Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
fdbd204dc4e36859eebed06b68d2f7a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdbd204dc4e36859eebed06b68d2f7a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdbd204dc4e36859eebed06b68d2f7a8_JaffaCakes118.html
-
Size
10KB
-
MD5
fdbd204dc4e36859eebed06b68d2f7a8
-
SHA1
5948b11832fa05be2646d6752ee3231b173b36ea
-
SHA256
01ab4b904bc39ced60802376f8c30be5328c90f57738f5acec0a82f7f427041f
-
SHA512
6d01ec9c1d5f84ac02ac982d9ee3b28bc5f93805a6ce752deaf72b746e4c4e6e0109c5a763a4961980e30d97c5a966e5b4741342c40c635b0b1a54e540c65ea2
-
SSDEEP
192:SoJRH6hdi59AUm5MGZCBMCM2tMmALS4QvSoJZar1OuDU/NIOE6s8Z:SoJRWi5gsBMUALSfvLJZarQeU/NIOE6z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433743530" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20dfe26b2212db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a02aca97f73a4d4ce40709130df8c40674d6657c4770d069b72c2fe7fe8a6d90000000000e8000000002000020000000a5e03bc684a947793a1e3032f0d57a9e71aadcf3977a610fef0ad95a31a23c98900000002d6ac010338024d7e5c37b4f4a10c35ce6b633f1d180eb634507a147e5a6d8b2910e035454770e38731462a0a8748000a4575a1b00555587fc7fc366a0e9d44c1f9f51a01ae627be92d71f8f067a683adda63d72d924c12e8e2359438b01e45b7806e3253a4a6e7d5fba99783fbf6945a29ec89c0d0bfb38d80f66e9ca1a64845fbe3d0f435bf8b5415c8bc5eb46375040000000d6b13239dcae36a8da5f895ce6f338f19bfb00beac5d19d4f6a2913462bdee3524bad8d1988bc76a2c837969bb8fbd7bf287ad18b9f778d2c3e49c32fd8e6c16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d3c494c6ca237cfa07af81079b6c87734df854d30e2044a7531e4455e6de3699000000000e80000000020000200000003275a4a1bcc1569ddf75dcd8126a3b91ab606166b830511fa998c7267a07ceb6200000007018eb5849669f067136068fd06e8484b11575325b7e69404f2e735fc8c483c340000000dd67c6a4d75142a38be5838713efb4d261daddc4fb582a47d2de9fe7601d531a7601654406ea7b00222991a4cb8441f70ca741aab00740541e5c5fdcf91276c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{951C9CA1-7E15-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1212 2212 iexplore.exe 30 PID 2212 wrote to memory of 1212 2212 iexplore.exe 30 PID 2212 wrote to memory of 1212 2212 iexplore.exe 30 PID 2212 wrote to memory of 1212 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdbd204dc4e36859eebed06b68d2f7a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a1941bbbd9085cc1353b87559c57d3
SHA194723a64f6cb246ea8529857f2a72171e37eee4c
SHA25646a24b9178770cd25c7c6ddf12d9772134fe7469b36791ec378bc531ce79fbfa
SHA51211f9e2ef9925655228e93cbfbf159f6ceec45c76a25f40f394672c0356dfceb19bfe53837f39a44f2da9a662c69145220ce14adbb07058afaef00b4de7b2888f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b2a943871e206269ec0cba9362e39f
SHA1fd4a44f51ccb4b7239a8e4c77bd77e41808bd072
SHA256c03ceb798085364e52a0b31a99f9fbd96f11be6491196903c8bf201868b20c40
SHA51274dfd91f2b8256dbda90c471635e4b7d780c8866982b98a3101b5ebc6fb5ab7802dc609a78e6132b2352db93b571ff11d17f8191bdb36bdff30f1194e538ab9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee44ef936028e4b3f57c5765a8e770a
SHA17e4557efda843378f826ab2e0ddc7512425bd928
SHA256be24cca18332b59a8be8c211f192f92f6876465760943e37f89098c202aa5e2d
SHA5126b763603abcbc7672456e90afc1fd500035164cf80b2159d18989c38df3673c112197a7d5f89c278fc321cefcffa72991e6decd9f56f4c96f00318827465831c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13f4ca3b7154c39e5acc208018b1189
SHA1e5a8d060592f05416396945e6ed5d39b712b4948
SHA256b77bb0541896878977d2cb3d7e422e2fdc0ed132890a6b07a7d48812fb7a2af7
SHA512cbe275e5e73e13fea875c0c9b4915e48087b4454abfab1910c83ffdebc83d7f31dcc6ed434c691f80ae383b11e74b14a39bda4f393ab1f8b07bdefcdb326ca15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d066b6215c5d0e738ccab634df8f878e
SHA1e90b8547d67e43356242a7b2ff5a7d82a1f4ac56
SHA25620ad345680ed3d708ff8cbd6b10796e570c1ba7b56ba71c346b70cf48b190886
SHA5128fdc1388c682ecf1d0fab4ff7d42a6b7d7f325d146c32155b0a194ee5ec9818992763d7a6499354f01e35795b33233de32d25aeaafbb908f0325a11b896a9755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52032e5947b3e1d4b6c58a8e7c397bef5
SHA13669fd8fc75de976fb9a8518b55c0e8e771bde21
SHA256551748af80f3268810dad3f796dec68d05597520c7a2044317ad5079c8baa595
SHA5124b2570d9dab14b144c492f62b6a0a05180176b2db6e33b90f239188af300ed391c415df05b5fca3120096e565077d65929246d754060c81c4e44032dae93dc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c4fc9b545de80c0cef77ff2d7af825
SHA128ee2bd890d7a6d208f78c07326dc2b6526428bc
SHA256323aed3926d7187f3837a71440a3bef5692776b3d4ceb6176077750561402101
SHA512663dbad18b9498e75756e0bf2fa344f98fd34f75919598a18be2798eca656b525592e3b65b4e10b628c882d612570f11cb50a0b7cd41d9a1747839a4863626fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee52f908d767b6b303dd0ac426dd29c5
SHA1b56cf1aafd89b48347b35e5a60ed9f874c7c65e9
SHA2569b83186db68ce868f279f853eb81f4cde5278cb8a54dae9c833d79c55ef93554
SHA51233c9ceb636015eea5c427ca3fda8267ccd821d86e7ad0177d5b54a563199d3b794b0bfc7af427e7e4c96b142a2119218c1c600401f5bd0858b3b67d2d8944b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f102204705d71cede1bbe5dbcee4b7f
SHA1716b5dc0403e050a0d1a07898a6202a891e9294c
SHA256bf84ed2392e52bd077dbce57678f82b67e661da7718b63a816a523cf78b9d0fa
SHA51260535d7b879575ada2d3d724cd831f8ab3596cd98e680752d7616f4b3fc429e264d840616ed2f10822dc3ec10cfc08b4f2e7753d78576ddb69b9ecc40f4ae307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c149996cc0e4a8cb58354bdfc33cc59
SHA10c503f1f958ba6698a20a4a848f12603ccb4aba4
SHA2560604c0ecd4b30a6cf875f4ee04efd0e93fd939570ff775406324e5172f6a1751
SHA512c6fe6f50e6fbf9b4b26def8e90ee9fb9148c53780346ad7d69f0359260c96962e85cf1a25abbdad8d339eab6ac7d4a9fbd21bc600b1a1a04dde8df180868b904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc58b5470d7dd2388170a0561094788
SHA1121bca3bdbf5deab7cca4d535dbbbac6cad26cac
SHA256d2848da0307a61b3b8aacc61d2593e51a2cb2c56369c487b0dbb688f54eaf1a2
SHA512fc04d0307247d555b1061d853349edd399265f8e526cc1cf7637b465a994278b10120f7406dedc65517422568b4aa7e954b8135ca581354a3ab3f36382733303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a6822aaeca821521a0e0d4d5c41f45
SHA192a7d978a5c53b73f3ac174492b8ef8f678f16b6
SHA2560d4d88f1bf229222899de537117ccd89d7254d01ec7617ff1aae78fc8d73717b
SHA5128130713ad7fb9c289d5db10b59a48aa252c67608e92e3d676eb4e41d1919ae25dc8f42a51f40437de8c0cd71d198d642c9c14c3439b14d88ac86329e20d4973f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ede49f434c57fecaf8f825f836efadd
SHA1e943aef05fd0bc9a19f322a660017db178453a55
SHA2564caa3da2cb4e27653f59ce1d642905a7447a739e6c9e9d43df40249bb7f4d6f3
SHA512ebfabb26b8614f1beabdbfb434c4780ee0f0b79906c9d94a5b4b61721154877b1b191a4f8506789f37535eb4f8bca3b8532425e09a7034aa9d896d33f8da1095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff1d7ab1231b9cbe4d2b96da3da7972
SHA13a3099c2fa71be6dcaf4ad29a32aa566cab40925
SHA25634bb50ab722b5e99e0a2c69baf23c81e18e91a311e0c35722adf07635d5b9e93
SHA512ea09ef76ed2ba33eb50c36c95c6aa26f7329e0e2667a2755a62e677131d79faaba95e0ecda8ab35dc5dbceb2e1c3ba45863ed792fbf6989979539373b0bb8d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25f1cabcc9fdc0b327654b9899b6dc8
SHA14a105c89b455819f94c37b533ec7f4f9f2a6e16e
SHA256a9a0243e7e7310110a8f89130e8f881d91371e6fd1e4df07ef719d5084a4b919
SHA5129d41a2cf25c8472fe3a0f7c4f4d8672a9a108a8e2d5ec2505e22ae783a5580d94022b87a9c1faceda14371cea99e4bb71d17d4874a4c70f2552b2c9c1fa27e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57380c6ef68f2d51ca2068e9e4d74a28f
SHA15ad47adef91f88637be93e10f3056cc8dfb1af10
SHA256fbaf4c26dd4e5a13b5aeb84a1191c0afc9fbf1c0f39ff4de19a62f7813296f5f
SHA51249706f48181545842c7a522a5705091c0851597fb5704d775e82c64c9de038f2d674e41a85717cf02314aacf35059934a34b60b078d37efc1f61b6a208ca84e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0dd67e63cd188fd9a8f07c4a0081595
SHA145786159ed6f30aa7efd4d005d2adc582e21dbe8
SHA256ddc7699076d7f82ff19489ff528a8b428f4cb28614fcfce309774a5fa5456aa5
SHA5125cae3858e1b4e7ffade19bf51893f39db73e4c8cff7c411126840406227f7f039df3adb8923b9b8c057f362eb27631dc684997e2884f8edccc15bd69369d18f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b37234df4ae8f3f8f1ac6b1cb904cee
SHA1ab2087244edc7fbdb9197b88e3fb1c64cffd1182
SHA256e53af46fb807927b54af84862198b48b0fdb9b53be87a7cac8cabe635131d772
SHA5125e8d69b911694858e6d1c72a43e3803ea76d2db096d2b164bb731de334187e644ef1917b539c96b4798051e19b654bbaee7e4a017f4b73a4b095c4755a7efae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a22bf80d744a298402b3e9c10e89ef0
SHA1d534ff6512347566f5e1961e0344d7d3fcfb894e
SHA25618376f16a358f826b048ecdb7f8d309b6e15931243e01b8c36d332c2916aa118
SHA512f17d7d122239a33e32e0bf7c45a0a34f075720611987fc02a7f460d384485498f930806f6f598b7b12d5a713f1c86657e8a197805e5239f744412f43edcee832
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\yellow[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b