Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
c830122d557593a5ec093df9c058036b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c830122d557593a5ec093df9c058036b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c830122d557593a5ec093df9c058036b_JaffaCakes118.html
-
Size
53KB
-
MD5
c830122d557593a5ec093df9c058036b
-
SHA1
0e079d1b5954d68a3f9b567249107fcef63a559f
-
SHA256
c934639192e3d8a4fe350e53a03b5f8c26eb30a2481a81faa39b22589e7276a1
-
SHA512
b90c1540129e9c16c6fa55e36f003d808f7ac4e38d47a7da9ee3f85ab3d4be30f2689e386d87dd4a622e85b27c017d460980e7bf46f07825644ea3a691ac4e85
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYQ63Nj+q5VyvR0w2AzTICbbyop/t9M/dNwIUEDmDa:CkgUiIakTqGivi+PyUTrunlYQ63Nj+ql
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302c7630c7f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007cdd035b0b3434faab388f04013a8fb538ceecd9e87f81066b440d05678c732d000000000e8000000002000020000000a6b3f3c969185f14ba6f6c14459749307d2d8d606b92eb1ddcc586e0b06d21dd2000000098333ac453bc6b8eb18909a79ed8c288069211ef73b6287ffb181bc87af03bbe40000000cd309f43f1ba92555cef05208fcfe05d9b60d7feb80236fa52297cb6dfd54bba6bc4351c16f2e22eda56b1c9c34ba3e0b857a4d9999806eb0baebea5865a4e28 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431065518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59964731-65BA-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fabd6916ee789bcf8388edf9415ef79a4828b35c13d538bf52ba3b848835a498000000000e80000000020000200000003bf6012f91c42ab636c92611c1ce26fda2f8441d2379abf139938c6f1678934e90000000b53b8c7094733218bdacee99c8cb82b6b47d1be1aabf60559e9a98c3a20242d73a7677beaa8222b3a3286974c84dea63f642e92f72de9069b534a7080b9ace4b0690ef2262532d1ac7f664dd663052d8f82d2b6a3eb903c8f61bd1aeae69e4ace426e1d11caf074b8d7db70094aa9f6eb4611c5497897a3bf187c02e87a55fa034b3f92c713e0b9bf7695e4ac12fa31040000000c901b1e6ea7c17d94e1e1297e683dd90fa473202d8d4e00583ca4cfb415a52589fc9dc688fd0153070d022d9dc0a5e85e1ee9f438e198013f992da407123350e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2320 2228 iexplore.exe 30 PID 2228 wrote to memory of 2320 2228 iexplore.exe 30 PID 2228 wrote to memory of 2320 2228 iexplore.exe 30 PID 2228 wrote to memory of 2320 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c830122d557593a5ec093df9c058036b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59390d1d20a10cc1a639af9396505522a
SHA1c495e8442c971e7d01d67d90cf8703f64d7f25b3
SHA256b7c66809d1f74d7ce1fc3ed9a2ffb108e564cba7930dee5082aa51907fe54d9c
SHA512cc38f86ba9878be6239bd7fc0f8bbe5b1d0b6dfcc012c9d21fe7ab117c43d78ce229c98171123a48a7de19847c4b1a655990a64a6603024e8057a87c753e030d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78d4a4277e58d87113fea1334294ed7
SHA187049d95d22e5e4c47c3189b581ba153f2d4b0d4
SHA2569ef85fed63f5576ee41c197bea3384e38abaa922a78bd9f940cf8801415ee5e4
SHA5124a172dff4aab3e9570725503607a2a150d541e032ecf5d0d50afa3d50247b7a722cc8e7f72828b29fdc7adbd8d6eeadc2a322ff0573d2fa79c849040a182bd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d65bbf30f7d4e10c0a3baf7c451688
SHA198beef9185dec192d3c685b70b2d8874f3732fe5
SHA25689e1973abd9b2cffb7f2670f1adb741b6bb90d2344601999ede23c1f4e9b865d
SHA5124a5b652758dd661648c5cbe19158709f200a4c2e7bb0ba542ad47f3356544c512b39f33eb70d5232a6022a3f56e1fb6801521fb501eca275149a33eb7cfa0526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585ad4451b8fc78ff10239d2c636c92df
SHA189a265ca344a0c5ecf2ecd6f455eb66ebba0637b
SHA2562b4a693e2e2ca1bbc4b0b16ce99a866d8430793f580ea5717bc85b6c8511d16d
SHA512eaef44683acbed550784df90e00ca0b3d34d09776af9976e442b027d80537b1c8caa5f69614b9ccac37083f3a09de754e6e6017f45a1f0967ed4d185b99bb842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56edce0ff354c4df87abfefb20dd24df7
SHA17ad6c90d444ef721fe786742f23bbdd747c5afe8
SHA2567046673d0f723ce5a6fc1ab643927d3d79ce3e65faa0dc7a55e19c4b9c5d0e32
SHA5125069e666566776c3af5ec5a8783843c97b7c244a64f3f521cfbd7e652a41aa559b55c54863f568b4c728f2adabd0f46c82f93f4e8e0841da394dd00e5ac197c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28a0950edae4739669f23ca2ccef6b9
SHA1c2ab1c0382210305d0d912350c230313d957bc43
SHA2568fe6b20935cbc8b97514a33bee6e68bd7470a773cea3acb3e7d2c5371f279c71
SHA512f904a6fd498b26fd44453daa62ccb01746d15ce92fed976dfde1c4eee5a3d595043365eda4c614c55ec8937f96c018eed26fdb4d00dc1d209d8af7d886853a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c721f72c841480bd0b3df8f1d9de613
SHA1c9272d2e78a7fa49b448d33b164b204281cf36c9
SHA25648968258b643bba12ed1710f493e90b3a625e007f1f4c8b8216d5cee2683f82f
SHA512ad20b007bc471eab45b9aa7d8e465e2700029c82b075ed6aa966d5e5cd5e7bcd76fd0b7d23b870223cdbf3b15b801aad5dc9104d87e5498926f9746283ca1eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6688c73dea25f0676ccaf6359de80ba
SHA18e5d5454a7fb4debb7b99071251973ebb51ec8ab
SHA256300f9988d30cd45ad4e6c9131b7093e6866f47d61249a15abd81f5087bb3e0a1
SHA51250e17a7138cb1650f13f7c96d0d2cf14900505abdb6d9e2597f4cc0f27d5acc64ea9d58b36bbd900af4f9086c8269b238b5e8522f6594297bf0dfc49673a47ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0ee189dd8365db80f14f1f19d8c62f
SHA1194294240d1b6524c1a602bc8875004c0216f41e
SHA256ad283b22c43261aa8493802b8f6773f2e4282e25accd45c14a0b30d88f0c6272
SHA51223626b39715c251f101e152afff995f01345ceb7d529b476a4c3a88a3dd150b14254440d92496aa82887dad80365ef98972a6e5fc47afd3e7219fd8c790d373f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221df3c910ddf43bc40e3183c7a2319e
SHA140974691343b0b248bb615bc0df920b5e99f4d03
SHA256d731aa6bf7be3d0a2ffb1151928af751fe4c75621bee716e799f0acf3633ec0d
SHA512f0cd2dd247a07831e53840cf0e97313ec588b1dc03948ffa597ed61085b227da0adf22601812561ca5c70267c1a65bb8f3a7e746f3a579975c00a9099291f4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff86ae1053e426b6625bf598df641d39
SHA156602c8f2ef24a1826468ee3eb42a479a87d0a32
SHA25680a7ccb989db891e50f0ae5a715c3f200736a70b01593cce827af4af5e3d19fe
SHA5125a4765159a52780a5c81c7938997d65d45d0efb2f14cd497f2ca9a9ae321f6062a10efdafa108d0a555f07dcf8e365763c37ec524bc05198bcbe7912de22fc31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b290f5110024ff196e5f8f44e6f44fc
SHA1d15c519e118a4e65823bd2bf285cd43011e46a76
SHA2562cff990ef2991fc603deb9ce6161fd0ce8dfe3121eb4269d3b73b1e3f78ab222
SHA5120dbad7a2616af4613cf45d184e3f98bb8e19ee8555af9185017833b6929f05e3602353f43daf00bdf3bd5faff9050eb24ede50215db64ffa3ae59899b36f0f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc06f746d30311f94c1e334a8fc8945
SHA13c79c5b64ab222c800c3441c7270a81973d18354
SHA25632f983bff25a2e7a612d3f9e2ef75b952778de2c939bfa699c139b154f40cd5d
SHA5125ae4c2519989347be433e0464831e5f969b107df4186464a22701fc8e3d27382b8b769864248d432a7ea324a05d4592a26685c74bbb04aab191af03ef8969945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f421153005e7d4ba9d89ed303d6461
SHA1b53b116b65a3623c36d876704d4c361782199ff1
SHA256fb306aeea4700c7b928376ee51f5de674fa4a0a9e7c2418c353532be3d627f0c
SHA51282bd3ee7e12385bd15afde03950272d8bd9bbf50105accaf74205e7df5128543a3c91dd932a6f81914bfe097325b28f8bb5e310395d1b97866ee0974286776f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee74c1be2dd180521a16a9368a1ab839
SHA123412389f14f661091f0206c49faa10cb7a4c69c
SHA25680a2d6d6fdde5af1e36f477eebfafffe3dd36d36bb2165745f067520b8057626
SHA512da46b3b61192f98db5338e7408015b4d9886a3d9b42676c7f31e830deaab6cff5aff700ef06f8991320a44775243c62915035f78c6c0683eb5faf84794b18a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d935d4622e27a16032a172d3f2eecdd0
SHA1bc10a0b0d8994278534f91b8746229f1c2d0f55c
SHA2566781837e08691c897f281c57d483d90252b254b140ed65fb0184a55b6d7985b9
SHA512d90eadf7cb58f2d85b57054f446378b93768def20de8bd5663c8e594903b641c5d54f3c6c39b19c3dfbf6245f503d8ab107c8d1e0985e3e422b71f896e5ea6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29e5438359c93fdc6c76b91194e5b87
SHA12e5587bca3352ce04f0a2d102ed31d96d3ab5d8e
SHA2567b3da7c5ae4688417acc81c884a82c7aac7aaa16e1dac124dfdcdd5ce1919f26
SHA51294e360efae7f5def6f898a97c59cb4cc445c9730912c2e30854d1bfd6ee783a815ff048798ac034871399c710da44ac7ca97387580e2c411c1a0cbd47e8a87e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d74c6b34a9d995a1bd0d144575aad9d
SHA1b1b844660f08e1e07c3c0f0707a6a135bd3c70f5
SHA2568310b99fb715b9bd8cb3c1f258fa49c914e9240753c114b3d71b568de185d2d4
SHA5120759510bdd81df450fcf892c14bb9b83d9da7bf66f9286639757839dab3b6d7dfb486f8e736f7dea557e703457bbfadb3ba1863ae1822a19e330c2eaac8040a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552860f40a08b5bfe6dc6ce3d0f9cf438
SHA14bbe66b868505177a4f75f6df39f37fdf2d0588a
SHA2562ab5027c565de998ec948640ddb7f73f6ce5ca33036718943ad3007baa36d7c1
SHA512d7821245b36559edef422d5de99a3a76816756512c3029f1f96c871142f67975bab91cd27def7004e2e54b912957ce61239e47ef6c02b8f434476c3aeb8eb5ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b