Analysis
-
max time kernel
99s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
ea959dd808f4b0003365d244325e8e29_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea959dd808f4b0003365d244325e8e29_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea959dd808f4b0003365d244325e8e29_JaffaCakes118.html
-
Size
37KB
-
MD5
ea959dd808f4b0003365d244325e8e29
-
SHA1
99173ee31e9bf2236ca54727939f0e329ed41aa6
-
SHA256
e0ffcfc3a4be17b95b2bba4f0f4f25982ac3be98d2b315a466cc1dc1e45dc643
-
SHA512
83f92243ebbec5f12736c78c2f06fff5d67f58a75ee2290fa00c3a5a0f4526b08ff3405bb357c441cd14f81e0222aa96a7d11f533df1f416e4dc8d509960b57f
-
SSDEEP
384:lJUlqUoItEJ1LG3eIKEFJ42ApTUIqtA04qE9itAs0r8pY:lykPItEPoFnFJrEFl0rE9k8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003a1c710ab0cecb9270c1bfaa6b63d37239a73902f35ea7adb0d556ada9002592000000000e8000000002000020000000ccec662d8b2edd772816725a88692c00a54ffe4edae623d482a83ae57187bc5690000000ac28df1ceff89ccffda6e222a6a89e952a4efc1144ab7911b7c44db1edf3600d8edb6151f6c400613d047ef264e97dd3ca2c615cb6eb1ff4700f31493dc362126d245438dca79cab6b0330f5403e450d83fcc4dffec407b862ee0def1f25cce13182afeaa38f6d113a98542f657c061cd4b68c629fcc88bd6fd33e2c6b3e8204e55e6f110eb02b5e22ce073cdda0a4af400000002a720c8f92e3cd7861e276ff42b784133621257c0aea45a86216f95083ef2ab592e6f35a5d5d844b6a97ea12500bf030ba575671792756ed7a1bfae4c0fc1332 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605356774c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D8AFEA1-763F-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000044a26712d45bc95c080c2dc594417e7269e99ff2e0d049633a0c81d87d1caf76000000000e800000000200002000000059d7599b984c3cd0901c8071f17de72e5a9c1282ec9e3c96b6f462ffb2a0cc632000000038c9a8af81901c0ce3ce723d9695b73e83e0dbe1b83c55a1e6bdffa2552d6eaf4000000073e7495c4044b90c34b24a5a7d264c723bcbdd5d44cf64c82a754cd82450a2804fa2747c33d15930ebec65194c187358bb88be9c05729c043f6e0674cca08aa2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1028 1568 iexplore.exe 29 PID 1568 wrote to memory of 1028 1568 iexplore.exe 29 PID 1568 wrote to memory of 1028 1568 iexplore.exe 29 PID 1568 wrote to memory of 1028 1568 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea959dd808f4b0003365d244325e8e29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77e04164d59149d708080add6dbe7d1
SHA1f058b3c790ec1612c8107425c8e6e109ca8ef61a
SHA256ca5e36331cbffdb147e0d8ba781d1cd9cdef81efe6b12adddffd08f1b6e5e57f
SHA5122dc85dee17f0cbbc88354eb638561c8d74d52f729110e7810f6a12bd578cd031228079c9855e375443631c4fe66423560bf86acb480800260e1826bc38abe686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e2a9d5f9c719070268c74df03f0c5a
SHA178b4388536d0d9c3dcfa22822d58f557be977aa0
SHA256b5b69794aee2ed5c72d9bd24433edbbf95d3fcf2acfd283486012556a653a147
SHA512335bea83a9d77b211935eea5f77981a63418a0a5e1aaa0d446f23eb94ab6a96647ca4baa02af8a6b385b50a402757d399daa801798261f64e0cb66d2d3700e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62cb60d449316d414d5f371facd6235
SHA10b25f0b53598fc08fd2a4c4ac774c672f819aceb
SHA256a2844227e64cfdb17bfbf76de7acdd907e1071b6df815c6702e5ee7bffefedf0
SHA51296f03d8dbfdc35d6aacc3420d7fd6e2ff137d916b7057ba65df3ca466aa3d42c9414e4150c2d55cc2a254e2205120eecac722eb5ee3a3a9961bb0e4e1c9b6ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ca926f895265793e4323a35a1f07ca
SHA129f0bb3cf9a89c38b21ef967a9a2a1f2694b8fd7
SHA256c5d1beff6ed7e1c0baa5ce2dbdf0b5df37aab14d5f22c7a8be872830bb30b489
SHA5127395a7dca22118ddf0f8b1330e8d7298c4fe483eaa3f9a02371f6c93476b346610c3811c6bc1cfb5ecdf61f05308ff99d7d1ca95c410906a19c70270b6675812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9e936d35aabb04cca11e9679294950
SHA141ced97e63505faaf306ce8d67e3a8a23f6566b4
SHA256a1d0916741d774c3ad40111f3219bf091acea521d72f14f73591db90e53b329e
SHA5123caa175c02122547b3a19dba6be436e43d91cce00236adb75e3277f3a67cd0c1e81057b267d850645e6167eaf4d048230241d8a3edaf7b8ca0cb209b4ad19f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6275f22ad46779d873dfa36c64a25c
SHA1dbbd9ad2c1c388215c50ffcdc9a3fb910c25957d
SHA256dab25b0b3dfa37609e99d784e0c23968f362cb7bfa5a5622ce105436de756735
SHA512c751362aaad24eb5fca98d17ace87ff1d53348de39772f2a7d96610c79cb84e296cc3948f466dda65cbae02a8c1be641d4b643cc435e55994a90a49072763323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6124f8d01eec6c9fc27fadb804481d8
SHA198ede522bbd9625ae8b9ceb18c37345baa76d3d2
SHA256b64e3be4792847ad701bbee8153f4c1a9c741150d97efceeefba67fa10424b42
SHA512e7a926b027754d68e59eab48dad49a2777ff7ac1afa8666531b41ec99e355432d343ae06134c79d65d083b5ecaf69f829ca335746b7f3fb14c47f7259c8d84f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee58e24ac3231fb2756a43b26f27b72
SHA11ab297f70d75bfce7edcfcef97ab834343e89ef6
SHA256f280e57b0bba235ecb486a255b45adb7293f1e71dc835709accf9c95deec364b
SHA512c503173cd66027da32c5450aa87b08333e3d6f878e5618f395932447bba615e827809d0ae357dc8e6459b80cd6ccefab9aef8d27e02303db48d0b16edc083ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855e738cd489230287364acd482f66e1
SHA1b8a38593dd56f4b5ac095e56161f693a3dc8ac1a
SHA256e92f7016806efeda7be06cf0f97740ef5535cfe08886cc2c970c843f860ee342
SHA512d07e0cf11bf4aa5f11ed5246756c4503f1ccc41a5e5bfa179727a334bb1baecd23eccedc2216dc794ba7206fcfcc7d95a72f8fbcfe77d33a4e63eb92ad971cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579686843644d67d35ebfddb27b9d2371
SHA15f8b694cc9a44a289d3a6b7d1840cea06749b0f1
SHA256d52dfac43b8fd574502e15cc2ea5710e0e865e12a16cff237525b832ac2afa77
SHA512b37b3b2cfbbc930e4d288095322ca02f2a6f0b3e55a84c82502a09b8f0fe9b38938f369137ea5c3ccb375dcd47f695697b1703b167cdf4431ff49ab298329f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5c542974034604f4635fa819cf17e7
SHA187931ba2b131c87191234e441700b8361e6c2918
SHA256654bec81407b568d8c7d29a3d3e4e2f9d1f29772fb6dd4dc4a0e7b5cbe86d91d
SHA5124ef9c9e9d792529a5e5df0d29053f8f4451cab291cc8bb99e5498f549f6532921464e435f58e5474b74122ee2a1b33d103e79e20fba671c3c3c8df8d4dba3a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670484c9bb33bb4bb47ec2b4642ea372
SHA151c8c80b8549a9bfeb264c05f12e4362b173b477
SHA256d8d2beee0679741e5c77499319a4d4c45aece9660e6cd3349085e12b83c6054b
SHA51242f6f27b311458d0c655d14d913097185df6a5a80253c61138216b2dac959457a854b02d62e944e6b9b50678da3be5d25e43e4c786d1eb8d3f1f146198662ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ba5bdea3b84bc2ba26fc653ae9ab9f
SHA1df4883a9f60a06c9c25d24ff355209b7759bb1eb
SHA256e6936d8484e17db4cc83579868c19780a5da8ec11e9c0525022115c6bd605efe
SHA512fe438de3b389adbe677d585603e9f22caf6ddcbdcc9904b15467771f90f39e2dd9ef7147a532989799a8e3537ead3e7ba5080a9c31711371abcf30dc9b8ae942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729d2d241e82505322065bbcf0a402e9
SHA1a0a2fa1dd3bf919a1df178bcb9c511a468237086
SHA2563a18939a70d193f00ef884d3777269e9f572604214b20d9b926b8c53ab699920
SHA51262a86e1779b5e7fee70ef1f28ca6272762f943c222b69a11bdc89707fcf81c8a1e32a49a38b6820d0c58abeb966c452bdbeb1ed934e64b25d1e40f717d825a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b329cc7e83e6b9e3eff87e0ad2e3600
SHA136800bca731abe087736969f3d3011dcb85e8a9f
SHA25676d56ae5c57127fd27ea580343ea930138b1578c481662fd2525a0cc49f84c4f
SHA512481e306abb1727c07f71d83b71d58bb6f40a37c3fcb4a43c622d80987cfa3a5b4d471c6d44bb26331d745ab5d823e691869a50410f30352ec1da81ef76dc1fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67062a2195ed8ad040bf0571ebf0e0f
SHA10737b263a984288c8e7345b45f8c374f1413f26e
SHA2563cd748852302c54af3c8ac34080700f9ccbc41f29282f108c94fa08ac44217df
SHA51277a1b8a42c917cc04be5191c941a955fd877e790d903ceaf3efcd399da04105a6efc148228f1f5deae6ff37d4027c951ef59d006ef7cc117c2e34ee124936c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfb39d59247e8aec4fc977c89adb1ca
SHA1798ce0ee5667196b5f4e797ce6ed0d44dd65ae09
SHA2569fc48022325b647f3620af238468f81b9327210dd444698debfc934da4dc061f
SHA5120ea4705041f6cd8633311d81de7a72c334ec7475b397ac8401314c518b26098b14078d38e3d217f5989b30b347ed1d7d1bd1dd253d4e3829ab9e393f855883a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52724660b4be26f94629697c833252b3d
SHA1d909c9aec045db22169563661803299de1c46e98
SHA256183495b7fc8d1b63b6397e7a1e8b71c99a93d1d30d5d8695016a85b5ceb715c3
SHA512313ef01e1d5a8e510fc39adb795af05287a44f7bc041af12a8f65be49b2f30b41707fad9837dd77baec2bc207c819c26ef080a2d727a76eda8066bae5df4ccbb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\style[2].css
Filesize2KB
MD5e507b0ac5a1de647356ffc5380a5bc8a
SHA183c30442682b8212d090c7ffa975e6619fe1e224
SHA2568658fc3744e22ad2967d6835fceac45b473bc22c9da5c9a410233e26533efa71
SHA512e0679d10b44b4ff24e232238ef63cb3615a0e73f66a419826d1db6e90cfcb8d7e0ca99b61382b714a2d8a2bbec20faa4388feb7c3cee05f61c2e3453ecf10201
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTZJPBOG\lato-light-webfont[1].eot
Filesize26KB
MD577c97cee47df73b6074383e9fc822eb1
SHA101e3797894037b09459349d21e99d9da8832ece5
SHA256fec7db69d0c92ffb4312daa595d4241673100dcef6e38687f4885da971504770
SHA512cdbed50a03f477bf56e0aa64a1fd1ad884b8c6f7b17333c55ae72b1fcc0ad851b2c4e2eef1921ea9b739c89996dbae78ff9ecd309670b5c66b323bef395e0d4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTZJPBOG\lato-regular-webfont[1].eot
Filesize27KB
MD500df88857ad38a8b3a9e24744203b69d
SHA1b6728718e34349a161c26e10c7152c4fad2ec0d6
SHA256f4ff54514ab3e903ab1e932af60028c4f773bca28fd2790da3f576a8de90f39a
SHA512e2fa1f0e58b0ee5f447914000afe791aad244297fe9638a982914e92d3490a337f25f1c3c968c7bf597c95c7ab71ffd4e0604ffc253a3e0dcf8eb3b6d9ab7cf6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b