Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
420f9ba56e3b37c29d6283c4eb276da8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
420f9ba56e3b37c29d6283c4eb276da8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
420f9ba56e3b37c29d6283c4eb276da8_JaffaCakes118.html
-
Size
214KB
-
MD5
420f9ba56e3b37c29d6283c4eb276da8
-
SHA1
1cbd5fe49b007b550b62422b64ce6a51ba6ade55
-
SHA256
1e95173b48f8b6f260e162a26dcd0a0dd67798090c770595d4a753370875a191
-
SHA512
5a4e65bec78a454f9c95f3b78dbf2746faa731504d842f7ad65d6b96086d8fa27767fbc40da2aaea4eefb324d44f65110677a7d8c44ba7b6331fbec8ff160720
-
SSDEEP
3072:trhB9CyHxX7Be7iAvtLPbAwuBNKifXTJf:Rz9VxLY7iAVLTBQJlf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08e21cab31ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000001ad715de60df6b8c016235e268a6a38986cb21a31a8b19cd818951e923f8d835000000000e800000000200002000000064b90979af4d19c2d74fb52a02309021dcfaaa92b9553fe917b503d899454445200000006043dc676675bec9876a01b392f057bd1a8885f1e3a19f5b450bc66ec1f6c5614000000018a8a97e330eeb530a40d6e9f5926200ae1acc74073b7f1792d8c4f844237d7d099517b5af59828101dcdafd0ca5b59a7c9508d9d64f97d4eda4a58d846580aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435015325" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B56F00F1-89A6-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000494b08dd1e962716ce35c0a724543531ca0fd46575a7671bb904fcb8639427f3000000000e8000000002000020000000ee4c4c54f4d84006bcbfad99f849107a07bf3d7fb2cfcc804e857fe4d3a93e9190000000dcf11b8c3bb2852aa78684c7de6f6855a5b6b9acbe3fc69e22b724e966e5a8fc9572386cb84d556ecc34c8541a64ab8e61315141459fdc1eee7f0b0f0e7b65f49353ff0970824ab2aeb86c3c486c8c8ceedfff8935980ca9cd532b5b97af1ebf7f86ff2bcca915d1e1d62d8013001b2017ae4585438e58392e92a0cd1e9a76a1e4ac842464dbae4324e71486be559ab740000000fe9b61aff55a45917cba824c7928f203ee0c66d377c3925161989da7429ae9c0a611c615bbe864e6d48d2765de61304fc0d959087673abffe635c21214b97387 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\420f9ba56e3b37c29d6283c4eb276da8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aba442abb14a61c0cbeed6c40e3dc17
SHA1eb10d1c80fd4fb237ab190812bc4f6c230107023
SHA256afa10ebff916563a0b3bac71972ed042b17af645ac5142e50049c2b725875d30
SHA51243f636ab0dc64484ecb800f365ec7305a9f4d61dae23e9f846fa07d713f135445d08da0efd507a2801131dc18e034efddc0e812fc8b34900e038ac3ac0033572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cd840ebba3f76ce6034f232eed550c
SHA1188bc6a1e869cc6d061f3c3a466651b865c0633f
SHA2564ab57f65d629ff20f93173d7c7a4da85953daa8451218cf6efcaa4cf02ef3120
SHA512ceca79700112e5d632474491a3c72ccd78e0337792fe43cb2f0c5714f2a4b0bf765ed450932ff7bdf8ea5672969bd0ef6e6660af678d9ef6beea285bc033d68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4762d2fe467e84217e33881e55052be
SHA17fd22baee43131064244c1b350145925e55d661f
SHA256d936911b2cee1eb570dd9c30b6ccf70682061101a7e124210566844910a4bf82
SHA5122defd6ab803198139eb9d84e826de054adade614fe6f804086f7eeb2e17148076a517e829bf8c7d9f4d1e59470230bfcb9e75d6d1fdeade913b0db682a207eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abb1a836a157350a6cdff4211b6ec76
SHA1980e252a680272d5f30fd8d0e1364c39ae8aecb0
SHA256d2cb25e6937cc4f4500902bace9a37405fbd06076514bb9dc6ec3cd677bf2c02
SHA51259f0d6bebe8124ab628ea4e3746905b99c96e8e949d020c9216513bffeb1bd91d6ab2b699031bd1a24939126c8dd06b5cc4039f3240fa3bedb58bfe1fd05bc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c87454c2b38a8ddf0bd21603e3ccb6
SHA1378a62f359d83d594ad79b65d7fbf6f4af14a8be
SHA2569a6abac6469602f3319ee99a8668957cff28ed765fa128ae88d558b7ac9e7cd0
SHA512f975f8e1c8d8819b07d8512d495a3347cad5e3913b83dfa48b77010dc04d8fbf6f11a4be6d295caf27e8e6b7dd6ae49757bf09ca485f255ee8715124e0700405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c08ec662b913822eac7eba10cf5708
SHA1153d49898c2dd25b7958562bb65132471b71ae1b
SHA2561387ab58599ac4dcf0a2d51998e6e91f3fac53542151f87694f320a5b9bdde84
SHA512a68a6047d592829c9d75b7e7ee2abe5ce754c39d036330c3368aa15cc62a6a000bc796d2de50a3038401b9caa26ecb903647381d59ad87b82e1b4deec4fe760c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506a073125f3d78ee93706ab1b865062e
SHA142d4cc5155dd4df358d1c25476a20acee4be7838
SHA256248cfdebc979622a122bfe4b0b5ece53261b895e19f16fd57a877942105fb97f
SHA512703e8d8eb23fc1b693e289cc336fe894fc9fb842355457e3bb12df84600db2c7da2962548b08ca9d6e81328ae6b432548ca40ea896830d8ab80d5a5c0b1073cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc87eef67d3e833d72718323825641e
SHA1ef388ffca0e0ccbadbc6a5cc2017aef80ce76b90
SHA25658785b60972a60c5fb00d8e39a8ba07d9e0203f2e83126bead24580d8bd2ede9
SHA51203d48b67d4626718b3f52bb0b53c15aa1d13456bef99c1dfd8f457e3816ec89417acc1aabdc25da9e964172dc0c42c27456baf91433344b9e4fa146b19d529cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53996620ed1dd43985b19a83c60460e96
SHA11e5525e06e38fcb66fe403a3e809d734fbb3e747
SHA256ec5c8ceca34e5f45ff5ade161bf79c63c62d2aab08ba557e00d357ac6c5ad5f7
SHA512265b3c3e9b03bf14cd405e60792d7cab50614fe229ef3fcdbabccf59ced6d79fbc9f09055ff9a9574cc102aafe975582374e6e9a5f8478bd8368564157ed88e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c142e80e611c94e8a6f5df6d24f8b7
SHA12cfc8f6ca98425e4f1c071a39fa1393b796899a8
SHA2565eb083c1a521430af10eca421b1ecd2f09ffa1d35c488f51da4c2c68c66f738e
SHA512b77770d174e0f4eff97712e0036cb1e4eebb5ac1395f4284cef1ee4b3a46fc496d3e9f40428176f3c56e61a5bca84602a78dbc32a1805fb2635526cfa185a993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c606a416bc85ee46f1c9ead8c52d00
SHA1138a8dc6a6a8a0bf9c3db8a498bf6f981c3f8ce3
SHA256c1715a4d0e533d96f481e6067462b4a12d1134704a244d51962466a26f8753bb
SHA5127f6ed13f4a966fde3db5cdae5cc3c4d5cee9de8c316cfe95d1a72b67c541b2e3bcaad138c4b93a3658b76353e170eec128ce1a79965a2f9786f4802656b12f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577040420be1e28d6cf957d3493dc32f8
SHA1ddb6be6d966a567976540e7269d84303472523e0
SHA256a7cfd39616718d5ae8c4dc2e71f926b6567a327aa6b8e391e2e8a06bd2be0871
SHA512f9e9539b8f2e48fad84470890320cf3eface267e3d075cd3c714c52651bc6c0a2ae88cee5cde5e66868475abb0deaf23ad124d3a01d9ecc461b8a2357c08ec9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e475e2c8d429d9e49675c562c6f397e
SHA19fd88d5f85835c047a0e51465a8776f40a5c5b85
SHA256ecbc4628e649856305532ea75e8a5a0941390a4bab12e0e1a8a44b7cf82530ef
SHA5121cfb5d4eaabd90bcb45052853546e64f2363fdd4e4cd66156db4278c85aa77d0fd639eb785dc938cb3153637294876aa2005d0c109fb06a38a3f0b70c773270a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd17c2ece9ffcc949a3289cebd757b6c
SHA197eb8558d44d3f3ca1e0ff692dc7927f3868ab04
SHA2568ad5877f54b01ced176eb5f6bf33c53463afdc116ee1c46ce2e25296e0f9d323
SHA51248c9fc93d3be9aaa0a5e3ed4782d1741238648652b54746cb0aee0da04d2635e4d12fb5bb62f7f2b0770304f420a73117f265009704ce4563563883cbfd60b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543178c3f32397bea60eaa46201c5b264
SHA1a3e6e637a20b1bd8a1074cc597344005c5f909f8
SHA256e08c3b77474b84ad88969143c6293382325c2e70f3959d81733d60b515a35374
SHA512997bae10bb772167cfe4784c63699cca92f51488945b7afdc6e777372937cac3520053fa6fb0b73e6867255733b650dafabd6b88278813b4c1e935e05cbf69e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d16eac30c44957cda5e62c8994ed06b
SHA107dede842dcbf9a84ad935cc74c675bd51f3933f
SHA2565bc20bc31706beb0cf9a805a2c0346c0ae6552058674722f9878afd37b7adb3b
SHA5120d424c09b6142c5d3bcadc2082d27c52aa0b382053a878f38b86eccd0577e3b7d84b8135beb581c9813d3f95234e8916df3ad3deaedf343b57363abde48959fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52455ccf3867ef183afabe2a7869cd64b
SHA16c571246f8c7ed3266ae82c87d2bd3e03a5aa3ba
SHA256ce48385c1c816d2b6965febfef24c3327b64ac01acb90af6ab69ebd65fdfda5d
SHA512e3fd5cc80d17276e84c7df3ded93ceba9b2c80af0f4cc73dfed05ef2787efebbe8906f0a6a9fb57f6012fedd0af641f3e1bf030fd2158bc17266eef964ce35ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509784d372dd9c5ad1d8a33b85f436080
SHA136d1549d8acdc0cc021a773c9dd40b8d990804fa
SHA256ba8c20429a4f07e236fa362533a8789cb2fe47a9cc4b1e0303cb9199c9042744
SHA51211fb211f5e9d64f578504b83d651a21cd40b9fec40128b803afe6925b4c82a0b1df97d9c54db0740328954b4ef214eb4309aab0dce22ec116bb8eaf8df5f79ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147b9407b649bc265f434af2fbad77f6
SHA1d7d589cce594b43d04bb49ff71ce03a1ea64b13b
SHA256dba48603d419fa702cc715926e37f6cff21b6acb11360596155119ffb35ddf9d
SHA5125f2c7c7f1abee402d5341965062dcf7fba94bb8d036150e9fac668ea248b387afde2247ee9f6dc84ac501e6410d644b2e75427469e5605166ac092e1d6e02f81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b