Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
fbdb94b91cd2e00bd1dec84e61b1f679_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbdb94b91cd2e00bd1dec84e61b1f679_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbdb94b91cd2e00bd1dec84e61b1f679_JaffaCakes118.html
-
Size
194KB
-
MD5
fbdb94b91cd2e00bd1dec84e61b1f679
-
SHA1
43d24de9db13b8ae62a3221baa1460be729b2b96
-
SHA256
b0fde500706d36aa7f244df3e4ff42a014085efb4386720363556d28a3b320bc
-
SHA512
1e73248f591ef2c73ff887031db604cb269220e4ab9d065850492f52d6714eb8ad35d0c9809a58d6ef6ca6edf7cb3c9ba28a9db8f3138fc00fba87dc622e3ed1
-
SSDEEP
1536:vPAJGZkMdpckRZBZmD/Su8h+/QS19QaNGZMTcmz6RZQ4H+r1gD3pZ/3Oyzsy:Q4nHwbbS01gD3pZ/3Oyzj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0855e977d11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433672663" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{947C6C31-7D70-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d156797d0b403eb085fd869060c7b2249601a6b1f1256bbe1ce7c7ed9a86d1dd000000000e8000000002000020000000e2a33d6d5e260ce6a02f1c65ccdd0dcb132a6354947f4214b825a383ea434dad20000000a1e0de2757b51cfa13e04b1ae3507d1095d48bdff48f43df85d270e8ff7b9d92400000000bbb70a1c28361359cccc73a808a94d5bcc021a2d04f0021fc5c6cd261f44e5ac699074a327bc1f1ec00179eb516c154cf8e566bc2bb48410cab285673f002ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000088ebe3f76fa3a04da24487b819714707028551d9444ec5f75b618f8fc692e7de000000000e80000000020000200000003b5be60a3d8660b7d117997204fa42aeea80aa38a282ca1f8bc11f8531e95a5890000000fab432cd33212c0b5792b0e60d5d7ed5d413453ad023583c2afdc8a8f3908ccdffcae32461eab95cf75466cf29ec9fe8402a9ca62dfb36881896b76b3cb6f4c5358ce8d8bb4078ca94fb60b22fd402c6d8fe793bec2b3e9daa21f0b5f4838f37d838e896e139778b6924b10c4b4673aad5b3050850ffcb8b0c540f7bdecb79dc4b3d5ed498548f95e3784e6a1653f44340000000555b07c9b998206048946666bc204f178f6c5d00cb1a7522ee819039e53c2ecf5fc500d32bcf0af74b3d2f4a759c05dedf6ace6baf82d0fc2ee01fdac98df134 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbdb94b91cd2e00bd1dec84e61b1f679_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560765851aba0fa55469ba8836b09a6a4
SHA15fc6cf8e6f6feb11d4ab8ea3e9d7ef0dc27b9cab
SHA256bc23e3bbb896e9b2cc2b5b8b6b1ff12fef9c32f9394eb303ea47d12449ee9538
SHA5125ef6de9378687bd90f9c7d33516ff4b033214ff5bd0c0120244fff9a95af6f0927045882d86f4613e5b132b2ba20558609c9231083872a59e0af256b7f67990f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae33a96143840cb97afca0514f3c1b76
SHA1c13e94801dbc12d055fddcbd95ca30eedcf77999
SHA2560f85085f4ea45a087bb1e48507465e63c5f97473d6db7f26caf235166dac3374
SHA512a6d86f984fb75cb700db7a07bbb420ec4146e200628daf3950e2ca543de7a43338d8231067b3eb03b83c0aaae0337582cede0ee69040d62ade568c5fe200b837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53021e22e2a7d91e512f8570f7d5ce74c
SHA1d410f25c583c198dd05b5db9771289e0e606e88a
SHA256c22554599da51a969fe421c0653104b5e8b03145c473d73aa84d592b9e3726c8
SHA512617c17f2dd57d773fdfa466abfe4be25d1e89721b2c302a3ab7255e3b65e80dfea30c3212a7d15224e0979720d98d67270c39c321103f93eba36027d57351aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56518e43c163959fc177499872268b6b3
SHA1f07ba1b9c4b6244c197384f5b037efcc97899412
SHA25659cc97c66a2f5593a740a1a15bb5709f4cca9b0c16f4652bce6859add9787c14
SHA512d0af884b7080cc06e556c7a0363916455f382a77010a5584d30a86a190f7f3cb2d0eed8a9395e3e0645c291da4b675470cb2753f0050234d1480156eb20fc086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ee2be3208a1d34da191e1d91b8a39e
SHA1f3de2bafa79504a6a12c5933d3565149e08a7456
SHA2568e5c3bd177bdaec327ca4ebc02f87c2d269ee47ace8b41bc4146c0c3e740d42e
SHA512b1efc0647c8973efbc3c5568d1dcfe63d69fbdef6f03320f105fd44a1373cb2c10bba5eb2d5a4577aa18a2c71df898dd524917b85915b4f2c6cca6f44286dca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceaf6513a633232d024f119b9bd8a072
SHA1e7f300bf18f4f06e765102cfd0af84346fc5d60e
SHA256f5faa258e863e5794041a3649006eee25e86c770d45f0dc3b8f9be72024cb6f7
SHA5123ee62ea15f63a1dd85f0be317f80be7657082c1ab3f3fbf09342c7cc651b351c40d76837535445385cf43af74d0d19fb8594d7e54ba9e4431be91374487074dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bd7547e0ecf09d817711de02155a88
SHA1e9c3962ce32bdeb4e097dd716fd691a0df4982c5
SHA2562aa011e11cc7da5a227f7ecfe232d09cfdb030697f7c179d64f2b72d84b18abc
SHA5127d7a0a02e09f903c4cbc75ef253292aa16c5c75db26f3c3ef863583064e07f34b62c64082f71d5bb746ad309d076a204d192332bf2f40382736ed2de344a0d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f90addf530e6d04955862b9ea18b321
SHA1dc3cc632ad47c609634d078ca0a5484a5a3c1d9a
SHA2566610ed24bf2ec5525a7be4cea3058240c7fb38993e3927dc59ee43c9e4c2aa65
SHA5126aa3909ead89821ae3b0ebf0c48cf02bba6b8af27b1e21befa2d69db9543ee3641f5a34a1d044ae58b99e29231450580988c7c5c555bc991688bfca188e31e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c08f23f0084d29f2deae28b7d942705
SHA1e85c1b108f3899234be168accc273d06ccf23cda
SHA2569e2b8f8261ca71f964213ecdbeec80ad90613d75fd2f9e6d0982b102f179df92
SHA5121e98a9804020e961f2d49b368c240d15260ce0fb560cd15181757e498ff00f20c87b77e87147a82c90ed789e453ec973edb7245a0fb009e98df6c0dd5a924261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361911900c3362964d66ee297f77b92f
SHA16b1b25a301ebc66a49f4e62ab9817612c4e96a0e
SHA256893d4b255fedf1c15cda8d24965661b09469df0af4d99952f05557cf9532bc4a
SHA512d85d649b9dea4b020376e7e9fadd2bcd1503fcf158bf954654d78a22a7dfb153fbc245391e60ceeac3e541daadf0492125b296127c73ecf3d9d627dc10be5525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e284e8e1bba16b0eb60b8d47cf4c554
SHA139bb42b0de3892340e6cf0118a7a5b974f77594e
SHA25676d4c90960b68e3c55cd01371fe5f6732f9e49abb5177ed492405c15264a62bc
SHA51266c6e6c0a60ff8d7d0c25beca744abd95498f403845a6b4d65dd38c06316f3beffb68096e62b5a6fa32bde60a295df8698b8d5af1320c4741cc6ba41cefbc450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1fdb562dac969d1a47f7e289875074
SHA12fd69cdbb00526499c311937d07f5cb2ae2fa8b6
SHA25606453bfa443e16596a3cab12b1b1fc834df392d5065322229ba3453981d92e28
SHA51207b86361845950c6aa580915397451ff68de16a94078f5253bd885c222feabad2301ce99f1c5adaaef831c5e75b984ffb25bd54e61718642b9f4262a90e76c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e5876d5dba970b61cd7ff0b6084a6d
SHA1b6d2ad8e727fd14e259bbf825b1b66e2c7fc01a8
SHA256dd0555f0bc203bf2de94e37d19fdf1eb2c3b2a3a0ca4965a9bd2c1f21b62c74f
SHA512452ab4928237042550775028314f92447402b6f99ef14da90e22b06806a0dd2466a5f14b99b197002148166f93165e520ddb270617caf349afe993cd3096cd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e714bb8438666ff3c801a7a9d1bf2b6
SHA1ae6fd399d2d11fa2b52940729f3197f5fda6398d
SHA256c7043f546fb29d8f20d26ae02eb2571b8cbb7d7bf93d066a75938d0605e2fa78
SHA51297ab25d24c796141b7bf73fecaec1ef55b8fe57b0a176bf274ad96b89bc44321bfebe88a197072c245ac04009192a4b3f0d022d09bc46b54fef0400bb75987c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4aee223f704c08ce70336c425ab26aa
SHA11afcf14afd36b24ab78253de373afcf6f4cb3ccf
SHA2569520f9aa1f8c978b7f49349fc6555a4833b619c9f1e89fd5e29d356802fc8d68
SHA51296e3424b723a95b90e3592dc18ea84238083cbfe4506246a10ed89fec6ba819831513d7054fa60c9428c31e04ee5eb34996ffa04acdc0e65590eed7faccce969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976db8efe0a4609b7801f3e25ec8e99f
SHA18465cf3bb4d3d9453d46a0e9a5e71b735f1a30f3
SHA25639a696eec9bd44541e31cdcf1e372a3aad3bb8a28f5d5337afe1f6250f935bde
SHA5125854ea4de3e4667207e2b32f8439da24ca3f6f9bfac957a798e5e44a807f4cb31feaab25b9220005dfc02dca5cccddf666cf5f4ffd5f601e942870e3fd315e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af345310d77b6f94bdd8c76c3427c9f9
SHA1da07cf66c8a62f394c4759597d23282297d6d999
SHA256071c469cd90e76592734e089ec6195a8323b450ba502fdc474353f2416cd3a37
SHA51289b11613e923c415bb98ee1a407e753bc4a87a43967e5867556328e3efa1787557add5acd596abce5341b6311120a629e25d7d525c428d4bc5191e8cbf16c405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705ddd293f147177e2294cb98a6e7ba2
SHA11042df011910fe33e7f693179d6b3fb5f23edd65
SHA256821d84b0ff78f1eaf55c59da114f7b47e7933e7f7fb0ea4a046f54852fb1f699
SHA5123b2e8cb1cdc72590cfb7abe3c475d7b59a39274a88355132aaa9db192b032924c3c590e4e2c57a07b74be365aa7d7a76d0147c453a50f91f97ca6559e1376b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b164d58037c445570fa0cb7c7b34c24
SHA1b824582441f60515fd1785b98db6c6066d186cb8
SHA2563d4e2380aace778174ed6f0c82c3a2e6ff6e1e2ae532be62aa282f2e725eb731
SHA512d3d65c841a28751404adccd2c440fce62e2027f49195218b006748e6f348be45c79c6d56fa302b00bd34e4bc2157e1d017097e7b9d27da374beff33a2ae7a3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32852c9fe6b941ca5690b0c1c32a460
SHA1a4903ddabe0bfd9f371de016abc9e75964e5ab72
SHA25606f3702a656633d835e88d1d60ca0fe82e5e29d66e64b0efeab1a4f5efc65ab9
SHA51271510dc5173ff8e463b795040e9a4d50a7294d4c0b5defcbadfce941519d21ecac095da787885750fd9a59f02fb4d570233f800ca8f52b16c97cd1acf9a5dc32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b