Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
fb429fc61f1f2208b094aa8e4e5f67cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb429fc61f1f2208b094aa8e4e5f67cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb429fc61f1f2208b094aa8e4e5f67cf_JaffaCakes118.html
-
Size
28KB
-
MD5
fb429fc61f1f2208b094aa8e4e5f67cf
-
SHA1
f96140acc66c634ce66a6cdd4ba340a1c3189d98
-
SHA256
7a3951ee7a9e341642e5c1242c7d0c196feb195d7883b98bcb293ea58b9f2e5f
-
SHA512
62109a6fd9f69a311d51bb495275553bfc37de56d76517c1cff5b8db244aff5e87ce94ed88fbc818ea6e010a6495589b6f52ec25b3234f2e0fb10086e31069b0
-
SSDEEP
768:KRlRSRARmRNRDRZR+RWR9R1gRMIeyRkuRAL9aRCgRkBR9QffeRyNRpoyRqgRtRjU:LIe/dpdHqfVyX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000bdca3e3d69bf285e94e5b875e6e85c85e2ea68145a3f23d5d3a9b1d19cc3f501000000000e800000000200002000000007720d7aaef8e8675a71b0416e11d0829af5b6f22b8a60624dfee834d1cb268120000000b07d6d7e263abbb98d8460d67566296fb6ffa18ed227186c69de6cc9def85b66400000002989e58186da158eee25299ddf4f35698074c7124cd340d95e01ffc8cd35160d337bc4457a13b1b9bb9c1d93442bb70e54880374826183ebfa82466034eb3bac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bcb8394711db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433649387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62EB9461-7D3A-11EF-AAC7-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e97f93bcb6dcbf7c5b249b5b00ba3d2e363080851aa20067b311557a9060880e000000000e80000000020000200000005d30e2bdfb4745fd6ffc95ba21b0427e0a026ed54e9d73319ec0875ecf3dbc5190000000feaddfa96b62d29984607288fe10f8dbcf538706f128ded8ab1f8ad885151b6de65eaad95dc4b35cd6253408890ecddd4d33e15cb60468a2945eb5cfcea67eaf2cf3d4f06aca9ca2b6848b2e56bc8c704828133e341a4d0f6b1c34f6628aa4689a7d114c1c8a9e4f7a58c4365f9ddbf1729324d60a3617ea614b8989e1b30db000f03bec018a0581873964c75a12a2c540000000e36436f8805f9e28391885998e96b4a88ad583b7915a028fff52f17cb10717f719ec0c67b1f3827c4bf43d08c887e896e4b684c2a260357b0ef780acdbbb8de9 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1496 1732 iexplore.exe 30 PID 1732 wrote to memory of 1496 1732 iexplore.exe 30 PID 1732 wrote to memory of 1496 1732 iexplore.exe 30 PID 1732 wrote to memory of 1496 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb429fc61f1f2208b094aa8e4e5f67cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218d1776d0189aee44b1bfbe775cc97e
SHA1fb94778aedecb8fb8b2d7e36304b2932e8fe0fc9
SHA25625a6e1d143a2fc01daf222100995bf9ea39d720eccc05a0456f9fdaf1b11b451
SHA5123267472e632ffb6c4315756aaf9c6961a7668013b52c1a606f8ae29988357d7e13a3d34de1998399f9774ea8e6d30950cb14b340625e9d665caf68d1e2da153e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d280e62d08228f73834cbc39a4057a
SHA14924dba27c6e8e31706ebba4d2363e73a8f3e869
SHA256885c9b79a1a21994318cabeecc54509b9be7b96dae8b432e8659b79b213c01ee
SHA51299edcfada725dc1e3d62d093681da01202da374589a17e22381e1e351ad67ef3cca01886ce1aec56ecaadb75e2ff169d5827815b90415e9c6196c709f6b808ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6c13aa9f24856017841378517abe91
SHA1f0ed1d1c3903b87331980767a41b3b881316f9a3
SHA256053fb1b3cf79a1965a2a1c25939f2f855d78f3de524daa167ff3f4b616accedc
SHA512ad11ff58155494060834e382d2b2cd095c38ef861aa2f0d808d02ee4242058d84282548d2cb81f42b3589e25c4a79e109f8ffe308f66e1d9e8e676f42b95360e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba92cfcc1bd3559ca6a7edd53ff5a83
SHA1c367de76e7333e5943466da5a924fcfc493a85b0
SHA25635b5bdac69e33e4a14943546d618c92d30e6bad14e16cb5f368d8b464863b176
SHA512d3caff6a7bc796a7570773936584fc894cdaa56b9bc32e2a882ca7fbca2e3a502a17529195c71b97e9516d860e32f94bf49f1c253227629661c9e712d6ad6fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bb9fdc2270047aba2064eb95132887
SHA109f3961f8faf3179082054e51467957a995d526b
SHA2567cc8b56cffc68c5dadadd18a32c4daaa80c58784bd49af4d6389e1a4e8abe8a5
SHA5121832fd34a6dff1dbee1ef0627aec0622743464a999c0b530e3037156e3e0ca8ee3459a0b01e1266f317ab69701734cf67c5cddb2e5de76c179f9601d9e73fc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97da798144844c51854ead5cce23bab
SHA1891b9c5f6783639c6f58e4587af3c8897765df7e
SHA2562085f392c01dc0b781179851b1e249e0c2a29b8bd999816bfc0b0460357d488b
SHA5122fc830a6236cd3f883a492b36b97eba65dd84bd35d6a8c90e17a9e3043b94728599f70ab694ae959270fafc811803d4d06d9b85aa20fc331873c0c425a2e45f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72c8b013d82487fb3c2ccbb636ba14a
SHA121b1d6061dc3e6669964a35b2970c959eacd42dc
SHA256d998ebe8710bfd3416439ada4b1d73a4e01608ba03e02d2201e91d2774f4d46a
SHA512ccbb7c0fa15aa17c01ca992192424e6103d0b8c3d4990ac021cd11982b25321fe1eb349e70dc0c8fa21676acc63a47439e0c40d81483b302250f2b289a350d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56974e5d41e66866eccf8a65e29f36d66
SHA169cff282f82b84a35abba45f191a8f4b171db0d2
SHA256e16e8964f94fb31c512a597661c0b61499fd0f37ebf853fb04919dc50f891de8
SHA51224e588783ee8d61f0e1dc5f68695851a58e88814d4a5657047bb79b33f22de4c91218e67916933f66f3be73cedfa067ca079ed4bcd48c9b0751cd2bdee6a15a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e4f2019e780fd936dba245abdacbfa
SHA1594ac587d4fab22aec6a82bac966400ee8908384
SHA2567a44c74bb5d251af18aa59b0574b72a5faa155d1c4bdb2bfb3e717a2d1bc1102
SHA5129bd4d1e8b96c6804210d64beb9efa6da9e4a0ef8045014fd76ba4f21ba2deac40a46121ed78a1eed7bb691f58bb0cdb53e43d3623249a515bcde77c51e814c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d133ba81e5a5edb4928281ce7829d2f1
SHA15c4d01b9f77380a1ed3afbb3e93439502e233154
SHA2565dea9d7fd53fe78c7944093782c07ccd687c7a5fd346e919d961d67fc1b91a44
SHA512b96fca1a4e471961d9e42598ec2572c06d668ce46306aaedd253366aa227e46afc0ff4a33da8a9f95a390c7d26352ce9378bf39709c2827df527a66d641201ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58003f12dceb3c8fc46ac4299699d2146
SHA1b208c006dddea925d4bcfe427e03b6ca800200b0
SHA256d530e862e7e504367e1a6b24ce80cb0d31d3e3c16282880587090ed53c50506a
SHA5120167c18b49fd2f4b75845ab74c44c4790eafd523b4c94d5cea4d4677933aa123401ee842ac6bbeadeb5f0ed20e46885e6d64256a74663a85ea9692d1295dcc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54896b31089f18b6656bf224e334ea899
SHA1a012b61858080f220bc39457b89509089933a1a2
SHA256051029a73a94b910afa48e79b6fd2ec60116c63b8e2771e366b501bf7f4b6c0a
SHA5129e61fe3a3acb4f41191b1b1785dde42b5335427a706bcc2aa4b8f7f99c0f1b0ff63d2816111253d3529547964f236567ab1180e7a1572f324578ddcba78e658b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7a81e7e3012d48c7271860072eb757
SHA15cc5fa82a900fef1e893f0ab9bff96b57c3eaf45
SHA256ca57b4150514e57ab345914bcd55f88ce2dbc548fab1a1ae6389df6557f8a706
SHA51214d9d9010bc51641b5496acf3978576f4125b459e73a4c37585fd498a9d40d7cd3e65811f34e4b3144dab248a8b91124d7c195c4d0bc985db555ce668ca0a577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772b37e5d5523ed52477cfef9a7bee7d
SHA187dbf49ad7add2ac008cc69500c29f016a27d0bd
SHA256f52bd17d04bbcf9b85901dc383fc2201f1d60e2ce0b766b1aa61c39134513992
SHA5128dea07e9a9ce043f2d4c091f6644bd02c4e28f1d2630fab3710a1a2f1d535fd9ac4b312455d793bb7a2b04f48a3aa471739da5c19c0a5b61f553de88b8358e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2a14458d3d37a8349dba7710bc8c9b
SHA129666f648b02bb240ef04b4182513b50d0d87059
SHA256d2b1a8ec96e73104a4a3f4098d9b4ad8ffff4862381f1bb2b38b9e1be1f6fb56
SHA51265bf19d6a6877ed67b094871d72c4dd2ad38600ca945bc40d47e9af694709aab5828342dcb5672e2ccf297bace8d5f784ea67083c5ed2d1ce87c992e0051d774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710d957ed4549fe1984a5e300ca5c1ce
SHA181d4ff0b82cb15b6853bccb00d75794c80d177e6
SHA2567f8837c33f63bef0833f9e467c6ce475f4fd98cc13f0e504bf071602cd1dd295
SHA512efa9fc384baeae83835a305e534428238f128a80f1fb4b5a830f57dae8701241065e00ff8896d723e3e379a507bc6ea1fe9456b5b0c14cd22b96fb5e7c718d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2c72072e550e660b8fb17aada2f025
SHA1c1e69b3e1fb2edd20e24891f2c831e95dfdfb139
SHA2564b56d0a46e810e6adfe6d446a4d27e9925f01b25e762748d5d40bf880837db41
SHA512d3f95a22ccb0973220a02ae6911f6c10fdbb31b4352ddac7d9c92b9caf56f4ac790bfdccef2199989452a7fdbb79479b79b28b30a8aa5557fc9b3efb7d8f4d8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\2254111616-postmessagerelay[1].js
Filesize10KB
MD5c264799bac4a96a4cd63eb09f0476a74
SHA1d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA25617dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA5126acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\cb=gapi[1].js
Filesize66KB
MD5aa012028297a26c039c37ab25a4bd17a
SHA125f23d01b5f580c00778e1c010225e5b8c73b66c
SHA25655cd2316edf7159b623e4ec2c9e3a334027c01e2d1cc386f833ebcd35ed87b38
SHA512d346eb082674fc26d562da9a12f36ad2cc7db1f1b35c891a8734284cf1bd052a967137c1281982070688b2bb2e06c7f4967d1c9397311a31a11a8560b9c45fd5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\rpc_shindig_random[1].js
Filesize14KB
MD5e691b2e17de9ec018eca758518bf5dc8
SHA13238d543acf53b803dfbd260405fa558717daaff
SHA256438d41bec769ff386a2c1555b6bf9105362f67dc3e711c81c6092ee7fbf6ad2e
SHA5125589a5cb408ee8e0fd473de24224ba8fa1453eba5df6e591570810f992160d4f3e8f60f8ba74d9994861759321f5bfe0c4a608636913a8407b5184008457afc8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b