Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
142945f8e25804e3d52d38eba4270072_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
142945f8e25804e3d52d38eba4270072_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
142945f8e25804e3d52d38eba4270072_JaffaCakes118.html
-
Size
6KB
-
MD5
142945f8e25804e3d52d38eba4270072
-
SHA1
a232d91385cd65f7d91c24aea231069abd632e42
-
SHA256
3bb29bd7e66e173dbf122c0256da5a5464fc26cac3977670bd2dbd9df6535870
-
SHA512
e1f44d7049f6bdee46406ef9e066c9bb8a1682577cf44e9c743c97f1f58daa2691bcc4203cf4d6da6fa2c44c477264eee36012fbc2078010fe234aeeea904718
-
SSDEEP
192:1nDpb//68LaLG3+d/otyoVqxDyYZ2kjYHvoyqXWs3Ympq9eYqG1m/O6YLgKFJ/SQ:nQLojPoC9eKbY4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434222597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF482181-8270-11EF-A160-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e76547025882a672c52cee3a931fe78356ce9670dc6b743cf95f86eb1294adf9000000000e8000000002000020000000cd9d2b19c3cfc1e37c30a01067bcce71aeec13357a7ccb5b2f892f2eadb50f5720000000c3542eb06f07fa79a455d24de6b80d9dbea3ff7c0cfb1736590e6ddd00a2d997400000001cb97e8b2276ca977fcde8d62ec15c07dd912e53a8b3d3f08f48cbd3d10a9126cb99885ac92dba4ca1f537c5cf2bbc440bdfd1cd517458980fbf2d37b8b00782 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a1e6187be180a2a7373427187281477fe232a70f55635490b0b5cf872fcad2c3000000000e80000000020000200000000424a5189551cb35986eba826d37f85e61dee21cd43564d9b683646977eb3b449000000061f16deca6d3af58841af7d4aaa5c774a79b126ae11d9de7b22f4858be4ca2c9d0f5316c68523d5b0bce9bf52c13e42ab6a50ae52a5d0e8de5b5ca9eec0725c90db73b425676d6df0f357ce445e43c68372a2c91d20da3bc8e9a2a4d45739dd2d5d31a26a1d2fae64dd1b8b00380ecca8cfd834bf13ae656513c1df4fdee0664d2f6ac68bfac59274b54bfd3ac95461840000000de1b98be5ca650291c87c35f54a0db2402d8d51db49cad6c30ab4e1dfa7199fea8e95e6ef0716c6f273aedbe7a84f4429d49338dcdc606c4de0dd77d054ef5a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6040bed57d16db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1628 2352 iexplore.exe 30 PID 2352 wrote to memory of 1628 2352 iexplore.exe 30 PID 2352 wrote to memory of 1628 2352 iexplore.exe 30 PID 2352 wrote to memory of 1628 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\142945f8e25804e3d52d38eba4270072_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9da1805b88f4fffa52b6f6baf7d074
SHA1bbc62e547e156319480d2a95adb902d3aa3934f8
SHA256e120be5342faa44cedf22e8ee73b3fb384c85a467725d7479fb24c7a603408cd
SHA512e6888f18c34c0476fce5dd4d4331267a01585e8c70afac16ec70087d6ffa279fc06cdf2b28deb7ff58de88dcc3350ab3b7274425e6befe2731a2e07e33259ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b78709ffa5ed6c75ff2d85dddb1ead6
SHA13ffd7475ad589682c1c5f8070a65012cdaba46a3
SHA25665f270728b1f212960d8a69437758cef52895fb7373cb85ae621f0e06e5f0650
SHA5124b4ddd7bbdbb160e214b7318762d20a8012f157d798df99a8a8305a27ebe3748b6aeaf60f750073d1d54e60467021e98142e907c562954b8c50b16cd7c8c18a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c20352b9b678945f0a1c1fd0037278
SHA14bc7df9753df362d276d96c19eb5885cd0ec2f2e
SHA256c2f1bf98fff5fda932e5521d7700565cc76b56c0dbab04d43e92758c86c0c39a
SHA512045167d78e31a3400f8a47c4c82f3a437324a5cfcbd12251a9e0e7ee832f6ac96aabc72581aca09e9f79b4457938bcc2af06a95f27937395bf4b1cd7a122c72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fba3251197d97136282319445434ea1
SHA1d81fe8845dc77fe1297b53f7692b33130a58c713
SHA256e90b188f3fccbeb83ba7fbb95283c926e39f75c1e8c0a09dbef4f1a5228f034d
SHA512eb51d7534343ac9daaaa275ad2f8349c66dd7118c9312b3debddb9996f315d32707b6731587f3812285bbe7668843bb4a9e800848f1540f7add4ef8c1ad197b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba3af207770f18244e75f9fa33d384c
SHA1098fef6066748599b55310a57a35e452a4e149fa
SHA256e4f18833da758c8bef43b582c96ce27187df53250ebc6e9a5c88eb44504f1730
SHA5129be1cbc69c2ccd4dcdacfe5d9f9847e66ca05c256c56536b2df3182e1df190a83bb11723101311fd598d6958e95718e7eabc0751a333215e4ec19e56d4a30848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57832cf8e800e5f052959de57e75b510a
SHA1a56db1e618acaa39f0d676b2afa1650640993528
SHA256e707051e0e5afa2e1a3d0d0afda0112f0c87e595c99f31c650f0356181a8751a
SHA5126ef75737d5db21132f6d28e56758cb143fd400ea5a73939827efe8bc4763b5cdf71fcefa9178fd8b512e5b4bab21c1a15957761ab1d4b9cc152e76d15d3dcc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e29b7824933d8569c72a6874e463f9f
SHA1c2458238c782d716922978d0dfac17496a31dabc
SHA2566ceb179d7e9291d97d310ab10bd422461d8ca19d687ae9f9035d36ffcc967d09
SHA5122cd612c7760184e5398686496620acc1d9ff013535979334c4dfe2b205882f5bfe16fcd38db3343ee145c40c17968f9a208a87045115730cc75ebc802f82aa72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca0f1949e878c3dd1588691f9925a02
SHA142f36e96b6acaf4473bac4c9d19ff545edc8c7ac
SHA256456ce3ea1d3e0e96480a6b2c913bd442bd1bffa978861e50851a984b86b5fa18
SHA5129d0deb48a843e95293d867b15d86d10f98ebe0556e31469c71b1014f2ce3491c448334cebea9e060835419c8ce11324b93b8aed5cbe246d5cd2bec3b18a491e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7396f626f21387dad43c303eb21cc5
SHA18b38f73ad05655b0092544c032109f20557db2e1
SHA256717809c2a4d16c9a7c3b2fcd4b8e9fa58910fa92da1f030e3f5a3d52b8ed44c2
SHA51215baf58c6093c2b913ec3ea34ce36fa9de9a32908ebb07df6dec28494020495e8bb69727d57b95373163c5ff5b0e82450c95e1532a3f0bbe5692e4ef0a3f8c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51033798620da1dfe51c04b2a5afefe08
SHA15417197306e23a356c375a5e3b20ce34d5b04a37
SHA256e6885e657b4d1137741b7a8b05091820771e17f8ac9573d072d5492cec2b318d
SHA5126224bbc9379d43aed5bdc130256f7c5029e59938622f7c1ec6823c27b83a7af6220bda6925c69690a859056ca23e10ceddd652f37786dd8f5a706cefeca6a5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514131d2ead709098833f6fe16f302d1d
SHA1f12d03c61942cf3eda3e47ea8b4b5b4670d100d8
SHA256929974a65c6d5c37df760729e882f78ef0058684f89a965a3cf39768202a7b96
SHA5124506d96edd5ada531ba82a02e6624956ba30629216a1b05a246dd14f9004ef22194798c62c458a0cb5602301a751837dd5d606233ea5814e5be718c200939fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3aa295ba12c5eb6e15d8f3c03f0570
SHA144d9cc853ee0f5e8c8a9abba0cfea13105586936
SHA25678b2db1569e2db073f26c554a9d906fc031c5255e4f7bdca880335e7c7471495
SHA512dcad35fc9543a6652e6f0f9fef25b1eda837981020121f2a9bb8c37e00980d347b9bd4d926b0bcc40d4891538c542f2ec0339a4b01acb13ca9977f1b47b81a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c154423885145090235abda98e0e422
SHA11dde3f944e4871c2cc5d526f0ae16c516de92865
SHA25681cce25c211c623d1ba9e334026443d38ed7e59193c30ac24fb4adc33f928a71
SHA512c94711cfe0b72ee707fe9217b69cca39c55db1d71b0106429f2672a371d62c8397ba1c457c07095e609db17915d265d921ac1ddd0de3ccd003f15c1a6fdbe187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4469664ec939a32653bb2600396a35
SHA1f201292bb0a50a9a5a94ff4743f147ec7ba803cc
SHA256b5711eb0fa003f0678df53bbb14d18e0e3e3affcafb9895f99337ff10c5496f9
SHA512a8acfcf4d9fa25513fe25d167be510b2b22cfd3bcdabac8005ed9f6d108a3bc1a8b8b9b8d843f007c8792e1b79ab6224a66b8bd8b83f8635942feb3ed171ffdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc9b40880e8c3553ebaf87c93532066
SHA1f2403b1024d99df59c42a30720513f4532c42adb
SHA256b11e1fd43a96e1081ae65b994cbb78ab38cdd71672d4dd3b0d999f4ca3d78130
SHA512dc912050ed8c994481fe08c82a343014d44f746addf88788cf71e85196cf5e931511368010cae3e693b83334511a4df9abbfab1e5f904944d76a61851833763b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c51e3a64b20893eccf94d70102512d4
SHA1c0efeceb6b436afd7a552f811a89fbb5ebfa3d84
SHA2567a79f8bdf1c81acf689c9d12331160e7c7b572a2c44d5f47022113200d715c87
SHA51213d339c951e278e694a48d5b50c54c1873153a36e91318c8a603c04347229eddc6d9d3fbe3e30252b0d811c26481065a1a70fee3da717c9b4ab7eb4dafcfc966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57006375e6fbfb0ef23936206a5c75e9f
SHA1dca66e50a3789e2efd6102bf5d312c7f6e508321
SHA256fc9a0559b84f189d58b66ea024f48dacd781557bc485bc8839d2942073c0c348
SHA512e80449f956ca988dbef4aa765b8e09d9c32a9e8e22b7bdd44cc59c77c2679b9072f9e9b19e1fe8fa8c23474dbd87902a29ba965fc9ca069b1f561520a4e60813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3799d90ef82dcdcf1151ea56963374e
SHA1c27c4e4a3afc5afaf90d75429d79b316c0e59aca
SHA256e1fa71d08fff1f41d211d05a637681efe0a5becefad2f7f511b93994e6d2209a
SHA512f0d4faf12722196a625b70bc8c47541fd9c1c4a944b3d2d41d310745c8dad90d6e92f4296f1ecc5cf2d900a6907b2cee11cdd1365e2962056ab024785c5aa9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586dc82bec218221091f824f6333d9d96
SHA1c8cb7d61fa12ebba309dfa87ce6449f11f65ebd2
SHA256e45b994d46bbc1c4fc049e1ef15b8f53b44e286ed0a0e36d4dc596f2b6ae697e
SHA512e80c3f07a9b65420d8bd737e344b2ca6cc1438c2209f16e3e610d963de6abfb859cb3a029fdedcebb8333b71fa135ab1f7eaa024d7af891528c0bd4d52829dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252406809fba76bb7ca2a1f15cd50605
SHA16d96e85dc72abc9a36a78c462cb5385cf9cf82fb
SHA2569b28ff38bb71068f6d60456dc055cfb1e9d097b7123c2fe5a39ea2ad8808ebc2
SHA512389ed5c2a62044617c14a6ab897ef5be4a7f71c454fe9a59ebd12516cfa77fff75ff60bee1284640dcaec066540a5da94f5091e22152fc04428a0689651325d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b