Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2c0dd7d0ac1efc6d4297d7d70f8db7a9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c0dd7d0ac1efc6d4297d7d70f8db7a9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2c0dd7d0ac1efc6d4297d7d70f8db7a9_JaffaCakes118.html
-
Size
214KB
-
MD5
2c0dd7d0ac1efc6d4297d7d70f8db7a9
-
SHA1
07459c547662fd7e85a3ec60b1aedeb51de5718a
-
SHA256
b342881b3c41513d292c5e4bea30b1d3c0c447e1e0bbf3754eb087e0e5d08ee5
-
SHA512
4a66810c55878484af1967b5a5a3bce235e8cbdc81ad249137d27f99eec510962142e34fb1839f08528a18db5163a41c4a46746a66bf421b28312c69c25c46b7
-
SSDEEP
3072:YrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJzg:Az9VxLY7iAVLTBQJlE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007020a5301c4cab6eb53bf1734f4ea363867930543fd5b6061cc4b8e744954e53000000000e800000000200002000000032c37a7d5292280943df92a15b184e9d5700ff223834a55472d18752b03cf6d9900000007c1d865a5f7ab53f953c039cd416ab0121569976c44dd0bf8cba073a2cf0f50877992450f5f309c4c2d8f26efa696749708212707ff39c4f6f2e8fa025a1546c4f51871593619165c6217d64219bc0183040d4cb2fb3e4dcd0e1563778f436c24befd7659e6b0f7e08bf14b45d72036f0cfc2b915e9fb7a04e62e4de95ab9f06ebda3e015e81a0b42448b336ee638a8e40000000995e0a2debc4454409f2c8883e88098343f1c204352e9a0fd50002e593b7c6ee8ef3a52d033d8b0b9a429bde6c362801fadeec58bab01c2bdd20efb92ba1100f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003ba0d1c2e8a0a84bc817dbde5593f30fcc52d0feb50145ecce5537b29cfbefb3000000000e800000000200002000000028d30ed0da148bd68ebe699cb8c5f94120204b49f6350857183b288205eff4cb20000000a5bebca4259d7063436ff54a3ca16b4e584a96c5f04fcf5f2bd89f83cfcd7ddb40000000ac99ff382b5a9b113527adfb93e9445bba4ec1163a9968f14c447570da3087134a0e4ddb143ea671dc32e903fa3dc2e4661dbc71a3c8e27d66668d0757537ab9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3B351B1-865C-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434653658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a7fbb8691adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2436 1880 iexplore.exe 31 PID 1880 wrote to memory of 2436 1880 iexplore.exe 31 PID 1880 wrote to memory of 2436 1880 iexplore.exe 31 PID 1880 wrote to memory of 2436 1880 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c0dd7d0ac1efc6d4297d7d70f8db7a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d670820cecb6aa37de63022b2e3a989
SHA156e721f0daa4b234ba460bd3c3d8135ea574592c
SHA256a4c5e186e64e578e0db366274cdcf4d6a8ef49cf0c60e9da208838f8fe49699e
SHA512599de72dff039c73cd24ecf892e298ee5222a2741e86f2d005b22052cabb0b613f90d6d0335cc35bdbde5c072c3b65bdb66c91a6a8fe9ed14b9e3f6b3d3d096d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c167424db59254172908b07271e034
SHA1eb6061f38ff8ae066d6f14201912bfd0fe4738c1
SHA256233d17fa7da7ce039a2bf0030004c7a4609870caf0d2cfbc7879f9634107ab4f
SHA512239bea5d4712db612440df2d356f59505955901e4bf2ac71b998168cc7b4a156716f87d6b4eeed9f701c19e4453a22e551ec812e5ae47e8e2867bdbf2dc83aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af6a153b1bf82ecdd4d533dd15cf02b
SHA187e0a93dba84f9e29e46be9f6d416d672018d61f
SHA256923465268afcbacdb599453aa304da85266bdf93b127763c3d0295e88a1ab1a1
SHA512cc70741bca0deb391e038d0876a9e364fc9c2cb48ccae9cd36cdb753f0c0c6df770a86adf20423485f35bd5a28a3fe6d781ccb5496062f50999409324984ef65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f512288acd709a557c3629eaea3f600
SHA1c4d1bd4199feb7fc747f3ac67935efe7e0708b5f
SHA256e288765aca82a3fdddf81c8647790e9547385b436f8ac17e01058fa78472e171
SHA512c0f160a84829c5d636177650dfe15208066280704ebf169648d26f74ab8418b15e6439387782efec685cd69662de9755d2df08a88f971219e740e7e7b5e08afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c91dbddc9de5442c9b1c9cb1ee0bbd0
SHA11e6b5709187ce5ac2ae55a555572d0f4db1775a3
SHA2565916491a0602aea871bbeeb06b31ac8e021a71613ef402f9db8dbabfbed09887
SHA512153c24f09206786766ee09c5e8f24f6aa6ab377ab607401f366d9a4a8e0ba5cf7e418a295d3fbb232edecf6e0c80688fd2910eb0184b89eedc5c0161e771c388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf39602a087e8e1bd7fa34a22c14d72
SHA171aea36c1271186bb8835d41c89e209bf0143312
SHA256598cf53d08db40b35b3b180a22535c759e1c297d3a7fca22345e30cf5280cf9e
SHA5129b78aeccd1d3e1cd174ad196905e095390c970655926410bcc5c08dfee871366690780fbf6adccd8624b552843f476f9ce26b09aa423107d7b10f74ba708922d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb67062d345421ca71580eefce1c3ec
SHA1cdccd8637de97efacb33d4f4511764caf842c3bc
SHA256a1ff32994af5eb12a884cfdb3f4d5e2afb2b8354074583e5c3f4a08162cc55e5
SHA512b13c254bc375aa4f201faa7867f3080d65f8d662d7b3664974ec02c932a784cbeebaaed368a90917007b65d74388de7e530356e17acd095efb7d139333332e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d862d8f8bfaf0f5ec5b4d1803f8b07
SHA15b596ef2b2237e42e8b3607c870f649bc961765f
SHA25632ae64221bedb31bedb63a3b631b9e335a841d44b7c73d0bade3e9101cdafeaa
SHA5126fb539a1d3b90563e51ad2a3e79bb89d321923b89e0824b0d72563ec37eecec50270609698cf0f97ed10356ac76f8ad4ab3be97d197d292edbe126bc50de3dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e3599930db8cbb566925ffb65468bb
SHA1f0679799d787dab88802164618123727cc14526a
SHA2561862d82d5a99291f68eee37fe88f74ae9054434aa96bcb8f1c462790417fcccb
SHA512700307e23c8ae8ebb45cda606fc4ff422abf6d55440749e3ac8bde074d71ffd7572a25b58aebb3c9e022806525adfeae25f4cc2e1c7c52b25a0af506d724a6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4e03e2bcf359cb118a5c49ca99314b
SHA1210beb2e0b393bd3ccaa3e3c5da8a68bc2cd9e4e
SHA256b57b59a9359a3cde642315b9945bebd172d064a5c6d33655f72f850f5c7a6541
SHA5123725ecc91275719eaef4f45be1370c705663ee3f96ce4895e9bf1875f23cde538ba40d795af9c19773ebd558a755668fe746187a24b914476af7fa819b56f3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905e5417c3701b82b769861d5d014b87
SHA1356577086ba0c2dd0e1bba9a3a80190a2e7ec84e
SHA2568874c54981287cce513ec6775dc9788867fde9085a6453321185d0cc77229428
SHA512b3905b7da558fa0147a57e58c2b1b92206684c20c5bb5b106a3f9e9797b34e7911c5e10738d2340c66176fad489357f76755040ca1fbcda89e338535fa14dd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaf546cf25ef2ace778c141a89fe445
SHA17dc845488844c8c0c5d36149054dfbb03527c318
SHA256c482abc11b72b34ead9844a72421852e4f7af45692b1b9ef797b3cca5e436c80
SHA512d4cde4e1c93953aeec530dc4f7c9602e67ed79eb49e13ab7a2be16cfd0f09cf6329f113f66be13f113fb5446d8bc73e8a1dc775335c8aaef18b608470e9893bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c167ccae0cedbf3ae30d0542bfad12ba
SHA1558216febb5f1d10b8f15b49e95ea6fa987d0225
SHA256877c4900996515e3cd72ddcdf60b886e755c66331a596fde9bb58568601dd9d3
SHA5128ec834fe3de0965f971d7e6b0011c1baefdbd0002b22ffcd0079764e8f5bf30da35dd548d9e0b329e8eb52d0b3ca1534d88a9f053a6d8dc7e7074246840a8d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fb7c522509494306de524507bf5842
SHA15d601c30295bd108453fba412af5be245932a33c
SHA256380732b50655d4eccbe907b126f74e32aa669ceac0fc809fbe3058f93bcf9a7b
SHA512e5deb8c6f611c12a810edde802b2f52ca045ac2ed673a32e59085eb966a933d30cdae4de52af0b157f1865dfcab5327e51916d802543a1178893afcb71cbc4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17ea578c0a28faf7c42aefed7e4d0f5
SHA1de6bd28725c4aaf31e5cb36c1dcaeb198d20212d
SHA2567a70a8b694dd8178f2538a7ec00ac5c465e0d0c8b27aeeaa15b632eafb762d39
SHA5120a9b0e163757186bba07a4e3ddd41269536dcf44c69dce2fdf8a3119641728e7a36adb513e7d41ffc36490a53f3b7437e928e467531804d352b73fbd963105ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c927f012e293ea072364f62131bf8abc
SHA1c55cf4449b9d712337a62399192bef0b132b9eeb
SHA256a41ac00ce6e5ca325db3bf0a26351eda873772e2286c7667b32262692a9ca2c4
SHA51205dfa4669292dbd6d8af5430ba8c3a0f3a8ca6fc788fae5bdc4847aa14b1f7712d2f11a075bcf4c88bc5e8be797f5df16b5441e33edc376f4c26c345cc347a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b16d0ed6b5a28c54762ff0d0547900
SHA1de362370420e276dd7ee55ea85ecfaf34914f592
SHA256518c21920e8e044db7b534699a63ed932aa16eb2b54dcce3f5425576ec7e2c5f
SHA512856669c7c331423faf2d3d0168ac7aceedcde2cb1a8bd7bf1ed702744b3c79acc80e4ff890b993e54f2be5d548955097e39036af64820bf5b52d0e679e7d9564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d05d9cf7bf7449760f6a7ff5e5631add
SHA150c9f765c3d633edbf0580c7e992c6eaf22b0f8d
SHA2563b3b27049c42f2b5d3ee58daea1e0461a4247ac69cbe8c04b16645b11a42e1dc
SHA512ab2e40ed1d64495d6090d60ed77b85a2ee22bd316a03e98e47abaa12c41343a4c5831a23d76533d71d6cab45546ba0510dafc8954e8022b1dc0eedf7e4c21386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eddb5d7aa6d60e438531b652e1e562c
SHA1902caa2a08dc1c4b27d7f28994094aa13d3dccb3
SHA256324ef01c0ad67fbd2ed63921cc977fbf85a525280f98754dbaf3c100f1d1b7ab
SHA512f0c206a2e9f64c4fa8d75852b458784e44a60a7c779fd2e152b0a2dd26804a0ba56eae5e223e63035544f2187f1cba98dabd0bf687aeaa7358d13a3cfa25c9ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b