Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
276f49572beb579957b4bbf69b605c98_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
276f49572beb579957b4bbf69b605c98_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
276f49572beb579957b4bbf69b605c98_JaffaCakes118.html
-
Size
34KB
-
MD5
276f49572beb579957b4bbf69b605c98
-
SHA1
b77983f3a99dc12f98e9361e6cb4109ce7ce8579
-
SHA256
0b62983f3229668782a3b4f7abcc5889db03c238f743ccfff9aba21396c515d5
-
SHA512
0931c07524d7103e5601a33a69b33c85707431ee232a0919bcd3929f5d7cbda150eeda054fa07b6f8de9f565a4a9a09d8913a0fc2224d8075ad23fee3b61dda0
-
SSDEEP
384:63JO69zaUZ6Ppr78NQgXGKUQ/T85aIa4f+kN0fHQlf3nkf5ataLafVR7fihrfDV/:uE+5SkA7waPdZs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{974AFE91-860D-11EF-9AD1-5A77BF4D32F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1017a16c1a1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043eda48897d6a547bd50e4aa1d41df21000000000200000000001066000000010000200000009de5ffc4d092b32731b20d2a219b45536cb5bb0d16f7495a49253f4a3dd5bdf3000000000e8000000002000020000000b57194fc49fab23cec7c064af1b1a8410037a597ec2fe37faf66bb81b994233e90000000965183f5e2c0bb9b32b8c3e013b598a4ddcbe6ed03331fa8c0c3caa8acd65e5b666d9a469db26f467eb5b8403936d0dcd4b48695885b3b9a60423acc3d98ba74a954f313b7703b1e7e2ad1aa18a4cb42d89083b3ad795833051e05150f72222e938b8bc2dd3d679d97d40634d8ad7c14a78529dc6a2366985e03df696470c062b78a9141758f5c2dc6809128adc73a7040000000c9518d8b11d9ea69d9b6d2443cfe30baf8113b09db4c4725be7f18d7037ec2226f3c4e36a5cfd31a2a692a6cd6f22d2843d8855b6216e695695e52e62065c96f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434619708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043eda48897d6a547bd50e4aa1d41df210000000002000000000010660000000100002000000081b3944a346a51abca90a74148db99394f65c4e3008e480fe6c4c552702a0729000000000e8000000002000020000000577bd07eb20533da19a92572b12338777579ee1890754016f55020245c88be2d200000008217346fb805ae1bf7b27edf98b07ea67226f1c207daf224069ad6707fb16ae94000000057b8719d8afdc789a4238b78aee66fc30558d3309c8706005dc01743cb1693219a05b97e9693bef862ab46c7aad79b489050d2cfdd5d3049baedee9a7618629d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2772 2276 iexplore.exe 30 PID 2276 wrote to memory of 2772 2276 iexplore.exe 30 PID 2276 wrote to memory of 2772 2276 iexplore.exe 30 PID 2276 wrote to memory of 2772 2276 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\276f49572beb579957b4bbf69b605c98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb8b939c4bccbe11ce4ce22b3bffdd9
SHA1ebcfc688840b9385ed20711ff7367391f77cce65
SHA256e61e77fb8346945ce2777dd559fbd44d99f7a269fddf1fdfc8f2cdb31fea80cf
SHA51216aeddad8fe20a6a3ec3a029d95414a5fcb9a10b9bee955c0d990d8c708e9cf6ff2fb2e5a1017a8524595afbcc67f24d9de348c4f8a586505c1eae7218d8a1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a856fb249eda2844545c8a8293af185e
SHA1a93856be2b23c68e6ab9ab8802670a2a92a6e370
SHA2568d39d084adeb0b6feb955e1609ba1c8aba218104ac1d56483475f5fb167558c0
SHA5129cc53a9fa9cbc6dd9dafbee5aa802e0005de260c7e191d3e1231d90af1090ede2f0628c61da69b6fe8e9a89f71d40a464553119da9ada716860c72f275de477e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85d8d742010ee6ee8b3d38c9ee6158c
SHA16280be2af5772caee2090111e1ea0433f1bfcffd
SHA256533d476da0a9e6490cd4efa2e4af28fad8b70082c2cab50fc3aec5c4787c7f5b
SHA5128610278325ff51c43007636c99fc1bc3563c69bf8166f3cc011b8deaaa5d466ebc6c001c9e5b25ec1086eb8bf44994d0ae88a8046f34196a5474ab0f24daf299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5457aae694ae573e4d939f3bc34eddaa3
SHA14d630a379780fcb428ebfa5c11c7c99ec646b805
SHA25642c9ec1ee0a71561920fba6f1ae8577becee4e107a1c3b7f06af7ea4c2d37cf4
SHA5125511c96d3458dea70ce655c44d1673bf2d3b801d554421dfd1b72f610a640693213a02e6dc491c78dd4d171a080db2c14f1b8aae0935c76e2c85d84c2a83b10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec85f251e2688105867d661c28a0a4e
SHA117f33a1263a7c73cb2b31cee1e92ea7ec3c19a5c
SHA2561d8ca1a31c61f7bbf89a5ef89169b145ca7f36b84057426f1e753eef48b8a441
SHA5126a9fbbdeef10d36c8646640be806020f66d810b79ea6f14208af840dc79b73a37b29e8ec091645e642f5fedc3acd1b51f6a3b8d91e3d6351acc9179debb6ef43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d239815375b7fa603ea6036c78ca1bfe
SHA15486132a91f8dc09d8a267b19b854b83e33bd339
SHA256a05fc710590486712ab087bbb577ef755cb05bc3ab7bbb2b2e7e095b682696e2
SHA51224f01dfb99cf09db4e3da764b75bc72060ca9c39d5fa2c30dbd5dfcd482d291f023a07863a164939e162db16a6e53cc6dbe9d7ea387280b07a2f169a0a7207c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7c8a06df46abba30d6b8e7f8bdd4f5
SHA103be2936dcbd884ee8d2606bb9a602e83ad57160
SHA25663409a4d47a18b4b8727599a6a226406430a3a0317df50f127a0d56f341ce2c5
SHA512371af8d9b5a656a9fed8685e5b63e4b5692f74cdb084d922fa4237feb1b18c194c706c8b873b8730edc2b1a6ccbab89b80290cc5b52d53d6708ca3dedcaf4de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb332f1dccf65bfa6943cff04a6da985
SHA114b60e5763a161be62d20f6ed4ea460585b72055
SHA256ed795081364c2f51338113239e0599b4f29447a805febaafb5dc70decd65b725
SHA51270605efc4c9487615b28fbab4f9ea8c08603234bff23e78dc93a484d2bf7b44b7560017b1db5cb042ee7cbfc0af5be85f9b4a2ec7019b6b4e4fa4b7cd8bbc044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06c5729bb298335b12723009400febf
SHA110378be0fca2817b51efe00420bf705380859fa9
SHA25676d934d63a479605c94c0563e9a24cea1b24303fdb18aba295c43232925fea2b
SHA5125286cf55e7bbca527e047ec347e8ecf9703cf03652ec00b1e36bbd443b0035754170afda71d0d7ed206e2f836e5984fdf07c5a54846b1808e308562e010d9032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561494126b4bfb9e14a736709e29aaecb
SHA19e8f1bd1474f84ffa5eda97765046cf71d38a9b5
SHA25622816ca74abb6519c62730c4d7896f01da3b1bca30389d3759e5348e9f3fa6d5
SHA51252913e37ede5cdac2582e3a83983db49536d98b9bf568c664f078e5d9d267081edcbb45927f5c6f843f94281b6b64df634440cc826157c0f2332911c3a8f355c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd3ac8c923df3ba5e4278ac4b35dfae
SHA1c5ea97def60b8f20b8396fa6cd8296e160a6f9b4
SHA2568292b6b376e10d54db9c311c411f252c83ad6d0ad4c421dee7e4608eb772abd2
SHA512a2e3544a571060aa7a15cea9fe016eebc7ab49179abdcd3166688ba1816c2ba68092d4d34f7c30fd141f949fad0eee11e1f55b989ac05abc43c8a49cdf9836c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfbabf12475a4b5fcfc093dc9d14871
SHA16859dbafccc789e4ec05adbedfc4204d3b0bb516
SHA25627076813760c07938c599366a784e4c3e9dc9e242152e78956fe11e03dab9b04
SHA512d2d2b5ebd9c3ecadd13e39f62c4d7a2d28f1694c79ac5abceda9aee40a5a17e75836e74b65eb014d772e2ca7b9a2c70aa18a0e02cbf4e2a33e6af973c1d71066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e299967e5827dacd40f1f1ca0447a7b2
SHA1b7d3c26851d883b3d5e39f9ba58d9d8271ece87d
SHA256edcb24a90c71679797570ebee7b30afc3805d26fe70e8c2e918d18fb07484139
SHA512e6a34daaa0a00d671d46b8d88d683a66d3677404ba43056aaedecb0ca3ec29a34b45fc9e78969fcf3c953ea3bc6670c24f336c00ba149c12083c7b1b8c1f2e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb7ab9df784588c3ca4e6862149a004
SHA129b31edb8682bebae7315964f484c52e9f4e17ba
SHA25697492b63a653e3436992954b05f45a6e954841c2a5fa07c42c50f9768ba9dc57
SHA5120d3a1c80227c2b13c1c616ee5ea5a24b2614c19bbe76f96a3b466ef3d79da5ecec99d93680a294b2257ad5cabb84e385d687fa4f154114b26e7b8c7822f70c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1296507c95281bacbe727e95a49b9d
SHA186da6d9ae04463ee0c0496430fde22c0738347f4
SHA2569b8981e0523a0022a2a12f2dd7b2325cfc6145acb291836498e9bdc5ff2f9184
SHA5124b05a839557d6b8a281d0fc559d0659af7a12ee1673a504d75634540c48e9189de61ebc78f8fd78c167e5828b4cbd41cd302bce3f2c1cd178ee27fc666840839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fbf7bb7af784e1026011c640c07bd7
SHA1cdc14d6919d49eb597983098f9ecfb85e24b5f92
SHA256a89bddd7ae226161864fc49a84e70f99595de91cfe7d3cd6b7d03d6583046042
SHA5127880d74d5242da6575decf8ebc2468ae3944f1be194f2aeff38f326cc481aa8bf3f05f8ac5404816f2423265a49824857b71e08009ab0821721fbca3862b93db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6936962f399d25c09ff0223a194c33
SHA1f43859de38df392ca840192a2b07d1ca55abda4b
SHA256992713d38c4821f633e0ec52c5fa45d6c37686b6def79c673320bf9419d957f5
SHA512c97410b5e3926af200d16760d8717469766d9147327aefc1faa3c78906eb84523f9c72d21cce3d9fb8cd84f65f41b3ba486c935f59f9a384ad46a97123cdceb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22d1d59cc898e5aa2dd0cdf1492dbf7
SHA106bbdf1fa953172deb4c608d54545aa706574d61
SHA256bbcf26739d7664efa7bd94905498d7f63fde40bae3cc062f8f8c43381b68f0df
SHA512e9767fb2434461046798135329214d3042617ca4ca3151f869304e280beb20e6241c8474b2250bdc2bb2ae939539556b5ef06caadbee48a588ad4d5ec523969b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb645c56a833275340513a6c1bc44f77
SHA1ab6a0a8a50f96b675f959fefc8aab93575e22e0c
SHA25649d83d7c7043cd436fc6502681dff039934ddbb78eaf3516ef95e604285a6209
SHA5120b03409d40b71ee903a501d70c5836892314fdc0d9f5c2010e8b8743aa9ecddd236aa2c4d22c9d7052ba467b53714eff01f7e990460173f2400742696e2a76d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b