Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
da18ff4c773725feaaad7fc8d9cefb75_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da18ff4c773725feaaad7fc8d9cefb75_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da18ff4c773725feaaad7fc8d9cefb75_JaffaCakes118.html
-
Size
28KB
-
MD5
da18ff4c773725feaaad7fc8d9cefb75
-
SHA1
ca2317378f6e995f302f6285b128f6b89590d166
-
SHA256
469f1e05f67225ed2d6e49fe3bf2f1e73ddac999da39415a4006aa5d10585c16
-
SHA512
423243b93d6032866a40649cc03136eeb41494e459e17e51a760085805dad6fe93fe0ec5b2f3c42685de22dd001b88088ea644af296c39cfebf88b05bdb0451a
-
SSDEEP
768:04EVHe9dSSWkEoy8LLoCQalzYTV/uCzEJYlNqkdUwU328au6mL0KxlOxY0RUf50M:04EVHe9dSSWkEoy8LLoCQalzYTV/uCza
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A3A1391-7024-11EF-A817-DAEE53C76889} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005e6123e35bbe0c10597e129c5f9548fc0099a888dcd62ad734ec002444bb5b91000000000e800000000200002000000015cfe86e86f96bad5ee44b95fb12ffd72dbe48e605c9e0696bee5980da7e3bf39000000015687f028e662bfdd879cf159b803e97da881cfe7b9b9a801a0387b87363d6de97d2d121e4d0328b522cb423b9f916275796b2764430a73f05c0faaecb4a36079d2fd2f269e4f6f0925ab3d47095bba0103fe7b9e43b305d7e0f6a400bb2985bb20ff4bf67ce4b8848b38353ba231c38943f503476145c214f25f0cf0a0354ce024c76e9697d17fac0f1cb9bc96cc5a6400000003b211fc195aa6cd7cdac2d9af2b0f1f99ed0ac5218fab34254c0f92381c3a84dae912495bad48ef215c25dfe9fcccb2df446378d3c50443bb8ef3155025e4e17 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000012e5d129da57275f17d0e76db4b11d6eec89bfc81e0454e4c25cc88fd0e22a7b000000000e800000000200002000000034f4068ad95d77c1556278c2227786b98122e5f3ed4fbbf8d8eedcd5f3c30d1b200000005820e264a87081e153d24408cd4fc8b88995e613c118dfb0aca82068de64f7984000000080be4c3f25e5afd73697c9f1202f44f2d8336c6666eb2abee69f8d42e4e6a6a06f88a1f39d9dc4535097b4bc108329cfa0213f3aa6f6bfd422696ef7d545489e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709be9ee3004db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432210451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2340 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da18ff4c773725feaaad7fc8d9cefb75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab94ffd7be4cf3e7474fbec067cc0d7a
SHA14b5b81a1371356f31bc08e545942d9ea03242196
SHA256461775541d930d4a4b30ca58afd36c70ea5a7232801a3e7a9bc4b790feeaa06b
SHA512fd7313f5ffebcd21ad4159ecab6e6e1e103689f89459f8da3e8e8e44e4ec79c06750f0e2e2bbbc494c1b4b3b288c62c1553da300299a70e49eeb25695c8c1917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf85a4843c982da15e1c3e936d8a9912
SHA15e74a294acf9a3f66ef91ce69e5c136fb32119c8
SHA2565cbd1b8a54c08ab6b5ebd0a25b7cdc6e20720811c77bf3efcb51d75839d2748d
SHA5125fa2bad5827ec2dcfe7e637ff03594725f17781a4aedaea1dd3f100684f309a25e2dc7d9f816fd5c58c6153d39efa081481e5dea14e0442b46161c6e4f05a5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b467a4c05441eb96c736418ca7c94578
SHA13cebd0261b5a0552939f9e1ccfa0669e751555a0
SHA25626d32856d7f68b340b0def3ef12dcbd9e671c7330c728a5adc3bcc0200ce05a2
SHA512263f4aa666911445ce58b9911ad7d1e72770f98ba911232fb259eb6f4f8de2754770c95052e87521de7a5714730b539b33dad0a7e8591a40e13a4862edb42191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50255db8feee7f4438c99751be076190b
SHA148ea672679826465d48189e0f8f7ab35e8847d54
SHA256e12e3159462a21cf9eb7e37849c9d16debfd194859bf6b2faa163e8e052d3e7a
SHA5121313662ea6d9746dd510fcf902f4fe7676d1add9b7d82a38518d71e6e245a05b51d54a2b4a2fe8d4ab4ed89644c3ceb36e66ab66173e096e5a244f56c2e04197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3e4dc9db8cfdb5119989fa21c382e7
SHA1ca853f1a63f184fccfb59ff9e69ef02c5207f48d
SHA2567d16dec61d28ef6c018c3a573984e12c2bc6b6a69e9355ca5e9ef8f38d8c3be2
SHA51235253c1e3375c7b6d7a382bddedda5d53f7c3f4f8d3663fe69d9b1767418f46439b78c0cfdc86ec3c5b3da8ab1d4b6a8c3b16ea9b45dd597802d7f3b3b0c325c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074e2cbaf99c22324723517494c1228b
SHA151023f4c3297281ccc45c1b0f8b8550ec20c5852
SHA256b8e6a0de80c861d07bf04989c085eb95f1d2db04d6f7e0b28b19d794a92d6705
SHA51286957b80e07d74dda4f58bb8af85b3b0041608d58dd8be578778f09b0d8e5550a29d74c66f2eed6b63718f40c3763b695273dedb88950e18d65b6fb091b672e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590814fe3f6897731547a774eefbc9296
SHA1af8b71cde335b2bbb5611d94b1ef297d6b13f8d2
SHA256ae921bb117d579de269b8ba5cc8ebb4c9dc561775266e7ff0e34ded1b8ea94bf
SHA512fe4c90f2e16b86a851eedffb10e32746513247759fc88ffb8418a5962a6d78b4ecb038ffecd4f2a201038f01067b0c18c5fe7ac8fe3c17481c6aa329f7bd0f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d295b78d0b40c06a4d7c37cfe723b39
SHA19485d8260c0f8c6d17805681a41b1be27dc8dc7e
SHA25605e1f936f4b7f09fd2fcc0fc304ed9abd363c056aa73d822a4cd43ae53ab2bf8
SHA512ff4dd55d58d1faf119d2d27b44e450e49c597f81c6bf3e4a7dc087f58f93f87f927498d89c0ff725f2f13cec1ee96abec6db7a01b1df1def251f1c8850d7012c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706ffc9d55bae69be9fb2a86ed5753b0
SHA18502b2932df9fe58b48d3cc021e36398c22f4920
SHA25619fe49659178de8bfd02909a030cde337de0d89b9ec1a2a8517e41d471d7b377
SHA512c2f4526a2f7eda6ad670e6faee13daac0fdf9f0366b23f2de0a5c9e5fcf48424e4fbe9de1c5e335f0b99381d20b64875f485af2a4bcc884db6f1d2579c8f49d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b62046e7e228c70065b93e8d2e3f28
SHA185d376720f60828b0de79e5c9598b1e5a8a8766a
SHA256b7ffdc096e9a839c6ee348b380c74c1e840a42ce7d2aa4ba7eade3f5342c125b
SHA5124de03726fd9aeca43a21a913002e90251557c2115fd3f0f1e97c1bdf7eb9e5befe96f678538ae007c1ca7e1a10124a9c92958f425eb3ac6f76842a72f450e607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b5ffa6ed26060ddc9806460393b980
SHA17a18217b5d89aa16037af5a5a821db0eaf00e73c
SHA25602f0e81f692407258520a25342351256db9e4ea5a1618e4b751df4f52e6a72cb
SHA5127f2631b11f6a91307fddfcc81efae1f87315ce3b11172d544ad470273191bd632f66bc6e227a871d5b89c91c540aa2d4503463fa04608088811d64efbbe6c5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007d98a3e432236449d16612b5b4dab2
SHA114eed925c933072c7355a599b687367141cbd7bd
SHA2569273738f12069d125d127419a857d892c18268c0e6abbb2270672f78774ba4b8
SHA512d6bcd570b9a0b1f4e3e884140efba81d912219706ef21c9e810770d06024b4fabc6441fad38ba5ba06e34b25ea8befb3f610feb3f5efab34b482d1d64f68a829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d8ea0c1feea2bcd94c9aef192a3678
SHA101d7e21e98f4c50561e04b6b13bda34f456949c2
SHA256048de3aa3438278eaa45a863f336b701c659a720bfa4ad2ef6a87525b8464fc5
SHA5121eaa5c4a5a3bdda5cdc185e69fd03874c886eb5104f4bccb4c8be936d609976f15d0e040dd5a551aeaeb94d8806ce30ea740307af7194154e38d31dc708dcdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd9199bcaa392b245276924409502db
SHA15088a25b776789a6f81aa662df85c29ff53c84a0
SHA256127760eb01e0dcb72000c28d07e155268c2980ecfd8547696d5020ec871efe63
SHA512dcee254db9892e69839922afe6651e019d5b1cbf4cdabaaae2c6509875a4a8bae325263c126ac92e02140c8640cd16c8fa17d62df5290dace8bb3b485eaf331c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358dca360b66506cd282d481f9de7583
SHA160cf773b8c7cbf3b7ff5d9880004b4efbe68d679
SHA256b66e5cdb94d6ae19551e82b3c4ea85c04746f36007eec139215ebd85016d6cea
SHA5129bc8d818c25ea801217e47cb0eca92df284e9e048d2bebeb5c4a7effa8e60ee3f86f049d63d238785035658d49f513834f28959333a6a8bc929f86c6910fc7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c75ad92547b05d45d3c9fe8c70c37d
SHA16bb1d32102ee9a560148312acdfbf6cba5cb7ca5
SHA25622ab21de31a2d2979520e815767611396c4a482b206508625c182f88d3ebdcc6
SHA5129c5dcfb5b06116c8a614dd7389609644ca2637532b783294366f5ff7f5fcb374f60de6064bb12045f6e3e473d8316c21f4a5508199e8d4ff0c0870e71dd2e242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536588ff063aec2867d32a061f0fea698
SHA174cbe8eb88df6100ae45955fa751fd322f81be23
SHA256a76b3c096dfa4066d528d895f9ef01d172d97f2f4e21f2b8c8b9f6abf3ee999a
SHA512060faa16f7b2337f086ba180bdfbe9f2213b2f6c88ab4e190d4795a56889af2f3fe0369b513039061dbc309f13d60946492d07c3543b9428e3114bcfa0d36d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5fdb6ab020ef27b0e85849d4c63ddc7
SHA13282629f8d775651bdb5fac5c138d285b5173ebe
SHA256a02a5f905901b15cbc714636145281c11c2f420ca1286f51d127f0a87e97f888
SHA512db969539b0b1762af5caced7909122917ba42602de4e8030d9cc3c70c195a6076373eb9d75cf80a2ac611a139e66a6d1d92378873f982af6ecf5c1fb29c5fbf7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b