Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html
-
Size
23KB
-
MD5
fff11b32f2b58789ce084b525bc6f7f1
-
SHA1
0b557f9d5cefda0667c89e124199b9959e18637d
-
SHA256
93d5e062521b7f74f1b2e1e445ca504b36d51ac3da6b55e38ff18d7b506ff19e
-
SHA512
7e0ed0c0048162a09d24634498e8b8e6971355a7fac45a471192dec3344470e378e9f6a5ceca926d1c1ba9ce915d03bce37b8e4d6b839b6fb6c8c0aeb003c1ce
-
SSDEEP
384:I6STdWpvL8XaOWCbkX1yH7PQ/ZrVGun9Utv06kNvIKHr1rfUbdcoygc:B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007afbc1b96430a13b0e7e53f147875d49a8c8f72051572328a1c98a5c53a43fee000000000e8000000002000020000000bda90e357bd76416438838561b69a7c57d00c1290864584f11623dad4b6755259000000094a8fc941a740baf628145adbca3d740ddf37098d0d1ac0d9e96a3c3d2d32d900df5a1b04117b4633bf36ae203ab4fedaa3923cd43f6f534d987cff59a24c536f74c7181adc8ef035cd416007f601f08518c312a404b15eee842dc0fecb21bab203920161631cca2c0547efb9f2f08e5fbd55e264c3bc3b54cdae959106dea32fea8438760581fb1ef3048113c5069b040000000e53de8d488974c21562264f0b443bcffd4063dec60a87bf3218a296946c4be8716960025b887cedd6e95dfbcce9ce46abc4d818f8d276f82f6a1b9314f9d8b07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433831535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e9101cae5ea0f41417114dc56012f3d3d16f0dd59e4f5cea99a9ccf2a36f3306000000000e800000000200002000000028987aaed986cfe848859bee43615f64b64f7c2f74c8c5e5f824e6d69cc1659a2000000069a09ad98016dcc898890b3c008a070cf069a7ab2a5102a3f4564936c0070d5e4000000012419ae09b270c1061db4a26cb9e9dcb09c706aa0970461ad9d8fafed6bd6f7d1f41d98145791f933cc3a8bc5dbf31f8a0c4eaee0564106098a14969be2930d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304d0652ef12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B966811-7EE2-11EF-9FA9-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2332 1624 iexplore.exe 31 PID 1624 wrote to memory of 2332 1624 iexplore.exe 31 PID 1624 wrote to memory of 2332 1624 iexplore.exe 31 PID 1624 wrote to memory of 2332 1624 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fff11b32f2b58789ce084b525bc6f7f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253c93557ae0df524318fbae12c17278
SHA15d9c2807ba65c012499007a05fd464c666df4b23
SHA2567a181bf20738cea404d549b107f8ee53cbc65e7954a4e9a66a2e27d41d283371
SHA5127332c472ee33a0aa18713e970110eca50add89e80e2c9f8ec384ce5f86833437c01b010421433d3dee2e0194fb397af0b71234f1165cc92afccacf8c0d263c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51410696b0b0742ac4f854ed7dd05ecc0
SHA1b9befa941224c0e23ed407353c7c22b15e083344
SHA25637dbc96b111119d3dce44d942583c852776a207fd1095639c05528377722ad9f
SHA5125914a2f36412df3b79bb9ee942a009c954b0bc982cd44ce0cfcc17647b4c45ca02dc56ebd4f480ca4b441d4f22f66d2091dc15cb35e29caa0bfdf8a6fcd6f007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d9f2967540b5caca49783c029e926a
SHA122a32aaf8f145077b7cbac40d803707cfa3422fa
SHA25685e80cabf563296ebf197b7996aa3979906292e66fd8bd252dbdd6ba62f84ea3
SHA512a7b4079c7ffbf4ad033d280c627d7a88339ed2294e819f5a8f64ab9c0b0b1ec909c27376cafbc615f1a3f40d8620884978f94eafcb36981964d67ef98832d50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e47214f49acc9966de5a62f79fbc61a
SHA1acfe83f30b4462e22bcab5bf4383c16d9db53d69
SHA2560a347bff5c9f8250066a61283c55d3b85105c484aaee4a5fc76878411d9b54ef
SHA512226d2c5d09191658380ddb7339fabe38b2ad3521b06d8dd2507807d08f3780d594a6e57ba43dc157779c71dda287c45e7b31140e6aedc38bfa35186cdb80c8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eef29809e51fca2b448addb6563a463
SHA1bde631d0aa2cc9509da79113386e3101edeb086f
SHA2562156a0d620517f50423e536af090f53c986564ac53329d6a767a739fb58b6a82
SHA512c041dca97f133c94bf6cc2f995db6e98d693778462ef22c51ae6fe1d6a53ab61dae13184047d081aad6c4596b0e4592c8f18b7268cbb2f29ff30f8137aff7704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a4833a60b26f03169937d1ba358cbb0
SHA1c28dde6fcb5dd613ea3eac05850333a92550db6e
SHA2564b4fff82b0e2292804757cab391bd41037c3572a4c74aacabc2486cba06d1b47
SHA512770bef92c1893ad57f9e53343ef563be8a98bd5470b092c65885622a66f6efa3e2752b3337bf10e2478670bfb46c9037a1c419a924cf37c10f164e59bae6fa7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2784ccd5c19c0efbcfecf7c450d9a50
SHA1bcc5e4b072c46bbd8205456dd1a01eedff4faa05
SHA2567a6bc5c03ea06b9b856e5d33480999502ee1b0f0f3666135480cf3ee9ad74aee
SHA512cb21b2258b6c51521cd6a025b913fe8a37f662d40748fde72dda36652c16623729813850486c6adf1eaeedf6f8c335a9c69d204eeb37e62fb4d71534830aeea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc0335db4adb72884ab209f93969aec
SHA1f021e18c5ed810534d29e6fd97a2ba038829c9b1
SHA256419a64af26c439a1fd848039bf71e67046a6c82b2a858a606d8b04fa4ec14db4
SHA512e8fb9a1872d095c5fdfa4af50fd52aabea24a3fdb8c42b7dc25be84d5f957261d7509c56128bf5261235f9767113db00c134db230a564d4da775a041b54e4189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d63920adb48c6980ecb86397dc72cc
SHA1661ccb52650b7adab5f638326d97a2207a8ce683
SHA256794dddd55bc55442acd3320e7e619f9917eb24168dfc414c87e1a9fb7ffd6489
SHA512945d5b25606189964b01926f6ed39012d544525ba70b2894f0e5a436461f1e7e1372f3397aae5edb082eb5ba56e5218cd1215476447754836ec193a416a5409d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83aedda7be7fa88de05110335de88c1
SHA11335cf7ac52b080b6ef5ee12ff08513988625900
SHA2562b9b6e5f7eaa33e795b15b0d4af3fe00b799caa0c38df42cc7fc98dff107f7f0
SHA5127e1752bc36133ec915158b15e923e0fa18544c0d82fc1dffe9a39f91a0127c03f4a022031756e17ad0885f0212a3398f3d34dab900221309e51561bc1aab9cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae598dd051e51f2318ed99c5489ad47a
SHA10e770e650fa69e24c1a46b3d422c8ac376ee8b6b
SHA25615cefa6e514e915a18a83fdf95a419bd54f94a920862d97274acb4e71bffe4da
SHA5129639bc27fb7edab97f360092f2f0f8a61c9f3800a054a6752aaaa4314b1ec39b17c3593f7e28a15b940ed607b9929c19a228b266727837c2f9560023df9f1413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a78399335577f942c611e493b4c9ce5
SHA1ceb4c89d1e89cc96f6e448495a8149a5d93ab52f
SHA25632eb1793121b58077d9605ff71f2bcd97fef319d6d17ee2653fea96dae23c275
SHA512e40597290d4485cda7c58dc8090c9a5c5937963e1401573bf1622959fefa7f44298a49d8d2e021c4c07412fdb6d68a51eea4e886e1470dafdb09928d8fc664de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e8ab455010647e8c382a293000edb9
SHA116ea63463f42d9b0e9b3dfcd89899e77affce130
SHA2566b5ceac759af0ebb4c48648ce2daf67e5a293d23a8f43bee250923813f4592d2
SHA512b8d510ef79d30fe797de036c21ac85ae48270168df75c3841f48908330d73f39f6d2ac78edd73788db161b7f4eb2270a2da7d914307d4cd63ec11e826f365c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db6a40292f835bd981a708c4a767420
SHA1c61bd56316ab68a83cbf4b842343074dc6e4c856
SHA256e4f2c3e0a92b28e2ca54c9b5cfb663cfad6c40f380d434e2942392c2469ab3b7
SHA51204b9652c10c0f29a727fc8897b82888eb5e88d27c55f2ba6c418451f585936eb9a1438c7e0d48c42f37be2d45ebbfa1a35eaf2c04ca1a9e9bf6060b1bac44b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55ee54bd7d2b455c133b85017347f21
SHA1082d1454689323bcbf2414802193e949ad9cb3f4
SHA2568d41e4afcc14b071c2d8104937104f4f835592c0abdb924b5c0dd7fc7dee9cbb
SHA5125d1b5b2e7ee6bbc8e6295996263e33adf5f82be5400e3fd638edac14c12f712f388977791d333ef53d414aef37f75a559e8960635503525dc6422f4bca937539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba406eaec4f59b16cbf453215e3457d9
SHA10e13efe7076e819b498ef7616687de04f28c4fef
SHA256fe6ec051e13540ea09c6f9184377bcb6bfdf7b7c202919870ac3047f7f8d1298
SHA5129a9303ab5119a947fd25f4052c0cb79e7c772888e8e701742e4cb9ab129d570211426467caf96ae14dabcec839bb0ca0016bcf3901ed9a19af8db1be3a1b002d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c57f5e577453292fcbe65cd9730865
SHA114a92136a4948c0d237050c293b2ac9f37b18774
SHA256a0681d1813bace76089f34aa41aff8a43da826f886300309212c8f2681ed10bb
SHA51275f0d93f7f266beb3e067a50f0a01f443860eded5a48cf9e5b54960b78cb750dd44be43be4dfeb20d677dd375ade474fde69fa865625025641b44764e0ff939c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569730f1f5b6e24d57a810d3ab9255400
SHA1d33b526eddda40110f0dd57de78acd69b9b27f15
SHA256d7d75f01457a969b15562d566bb66ba0cd3267f06ff5d690c1579e9646e239a4
SHA5122e5a19aa69e76a876a873d89a15c34b5dd83baa7f6aa3fb0fba03472b0fab726adbae6a8471908e58096213f3e80a1063f4debeb9ebca9ca90e69f3e414ee8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f54ff6cff71b8674468eeac0dd7929
SHA103160b96d3b66a96429f113ebcc44b7aa6a2f243
SHA25661f78295928eeead07228dc068d19af12317ffe8a1862a9647219b46fda63d19
SHA512aebb2b9c0943ff9f174937b60f039ef73050859d8ec6233d838ed0a053d5bcd691e677178b25b4ade091ce6db0edf16f8c2cf2d066ec572e63c4107269e7ef72
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b