Analysis
-
max time kernel
136s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
43aadd21d96b0e599493ebb32ea322dd_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43aadd21d96b0e599493ebb32ea322dd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43aadd21d96b0e599493ebb32ea322dd_JaffaCakes118.html
-
Size
138KB
-
MD5
43aadd21d96b0e599493ebb32ea322dd
-
SHA1
d382d1e72ec7617ea48891e892cbb1d739f8b67f
-
SHA256
d666c2d9a2d182f0f25fc18aeda9d687ebd72692d96393c0e7186fd082198ea7
-
SHA512
a8b074b2e44d514cf38057f74872cc35dfcee204597215c3d84f45a338739bba7dd443086340448357ee75fefcdc15605a69e26f8301f911e2e54fd8b6d9c2fe
-
SSDEEP
1536:S0tEa2h5815qG7EPIt622lanheyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1o:S0Lt62tUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409a04ee691edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435093554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008cbb1f3bba3a3196fd50a139fec10185de333c9ca8f2a032032ba3fbeb9529ef000000000e8000000002000020000000e7ad7fd845b5494e39e4112ed4a97fbc984bf30f7f08a8dcd6706d7a3af0d5c590000000a29cb44ef9df0966c1d2523d1f7d4aa09c06154ff1f9ef1d6b0616851afbdd6695871b10a20c2f2363abf1753564b6681f67637f83fcc0396ac6eff1326b7f1b3c45fb41414fa525ea699ed84013873c4e8fa6a14e483ccba74d2eaf173dd61ec9bbd0cde5b91135eaa2bc07ac062c9dbdf72acb058985498f3d64a154d81e6046c887703724abdd6c5433f41e3f228240000000c8ea6c085ea2e63c43f5520b33046607bec4bf6d8b7ca5a6755cfacb45bbb21f650036ad238268498dcd00842753fa3a8c742baa8e6e87ae6c6dd713d1680feb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA212BB1-8A5C-11EF-9816-E6BB832D1259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000cf2e9f83f373b8d3f87f2c5c03e1dd2bf79d5d947ff7e8513335e1746a27c8a1000000000e800000000200002000000055a18a9b50624d31b5c18a5d9d917670e4a9ad435c17d2234d9a878695c6608d2000000097db14f228adce41e374c9e90609997096d4c632e444110338430a1f65eaf069400000000426798aab549ee3e75a572a0d382fcc8d6b767d40723ca4d24ebe78a7514a5f5cc7201f75aba1759310db49d22213242b8e96438f1e9b72a2602e613cdb7af6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43aadd21d96b0e599493ebb32ea322dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af1a83a452b449c56c9983fb80ed28a
SHA1649f4d02de26263f6223a1e5cfd58815fee37fb9
SHA2567f9ad082dba26f54094ae622f8853633e223180850d3ece3f3479300f7fc27ea
SHA512fb564db3002d6c198e0c5992a892d9b6ec44b614aa5dd8ccdb103f33697fccced9ff47870f853e6db3f76791f30a478cdae1f07ecea8cba84a77f30afa4c1ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fcfb89749ae2a125cd539e77f5fa4d
SHA1a05e3231b50837e53a84d3777818fe819900bc9a
SHA256fe5f8aad9d86a3294abb9071c15c96a5ee3156ee715b75ce9b19aeff7907b170
SHA5124ebb59dbc4384ed58cecdb4f13a8818bb1e3a7bc61f2ec5c69349e0c10071bfa2f630b1bd8e06c831f8e216a4608c88d56b0e7d5318fe83e1a543fafb13503a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f065e7cac3862b7d4a32e68d78e43872
SHA1c7efd64c92ed562cef2593f6487c87d73cfce749
SHA25665384ac25dfb21cb6d3a29d8cc798ba206c7b7ba0db4d5f76341c4f0fa87afb1
SHA5124afccfbdafb774147d91381e6b579e64d04d4d6eedf0d2510074545289df30ffd5b831dc14d2e994f8196dc1a890770193407b502524a9385b8f0abda6eeb772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c84e14d2e3e52a3330ce7de7d91070
SHA1b264bc9646f1cc0585d2fe6da36167744adc334a
SHA2568bdb606bca43bafa3497cf87fe75a6acfe50f4f583ab1373f7bf7e4b4c73e969
SHA5120d2084e32562f336d6a8f82f9b96f2ee477e93a826cb416bb5226d4332fe5c240b923b3382d4843ef82b0883707be4ec552e9e99b525c609b5584c99c5159112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d867cef87df7e2a15424f77331147a
SHA1f1f9de10708936a9abaa8b2aef95ab79f504fafb
SHA2569971a741a6b6b80842cc176fd58fb23c4913ba5cf188e58405d9a9b8a48c5781
SHA512c26b4c6aa27fd1a15da68f145e9b8e4520f374c1eebd2f628b3829123194fadb2311be421e107908c3a6800b3193824ef03150f64fff92cf5831bd6afa6f515d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb68b31763ff9d3e4735be3a8026e68
SHA17bf34dd075605c4b5e234b559db0a374b4df57b7
SHA2562f3daeabd92fb58756c3027429acba2f8aa0592cbef698336f273ddd101554f6
SHA512ee2537cf66bb05e62540d5713030d07fb647519a81d1c2b5ad5594f96dd200ad38fc916e114d5c8c2b04e8c8538118aebadaffa416aeae2ba0fdf406de7e2d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbd7f195e7df62d45382baaf075cb4b
SHA1ccb74227724030bba8f7bd66148993b2086ffa13
SHA256d064fa438564bff6bfe947e0549f56d3bd127ef75ae759cc636f0b80d7486572
SHA512548ab885107ec5ec9ee9a275e8e37841537c47e856cfc4f6c9dfcfaa5fccbfceea433d8b8feaa72a4be27157d34b39cfb8eb8c9f10fbe053ace10d1867302e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561a94c135cb728ad5432346467f73a8
SHA1ed4f740809c353c44d8e22f9b001fd81d9fa3cd8
SHA256b363f3c041705f887c8bb1d68da1b533f4f1a07a848bef05770685316441ab9d
SHA512b2db5c9cd0f728838b6d6be05bfd0558079007071da1ddb9adfad78ca356c92fc488dfe0dd700ddc1dd0c92df7386b0a5f91df54a1de613a2c3e2a6ade868b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fde752930e237c595e73147419412e
SHA11f29eef6a6d27035d2dbc2d67c7c83a9cb69aad4
SHA2565aaa6a5dd1efba001f46b750a6b374821f3aa18bafd5ed8888dee640ba84c0ee
SHA512db7523a76cbc5f26a22f52dfc5209341b02417e59729f416cfb13612fa76500e0b092636472167c3090f0eb36d9b923ccb0c642ef1c38499ddbd7ac1d138f1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60f2725e999ab364c88f0a4e8b52533
SHA1ca1b3ce88591c89931cfcbefe6f78eba2ee5224b
SHA2569e552690cdcf4979056eb197335617d41c6931cea964bd2a9e4fea95a94d57e6
SHA512231a740caf4426de726507a049aa76f8702c72cfd9e8bff771121713bb0e2355a60e4f447d545091d59fafeae1266fae9db3c0125b819053b86c2376b87f5227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8d0e82e8601bf0d9a97a9cd1344ff5
SHA135456efc4d9788231a371d19997d475100fb4870
SHA2564c8136de013c72b4dce251cdfc49c3fc7b46c8e91f9ebf76c1aa7ea2f310a75f
SHA512f5d97e63ab3b1b1d2e3cc1ebc8212799943fd8ffc7378c103e48f2d3c27a2b6474c0feb81e4fef5976125499eaab9703842c8706266595c6ebf0cc2978b18a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe83b4f0641bfe266d1d0d50842fbf77
SHA15f0c6c4e8c993ce2c4122599a5e2ccb00688163f
SHA2569b61b62fa21ebc40ebdfb5bfa7d86a1e26dd6be47e80c61006813915dfa20ce6
SHA5122dddae12e67a036104a934e79f839bc61677a47d3e9359d62b94967421b0d5644eb5ba791f6107aba34ac7c38e306e0cd91b51ca10178a39f71d3a24d3995a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad071b461ad558649de334fb7b16cf7b
SHA1393ddbcebd32f52c214c6df46557d0755135f0de
SHA256dd0575438d47a8233732f1bf08cc28847b8834f147eaf3eebec11a09fa3da5cb
SHA512881db24ea6d25bc27f428f9e00f1b1d55b299a74cc4fd627f5021065263b8ac9a5a3fee44e0eae3f711fab387bd091a9138834a1c6553294ea14d07815caaca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427770e09ee45806cb9f0ea865dc5f56
SHA13623cfff4952ea5ce6f8ad173f3e0272f1bf69a9
SHA25679f5a28cc10d337ecf035f4a9199fdcaaca48bf70058354552590c0b8d30f67a
SHA51211df918400c38417020be0dc5973e7651b5038d914f0264cbe7e53ba559a8663b6981b6de86ba3988ba742dd4b4b4470fd080aac8a6ef9755aa503d23d0e014d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea6e2931d0f5230c442e9d32b970e51
SHA1b6efb5ed0470a4ecee4f8e7b7b1ba1a874472ec9
SHA2568376baa8a212c896846ce0a7c971809ba06538802f430348eaa01a124101c8d8
SHA51289bddb1f9bdffc6d2ee0a753d26cc7647143232101a727bff1f1019f3c6c23660862a024a489c7551aa97d05d7c0c13433acd21c1293f07b064c4a32a844b2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535371192102603cc00c05ad2e2f96676
SHA11004849c2cce2fef8bcd9fb8c9c31cd15114c99c
SHA2562c519a92cb8ee33570898c42109a1062391e5b4143eeecac5db191f97cbc2f70
SHA5124c5a6f9556d14df1a2d0c33f4e62d4cf26168b04e49f2ce52e16b927cff53036b24961e07dc7fe76fb21f2f65c9b3f9bb99e13c9708ad1e43072510834564d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c9f06300a0ec4991b28c864a7472cf
SHA1bc977cedac41d6d06337c038cdfd39c310316ff8
SHA256b41913739fb2977ab2b4ef1a5d32bddb5a70f5319b1f74f4c95cd87ad2e258e3
SHA5128378ac600c4ae3749611313920da5f3d9da1b2935770ce20f7a96987a42d6e4a452c5c98d277cd799225b3723916f860d991b09e0cf72a51defda518fd8aa0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4b571839753f57376254e546eedce9
SHA1056e89735c746864f5f77391df365c813e9f7fed
SHA25681ffe99b71798da368a93b5738596a2a805bb87098781b88d8d04d3cbff517c0
SHA51284607d6003e3557b753dea570279a74eb320f59fa029da4b3e9a99a716bdf240ecb64ebd75d3d758ed64cbe6906d9ef0c8cb4c8940154eeb32091a66df17b5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740a935540a55e872cebbdd7996c4c22
SHA192c3d9954d672d4255b9d3ed09dd91b249866fc5
SHA25619078ed9974316c8437fff3c04b165acf99583520e85d641c94339b266102e66
SHA512c78f0241f2f88e9cb39af1e883625c6e5d9f617efc83149c6c0ef35a2d5c9c17f6a9e53e5034596aa9e408e662b0f49157bd605913cb03a415e3e232490294c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b