Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
2c74e2e5a53672cc90f398a3fcddcf77_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c74e2e5a53672cc90f398a3fcddcf77_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2c74e2e5a53672cc90f398a3fcddcf77_JaffaCakes118.html
-
Size
19KB
-
MD5
2c74e2e5a53672cc90f398a3fcddcf77
-
SHA1
2b91c877de994687de682959324bfa9ae25efb0c
-
SHA256
b5a05534da242aa16f1ebee15e476fdbfe603cd96953f8a5b44e067176c5ed08
-
SHA512
baa15c5a3440b66eea641556ed118d111a223a9d31bf0cca1652ce41883eb074753d676098a89113a1fa89ce73ac733b3addd800851c0d0016b91cb8999a3d1a
-
SSDEEP
192:csz7M+AYS/X0o0mAoXX4LG5maNWJUDyPcb76f:cT+AY8XIoH4LG5m8WJUDjS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009a57558981cdcbf4afef590bdaf16a0bc490402a24187a958479cee0dd9873bc000000000e800000000200002000000041cc9538a23cb87cb4829240c18a49fb89300adfb5c8283a35025f5dc9519eec90000000893db628b183197be823b4851fe1dde28bd64bc92358c4d26ab8bee9c8d067bb8f7f341df24086de64c1975f8d27f0a15fbc03f0e245b2d571d361f8ee0b3f8ceb7c54099a8ca913ebd567376e0351bbf65e10e271ab7c48803f2a1b896997de22e626556c14fc0d32602212e5308547053f4a6461ed1953a456174b3fec063d51464db010f636c88a049631af236c0440000000276da70efecf6d1513e661c1f4eef50c8b9b99326ba257476ed8b4fc21f053683b7aa826db8bcd642b7c52666568b19dc6f0324037f3a026371d902e7e84987d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C86335A1-8663-11EF-9107-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0cfd89e701adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f69532e1fb1f4b4bd705aa09f599eb2bc254732403c7b9ef5605b12df3ba3d0b000000000e8000000002000020000000f3d40d855c80e693e00ae84d4b672d4543fb01cba5fc2c610dc27986fbf4bc072000000081de9e5810fd02dff31f618333555aa3cedca04ffe689eddf841a4aa69b3647f4000000072e7d1ef7eb19d829fa291dcd7a48eb046e98b62ba969782a86c1e64447eedd6f818a15a224a41e12a1f056c796d72c4d31fa622585621aac63b57f4d3d972b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434656726" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2852 2956 iexplore.exe 30 PID 2956 wrote to memory of 2852 2956 iexplore.exe 30 PID 2956 wrote to memory of 2852 2956 iexplore.exe 30 PID 2956 wrote to memory of 2852 2956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c74e2e5a53672cc90f398a3fcddcf77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384ea52e1f685e8e1599d5eed989a2fc
SHA11f1ef4369a1305fd12864d92ffbf3c0aa38fa819
SHA256e73307f4f280ad33cb9a48675e0144401f4a7a6d8ec8ed39f7ccae08ec951809
SHA512e2fb0b76d6efcc3903b88355964502012cc17fd08f10e1b334eb671ce39eb930e15e4e80cdb5283e0a0503c7fffd0584c7f863389db7d19e878dffc84f48387e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b9465f1ef6313294cb646a7b922578
SHA14e2e54ec77516ca15d3acb516bbc6364e0a7a27e
SHA2569bb39f08051e7dde2e4c3bb5f6c3550d86a932ca64fd516b74c7064cfc119e35
SHA512ed3c700f969e89c935b67418972fec9a10d50ed47f3668b7a107b7d2c6d704c71e2d7418af7eb4084b1d42c4901087934d42e549bc3b1bdeabb0d366aaea70f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f2eb7cfc34027b394e5448666c6fdf
SHA1f912c5f213963386c27887ab2d92e212bd7b0aa1
SHA256fc6624b0d00c250e7a6860977a766763b7b94b2eb1fcdf59ce1f254c8f3ba7b7
SHA512b66649ca9bddeb7f795eecf6c82fcbd6e5aaa31a4f95f0b24108b61d87ab9f10ec9daedafc927e4a87af432b863c7993b840b346dec670891703a0bc143a94f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287591b64ed63cb8f28ea782a2226be3
SHA180d684ddac3cdf426e074aa4d95bf1a7e8f31ce4
SHA25684d1fbcc0f1709935a7884f75243f6826b7978f6161598fceb4783cf8a57c45a
SHA5124bb2db7ecc31a259f336185150d469ed9f00402f29ef180c77b1985856166880c5276197d379e207166c6c29987b1f5d4bad3e994d8519c6f8d0588b8703f4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9416a75bc2ebdaad07e8573c7cc2d1
SHA1ec2723e26d6b7025b44f1346fd60f9075b3748b9
SHA256b9247efa20dcd30ec95d412e91c6571d36d100d218899d607c320372ea970f5b
SHA512765eaeb9bb3d54013b61ac12fe64cd194955a42d6b00e7b832d0cdc221732e2b3c28cf4582df1dca665d7b476ab5dedbbdd09618c3c41a1466b4c735d554e98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54585e353138821f12aee090627023b4c
SHA1fde230bf59a8a5c4f450108c320879f9a4a663d4
SHA256ddfea12eb77931a8306cbd51eaeadde66b0535c0514b634166994960c658b1cd
SHA512b210d08175543ac8aeeea2fff9219e7b5363116620db89cee87aa7808c3f5b0a9200276a62701ab9a1e6be60db83028c1e3ab483286c3ea68bcebb0928dbc86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52974ee81dc1842b0b33bb7af09d61f11
SHA1c1316019ae4ac8227ad1d97a5c4fe31ba5b7b07b
SHA2562bd59a26f2fce15f398b6e8eb8cba679d5a8b7bbfaa55e904749ae57e9e1369f
SHA5122697455b7abc705407836d034fb6bd9a602b336efadfa627b6e96d152321c92099776d4995afeba0fd11290240eb7924503774efef256750152db7ee8643fe23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f912c05f33a48ae264eae6b274d889f0
SHA1f46bec1fb60388e291f698c892ee59dc124fe78d
SHA256a00fd350d551cc2b9ab2f50a71cfa982731092f5307a2196f65965ae0eaef1b4
SHA51231be9ffad54af94d5929b43807fcf8c0d4772dafae89bb6c4a286500d3038e1f3dcbb886eba4898fb6e3177f38379f4ffa3dd658ab803dbab7a8799f46697dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd41fb313f9094b6b51c719af66f09b
SHA13598698eb0d4119365d916a27865d526cc4cf144
SHA25686db54b96aafeb91e74da933ae4b46f5ad4dd5d7eefe7fd853dd0d1ab0d68fe9
SHA5121e8d5f71f678a108e643f1e42e6d30d6649eb72d8f3ab5e46304874ab022be902cdb2d2ca14f77dfaea3482a0ec70810df197cd547a1720c64a8d80d4b6c0409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cef4087b400f8e18723559b9962c23
SHA1dd4fe87d6dfe703226299cc7228a5ebcfe7db4ad
SHA256b5e9efe2e099fce9a40b4e0837f70d43ca1b345fa5e5fb7deb89770d625692e2
SHA512f164d7c021a03759c8eaaefc964c4e3880dec6da46450ad88c701917cb14dda1d147e5509ef4ee5a61e2654336f33c2d4f6eab726dc98cc61d4a21a80db8bdc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c374435ab158a6208758ebbbb01e7b85
SHA1f85c6fa2813cfe78a23ead2fa5d5eb652061d71b
SHA25634c682b5df8a23d728ba6ce578d6bcee10a045a326863298775b255a90cce066
SHA512e45ae80af8ace047dd734069dfd5305bcfb8a08ab2f0cc34bca2523de6605964061066dfbfa458797b4068d8d5ab539362a5435c091d4bdaa70311f20c60167d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641ab45bb517415843e8ffe31fe9118c
SHA1f1a56fc4af496614435d05f718728274ca54f260
SHA25640bfe0cdae0e92b9239c27fe098e57933a468b8c4fedc97f4f7adf1a81104cd2
SHA512929ce0d21df12c6e668c65bdfaa9bbf77d62fca3c519be8e4674efa47e1571b4b84eaa5f35b77a2313870a06c41cf892543457f41aa6336285bb1e756d198fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa30001dcc7f5815e673285459cceea
SHA196ec15d3a42f13d5c89cc1ec7d912ac345ddb0c0
SHA256086bcb4861bf31e80c1fda398fbeadb0d922a3cb142ac24b9ec2b321906c5cf2
SHA5128be9ca0c7bd08ae61ce80ced52ed16a297863c731aef6b46c1b4f9c1fffdc337e2349602d8f3600131ec5c8aa31bfb0e49416740879a4178664bd39f52997318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59defd1cec4f5b7d9a3575709945d5cbf
SHA11f365ee9f719f8f254890cbfe45aa9edbc1c9694
SHA25643690939bc7982de08f81f7408a7b4305d3733cba6a06c1e8d7590a895d1e637
SHA512cc26707e0bc7e2eba2d0a22ab2f851c4a252cb838f7428ae183b4abcf53f9429a58abb2e353765d0f01831505c8df407d37689997471502e4638c6bdd5b1cb8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54974a9b3e9709cac3d8c2cc4cb80e3aa
SHA1447c25a2cc824214fb35171e21ca3aa95c9f4397
SHA256a2d014280565fc5669875cf901e5ce6bcf47897e4fd413e8432484087c353e6a
SHA51248132a9c413dffee3cbf365776340b87a7b14d347d07d003c60e44c58cf794c8d0c6cb1ebefc708d8647e57a6b192b4c8f0e03be549a848f82861d5489c1ec47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f244acee4d4a1c4a663b8d9f10d64b3f
SHA149d35adb5073b507f22fcd0016f48a4fab95b8ac
SHA256129495b04d25a4c0004402f7c456d43e66cea4d4342e5ebb5db697effdf4f3a2
SHA5123132b24539d1cf1e6207eef3f16f30caf15fe2f766dfb7448755c89bcbdd10ad78e5f85623e40299658eda36e5e1a701cf6f2c98e1a0f5b3f26a99152c3073ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f0830c8565f711298c394fb8539273
SHA17005f7ef144438030a84f0019b8c3f86adbf9916
SHA256b8d6a13f09ee1a6333220f1968bee84354b0d2d5c3d183f8fabf5fa46fb0ee38
SHA5121d1c249c0819d43daab683f0e6841888aaff972381cd5d791ce9a4f59abd9f3013c36cc10d79448b41da330a5ba9f20b0186f568022e925f638ae9fdfe410913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae4a8900ad628c6d0f876cd574f8e19
SHA1bea883ecf55285c3f04cbfbe3999b4483b5ecda3
SHA2566195f0d9a29e1e963c7914186477b10cf9128f96732c0cd0a603c747a6ac475d
SHA5126fabb0f7cdd5c80edc018396a4a1332c74aeb286efc4fb63b0bc0f70b1152ff18836ab94d66a4bcf64aa568a1b3ef30e1703f2d226a8cb5580ea3fcc539b0f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25ba67a2b9ee47b9724cdfea2a6f7af
SHA1f7d67770fc2acf852eb8d1ddd4ed243f6705b14b
SHA2567f14e2a88df06281c197119424c4ea1cd357c3ba482e88130a0f4fb137a7675d
SHA5127a617b34e0a5f51e4e0eaa4ce5f949a7902d2857181225217372775f89c05976ed614c723cfdfd8cfbfb654d71d4c69332a095cd549e80deb5bd1571901a1e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e745492044260371aca19d6fc0ad424d
SHA172fa21d23507bfbd2430676fb7a668ad987cc6d8
SHA2563870a02ddbc6fb139367c98e808749e0478c564efc26bfe31219db340cce99df
SHA51273c46d68a085f7c3819f2b3160976823b21e9b8acaea0273be444813bc43c79d079a216d9d8cb8a52af2f18303a915358bb9bd93d944b4b4c6509f8f4f24b9f4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b