Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
14829a42ce08f4d15ce35798cbf07f48_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14829a42ce08f4d15ce35798cbf07f48_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14829a42ce08f4d15ce35798cbf07f48_JaffaCakes118.html
-
Size
139KB
-
MD5
14829a42ce08f4d15ce35798cbf07f48
-
SHA1
a57ff10526e98588036f4cd1ebdf367feea1003e
-
SHA256
64ad5ed60629475234d1da26608cfb2a7000a97a755633da85b160117489b554
-
SHA512
89f8e64061cbaa48b558fe3b32fa8297fe87ddfbe5f607c32416138d4b5b261ee66fa970124ec8abe866ade791d8b2e164e6aedf9bb645cc4a0e39983709ac83
-
SSDEEP
1536:SSNzYCskjlVLJ1wIryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SS+ew8yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007f3a748273e248914e0126c0958bd97a127f0018ddfd99774b549c72962e33f8000000000e8000000002000020000000d83d4b6a2556c8f0816ddd371b7ba50f028dc1325bef16ede027a65b4f6ed6362000000067e8153cc6fbd02fa8b78911bc4a1a38b66decbc4b03425506e1fe8d7b2e44c440000000a78ba7dae649a2ae3c307df613b98573ecf13871befe3d3510d2fde46de5ecc492fead21f397982db96982013965fff722d90e2d71927f2c302b03b461c10c4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f415368d16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434229095" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002613ac618c42f1b39821b168686c67c513c8d99ce6b508383763bdbc3aefcffb000000000e8000000002000020000000bdd03bdba2a0b475cd4178924c6d74a1ee7c22034c0260d6d62667950e9d3d5990000000e8cb868ec065c50e91be0a8937957861aeff17e3e0a92b080b34b721ba9ebb7eced5d89d0faf14dc7db60582cfc07c8ca6cb2d44184e96bb90ece5dd1585e7c994c137c0af63d23026b563a27d53f13a7b0ee505085b4edda20eac204cfb08b8ab2bdbd84a43dff4847de83e09a3adc4060fb8b1e8fa0ec57f931ad1325d749e57692d866cb81d1dbe836b1396a8bd7d400000001945b34db520b9d485fe1af3a2d5155bbebd6cf2e26637ab42b36585f2b0edf0503c78afa9755d32b4065e28d167b1372877e01b7037a6f4b37eb0377d8c5eb2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FDA6D41-8280-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2812 2788 iexplore.exe 30 PID 2788 wrote to memory of 2812 2788 iexplore.exe 30 PID 2788 wrote to memory of 2812 2788 iexplore.exe 30 PID 2788 wrote to memory of 2812 2788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14829a42ce08f4d15ce35798cbf07f48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b83c30392283f9d42181f17ffa6433
SHA1a02632d26883f51cde3a9af4819e5129bae88131
SHA256e4e36a424f3cf3fe92bc9f47bfcf5e8ea12339d9921a7c9de8c215a327c9716d
SHA512eef0f018f4c1250e02bd01c014ecbe13bb0bcd8397a085aefea319e6b506499d03076d1f247f749c1e8af3b07a6b17f0bd39ed1f2f539c4c147027e45ad9d253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0266dc253c20e1a4cc1300005fec5a3
SHA1072327e7565a05063abfe51454d9459265a5b47b
SHA25608b5afc2015513361af54274a38c7061525a66bab2c2f2a5cc17ac890b4aa061
SHA51280bac196ef8da58db5aff8d862d0e2c091805500624c2e64b8925155b969f7e42300af76f0abe6a52e7ef72b1ecfc9bae2b5707a653ed2f8e6d3f7bc9f7018c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e67018b8dae15910ed620f23e4843e
SHA1fa8d1bac3c3743fbb7339fc80a6690de037fbb7e
SHA256451c8f3de241a22177f93aacda6a31708efb0d30ae25cdb3aba626f2f5e9c556
SHA5122c056f9b42d293fe5e2fbd391ceb715ef6a680bff5c2a4a27df9e9821312e3945748bb0973703ec0b76ace05ef707fd031e6d45afb1d67a9b51cebf97c1a0bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1a01454342c363418e5279f050e7ab
SHA1699f452fea4fb696a9ae2b9b93422023c48fe65a
SHA25658901ed8aba1f9b9d84cca8f746b5affe5dd3f1f49a60dea9e098c1840828a75
SHA512c6a3cfe31bc26b9470c9b775cf5cbb0e3784f191967f610d08a7ddda2494624237248f1f09354d4455dcf7c6b9f3a3d1d7d42178b7b2fcf3e76c7950f42c52b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597da2981aede4e7c549e1104363254dc
SHA15e42d49f327daf34d913a324f9eef90182f09a69
SHA256faffded49e478349b712f39ac7a34e3095328504ee31b514a84200599563797a
SHA512d8b9a0420d87e13ce29c1e785b09ae18773f7fe6999207bde27f19d4b451b8b823534631b3ba0ff9c3c8ebb2bb28c95ede1caa28f5ffd3ca06d9251dbfd23d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555759a6d3d45cdfac7045d85aab76daf
SHA1789ac8dbb3b015289b4613ca43d9348bdb22efab
SHA2569bde54122d542c5047904f8e030d9c6e10e6683bcf47839b5cf060df52b63ba6
SHA51208824a36f0274e72eec9cfa58c4d39eae341d01dfd7933d5659f50383a921b6629cf12164ee2a85b444255f1a22c2d5207ccef5e2b6f890427fca20fe5c3b6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c2d8ef7c82c4ced132e392ca627d9d
SHA18188688f4251314146dc89dde01b473bb679d233
SHA256ec0b0ed36aceb0653cbcf8f2e3e9513bddd3cc530cd6869146b687dc44353ef0
SHA5120cecd8fc0d4c4750eab55c3aaa7d81c19be5d765b5f8202224f6882c9a14bdce29d7b3f25a85aa39e3d370db1fd7ec0c2a472c2a6bc186a848236fb0b3dddb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370525fb959f6ec8d9d35105cbff72b3
SHA10a3a4879765a14fbe08a6eb167fae438013806ca
SHA256bd1bce120a6cea283379aa71ab54a6da3850024cfa8ce683c7d5754060273571
SHA51274c6e4984bf589d25759d380e45d8b201af512c827bbc0890c0f0d73cf6a2596ae5e703741faf8e85016cfb1e2176bbb1887a9dcb824618514b7a4a09721d5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9b0216654bcfbb1374aafa721b36f2
SHA1c59e0d1d673e88cffade94ec74e43bbf7e6f2620
SHA25625011d95736675488fd2f4f21906c4a7cd9612fe0eab331e9cdb1d439d458828
SHA5125e704a40cd32f6b0cf433f5b02b5e921606c3b74dbb31bd4d204af79d2df2b2a7eb70227f36b7f0272e44876d5072976a811e3a8da5b0d889cf56dca28523380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2a4283177239ebc94cc9a03e36aa1a
SHA17d8e0cdf78bcdb504a28fd6045e0166065f150e1
SHA2560643b5f8929899aa57884135ce51346c8b07f4cc90e69777a998f433f0fabe6f
SHA512e5845255637dacf68be8b04e1dc0c55ac49c53f3316413d1ea6e1ce35b76b4411d13905898ce1d1cb64e7979bd08f16dc312d5c8752fe6f126efb00da4a6301c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b60d7f869cc3f3a13cbcda6d8de9f14
SHA1a9269623eafac2235657fdb09e1c9156b5c4b99e
SHA256ea1aff0e348feab2c0b15cbcd14e4bafadff4534dd3dc85d232e3d10098cd747
SHA512ea82f987c9473b978855019b3f5ebd2271c1657dae14fed1bbe925c29f4d11bb2e535e58521cce2debde2851c7048ab8d7d1757e6eae54782a46914031717bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c995dc983573961e118675c0092f4337
SHA14b0833dca79138a6edb99b48ec3be65dc37c1afe
SHA256aaddda27c84fc34912b63106d7dd587abea4a34ba3d8b688c376fa1e813265a2
SHA512f8ef9f524a5172feb1689e23736ced01162307721d7f7c578808d2648606bea5c03fce9e119ac510e5eebccc3921520e471ad4877361175980bc4c6bd6e8a101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ba9d2d633af47c436e3d9e5420de0e
SHA1c7b30eee1671ea2cb72c2039979e2ece66caff87
SHA256449f5ce17a9cd753e513ee785ed64de6e4d86392e107cacfdb8239139ec569a9
SHA5120ddebb65027737b6f193074f06e619cd557520f9985fa2fc79ec06d208798a295cc1789d3a54391f056eb1764976d6acbec90bcc63997f36c3aaf48e49bb5142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54245a8856a0fa6f715772b3a3e45006d
SHA177aee2c1a1169f07e95a76a2f1b42a8f430eb987
SHA256da0de2f7805ec76bb181580ee1574807a76543e079fa01e786b5dc7e18d3999b
SHA5129bc04fc9841c0b2a7bf74c15749dc7be43093a7ddbebeb7f83b0e804d16a51007bed3cdee953ae770146e43ce0453be31a17d3458064bb61019eb5baa51ce392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fcfb4faa04d25e608f8aca1dd27320a
SHA18280044c7a1d3cad61aa93ee068547ef88973c68
SHA256550f409881b3e18a918b544f750e71a074e42b2b498b1812d6eed76d02f33d96
SHA5122236860669d1335de77bda75bad5b69c32812b99176ce75743e1519b4702c0300acde004d6faf48e546ad490c87ab3b72a43dfb3e6fb24898d517f51dbc98df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5a24f1cc27a94f1a4830a172f05245
SHA1358b50926d1cf78c09c15422fb802c74757ceb4e
SHA25648100ea19322478c0e5f71bab81e1d91c26b2e39f994acd8f6165eda060f149e
SHA51229532f82645b72d07264e4f11aafb8072c3ebcd458f704d3c3df75a0a9db9ae2c0aa6a13be9d1882bbaf2cf7e37fbce20c119b7c78da67f90e84705af3b7dcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b82cc1c4568dd7fd43afcb16dfc9ab
SHA14b49f1eb78aefb808d75a53dee95c6e00d338a7b
SHA256ec049d296273550856c09b353f7b6657355e9b3e34f3e45c822a68799911032e
SHA512230265baffb05ce0df52eb4f6f58426966fa1445b3369d0a8e8203fb8b14402117d585ab0e7f493aa933a763305935073b8c3a405807f2fb047f0f51f8c577ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd2f1527344061fe2e060e9b8b51397
SHA1b675aab4086a64c2d33d6052bdbcb5d86acc4771
SHA2560a1246efae4cfb1730349d9d54763f3f3345d87c36d0a2c8f1969154fb8a4333
SHA51292c8d405184eab16edc68a72eaf7813225831da11c6d0fc82e355d6a8f8d91c5a42c244b708aa4c857f1812bec922b0e83cfa1df623b3f7dae7720f67986c542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c050e78169dd017dacea69a276dc3fa
SHA109ac4b50ff12d70cba0d9104613e168776442643
SHA256f18a3842aecaffd368f36cd03a258f61a992242972bd30dad838e79be61e671c
SHA512be97d1c39ee4a2054b12a331dda249a4c23b8d861bdf84578d63c0711e75185dac65f62156419dad9e95e6902ec3e3f92f082134422625e05fd0449474b696a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b