Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
266ef0ba679ac7e47ac02b77bd58d6df_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
266ef0ba679ac7e47ac02b77bd58d6df_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
266ef0ba679ac7e47ac02b77bd58d6df_JaffaCakes118.html
-
Size
53KB
-
MD5
266ef0ba679ac7e47ac02b77bd58d6df
-
SHA1
eeb82f766fcebeede8692f30f385b47f2b256220
-
SHA256
7da66430745374bd81e8209b8a8fb0a922d0d8c135439e07f4491caf619b8676
-
SHA512
8b5d36cddb8ae017d9cf57ef8a3f0645552098641b4aef07f96d9d4a00beaeedb5e5a628850ef697b563caa8406a54cdcf78b301facc1700a5846cd2bc5f2beb
-
SSDEEP
1536:CkgUiIakTqGivi+PyUdrunlYJ63Nj+q5VyvR0w2AzTICbbWo6/t9M/dNwIUEDmD1:CkgUiIakTqGivi+PyUdrunlYJ63Nj+qz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000edf9aeaa19c7d6859639df7beb9918546facf8f746890dd40ec1abe5ba60a30c000000000e8000000002000020000000d2782bb4ed4fb2da7a6f518c76c2633102e7d35f1956048c4e1ad38387cd61f5200000004e9e85b94a48faea52bf66d691833fe43de52abbd1a45b4e2607109f257e689340000000f14b88e5b8348b879c14ef63ff62e22c2c21517d9f7e03a447742a4e8b4693d308e68bf0376ccbd8e5f61f0c62cd98b3c55801b4c85e6143094994698b8a3823 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D710671-85FC-11EF-B9F2-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434612201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407051f4081adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000011d13e2396780f9386d92829e6c74e4f9f3b204055a8d2d2af27c5152caf26cf000000000e8000000002000020000000066ad9ed822867f8e324c143c450dd01e038bbfdb2c23fddc98c193ef8e94686900000006f53256fdae635b16d4baf5d5f4ed6e2244e63dd74daceac50a996953615ee000a2a160db371b993885fc6b5a97696a0198ddb70c5c074db50f29041b7c3eb56a9336a6ead5066eada878d8ae1bf87580c7deadf2299898d4f92d3eba1149824851a2a116b8550ae4a79b0b43db132ab175c3ccbc85893104a32d45497e5f97c7e7b9de1c266e2942c9536729eaa775d400000003263f4fcda0ead7c9786f878f0808ea007896ed07c34262fb7a2da40632a7bfe5395534932cf23f32c2d1055aea4be45f18d9f8daae5c9e49e2c37a67c8d88c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1152 1076 iexplore.exe 30 PID 1076 wrote to memory of 1152 1076 iexplore.exe 30 PID 1076 wrote to memory of 1152 1076 iexplore.exe 30 PID 1076 wrote to memory of 1152 1076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\266ef0ba679ac7e47ac02b77bd58d6df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d9bd84739fdd345fd629ae5d18e50f
SHA13350fd8d4134a709011d646aec754892dba5f867
SHA25657851b6e06f7380ce29e2da1abeedb8519329e9b0d2f179f1c4c8fb40e8a2dbb
SHA5129f6744454c125641c3391c08e0b65fd2fa47cbf1a4963319e14b1aa3b52b56153be64a0d2e0664a8b75e39753c4af21279b75c4a9c12a5ae573d701ec1bafa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea89bc0cd9739f8befaec98bde1ed40a
SHA143c8a67f373610d493f4aedc79308d51e73ba360
SHA256e28fdafd06c256df2755f80580e14c9a196d1c62cbcfde484002e51029961eca
SHA51213ab39057fdb5df6106e1a6731847b56cc58761560108590f96a368ba4e23d88fe0428bc1cffb3b27b0782d85e054f473d26e07c87ac95e23cfc392fbd42cb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa686ebd376e653833d9b678df8c5c5e
SHA13971be7fd189a7476ec12585bda057ec73ec523b
SHA25660309606377c0c335bb5bbfc8a26337383a108f813f9f8425564f1f3286ca520
SHA5125bbf090c7a3200f159ba31e0e9e4daf259ca41319478e9f88578a122723e245950674d21d7a9aa583857b9afb0ba5e7f0a6fbf13828b0292faf1b738ac813bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566dae2de7091e3513a8861b812ca3bf
SHA1f599578c9e9e61eb4c2fab36cf2e49b47a7c4f83
SHA2567dd7addb2d9555dfec64f6e984310440c3abbea64ca4ccd7a0112527c51f0580
SHA5120f07889dfeaf373e6ae65d33f7d7c90c278dfb9b0509a024a43089d308a94b2a21cd998aa8f3829f28b1742d1defc2e1d7d3e451fbd26c1adfe616572384e2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e628c100bb3a231b2af4ea3a3eeb8e
SHA196948d3e4590f5316286ecdcee80b997027aae41
SHA256a795987513521526864fa6a3257f72e4bdf83ff8a1f8c206f1d17b1d71d796b4
SHA512d94d90396327ae5e637aa5e65ea9d172933acd87a2bda26c167d1ba3e301fb707b8a69dfd8a47e120d6c82b5828180e248e1951ebebbb8f8ab2e1086c8484d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5d12edbd78926ad9790a9a2ef3ddb9
SHA1c71bf554225b558022c09337e7511e8e07bc40ac
SHA256c3206c8ebf381f784318fe2088ef8fc2ef3a40c73aea74b29bd208db0da07663
SHA512c94233717b6f8ef0aca2ccaa671535bbce31a66c74aac64abd29b55ec59bdd833a88d9a1cdb0d39a5bbf7d0152a288ccc69ffad2add1de7264fb69249230a3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f44b7688712a91d6cd81ab663c61e9
SHA16a5e98dbb1ae12c9bc19c82bdb3645f2934e21e0
SHA256a6c7adbd2106eefdaefef3cb64b223f9093abe3ef822809a88c146f28e201cee
SHA512efa7f8197644168838412b7d44f994aa56e17f1d13f8ae62c6aecf53220316816ecab6b599dd8a087bf7ef2a11e5983952ce3fc95719ec09ddb32846fd00fc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd653035d47a3e4b4eefe044983bda1
SHA13e6d09200e743026d494f5300ba9ea2a453dd38c
SHA25607858d9f384842dbc3b0d7bd093888411445f69221c84343f4d6c690c9acf049
SHA512aa3fd32273fdaeb26dbc9a1ec4fad764555be74c910a50f1011b795bb6a29d225dcacec09b02c5b075c2c735b101845a1f046875468762f1fb62b8e3b5a272f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c93981b04723f76fa77cc5e724b0a5
SHA12a4f1dfc1153e31cd72ddfb8f54a51fe9c03eef8
SHA256af380e78b44b935f4a0f522cd09aed40b0b9f9bd6cad61cce90f3062a5a834b7
SHA5125c709cfbb93932cbde796f9c8e4ab27a307500fbbc2d11558a91db59c2a44cdd406b367b5303e99e9477216d1023c064bc9aa3b8afe703dfec275e92f98fb291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb032b4aec2879c9af2a22267961c0e
SHA107dfe32ad1585667beed307ad9feffd21798819d
SHA256c24068b2acce2594ca1c11fc8970edb5fef8e212ac7baa3a8d8be5279a93bd21
SHA51262a8226dde3032dd645a00651df89373cf05b4fbca370d079c66dcdca80dd30ce9055304c9c6f4f784c4379653b04e577bca4f874ab74b3eb324f898753a22ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb20a05bfc470e7ae7534e726714283
SHA16a97dd40ecc4bcde77fc802f5d20511a27fcab2e
SHA256a1eccc8342eceb95c54dd4e235e1e9bd205005514f3ac8bf2deb82bc5d5af532
SHA512e704b0b265b0a8fa03577d988702c81832a967bca0235b4594ed66d6183b544164fccf875ad93f38c277d3d9b3e1b820cf08f4cc0c47ec5f64fb3e4eab9de73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d439746fe190dc9f32cfb135c86e3587
SHA150200466cf7db1a55e170510a60c8234be5823c4
SHA256c3db29738c3aea0bb462c64b955f16e183579aa0bef12cb5f2a0aac4967955e9
SHA5122bdb21db96972c1b7c6bc298121c6c9a021170554f6d3172b9363c61ed4e120154868ec621bfaa3a2d13cffb71be792e3def8a81d763ee191b7207c43c2d969b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbe8c12721b3ae6d997b3835253d9c0
SHA1295c8f59da4d4ac833ef36c2df8db7e3c86fd5bf
SHA25682224577d662a990d22ea1c42875390bd48169a073aaa84425ad1d1a7af4188c
SHA5129f97beea2314907175c750a7f03bf2d4901bb92de5002b684e3937a44df6580dabf1587eb621eca066b841d1e6b1b97aa5c219bd74de7a3c3f53bb98fbe4ce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cac919aad95203633852e913aad877
SHA1a53a85b9c6748348a70c2180ae75c1520e9ea2c4
SHA256018bc9315b4dcd8d9310dbe8ffe1bfef0a1509c9d61bf8b47a461c926408a62d
SHA5125578419d39884e09eab0eefe77c44395597da0798f279bd683302ba6f16de03564ec75d42aa5a084d90a4f92fb7afa83f6934fbc315320e464742c600b42140f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271941b0ad07df8e725bf93b36aa2a88
SHA17f2bc25b43111dd15c2af2ae0eb7a5af2695f839
SHA25686679211dda25a4452b788fdb702599c89d2dd44d5284898aaa0c8618533f8db
SHA51298b8d60cb9eb5cedffb9a7c8fe42d93a958851657b9bacad8e4343ce303003948ebd77e4054d6cb21000c13733b5ea8950e75c4da57c447aac598fc15f3029f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58524a35a3030a0639173b028fb4131f5
SHA1d8d09f8dddd828cd09084ed4a5d5dd373e721427
SHA25641ee680308e7368515365f3dbe39cbf5e28eb7f83efa9f59f86a94e1e80af1f3
SHA51295fae5e5045ede2a3d121fd19d2bf6c23f765ab6f6f172faf77b85f2b6f94d8e59d805f162dae6dca3c9a7c511ad5ec6037c7ef8bef4df88e4f8461df8e634bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e056ce32e3155f6c458dc26423218c0d
SHA15996398818769e82d7dad02fee87c8fdca6f2faf
SHA25616b6e893d1aecedcb3fa9ed692fe1e4741009ee0ab6c6f573751514cd4852329
SHA512367702d27f8433990d6a156ba431d92046cdcc82de069403ca0d37c1e12658bdadb326b6d0097140119517adff33f2e9c8ad464c38cc8d4a6e3ecb0333367c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546738e66acddfd5fbb5b74a900d6059a
SHA117f682d4c6549f45629c93da9a4d0f4ceabfc88d
SHA256fd4dc8e9533875c6eccf6fb5318801b13566e87a4e50fffccac681d3802fb0c3
SHA512782df5cd4d9ecc8106adf5a24137b619a8f59aae2d3462e5667ad3575bbf952fafa4c608143100e7f80748c294ff600513dcb088a613857c115b99d86affafad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515af4de833ca87bc2fa9eac94eed938d
SHA1ed3ae266f0b328553fd831a36ae10be56023cbd3
SHA25601dcac5b0552c0552a085b45035300ee0904fafbcd2a4cf252837eb3140b7c1c
SHA512f895b006a51dbd214b99d02d05b44d41df4d7955d121eaefdeb073c68b9a14a54266a164161ea3cad7abf0386e6e071454e2f1c3c01901801e55115e7bbd766e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b