Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
39374e44741583da8a2dbb17009796b7_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
39374e44741583da8a2dbb17009796b7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39374e44741583da8a2dbb17009796b7_JaffaCakes118.html
-
Size
71KB
-
MD5
39374e44741583da8a2dbb17009796b7
-
SHA1
eb9f9811cac83bbed245c109b51d515b88731373
-
SHA256
5576e1403b0ad8dab93ed8f861b1054a77a4e2fedb6e86b7f0f13677259da88a
-
SHA512
b2c74ebbf74a5318fb8c10165e98a756afbd2619994a4db4e6aa2382a43e6ffd917157ea6bbe4ed395de81c36fc0a7476d3fd42bf6f25bc7a73b9e5d376b2061
-
SSDEEP
1536:+0IxC6F0SpfPJWPuwPNPyTSPMTEPrKPQPAPoP9PHP1t699h8G:+0IxxF0AZBlBg699v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434885219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000986067b2914fd7f9cb82db53c5beb9ff66beddb4d7ec1a69d20c8a05bc178f52000000000e800000000200002000000013d5c2a53e11dc99b197adc0caf0962e7c7ab59d931e04197df08e4f6fb15cda200000006715f5cd8ff28b3bcc24717e2deb30eed02bcd552888be4788faf22c3dca2beb40000000f8ca66be4ee2bb523525f5eb5aa85c31075d31f724168834ad6b35130baea2efe98616863297adbea8df1f80296a1e0efa5989efd7a9f16b9959c6ab291e71fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bbfea4841cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000060667f2a3d724a2cda42475cdf0d80702a807c5be9d3038596382aa5284a385000000000e8000000002000020000000d42cca6edf7e17b0be364e1da45439ecab1b846a4603035d3db689a5334b9a5890000000a0d89af6fa3d55a446424e7ba9b65369241229b08e98eea19e4272510c58b2fb13ea437907d17e20c7319a0d68d5bbb72adb1b4c85ab8d6c836770daf1d9dc5ef05e196b4a9f70ef666021d30a8c651d9d19d8a28e7576c0175966b1504a5fa33e640b9673d6e39f9dfb47fcc8e7c2119c829ffa4bfde0e1e7bec3418660e260b78890c1521171d674e02cbfa9c25133400000000d405a324be63bb670cc565dac0fdf533b8eeed5b93648ca34f21ab09e01d10de2c1656ea201e649f11200e35cf50d663cc6d1f9d98aafaca6bb93efca0bdb7b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7A20A91-8877-11EF-82FE-DEA5300B7D45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2472 2256 iexplore.exe 30 PID 2256 wrote to memory of 2472 2256 iexplore.exe 30 PID 2256 wrote to memory of 2472 2256 iexplore.exe 30 PID 2256 wrote to memory of 2472 2256 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39374e44741583da8a2dbb17009796b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9924768a8d4343da3197a56a1bd024
SHA1aa34b8d12de10a01e15d8428fb74ebdb286f7d25
SHA256c9cd58d06493a317dd7bed6a3f4fa85da0f2c51ac583cad90ba04c35fb918bcf
SHA5121ab76202de6eebaa2a8e641ba95c1277186b006100b8622beb26c8efc3ae9517d3e7169b2d7ec10686c0a5dea99e1bdeff51b20ca33af5fbcd47dcb10f0018a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae987a3658e6fae9058fe73f3d4cfc38
SHA174ee6b840a844c36d7678a25efe79ed367d55c64
SHA2561455bca90e41e9b5425a8163114e189b80b9231a665f0d76f52de51517ef2768
SHA5122dae4411b716667747c14956bcc5ca57d2c521357ed8a7ec72618c3b60fcaaea5fa9cea2b6e58e831414ec714b274bd83acce43510fd27fd4b4ed4cf24a04d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561382ff1cbcac174130eae2aca0dce59
SHA1e7e247b1f4f72ed32bd4e611da5561cfa5348cf6
SHA2565ce5b70aa0b5a35144671d05472e0af284bfb36d56db5dbf9b862816887117ea
SHA5121c682b0a9b919e2173c5b0430c7256b06dd6b78e6d78928b7a9b42421ef538015880df40f7d0a95763c9962318c2d676e5cddc7311e8d3592f615481fe4e4e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41650933bd41bb1e08eb8caff37b1df
SHA143d26cc4dfa7411ca3190a2f039ec518cb535905
SHA25640a2ac05380f9dc8927bc9c28f75cbceddbd9adb2cdd50b5bda063eea950e6cf
SHA5125c52820e70225b0509e26723bd42311735340311c0110946d653d8ebad6be5ee8587b430e8d4ddac75548dcb101e473454358fec08ae556feeb6bd56b38dbace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b683820769e15ea461454738a339dac
SHA127dbafd1a53ccef9b681e78d535e8c4c9300802d
SHA2560fcaa7719907106fd809a5b0e8b732e1a04887d990eb60d70df8248c0e89cd6d
SHA512aea3fa374d3fd27c06a20f2282602c71db6238341e24b74cc5d4978c1d4453e5db1464ee36bcce2a4f2d8bcdec5e04bfb16def2a1d2c219da92b477fbd367178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd1c449374eaa7c8dfdd2d64bec76ce
SHA182f998e5b380b271d26171e4292e2b58b172b0b0
SHA256b9bf666b5e5f56a75f56bce8c5ad054d3b5563f1ce8e564deb6b69f380b25640
SHA512a0e8a09a7ccdac0e5f83fa9db4e47ccc9278a4e9beffe72d3de10d46eb634fc80b9043ae7ae6a3f14689d3a37238c98f45dc7153fbe5a0d92d28cfe023ce0081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80337c4b508301368eaaea8cb4cfdfa
SHA1660f4b5b3559b5434d392388731bd15893ad4938
SHA256d50671dc1edb90d7d34bda774cd8a20908933c76319dbc1c402a9157b7572500
SHA5120e089599e2128be4647dc26d858a8e917ac10d2cbd9520d6737c269df5cdaae73a222ac20c28fb85fbe1e59eaab7824fcb50b2efcd740e56068ed49504dcd8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557235cdb51e062035594dbcad8e5b3cf
SHA17bf5243d77db5825b767970cf5f8f7d772d4e5e5
SHA25628ab4326a0cceee8dd047ff2ba42b56b0262c629f13cf76072dae98c86e1d320
SHA5128908dfc4d86e8743f230659eaf837947b4ae32a4aeb4922785418837b0a718a9ca56263d011baa1c10ba648d756e629fb651e8c55c9ed98c1732f95985b4b514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55107cd158c3203c22dca69df16f4eb85
SHA10113af8a501ca6aa068a3a437ab339419450398d
SHA2568d8fd7a64a0c4eef93a524cb8ade0211dfd4170e1d550bf6861841d032b1ec6d
SHA512c79fb44328b1984ccfd7e0059b579d2f271e7b25d0be9cae3b5bda90394f5cdd6da4552b7055910b3dac494b416d9b9e4dc2e86f6784d7968ef624f7beea6a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565fd159457a43311fb1ed9f24e047e88
SHA1eb88d1fe0f92f93d3f8a97da60b3c9959d70cc56
SHA256ff89e07bc1c2f28520337434780139b92b927cf9e2450c29dc5a140b16492424
SHA512eac84b67520b628eb76dcff5da5659a5a7ecf70c70062f1d14fd607d39c88648ec4f9bdf8028c7df26fec0be7e4650a5bd35106cd89644c776527e09745ba076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8ea397edcf8682360b98600a565921
SHA16eee728696e1e6c3ef484a2e65636e3dd2fb44ff
SHA256d55e510c04dbbf1dd80c0482a5deb36272dad53e4289c3c345b74d7e4e9e2bee
SHA512ffbb4b9e10b0c64e8a1690cf2217e38860c5e8a0df471d80db6659988c23fa61d703ad074ab9e00fc59f22153080fb067bfc6c8bdab3ed9b4377b63d96a71fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9238a5b4e16c9dc84e937dc83adf4c2
SHA17bbdb44de1e4273d40957f0fb8d96b72f8b38a2e
SHA2565dcd570a2e4ef0a424ec82fae42f289efcc5f7810e278c3084a3f6d6e5489baa
SHA512e6eac3b93dab47feff69ab5a6669a45abaf0b88547b7827c22920202d91628e167163c0fd2d81a51247108b43fd7858b2df8fed212ea4a58ee7d5e13a60492ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363603109710d6589aa074566878c5c9
SHA152d0e1d50b1176b851ebe9f255969164a9ab194f
SHA256491985a401798e6a5ec2c36b2645ab64d128a08cbdb2c05d1e688fa9054f03c4
SHA512b081d72bb6ed8ae5e4941af9f69ae94aa798e328bf2934df75e3c2e1bfbdefea2933a374235eb036bc1df628738b5bfabdf1cc8c31dc2c0e6f591dadd07f04e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad0a41f2153ef91f5a4d61e45973d9a
SHA1e9f9b3ecbd124a568d77346e9cf319ef7b632520
SHA256d9990103dcad86ae77f4b94c5116d0377a5b5b7ce98d7259dfd8bc37ff1691e5
SHA5129fe5d7ed357fb5f0f92ec1d8c419b365480b829fbff37d28af75d552a7f743a7c682d9d9b01c5ad71141b3f2edc4a505694292f2751f599651ff3401350799f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886dac274825b7fcc2e6c2606663c3e1
SHA1223c3c80eb8cbaf704d03c31d6427a7ad4b5fd0b
SHA25619d77a5fabeb2fafd4c7b013b461bd9e888a56d24b948cae85cdf390ab452d11
SHA512dd5390ed818b98716a18eb39ce35142cd84267d6aba46fbdac28cd15daabf01fea11b4e986093907d564d7622da98c5dfa25b78941f4a31b8e57955143aa1c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450e41fae90ac14395f03b1d68a0c509
SHA1d90e70e86d763ed621151172f9b3bc9c1333ff9c
SHA2562be454489f18f9d45d89457f94c426bcebdea663d753602355cc0d83529df12f
SHA512e4d243028d8e8e39705163b5323afb743a80a1e296f867745a9f603be5f2470b1bb63a841272a50ba938d55d3c19f8cfd6f78a9bdb016dd6bdc8be97e0571e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ab769a8b0c32e14ec3855da0685075
SHA160d88abe6f0cd75dc40810032f7029e004127278
SHA25634b7966c5d459dd97df26890a83602388d43e3a77c58adbcb092ee710e02dc1f
SHA512f8c5517c448df5b02045d35164493bbb1d88c2c2b81142dcd7d8115b84bdcb0ebbd00dee1c5d10bb9496e6137e6310c2b1e79fff4396b7d33e20a9da35e92cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503384e720994bc4f22dbb170b23f3cdc
SHA1e3a0283bd63e65a945d647680f1e7410aeda90b7
SHA256b5a6dd352d153682b086c8bf16ff4a24808578c6430df1a34fc9a241026c8435
SHA5129305d1da6b0fa96f9a2810739d16f20716ef40d9776aea6a7d19131bbc808ddcee2d8667141b836ec24e247c118b34c66143cfeb5e1fdf7d9bae7a9912d1a0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e777fc3aee9532db123ca3557421dbd
SHA13310a64a9c4487bdaeef3d2f3e9919e840cf79a2
SHA256d5642aabd675bda9f77d7fe2974dd9519a0e3c58254fc01d1f5df5341aacfdcc
SHA5125fcde89218f7f8eff31d60351bb565afa528c7449ca0c0c8bde0700777d77af7df9f2efc15f6f75afb652626fc16ebc84069d623aee1597b41c49aea3835a586
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b