Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
29a86fcf15eac9c82363e82cbcc52f9a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29a86fcf15eac9c82363e82cbcc52f9a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29a86fcf15eac9c82363e82cbcc52f9a_JaffaCakes118.html
-
Size
170KB
-
MD5
29a86fcf15eac9c82363e82cbcc52f9a
-
SHA1
00252c8c56590901374b61aacbe3c03f2f02fc6e
-
SHA256
a8131712b9162620845edc13b6887873f72a919b0228ac1a1d01e20f33222054
-
SHA512
979fe5a6b98e8c70ceddfa94cf46cf7b6561788cc9ff479f64728f774ff7ae6d934b7ca59884126acd4d404d4746bed4cf011e9c383a209d0dd5d552e281e5d0
-
SSDEEP
3072:hYyfkMY+BES09JXAnyrZalI+Y8zoIRTHb:bsMYod+X3oI+YrIt7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01f04813d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004b63737254d0c062f2c3375a3961659f23b711752c597634d4e3da9aa59c2d24000000000e80000000020000200000003acb5cfbf13f4038752a93780f97c036be5d7637dfe23d116a179f3d335af0819000000037e14a80c560a2a8f8e261f22b9e53dc53f776a231d52830ceb904dc244d8c35291bbfc9fb5ca0a09af57f6ee04e6f7e41e9521f4a44447d2c88ba9dd85363fe87c24bc8c5bbbf20f463bba1ecb089a22764b02148548ae4cd6523b0360778d5e06dbd7e5b04a7acc124c6d368e6d672c53a93e78803144ecce4421a620fa4275d2e9e4855fc9af8d416a2c08a1a01fc4000000077a26b6dff7a41ad26cead5203ba253c281e5e9cfe9528f0ac343bd4052ca38d7de400a9c33112ec96617706edc87a25e43df045bbaf65cb862975d470721020 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC83DD91-8630-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434634775" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000291b5a15b918fc8b6df69d266f5ee1bb6c95d07ff14b5bd18edbc0d97a38cd57000000000e8000000002000020000000355ca6be60c3896635c436f54ad577a85ccfe6edff7ed47713ef048c852f6db4200000002fad56488f084d9ada65f638935aca941e1bf1db3b644a5f98fc67a0230f4175400000005b7feef0f06a8c2f27c9d6875953ad37922733cedfeac262b43b3ba79dd345588780aa0c3e7319502422a1538059d4090d075df77ef7b4ad864ce318e9a1d16b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29a86fcf15eac9c82363e82cbcc52f9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc160ccb1c795b6b2323b605b8b77fcc
SHA1d9b4fd188bc7d0c1f3e9860eedb9f19410635153
SHA256d792f14b888736fdd32b643e2fcc576b301ca18afcb00f08fe2efe7e1774f2e8
SHA5125bd940b9d63373b94bbcef00fb94b6db6e039aedf7cdba4b92d0dcadb92cc872ff107d2127da201fdde579688909d3599ee769c8f1daf065a0da821821da9ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0c56f69fe63acacacda608c9da6c04
SHA1fc1711842540634546863c7d9623d1e986a689c4
SHA256ec4589aad17fa3c4d2e156eaec7cea058aceeb532eb506f34d353ce28406a998
SHA51283f88ad444c38ae71ec27cd320d4abbd70d0cd5588eb427b976093311d22f86ca62648a22997328f3fac6e50e9e1ced8a2d0521421188095eec732b1c5765610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd353dd0ff3e5f3845c8470fa8dbcf14
SHA19be4d7f5369843e76e6b9db7a66b68fb2625ff18
SHA256db9c5a303c45285152678cc5930c4f97fdb091e03fa894b20d3eb9220a51c763
SHA512d6dd46ee557fba81eac631e89838fd5ab4824a8dce62aa016e56bec1658ec32e9df00c273323378122c28f42b968a14fb45670e534d818737741c146a12a20f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508da7028faafbbedbbc827827d33beb1
SHA17d10feccdcae129d84d384e2134607fadb877bea
SHA2567a62e5ae8f6b0d4ab6eb322d4f8c8436617faab125a3d0159848dd2ec9ad9fe4
SHA512affdf57bdde8cd1ee9642fde4ccaccbfeacbf0fc0614a7067bf9017592b00991f4f2a0e79502763ae135f154f679135852efe15e2bf8d6c7a49ca117b46d2ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880c89154de55357f3ce466906d4739f
SHA186ecf6d5419eba55acb348a95e3c6a758d8227c2
SHA256b512686e177189d07426c67b23bda4bd2cb807d89570e306857a6742384f66f6
SHA5122ce27f25a60ba021bb0f613693aa5a9e764edcc3279bd79d6473143944cac3ab8f306564333c4b405e1e63b474edcbef21f921552b93642dc8976feba8daa73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2b1d8c688e0ab7144c94f7f1db1eb5
SHA1de6f857bf91ade4ec3b433d975a565db63a5bc2a
SHA2561500eaba9601df7201b69ea573d0143857890968efc377606fc529366f000a35
SHA5121f24c64c49d1bb67e13fae25e70a03d26dc302bf2b19636497702c268c7adf24d4ca5b788639253101cc308d8bc57e13c785b26d54f1280f48470778e7455cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64c57a0ff3fff69ca0bdfaad9e663e7
SHA17d5aa00472d149271ef844361f0f3af6997b3363
SHA2560f36121fecd3a4282231eaeabbca6b13e9d29a88d154ecb22c481b7396356b2f
SHA512c0f33d973c1038ca88834a7ac518e0087fa1c6973b2137b96f472eae1a62dafc32c2ce4d7e957b4ba93121764fb6906e7b5a7b5b1c357632a9a3a6706eb1d26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2c1755ecf446d6c46479877344aeb8
SHA1552532d285f91c277c073eca3fe5951b9d27f447
SHA2567cb6c5da7d9163708e07510742f114f67a5dc7863dae4365f1a3b2f8f51954a0
SHA512a1bf3f890763fe3e92af7c1640e9823a85323fd6fcccfb5246c6b7f9c35172709a6d1c8133831da588c3458dae98d431a42e5c068779cf584e2bef9c912515ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cf06fcdb69375fc4ac0d5702362aa6
SHA1fc60b67fe0c35c236d34fd49a39b37f8649f1c59
SHA256c7df48fc2e2d08693cc2412e884f889932152f25fb19e70616ae329a180afa47
SHA512803fcc4e53ce916a0a5cd08f19a3be45c847d75eb2c0ceb7e56248653899ae8f03985c1047c75c96a7847bbcefaa0951eae276ce8563cce0f24e9c425a591866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5019d6cdfdef33e8c9417558c51380
SHA1fe9978e1f355d32f87cec4ffc8c9fcaf67ad1df8
SHA25681dae2d3d3d55ca369cb0d9314b168b81233588fbb49008a6126faafc85202e0
SHA512949778b4a849ba1763651c78f02c8a76f89e6db1408dc2c6397963d766714463d37301d676b1cfd32ba0f4e140b183345b50f01fc0374c489d061cdfa226ed58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9997545b7400becd0266c7ce329341
SHA188b20bd03d92c4408fe854b8d2855e4b4fb73a7b
SHA2569816bcbd6d958a5817c28ece9003a5d4441e86cd340024a14acdfd9b19f7affe
SHA5127f4fb2aec3561da5ffef24b1b2271b66a1f29172385de64f6b2081dc17a9352495665d56071015b0517bb82973eb31bf68444f047f99a30c3c3f38403bea3a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7fd2418075631c591067391b3dbb09
SHA106ad09e862bc7871702480c1f9950db296749344
SHA256f71d4ed006b473242d7680a7bc4c505f7126dbbc38f127d88743f458fd090219
SHA5121cdffc285ffed7214b24b1b289e05752f1593da668dbc81434f687e1934a41c09784b1a8aef84ed9b1a7e4d4e41ac201ce89fa32ea7e688ab4d45b0bf8832b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305e05fa1e11cf2d64ad87900bb91d3a
SHA1c9bee7a2a977f6aacd89267ee243f651eb73cc33
SHA25688469df65eb4dd7a5709206d345937d06840cf191e88648d2c2bfa9eb3084db5
SHA512c80d408e7954d04e95d4693a155df178da6c0554395fc6afd53ac60c1d349dc82f5f6d4ef966d346fcd1126177fc754037734705ea8187e3f0454e8e14ac718e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fd87ba57848aaefd558c4ba4d776ad
SHA1db709cbb117b354684e0ffdc81ebe4e83ea09e6a
SHA256bf7d2242c84bf23b0af706d5643b9f5150311cf7e4e1a5f8a12d1aa60c78d4d4
SHA51225d21e70544c2b6789ab777e0a0aee6f5614c6af0f8f3fb57b5c78dfe7cc8af0f23eb47de1f551bf39364d9ef712bed08bc40b4fa3886590e6bf2b381da88092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240e5ebf96b218605a7ee53d6be1b574
SHA15be681d8f6a3c45b273ee228beb12daae355a05b
SHA256819ce2248e9eb5d734d41bf5ef4b9f38418715f7e4ca1af11adfbf3ad0b86376
SHA512238e72e73d41b86e8d296254717e3294effa6317d1c8d78ca146bcf6d8152a1bc6c88416796e62bc3f335d2083ff506276f62401d42f1ac1fc0f15d2ee1e485f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53533f1dbfaaf7dbffbb179429850b2a3
SHA1b1c0c5152de86b71df250b7ec696080bf0985b0d
SHA256c65a9f1ce83f600851c5708734b653a766e9203d05ed767543e93cc26eb748b9
SHA512b588238b8eb95d2840c739c7566752c38c21fa003012f90b2c5a6bcbd487d97a5089a08731dad23290e9d111eab886bd9c936c5afc5bef65485584e181186d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fa7810e2353afe54ac9be9cca2a0da
SHA1d5f884cb6e9fcf2a2737c7f642a92428a773206c
SHA256e91e4356301d798150e1284456add547e5d3ce8f79b4fcc2240180cefe2ca491
SHA51262514f443c7c63356fce0887f3ba4e06db6179352fae094a46ecac06cb0700bf5e355a34eb9d68fa29a34db92018a4d088779cac62f731a1320151f8ad4f6765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b04021710c87b2c2ced46f98c06dc7
SHA169a837aedf7039c8f59f2c89fed047a9d566ad04
SHA256d32e22b1e577343fe5f21b56a1e40c51d6671ec46fdbf7a3ce3676edacb26d64
SHA5123dd3f31e0651f31457b64d8efdd6decbc86c9868b6ab5255b73796b7f28c4b0d88503910b4ddb5b0aacfdb39cc4eb262f9f2bfcea5953d2d5b743e2a2e38f0af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f102f203a9e6415dabfd308696936f5e
SHA179229e1041958d02bfa7eba00f4119d1b4b63bdc
SHA2569c4f753db981f83d96bfbabac202efdea54877d91d6705f28949f686fa8fb8ef
SHA512a82709bd44a069d00178383869f5b888c57ae112f46edbbd79a2cc5a9fa76d8c62077c384362303d48b32d698e0b00f28c7e8f056bc12b3c5c4f1dc058a59ade
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b