Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
d2bd9a39f1fc5dfadef75cb2e98e6b9b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2bd9a39f1fc5dfadef75cb2e98e6b9b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2bd9a39f1fc5dfadef75cb2e98e6b9b_JaffaCakes118.html
-
Size
3KB
-
MD5
d2bd9a39f1fc5dfadef75cb2e98e6b9b
-
SHA1
886f2468493a740a27d3db2c57f32f6a4a4a4d41
-
SHA256
c2961488f75ae3a9a73f451ad70c2e366c1bb343269035e4548115b75a17599e
-
SHA512
6c6f617538a28c049bf11d9d21224baf346b4a32fecf25639ae309a3b55ced6cee421a735d00b5355e19feefe1c127be00c16b644d2ecac631740afb4dc96ffa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D95F5A01-6D54-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008307c85107675fcc3d274400beb65b38649f1188b846d59fbe1009c6d2172358000000000e8000000002000020000000be97ab6d2fc1c472a0b61fd63c948930f176c18a5424cfa32e5c537b13ee6479200000009f94797178263a189cb1082e66cffaddd841be0443012fa57fc2c1125cf29da240000000d564fc357aa5d0bd14ea9777626efe906be0edd67b52dba49bcab92aedf276b2f231fb16a362f3f2ba95ef527eda0994a152db9d162d681574a9bfca99fa1f6e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d6fbad6101db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000233d28861fbedda817ac640acb61bfd9dc80dda69175a57c4c025d2c1656cac6000000000e8000000002000020000000da2ae339704589a56b37b6e947bd1544cbc5276950d5df7fb7f027ced8e699ea90000000309f9b195fc0cd7df0bc71d4d13cfdf6e1aaaf7ae701fbdd07a2b55a37332e38df4e94f71569ed243ebbae2589a67377911bcb2ec994f170210243cb98d19cde5fb43363057dcd22dd80b00e52413958dc1652266e513cae21ee50072f0cf39f18d0aaacef7d6a7e2c086e9c9656293263d2149f67f1b9ce1c04fc8c41f5bbc6ead26119c8abc870f743a96552e52d2b40000000e453456a4ebcf2500d1344e253b7edf09c09633b0d977f1ef22ce4ad9eb4e83f9c867c6d56b23a9e0de69b43e62053980c6aac8b7c936223d82657e415d714ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431901534" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2008 1636 iexplore.exe 28 PID 1636 wrote to memory of 2008 1636 iexplore.exe 28 PID 1636 wrote to memory of 2008 1636 iexplore.exe 28 PID 1636 wrote to memory of 2008 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2bd9a39f1fc5dfadef75cb2e98e6b9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92c7398b23d9251696db8a5a2c283a8
SHA1deffc37ae228dc289cb244dd086e25697b80c61f
SHA2561dcb58e5dcda37a16802eff7daea600cacab4a6c302239cfb791324bad8ee517
SHA512c8f2890834b935aba866ae7b017ecffebc2e8f0f9d5940e74272e4c3ed995a9d823066e393012563bcc4bfc65b39717403b0d2cd93324e45113d5a05f17e5879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6c99d69e63381cd2cd4b38dec20904
SHA17ba228d06895531363584f2e2bfd1c929fa79a14
SHA25621d735b5d255d839412b18dc75ca1c66bcba457fe074a31e2493f10d2a41bd0d
SHA51278ddfa1b7945bcba2169ec2dcbf7537cdf7dbb60032ba09bd785004cfe6294ca054fd482cbbde21e9cc38d24c31f371eff150c8c94f3f8802bee02341e37ac48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59081edda35eb14d0f0225c38d47f5e04
SHA1fb22dafc41c3f777fc35a32ea45b8393157ae47c
SHA256438a7a31f0da487d365598877e41b3d3662f500a860c8b2c89c22335034d450d
SHA512fef9d329225a95c503f3e1d3daa78d9c454d04f474f6ed1c283b08c68620a12f5241ad4a91fd2574937d6ddbdebf3241e65b5953d3b45c500b1ef858a5f59612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c437da1a50e7bedbf3a645e237cced0
SHA1676bf831f3e2163ddef6ba5c2b348f5baf2f195e
SHA25687ecd6af26242ac3d15808bf12ffb1337f99b01b503db5e9975ace7425b4c2de
SHA51218e56143e00d55484299876414cc302e4fd4d297cf045a75048531a44a79264b17669a8a3b3da753f298d4863cf6819b37e5b72e02cdc130c99f7203c18ec93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d7234896a6aca231c4f32642955139
SHA153faa33ec5904565cc3c0df95d80509d8f8cec29
SHA2560ebf94286f95ed634eb0ac5466a28f448fd91a1d777ba06ff9e87cb7d23cd867
SHA512a6fe52503f75a53be94d88f7835c374c1d17fad5918486f3f5c214eb2ae50d86f52132896c38a229932e3384ddb5fc92f1165e56a0418888e1ea1cd5824c29e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ad0674e901c8e39441bb9848f00d2f
SHA10ab0f2d19bb9bc341eaeaa9bf61521aeac1d67c7
SHA2566cc2934b8969721f7827686c20314e5632d25efddbb6a9bfde802f9d38e862ed
SHA512161f1f246693699f56f0af63d3437bab9f9d62fba0015196f004b50136b06c0e7e57af01849fcde96d0b89916db9e5ef2bad9434150689b9a935774ad9a8ae43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c94d249bb84b2c82c1313cdf68ffb8b
SHA126573f5dde198e45d2ff510135f5ec8b2b29e2fa
SHA256ff27feda6db481759b4b4ff56ef3a82d023a31c038f5f5f007712368b7bca3cc
SHA5126f3cff9e0724dc9087b9750eea079463d5a84853c614ec531c989c5786cfad05a2eb04d21a459e4d6b45be9a79cc9f3d59d8b54883d1edebd9ce54925397bcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec932a946d0bd393f8e9ce129ce8bae
SHA14d4b5a1fbf85a0b210261fa8c63e3c60b6db2391
SHA25622ba9ad071a2ddc2a4a8af2310d11c5da146db15fe1c43e1291f6d1cf95f7e99
SHA512ba0e988e5b14603d9d3d59ec3997e58e7cab319823efdf212eafc879e5fae33a84446dec6b76da0e01ebe7df737f51cc9c1f0925996e5a896fd5584620cc919d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151c7de4e5bb001336f9c0b8c88fde78
SHA18078effb95bd7167a60be66e7e92fe69281f0c03
SHA256e74e522a3892995d755d685db9d07e2b79a0e1b757b6f105fb41c42fc2695033
SHA51269c593ac8d7f64d576f06aed9c4549d54926c9ffc47aa3685628fdec298b605c30050f42b8811574c8080b5922349555d307325f33d87322fa2d8d41a4474435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a4b8d811996a9533e4aaa6e3a67882
SHA1cac56502c60c7d6a40d6867c3b42bfed3558e177
SHA2562112ec16a84e7949f34f6d2199a2f5c7311908dde65304ed0b44704d85130743
SHA5122a19814623122f637b7c6e83fc6bb99b790d2d6254ea987ba8134eb891e588162208e4288aa95e02dd2c2f6738918bc7ef14cf38a810f31cfdf2ce614021982d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667dd9b043ecc517e693826d7c015790
SHA138574036b98ba48b5ea72b69af33a7493e1210c2
SHA25639d108e6c75759da6cb9f86b0927d05eedf593abe3855b5379d92d87da60789b
SHA51216c4ac55542c8a2336f86120c579bac1b785b47b679f308e7525589859bad12331d8f2d244d4b5966ce5252b9275649335fb1d63c5c8717b60df32c578a324c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af5e2f82967da6bf81e493ca74132f5
SHA16bfe6a69a5533f724805eb85bee94f5c3be5fbf2
SHA256fc9e7a94c6e8bf0ff38ce1cc6679c87f84043d39773c2a9b0b6100efc4dc5617
SHA5129f4757c611c2da7a8fc8b0888bfaa86945c4fcd094a0dfec0dc0fbbec10a020b6a482f923eedeed77dcf65cefdfe40cd3455c2220d1c8c6e4f52ead992549230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5e1d555cb0216322006cc47a5fb211
SHA19e16ff8030b66fa9b5e07513ece0ebe7400681ee
SHA2569ff0999954f962b8359fa0fb228fc73480a1ef3073ff416e439994a6d7302a4f
SHA5120adff04c667158879ea2cbb58182e32a0105369724394c31e5eb5f970562ecae8263131981ef0ac23610b164b6e96528c7a37a0e0a6d22b527ec52dd4c4d83d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5bbda9aea2cd8cfab535a20fc95216c
SHA1b78ea1a5392486a126210109e32d3a6716017a7b
SHA25600a1bbb4bf0f02dc68a1d95c1c504a425200f7b8c81403468315cb103de07da4
SHA512b0e2e2ab19bcc758f4551605c0e7e32eb51d04fd21253973344cf68a4e858a7744126f791a9805447d52977b3d4bfc500462f6231136ed8030ae2ea305c02b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c91768053b08fdd4370485ee1fc3ebb
SHA135c0530eb11e4862337527590f5d96643a7ba062
SHA256495c871c40cb17cd4cffd691addf496c253189948ca60d53d763f8023bff37ee
SHA51202c43ab42d3c49905e625893345491472435acbed08591af9b86c1cfe2c6a3a8a4f86683db51df9ba81d97c53d5da07091867582120883105d2f450c3eb15a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e122a1659ec18552117df0caf34f51eb
SHA1a47dabe18ac00aacc272f5a0f33c9438fbd42e5c
SHA256c0deaf95dfa6f0caf6911baa6b5b4a6dc2b8dc2e6c9a685fafe25cd5d1547055
SHA512d2e1d57bca9ccaab104b2ab8a7146db8d46d22716562da9139160eac5fab73b871198e830c10e55725bf6c20e889db883909d459e7fbf9dec599ee7977a70872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59783208164e84befac741057871652a6
SHA1397b6141b778e1a75fd3d3f2d4690e8e64f31935
SHA256e7344cbd646028c298301e557a8ab8839cdc37356ff223b62e5d3ed890bc323c
SHA5124159641412a90c69cbf59892e3d2347206a726f76e517cde5b03282aa749d1132e67229a8810766a1c6b27d06c630a5853ceb45e2cb856e808c975ddca8518b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520bf5dff3c04b3d76ce9c49c9192d39c
SHA1350cf17ba917aefb45c4b03a0dc03be068adc856
SHA2563657fa6a41c285163b5c9bc07716db2264ae5f2292972f031b67abc498dc40f6
SHA512bcf14fc1bdd5b7f1a267e61e0835413e7fbe4f985cf41801774e05df9dc5867bb0308669aaebed3914ff119b036478ee104d7251e213ecb9e2337bac35913dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beac411be88b55421519b6c76ea52829
SHA1ebf8fe9133520818112a71b8911a6de504ac3718
SHA2563eb7475dc053d344005d2b28e08663131f4258310f3f62be8ca12554dacb69aa
SHA512ae0fd4bec2e9646c2b9d817b82d4fc6a944db59d12f4d7f2e597ac08c00d15d10e31eb121fd7ff93a1153e6c7fa5c054c28eed8afd1ef32367b09ead87fa7220
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b