Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
df4d4989dde5bece8cf7c6835618f77d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df4d4989dde5bece8cf7c6835618f77d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df4d4989dde5bece8cf7c6835618f77d_JaffaCakes118.html
-
Size
4KB
-
MD5
df4d4989dde5bece8cf7c6835618f77d
-
SHA1
271b8b8b3ce887afc785e840658ce4117b5ce956
-
SHA256
adb41a9685687d3a1b31dcdceddf9d65c4a51f21c075b0121038b8addbaaba51
-
SHA512
ff779f4661c1416659fa464ac8fd0f99b2660ac155b3b2ade741b8409e591ccb22afc70bd4a7fb545ffcc9f86f4fe67d5e7001657bf8de5ee39f049c30ebe397
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8olfY+d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432441647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000619f52c63c641b4a26dca9a991888aa6fc5189d7d9cc7a52ff462f70130ef1a7000000000e8000000002000020000000d329710d737cacee3f70d562198f46db84031bc67b33caf56c1131c14a92f1d6900000008984bf3c47bd62ff92ba0039a477b1015276781246c3514840139d245ac7e4aa512d568147cfaa9b4928ad34b63ea0c2ba1c7c258f306ee9f5b928df305e6234e908cfb9f77594e448e3966877f6cf29741cf78717ca61021fe53112bda8c6ab43fcaedc96a4d943876efd6dbd8b16cd86c5655c1cf9944cc8006d08a734372e4ca80fa93ac09e6d1183c097135e4f3640000000811aa3a51809b6f42e14006305b52e7f7221888db0f8ffdb0e12f02d0d2f77ff3ad3c1f713dd2dccc195e6808a9bd600a394c56b3571ef46a7e290ad981f79ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b57aa3b564649217df8369d5794528afee63d627399070925461f974859fc4f8000000000e8000000002000020000000fc9746e48fd04417c011d89ac19e74347e3774695edef754c3ca84ae7906c853200000006f324dc729229da0324a0799f00c3ffb54351c770cab97023ea84637eb0e130b40000000284cbec5acfdf3a032ad329001419b40cdb2c064254e1a586773fd39134e764f7fcd1fc0cf349f1e286f0e0c3d69abd582897621a5fe858f13ff9c17d85c7db0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c054783a4b06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65CAB911-723E-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2088 2272 iexplore.exe 30 PID 2272 wrote to memory of 2088 2272 iexplore.exe 30 PID 2272 wrote to memory of 2088 2272 iexplore.exe 30 PID 2272 wrote to memory of 2088 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df4d4989dde5bece8cf7c6835618f77d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61752b6d2d91e63616fba5fda30aedc
SHA1980f20675a793911f546e7384427ca895ea77ee1
SHA256b6804a20c236349bbd18a1e7da1465417b67a91c9033a0a5d59bec3c8caec835
SHA512057ce1cd307bf47b7062289ffbf421243c18c39872237922b921eaca30636884b6f99a632d0509cce9b0342d3594edf8c7158785d07c850a5a92e0d244fc0e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef7799f0bf01e288555905bde15a2d5
SHA1cb6b568ebf6d4b9cb205a7ac7c3cf34faa0f5f7a
SHA256e81eabe641ecbc70caf9970df58ef235ca289aa6ea9d861e7b0b7b656976e7e2
SHA512121d3136736f657a1887d2278fe11096324be27cdb4f07110bf90eb96ca4219f8f59ba57e9e3ec4f4e8fdaba043e662633de907f87fed2c6ef6bb5da478273a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b333e688d2777c666bc90cbf8fe229
SHA1111cbbb8ab4311435713ca0ec4d3346a8f4ef91a
SHA256ffece3197c3d84cc86b688be53785765fb193587c442e9b7fd337b6bdc6d3ec4
SHA512cacd8f34ceaa4dc95550236de62baf1d7d32aaaf352e3043db532b9e796cabef2c95533631988c4dded4dc52085daa163c4999622a56df370214c3f5dc9e1e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11051dc0a76f445927a7b4aae8f0097
SHA13fc74276c4cab68b3b77b3aef42fad17b253b3e3
SHA256aa23800c7a7ec1fa47ac9ad6ba676e216e65a209b86120a630fdaee7102c96ea
SHA512383e03498d5e7e973969543ffcba258b2c026312bdd7301946baf11e5e0c8282474243a956a0ea7f94986044e0d37fc9e87b34cefc99ce4dd1c29ff8783f2e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1bc4018f7c0ea3ae2d2bf848002f80
SHA1c084827c89edc90097278cac6eca6c91ac362519
SHA256330700ed0ff79b124103b741aaa252b4f6342cfaca147f85ff31132dad76ba45
SHA512cea95b886024cdd4d3079cc929f77cfb8c6b34660c05acabedf87c9a77f3a18cdc2e4120d6a29d03bbd30691d3e99a3c1f2c7ba45e8ab676e800f3e6b318773c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54589d507abd6cd402410899381e0e07a
SHA19c0c7e31ed14545ba7b38b1eea5ada271fb3bb74
SHA2560defa46c5532b51568ed039a17a36c37256595574d0bd94e733209b341de97d9
SHA512f11cf620a67ce1c915d812812fd6a77451e47166305f270ff42b7d66c2446f99aa01455faf1ebc47d5ca41829b9e5f8f15e1fedbe25afe735ad984248acd8e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1ee32ca7840b8b27eeab86aef7a7cd
SHA1c24a493a0c551327488b4316503dc7b653da0e5c
SHA256ad28e1c64503ecd8489ec58db5c223e76dc328a59a7725ac3567e1741843a296
SHA512c52905fb4df6ca924dd90dc79f662bab4c3491fbfee5715ce8e60cfa9928f7e3e96f97609ee8d88a4d48e34792e94068934aa302bba337380cc77b3051a0f4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc135d733302d6731745384ae3d0667f
SHA114f0398af4a9b674903c2c852a02337d1465d838
SHA256f12e3e364c7a0203de7255bda70f1f3af728da703cffd8c2961b6b9510252b22
SHA5122a1fd1bdb2567c11c28ad2aa5024b62ef4bdc51de2bfbb856be10edc00f83fde0b288c38aa324d2f248ac061598af5857194235368d6f351e7c929f2bfd3786d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cabb89c914964002d6bf31365e8a124
SHA18236de44e9c2bf2e156d81bae547169b571cc324
SHA25655514d2bf2e2dbd5b321ccd97eb6918a4d052cfe0e03d43a0a28d67e66c15217
SHA5129094df2f8d878ecfc8c0d450dd12705b07f5058adcfc1e69946b9529e9e29c963e4aa27cb32d76527f59a1b5480725ef86581761285c9d061952de67bd2ad8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb0f5ebb8d7af4dfa37c89084dca40b
SHA1d3a403df295e71f3612b158270f26241b8dac80f
SHA256352eea4326dce1b619e9e8827a6529b4504b8c7a3382a420949688d4e68edd53
SHA512282ea2c0fe76239f5d6b8afd93d2fa39b2f95e1bb1c90b32519a5e736c1af4569de21f25d22f42fd304f0b43f3654a9e876bc74b656f5d535f7bb897ca85d573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abd74cd0057b1ecf292bf4b24eba5c2
SHA1a2372dfe2a94236f95f6448e34e70127e2e321c2
SHA256c99f157bee34e08b4d3b014009669f278d6322120c143784d68102a9125944c5
SHA5123a9e083a3570fa0c08d2d84a1a5d1729711d751e2cabe12d325972fe86c0d033c59a3e3aed82f44cd807d6f81047162e3affc8356943dd804a679993066775ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea42a26acbfa33e19506bf437a033fc9
SHA1a4aa4d0adaa198b876c5c497d919c2c93d9d4f1d
SHA256298b1c948075ace1ea6d94d78d06e3944647c4e239ccceadec33f0ee1d805f67
SHA512475dc25aca4e77341428057ea312f69c9e1994575053a9e00e577b2c6ae9f0a63a7aa6b433b22c705e6fe85bc22403aa2057e1260d86c0387ad0331cd9e71f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e63643e01cf5cc9d3f8b1da7e69666e
SHA15df2fa747ecd9b31a8c56b75ccf75bdc1e583b4e
SHA25603982eea0d271dee0ac04b612dd94144d63d026b3e72b045d915bb488f0ea058
SHA5129b82d486544a4d492bf4cdd8f019bd760d1f38bd6cc77b13a56679ee16a2cfae0eef0acb57c81b7b5a8e3b069d724e771b60691e78bbac823503e1972f3adf23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57663e78560cf77060da4f0560a9faf07
SHA148c114dab3053669a19b62ca2c8c0afb1b1f8805
SHA2561f42996be499e71b7c0abb034765e15e8addb55d8f76a3c671aba848dc467739
SHA51260794674052b7d7ad373643bf2367c23746238cb9b1349dcd1a6809278460cc83f0e807e6d4731b98614d33f15f06113177ef8c59044355589d102b873d82109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90ddfec8b30b41bf43ed30e0e937ecc
SHA1c3381e44c1e9250a348a3d6a3b6d039c7c055280
SHA25689d335adb34c151ba63eeb974947b8f2a16ad9e5e07adecaf4177c4add59ba82
SHA512cea60c1fb71f32977512c1b99e565240274c88bfa01c2a87ad954a889ce179af482d645b107cb528cf51392542b18d99a5484405ed707734209f6cc5c71ce5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd389b9d5b76e24e5542c278270a47e
SHA144722bed0dd61b995daed0e9d8ced18bc8d1a976
SHA256e74e9486c1f649e5616286de56988caa9a24684788b7fca2e12182fd0006cc90
SHA512783b83ae66cabc01bcfa7f4487cc63ba28bf735d14b92517fb2930bc7db15907d4d01610791380d7c826e0161498bf00134dbc5f759b6485c14545f0c3642a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9fe221a6cbc49d6986225a27bdb0b4d
SHA1cc6596635fd1eb7de8d0a2eef00585627c817ae2
SHA25601fea9423a6b411509d2e070422035a01c10f484beb9168192688aab804233fd
SHA512a19589c911f75bb2aadf5dd5070f9d9989bdca4eddf1f05ae96cf6ba90f9d3ea36148cbd44adb99fa923fb86b5817bcb20c5afc60b9545db764a5d71ec52b9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54781c82e91bdfb340649ca1f65762a53
SHA15fbfa7d9829f5e3f3437520099e00c4a5235308b
SHA2568efa434c6e14fe8574448cb83d879f678b42e7404028c270875bf5a7ab7c185f
SHA5122268eb2e979270736efd2eca1c665263ca01de3247897dc378cecf6d236c497861222f613d5f1272b29dfa0fec0c51c4b889c1d072fda3469fb85f45eab45b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d65a0bb076bcee5cc58d1b2bcfa5f52
SHA12699ff5b04cc7056d67b301c1f7f023b1be290e1
SHA2567aee9f25c8b9b09421e11e56545eb1c0410466483c2721a1b0383e104d2f704c
SHA512cd0ec188b58753d29e7118ead1ff113c965316af32aa7aa2bd45979f821c3ec72cfb784ffbadc75be780e4ff319b4736e945db2ffafe3c78f8dfa1183181b798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51072eddcc962b43b1738985b235d1f40
SHA103cca7e496bc2d49c194cde83dcf8cbeb6dccd8e
SHA2567f852b8eca0c2973517e0044dafa94fe6735d96a7a05db18d6802bd0c39c1669
SHA512dc7bd6e489b07734bc97831a60b44b0af4986ed34e7b6a09eeac4bb6eb3beb88e2f67d672bc38cb77a37d47046449062a858749812e1ecea9f6add7ab8ed2e1d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b