Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html
-
Size
16KB
-
MD5
465626d8c1da9c5004051a56989c5e4a
-
SHA1
44aa9774aca54e6e93f5f6c341bd25ffb9d07924
-
SHA256
1c7d15334e27b6929dade3331aa98f36b42f7a61a82abf80b3965e12aa776187
-
SHA512
9ce322f220f086190372ba37c10a5c1aba51b791eb8bca6b869d4eae3d0e184a968045726811167acc8c2fa6c825912f1892333cc6696d81bc437da84ef808fe
-
SSDEEP
384:SIlgjWObzo83YwccoYXIKuhThjr34My1g7QWvy+Cq:S0gf3YwccoYXIKuhThjr34XOQO5Cq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80faad2bce1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002cbf6f3658f4755a7d347d3d34b2f513f5b04a213ad88b6631b520f9529565a2000000000e80000000020000200000005ae47349683472196cecd79244c33f31e3e428ec38eec79b29b56259d777270220000000363409a9c3f5ca2d932ad0c4d6e9972402008b713278d36ccd3e50b8a722a6ce40000000d803ab7b307218cc74e425bfa0de6254e256f884d1a74513f5d7917bcf27b2b74f170bb1d969b4b59975aba8063ee781e0316b5c2e71811af27fdcc46fe75df1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435136656" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004a13c766d2778fc24e132b84a8823ff2ad0d8bd99c0599a53b5eac17de461126000000000e800000000200002000000026adb5bd21d520f31f9e136151a90e468de36c163066ab65a401a2c49284f5b390000000becbc840db23a5d38ddaf64f493bc182ad4eb68202a387274265ed7887c60b5528954b56d2332c4fb293625775980e955889bcf2a733a8635e231d712f2b699482922550c6d61cce8c22314c22e16c2396088f41145c1b16a6ca2f3519f9cef7499f2c07629a5f34cf64b154adef0fe704f84ae246b4c9d67b04ab0ec01dea5e8f0cb498d39c2de1b1d91bd793cf5acf40000000830ad2a6d552588e6877f8e71304fed645c844d1e3f966247d2a68f574166dfc024a5986ccb1f739d220682f6feb899761266eba80e8fb2ccbc808a7b7f661fb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34E81181-8AC1-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2320 1648 iexplore.exe 31 PID 1648 wrote to memory of 2320 1648 iexplore.exe 31 PID 1648 wrote to memory of 2320 1648 iexplore.exe 31 PID 1648 wrote to memory of 2320 1648 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c20ccc9d1dd20a870821982645871b8
SHA1794589344a89224e38d21ccc0a98076c3f5e99d0
SHA2568a6072f7620a45f537699e2dfe6191d9421735204a1cdb2cda85d32729d4bfa7
SHA512bc5614c31b574cb199966197530a331346cd5f23cc72d85d1e9b08c67f17fe94983c0db979ee6cb7e57b3d2a78ed2020d6be12ca1528a70e620a910b3047c31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4ce79f64aa229926709cce008edc40
SHA168bd78a671889585e8acb3c44f2305319cee11db
SHA2563242e1bdb1e9227ab9959ed1f707c9b9dc8d26c263445b0628f7eb2211ee29dc
SHA51267ef2dafcf06cc56dcc22aeb2bf3ce555098ee28115e340ebad1bffb34f910d75312e0cd70830434c122097e7f4231e26bbae59d8053533df998d60b61b6b191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbdc68c3a2b85a406fb8af3ddab98489
SHA12063049d2d54ee046ee195eb228c13545d288d81
SHA256e117ae5b113da8497ae5160eb63fae865ea49bc74327695c622a15010f454fb3
SHA512f2e2c12d7f1c10e3c89df65f4ad63aac4346e97593b47a8dc13419672c3bffd024c62321b82d38d3b7221fd41b9bc28c0b1dc7bd3eeae4f4adefcee61e834968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7d3c09c92b366fb4479969c1d8c458
SHA1aab1a2c58e111773f553fa9ec91e7a7b0326d820
SHA2566903f3317eb7296279f567a1268f0af110f0dad4f6af4532becb2c880d81d592
SHA5120c1a6eeab769194af063c7c12034434c4c3793bbd67fd7a408e74305f1a9eaa49ef81e4c479d3333b6d9a97e30d4f8399521563d63ffaa752470bac7567a34bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4e3a89fb870998c5fe7eb8c21062fe
SHA12d43137c68afca5223b4fa8f4892990b6ea8307e
SHA25667ab52488d1186658e2ee23277d76d3f70fd8ede0347a15bdf8b9191f6642b60
SHA512cbcf8ce89e903442306607b61ed545eb19e9a74ba6a9a0051959a7263d6c01783cb523bf3ad8d034357eed46f434ab2608aa1d0730c899a558388c3bb455a4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b42ddcd19afe5ea663011b394b8f34
SHA143bfbcce396abdc91c792323ef363826145abbbc
SHA2563350e4d4dbbf9cfcf5372a8eccf4f84daaada130b71c22c588922169dcb1df7b
SHA5128fa88edae1d862ad745ecee5ba63c12061783ace2a4610cb4c71da409f028625d46ded40f36edbbd0b0770141a99bc48681d39bb594b1d6edb9a044a7f5f8ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5d3700de547f190c85e73c0ca39331
SHA1788f949725bf44d84e1db68131b1834fbd4df86a
SHA256a67e74d29ef354c6e5782b7c19caf9a60b6037fbf15b2c5b9a649dd7cddab2cf
SHA512d5348f408940c280e9290a2cb7142ef2ee570eb9cdbed539d10819149a748ddf067613a47fc564e07b30de794d6577fdf6ab92b9239ade12771c67e149d869d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b155ebf0f9f1367fea4bd2c7cac67dd5
SHA11d214b6467384b4b726f17c888caa648a0a47145
SHA25609370775d44dd7f4978b2da2a3275cca5eaf4ad0a65c5530ee45407d7e700a27
SHA512848aa62d7ba31c527af5f4804f16b7085ed6cd6150f8dd8624f1289a5d96faa0ae510d939bfc579291d66530b9a8fd55f7f9f71b6181f132501b0b9637a24c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a38bdcb0e854362cc042adb2e1c6abb
SHA168e57f39617d73b2e3ce9ede3c06c2c825d24a78
SHA256fdbf1bbdd0598e19e332b967d24f7fdc8d251a9104d0b29075f7a13ef10dfd01
SHA512157def2d85c330871358329e9461f77d884e59c34a0d9b9446fd39d9714ccbfa0c518760201cf01a49005c873b2072f86f1dee3f05d541db7784459f8e4f8811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff16ced72445893c46bbc64299c569b8
SHA16f37ec334010f18636d456167ebca15215d3b1bb
SHA25644f3b1a459334bd066c4b83157b922214fd12008e5ee5b48c79a6ab57794dcb7
SHA512dde1397b84426b4288d4ca619f999fc489db1f00653d941e3378eaeb6a7ed7aa9c4721aedaff616478aa03aeaafaf909f06dace710f9aaee304db73d2d343078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1aa0708fc7c35e8ea9353c5c7fd68c
SHA1d454855b0eff801d27a01f1c92cec18fd33a083b
SHA2562ebd1563594a81a8a0b5ef98812511f3c84e2dac3a38a3d78e066c96837c0c20
SHA512461c89e345d361009e461763932b7f52678c158b9a303d1e3866744d76689651ba8c7ffaeed2e2e8e241d523a7e0abadcc95d2625c4fd9ed1d47e3b06ebcbf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25ea342d55514b1d6ca01f0980c9bd0
SHA15bc0b4f0faffb591fa9c75d3668fac3f43c4985c
SHA256f42d6f796037caaa7066e2afb96019645d5194b30d42838fcdbba103652d1d63
SHA512e9821a73645df48bc4af0f5b3483ad29b191d8bc22bbb02c10756d5ec274cbf2415fd6bfcf43df037230eb922876ae27f7c52db87279070aac040b46da5a71aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d60fa6808f8a67afec4314ddec9ef9
SHA1db2a04d71f3fb9544b32641a2ad2859a90941872
SHA256ab4959398e7014380831ac4c7847d32c442671d133376606f63269422e9d223e
SHA512ee8f790845054f675bdab755352d0761ca74d2480366fa2ee380a2ee9182bbfe76966dc90b2584eff3f1538d5645191b42fcc3d7103b07bd62abb8135ed37052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e71d5ace597b7c753e93870625cc5bc
SHA1e189f22aedc076704be1db74e2418f75142d84d9
SHA256b4d1531cdfea6bce60c3eedc0dd61d81a44becbf852e6c02260ddb885633ef65
SHA512f734e7ad9d086c4bb26fd3e39d3f7a00d3055c8fc2222356979976170fd31c6ab6063bbd78a43b8df64f8745faebbee64c3fde7c206272b70cf0677eff38b82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d370509567d40408a66b70ebe7624625
SHA100ab6b9625e4a0fee9f00420719e1fded1fa774a
SHA256885f1c582bef4d2bff6a58cd57a4628430c4ead6163bf9debcda8c9bd0329bf6
SHA512aa3efc178a1a8baec10c67575a000d8b7a47899be0248a6972d6847449cd005785b0ce2502081d44658f368dd6bed59fc53a1c85651c07aafa8e982887ad5fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e96abd77a40e9fad7b89fdcd6cebae8
SHA145bf546ae3f06a99f0df3a2ebb6f765a0b42adf2
SHA256ccbce0298e2f1c288e3c76ed11e4744af8e842934ec15c27d53598d2806dcc6d
SHA51204060eca9a34f5476f2140263534184ca44e6026beb2c63c500b8e246ac509a8f6030bced7b38d7d396783da9175d4aa26620640c41058b37a826fa231e896d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad20c57c563338df1d9477eabbdeea6
SHA1c8e991ba26e47a6a958e3d60ac55acd5ab47f2c8
SHA256229dfe700ed6019787841e401ec599cbaa1eb57f310c69154157750c9ebf7164
SHA51267532e44443748ad84efa5f8362e1f81378dbdafd4b03609ed92ca15a0d9b9dc47000fa2bcc9c6e2588823b348e9defb79279b686fa04cfffe5c1dfd9ea3a2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af76f07346f5fe146cd1ee1b2d6afbd4
SHA1f49e4e7218677bb84a788756bd0791845c1bd686
SHA2563f4e09089f5f713364a512f40302d68aab9fe9781d39149ee4cf2e236cc94be4
SHA5126f5f731455bbac06c1c283e90a5804e7daedf76c3a578546a32221aa7008c550a53cc54c1aab8cea02f3c7bad5b3acdd40aaee55f7b22e48317fffe094eccaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a9b989bc507335e92d8a97e399c8d3
SHA19dc9b5f9962050603a4c40e076a72f42ad411805
SHA2565353a8d013758fdbf7940f9c1e80542c39fd8587e4f9b33291646c45639b99e8
SHA512b5cf90747c649aed568669e128c908780237707f5fdf62dfb7da20a091f481843b3aead85356944f64d973012823e076289ec33cb330162bfc2921a8baca702f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b