Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
74971b0ddafe9de630c4b9bc1b45a8cb_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74971b0ddafe9de630c4b9bc1b45a8cb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
74971b0ddafe9de630c4b9bc1b45a8cb_JaffaCakes118.html
-
Size
53KB
-
MD5
74971b0ddafe9de630c4b9bc1b45a8cb
-
SHA1
c6ba66e753caa34a983ec3e1ee96ac49cadd2b69
-
SHA256
965f91bd474294d9a79aa6e781d8f5cb05c22b8117f19713d543648c728a946e
-
SHA512
ffd368d4cfd016169e99e790998730af9cc65a2b38db7cf0b736fcda8a2f0c647b910091e0e1f35ab9904f32e93420fec85ff2037d563a3ec35f146f67ab7d5e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUZrunlYN63Nj+q5VyvR0w2AzTICbbhoW/t9M/dNwIUEDmDn:CkgUiIakTqGivi+PyUZrunlYN63Nj+qw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5094e7c480dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDE6F851-4B73-11EF-BF10-EE5017308107} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428176544" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000003b6b518d7347a6554e7012b345afa5a7d0ec4d42ab2d69a28636461dde661377000000000e8000000002000020000000e9cd363384b783ce7a2eb8a299ca5c8a0593e853af6f45ee5c7b9494c14048dc90000000a37f397918c78448a0b49ed3c0e9ff49190fa7b34bcfb9c088e72dab5998ecac2e32fa8dd78df34dfa3917e7cab71e44ace4721c27d18006d964b23352858d3a621cc7d3d55bff43c5bf3012e0b0a74bf5d1ba93e4247e84b081da1dbfcd9ba9596cee1008ed3108875ee1d8cbdd73aa759aa247e284810051a24b62f67470aadc63d8f77ec6318454ccecdc8301963340000000f7a810484dc1005e07b69ad4caa304f8eab0034c126aea07b86c67c6285445b5e4ef78f764f71af74f301404129bad53ebc99433e813386b52b9ae3b2e72c7db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ba3115955015eba0c4793eb7e8daf956219e176b6ff58ad62420a61231495b45000000000e8000000002000020000000ff53607d62ed116807d1eb07ee35cfd2c7e11ba13c3faa7d9abfc3880d61665f20000000a530bfb893b9333d46bfdb8a5ea82e234bada9365fe78e4e9556687af5deef4940000000d0e62b20a616f8d7e4b782d19db2ddeaf273395589f9c30533145b0dc2782956d87b30093512ba2817a606422a5cc9513f7e225a3cf668e86611073bce9a283f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3016 2148 iexplore.exe 30 PID 2148 wrote to memory of 3016 2148 iexplore.exe 30 PID 2148 wrote to memory of 3016 2148 iexplore.exe 30 PID 2148 wrote to memory of 3016 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74971b0ddafe9de630c4b9bc1b45a8cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec7dcddb10e7474c2262477714ab8c77
SHA1621ed6c68fbc073dd0f7f740e9fad4294f5818bf
SHA256e5a0dbef9b5804639ada7e2087a66438f13441266b424dc1c36cea3485177719
SHA51220472cf56874c14d49b8001ba33076e07c6af8e61e5f048e10b9e9153c2d5c002cebee22ec16503bea7fd7a4597f0f54c9ddcf98a06e52aebb827a1532266ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd6350fb308f2a11db73231e2a178aa
SHA109fe8112c52b355694de7fc552b7ea18c8d0ac91
SHA25626631a77dfdd1f3cb9a3ecdaead0d7e16e92a3797561446eaa5c6f7b46f37e36
SHA5122a94dad681ff16f4311b1fa1763fd9850082acdd45f2b143495b5268137ed7166b7cd28b05f3cccba9d511108926ee7b50361f7075c7c3a15f5aa13e8bfae385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb83263ea80d1fbe5a043756b08080ce
SHA1fec10373e669985a536fe93c202bf0b1f475597c
SHA256fa4c14f0863ffcede37f10ccfb393ebb78ce50e2921f4d45c68568267b3639df
SHA512929aa6de062be794059150f7bb813b25972a1161dc5a28a3df0872cb8006f85cd17cf9f7be61ea24963dbaa11741eca3f6369697f57139a8c3d12180f6932ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1beda25379522b4f78863b19ff032c5
SHA187bf25f4c5926b6add88fa085daea1e711487cc1
SHA25657073b9c62042c88a599ff5dafd06fce9dc8e0327f8475a87dda8f6ec91c1dd0
SHA512726c5b0fe47a4ab48f35f7cb0a28f42700d71f4a7c9de7006fd419729aca5bfe5b40cc4d006de68635aeda46880ef540222e9f201d3ff3c0f715356906878d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f496569e3200a0f96a4cf4897494ca
SHA1fef5d1d4efcbc92d3683c67b8b37294dff92f8e1
SHA2567b33a61695f1b49f9323b65864ecad590abde57ebfdb1a5c00897d922c2e3298
SHA51290f32337df9f345b0f836fd347a939a715a1f339d7ec9429aab35fb500cc2ca7d706de91333ab0d52335a334af66bd796f2c9c537b6f27c62e8dc69aa25a65f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620972f6416bbf7f3436c60a94ee6916
SHA18542a6a5c0b6500a0531648f8cb6a8084044c22e
SHA2565432d770d7df1454e8a7e2a6de7ceafc979d801deb8852cdfc7b07ed83f297f1
SHA51236a0efaf8203bf3a6d3b5a25a026201cd87624a5856742660986b1972eaab21fa7bc5687404c635c0ed08ca73add691adc3264e802e565bc67066dd59220ff9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb58402308b82c724ffa1dcfa4dd1759
SHA1e40b9504a515d7c84a14a3f045c3044afe33275f
SHA256b838deec11c45848b741d66139307da2b82b5bf44d318ae89b518d6eaf30a5e1
SHA512b21738d41df3fadfa77d841fe333bf3d9bfd1887a145dfca656a61699e1724fbcac0110384f7310fda4cd3adab0284f74427321e280bff37259297725eaf8842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c953efbc36462034920be3494da81eb
SHA14eaba4900ea251505b7be8ab5b3308976d41f6d2
SHA256f2a7f10fd681af0bb18e53c35fba1b717c5f3ed9a022514f32a40e71adb03b97
SHA512b7b7db00dc9850cdba9f17942bf097106c3ee863194e096bca92cc2352914431ff55d708feaa89ca3097d131f2d4434c6b6035aa792cdba5860974ee254f24c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a358229de4c9976b4aaee0c831e4854
SHA1b45637cfda735a4f9df4fe359c73d05e1f85bead
SHA256dead8b6cea7a059e8caaf10037642edd5482ff2be070cefee673c614e24354dc
SHA5121ecd8a59163ba86efe440fa13a29c7c4a360c6badb46dd3a2f38f94ffde330eebe3815f57dce1615559b2a34ac080d27df3c683f121fabb152ec97dc30f7914a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596691028cac94733669f42ad0b2ddcdb
SHA1c7b94e3576bb963adeaa8a7a2a50f34753cc8d6c
SHA256e6dc0e5b7c8805a30c1e6cba2fc4bcfee0ce043f982fa665ed2da15c30ee3c31
SHA512de7863c01907e0615158188288ad7c69194b0f356a637bf4114f4b39711a29c984c21a85279cb799ae971f6d130bdf131345cd8bcfd5f3257bf6fb3d37d5dd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bb1e1157efb639c2650fa879b49d61
SHA1e28a73fd631cf95b65e14fe457a3cf503a5ccad4
SHA256384625d909cfed40788e29261b09ef8e1ec32e5b1764242c21306fcb1cad5401
SHA512c8cb3d1db368814225e5b69d4d9002e4b1c5b721d85b7fba6d47d6aa367602a2aabeced0df12c33e8c807b3165c6dd981508232d6baa62e886c3e510fb574307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a485c90bf35c3a8329f8037475aeea42
SHA1d871610ba25e950794a1f8e63ef4ce0ded851a41
SHA25670a0a84b035ba0b2178c44f9ce8e389ce2722b6f9236f2b814dedd24c489b984
SHA512dbb5ee2cc9f8a35209fe31ec34b46ade749c33f7701b69153fbc393254d10cb9bf4df9586e22efee346fb43bf63a9c0dfbf3fde17befa109c09ec680f847342f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f9d0fb0931998a9ff5356fa94f8a54
SHA1ec03adbfefcf46cec46168b2f915d9826d52b174
SHA25625156bfb93f6ebd306268d5bce6c7418eb5af79cdbe17263ef36f35b65792857
SHA5125d3b3e99e3207f25430b2a5da18667efd2d754786079659337f106788544ffa605b5f6f97946264ae54868a89db962106b43877a6bef7b82efa290b805536ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da78eb666ba3c21cffada7a8a35aebad
SHA14f56ac8dfbc06b977a0a88f722205ce05bd2b4aa
SHA256f3dd13f0c127bd91eee8831369e8d13dfca633717c94131d93c63397a51867e9
SHA512ca370e54df434194516d96a3e535fe278ae9d35a343de926882e899e60cb4ab6d4ac264af93cb72323b7c990079ac795136cc09aa70bb00440e87cbb08fa8cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13c16bb68741abff711cb2a9e27a463
SHA14cc87d7d2b6fa427933ab5a4df30e9cfed5e7d8b
SHA25682ee1bce7e0d5ad7a4dbf3285ce20055e32e0ec4527ad1b799778414cc71a723
SHA512245bab7fbbe476ede52128e131fe1b90e8e94e1ae6b6026c70aaa0c9ea988182ec71c558315cc93719dc75c57182f0d1d0c4e9d3cd9f987ecf8876bec66e2fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aaeb8fb1cf5818691ea1d4f5f00e0ef
SHA1fb80649e4913c826397fa72637939f2c8b85b3de
SHA256f82bd1774739b992327c041db8893a3bfe9179946ac8ae3b74581eaadf3fa5c8
SHA51235a4435966b29f73363a48c01fad3bdbd825b6ed12de43ba960fef312cdfdcbf2aa61a5f2bd7fa66a29e6c4b694b6305cb176f20caa8de103ce858750862cd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d591f3b7d3477697ddd68fd1e427a739
SHA117f28ec9e6f2401ac8e5116b58e90d6df998507a
SHA2560d639af2409139bd28ab354d9ca1efde722d1925d2aec151f56b98ad7380ad19
SHA512b5d35d38a3b4f37198860890612b80e3fc87095e6576c9cc4bdc6df3ec078344d2608fa36797d4242e35e1ddccfb8d77fed7821f45deae5e3e69751537aa243b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e280bba09c188abb952f4669915a6545
SHA10e139310dc8d9c5bb908edb38e96900c6b58c3db
SHA25618ccb2b1704da4d9635cb4cffe6fe977105c1405ceed3dd44aaf5566d13c3e8b
SHA512712974ea0efa48bc24c5c9557f5e5b14ce6c809782f9694baf75edace36074670d0fe4b2bf9677656cd5a0f0b715231f840bbbaa03bb5c9fecde188e61b59273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7a6fd942bd0836ac1dc022a214324c
SHA13cee833c36598f54bb003871837e2f5c654b5f66
SHA256bb4e5a48a5623689269d67eb431a7f1c99ef2d846950ef5bde26b0db8091da74
SHA5127cd0ebf277a8146f4a63f88424359cc5279f02b34fb6ec04278b013bff844356eab8d689c8338883e991f7d0c46d44b269eea31636476cd5e6f5c5590a12a003
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b