Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
083584f842c6d1f14fcc0fcbd09ab0e8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
083584f842c6d1f14fcc0fcbd09ab0e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
083584f842c6d1f14fcc0fcbd09ab0e8_JaffaCakes118.html
-
Size
53KB
-
MD5
083584f842c6d1f14fcc0fcbd09ab0e8
-
SHA1
f6dbef5da17e003fe8aa35b7bc37ffc9f56482c3
-
SHA256
b0ffbf8fda8bd51d20afad54a00797559ca7b7bda3a23b63655ffa8802298ce3
-
SHA512
3e239a6f44890d5f26d8bb822ff2eb67cad08d398d74634c22d2e427e6378965d4af862f3c8043d903cd428282e9c7cfd50af9bdb73cef5876c8aaa81637de10
-
SSDEEP
1536:CkgUiIakTqGivi+PyUNrunlYU663Nj+q5VyvR0w2AzTICbbto4/t9M/dNwIUTDm8:CkgUiIakTqGivi+PyUNrunlYD63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D00D42E1-805B-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40785aa76814db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000015617d46bbf33ee94c51164a054459e986b5c5c360c2ef9e7d7c19fc1435e33000000000e8000000002000020000000d2e73775b617ad62d4d2c374c14eaa1f70bcd6efc07311c8ca74505873c2af7a900000002914ec7b9b25db39c7e8674028e5c207ceb80c9daef3aa96277e85faaee8a4992b7d9ae3f83bbdc6d45f498dfb1a328b4692005f1c9684055775ecaf0cff2f1ddc934e668423d0cc39dfbe936e6c3ad4568dc74fa795fbeb30e2df53f29b82bdc309e7eff3534c9af53651b08d40e8d941a87370ff0f3608994a42e38610fbed6dbe9f94aa5e52c8533b2f933f8dbaa44000000089f19c4b87450d0a28dcdce8fb009a6b52d4b2ff42ca243d8af9c9889e281c3b296dc90a4e57fb095b385403f549a047a8bf97c30d54f560ec59e6a142c4a1dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000473d217694463dc6b8f053324bd635d4a46b826ee6b093aa2075ad1b60e12856000000000e80000000020000200000001e4c3ad34bd8d04ff786778e223fe3c8dc960c4ea8ae45f8097dd5afeb97857920000000ccdab60942625662dcdc50bbfb16007a492c46fff5b98e43ed5eaf116cec77734000000004844decea2ca98597db8264d5354888e57742f4e8b0c55e3dc1aad5b04868863b3a45153931fbdcc2ac584c4b0b01d5ce96af44c6eb9fe9e294f9ce3eacd3f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2104 2548 iexplore.exe 30 PID 2548 wrote to memory of 2104 2548 iexplore.exe 30 PID 2548 wrote to memory of 2104 2548 iexplore.exe 30 PID 2548 wrote to memory of 2104 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\083584f842c6d1f14fcc0fcbd09ab0e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c738930a1d28c2502f0a8d4f0d1844a0
SHA15c443e3b6712de2ff77b1d1395f39700a1625d87
SHA2566eafc6873dbc0e0578107c58c82995523e8ce5f12f4759e3ac14acb138324896
SHA51263a786597911c0d9d3fc07f45315366724c4571ded361324dc7483e8f7de0842fc32777b49175717ea622115a30c145d7253ec8f2f4e4ef4af41d8650c7ce4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f445a26b5ce06f87813ebcf67661ce
SHA133fce8c1e47c860966b8356ed8f76063b263260c
SHA256d8be0fe6b59149f7e045c73698197e618cec7430a945d43485c504db776bb651
SHA5123829c93d2f67b67152b1a76b5425cbe44069a554b7d45c163990643ddce47a856cffcf9937f195373f9a34725bdad92078ea7a9b761cb591b6bb2e600a46eade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5846e051b3c2dffab9fc60fbaac736290
SHA103737fbb9c99c26258bbfa518d257b8c2962bfbf
SHA256d1df2866ea8ca52975ab59a2190a518fe382be2054f5d7f2b387421dff78e32f
SHA51240f33bc46d9d5929bba76fc043e07c0bb78f67d68eb7a051c509e6aaa02a05753c8bdd8dcaca441fe71f9e21f904dc4cc3bfed69dfed9ee7f4cb38b0581d3c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30baabbcbce8fb338e383aacfcf03af
SHA1f0862296c129499c62fb909fa8aa9601d19cd3b3
SHA256e0f832c75453cd22dfc0500310f7db3b30e706ce77ea329986137bf6dbb7caf9
SHA51236fc9fa66130e0ca146586cb641183a67cea3b5158612e89320537930a4c54d21b25fbccc55e42bda03c14e4c35700a41617a4e9ea32152badca6ba10bca4ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549120f54e23c9731c1e4141b1b886393
SHA1ab057ac85a55cfe333c409846ded9d69386280c1
SHA25618388fec33a170a0149cb4bb0109400c75b1ba3fd65b65ec0be4303854b65a42
SHA512b41b166ea2f489357e371627d7e3d91eb27404414ce0089f643c9152573911f6a8c4316dfbb57fab7f4822a39611d2790598a527aed70c2f3d46d50bceb85029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2b49daaec3bffcc1c401c527e300d3
SHA17fbac633d801d7c29c58f250644a0ad4d55ad358
SHA256cc11717c468dcc7741fe774debf56813e3fecf95bfacffc4073f6847f8abf528
SHA512a59c3bbf25e02b0cc4730b6e829dfe39cb1bce489f2125ee66d64ada336a5b559adeff02a70474c8db40ba61c3538868da3c7bfdabcf180495ffcf10a6645395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da8156f7942fe907badfeb9caf76731
SHA11c9a9bab84c36072d1a388656a018fba02e388e6
SHA25673b972fdf3de7c68f1c51643614932b634ce49a3e5b69f79453866509be8af4c
SHA5126b474ff3b4da0af325f63d00a5b17fa3b83c9a2e60f4097be3eb8dab30d2df6dc8689cecb2947c61f73ed71f2d25d58c1a33b30779b275b1afb99708d6b22e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544dadd60ae364b0c8988c6004452d006
SHA12d858f64079f4567a9508b4b315a640637e4f5bf
SHA25605e8cab38bf75727a4a59ff9003127aa72b0a141464dbf0a4a2e76adc1d76db0
SHA512cca0828780b3ed9f324ab49ec5250ac55cbc092706a9c23062a100154b05310f250db4c498b692b8959c3f816e32825b2cc7075b1069edc44682cd076354b29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b566f2785a07c78bf0906cdcce1fb2
SHA18c435a8b35c92302c47944b3c560eaf40b7b95ef
SHA256a7ef8d912844a1f80fb2fa21a90fa9bb0e3d2ab7cdcb1a6628adc6986787d025
SHA512a4be8906255e289e204f94959f112c194585d6b3e286fbc9b12efd9822c33756bfd131a4997a7c022710a3025aa9c6779f3e55cc9efaa3b40c739f48d217acac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505500731c1d11f443d8ab7b3ca6a224e
SHA1ab9497e96fc8993bd559fb3057a8c52121641c3b
SHA256b49b184ce9ca83635bbc2c64b57eb607daf56b3012fee4a7bb129eb5c29eff60
SHA512b7b0723c896a5b623f7759723a9cd83d3d021ac77061c8b54acf635df8ea34bb3737c476d52ebf1dd75f5dc8f341b7b37af7afc1851fd9d61bc138e6ababd656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcde0fc87135245d1d9977bb08a1f5a4
SHA166bcad4abb0b7b957680543f4397b2399fd8574b
SHA25669177f6640caedbf27e12d2940c7e3d3ae2b50beae2ef5f973f232d1458fdb12
SHA51297d36b4f1f8b1d048d62977cd7d7f94e3f7a107bf247f1c577453de13ff79c9053a72ed7e7bc018de4770b56d7c767b4e060425f5143bc7ea37b89213d91c63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56581076c007709ac0632c4c59bec3e51
SHA1d77c517b1584d6ba87a73fe5982f7aa86c486406
SHA25632941f3125ae362ff2107f220291bc2d19caa2d2e456716822298054ed4827ea
SHA51242218c39d0fab0bbba488aad2efec04daf75652827ac224245ad013c67f60d7dc66a95bc526b03d0fbe93b7968a30a651740e5d78dfad75d03343bdea0e56f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593caf1eae41113d300d11e9ad5ffb916
SHA1b7e817e2355ac605e53adf83667ddcb9d5f2cad3
SHA256546d5163fc3d7fdabe89fa7b1055d01950b529d25273fe003d06d8a506020821
SHA512f7d249238c5b8c95c4a80fd5d5e3f657eb49e3004f4577b9ba68463cfea1a5eae8ceb03aa34e3de659fda1951085b334cd347abfa2d7c377cd9a8f971f23a8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5702939ad40ee92ad48d6c6c31b033122
SHA1eb287f0ad2680d5bbe749459903dcc22a9747ab6
SHA25618b400073548231bd9ad13651975d53b8ca8fec3d13f158bbf869070b9fe1593
SHA5124ba4dce615447e7b09cdee5721757cfdfac91902bfc30430b30f3856cd5c4ae13530855cd222cfffe22269ef2b66d047a1dd9915bf54b4028c59df18e8df5cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef0ff8d6f56a314065a2c9c1f73a5aa
SHA118e9ae3b65dacb4f546b1c8ddc31f0cbe4d711e3
SHA25627fa89d15d9600cb28160f46dd12183c729085055f4cbdcbe3551757d8b2c6b8
SHA512372549b4e0c4c1d70158239a291ce9d15ef62316cccd9fd48736e39245912f15a89e250daceb1425f83c7e036637d954d911923f138c76829e556e9492316567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed41cd501d82ccd4cb8722d6f9529f91
SHA1fbbf28a44192c08f5656bc65d7a4da1e0c12954f
SHA25646427af50ac7acff179d9ed2f4e34a7baf1812b6b79bb8f90c34b25ddefadfdd
SHA51284e27443fcab3b5d4588bc035cb7ad72baf59d4ec7363aedd6808490dcd5f01f8a405243a62f672bc34f2815228eb43ac83547f9523f83fb0f9655c0f9cb7e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf572af2cb52f8e9306b420df2650e2
SHA1654040f2a13b89c7bc60b02593b9790bfbfd11fb
SHA256438c126ec8306d48f74fd9cfe1f1991cb559b39196dd7dd66d782efa43293f0f
SHA51215c400bae5d415ee9c975f2ba81aec32fb4deac3d291d0181dcc6c9f4f2f32d224a3d469a09c3d9e587590a6c1c5384b211171ccdc1faa5e536ef79fc37e0d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0f494efa79396f0d9487e0ab875fe1
SHA14a69676f34ed2e9fdbe3e81b6998870460f2d90c
SHA2565c88c102b45719bf5e47b0fd5ddab9472574bb84867947c46dc671bb5165a97d
SHA512dd225e234dff547387a6891da767e3460d94a3c8cd697cac834c419a01a47331f7e65d4fde0d8491c0650438acd2fca1b092fc1617d5881b80e124cf60f8b3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a8fbb0c294f0a8cf25d016f2792333
SHA16c122824406020f97b984cc708751ee27bc94cb7
SHA2561e00a3ca007bded534b8ed7fdfe20ec5ca3642cc6e370f0ee41b1ab2be2ad591
SHA512d1b456f58cb5fdb29dc8c6d5c84814684922d3f9afd1f5a8d6f89098a899ce0dbb5f373964609414881a57a4234c832cb71b0e01009c195d7dd00ff0a9e2e6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b