Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
09a408875c8fded07f4816881b194a2b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09a408875c8fded07f4816881b194a2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09a408875c8fded07f4816881b194a2b_JaffaCakes118.html
-
Size
7KB
-
MD5
09a408875c8fded07f4816881b194a2b
-
SHA1
a3efb771cc5911cf512bd794ae5ba2ffdc57f37c
-
SHA256
6ed0e3a23fcb2316974e9e9b30f7454d066f9be8d82477b82199a75a2f7c0ecc
-
SHA512
9d586afd7d80d31b468b3c3641dd7e60cb28ae87027e7c1eec7d13cc25b8a2d677308f71673da2b0e4cb38cbf955c91f762db79c2f0c325477af11153655f4e6
-
SSDEEP
192:qaZ+sSN9aY29LTpUEd2KLTUueZo2GJtkv19QB++stmhHYNFiINu1VaYRQ:qaZTOqTpUEd2MQueZSJtkv19D+stqHYd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ff05df313469d59fbe5dfd829094a4c5ab675d6048fc0d83d678f154f8cf6cff000000000e8000000002000020000000abc58cf9ddb38ac248b51d0352a56d93c445470dab748f8043d1b42b7ae9477290000000b413e168f27db08ccbf2260dc252fa6437443485c45094d72a1162aadc21f883b67d5a1d349e20f9b0c679ef75f7e94c4d6982cd4d88a8c4e9bb5ca981384f3c7cac3e79dc3fb59da70057e055c23a110767bd75b75d5f17048623bdfdfd56a228804220e0636d6cae192cc3af094688e3c197aa34b508d3737fc0d9f4a83c02820c3c8e9914f9312d3e0aa9b10ad3f740000000369d7877ff04c164c9ce76450af4d9acf952cc1a8294df1358645a72fa593f498176974edc04e5a811a7b5fc5998382c9cd379704b07686eec86e93a211546d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d5d5a42ed5186bd11a9d63d6835328f97e9298c6091f7937f86c3452bf8b2a07000000000e8000000002000020000000b211e78d3a3faea747f577aca7ea3d17dd54f1d174d366dad251b82f1921609320000000a19dda477b971c5e2998b48466a33a7e1ebe9bf1be9ce932cfaefc302cc62f4b400000001ceee923733dadbaf3e63e694c157b1e86b4f0487a9f550271bdfb56b1f9616aeceff886a41047ccad33e0c188695b9f2d5399a978716cd67b3254585c1842b6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434017493" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{733B1B41-8093-11EF-B267-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1099fa47a014db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2988 1876 iexplore.exe 28 PID 1876 wrote to memory of 2988 1876 iexplore.exe 28 PID 1876 wrote to memory of 2988 1876 iexplore.exe 28 PID 1876 wrote to memory of 2988 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09a408875c8fded07f4816881b194a2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f9f768fe8ffba13f261a452d01bc0b
SHA19c78e9449b092782ee885be9fe9a4d4c7d486c3b
SHA256fea21ecf5a52438fc482fe0f1dae7ef54090d747c7770a67c2e3398513a1aa4e
SHA5123f2cd03a8612b599e86a6e7c5916d80ea99287d9396af90e42570f04122261eba132f8e8f663cb2d6f5814c43332a6336d15c6c54777b82e3acdc63eccc6af88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da73a5a4b1c4959150b1e9e4b7854510
SHA182e68ed7d5d16f8dc346ab8ea10fb63f0f0b7bb9
SHA2566b5b0a707fbbee81662f6a06f00b09ad844df8c8e9f866d871957f53ab9c0f69
SHA512cc6ff54997acfec0576accba505cbc62c1eeebb76c5edcf6efc06804c46335f653471f0591926f506faf6add45fa92393ae05194a364cce5f5cd9a9cbfc12c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03239ccc33cad654b2ab4d63cc6e88a
SHA110d8cc401a6bda4d942dee22b8c7bae5fc319bb2
SHA256734d0d28e94ab4cbbb022154f26bb09d7118a9b97044e31512c39a368b7b1d74
SHA512e1c3dc78abe1fad0f56f3682903cc48abdb7b47033c15aceae628b5e9c410e4cc8509966a449b91f4a7a9c1f1f3a9972bb7ef69f4694cd2655b955e07c23cd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52249419dbb10d586fcb8af6e71c0d648
SHA173a41f6dfa104df6f5bc44164be640c215641e2c
SHA2564e58a142d4e81aa305a6744b521d6153772e34fae9e6fcda87ed76a51172f6db
SHA512de57adcbe021b372053faeea20cfcec381455a33572cd63903e715991b218f165b0836ac55bbc9ea3800fa7de2d563a99d6667a0a28f5a3d0bd11f37ad3132a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8dbdbbb47a48c3a3b56dcb9ebda67c
SHA1962e0e5a1040f460e4d97c5b16eaa2fbe95183fe
SHA25687a4a8d725c2ca60342fbe2742f4f77a53d43874cc197a4836d096748b0fcd9c
SHA512bb333e49db89741582068a1dd3629f130948d8e185717acbf30acc37c0bb7ce5392aaf2d87545058d3c4ba751cec4d77eda5e68679accf73d1ddc818ced0e7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1991feab64dd62ef39fb6d44ebbd06
SHA1714d303bff3b4fe296a486aed7a766e4a039b249
SHA256f907eec368018ec8b7a2db37ed50c8d52ece22c0aa6d68dc6f7a27a51225f7a7
SHA51262f134946813428e032d06f551f764558103426d40fd97a2c32e7f072b0e517d5ad09ed891828411aa4a66127002b4b670943f56bc18581e6bebb1b61600275f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922ae5bbebb69d412e7946f14bf1f417
SHA17e9599289283d211fbe55cb717bbcdf1d3157f1e
SHA2565adb806c5d187f3fd124c496f7c1f004dac02da9ed756c0b0514fe2946dda1e8
SHA512fee1654fa365bc30aa2f9c5129066625a17f0ac45e5b2d36476765bfced71c490e1d0b170a05f61fd36ec0e28750357b16db49d6aa22618eee933c6abc39f887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825af707cf9a8fa2612d8bf7dc3856e7
SHA106b8ed11c4e16448c930248d71f647b4e98c07e6
SHA256934e805d779a5ac80bb9f09b06d197364d71c0f344defad224051ae08c39402f
SHA512f086575d8788acd5395f59b1317a43e7e6c2a687e485fd18099081bd2f8df19ab9e17f75a3624d4603dcd3d1cf51dee4e1fafc54c5553bb2bcaeeb2310679204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf02ef577ebf9453182dcdcf896a951
SHA1cd68d8bd0c8929a9147fa00eb769657762dbe0bf
SHA256420a1b7cf76ca6ccd5ae274454cebaa2a40d68f6677e03291228b6ac8b806e00
SHA51230fb98aaeaa251ad9ad927d580a66c67488f9492306ffea3b04703fd575cc38201dabb8eb6ba4582738c2c5506818ba5738900a849aa34e17ba564eb904bd1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653db7d9786c4b235641f500f258bdae
SHA19b85e247c043676b6aef53b533156f826ad34bb1
SHA2569b0a7b5c6a6a51ea79f0e991ed46eb18cb6a1a81b475f669532f2cbf3fd03186
SHA5123550add73dbd125229d61ccf66ab6882ee1a2110b1ad23bde792803edd1ad957887a66d49fc1e12cff8afd6d9a384420d2386c0a806c914fc13f1e5bf4748e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56583e6e86a69fe695be6acaa2f7f0d07
SHA1f339ce8756c723fd148d7852aa0d0fb220cd3652
SHA25698f7e50c8316ff54cfa68b10b9ecff31696f9c93f609d767a15f58244f28d4d1
SHA5129c5248e1230d30c3e4df796cabc54c10f2ccc98c4d1d6d71916117182cd12f7e7cb7c25e61e71765de0956f12a418261030f6d6c116300d14e90c5250c788e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9584a2c090c1025806b2702d3cf056
SHA1eba7300af3385a8b2d56eacd1b13d3614bb57677
SHA256d2cf27026e89ee30223d4efc333c43fdab79ec1f7cf758557d7541762a77a995
SHA5122b519b35e8628f6fcc1aa0024f8f1d1a6046cf38aa78ccd23b777154bbaec3ca4a779161b3d18d32981f61ec1cd9a4a8e4fadba718aa259f3e42a49d6e62b75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cf0dea802aa405ef0c7f35c12ad611
SHA170d932e624078f3b3dc3cdb29ee1f85b2b159651
SHA256150feb4bca836ae48e452cacd5ed299b11206999121145d0f49a485e4104e94c
SHA51211cafd047fe3d3988d84444ac00a328b81482f669a016f991ca8f3d9cfc79a061e3cc74eaab8453a447dea6b2aa37d5e795de3536b780b2de475e967c2a50eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a92d8b394c633ed14ea2463467a19b
SHA199597cc6e660aa176e1dbeb18fe7eb037b6f9c70
SHA256950d3e36d110fa585efb2f71f6177bd3f8319c0091abc15f869c4832d9be8249
SHA512be275a1ebd5d09668d598b0c48fb13793434bdd5c8678cb48664347fdbbbf3f6ea6d702a97c21fb2b6c82ac4da7c9f31b0701ee950f0f2bccee636dadd96dcc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f504838532a3fc98f309e8aa2733685
SHA1b57a02a5cb81c2625b07abdbd462da486ff6510d
SHA25645cec69c70eba503d1002d61882648d218e8bc26ba89ffa05cba42e56e5cd823
SHA51237f4280f9a1f9ed667ce55c473b1a7f475b6167557dde938f1279ae54180c0c3273febe41e518a24a2071e06985dd551036aac3d02c400efec3238a196dc588d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b364c418b755a10d58fbf9343c23bc3
SHA143509deecaad014aeb2e4faffbeec907368d6e7f
SHA256799b66dbfc33d1400be602dce1b66df6bab3d76c05993260bf9a1647671de8a5
SHA5124f8812bfdc1f522e32ef232cba84cae666683e0a8b99f7d07ee35818ddbf32dbddeefe5680aaeee0a7f7288e9bc6d7355df66a36b8f455132a503ef515ff1cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72ef9d68f4634d750f6ca097f20157a
SHA131a4a1cfe90d1e90d990bd1f10e835cab4a49cf2
SHA25607bcffed37db5ead21fe8cdb5d1e4db26b6c1bba3f72027619394e508d7c91a1
SHA512aa57fbdf9cf85dfcb045c2fcd2e4495d2937dda018762ec29a78a117a0e335bcddba2ca0cda1433f7a838d6ef2dc2330bdbf1ee659d9d19e47d808e4598c2e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d74588841de61e91332faeff0f199d4
SHA1f93b91f88acaacac0e0f0c13c2dd859af55ba305
SHA2566c0a8c7cf4645fa907b9a509a02df362ec6189ba429219c8daa991442eaf7a58
SHA512369b7574dcdb2bfe2b8f1e0ffa712df02f56077011aeffe98844871473062e4c62a5162b7afba5563a0b767af52e88e4d5f691b9d6405f7f7aa393316561b211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099c5f1a45cbed49280a8238af764abc
SHA121f94017ae7412388d7fc18ea5615a5c7402a2fc
SHA25641e0ae5b19ee3a0c3b79ab63cfc85bfed95d303e16e1572051189f3c5ed9c1d1
SHA512e7d2a4a638d68174ecf2e6bd43865a96fd3ed1f9b7728f477f86d1d06f08420f442251036827eaca65dd8a4de3e4ae9edebf9f7309ae6c4f151beb4dad0b55f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b