Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
fd7a73231b97058ee5c4deab537bbfd0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd7a73231b97058ee5c4deab537bbfd0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd7a73231b97058ee5c4deab537bbfd0_JaffaCakes118.html
-
Size
140KB
-
MD5
fd7a73231b97058ee5c4deab537bbfd0
-
SHA1
fd267dac59f9016c88bb271a4b66c177ce391465
-
SHA256
60c01122b7ea79b8499fc2b4c066f9832895ff0757d6bb4127de31644f666383
-
SHA512
f3d530561adda33c25e10104a95402bacbe310db4a4b12fd4ace415cb7d1c86075d22e6657e82db50db52b06739b931fdf1811ccec9ee3377a7d0cb6800671c8
-
SSDEEP
1536:kceX8MKG1ywT0l+A5IMDRqIqMcu/c5qqxFDyMBgtrQCmjI6sWXrYjhxDgNuNglAP:kcMKIwYhNuyq8sEgtA5dr2xkcNglpm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000cabe6291632851b36e00c0cab466f66a345bfca814527305fff1b267400e4137000000000e80000000020000200000005e51ad5024196b675ab9cca731f34ee7ba1ef203fa244adf44d18cc748f53e8b20000000b6233a43c04a8d6fd064b9f35f2104a67c3e8f44e1fcd4cc2ec6f2adfbce83d6400000002189b0f9b0876715f94dfe760a2e58b154ba90cb6e58d53a8cf705fc2807b548b6ee341ddf2cd6e4968ec38b745ea3cfb1229de876f07824e17f4a5cebab8325 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433732884" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000cea65d5f1ef496096811bab1c670f738c62b2aa6132f6e0b26b8030454998ba000000000e800000000200002000000088057364ff44209b9e08c13f06706e68e3cdcb93bc020e939b4d3b2048dd2240900000007aab6d16fe240b6ed12daebfd05aafff4969c4d05997b7f671e59ab9164798b69692a3769be6fe7f72b8bcc355e75fb43f0aef37883cf83c6057c71fe182fb66ddc4bb7c099ca8d5d850a1eb9e1a85a933272dc737edda11b4bbb4508f4d76242edb5e34602b92548a72d7f4c05c09d512ce5354b615b90b543bd05afb0264016adb05e27b367034c79167d20c982ddf400000008b9fbd94ef19a1e1b7f6ded18b55dc6bccebc1d200604264710821f491fa893597a2320c6833cdc11b4bf8cb164cc488be39107c653a0f78fdea2eeed1ca3ac9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB972E81-7DFC-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b121a00912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3008 1980 iexplore.exe 31 PID 1980 wrote to memory of 3008 1980 iexplore.exe 31 PID 1980 wrote to memory of 3008 1980 iexplore.exe 31 PID 1980 wrote to memory of 3008 1980 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd7a73231b97058ee5c4deab537bbfd0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df3a1a36774457e6c16eafdb7023ad1
SHA153d2d3b2a415dd8fba281f1460efaafb450b3736
SHA256cae6687144d01d765ec7cf3738edbba4909e88d047b8043c0d2b849de121c736
SHA5122a8cc2a16851a4187d8de5d1e6ef5d64ef056b818d1005329c9b9c9c77b6834f0630635770b458d21e616b15e373f42cb5bd99ce5eba6a2f903a6a112da56fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8f27ec265e420c475b7cfad6affaec
SHA19d6c2fd01e32ce4d0ceece83ed4485458cc00faf
SHA2568ae3738c6e8034ea428d652b391944e71f4817a060059622d80daeba15359689
SHA5128568f80e06f73bb770f26eb6d01f096485a718f30bfdaff1bee4817a8c770e3d4aa416d8ebce3c755818bcb9cc43bd6cb19e8d28fc850f7444debced9caaad3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd78ccb5ed44b0ed68ed6b4916714ee7
SHA15ca2134a0f779bc5a6845a7215f850ed01d3167e
SHA2560962d17ef4c0aceb005865afc8645cfc0e2f3ba38cd977598acda0b57a615edc
SHA512992a85d56950b95885ab86f25d13f9bebf8ddc6a02940b7bcf07f1f357f0529a05b3a7afafdf4b32c5c09b243db18ad113b1c0ba791ed4d2cd9c48b26d431069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f777001d198ac703849b11ba8fd70bc
SHA1e49ae7f228239ff31e618d4451ed5fde7a540dc9
SHA2568884eda4850563062c7d142286fa3acd9601ba2f567b56136db0710b1bdb3b98
SHA5121c9701211d02c07096a98ca0447c59b9d1094cb297c5f345317880d13c92312de34646fa8114cb4b550754532e1afc3a431d59ef31f0e9ad17654b48e99dc0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76cb8588d400ddb42ec9b08fc34d1ed
SHA152b123cb2b3a5976de6f57348338e06c5ddb904e
SHA25661dcfd275d951f8baa8560924324d4e22d81cda75926fb186b12c0f6794e0466
SHA512414541f79b4b1c20daa6be4bbe5a233bd0ff2a9545cc432dc5cd620f02d11098ec4c8b21c1f1fb45279b35e1711bfe3b2873931879095780d0babe9fbd5d83d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555879294a637cffb7bdac61a4e1a4be5
SHA1e16b0f0e3c5ff36bf756d5b80496280ea67d3725
SHA2565ab2d0b5b715bf9976ddd4638d2af5916262d4e486eb4913632ac83c7acd98cb
SHA51242b1fff209413d8318b7a82b3be6a08deb6bd70479c1e03c35709e29370b3ca0a3c84fed99929161cf6787f6f46ac16409dfadf99fdde5c956515bd63d900452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e75807df096cf65b5b6230cc98b4893
SHA164971c22b4d51136bce034fe1752b7c44c83932c
SHA25608a6ed56ebde765ec17ce92965f1b036cb79a924699114ff68320ef874e10c5e
SHA51206aa07356f97d62c1908c73eda15465dd7eda81c941e88b3d0cfeed4ae74fa8c9a28158e45948754997b6e706149a7a8efacc1755bdb25b01f9bea4bc6158ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aa4cd5a231875035e684a0f287dae4
SHA1f39aa58a9c78e61f76a1ea31f12d11591c64e5dd
SHA256a75c5bf259f80f8978146a62f7e5e645bf7b4a5a2d49d602fed9bbacf6082c03
SHA5126db9c45399d40188d5a7811706c222d9a78ced95d3c8817e38c2da7dac71de6073c5275ab463852598839fcb3d0a34d29a7a0dc49cc9292098a08b762055cf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053923da07e0dc97a69286544b10a792
SHA1e8ef356c4842ee329d95b7f956b689d1f0f778c1
SHA256131e8d1be141d81d05aa44fc7b3d16f9820b2f3f71c00486c6a91518d48fd837
SHA51222c1d7049937d88c3f1116098a480b3af784296a7d99f9448875cf29ca0b55136fc364b3bad25b2e908f6f9d221701590a343426a620038a2b2cf72a4cb74aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e891344efd527be6400b32f29a4079
SHA1bcc0ea44a59df850300f206048e176ca7532c380
SHA256e06fb771e41edb2988b9a4b475dde0f88c900486e82f7c9ea96862f0269f3005
SHA5123aa2cd610513e730cdd9fa60e25f3fa8fc6644f01b173b45361bfd2c61a5e9b3c865dd88ca10bd6e643f44e4f90ff52cd0a61a35aa6ae662cb5663db7500c8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a991b3f164c6957a0cf7e80bd4e3ac
SHA1dccb45de26898b30e2c6633743890659a8adf472
SHA25634e37eef4b4b5cf63062194693ec207fbd461154d0291f80a3e16313b1cbc407
SHA512cda273399e41bb403d39db6c4a96a1963cff466d3b8272f210c505d9c39fd937d8487e7800931b2cfac4e70769bd8f1f87f8bfdd9f2049becf8ac5fba3ae41cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c92acff0ff9252c2710bc6e7ef051a
SHA1456400f412fe6272f9026bcaa48b8c56bf1d89cd
SHA256d0cf353323bd6988955631e3e7f63c28aa1dca4990ac74b020a4c94833fb984e
SHA51286396683556a9581249fdcae7b70acd94904610a2dd1fa03409db9334005b97da7714e975c217983749a87907bee541280c47f59a8465b68eb3b7fc0c35d9886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abb8e88e85915a4a593c95f477adfd0
SHA1715196d21060a873106d0c2d00eeeee33607a8de
SHA2565b318c121d0d7262b687e7777b8cbc24729ed62bbd22735fc05167e0cb26a596
SHA512d523c18ab871a1b9603dc6163242da9221ec559e3a6f712f94b3c5611a604a089110d0c0d94163626d0c8fdc02f282edc295e3ea62af5a2e5c108508e5a34706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e845cd145e00d6864faa790a450997c
SHA1521f8d942e5dc9923857c86a476343bc07dab76d
SHA256b20305d75a32361f53d954fd9a934311701b92cf7143970fce2fb86ef7de0ba3
SHA5122f2220124865491aeb1c0f5c68927d871b3a7647144a4ccb4484dd0894bf5a164edafe72e2fc8d352c36efaeb95bbc1e2d0e40f9e26c8df3b48508829d3fd5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536911388d77c630f27fa34e5d9aa5bc8
SHA1e02d02a2bfd10e2a002d4dfad997ea3502877416
SHA256c03eb2318bd62ac8820eaaf40c389fa56fbea94c263a1ef99c3c18b5c295c7f0
SHA512d0a74cbb2c9422b33935806add94431c8a7d0330488d8eeb2219d010d3d3bf862c97859a99190711b04c4376c09c98779edacd9969c4dcb968b871795c825f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b4b644e09e713e18646dc843ff60c7
SHA18b9e31ca7b166153a701273f1132e4cd1bc57948
SHA256bf37465e41f3f22391d7aadb3739ac9451c24649a562c9c42d07b416b184e1c6
SHA512172fd2a6c3fb790e88a2defe5f776043d58e5a49ee3924dcb6e576a779a1dc135b7edf83f9c1466dcfc3dcd4b7620c6eb500f60670d56f40151bc61ba6b17215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17cec23cca46fa051b27ed79923f7de
SHA1cff05c05b79eedc357a44854bac9312c38a1fd5d
SHA256a28c8a27edf33c180ed0b3ac13779bc22fe079f39dbf579c43371b8b15bf5a2c
SHA51258b06d8ca96fd162f8cf92e53d3a8b038108651be73a8ecfb410c31f66001878da98c212d65701137635812c7513296f41c381f086e9cdd57d91b7f9fda46a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530cdc1f0024c5d955b9d546dae250b03
SHA135acee8baf089dd4c084e2504963ddb4a500bc01
SHA256caa2530557f5887a0357eca305df127977ff2d7d489daa128b615c39fa4c1686
SHA512d08e8f318ab3287e19999f701554d2644e68abc3eb91cc3b5bad16016e191e6c9adc37a5ccc5eacdc8032e7756de593051a65ea3b87ccc2e0920943225d98cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0dc691253c6a12d36689f4f7c39b2a
SHA16aee3ef8d2e1ca805efa152311eb3f85e0a5a4ec
SHA2564752b46301e937a1d9e4a03b34f09657332e4f316e68d7e0c53f37829badfff4
SHA512ec1f1b3205e1fad87e155e919a93fb4db968ca6ae0233a58a3f904d869c3fb843991a835e15b5261f893243ea6aa3eb8aee166b3bfe38f55dec07f517e1a6f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16bcc0a6878522356d4accad61f9f5c
SHA1f9349f51ed32d89f7b476323e74a69cde9b87739
SHA256d249eec3b0047a9632c80a480053391631b9be52029ea531160afd474edd42e9
SHA5122d41ac3ea3edb1bb5b698990c2b95b503efe1c06a278bb55409a4c134e09d66314eb85426b5bd9d8c30722a36812d074645062902e7a9e455f951cccafa8fa8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b