Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
ff78e1e53cbfb99f22c7a1eab589fc7c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff78e1e53cbfb99f22c7a1eab589fc7c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff78e1e53cbfb99f22c7a1eab589fc7c_JaffaCakes118.html
-
Size
25KB
-
MD5
ff78e1e53cbfb99f22c7a1eab589fc7c
-
SHA1
ab871f2e9863c57a7542d2f2432aee25072e696d
-
SHA256
afde92a03291fd2cd07a1842644628e1be5f3f37b31ce507433e495527371f1e
-
SHA512
ead5aa85a46e05c563b885dadf65231c120def5c3146cc224b7a1a2fa32aa0876021f2fe0698a331766c6e7a83ff82c2e7f94479e4ce43973218027629506817
-
SSDEEP
384:d1kQxoddNGv9TAfSti4ZKhjZORpWQ/YhE2numuAhg+pub2daK/BPxlWoyC:7o6Xs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433813542" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000026fe0e578a60bc1edb1a737e67d117abb81a906b4a94eb3347c072571483edf000000000e800000000200002000000087275190e42138fc2bb37c58271d57329e2de56327966894e02fb0b2390e955d90000000e133fc501781f9663910e15eb07c957e7458159331dbd6ab8ff2a6dad937b170106cffbaa8e654b81bae54ea0f8e9cdb8bff651fe76b5494e8da281bd9d980b393d0e6e2d16be910ee5ce878b5306e9a23705860ae632cf6be0070a708761b96a543b111b0b4d7e7122ae64a776d93df448ee05b8a0df4ef29222579fc8222813c4e33896ebc0b8cccf6f1d51e3c3b6f40000000dacf2f55ca7fee4ab64450eb7140639ed46c0feab0b291fb58a7b0da39b646f86202932d39544dc53ee175c495a84a5c5e1d0e036f83136c885ec36ee1a23576 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97855A61-7EB8-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505cb36dc512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005315ce1fc51f059fc44e55287126e472bf111d004fcc824a757cfd9411ff0ed3000000000e8000000002000020000000d90725776f17328fd5e88e10825f46c12046cf882075823865dd480284510acf200000009e350eafebd2c4477a8e00fd4a26d4e910a429d796668eebaaf166e6daaf38f540000000c91360be14ad4294e52f71f63c2283e40154fe37bfbd017a68393f14bc08b17cff7df822761e2529fb2b5b40484d410e9ab44aaedcd3822938a296eb56e425a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff78e1e53cbfb99f22c7a1eab589fc7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e212c49c20ca681bc45f4887d38d92c1
SHA1b85ec542e02e80129741ea9fd14756efdfba0f62
SHA2569fb0bad47f59e423a3d4e1b51006242d8bccb6dea131f03d0c1a20cc14f8be82
SHA51248fd6b8cefbcd1a8a32445cb14cdd2b856ace8a0f3283632e054f538ef493045a7d46b38e1c29295b6ab9cc02b293e600309f0b86eb3932f5853b862454f2c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78f40ffe94f22b6d7b0a439697feb49
SHA1b5a26a3d6ad55afb06b7fc7417bba769ed58d6c4
SHA256a796fd526db844c22a219b789453ce513e043cd2b508e50e1ba2dfc76997315a
SHA512631cfc6f0de49ffcb9c010b5d113a19e1f87ef6a90c9ac7cdc32a335bdcd8934942e45a9f18ee28bf3bcef8b1c9dae6f282ce1ca05381d1298b1190423896493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573cdc51c138f2a7ff970922c6ebfabf5
SHA1397667df95a83ec244ab2b5754a5f2024083fd93
SHA256ec4a6869e54d7fc590339a06bdac689ccd567a02c2c659698d2359aa7f416fae
SHA512b78c873ed9a1d86bb6511dc4cfdcaadba708c69a5472e4e065e2fd443e63254f17aef84689a5e5088dcafc79cd48a7024801ddb0694258b446d144660aac5fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea6e08e69d8606062af8a7b9ab501f0
SHA1a097d9d86fac50b0ae666db3263e3aedf67a2521
SHA25665d922db4c5ac820f53c9fd783a2415575cf9cf34ebfcf79dbb704d5ef387bfd
SHA5121cd3502b4f6a75e903f2dae9c945b28ea8805682219a549906256b7108faa49ceaf845175df9c2c25ba9a192a16a4ba329eaa4438826707708eda2a7308b7d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f7fbc15af7c0b98b7ed6a8e0c60a40
SHA166b01e4b0ae6a28eda3b310afca99f34f8aa9e81
SHA25652691ba5cdb3f031290090d28ff200b423cc5fcd4dbd3475c9f3982937397c54
SHA5123f03202650cdb60ae2ed162aaf15dc4ef33d078c7174b3b169bc086e75deae95e1c6cc2f234c834a2305b67a9b160eeab5ae70c90657c76301fab864ce3973dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53080cd1ed0a48ac8135b0186baa949eb
SHA17f71d89b2e1588912fa1971aa6c3b0605db9579c
SHA25684e0d1bad24c792c0e6f27097251f07890a1c59e0a6efe4c064097baa0f1a587
SHA512a5078427d7b47d910de30673f9cc190e187aaa9ae9caf43ad456ec19507e4faf0118f4596d620a9972cd4aedcbe0e17387a4350db16c81bb226786cafdc4ebe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b77ad8dedeaa1531890aa069524e03
SHA1ef9113d58b80f4d5cee5fde63c6aee496bffe9df
SHA256e157a1d195bbfcaa983f1bb0ba6edfcfc7beab2bb342195e81c400e44a9788a9
SHA51239e4d4932eaf28151c46619d86f5dd657c40dd0d56a2d0c4e8d3d9af2f9a12bed63181943c388f7e5bcb7d0e992e8b3cdb0f6263cc900f2952225950400081d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594289f3d03eaf4c08627eb784b54a887
SHA169157cf78dfb769b114d070610249640f8c5d8f6
SHA256d564898a4441d61874c7b31d0adc612badf3cf95857e2a1ed50cd68d70929483
SHA512c72a00513a202caab52ba20d2c6d7d9de72a7f2ec320518c4b321639c2f63e2111f8f2d19e71de76fb53b8cede53bf812aa62fe1a2caac5a184da8d488be1f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8ce1bfdf9cad58ac8882f396ede1c2
SHA1da14aea302d8422c309a45c698ce284406be2850
SHA25628be0bbdb0b9bed7f6ff0921e7ab8821a785ec9fb411024eab9fba0939c0bd67
SHA512f2570d1b08da405017d292f783bd700645b803ac1ee6254298b226d6a727e75e6a811dfd0f770ba9e9050c9775f3adccb4b2c2e31d7e77e6a225823766fc557f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca1cbd3d21ac61cfa045fcd595eb7fe
SHA1380c7ae2f492843ee322549e852a9a5ca1e55589
SHA25600019e5db426c5136e5d95365387a24ed5bbef5789f3801fbda0188e4df707bc
SHA5123724c6cb9699fdbe45a4fe40b27368a43a646fe914d7b671c249468ff797a5eda9fe825c9809835b41c24ef03672523652af7241c01afb0f6c050eac29edb095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f34d29d0f6c7400e50d31961aca65e
SHA16e1dc5676328281ac2039593c3f8660a2a2c9a97
SHA256b26ebd8a04d93cfaa1ab35749d770a8c149dba677bfc7c051e502531c8dcdb2c
SHA512491478dcd445e5e619742b2c6a4de7092c6d8d8d3fccc9461d80ce14243a899809e922f0c45731ee177b685497bb910d86ae84f7fb1dd3dc6f06d5d51911c429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc135af7117d8fab506cdd96b18729a2
SHA144376aa1ee0015f5fb4c666b102a732e1540cbba
SHA256b86c5390f4d34742235587a2ac64b065fba21f8d18baa65953d3c9792c57b23a
SHA5120db5e46a33a50a716fee2563bc2a5f218dbf401e7f73a4a060f455a51587a4485aefa88ee71f9e1a5e7b82062b537ea741d40b85a62f84f39b34ee53e3d83b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f58437c78dd1456505bdbe31604f4d7
SHA1674dc434af5dc677a1acec12db065a95972aa6ad
SHA25647db5d90bf5e13d7c970cafe367afb733e703e748453e53329f7dc362b70dfc9
SHA512d21966ce2b9dd2a47d6538c89c101b56debf8ed4cbcb5a8c9cf9535b354fed9d17c4fd0e0182d8f8b35fbb1ccce51369cfa0e4aa7c534ec1c544510f54efc146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c440aa2f8f6d7d432ff5e113f785d2cb
SHA15d265a1cd18f9b09e5015eb4da18c288f35fd727
SHA256c44bbd3ca1700f66057d927ed1a5c7748a1e292fcbde7746513fafc7c3411a2b
SHA512f34379e7124be3c54339e8827efa4b0c9e56728fdba534d7bce87a166dd0ad44908c01ce615b2ca8faeee647e24016ddaea5045454a45862430b06a72f2914a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b5665be0742bd12c106aba2ee7aa88
SHA12dc871041f9326738dfce98093f687c53195fb77
SHA256ff936912da9462ed91d429fb0581362782ac1c39ce94487490f54af55b8d8dfd
SHA512c18e70c676388f00fb096e17e311d90d6e9681627d0b2dccd8cbd794272d9a3e306e9fe54273c2c3e2cce2aa2d02dd1d7273935958b880f13eb1912ac3ee052e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6d87c89e25f7c026107b56efa5052a
SHA1dbfcc13282f8d286eb2a1e26197932cdc9ab4b35
SHA256d610dec6c95888964e58754254923ddab3a74bd0ec0b548b29e8ed2c3599ed39
SHA51288eb50a2c78d05d4db4bd8f4c2dec6761d0afd66cef711207873f76fbaf1abec57875f76df3426ffe0c427035ed0a75cbb31248ec621eba66719200095417ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d417cd66377c2e2b955a4e072554dd
SHA12f4b87514b21d3ecdcc0daaebbe39eac90e9176e
SHA256ec7a532bed5f836bb6294981e4ca96e8636730dcfea4bb727719ec7948eb3941
SHA51298561a45eb4d63d8d4fd018e2829aa4b03e9aa02c888439c5897ee66d8ffc08f360ba4166a314e5d65334d719a705c02887482cfa17d35c676eaced1c5569774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53226e1ce1a19f85ba4febcbc3f1714af
SHA1512fdea2766c6d4f379a8a3549960e955d95fb1c
SHA256d00acc5e2fd93967a56d746807d26648f92728627944517f2f8e6037513f4b92
SHA5126b233c28374b5dad8b538b95e6b08a6a82b004f0ce4f8d8cfacb1ed5dae0229579f61fa6d8f45a57f21b2ffe7f8729d3e728fb2053b998b36547e707b5b26c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970ebbfdd7597a6926828089fb385f04
SHA159526ecf3f2cf191c3a7c4eeebf7bfe72c568c7b
SHA2568444ea06d21a4c86765420c47f94f2e94f3eb4d00aaf3cc5da6b9e7733eca635
SHA512ca7b11ed5d64cbed165b00a5351cedaed30d6467add00b555686c2bc2572846e3387f13413df4a337c49210f5730d53799d269067d018253d0b3592a63e966af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45f82ade37624c47c48d2e7d0787c28
SHA100dd4de5c1de70ff0fc47f00a5de749c2eab6304
SHA256f3617472099f7bbe3f07acbe946ec2a7fd0336beda883b44df0737a831c967d7
SHA5124522c8ab23cd48490d8315afed48e1c90fefeecf2581e495fd6c2e073aca7758bf34a1ce5b6bd5cc6ce92d597434d541219e4bcbe96575a56d1e2c8afe5482b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b