Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
b2d4f5f72c3ed0e4bafea5e63273caed_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2d4f5f72c3ed0e4bafea5e63273caed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b2d4f5f72c3ed0e4bafea5e63273caed_JaffaCakes118.html
-
Size
53KB
-
MD5
b2d4f5f72c3ed0e4bafea5e63273caed
-
SHA1
45fb1de7cdc1882659ac0b5d22e559ebfc503662
-
SHA256
2d0d42143dccca5c6fe8393397ef8fb5a04fbfa2d160739d1fa0bc8430442745
-
SHA512
15f3e5375fc5e98031bcd047e86c853a7f408538229de4f10d5e800342b1c2e81dcdd691281242321c6ed15faa3ad1b6cc007bc52cd093fbc9afd2118abedcd8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUwrunlYF63Nj+q5VyvR0w2AzTICbbao2/t9M/dNwIUEDmDM:CkgUiIakTqGivi+PyUwrunlYF63Nj+qe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ed8b93a7f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000084ba32a050f606e8b5e54195376867260a45018a6e417c0b1534ac0ce08206a000000000e80000000020000200000007553709e06a63fde4f77fa48858ec2f0a358d95f94630da76380b19b714b5bde90000000a53725bf382cf84ea35d8bf99b8d1d03ec856e7ea6b907b86b6cd937ee8541e8dccba0f27e6c1d3530573946dae477a8f66ac34a2a3896bd5d0495acd38967a944f771f141f1588a99823c43c5194a91046166fc69353a8d5c505f47b8f59bf6d9153c1a77443ba7954006ec5eb9ca6df998ef3aee3663df5f0e975dff2cedd9322059ceb48613a582c8a9f7303235b1400000007601ea80ed05da909aafd8920eb2ddd113bb911db963cb5bc8211c40c3bcf7b54100528a25fc63d92a069b6b1603d336aeab57d018066e7737e5600f28bc7f88 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a5b0bb9a76d0c8a285db7ea469dab18610a382eee9c924b44ef232bbebadd1db000000000e8000000002000020000000e1788528a4bb3d21f361bc0f06ed40ed3742c2388c3608a98f8219913763edf220000000460f29354a20450237e7840b68bf26c1a97d7aa8b5cf301796751261b48383214000000080c76858563d9b45a95d1a3e955f702fc996c403bde90823c06e44f1c74c2a3f4a5af5a937f3494e05f9387fd1c3c7985d5e3e600f2917d596be668c1c250f52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDAE2E71-5F9A-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430392236" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2d4f5f72c3ed0e4bafea5e63273caed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f48f7d1313951302e0e5308a89cf208
SHA136a39b30cd77ebf7175fbe3ca2fcd1043426d507
SHA256172454dfe520b86aa67d92236d8845f15651d03d68b3abf13abd13eb14c88d6b
SHA51202c5c78426b0ac45bfaec6f33e771fccb7b06db0af68b87520e7111d60409d936abba0208e98ca636fd6f21e6636fc7365e84260b9ad67a2f91b3c47cff7a807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0d8cd77a8bae5e65f084247c6e4281
SHA1e8f4b67b0551ddf0a19b70c7499016d8eb2ae661
SHA25602d32e0103715b0e3ba4ad9e8bb9e2bacf7d9ba0df3bc97a9dca8ca0dec7e925
SHA512410c817836dd48e9bd8698c6919d82f416fbe826e89c5cd18918dd17f8201fdf08e6e5124c4687a07338199d6369592cceee493b2345345b6b562c396858837e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f8db94cb029f32e63e5d6aff5f05d1
SHA182f38d9e7bde69ac39bf468b39224f47440f274a
SHA256ccf8dbea444784ac71ec2a4a05f6ef889b4f1ef7c844ad08355a79bc4334d2c5
SHA5120d0484460cffca7a893ad859ee13016a0b97da45a42c75bac06de5b5acb494f16f3f6cc54da631d591d00e51140e94faac42842ee87abe9c6fd8d3b972ffb30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a9a0cf9f29f293f382334d262e5cbb
SHA1884605b8806de22e9cc7d178392824d9343c7036
SHA2565298c64761c65d868a5f578074bb767b1845cef0dd7404340aab1eb2d78fe2ef
SHA512db42754519f4867e172f86dbee5c49bbbfc1cba790d238de19ba77526de43989aff2742e15be0012288f208b80970022e2a9358e313828052da605f68a2b1f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2a4398a4a451bf4135151d858c7dcc
SHA17667f886fe6a9e0bfc98e234f282b8144f134ce7
SHA256b86516c21cf13f47f4903c4e98d459a23e5c03462479b8c30f7f1baa11698c1b
SHA512f350fdccb5fc8ea26949e48a4169eb6cefed255c3b25510f6e64c71f6991b6721f153c02c081234f6cfb4af06183bfdd7447c571c75a65a393cee8c3da1cdf79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c9063a6d4ce628b232e3bb33bfe217
SHA1a1aaae651a1e4dd19e786c1f01ec5e0449c8938c
SHA256bca5a9431835ba0af0fcb3386d197dbdc9e2a37d4af3aa5e395435c3dd840c4e
SHA5129faf25dfc4cc58359872a7b05cc472b91db11e5bcd0bf0d7ab845800c347a1c37bd25cb8d6de87e97c1935e81a04e279e54a54e1b25fcbaaabf02e55cabe4e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a58578c0b8e3d4e90b36730be1acdff
SHA145ad888c4e0b7336afd2ffbf45deffb19c9aa8cd
SHA2562d45fff095ac7521e1af4a60b661ac60e30b64adb56c463b7874cfb642e551e0
SHA5126530122b5609672000a0eab067f8a09911519b97c966de109085a0bb2fe5d28d0b0134084343462b77790294a08c4f1d6e6b09bf903c63f589a3b1a5ebdda14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2d7c3a0a090c9cd416ef82af3b8ece
SHA1db986af4f930ae72675532f5efdc9cf452537d6a
SHA256417f39c7515c296afe9ae35e1d403f480ac1b746fe842677337469fc5736efd7
SHA512133d813d388ffb90261ffd194db53b7f8055a4f5b9f73263bd0d0922afccf550095ec931640be0193f378268bb9db70fa2b941479a16accd74c95908663052dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f6ab4bf798d193790c1adde5e75c1a
SHA1ea313a04d6d2228b7341ca280a2674917b9a65dc
SHA256cc5baebaccb795448de1c7039a920a89de833ec353a7c5c2d477ad8970013fb2
SHA5125c8c076917ce2fb6e41c77a8c07e4368f3fb42c5abfb2e24760ceaeb811685ae06c82499ae13cbba634cb9e0338a3ae63919935bd9e50e144d27f3763321b25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74283656008f6af9f6e22a073587d58
SHA1af636aa13ac5f571ff9e5ced23d934e08eca4151
SHA25693ea5ba8045f4121dd428a42af3104b7fd002846ff1f9d2266c598c92f506c5e
SHA51208c81aef35196151fceb05499f23c64162d4f3f65fdaf7630afb9568fbd11d2a0abd8d0fe22150d890eb194d08d17c4769f098a81c5516fe31f3ef547a277ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099441fef575cec265b11c754d999d39
SHA1c04482daf5a152f79115633905b84eeff7795ef7
SHA256165fe7ae0d2660c553312a7a8ed095688a4cb741783e8bbcfc4fc5f78fe789af
SHA5124de4f83a3cbdd772d21ae1baec9cf4183b71d6354266d40cc01b2a0de5c5fb43a9d3c83ca8bf839a429b537d73a009e3ae3024e16c8649dceac4386ab9474c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833bcdde7cd3adc11a9282dcf9da33c0
SHA1b5b08d0d627bf1fced865ddf178313d12b3cab70
SHA256bf88ec9f7585d4235a4addefd3a3dd013a2c60322fc160382c13d9cb275378ff
SHA5125934382ab2ed7a602a90011b58f5c9f678c82af80d91bbfae50792d5eefcd91aebee42e63d35a617ec820a979634c84f4c7182e770fe0f235c684945141a3f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fdf2d8a416ae8109209a416c4b62e6
SHA10701ee31e3a97ddf35cac4cd266dc415e700e322
SHA256e3558e5488a112af2bf0a85201d8a14ac6e1c12db48e53cc33ff88b668d2d948
SHA512c9feb4e0db6e31e3d4bc9a35b645a17974bfbc0a985828458d1ce700a6695e04d3a3585f6ccd9ee6f7cb2b7994c8da8f18dbf2334977a8032db947cbb9102bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7276d34344679f5242e7dcfa5937ffe
SHA10cdf921c26050f5559c73239239fca0448fd3970
SHA25668190e774dbb600f12b58e7b00f557999a61fab048c8a19b0521d99bf8d174f8
SHA512f846b589c990f37b08a92c19487d0f5e705c60dec373797121a91d7b34ac6f37d8ccdbc343ac4fdd12c7d10ff7f8957ab37e13a2c4e8bd971e1e4372ef6ce158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560232902a005e6d72cc15af39ea51ab2
SHA11291ed578df452948c7652c1e1e286db282faf9f
SHA256536668d63a9778703df5fee8f68b2f2b215ff989240a16ad8211d381a077209b
SHA512b426c98a4c53e20bd00ba83a8c11c40088b190965919a3b89625e41dde29c3072d85b3cbb92183763500224effccc22c25bd5d836960b9b420889d4a8b343204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cfd1e0e1a5050221b2a4f6a21110df
SHA1fae5cd551e391aad5409806d7d0abdb680d9710e
SHA256bec6d06241bc3fc74b488f98780e86f8604142746b142f47b0fd43ebd833c30e
SHA51239d1a5d6cc6372f7c60defc9c1927c8118e77ba08326c7cc6278b994da018f3c22eafdd059f8e40f4bdb947416e85b61aca5efd7b929f65d0fb1ef40692fe4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b814f511b30ec67efe004bf1f5041cf4
SHA16c4e121f2adc32d99383db282eb05b1593bbd498
SHA256b43277a4e3827464a08a6b63b2cc2793766fb452bb8ec6e1b5102c035a4f4177
SHA51295cb89e02f3919b923591d4ff5321168b47a2c5207a09e7982f13d85f7c3c15451a5bbcaf70c6cae762ef39c5bef2649516326ff930d7e3eabaea875df112531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559139b290ce474b5b78922ac00f02763
SHA1ba22db3c9ce8fedd4ba5447a357dd4e4858cd69f
SHA25687a71afd96a6456130e4d24f2192b71456842876840d53c584870c806efb2aa7
SHA5129d9e095ecd7ec059d744bd51bca229d8b79082b3091e6d3338c4abae07efd1b7382ef4aafc4682b7c52bf543281ccd2931131089c31c43768bd3842c92e22a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b215fa0526300732b505fa2b76678370
SHA1438315ec8c3258411376d410b878774b8017762c
SHA256e0c51c626590d4440b94b503e013a7d312d33f377129711ad2af7f9912d1e8ad
SHA512e31fc3f5cf8afdceffe86fcc3a9d2f3170ee007470c9dcc49ef07c08e589e94d3c39296bc2b0060ccf3577be5db96f70fe1cb1ba012d9840ffa5d331bd482e75
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b