Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
d07ebd3ac9c720c776da2d47f146bb99_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d07ebd3ac9c720c776da2d47f146bb99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d07ebd3ac9c720c776da2d47f146bb99_JaffaCakes118.html
-
Size
11KB
-
MD5
d07ebd3ac9c720c776da2d47f146bb99
-
SHA1
70743ed49350f4d6146736625c0f2e191750da11
-
SHA256
5a7247fc8350761c1603eb4797b2a7d5bb250cb62fed3228feb5596e73a7d959
-
SHA512
ea1768d96d211d1b50703ed8743e87d366d5a6358935b6acd5ec8912b6e5a5be0d6bb9aaa91acefce5d060869127dc2c0115ac744164d07d01cdc2a9a2f84027
-
SSDEEP
96:uzVs+ux7pVLLY1k9o84d12ef7CSTU5GT/kqBp2IZLOiedxxWQLiYNCa+RiVa7ika:csz7pVAYS/8S2IMxWAuLPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f9fa8b5e44e9c80e2c776f9f984000d5971880e98a1279f7880d8a945e86ddc6000000000e80000000020000200000007a1899d36aa646a688fa510ec1e85e48f7423bf9b922f4c3b6c7c5b5307a429f200000005ef07ed8582b7adedba87df2393c80ae352f4686cf2a282db5ad5e7cd4a6232d40000000045a0c89109e1047ed6294daf8a568be6a76d5cee237d8c273628fca5ca53f3bd54638b1169a371a265e22af476fb9f00c662e633cef2bdf3e8de91087487a91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F255BF31-6C97-11EF-91DA-667598992E52} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431820401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80921ac9a400db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000517313308f838a8bb4ca7ac8aad7f1cffd047afc1716d7aa9275912bb9de6044000000000e8000000002000020000000847552b13116a820f2d5c863896726603d08ef2f4eae8128154da8a2c84b844d90000000b5eb65f92553eb7b72b3deb1c490d911756a3f232867f8a5d6a1cef4469061998dcc07be5791e275c9c4bf59e572e9c65abc77afc636a093e1c6305a350aa99b4c22faf5f4f3b1fbc848210082214792b53f4f4b0c3e3ba41800a5720e1a8e1964f6bfb8c1a532c0e96476d563e7476089d3615721ffcfadf229de04e8648f36d0fe4a2b78dae053a616e784ac51424b40000000aaed804363cb2e80a4864699479ac3c461c65477028133b37036d6498993b30a106c959dba71399495f56d0006b1b1317478b74d4e619bd49f4039d04727e8f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2256 1304 iexplore.exe 30 PID 1304 wrote to memory of 2256 1304 iexplore.exe 30 PID 1304 wrote to memory of 2256 1304 iexplore.exe 30 PID 1304 wrote to memory of 2256 1304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d07ebd3ac9c720c776da2d47f146bb99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3cd820a2aae6b580037f869b411c21
SHA1864e0efc9bec3ada16b81ddc72bf81f6d641b26a
SHA25685f78313fb5e9701eb6c9fc4e38ea36174b4dc45f5d9fb7c69ccdb54b18aa8a4
SHA512f6bc2d8a6e0dc1fe49e7f4c95f3e442634ea0114956cf025affeb02ef6e3a5b5b01ed2fc29fb8d533994c73fa3652c76b0963b4dd5712906c44e2b1707ae50ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f278c332343f7d1b990d182282bdd78
SHA1657f318850d7fe6e2eba96a11bf02c330d2bfa3b
SHA256000f9c34d74bc6a036d63828dc4d0c58e56cd37ea371b8d6cb54558a1f6e1f71
SHA51289f4f5b401f0471b843e06fceeb6871e24bb2960a2feafc41990ca4b9efade0b2551f8e7e0ac1898434b314b343d57cc1c37adf22f9e1a870a54a4a80a317d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf8a7629666a03f159ec4e6b69af9bb
SHA10c74d4b4d6aa01332c1680010cef63a1a2ac7b5a
SHA2560bb531aabc9fafa1b2b5ef09987e2df47a9ba6689b5e363965f4a6ebbdb1167a
SHA512b4c525c28c3da03db1901368adde65dbfd6b71c7280f7377ce2fd75d47a067db7d1a49c359df2a1c0f78964c743db3435106c8c784f63da27b236c11fb17fc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d826305fd3b1d22394a0e68ad9b189
SHA128e5ab069b07ee3e08ca72dd79344cdbc45b18c1
SHA2563e5b73a60140f4191c40adc4ea82b0dcdd81b8b134171ab2192cd7e880746908
SHA512cc65fc87c94df7959d6d9af4d551f17e330787834c99fc4573d2ee7452cf80f6b5479e1172ecdf6aaf010a3dcdcfe5950afe9f6c143ba3dd22008f66b19cb5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2aaf64cb66ff1fb16625438bb07fc5
SHA14a1c1f8a2fe20c75ad28bef0c2b524e5b42691c1
SHA256b5e8fcfe88393dadc63f34c061e4e34c6182a9b4111027198911b01cbc551d73
SHA5122faf3d98c206bfa50d522909b9ea1a599c0484ebda19be906a6ec50c5d98b5fc2294d1e8353c70565f13733908ce63cedc79b02a1f897353d3eb83e68e038cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f941b5141dd40e4e57d1b9e540fd7401
SHA1a36e1963f8eda6bd84599cb10c20b8df9abd29b2
SHA256933fd33a97b5e68bf703d57e7c3d794a6afa4608e4ac5ea7ca7f0408c1d1808b
SHA512b49480d39f9307eda6b08c3f5a91f36dc4af223aeae8cf846b35be0efa0905fd74c4060a34a79555ae95ca3e47f3f8588c6e4f0aeda2bbffaae529af535498b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93df0c5f6b693ed8ec0a1e1bc9f7af4
SHA1f262067103f2e09d90cc6132cbce1b59e8bd881d
SHA256241b573f6fcc64183c1020a2d3dd34eb37cf8ec3a14d511de64f4aef974590eb
SHA512ef8562bd6efeef545f462d9940a6152de188a1b172aedd7ef844a6d0aec1e76b610c92523290000c7a502b1aa449dd2750b67e41b6d225546d38d7d4bad072b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6709af28bc4c1b2238db346dfe7e5c8
SHA1a30da019eb14f35c45a4cdcc62efce442e6f3ff8
SHA256aed926fffbf33c46f52e4d57efc4d360fce038285141bd914b8985602bd61a3f
SHA5129f88014f6a956418ed12d4b026805cfb6fd214a4aac7ca3f859eb9b07ea35cd95f1350d12935d3967c2706205885e5151e1f3272cfd0add6e341a8c2a3e0fc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a41db81c90b415c3cec85273e13c5e
SHA1f64e4d4d2a1df9dd416e9cbf12c13d9e58284e13
SHA256ba2ab6d2958f4d0e7d92e0b8bea3e0b3658907db1134d2279fb40fbaaf132e4b
SHA51282642249033c4aaf4519db0f767218fe48b90667c10252b836790e5f0f13a7902011c8552e18d3cc59eba26b7fd78af85461a9639f3790be12aae52feb9e6947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915d747043bb171eb0411ce754f3e09e
SHA1f74f1d3001fb0bf45fbf0ea1359a2d3c4cf49031
SHA2563d4f913b3f1c754dee76aa35f8775bce2ef722b9506210c68aa89e88726f89cd
SHA51203888160e04facee5c4f0ba4e9d48a4ad6cbf2939f5d7505afca13f3f02abc5d1eb710a39139534e1bc754e273b605e3a6b9bd6a1acff5a646824c0720482ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec5db6b78673c73ffcc2f323d34cfbe
SHA1be207168395aafb773a4aca6157cb329e20ad24f
SHA256c7786958029a2febc001bf727b509b967b7b41683e97bca5fbb207e14d32802d
SHA512bafdf5f64d15f36bd44253845be41462948adff26e4b982a6b1f63b858c275ea596a7cef798c76a5fe75c7c55bad83a399d271e21dd9173bc3591a2c5b294de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d8719d7d09b3ca21979eb2fafa3561
SHA1bb1e855ec370d326f046312e72755ba5643d381a
SHA256ee5b02e138d1010e4ef6b3bedeede9117c7c561baafc7d6aa553c2ec444655fc
SHA512b3827e6e8679c95fa801a6d545050328f1b295714ab7c5aeb2cc2e8647c0a8121c14564d3e5a2588f5c0fd5c0b8dc65e7df357b811e5e2fda27a5ddc8f148bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e6e98a6e1ba285fb34a74f726ed61e
SHA17fe4ad052e892ab109c8bb71a5e6dbb598c79147
SHA256e8ed2bbd2f53f904a1bf14fdd3188db1251b1a9b64a72a3c9e20b721a258336c
SHA5126d130d8cb9b3fe80b72f5f7795a115a34cd9824082cf544144b9da66e48cc2a232bfc3867cce8e72d02e7eb412284215b9c78469667dbae603155133bab6f017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd636d4b0648eb2f8d20480631613966
SHA1c2c01b234dddfcc1469700abc03a24bde5a10ae8
SHA2561078b1e18510014372c41ab8fe98d273d23760a80d70dca72be6eee711a08e6b
SHA5127484ff499169932772f4557f7ab5194d1f2b781de7d38a5781e0a8d14a564806174829391ae1c7abcf17ad758576ac8d6883fddf6862d67160ab043bee419f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9cf2c9659de30718d6989f78953ca7
SHA1be602145a79c56e30c90e160e4a11976828f6fb4
SHA2567ce8e327be0da8465696db13a08ee67a0aa0f6d931e8db797c0856bc6f29123a
SHA512f7bd5b67127366c30299529df0e8707520e61061cab4ea2ec44a0f6c80df3b7287bcae5e481e08d029de2a8fd33a90d2672ba3e91c71e438a51f563abfc7f408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9f38f3685b39815eea494e2bdcb516
SHA17c9ae93a2cadbefb11805d780fcc5a20f388a022
SHA25665ff529d27caaef19999f47363cbc3991bdd1d275486ce29a76844667f968b0c
SHA512a94e9b5b5874dd23fe5c1bf7d956886229df5aa9efc1d09c349700941d0bea63acbf43959b7c368dc861ca76622601955712970b677e1ce7527f1909d6639bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e168ddc178863aa1037d88c61e60a46d
SHA1186d6f2093d04e0dccbf0fcf3bb15bdcce9c09a5
SHA25654b227d2b33f3aca41d8b17a7a0f7c4638fe7aefa2bd4c9c065167bbc624f7b3
SHA5123d596efab2036ef56f4373b87897c45b11c9600bcc7718f296645bc278ab6f0a5380e8f022c443ebde450033354846a01e1b4f393fb59e53ab97cd5657235bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c87a794d72f48691121cde0fb34db1a8
SHA1b26d12f85716bf69ebe314d215cd59025a25a49f
SHA256994dc4dbf3c20de398bb94e58a7152ff9e50fb23dc5c2b55cb15c1f3d6473983
SHA512c4af9e74c4cf360beab974db1fa0075683c5b36cd00df75f7839189cd38d98f774c14e812591d7721f6c7c620a5168503d0aef2e0c4885ca8b2004359147bc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9fdee3900ae9c975fd6d061bcd31a4
SHA17b340c70c9c23827a16d3c4cea641c908437dd01
SHA2563f22c1ef478e3a9d62f4be10ea999859e114b892c347530360fdaf180544b24e
SHA512e161f2461b14df273eec9649bb7d9d9b440b96d28cdad838cca3a6d8f378763566711507c59a2bc516be8878c8ee072ae8192aa24846c65e5f66ad142f28dde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece7f4e4bd0972a1e25415d66d5541af
SHA1f053619c2f87ef1f929327996598599d28c3183d
SHA256125ca8ba62f9830c0170846dc471139bf03e727a18ca93785ce3a4723e943bd9
SHA512cf1fcddffeb95c3e4dbe9744f29efba8bf53bf453871753b06d3f2c19331d20b6f1ae136ecd6f327efea810539fea856cdaa82eade5b80915c5c31253838d33a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b