Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
da770ab07aeca9bb0c8f159f4aec5790_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da770ab07aeca9bb0c8f159f4aec5790_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da770ab07aeca9bb0c8f159f4aec5790_JaffaCakes118.html
-
Size
23KB
-
MD5
da770ab07aeca9bb0c8f159f4aec5790
-
SHA1
469d308df3781799c0dcdb6590bb9d01caf71d48
-
SHA256
4463a0371c735a5bb1fafc495ff0318b0af5c465e75f26bf93b13948640c43c4
-
SHA512
9a42bb261d8e140aa1543c2bfee2b81985515ffd23f0064f4c90a70dddcbd22bd8bcd32dfa10cb5883f6f1b8ef6d0e82548de35ad542cbc11372ed5b6f7cdb0d
-
SSDEEP
384:QKHzzjm6/E080luZmD8BOBnjHL5csTEO/rq8bDrGcLrFUmsRv1jzEVdD86k6wU1C:QKHzzP/00luI8Bgn7LusTEO/rpbDrGcq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000959470aadc2fe1a867336f1c0987f97fa1f720e7afa5713381013c8b053b8892000000000e80000000020000200000006fbdcc699cf1ba0cdd9c32070e6b1edacd44573ed6c77bb8b0b320e619bb790720000000c9f3d2eff3a2a6868bf41193cdf0193871fed506e1ef7ef9e8f2dca552413a0c40000000be6db7466d602a6f3c625256e5e7b5ebddbc5eb941f9637441934b17bdd21dc768740b813ddabfd9fa3f5d23fc4b73be9591584ddb1ef385f12ad32d5b4c868b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54EA7CE1-7043-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103f902b5004db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000091fddb7fbd1ed89d01328126b43360e2e178ae9e45c4d8c8725811aee7b051be000000000e8000000002000020000000b4830c650850ee68319c53ed9ab5039e601803013a4e378d56e42e3642dcb0a3900000006803277173b004c521c63c1aeb1699c215aa6fae68da9d5d1e757fba80e2221261169d03ea2cd233bb764fe2d66952dedfc0b51e58bb4e5e54b0c7de7eafc97582b0529b8beaf2e0298ddb6fcc0421f7c4c921a35e09de45a34ff1f28a881b36466393494bb67d27685faddf15b21195650a33f1376f84af9daabe0437bb77ea4d8f530c4d9486b2dccae9d01ef4da7c400000004e1a2a4ffef11c88ae845f8e5d7efe144d55059099ca967b84052f59e101aa3b9897d5d6eecf3162fa2f370f675403f21024f6d44a7fcc91bcfdf0a9805836ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432223864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2368 2116 iexplore.exe 30 PID 2116 wrote to memory of 2368 2116 iexplore.exe 30 PID 2116 wrote to memory of 2368 2116 iexplore.exe 30 PID 2116 wrote to memory of 2368 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da770ab07aeca9bb0c8f159f4aec5790_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fc0b27b2664184995f0464b3586eb9
SHA13056b783745a0ea143f400d0b23bdb40315d0309
SHA2569c6c4acb0114c3907c2153b3e4afbe68712de6d7fc3003938fb02b2b6e56a783
SHA5120a2e479c5ebb8019f527711e3e7dff2d604e1d26fb22b951d3a47464f94107bacc04409cb012db8c2ccb4624c2b90f3ebafe8a50d282a283a5368e5b5a6c55ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364caa0c41c3e6278e18394b4c451ce1
SHA1f13c273630e3a736cf216ff40025ed92e99367de
SHA2567224cbb07d06ebe1cd49f53028fa9caa17793235bedfad4416e1f2671b8e0fed
SHA512e0e81e8f23d6739143d9db8d477fd258316834a5b7911a72c9a1681af62b617c9c3f3e135ea5eb194384861c9d3b703310e9a76a17f27ef1ac7b42018f155af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520a2a5353a4fbae545684ef85dffa7f
SHA10711156deb93957a8d9d124a53c681a82eaccf11
SHA25624d76535bb03b39ea52b7022cf9a4a6f2e65827e583af2caa68bd2750c6b841f
SHA51239a817c36b4ee5122c1d469e5803abaa3893bebf55f09654e1d32ae2a9b61dfba248bb32deb8688a21b0b67b8fb46d8782618e4806f4422bcee2a175d8bc33a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6e2b6aa16fb81389d99d1813803ad7
SHA126aa826b8954aff26ad47fdda287ad701bcf8857
SHA25674ddb087363a38b0cdb781ef4ce59b32a3c95de35d7c805b6a85431760f21024
SHA5120aaed3022edc0fb84f95db89891ab381ac22a0da793e5926526980c2bdd0ffac1ec637d7c67c7e4cbfc3cbb70f88d7bd8696a53a33b12b783fa57e6c3d38ab9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549ad49327e33c1b5b9dfe6de2002dca
SHA129e784651fc6ae141fc65b0acf58ea016b45a651
SHA256c052757c6d3e6b5402b8541fddfa533357ac31918e2a367ffb1690460a44ab80
SHA512467d2ed562f50d2690e8324ddb50c54bcf6dc8c168298198ce132a013f1e87b340c3e4a9c239a1e9ff275b29947e4f66e8fd2c73c6c95e3c92b4a18c362b0303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9ac23c73bd547e847f7003b2380cfe
SHA1af8112d2e93182f0e56a7b0f972e1357d000c57c
SHA256b1c6b47d39d80b128185337f3eedb1f19e58e520e348dfeaba13c7a70ad65d68
SHA512e0b5cb1c5850a074b4d8948648828e52168e6c72428d195965e3d00fded4cb66b705d31e6d7dd0151352d4f6aa2d17474387ed555a992623b9ebeabd77287b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8dd73719775d0f3209a36d8d6bf9b39
SHA12de3614db548571ce72539b029f1ba29621ac8db
SHA2567db5d901f0e8f7aa4085b7807e5b0714cc67e07c63b2640a59f53659c5a69b3c
SHA51251ef614dc3762293a9ed3c3964b2c5fd2ef6802c8c8b0e906b015b5a2eff420be7e672d91b4b0b7049f4770a75150d1ec39241def819b08055e45d38d76abb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598cac8779a4bd8504a908d0ae000f64c
SHA1f633f2ab67f0e903f6a63237384984f0415ddbc4
SHA25602691ecc782d47323c4dcd6d639c9ea15a2707030d422e8f38b592e650aff46b
SHA512689ccff2f5a4581f45dd5b14099c80cf4872b26be50175c16d644b92957d784f06dae57bab34cf281cabb39322bb1f50c28bb593bfe0af58d491df4141559434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca9124dd0ba3989eaf31b3ffd41fb8f
SHA1f17235ec04b56687722df54d82eae84e504250a7
SHA256c6cc81ceef61ca7bf3f3456597b7ad60101d544235b9cfbf4375a03468115093
SHA5122ec5e9859d64a1c1defa0d569db54eeb5ad4b9780118a3e61eb30fec52fb35d44f59510628849a1666f30d2f4355122328e446f2afba922acf558e3db6b4d441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f21b8b00caace9e2c244ff58bff064
SHA1853c70cfdf6d07088df0b6c424b91f83efc17856
SHA25650519c5276c6f507571fcee53504e01dd48b334bbe4d0cc3db6540a063a09f9a
SHA5128db13b4c4d24ab9358ee10230b74b969f84b536a33dbc0874d1f07e534cd3f1de9cdf447b8dc1de19d200fe86a1dc66333700bdf15651e6d7c9e032e3db5eb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550be6829a7ea535ec1167eb3eba80a8d
SHA1c535edefe963f965e0d6d6ae30a5b13d6cdc105d
SHA256433a91d6758e70a345c788a8d82b4a2e62a8d8126bf2b73cae6c821a223454a7
SHA512d326ae93758fa7baaa18084930bd9e31ae74c721c692f8c3cd71b52c4347c947dcfa50224aeefb74e2cabaffb6537a5745f9ac6e609954e1742be887d4598684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a79876ab7411f466055b8e75194fb70
SHA1555641a64b7de41079ecdd7e7d3cc8d07c59ffa2
SHA2561130e31790e99ba4a199a0a01a840b0d1865353672406c2f944187bb1cfee4db
SHA5120ff8cc28546edf7237790bd5e448dbdee8dce5c98fc25e879face394b6e15fbb23b0f37f925582a45d08cf4cc32b947242b9e62c7fbc17b1a1e641cb53522e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52678a6f69e3aeef8fb0f57d24b2f6400
SHA15c3433571d94d0b224aa2bf7eb73af825bc11567
SHA2561cdac5b8918fc94627c983fe5caa34da2290cdd78d6e2d5fc6448f2fbe6bdcce
SHA5123c2ca877216ee8e38b179f2db4f3d9cc519ad59ae41428c234035a1f83871ccf2c857a4f31c501d47d94f9636bf606c68d929b45f725faa99657ba8b1f670ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475b4fe762919ade84bffece9e01022b
SHA12589d47c2a987e719d987473e28b0fa9756ecf85
SHA25666e86838db47abefc79a356bf1b40db268b8f8a1fded3fdb9515c36a3dcae2ce
SHA51222fee8549ad9e418cb91ad79580348ba6f475fca96da366265fc7f42bd22252609389899614d009e0dae801ef4e7c4f105d9f8e460fd14473e12aff7a0a8975c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f85a3814385ee3fd00acc15e385214
SHA155725970d833ff360857435f501bb6a43f5dbc7a
SHA256166a646af805a520e2de46a2133dd502ba5c93684913f6fbea94bb1c96320b79
SHA512f25516b100c27a403965f6d77816ae96be0f1de0e26b04eb9d03f6603b32d2dcedd440120659fa923f500557ecc4174f6fde4ac6a4848959714cfb93161eb127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c97224045bd8bf65a0375ef42ad2088
SHA11d4349c66ac01ce15321d0072d11dc18e22cc0a4
SHA256941e9f73cfca37474e2f1659a3e236ba588e975a49b1a583b6b0b5ee523274e3
SHA512ff2d617b5384150cf86c3635be816d9d087e8f169fd9adcd6d6a03ded6ee3af5c3185162c7ada150da8c4a6137a19fa045c768cc3c5a1ced749050e398201417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7acddb00a6d1cb7ac4691e8ebce5dc3
SHA1bef564ba233d3d2c67a0ec1641d8ea134b485e75
SHA256744e53363f91972f7331ab01ff223f5623fc7dbddb3bc7bb5d8b5bdf68aeeffd
SHA51248b79e521ce48ab5b50066681007a68ef5d8103447496c98c079622c41f6d8f4ddbf15be0f217e9809ea150a480545d8545b5357c41d7fa45306b50b2a2b0e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51738608dfbdc38bff5c4e39e3a50595f
SHA165204c1140efc1dcb78682cdec0d30a5a62cf35a
SHA2568c3741e498a7ef12c0d1bcf20a278b9ae8cbefe58be495a5a2001902b94646ea
SHA512b5896de0fb92e3de46dc3568306108061141a4779c39d87b29f200ff3fe9ca53ebff03461d73af42813c1590a6b26d5bbd226d1fff80a97ca4e97b707c5624e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51424b7238fe97c026fa1ed75a7bbd8c4
SHA106695296541e184c0968447ba281f739943e9de6
SHA25615064996d0585815a926fddbb64bf3a50a2f0292e9d40376bee79ab598cd4e95
SHA5120b97121776ff990c3e82cce7d4e4910ef4240a43e8688c90094b335ceff1c7a74a1d9b2fcc359489dbfdb8ba8cd9303783bfd63aa639024c5d7e42af96a5735e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c33fb95f261858406b7f5564f46a068
SHA19313d6bd41ee4065a41edefc3857a5d7f91e7739
SHA2564e89d7ffb6786a598c0d6002be16f046fd92b1c06642d156873cd21c29ef1239
SHA512e44a2f50d61abfd2f93c5d77cd13ed5cad9e76cf5dd58b3683b758b605d16e76edab4c032e06ec53ec43cc9181cc65e75e352d7423995e0f2ba4fdef8ede2400
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b