Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
3a6265cf9e04c35c906c4ea18e3be972_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3a6265cf9e04c35c906c4ea18e3be972_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a6265cf9e04c35c906c4ea18e3be972_JaffaCakes118.html
-
Size
53KB
-
MD5
3a6265cf9e04c35c906c4ea18e3be972
-
SHA1
1a8ad5f03ea36bd7b0ba64de650f6fd8ac828a44
-
SHA256
9cf6d553ee0697c323862158867b1e7cff58c18a585f12675bfa67d429893386
-
SHA512
c30d072f0840915bd99dc448a6c341affde605be88114464fe648a6bb1644abe6d2e94b8bd0e8e537791a1f42c2d261b264478c20a4d5ef72bdd3760c76b3dd6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUBrunlYV63Nj+q5VyvR0w2AzTICbbXoy/t9M/dNwIUTDmD2:CkgUiIakTqGivi+PyUBrunlYV63Nj+qy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000810264920a7b612b08300dfb2754af84a1bbf0035878ba492f4a8825f0fcd9f1000000000e8000000002000020000000eed91458ae2fbae549100ed24fa4a59744c3b1eaa506e0fdaa9fbba92a1e691c2000000046abf7b70bc8e99a234b450b52e2f34554cd431ab6f747b4c42a796bbcb9dcd040000000ad90ceff4ac65f87bc8365cc559e670d4dd634a19fb5c8c8d96eeeaf7f2bf3b8a400bfcaacd7341392d16aa051045329cb78aad677d8dd195fbe225f77ca1b82 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000051233aebcbabc6c76a80e46a547d2f6531d0bb684a639e8892941e8847dfbb80000000000e8000000002000020000000f84e984834b812ee1c1333d5b73a5074fb2a9cbfe692ac4d0cbae5cd7dafd76c90000000ac36ad466d38116bc9266a23fd14c6c4858c760395c27bda579f6b53cd85a1e7e614582b15c17d18c5a891a82e4594b19668961711f7736875aa49c4e90c427ac8b1f289998bcd328cf8d03d224d34b29c39a858d3c0bce9c965461b4380c1778d8e9c836831d283a7c545b56534d69494271f0b2d4531ca2a5f04e6b43da0aed70ea466e55a983abc37c0195275f743400000003853dc56bd838e724386b6f15f03df71f7221d8f5ad9540d050253443117efae7b837fa57f03a6a32c9426730bc6fe9835fa140a963cc8be4976f58d48bb4bb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434903298" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407717b6ae1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0BA1391-88A1-11EF-85F9-DEBA79BDEBEA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2732 2188 iexplore.exe 30 PID 2188 wrote to memory of 2732 2188 iexplore.exe 30 PID 2188 wrote to memory of 2732 2188 iexplore.exe 30 PID 2188 wrote to memory of 2732 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a6265cf9e04c35c906c4ea18e3be972_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1d02ae9a96f11b9f223b711124de3e
SHA1a4946944d9ba6b3dcd2abc205899b68fe4126934
SHA25681f2c9e3cbc08e9a4b99b00e7d6f295ecb7afef396b5f2e4358843ebcce1b257
SHA512b238588f14a568051ec533f1769d7cf3eb16e97dde5753f20fbe192a84fab6a7416e1f3dda9fed64669bfac0c89c3021afb67ed4526ed3b28e50bcc154cdb275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530875cf50d548b0a5d2cbbf12c23df26
SHA1d0edd4c68cf99ca3136612b7c58835c13c95b192
SHA2565c6efdad7c183dc2ae1f0e7b1a6b3b02fea038f77e9ae8f71f1fbbf12a0f6adc
SHA512cb24abf277dddb651896e8a1c9384ed32470a119851045e865f91784d76a4727b1ca86e2dafedcfe425a00f9ea7c4c7293b6dbf5ef0206ee370d4f4fa5cb3d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9bb3876b264c960404290994589c984
SHA187ec698d581792a60f426443c7f86a66ae9fdacb
SHA256b4a9eadf849120f5bbab5013f20af242fbe2ae741eae1444d3d503a26c31174d
SHA512a1557b59850fac4cc035ccb6f184ffd1d7b5c808730ef9b44a6060b66f281ab07412211acdf00f4cacb35b9fa088357ca52d1a5a3e7ea349f9afb9df6eae9ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56109d418be191bedecafdb4a80943a4a
SHA1c39a3754096ebd1881c242073f94393e19d9790e
SHA256d4643b587cfe51b62b20525ad93ad0a9b80108ec9ea8bea7d3c750012bc8754e
SHA512f931ad01c20b353dc5d1ec5cb26992703b458b30e41c4c6542243bc7222169f4a44d59ccff834894d113a6e4c0071f1b14983b34f52e31d1f3546db402233068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b5db0d2e6a616fd1d375b33692267a
SHA1b4b378a40448ed3da910cc0e9acdecd541bb0d86
SHA256889485f412be87c8b114ab2b979a813d00756e5456b6c56d8992f75806da578d
SHA5128b180ca863666622c74d68844e18dfb7e0f1ebfe3ce254f5941c3ea9d4b99f3954610f0fb2207fd4cd028dcf71f3ce3a6f6b4d74d718df24ce44a7d1e7f0bf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607efed68576ce55d74385a11805736a
SHA1e86125c8d53e6068c580397b4f7f6bb39d601c6c
SHA2563d86c0abb2046279ac508dc241e1d261923c57b108a1635b02b46d2f85ffd66f
SHA512a52cc22ae64808821f8ee2ea659ec31e8e26049441753c14650ec6717a90ca382d08b3545b7a524e40974fb120f3ccfc4e1569755777bbd204d4579bad5c865a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598333d436b98d8f429f2336fec7ae50b
SHA17b0ac9ed751498868be2e02e8a7d6b99754fefa8
SHA256634c116fe961771dd7a02ba6fa6afc26099d4cf3aaf495c615013ab974676d20
SHA5123064bc9213d51474abeab384caec5d9ef85150e3145bb5488a3bcf5e55102fcaa9bf9fcff6dce5d4c7d769c4991d50f2e51f657c8c81f927a615f311a696f974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aefac1ede80f9ea02e383c796ce8d55
SHA1dda891f1dc2fc1304cd2af2168331dc1cad1c1e5
SHA256d133e52289429501310c0f6d745e4ea181571a7563bab83dd381523f8ddf4972
SHA51277b4b1a72012419cf3b06f2ea3be07d8da83a277afd30a2f898a09e65d4771d951c63c2b03d8545506832fdab2d02c7a0efab81f1b65d7e2f98db45d65d609e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9642b6f502de1712acb5ae9694954c
SHA1742228d807fe4224366f7f41e629ec1ef66fb426
SHA256975ef644d4ffd2c88768b7e29de0641fe84714e396d6b330b7ae8ab09be387ff
SHA5127b07907a4d21f7c5ffa1f574377b5caf6410e0cd415e88e7fc9e1b52ec07c40b5ed11961fd8f452cc66c6350e89a76dc4b8e76dc7dd0141fcf984cb43681bee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11cfc8b1b1e5dc8be70f611b15dc817
SHA1fc4d6d6ec218cba636d098f345e5bf0546a060b9
SHA2568a748597402e2d82ca6306703ce38a171a01335b8c559c7d37c343ec5639ea03
SHA5124f1f19d787bd1cbc96cf06e973d91007982148c25a3f05ee84c004b9d378fccdcd5756ccccb5dc54019f0cdf6c96c845c228bbb9785f7505f9887f7721921219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7dd36ee090bda26abd8d139a546d97
SHA1d2b2c4458fbe0f2114d9c1473d71d759ff35e469
SHA256262be2603fba7bfebfad27f5ccf95edb9779baf1947ca1fccf8c3feca53e5445
SHA5122f17f08534f218893290fca1bef9226c5b6c47bee708a7a782b458e1584cb1f74f93c96021ca90b7cffe380e27a1b9a3c450a7224874a7ffff2a790849a54ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ac79e17f1bfe6de318f455588ae760
SHA1d78e2c3abcacbda2902ce14128a477c6139af685
SHA25628522e5e00bb535d1fbe254186c3e5bb8d05464795cb474947873adc715206e7
SHA5126678534385067b4a160230e1a8161500ae2ccf24a155ebf07c0bc448a320ee22d4ae91d092177c250fe3087d3249525b962f76a8a531871078ae7cb32cc8221e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916bba257d439a70205e202638cb290e
SHA1e3abe5e03b5b26d1c63c402bb2922ae01a181773
SHA256ed9491220557f82f2f2e3c755879751f1491ef7bd505746ed49d7b60c75b686e
SHA51291b14e3a993bcda2cfc6be641b0be05d26c0a30f917d1d5f5ea42fd19edc804cdb8ed13806e281f1549efebecb6bc3bd9600c53027888efb0c83f15cfefd5036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b2e3f04f1c20a0751b65f4229964d4
SHA1346ae3fa92bd5b84c1bf88f21f6ccc0216caf1b5
SHA25644fdd267df1afc56f037379032328d1e8ba02e087ec9a6b3cb44046585053d84
SHA512011c44389011f932407436c855ce17b15b068fb3fe116a28f45fa40fcba034765371f82242a91d351494645af05aa0e9fe019a5545b96e91abc08568cfa3bf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be00b490a21a2f75573c90fac4d7ab6a
SHA15e9adbf9342c4ace1784c2b58b9b9b0c3c7598c0
SHA256b883d48c4456407bec8a8e3d2e286a1a34c1f9e105d2639982873d48830f2c26
SHA5120661792bbbefb3dbf9c517389ff6391f9da4e6cee51b2d19213808919eea8bc2e09e731994b87823971f8a5bf6809166baa7b15c8b7c0f40495da259e62c0083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d836f433f2f979fe4303487ce2617a6
SHA1da85801b141d69955bc2e09514ad017b3443bcbc
SHA256a225326ef9a8fbd0f2a03ffd463fc7b68796442d244fe3c5b91c284a1a3ab81b
SHA5125b8d666446d1e2c698bfb6943f2c8c363d9b46370895d466fda1d56b543bc81fa6932cbf128cda502c0b8038ca5b68ca1befe5a0fe988d6b03ca715747a93dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abac1ab218872e1d6033e240b785aa2c
SHA129d43dd338e8d6f7f8385b6634ee99bfb9a90b5d
SHA256918115d6f7d7e0f60a5ee31751841668c05a64ee7c6f8ee99f1755106a4fcb48
SHA512449296792f0af0da324b7006eefaa5decf2f058b55f420e7cc3fa26f9a47c015d7f9330cbdc76cd967a3bb7a3597c350fcc915eb0f0ad66adb2aebd93d1d4f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50440ba59645609872ae90d2528035c18
SHA1675f1a2b564dcde177031cb6d61497a087379a26
SHA256645b8832a8af416714a0956f43504bef6ec136ba51a82a2a74a56f88053d6315
SHA51237ba4c074bac2de418e078d358a25396962455b1a3646ee6f7254df2b730b75b9a9de1dc96745d5e7d2c2d5c1d5d68ccbd95329d6d53da4307be954add15caf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8872118a1dd05d7673a5ca6c031d75e
SHA16da62f526007e765cec06cdae4af481a7c6c22bd
SHA256b6c912612f4169b8c4c8bc6b21f745bbc33f530e6310f9aee4946b8001767e66
SHA5122ea99179c0413b304dfc4a4a78abe80f3dcf4fd0b39b08ce13d4bc30a6c6e16701fe8e8011931d7d3b7eb476eb40026b2cf6db237e3a8862393db3b427045911
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b