Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html
-
Size
53KB
-
MD5
d381bb34ebc12fcd85e86e54bffc5cd8
-
SHA1
4889a723a9cd0e31af120324bbc95c6b30554979
-
SHA256
d8a25af986e4cf76f1f948cffdef515d6e84e48c194e65ad31ad1c982b1a2fe1
-
SHA512
1ce5d65ce1123c7891d1ee57eb395e261e624120ed2c17c301a7f623049168e86a54d1feacc00e6a3a1e9b0b4c33283bbdf09079a7b8e8be596a0cb241492ef1
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlY363Nj+q5VyvR0w2AzTICbbcog/t9M/dNwIUTDmDg:CkgUiIakTqGivi+PyU4runlY363Nj+qT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005420a23adae2f9d285c673fa8ad2b40ab9f9b61f2ef2326341ffe9ed05865583000000000e8000000002000020000000cf03737bbfa5c1305970fd39176888e70f6b1f77bf9fd5562bf3cf4b627ae6fa2000000084f795984c78b1eeb221ecbf0c5e2dbf8cbb1f93e26cac543f1a07193feaa32840000000294015b550f33d9b85071afbf6a99ca325a95d51ff2fb25aef8f8adad2c09412c77400ffb3b890b76b2316bf438a909eda1dea4653e1e9197f38509976e5336d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b79011a501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B8C7CB1-6D98-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431930475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c860a7ac4519f684ee0ad5b08aae0c55bb4f870fb951901c7db89344154fee0a000000000e8000000002000020000000eaad09b927153f31c9616a9e0b1e92ec4732396c2cc8032e793589a42df17a7b90000000510aa43c1fbb1b080f3126c985bebcc22e935fdaa0434894951c9b769db86c2b08c67976b903ddc868dd280354673e65e157067ae812335e7214afa0c57e5b1616c415556d138cc0110468082a209792c60216caeee5f81d0030114a08c3af6227a1aca6b34c0f7a22d6fc7fad1a2379c532d5c7daeca53d88372984b03fbdf66f87c24e03a8964641d0c523419d93ac400000000ac2f7c37f75f1b06b9c1c6d53894f8c16e94c16362c79c0ad8f3c1276b4909d8c16cf70a462b7b44d7101a15ca135d26e9fd2c483283a81de322cee0c8d27f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532aabdbdff0c5a67c8ec64cd4b59b378
SHA1147cdca2f7cb700f7568d9296f9900730e5219d4
SHA256446161b875af02a7711348ba64f196249e475c9cf117774b29338429aa155f56
SHA512a713b0fee11ce4822985634d2b43d8b6ae13242b57390107f0ca155ef90bf39bae936a3bc546ab67be75cfe2c9d80dcc0eba8f47ea1824fed3525a8a70bd14ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed34e63dccfc6488b8e51fd628cf0e06
SHA1e155a5a346c32a4a5d30ca713d029325f1fa49c6
SHA256d9991369c27e36c0571ad53caa2c558634290725d51552399cc3415b280ac35f
SHA512a3e9f9f7739c2dd81ebf41ef5464f94aa95cf7cfcef017cf2532cf7ffdd4e6e4b5ae9a7c8dcd47872e2fa62c77f950e004fbf468b5e1cd7e2099063d3c56757a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb42874348c90ca36aae44b9f3543d6
SHA167f4e968373170dde560a4f73fe5ad4e186713b3
SHA256f5a66318c1ab954b6655013fa4ee387610a43e41ad5cef5713b27057e6130ad8
SHA512c2b4e47b0ceca931d9d01d26d85e767b4af25f77d86056b7ddeeb4c754501528abc344205ff2251970e18f99f159f593f29bd3b3b265543ee741f1d4df656c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c768168f48fb61fd3eebcb4ad6d8005c
SHA1315e5c74b315220b88b484430114f6b5cd44cdb4
SHA256cda517fb43c1199377ed10f5035fa5ce60bdc48c65d154abb582f6b5390c41f1
SHA5122e080030a9c38aeba10f1419f910406521036f3acc5b056e7aa0ad8a680cc9494a1097e980762a11b3a21473bbf84ac1108d91875da201b0bf1e5f864a88b824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343051d77daa15df8f9c4a0c6ea10442
SHA1dda5fbbb21ba06982a68d3aab3286660aa92ef92
SHA25644053ede92f6ae02086b0241816d78e4e03cbff7f7aead7bb960b3a3b351b138
SHA512fca28b565708e8c085db9ecd614c675620d804a9cd171a6b106410807d1092a97db3be5c8a69dd4fc7973264b461b4db255b54bcc304f6f59dd1fda1d13d7a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b31f51e90e3f6208ae435bef0f28a82
SHA1a929dac2b2a7c67989cafac22a0e64379c07c060
SHA256e727dcf266e5d81a708b64e73b6a910b38fd0e45c51cdbbb1006d70af69faa7d
SHA51225bcff675f87ee4ca2b9db26b18865113c953d2e06f207951238e8027d0a9ed558d2ad46e1053484c2d80d2f6d5882799776dbeb932deab31936a7d5b30f5d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e420a67bd2d5468b9146638da4f692f
SHA1c6483cc87b1e3b140b186caf830f4200e413172a
SHA2563e2572ef64075cd6fadbc6fad777335dec474f26e89f46f96456fec1134221f7
SHA51210c347f81c3fb782e4e72f94a4c8ec03a5a25c63295f3dd0eb0e27305fb6c66a57c67f28f6024d240f957a87a345c30c3bd5cedc089f5c00d61bf1b2f141a19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59533e2681d0ff642ba811720e75b0b80
SHA1be96fe93ac98fbc4f51d3ae0fde374939caca02d
SHA25620e61fa45c349145c76a97aeba6fa06c8140338464671d5eb3e64cc2964277b1
SHA512bf7a873b949aac3125223619d808301e65b45546c535e8efd206efdf291b3dc291ecc5a1550da5f42cead49e74f244f4e7f75bbcaabeecdc8301a2245248b98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a3dbaa658442350e862ffa0fb17f42
SHA1636da5623d6fdf7ed06583cfcdf0b0eeb43e499d
SHA256c7f35804115f81d2746ce83d6ff83c1420770c7a1397d56ed2b06524f006c8da
SHA512969a04b27529f7dfdd818c27d684b0af229e219c906a050009eb207f3bcdc32343bf27e5b04d0f474cf87e7d3e6f44dbf974c01ad9c0768f317bc308c27db9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a507334ba0aad146eeae8464aa6ae07
SHA19872a36f287e836dd0e770701a4f8e44128f81ef
SHA256b9a50d4de12e6f90a63b5f58220433a25c085c63a19783d19df2f632bc9daded
SHA51286fa1421daacd57d893f5944d645451a1022807df14f5e7d8556345850ce5d7ea844873358039afbbf08d4e458e63de679e510117a65746b380413b79a053dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f8255f98645a45d54461ec4a3577cc
SHA13012cd0d27077be763df42d32f1e256b3b57026a
SHA256e975d544905222aaa8896a0805450ef3fdb5a24838f57df3a26a363eadb9e9aa
SHA512e88d354c605e4e330d9cf10ca9ab9704353c0ab3ef20182b8b15cb32eb769e931dcccd2d4b703d656e54eca0cc16001b421a4e696e5f71fd2bf2d8bf2b187236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93848b728037aa6827011bc448bab46
SHA14cf1ded0913bf226cc4ded19f496e52c4abe6c12
SHA256ed600ff4640ae140d19c1b30f69db33659987ff93816e1ea582aba6123a23267
SHA512958b1b8f0af689bc97e38a0cd766eafec5663a2553a94a55879d43bc660a405cfcc25283804b92c3886da94a2091a6f34904e5ba6101c3ef40a47ca17e51b602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51481fcac919b1100e31e154fee1002
SHA1615f7a0ce52df3ca3e3d02db018b61b88aaab5dc
SHA25614ae9618439363e2491f903a8c5fa530f2170d13f63b6e2b0134bb712e57d8fb
SHA512809af9852c7759df7109201b25064387d984322acee8d9117fc53cf995aa8b761b8141fe41edc743f21a8e119e06b4a69687e4ed3ec6f58bbe7f70b249221aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51646241f7e2c34008c739146c37d5c3e
SHA192494d9f569f865749d229cd8cf078fe6a9b5ed5
SHA256774a42b2eceab0f439e8abfaaeaa357c6c29901e04be9bceae7361b3013c145f
SHA5127754df1b0b84ca8a2f87b4d228b19f7187e92e4e2c6c14b072c9e37e92c9ad69e33bd9f0c26800d1ed5727d5aff21d48245b1082de14d0d7d85db517bbd3ec45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f45945b02ca1db20cfe1e62cc110f5
SHA109c8858550ab42fdcbf8d83a4f49970fcaad1695
SHA256cb9a69386b772992ee2f353f29ff3339f96ce3192405fe221c038eea6bd32280
SHA5121d0017153eaee62520bd797701f3a1fb401a676131d3ab2d6e765b092cfb62ca8fd23b9e0baeb2b92bd0ee061edb7e853e6ad333c946d90794dde381c8a4a718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb1a8c6e516304bc9b4e66b6de44ce3
SHA1e45c00594f09f554ecaa3399723d6e600ac8a03f
SHA25676b0ba7622fb73199413ea01838ce52a5f9e19e820ff9a10dd8b39da6911d266
SHA512ed712a63e25ed2b479b2a84b1a6e8360c77790d370b5227efee563db620c0df558e958d747462aba47e848ab89d5901e183878d265f32527abce53fab628e114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e37c6f6e147a1b4b9f575661e19febc
SHA1274f6d0f981ea84375a1fa3dcc953c62552f7b1f
SHA256faaee8ac9d83bba18d04aa1363e10842edcea322e3de8debfef8f9291d85c182
SHA5122eb404e3dc846dad384f3f17cd643bd9ff1cf0627095abab7b0a753126bd78021521cc68e3ff63634e38ad7d326c8357f8917b38a443bf70cfe74ed3d8b9434a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8f739033ae4f27d6b0786d4036843d
SHA1b4aae990b443b1cadd75224f2f1f7ddea880566e
SHA256bfd44101deb0543be01a8ec12e9c740edd11d829df19cdd5ff336aa4d775a9f8
SHA5126989512d74505aaf1f7b69b358f499762b344184105449f0d67aa98e4ac078ce2693080df9b80f4ee30b4ebc7e228f1f96e42c98d213c8d63fd66f627cd7986d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864dae5c1f50b55ae39aa0c006681104
SHA125f7d00e635e2e749a9c67d11084db4e070ef964
SHA256e630e0b4d13737fcbdb119dcd2fa8ebc81a2d2062eae9f0fb39aeb168f49c08b
SHA51227187e02110a1557567323b64b3cf73a7eb9170e38ed17586a57cac03024a50626f1315c909ef7602a4954d56ce4bf511a78df6eb96212cf6b52ae84ec5e5c46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\useroff[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b