Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
b782328fbba11e874dc4b9ed8627a913_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b782328fbba11e874dc4b9ed8627a913_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b782328fbba11e874dc4b9ed8627a913_JaffaCakes118.html
-
Size
13KB
-
MD5
b782328fbba11e874dc4b9ed8627a913
-
SHA1
55e9a37d7c30eadc03000cc928a7ceb6e700c8e1
-
SHA256
f385d9d27f732c7df42d6033e793b101a4215c1615f5b8184f82cb7090993511
-
SHA512
5dd841ba02e3bddaddcdfb9c33ef4c93b3f3f468a4473c7ac0b2176d68a127da01cf1374e393b37f07f9f664afe16f9e8d3744b155de0b7410280bfd2f7d5ac4
-
SSDEEP
192:SIK7sbpjq4ejen3lu18kRFr+p+h9sfvd5GdvVah5LGZC:SIK7sY411vULEFR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701fa25089f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000002cb8589017eaf84c07234006e59032a829395bbb45f081c2f21956f03ed1ecf8000000000e800000000200002000000035bf4a58bde6cefae40808a01541b11ad40ea58fcadf92f33bdf8eb03ebb9ffd2000000078da6f3055f80dcbdca9ed4008e5a5bf6cec12ead655264f3fd552adc57c85ab40000000a7a3f2a4c35ceafe6e229947a3c99a562b20459ed26095730f452737a0d99fcb1283d971197e43f72f8a0f344f5f3a07a6cd6727e648603496fbf4137f60156f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62DD24F1-607C-11EF-8FFE-7A3ECDA2562B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430489151" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000d4af2acdfbc76ea1b50cf948ffb318187d0ebdb74659043404e80b816979f649000000000e80000000020000200000005a8f2bdccdf1dcb9b9465d2af4701d21b80698fed9fe11200e2c583660a6a63590000000f4f9c961a9a7fc6bc68bc55d014798ce566156fe39bd70f7deb5b8c2a8886da18c48a5fd7f52af479ad9fed15369cf5b609410729ac4744f639d31b2c8565b38528772763b02d4590cde99858c6f7e486593123074580d759a213d1997888da1a836ae39197237c1d2f3a7a3fb00ad912121cb8f0fb324b6710655779114cc6c9c71849601a3ddcd2849ca6be12659684000000048082b0c49038903af90ec19a9a42d1e1c25a1c60229263b717d426926cb9ded508c90d85da2c01786dc520011b77e67618720640fd71e300b57c95624c9fef6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2832 2120 iexplore.exe 31 PID 2120 wrote to memory of 2832 2120 iexplore.exe 31 PID 2120 wrote to memory of 2832 2120 iexplore.exe 31 PID 2120 wrote to memory of 2832 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b782328fbba11e874dc4b9ed8627a913_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513a884f5d3f78ffcbebe4f7032921bf2
SHA17a8cfebf3d89b4b6e55f87300e9659c8c907ef7f
SHA256584aa12d40626adef83ff8f262fb062195da66947053492f3e39e4bd3d435e19
SHA512ce054c03e7716c554424c999ab7ccdd8385d565167ea524a5bb4eb7befcadf1c9d162d97ee5b4ed8ab2bc3b5ab6451a52ef20171fe289377e10bbe23839cff26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5475a99e49870dd9b3065475098cf3791
SHA17ad78fca9eaf7330646f7f7c2ca3398cf9eb2ff2
SHA256fae94190a6930169f3dc121dd4ec7b69b831947ceeb6e11ee94464dfde4e4fb5
SHA5122c3700e37bf5c922d574ff7cb74da7d9ffa3c10bbcef4be843a5c7f0fe5f1b57a4eeaf3daed88f769abb95e725da435cedbab73b9617839c0f8c2c354bb5f7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54372cc06f5bab23d7240378abbeb6e5f
SHA18003fcdb5f591f09fc4764f483f65844a43029f6
SHA256c3194dc25533bc0f55591bb83c37a54f9e21415dacebc311b6a97ec8dc00e4a2
SHA512e7a202eb479a1482c001de8d039a3c42174f55939cb3ba8f526adfd54fafc1726dfa7d1a0f900bc3d71463d8ce23488a99ef26caaa5ff22a52e905a4ed644385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529f71fcca360058cbe09891dbf3e0616
SHA114caf8676d8c1c3a2d3d47a379f096bce740e570
SHA256d758bc70cbfc3d9452e43c7167758e025630bbb33f3aa46894deb6aba65d7f26
SHA51260f0743570458d66e463e2116cf9fd7cdf0ba6770975990605375e324868673d7c5408d5dd930ac22a810696b75223c2b8648fbeef74b19acad839217b72415f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d87928bbe1ac431b483c12136b6756ec
SHA14b2263056c6d81bf5413333f21c3caf0586b68dc
SHA25629a80ba8490a172e512f38c1a157c07438e5a38bc6d10961b9b4bfd227db92dd
SHA5121bff74fa11eed3d7f234dadeb9c1905565b8b22c6e9906bc80ef8dff5fbf65878a2b269e70bbf19a8e9c66338e62b63bbb825a614265b7d997ffcfd89df341e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b5edf99c0170821a2e8b12146596173
SHA11edcb670d201f6eac40408721212b807f4585732
SHA256edc75840d1fe1533a11495af7d671d6f66c13cc987c58b1b9af05e6fbf3e4357
SHA512f0c67461d3824f9ce4cedf31b7d1dc29cbb724366dcbe7a2cd46908a4d4cbebc0d5a49088353e197ed1f3ed5fe6cf6610cac21b8f602ad67bbafb633b4b863d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d1d14c8c8b34b2c9333a410db99be7b
SHA1cf540dccf9402e766e3a26bbeda6739516e2a51c
SHA2564f55be9111a2e6ec2da6c3d24f2cec6923f720396ae9723b68f86d6e318f8e29
SHA512218c67a06b4dbb1b6b5eee77d652b5edba9d8f10d5a99c628d786d9c206d6ed4fb349f04c4f5a7bb78eefb94339410a9c5eec3b568278ca207b35faa57f6ef4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56dd662a11b10edd88474455ce5dad030
SHA16418bc702cb7a3f51451f37f71a1567ada23a758
SHA2566c3dc3f622649da8db3e916143803abc363e72e7b029b18c047addef5ad3915e
SHA512735854e47a79af772396b6352bc4b3565015d92ec1f2e566f4911e722f23933e8c9392a443c96c7f35978f5318f639f33a3878996e4233eae3d17dd6a61490af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5077995bb7c96257e9aa3298be3035fd8
SHA123e837ea010136ae66a12f0293a197d1db0905c9
SHA256df800bc21af89fd5b3457b28d07164584522c5d4ffa2c428df2ad3462468510f
SHA512e98dac3ecd12d1f5aa5a3da5dd5accd69e4a2e819dc68844a502509857d4139ec6f4b829e6c5c6e9f7a7fe71bcd75e1509b91e2b6521d8723d948c0c44784756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56444c02b9e2829cb31142ab7267462db
SHA161b6b35ba57ed6aef9eee5bda3590dbe5cc861c4
SHA256579a9faec7243309458bee22fabb54de5444daa75a4448ff99c1a328f23cacfa
SHA512f96c1c33eaf87e9b9884f0c080631b852b267befdd86dc1a80364218f12f4a738934054b75541c0f6a12f436dfa71e6f9e2265edff7abb0cac3eeed3768d2be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0303bc13fee1101aa878901a34c6513
SHA111714de675ff930ac39218c4344b188ef9803143
SHA256b5538c1cd97cf8d376469909c9de3ea2330f37266b6cabe824afebe14a22e66d
SHA5124e6612f4df8feda4ea8498cc809fa64b26cbb300bffff423c9227b54139deef818874dc42062d3f65bcb85e080f866ae41968674aa20a45b55d615e3c0e3706c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a880bfad1322ddf339ddaf4132b7871
SHA1f3cd3c6d830b21dd5a92c7875d305aa5caf721e8
SHA25664bc341057f41d01320e99d055ed1d07acad5232acf117d013e4e695aeb63e54
SHA512760946ada88c6cef5aee3286b202953796da0a6ccf6e80dc86632eb30f9a613a702e7864977de620c4737a4f54b2e9948df96fd433a097afcbb01f459cdb721f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52308ee6965d60174f82ecad05afe7727
SHA1f22e7511f9d811b98e23177df04cd851d84fbada
SHA256354e9976acf845d802c5c21f6d29254c0f9c00da40dd5d1112fbd9a034dfed8d
SHA51251fcfbcb398aad39fc5978740efb82ef3b4d7a12defc4843215b94f1abd895a14810e6f124b0779434263a9a75b4694b28a69220ce44cc5345f993112bf604a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536f67abeb53689a9841b58303b75bbba
SHA197550ae37db428abf14d34c1d6fd36abdea907c7
SHA25674208e45dbed6145c19fa4f1ea395680a0c94238ec8ffbdb0e30bbdb3890be5d
SHA512df0b345b894a954e1379f2389a3d3eb3700aea21f05b1d2e43b34ea4619e26074a495a59ada9d17fd11e28c5eafed17cc98d8e47bd14b3a94b7df3f29155f4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be4ed2f98b5b9646613650dede16fdda
SHA1f5d988abf2cb53e922b0fd7624e4776bfa94f213
SHA256a2b0c180672346806f7b56e69135a18616c7dd8093129d67329771c5bf2105d3
SHA512500fb8a060b04520f6b51fd380f18c03032bf91288ce336f1fbd6b32c6a1e71d4d35abeaa5fdfa222b028789a3f81021e133b26b9979a17693f3c018222f1351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56bf5090f6175d95f522f57be39203bec
SHA18613d597602f1ac5cfd821d1f47b65dd82b0b9ba
SHA256e00515c19f7484d7d7edd964f718da54b2a76db7cc62b975db45938dc5edd6fe
SHA512f3afbe5beccf06844bb0eecf0b18d564dcc6d62cc70553a158f3370aaf72f3733214e36afc67494c88fe6e82fd932735e04acc928102dcb50e5b71a0a25e8c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed0ffc3b18563dd2e1227124802db92b
SHA1d002ec5d0a495f48e786fd8d4b4603c5fa2c8271
SHA256404e2eba304ad0873093f7544bbcb474352928f2d4afa9e2a5c808ca9252f971
SHA5122c8e6f60b3d1caec1e8507f79e0fbe4e075d0c4d87a8a86342ade525ff5edb1dd8e40c1b3e85e6e00603f59bdadf95496df8a990c5f2588882811b097bdca9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e0939640ff914b7370d55b5618e9ef5
SHA1823d3db7c8c562a7561fee6269001452f62f9341
SHA256680c0c5d89892adab4e4d7fa1b8dbe07d5efeee6a69b53258d7c4ba872523feb
SHA512f9f5a5d458b502370c2c965ebd748c32ce460b22becfd23d7805e93f71893d87b5cffb24c00138ece8e7edf072769f9787958afc0e6284b1417f7dc1e2fe0866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d421f1f40bc7358653062cdb1eed8ee
SHA1b120f4b1068a405a4921dc54fc8e6d74071493c9
SHA256558e11464ef43c5dc4c16ed31332062daa1398a577ef0da67795f3d2c0b7cca4
SHA5127dbef50e57690e37a01a7503de9a45bcfca9848609df96114d1e412e1c698a2bea82e89fd53b69d45c69ce2f25275438f5d5eee3f68ef5a3e91ef53cd8b4fd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0d04696c184b4fb7b4fccd139945263
SHA1919ea2370207bc1e2f2a8ec1dc5a1a1d8b6f2baf
SHA25652288ab3b1e225cf50d53a1d480c516de62cd733e7acb094af321700beb23f7f
SHA512ec5d50bc8182333a12febd3ff29cf50c8ab29c84288d140fcc64db71bd92119e02596aed719f29b13a78262375ac40f94b30f43004b320b07ac482297855651c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b