Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
c91e805478a9ba708dd1ccd6ced50eee_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c91e805478a9ba708dd1ccd6ced50eee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c91e805478a9ba708dd1ccd6ced50eee_JaffaCakes118.html
-
Size
84KB
-
MD5
c91e805478a9ba708dd1ccd6ced50eee
-
SHA1
f64320ae153133e25af899f15fd2eaf9600fa7c5
-
SHA256
6d2d1955edc7d7e38261c6c41a147f9716911222ac045a79e72404d11c58a438
-
SHA512
4b9b64fd55628c9dfbd40bfecfb17fee00994ffbb6b4e168c8ebc1cc10325a4babab65866000b3bfaf154159a92669a9ead3c9e8938b8753b4a2af7f05caf55b
-
SSDEEP
1536:aPqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOB:ayyfkMY+BES09JXAnB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c083c90a2afada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000041ad5a8610d0ed9ff9ff63a189044b16079c4c6d6f1aa3112c326c66e1173b82000000000e8000000002000020000000b2a57454d45f1201b1680bca4bba54f3253fcc9060e63288500f48d4da2655da90000000b5de76f6f28bac44752aa818885ecf977cfe323cf9a227b7866b4e7ef0b19f83161042b9d62e776ba49c17f55af7bcb20fb560297b18b4a777a5ad7b7cddcbb3db97cffb08ccf2e02c7bc22b32e680b3fc91e98284142b79f2918e7b2591c82af3d7d70ed9fd092cb68c7046cb3e541ced1d9377fd7fe17f5ec5f17ffac288ea5b7a7584713233e84263e938ccb0ae444000000052ce5124510a496928ca43126f68f48941cff6c500774004a0b1dabab935ba1944d52c5df9e1d9522a984f0b98430f6f7677af4cb757df90443f423322167941 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431107979" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{364DDD21-661D-11EF-B254-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000d95bf0fec359740ed315eb9913fce40add568c54af55da7a2e78eea1aec9e2da000000000e8000000002000020000000e71145678b7f66c48a7e32e57492fc04ac65468bf8925bc1378bce2d0c67161e20000000d6a581c70051ad30a141b717cb8bad86516c91fbac8aa2aaefbd2c3278778a4b40000000332db935c7ffc2fa6c8353fef98751f4f1c1e250a0e3d9e37f87fd54d90387bd508b7f20777e2b5bca763d69aea9dd3c7dab9b1b14985b31e6d024e8526c1029 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2852 2652 iexplore.exe 30 PID 2652 wrote to memory of 2852 2652 iexplore.exe 30 PID 2652 wrote to memory of 2852 2652 iexplore.exe 30 PID 2652 wrote to memory of 2852 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c91e805478a9ba708dd1ccd6ced50eee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a3cf5ce60f7df6497df0a4e427254c
SHA1e66812b86c096418ccd88b29c70d8fd8dcc6d1b4
SHA256d3d94547424001ef88e4c2f60ccb34965a03c71e71afecd3e5cf94e30d2e1aee
SHA512770de928b0995b366398058df0525964e666e243b529bb8f47d4ba5a3ce50b762a2d0e1d7ce5da6b90781baafeff7909badd9583b956b428f7984178e53477dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f547e29ed383aef7379085cdac5867
SHA1f34204f0144b54dcfcca46ee580beb5500ce4b68
SHA25681cfa8ecb37dbc229a42fc8774a028de3716d26b80eb4f2aa113e5dfa29cafe9
SHA512bddffb3e44b14ccc0de17613dab100e9e0344af8d2bd1177fb7bb05216e13596122154bdd7313722a56e6ff33d9c36f77d3ecdd202a912412fc9cf6eb9f2ee8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54606d5f22c50536abb08f55c6a6dd8ed
SHA1b00cab641eb4d4e0ca4f876e3ca0275bb4af9c13
SHA2563b0f68bafd24d6cca86fe6749ae39d41d5db70f82f7982b841a52d079ad68587
SHA512bef701bbfa105221d99969b11a9bedffd2db94ea49bf7b4756a88a5e2ac8c924df0c4ea4987a652fba3b5dc53aa097cd1e3c80ce32b24d06a84b335dbd575573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bafc791d03ea3a1de0f0d962467b4f97
SHA19c3375a6da899f6dae52554178bc712a12607907
SHA256d1bdc595a6d10e77cd52be1a31b1ee6f877514caca8e54ad58747ccecb330470
SHA5126bebf5a21787201dec6e5415403f8214b23010bad17068c11298f51a6d0a33357b7b37c9513ec24daf7b0c055f611c24dd0c17cdee8b5ac2cc8d365a1ac6d81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f9eb93a03c8c91895132941f33cd37
SHA12efbc5a0c4dd449108920174e6a69e940694484a
SHA256a29e248a92c5fe65c74a74302811d466568767111426422b695ad5821274f646
SHA5126f603702542bfb8876686e9208d7c7fd5231cb8640848bfe9192bd43de3aaf3258368bf16711cbb994d8e6b234cf7e432a34305064a025fff6e7358ecd2728ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a50d9eaf28134f591c1fcfd753dc3c9
SHA10c34f7f9c76c2bf5688dc58618d048d7d04fd437
SHA256ad335677f4c45c9df337a45a7d0ae784a53e865fdfdbcc30028942b5be60febf
SHA5120a46f81291b3302cf3ca5f725185d358b86cf27644f3743e625d386383a8ad9e20e4c590744b09e9f1ed41e25937d148bac7357076e0e5b72234e72eff99d362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b96979239a5a5af7e8263fc327aa98b
SHA1ef74f7c905ef977356a5a8a27a064b4a0ba4ab92
SHA256d49a9965daec7e14aefeb214533d265dfa07174f29f95f7631f6ccb8632ee65e
SHA51238fe0d396179f6a3d5903ba6d267e8694229c953f544a2eccab46fbcd98059aecb602b179344444f7657cb5c5da5f194acbc2b558c7bcea7107255d6e61a95a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2f5fe283a378360da80a70dab190ee
SHA104e1be5f7986e3e5afc5490d12da6e0087bdab91
SHA2560759db308fdae37ef6544d0316757cb1aa3894903d4e815f3d8a4f41ad331780
SHA51220a6eb366a89cacf225242e3f559a04b639e0a0ff2ff56d3fbfb624d68a173c3c97f557f393501eafb6fe61df89a7cfb6338831d4678acf9a1f50601edd6b2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd6f45c1e8a5775e35937c1677699a3
SHA12dd7fd41198555538c3a96b0c4ed5cb8a37cd9ea
SHA256abfef2f6951a6e03b382ae0a53f661640e414e1bb2614364846c3e31a34b154d
SHA512681ce31ee55894fefeb986f9f6c666e91cbb84cbdc825435b31a7688650f8a414e3957836abf1cb5a13f56d5898627b744141f496cd1a117476e9d83bcb94d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515edad4d5aa63cb23d66fe247bac61d2
SHA1939703fa854215a55013f3b23b3558eb403d4ef2
SHA2565fd35ce845e7dd0fb61c281459d0bcc763271bc1eb2784597b5ecc34eec83e76
SHA51252d6c2f67476a9dc1eb80ffb91b7be00a57a5bb0a4c992e071555f3b1368746bffd4efd2a4b3960c7d7e8eddf44c298ff7799e425930bd81db69f9acbbe9fbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9e2f038c8174fa5bea48b9d521e960
SHA1fa027f86257ce33dd73e81e7059808c9e2e1e67f
SHA25671b039517ad24f8b63bc086ac212cb486fca5555ae45b86092c1534f615efaf5
SHA5126db07e2a7a4cf452d948f1c2647a2252d4a779bad047bc23080fa92d7917d75f0344cad3b4345317ff3860e5d698298462d197157e6c198f8dfb9bf33cb766d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbe7aaa50770fd432bf684c584ba3e2
SHA1fc334d84d70b0471dd1e66c262eead808650ec27
SHA256ade0e7847dcdbfe8adeb6670b7a8bb61e8adf6ed77d94347fd5971e8b0e207fd
SHA51254436dbbfd746c83a6bad9ea6ae83ad22faab6eab140e8c0ab9cc269d795559dbb50adc3f3eca50bf7bf3c5f2372b03a092cfb4fdca916348856a84ba964a3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e7308760437bad43cab83dd9ad2b5b
SHA19b47537a14a2765332aea3e652bfba3417858f7c
SHA25684b044b4753b607b3dea0acd0b700187304fb14fb1cc05f6d026bcdedb9129a9
SHA512cd03990818aef44c863cfb5f4e9c711a9f24eedf8f9b02d381d507ac161a1825f7ae5e9131567795def18f63566f30cfdfc69010ccd6ecced1ae4de18edb68c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd374883f36dd55b463a7aa22597b29
SHA17ff6ea7868ddbf980e41b239ebbade55e585b4d1
SHA256baac67133b35bab3f5f7ddb67dcac08c1bd10b76feac28e53d995d535b53160f
SHA512ebbbf2796028c6e90c9df8f108d26b184f28d89c296b9580cca5b42addbc375be72248b12cf9b553aa81090c04e98b5447b903c7d4ef59b923b4d1df70bfa1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9347b5b0b8e9d33bf8f6a94bce1b1e
SHA199903f2cd62393c6f6f5d19d01db660e5689b551
SHA256725cfbd80e73a1629220189e45c8089a6bb97c77a82c80eb3ce852bf9c9ebfc0
SHA512d223ac06e127aef232b8baafe73f9a77c135231bae714a0a7909b1bdebb846b5385d0b98c16e8c4f7e58d2088b0f361384857b78f604e050aa163662946de73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c19f700bedbaf48dd5ae8ac848292a
SHA11b8a9822c61a35008e6cc353f800d5a65e79a643
SHA2565577ce00ac095fe5055beff6b2d577117242c7ae6e0001d61cb9c88e5fc96e06
SHA512017c4231b256d0b56dd94f9a4df10aab67354e3a544f82a8d6d07a6182e0a6ca0a5957d942da3596cdde6a4082342e444ff71d5aac7042b7a2db0ddb06273bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92734b16790bb30ca708d0fe963e287
SHA12b26a9fdd60ca9e978cadce07bcd1f6dd2e552c3
SHA256de67841f3554c3c9b2920e5305b51edfe9a409c5a3c52e83aad5e8ad171bbe54
SHA512735e32f99873c1e06c00a42eb812798166725fa1b2c9084b3a3e71d6fcb7f8912fae4a88e7cf7fc1a672881f90b3c57f0c4d4fa144fec069461abf46e5a3d974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593b75586ed4c24257bf9cb781a1bdb9
SHA1e4be4ebaacb3ede3e0224982feae572fb60e03dc
SHA2565517630667d37f9fefc5ef87f3852492b82549241e39e5f66c2437963cdd0cf2
SHA51296c18f455979b89af24351de0639c4d6387d42f856e6c2e37195c4c0359e60fc3c4e969569d214a4860377b7aac831e1a7d5483a59ee93721d6f39f2000d66cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d11e2d7f584481f4fea35fcd1d86e59
SHA156fdf0ad82e73db44dc7c9456de59162bb6f4c4d
SHA2562a550a557f243ca9b4866f03dce4c0899dd60d940cb7fd9fd39f65c004a77d8e
SHA5125808e41d6f73cf1049ed524e157899aecd33b5998728c86cb2580707c7446bdeaff251a96cca22fa739403804717a3bd887ccd2a2ca4d76702ac98f63538c68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e224f339feb2824771bbf21c2219a00
SHA1c74c63b97eb57e3b25d5e2931d47393cf60cdd3d
SHA2564347359c8a6f4f47362288da783a0b842de4fd8730b7c018af96c4599270a94c
SHA512fdd80792989da12b8cd497df457db7240d7532edf923efee99107a2a8ee1b24a13ca5cfda319f6c31acad46b7747dc2d0f4325610f2a90af3658d112a8cb80a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b