f48d8b63c56d17d088f923622b3cc46634f633cf6c535ae5945511e98cec4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2cd8e216b81f44da403a3a3054de07b
SHA10e8b33062ffbf73264aace2c2f47c70d5d758e2c
SHA2567bc96ed5d6cc5ba09d29b6539ee8a9fddbd508c0187593a87596e0b1fc555945
SHA512147b76ccbb36f799979403292336259ff9fd52a32c84956daf4868371a67f9c8a5920f289377230a110aa8fdb3c45a679dc5e3faaff488acb12a0ea66207152a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e3536b57d238a12f908d686a6d5e32
SHA1367be13c5a126837f19dff85bc332f3b53ea7930
SHA2563407f5da62eaac0bc679382c29e4ca9a0246f5c4064b8a90e98e5fd364ad7d39
SHA51294a62a14bc1d704b8db67c9eab15c69ef4911c6d2a4a03f2cf67e26605423756acd3fa87f3bc8a5b015099278d7ad206568aa98bf3b26e654640c7ce4539c5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b94c343320606dc1c4f40528e7fba40
SHA1df9c71eafe4620b1f58c80b066eae96ae9e546a2
SHA256ba40903129288fb17adba4dcb75851847a93a6a807803f45781f3a38fbdd64e1
SHA5124c470de61ca16afce1adbb695f46b1d453c0316d9fe67755da9a529527752b1e220734d2ba6a29acfa0e66edb8b592885ea2e37ea8f7dafeef645d7529d3f5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f09e770dce8255ad43a814cda3622d5
SHA1dca1f7016cef40834a2580688b705cbb2c68df82
SHA2564706c91cf2820b4b9c7c8d039b7c9315360f09f396602e6db2a1af547dd131fa
SHA512eda327fcf42eb626168a6efec88226e45b41ade1e98c2d5913f567696a4cf06f6379f26b750553ccaf618b1a991c0a12034d17e17a30b8c4f0e2b4281694bdc4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b