Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
dbd2d6f50196be833d021f6c17908ac7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbd2d6f50196be833d021f6c17908ac7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbd2d6f50196be833d021f6c17908ac7_JaffaCakes118.html
-
Size
38KB
-
MD5
dbd2d6f50196be833d021f6c17908ac7
-
SHA1
d691af7652dfbe1ee056582a9842f5ea9d66aeaf
-
SHA256
5e6e3f87523fd2c129a765094322ed02abf7abbe732b703a44f69ea782bcdeec
-
SHA512
9f416d96a50ce8c4993c1a9b64c790a7e2453086f34d5de67a2f52ef8a07436a2c3a169a0f5c1637c10fd340f7a11c6f4abe2d2a057a111a74934fcb66b68ae4
-
SSDEEP
768:quK4GlgzcoVf2uuFjrYArrTmdT5HlgeKI+642G8+k:jK4Gl+xf2umvPr6T5HluQ9+k
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000005b0f0a5f2cdc1ee878ee0a08c12e7a517b28c8feab009a3e6d7a4d7fe4da46e000000000e800000000200002000000067c82fe8ebe3f7c9435e0d8d774ca691097d219d1453a6bac73dc7bf1725a4aa20000000966e7da3e513d11126a391dfdd90271317f9c793e667d1f5a02ef4760ee14c44400000005097263d7319cae91b92788dac706de192f0d0c3b8934f1bd8085126a24a5c8c6d6c012eb7889c0a16a39d1a020f8b13ccd0576dc634c0f45877d1f41e993f66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1535921-70C0-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000c59d712fb8929f639d0eacfffcf9392ce7afd741c8788d7a5a89a8c76adb1f6f000000000e800000000200002000000036019d0da209c70938a9414c17fed65218f19e16849f26fb6861eff9602e5af1900000009d8e7600fee2c821101595da325f27f5c0e411179db848f65d92f2ee579d27581ce04e59ea152e3c095dc2b8c5a8bc38770cfb857b41743933e5dde9b57a87ded44c29f5dae10e3a710c335e48ddaa5b737296699fed9396a94029af0ac6f0269c208cf803a7c166276401b592cc02f1ee42b3438282cb6ba00ebd96536e3287824d545672590ae105dfdc4bf441a20e4000000094e9c22f65a137ba5780aee50be379350d86ebb5cda80eb9317d9187c1644de0ae81a6a27f627ae3994440572fb507bd507c484c55ad19dd700a41871201fc1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432277705" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0db1986cd04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2812 2672 iexplore.exe 30 PID 2672 wrote to memory of 2812 2672 iexplore.exe 30 PID 2672 wrote to memory of 2812 2672 iexplore.exe 30 PID 2672 wrote to memory of 2812 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbd2d6f50196be833d021f6c17908ac7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329b800cc565421526b3fab66e2a2354
SHA1a1b2aba96aad7eaed4cdcd5f6e931807bb508525
SHA256e9243e71e0fbaafdef60e684538aa18a697d161b349b01f7ec1f4dc19eaea9bd
SHA5123f5da09f9504f26198dd1c8c0a633160ce9919c0e8d4f3316b8f60daa0e28f0217d9855854477d02b65c5a690415e59ee16d1bd16ac38a1d70cc3722c8fddc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b1394c4127ae54df798f02175adb2f
SHA178ebe4a9d265dac1d3902fc3eb73da0a4f441492
SHA2564af9c65e228ddd6674d5a503f568ebf167bfedfe1bd112b18b4438a98072de94
SHA5121c014eb702081512aeb081f31d88ea57e7313dfdb99da8891aa2e8ef6d7f18847421ac0a323c410f6c285bfbfe335f2deaadef0cfb71f59dac79e7e85193155e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1a3bfff01c99dc81e220c1d4ff0a9c
SHA1af2d469152ea6b4831731d64d51a18f532b0aeea
SHA2567c4f5d9d6f94d34a7db7e280f9852fe556981f9d0015e3d00581aaf1d2627dbc
SHA5128a73be3b444bce757d38e983727deb6e48ca5e99846f9950b7d42c37302f3434f35e370094de5bcc96f18af2ffad71cf6d84b9565ce5f6b8ea228f925bbcd5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5229411293ab2947ae8aa1ab5e38cb0c8
SHA1d12235d91f04f673c8b293e1cda0ceaf0788c4a7
SHA256e5b7f48d3b4c94ba9488825b51c66daec892d2b0ec805a27899f2bc2ecbab605
SHA5124c3b67d4f8515fccbb76a1660010a56abb566314ad91386f31f8ab313a86836cfc3342871788c9148406c447d84a1960f337a054f30326241139421832805520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8c4dd5a7e7087be639c2d58953d937
SHA1d078a704d444843d5e4a16fa4711320d2ac90825
SHA256a1ede7a725f99bd90db6d1f8ffb6a2acf77f637b11eb4dacf65d4ed2e55c7aa4
SHA512828f2990d8ac80c0dddbe54c523a7a42291da6a6fccab76e0d728f85a772f2f9f8dd2d763c92f5ef7e9c6a2d1a3b354303bb853e1f1757ca0a4db994ba29b2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ef4da2f973935e480e5046621e8435
SHA1c9eb9664a1a62e72372c7b043ff0aa233ab2aaf6
SHA2563bd2477f6836bed8b53ba16c47e912e90c78d6267a65f1d00218c17e010396bf
SHA512ae7c5c13cb5b35cfa39e35ff457215d12a4e6c7046dde8ea19d3f6153ebc5baaa67fe88d4386646501d3f3b3ba22c9f10e279e44c2289a2db2fd2dbfa0b07304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54760b7bee6cac16c2c5c12bcef4bcd8a
SHA1d9c79d18e74ef62129dcacb19de15453063054b2
SHA2567907db52f81041a381b66b1cf10510ea8dd74a5cbb7c1a5e4797ddda0bfe6e8f
SHA512760ca5fbcf0acc92e86244393ef2758ae3b0b5f27455b566c816bff3052ca711c2eac66a33a7cb96515dd0a218df51e8250859b04c3ae79813f90da50312437f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b9ec2f1798f0985c1345f56b9a3ecd
SHA1e11c818eb5ee80e36f07a3510d8ad49fe0fe79bf
SHA256bed74174b6296e06ac61c169dcc959a628bc69891b9a89a1a08c45ea1100e573
SHA512acbf2b43421356c2de80be7d6a69ca4010c3c79d3e42af5d87f2455e56199242463a3aaab21358cd10982031aaac565b9b96370c239286f2efa98166735b7d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58536da64912a048922f03cea36d91d4e
SHA11bfaef234104b474c501054d86733c25831edadf
SHA256378fb52104301e341aa4b6426f3b9deb2cf2d1346aeb584adbbb2c4f17dc947e
SHA51262d705b82d01262a1948bb852edc130cd0da32a0235ca05c6c5ce4a2c8c9867ca995ec33ed3ac6b3b50444ade43c300264ae805a595fb601b29a06ebd20fa3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c579a2761cdf63c946b39f8577a5e0
SHA157b875d897083c51f2dc1600e20425dec8e40703
SHA25655e764192bef2ea3c47a60cef9e87488cb897e8d8baf1ecf42871ab5614f9ec7
SHA512d74a77852f2cc3325af2a406305dd4ba8442473fb56e610aff027722466a26ac9ffaa73ae3f96ccd10c088cf86dd6ea87179fa58eae9caa724d3562499c10197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85dc41277df6b8fc8b9ff82db84ce97
SHA18b6bf3b728c0d990d3e381ee51dc6f7d45ccd6ba
SHA2562a371d5fffc4c8468e9a0b2ff79b53a616d49f110010ffc83b8ffbc048bf9022
SHA5126fa457d5e928d77d45b12a5547087154f5849fb510eef06a507017957ce64e38270ab6d87fcc24145813c5f7eb50b407107f13d374d35a720b85a0bd538078a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cba81c5df2d517c795c3827ecc959ec
SHA15b1b70469c3e2fd68351594f48a55d11935136dc
SHA256e6d0c7f08bf86a792430a461193aedf2c9c9a823af1410302abbfc17b47e8bea
SHA51250893a49cb0c2aa5dc144ea1f7e082ab4414316e3f5d66adc9c56db13e01457f18b26a6c666e76fadb3b64791fd4730c65a192190d23e8b7a5823a1581e37850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8931411e9c7c066f3d2f2a474fe62f
SHA185071356b9dc8f193cf65b4924e2d5781328b308
SHA25653605a566d5b62bbffddb35ebdfe64bc86d89979ea8b29db667365dac51c2d7b
SHA512912107af78497f0fe3a4e4b7655ac1eef331535bc7ab0c59c954e33bae183814382cf77b2ffe18504d8d78f7529041283b2a92ea40905437074f3a83f41f7fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15d769b27800234114598af95a4c58a
SHA1c41b3cdb2b388f65345c14b4cd4625bdcb7cd48b
SHA256efa6fc653683143083b7ef35f0a63dcb075ab04b591283ac9cd435e9e9180aa4
SHA512309fe05f5eb1a2a2981f4df43cc9e94081a89994f2bd6b011be359b5e24fdd15fe7b1f01305f45c67bea8e6b0dccd013c8a877a312d864bec4a707048e8ed610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576522ec193181f7ad0d5663aa98c48ff
SHA1c9b2f6e970963165a7abb359b4e9bde630ceffc0
SHA256bc0685b790a393de5b7039e1315a7d374277a3b0083295e248c3a0c4341d6682
SHA5120084d8a0f646f34553c0a18b12c59090ab2b6ae4f28b35e317b35a8f2157d50718a359c5b9dc4dd72fcb687bd49f21275d518128b8a51316b2137546a3323434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586eeb928f6bb20cb12e38aa8632c3f33
SHA167ade1e98c511c2a3d9124a2bfa58440ddb77cd7
SHA256b9159c39e66a75a0be7c06c76388bf3ccc60c6449583ef749a8e46d46175902f
SHA5123901258ec7dfe776ea3af3e027480f750696acdd2649cb5815238709f77d342f09ae47ebe715f82b72a4ec4f6de51a35943ec14e5b3ffd1345945c8bb342efb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e626747883beb40f0fe3f60a981af9b0
SHA1dfc2890fa4889bcddd22ef6b6e02d1d2cee89ce1
SHA256e76ecd45e34682a640905a93670e07fc5b56436b1bc16823c74cb0a6484cf8d0
SHA512b5d40e68b048a94a2613b93dd45504b7874a419441cd0d76c4bfe819dbfebee1184e87101f8b51055b362023416516247b5ea1934e403067442d85c7db231719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064b290c4ccd6dc1817e2a21ab63b053
SHA149bba29f941aab8472154aa76fe0047ce3305fd6
SHA25689cd650ac99c225141325368b1e282835e937a4e2716b52ada7cf45812792d9d
SHA5127db0e50745f29a266f000b834a056f9cf8e33eec9693f7017c5c41d4f57bc46bafc4578bf80a4c7c7bade1210b57c582e49ea2c4d2ff4c19b9d4854554069fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b9d0d096cc54d5380e1395f8fcf4b2
SHA126d4e1d015aa04a2cb78ffc3eee918fae2c0b901
SHA25690b7ef8dacab42a94176873f80f06ebf166618bf89a56719454c9eaec3b83c9d
SHA512910c7cf2c05a33615fa1cbfc8b7cf4f1643073bcdd0ffc474269896a613e496fa93a743aac49c4bc729b23b43691ac5a0086171134e2437d9cd35815bc707b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2963fb9735106cd72650ee9df26bdf3
SHA17df88a092262fa93c90faf04a67f5dc0ecb50e7d
SHA256ec606d3b1349f6bf7b1a70228ce7daca1be08d6ac32f367ac4d444bbc305ba3e
SHA512e1e8ab94d98918bbef8111f6c511c50eca9a555482ece961f38c25260967aae1a74873460b243303ad82c2c86652279f3c22b104f5b351e4ff4b498d4d6802ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b