Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
2b4e1a59cedfc739498eb01703594c55_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b4e1a59cedfc739498eb01703594c55_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b4e1a59cedfc739498eb01703594c55_JaffaCakes118.html
-
Size
151KB
-
MD5
2b4e1a59cedfc739498eb01703594c55
-
SHA1
76c61c1a211da4f73b768bd288ca37fb40ceca72
-
SHA256
2c869778cdd09580a9caab8a05929565b2d9f51e6a619c39ecbe788a965041c0
-
SHA512
c611984572f518d04ec65153e6530c5f9fca8e8bff1fd419e755faa0cc170122a752d048272a50a31861cf2886b2301d3c220e910df52eb874a3075c7de3685e
-
SSDEEP
3072:SRHa9DujWylHPzRE1/387yfkMY+BES09JXAnyrZalI+YQ:SR8ujWyBtesMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804c332a5c1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14E4FB81-864F-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000009a3279a61c5c37ed5b1ae728f7f46d63b6dfa3080727502224f6ff804b5766d000000000e80000000020000200000008e6a8e9dae6a60b75e544fea9bb7d9ae4525cd94d01793728889ae20626b7a36900000005426210cca6db971fb206d71eeac436fbfdc84f1b8febc552d308494660c0812b587bfbda6ed7f656efe9e41b02368af9df719a9bbaf043c8d523219026c6cda381c9e7f254ed95ab118a7805316b980886003e8d96802f5a37cf30a1ce57187ea45ae94a591debf577fbb971b1859bf232e4505f584b565b45426b8e950a89fdb5ecd6853ebe24035df9ceed562293b400000008275393d0c0822d8090aae37e298e8470fffc08bfcc5292f9192c0091243c800571dd2d2329443dbbd48346829e73883adf1beabaecd5c74222032c1e04e515e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000021fa7d467c2bb98d3be86740bfa3128519475177f3e1b45d729054eda173ef5f000000000e8000000002000020000000109705f96177e0a541c13db1155d36d0dcd092630e69739df50dcb63c6e034b0200000002d77abbcf52aca66094c5a65ac30349af29c58b2696a9f86345e23f097cf0b6c4000000090e06417e4f752956e28481ac3c4a0f55f33a7c5c1c44cf31d57a111182ec98d9276d8a38c7566a78e96b537162b0796c85934ef27f0d98b44974fed8d536bbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434647838" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30 PID 1968 wrote to memory of 1592 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b4e1a59cedfc739498eb01703594c55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65754b0a6acd7078848ce066da371f8
SHA16812ecf876a857f7dd41a72dc2e32c522044fa88
SHA256e73421aefce420867f6aa36b5b766fe3a6503d4ac78f68c83bb2ab66f3d96e53
SHA51271344e479cb0126e87c444c853d3f1fc69af34a65cc03677f4652fc72abdb19e201d923455176a243ee3a96f50d90ed673f719a5125a36414c2cbe61a3cf661e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e756b72aa9d07a69a5243aa07c4f449c
SHA13f43b20a0a818fead90fd545fc8a9d5cb455310b
SHA2561109163059ae622d484e8dc78fdbe80d61e65cba9bfb1cf53cd67aa55f9c4d4a
SHA512cd210159b512f22be09bfc96248f593a055d43a6f9d58c51228c859a512d7aa756345aac62e936ce6da726e0148e20755776e773886603df1e80aec2250759d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56498aa54634571cee1d2efe8e503bf42
SHA1d09293530831272aed9f0b02833c9c116f7508d6
SHA2563eae8065f65ca9f3d28cc231b83e8ee9808ad3f4500747b09a64fffe7c3418ed
SHA5125b655d23f8963e9f653e513b6f41dc84c1d74e1ffbd2d0b6d0310b5cb06dd96942a44d7f7aa6f63e7bed9651dfe3f2b0b9094a67830a789299e4248955999440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afae6cec6721f245459b46fbbb956ea1
SHA130ee860b3b571fe38d89d1d08374e95a28185ecf
SHA256a6cae07b79fde1e5c6276dfeeee1cd99335ecace9e40f71fc6c87f85abd2a57e
SHA512d4dad4a13e34667a3244d0b0e71932bf8dbce38f612c0583b73ad93495b84adc1a967209e14860bbe83bfe4a683d9b7aa256b40ba069db4a6f3bbb2b34df982a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9d759b7954f84c7b808cce61c79071
SHA1530a8284bb4c7d265724f522030013ea8ad9a4d2
SHA256d7857a723964ae5f56c507b2eeaf372ea9ea12c8e5c4acd06c8468097f9c4d6c
SHA512757251e9e7f306ef633a2877074b7de5e941ba6f81a930421ee77bfb2aa8d7a84e09be24bc7adfb93e284e82877bb6800c9fc067fa45941db436353c93d87f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51941b5ef4626709bcad147e85616c915
SHA1d50624f17dae93b056e2742c801f5da7a1de2450
SHA256006c4cfd4e238a0b702b662985ec32390476e0bf1c2b0dfabc114cc79b4ed81c
SHA51255038dee67e81a5d5eaf3408f894cd95b02f6855210cd66b863cf46d04ab30657c6a99a686683f728e663dc8b393a803be1e13eaabde07bb078e3ab7330cefd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ae1ca7a256d4e036e8a03b6976d940
SHA1c0c967ce3196004c7c1bed23e586bf052f7009dc
SHA256607b9da4290a193126056d5087a9df7ee5ca65c6060abc58b5fa3a98ae08e1b8
SHA5121418e9632872eac8bdbed0a96c79b59749eed1bda9d260a6984f9205d1e2a19b5d84afbfb92a548285dd81b0cbfd092371d9d315de4d52de598259406591da06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6ec61d41dd539ef4b2e25a78a04ece
SHA18b62239d28668caa9a262b70aa2e95e3516beee1
SHA256d1c63c8cbbf58480782b69f35f5f100e61f2b6e093659b77aa20ace95d28ae6a
SHA5126e7340f15921d01791b53c5e7c8a5635e4e9b5a3514edeee958b87f52212c977b43c5cae17726cb0b4220c2fb1e762b9b86c248f7c9e1ef6f17908d9f8486264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc6c208ab3df75e48a06ab9625286fa
SHA1cc31e4d744687868e28f62397493a9ce1ea91566
SHA256a8c5d793029bb24d82e30d68a4d5a812fa529412f9156e2269fd7f429d56af6f
SHA51273b542bab2aa9f4c9db5c23b6fc55982a96e9b201edf85e635273488de8306beb7c54b49cc7ce154e994e0b848243ab841652dfbbc14ed930cbab221b5be5b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060bb7ad3bd1339f9027dad6f3f4bf70
SHA1fd62ce0df143a8e809accc918eca18e53ecb65b7
SHA2569723bff6a92dd9977e04a0c01dd092d050486bd484896f0bd771b644eedf7dae
SHA5123e8a34721098a0f21a2bf86c0a399171951acb441c2c9238b63b2a3d09a191747b37832681e29b183ba9616a54ee59afcebc1f5a93235bee9c48ed2dc32c0cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50251a480027e61fde70e640d2bd6d288
SHA15d5747461cab7476ced15f0f254d2d192bd69190
SHA256f2bfcb897201250b03aff47a8ccad2b11a930637c64eb4f8091dd1e99aa5b152
SHA512f832fcacc7436fec289c0a030502b04d6d7997a7baac903d6e994ea5b1c6f8b2334f3df15d565ced1ad6e2208ad1db6ca28ca4478312b627710febbec80b444a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6ee9a5edb1e6360b75847f4ac7e95a
SHA1d3a4b472b11dbeed6e36676210c42bea4fa4c2ba
SHA25681d7acd4768b3c70eecb5e799109eb0c535dc1abae8b094f76815f7f04bc7333
SHA512bf652f7392ff1c824e1cb2b1ac8424f2a325e217d0bb5a92d38767bbc1bc3d57446f42a9e633e03e026d097b55f7fb89f7baedcc778534fdbd6bd01e05fdcfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dc769ef523898e7f7d8c3e00464604
SHA17bfbd5e6c74baaefe7abfe45e6dca2a429fb02d6
SHA256cb0f888ba063f2fa9114509f871a0299f1cdb13ea7bc32ddbaa3f109e84bf3d4
SHA5124cdb16875d0dc0ea1e0088d27d3393241682f658b053a98fed4f74ef03e879bcddabfb3eca4c8b1d8bd1b961d1054788a9ce96c7711d29aabaf359a3067ce58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b7e9114a136456cd46db14c506a243
SHA142a7b5315a6ec678c99de26ea24d218d6c6b6ce4
SHA2561898905f59d5919e3c14987a6da451d4b4d2d798969f804056749b09cbdd654c
SHA51214520dd127383135ae616d219660f4b270b8b096173ac85a0ad679360c5e342102dbbce944d4f7842d833fe838d76edb794af2d59331e719809605560a03fd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5705a19826808e9f8bf18213b968291
SHA1c30bedc5685b4de0cfd3d455b9ef53c4f9327519
SHA25654e724227768cd0a8cacc3ae27930798fae2f22c2063688c2bdcd57b4fb01207
SHA512332f84bb0655acbcd08517411eb93741b1788e2f52843f043071fa78acb7a9d0f4a3b296106563ce976f9aedf97834e3a6573ca05abe1d5e3c7eac9474041090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e22d80b02d7ed2bec2a0720c44132b2
SHA1fb8756960e3ce22439f111eadcc2e5e67f730677
SHA256c37107a01cadff5890c6b6a2224cddbc81d5959eba10ff9e7492a1d5eb37d007
SHA512f24e2c7fe598d37869d95a8b0b932509ffc839a9bb172e5c9ab067c7a2863ac03dbd3b229f035ef734eb65beda9131b58a49670004fe3dd1016a29d2c7e10f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9b12e16d4d8db520e7679eddf85cd3
SHA184f105571fd9f47a1925f2b4dfef8a33990e9c3f
SHA256495897a0550de455f28b36007d2bdb2c6b7acb2ed061dd86b183693754cc98cf
SHA51222e9a39c63ef2fc3ae428e1efac100ff33b21772b28dc44444f2d5b66811f2fc30569c05d8a9e8270b4127b73731ade921e4b70050a4f1071864e03a2f562bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32255bf42512c6fbf8e6570b3772281
SHA18707d7ad7ac797d65ab6f71559572cdeb96fff3e
SHA2565f3c65d7c333227d9ac596818bca88fd3f34717ee8955123641a6e8aa11d1e0b
SHA51270cb55b51f7990c14615355b38e151b0dfc266be4699b90a0b59ebfef37292bf265db4cc49a09324eb7356f3664a9cadeedb878ced51697f54e842bdbea1a608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447f86fcbdf35d5e024e314284295f7d
SHA1eb23ecde2abecbd05cace21bc5868d509a5089d0
SHA256025d7593916df0a1b65e32882edf68ff6b19b329da0f83dbd835b2ea916276a3
SHA512f38e6784c49075e13b97f984d007e60b4a39b194eb0452a9f0325a216266ce65ee0b686c940acd8e32bab8824e5f4ea10ce84032d016bbdf12489fa27b76bf47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b