Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
d70ed453a39675bcf4b6a6172c777bdf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d70ed453a39675bcf4b6a6172c777bdf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d70ed453a39675bcf4b6a6172c777bdf_JaffaCakes118.html
-
Size
29KB
-
MD5
d70ed453a39675bcf4b6a6172c777bdf
-
SHA1
2b3c556d5f8f83a823e360ea89bf3d432ef6e455
-
SHA256
cf8af72788539203e32958f4048f3a7654d5af44d451e34a5c3f25e636590727
-
SHA512
788a4f3d5093e72f2071ed7357193e8fc8a28e205c5d0cb13ebfab610553e6e3672137d1717be09d771f8285745e5e63d588c82f4d1d21a38eddb899dce792f0
-
SSDEEP
768:ALrl/RFnyuP2QCOKk7j/xwU+7FG7e1UCZ:8dRFnGQvj/xwU+7FG7e1DZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432076265" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003d9467d9e07a21c77d0105c1c3e3ed3b7c1bcee51b92d516d9436b3c2e53a5f1000000000e8000000002000020000000197e747a7302083e450db21259d2342488a10cd48f46f3252f9cfe6e6363a4dc9000000002e8c7e3bc1936ef0d65bafc5dd441855b9e70ad04643b2caaad672228006124ac42bab9c58ac3c929a69dc3e4c8370f32c62b5dc72c5657bc7d68e0a714b7bf90ccb8e3c6466a644d5c02bd5d8af72a951bf562c88957234265c5df43f394a18b6bedcdaf965a761462d7358ca931bf64fc461055b6e31fe3a322a39f273e7913aaedc4509a0194150504eef5c7d83840000000b34b37c7bf3d5307ca481d3fa79326943531e5d1963b3a7fd067daccddf11725ff1a187efe5bf598cf4cb31c37d1ae00757fa7c6740cc28c67fbfc5a34632ae2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e5778af802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005656bf7c5ecb63c0a2a85a6b8c8e17396cc34947bdf07ce6986828ffc6ce29a8000000000e800000000200002000000046041a5f10db8cb71fe588ffa34e4cd5b28bc39d63445d411d01360c69f3c22720000000df844086418ad443e01abca5c19f068aeddf008977ac64a45936bd31a1ae4125400000003d257530e2512a8137d1cb3d6ea5c0e31db6b2c17b4b4d44e9d8b2531e2a608e3acf97cbed746197e03fcc53df3c2335a7b467d9c57fd212fd68af9eb68b86e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3A17C71-6EEB-11EF-A045-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2060 3004 iexplore.exe 31 PID 3004 wrote to memory of 2060 3004 iexplore.exe 31 PID 3004 wrote to memory of 2060 3004 iexplore.exe 31 PID 3004 wrote to memory of 2060 3004 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d70ed453a39675bcf4b6a6172c777bdf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77aea7f1e0573dc35084afd44d86508
SHA18f92a6c55c6aff8512fb7b3ae326bedc29bf798b
SHA256b9ae894bc07fc1d4ed7f2df84e821d0081d47fe591b45af15145b231ff8d61c2
SHA512558a9dacc05697a65e9c5b107f66d700ded347d706177e51eeb2d7977c7205130349a06aa4906980883d42ec5dd1910645cd6a2083e7528ccc1ab6ac988603cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52416b59ece6d3e0ea8e0951650bafc9f
SHA16b5344856dcd3b7b63a5863352bef45f5761d113
SHA2563725102f98d250144ccaa3c1f67a19dd6999533c444bcebf6ccbfa75fd72616c
SHA51220269546aec194bfac4dce3cba325e6b6c6b60aa33bde8ae257e03ed54fd4f5c011134c31e73d23178e1c4ac3bde9f3eb7bd4a1f3641e7daa6ef920660ed733b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a8358ad9ace4516641b024834ef8c5
SHA14795f7bc1335c54653819ee3997d4f9c53e9a5b5
SHA256f122286e1b15c612749a13d50963729a0f2a732890dc6e5615bd56d613b6f1ba
SHA51230e516dc3cd1ff8a5ef94691d8c59a01b66baf9472a8ec89e6953d2f404488143bf2a8f77eae34b4a7b13aa667a3bfd9b519993161c525288f15d136a851cdfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b873f5790da61c6390bd2de1b93ccb
SHA1fcf5117fbafaeb811682b1554d7138473a23296a
SHA25616096c483c61a3c46c8e8121bccaf22f19bb7d07aeab4374f56f1555cd454b35
SHA512b12bd56ffd96f40145ee2d18e1d9865701dd563497dcc21ccbf9e51e602a4e04cbd9f116fcad03d9c69b1d9b8ccd62850a591280127843e3258f4e8f56bf5193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8ece99f1be6bd9a3948727314c5b83
SHA190c216d794c231b41b8d6d9664a0471df1a45fba
SHA256156266bbeee989c43120534cc122bf6e824a20d1890da9b3413853ccd3cd0215
SHA5124afc0fa9d6b9e15b14028437b82545f3b18aaa7d04c39705c66d6e35bbf5cdced5ec909a9d88cb89a40cc8656348ac9851e0e8fbcabec1c35653eb4ac00d266c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b05f44a1382203f9ad268384296c9c0
SHA1cb23d90cd31624cb0fd03ebf06ed19ff76b6467b
SHA256d115cf1102d724f08dbff4d88168807f10a5b3c3b1e63cbefa5b8aab1359b578
SHA51242d4eb2dbd6b3da0d1c17a76dc1eeaa76d43a62d25c3dee5a7d9f4503f5b00200a446286078f063e73dcc98516c4443867ccfdcaa0e14738c7c58daa88020ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c077a0c44d1331aaf01d89c40d996fa
SHA141f863f589f17b0ac36d2a4cdb0006d2e5b6ec39
SHA2565b51702b7a8b7d43463a127575bb13e07077e9af5e937671bfa3b0d7601f906e
SHA5121206e3b45ed7e2f1a411666fd090e38583ab038a18144112f89784fc2f7a559a04f589c3099409e7444212d5d9dd37460e1c45fb4614af322513843bc738bb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4eac3fcd67dcd1e75efb41e85bacf4
SHA14b78b19de73e660046a5062710b87f2b2ed52705
SHA256e805fb47afa1be98ef7fe2fb669d601d8d4b2d3f30e4eee7a90ca5dea1ae6fcd
SHA5126dfffdefffe699962ebb26982c791e301f1aee93fec177c54630bcf253c3b604ba2df5a8c521483af66cda398442401a8a0c0f87e627b16fd07185b0e4d230ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0749947a2c784efc985740db2228fa
SHA1eee3db69ae6648616a5a39c2f05cb5c3821ded64
SHA2566679876427ce63128d8973891d312c8c3b3bb7edcc0f19cc6549908f5b99b0fc
SHA512d89c9889a4854fd55c7ae9762a03807c988a23d39b5286ad0985e935cd3a35f295562d12ba02226b9f17f84b1484f4bb9ff595d2da4bd2c2baa2734875fcde7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc5a7f253fb591a63e726b9af9622b6
SHA172c0dbcb22c6fd175f1109969378bd73766dc0ab
SHA2566329c704a6acd95b573b4230b8c875ef3631fedda364f2b9d6a0322a9c2001bb
SHA512f2185943f5ed48024b49c48374f3bc00892e903c1ba3fef9f9087f6c5dc7a548b4eba5d89fcdec5a350417e50a4e5104064692d5a304a1e9a7cb1c183722089c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600b88804533482bb8965d2aa14b62ef
SHA1a730efc862b807e3324168e2dadd93229d75a08b
SHA2567f4962b4cd334c31b9660fbff8a42a3182c67ef9d3300136a4e3561a9a3d65f5
SHA512661378e29cd375349659b345f796994ff03d7b933132040736f9f5127393e4ac14358ef596ff0da34a74e5a61dae7d29443a8e8feaad8971e2666a9cc78db49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52852538c2b466b4ebcf202c7ab07859b
SHA112c46dc6cffaceb5160c0774f76d116f8de93931
SHA2569d910b4cf92f616116e36d3bd0d4232d2c2fb5ca3ba872da815bea4a5dc70f18
SHA5124dd7baffac7be16dd36ef822363cb8dc6db6cd74bd5590323673367d51cb727369534c965316a8422b3502b0ffbb890e309cd3b7e05e9b7bf1f883590ff66f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b01ee002886e86e0e601722c9dc479
SHA1773200744d91587bf2501be122883eb5e87932bf
SHA25674781718d45ced52271a509ab62c18aaec2ab52a70ddbafd32b5a4ed7ceed341
SHA5120c9f810ec870dc70417e2eb9e906bb5f79ce8ad8d093f5d4a05ca07a4d97f341dd008d9039c43d483b17a52d5acaa00aff3b0e0c2b8ef7881e3f130806989bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045b6bdf92dcbdfba57bb853d1110ecf
SHA11bec1397fd0203e2fc20041c5b05fe17a06eb363
SHA256d0f6d4854e707ce8274ca7d648e29d618a59433ba11871243534c5c24c082675
SHA5122ae4eefca7445876f25b0d0db8c04fd7531fe0612ed1ee58945a501a2edd1f1a95eb5dc9c18d84d1384f25223d2e6c7f5b57fd610e9e1e9e4c29834e1dee18fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae4e2b4c3d62922b9bbef22e997ba7d
SHA1b061f8e3d85c404f649be067e227eae647e3ac92
SHA256e1143cd5da05621ee6de5d9bb9b4be02a8705ad4759d5c479175aa9c3337342f
SHA5120b0cc32ddd1f1248188dca0f1600e6a663638fc26f6ba364f8b775af447be277ab0fa72c2497906dc1c47204b68be8aeffc9c4be035840980046d15e116f777b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb717efef542e7a11dbe17f4e4a6835
SHA1052fbf5f092c0d9c9f6ae443a0558eb2d8fe7972
SHA25672fd7f60db6ee6c2ad48099e278fbe2b3997a1c5fa3589111cd634f163cc06ec
SHA512c0da22aa7344df16e039335436023efa3a131ed0379a0cc5c4ce3732226f2e1062f4570da955d48ae88bbe6feb570f1d0bd6468b8be0911e0b00db32aa527f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fd7e204d82cd65e234f209d9ccd952
SHA1bb3e5ae7fe9c972e8d6d337486d3261f95bf530c
SHA2560743324827939ebdfab7a92fe345f32b4a71c0f714386f0ebadb5aff8da89f99
SHA512f25d9f2d9900519716fa76d1923785864308a798982bc9f4e70b7ab3ff476cd88aaaa086ca54734af7a24070bd3e48aa9ba92962775cfb30d42d82650d708f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48cfb8838c8655dbffecb0596007695
SHA197aa0f4412e4acd7ed63acbfb34173060d8c8e8b
SHA256aaa689d566d8eeaeda8e049931bfb4c1bea781ec1401cd87b18eea68b1991b05
SHA512388c344d8c35e03007fcee3a2db9ea9e14d1da3e46ce73325369aea8c39af2b81f48adac2fbfe666f29bd7c13c998d0e5396aef28c2fc71d88e8cb64d61606aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416c2e7541a4bbf27900ddc0c0b5f1c8
SHA1ad4874e3ce2cbc22564f43069fac646f7b3994dd
SHA256207f28cdeeb0f2c175a8a428ae645b455162b707fdfc2694bbf47dd61b7c3091
SHA5126d3bd380cb046c535aa0a2487c84b61a72c0309901d2ed89c46c0c317b536805e5579e5a33747805207e3e17f77d9e254294b2519554cc529e3170a1847962db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e38356dbb429ed835411939e71281dd
SHA10fa820e44e17dce49dbc3a64c04b42a0d9b1346f
SHA256dfe48bfbe6ee061538571389e2c21a2a18208ff525b35ffd121ba9921e86dc05
SHA512f98f2e326439c1380c6f451102d5999c1d4a4ca8cd2f9a2bfa77c32446078143bbfcd119040f322a8d47313ca2570391dbccc5a8c0bacdf3e29df45ef143eb2b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b