Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
3f2070effe2cd758bf6d175a503c13b6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3f2070effe2cd758bf6d175a503c13b6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f2070effe2cd758bf6d175a503c13b6_JaffaCakes118.html
-
Size
54KB
-
MD5
3f2070effe2cd758bf6d175a503c13b6
-
SHA1
ef5c6bc70ececcf3d3aa7b0446a6c604ec1321a0
-
SHA256
55ba118027032d03d4aba0fcae41f96d3c078951ad57f1bbd9acc354c94da6d1
-
SHA512
576637240031bc65f49cfa5fc7ed72e2d32358781a0d405ca44d5c3fd9e873c4a9606f54562c663fa52f8aef83aa2cd6c6b03ccf0b91ab2d49fe47d397412cd1
-
SSDEEP
1536:nEtG+ARMICs2yMOyZ45aQwE2eVCeJxc0aKBGyDG1gPEtH:nEtG+ARMICs2yMvwC2x4KB/G15H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EBF9CA1-8947-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434974269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 376 iexplore.exe 376 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 376 wrote to memory of 2320 376 iexplore.exe 30 PID 376 wrote to memory of 2320 376 iexplore.exe 30 PID 376 wrote to memory of 2320 376 iexplore.exe 30 PID 376 wrote to memory of 2320 376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f2070effe2cd758bf6d175a503c13b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5151c91148661ad47cfd1412c7b866d97
SHA1754a06e45f6d7a1b4d290f93bd07638564885fdf
SHA2560273d3b00c579f1071c58f24dd531f70c4604e6a5bfbbf2e099dde3870fd914e
SHA51236432c5501d661a49409e0c243889b96de1bb47ef38f11d875f97568bbf7538e47fc462ddccb798bac1eedf695c72451a559131e0bda7a6b8cf78bd4b6a7a926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905def8562d69f68aa08970a4b6c6058
SHA1ad186346affd5c250c432ea5b17793038b2f662c
SHA256d01a6a9c82ae72a0492198260dadda22d7107af17d611bc774c4f844a9fc489b
SHA5128664c67cc818079316a1cdcc021c847356a07369328b5ea5c94d507312c9f676b2d76b72bed0e95aaf334554b9d210944d6e68c98aedc8933977217c8240267c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec9f3b6a3c846ac041137f88c28b42a
SHA14036e061b8356bd1d44e7208bcd7134780e46c77
SHA25644f313417226494eec561ae763e8b2cbdbc6104fe4d705c29ed8271ee0e72679
SHA5120e91494e0b7416876ec65a5f71af9751803be7ad26c62511d977144cc219d24454ed7cca95b60fadd2bd4985934af2f8a5eb85da1ded78afc8570624a27c424f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5aed0537075ba4c8491102943d49e23
SHA14a4dd02085cbfe62520c27990266c7ab12e56225
SHA25699ada0772777ca7360a9540b1ae2919e86ac671cf081e2f975ccc4fbb571e9e6
SHA512ad6c51340e249377e8e7de0b29c7061a574342a5fa2d942b565c8cadc3696e40b5f3e9a5e2d53baa4d1e8360355bbb1b26e1d3730212fd64166adbc85f436b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a69084bba91939e6552900eed5d2ca
SHA1be3de27f5870349decfd35bea94ace276133cd17
SHA256de28dd0466fafe8d9c232c5f54e01b005eeca46a8e353e6cef47b4314002703a
SHA5126abd4ae7734b58749f23ce84ac41e3c63b8510a4a5c6969b7460c3f7d5945ac745feb6d174e90af5c0019409aa4c563d1d4be8b0c23cc3a470380f1e9ff6dfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9125fdf79a15ae2be54ea39c5a8f2e
SHA1162e3d38b86d37b70101e4b66e014c53d013194b
SHA256669e80618887a9e30769888d0f20a5a0bbc8dcf174dd67ec45325c8e05ce702a
SHA512c7e710cb17909cf8634e10e4951c44a8da2cd9dc20ff6a9179a17d5a81f29fda5523033b35d1caaa6b545f18b695340b16bb40c4c6397632807681112c5ccb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0717b90a3d1044328f1ee4c7a8e9341
SHA15d3d72eeb2ff826846a9d3e7156bed8f4f22c043
SHA256c3595a132fa2e993a84e2540390b3b94e730c96f72e60b0cc5b2bb4cb09b1b3a
SHA512a5c77e8f4b65af401a7489f4fbc191364ec973d820a1d37fcb0b2c6c2e393cf440fd2be305392a85e57f71a75a67a0c99d34667e18aa22ee5cbf29efe73d6245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cba6f588fcfab9e3b69228384fd25cf
SHA1f42fcec7168716b318e7ca243a455a5f1005bd7a
SHA256bec2d8cf8d61e362fc081f0085b2bacb435dacde9447653bdb65e86f2759120f
SHA512fe0b8f58fab3c3f96e9dc0572bd03d43229d96b26652d7cba2c1c5c21bb40cf02ece535e2c6acfad436e47cf0bdb1ace2895d309042877fb9c6849dc32c4959d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05e082462085ee96c253d5692040769
SHA164e7e61bc60dcd4a8e1b45903326b236473a33ba
SHA2562d1f4d5a89a523fc503ccc41db2c4615fa0688cddf82047e4737b8b680e810b7
SHA512d1c826dcfa308333ef8e7ce8dd2a888d2f7bba3ca44b33c32b8aebd4b92a9eb90907f1db3b555b78e9f6dda134056a6062b0967262d4de8d86d1bb32dfdd8ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93a7ea6f40aa4ef8b2fdcd6b4b6a7bd
SHA1604617d37aaf21c00d1e518fe914d228ff6a445a
SHA2562cc18f12046149b55a0323e20622aca4694e306ff907f59990c57c94de8ff352
SHA51247d62f2b7b4628a565444e261ee643f72f759d7e10c3af26c48cedc2c727384f6181e815b3335cbd2573e6fb6bfd5d11d7472793ebaad46b53c697ef86a175fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579523d2fba5a99bcdf975227412c5eca
SHA14f102ee86688005e7ab04f49982c2522e636ff63
SHA256e36f456d7f3f1fc204dad0f4ac633969fdbb1075e9a6b6cc57b277a44b517fd1
SHA5127412cec103894b377f7c556ae3e3dea157d2e8bfd554ee66222b9f9c5ef527db7fb2324748c14ec4c214502cd45d48b887fd84775f711aa5fc11b5f432540590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50868e4d48129f2bbbffb72a3c4506a80
SHA16cded40ddeb5e36546af5499ea45d3eded1ea0d3
SHA2564eda0326ec87bfcf42ffe82568932815de5d87ee3b955a13bf2f9e6b49cffd60
SHA512f207c4a5355de41c3f70ca3cddeb77d56c4bd42a960810ee906f482abf497e273752d9c549de9b15f4b57ea6ef3ea9271a851e19cba905715286e6d8b9cd4ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71269da646853fdd35f98dd1411c0eb
SHA1a187a582d0512a5c42d7633692855dd3a797f238
SHA25649fa10ae1d20443fd5ace938acf46bcec23d52344b7be5695ec9685086a47de1
SHA5124893532d39a7bef060aa3ce1fd3e453c55f248e2ffae3a159a0f4d7864a3554275e84a95e1e1d4da58bee53e3f1df9c1b34221ea3a6aa2e37821aa781f919198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f242e2f83a0a80f2df969afaf6a9233
SHA177b05cea8b1355dbdd51dbef6a386ebe177a4b1e
SHA256241a8766f09a4390c8aa11686cbb1e7af1b2a75cc87857da1ae314ef551edfa3
SHA5124d0488a63867513d04aba7da497084b3a67d56fe1701597863b64b807bcbc2eadea9f5b071efdf92cf4247785a1e2773d8905d5cb46b73cab1b18efa5b6ba5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5714670771810f433392a309a5c4dc7
SHA15dfa1cee83047f246c96a2202f4d560c4852ef71
SHA256c0e1f058855d152cc3822b1065574cccaff5cf75c7c25936537616df05152e97
SHA512ee90fffe8ce4d4fe4e7f90096d378546a5704fc25b385a2a8871c148c51c430ab91f4ab03dfcb57f22607da4db89683016ed72529e27c775e45a7fcc6b1f11a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddcdc73f494d71b70f363515d700fac2
SHA129a4e65c42efa227bd3ed3bad82829b8a96dfece
SHA256fa58ad0a88869e118633b5f6725d94b511a6458b930bd8de09dc508e997051a1
SHA51297f9ce0dad2d6814d8217bb76bd226f03eaa8310723db8fba970c6a7fbc260dec912ad1a02c0f0e0e3eeec14f1bee0aa4d83aff4c5b037708ef7f2f69c32c63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed3373319a9d1291a2ab57befa390ea
SHA1b4a7606c6afa923af6f2dfd6a5ee36c5f8989702
SHA256c1e9b94c9fa1288fd160a2b258da5e3050147f9171f75e1c2bef6dbb244beb25
SHA512afbd773157cb3bda6eb4bbdc37c80970e48557c2aad5dfa3ada8daf14b975706641ff5cd935a2f2fe41527570b24c89bcd08e15a76a91069675ab5fd035cccc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d764d7a153f1b934de9e857449cc4a4a
SHA100eff3001ee2fc65933dfe39f2572d0207915ea6
SHA256049a37d782bc3f9d7a434d461949993ef6ea994c66246d89456f4217cfc9ce05
SHA5124ca3add8e21dd8412b558d0d17e4fc188bd8d1cf52c41fa3a2159ed0036ba6c87f587ce559353d1e1a93bec2189d15d1c6375a321b773da0ce1d0a314fa1adfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1f77013959111a35f66bc9ea99909a
SHA136bb9b05ef38ae4e5c4efe44de96eeccdc7e6b40
SHA256e0058328fdb630e828ee18446d05ae9155b9b19bca245b45235682ef91bb09f9
SHA5121234fd19073cb2b6f4fce68f35733379e57d6c7eea46e829b2aeb12a759af2f4c4b7b2ba3cecfdd2a08920b0117bd71cfcb4b1865d544ba181bf6c8578d8b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d098c46e8124b0e3a6a6a015766a1842
SHA137b6c1dee070c7fa2eb87302f9f79a16bf46be68
SHA256c0feb636f485e4323ffba86c8a95b4748ee6f15df97546c77847987255d1d4b0
SHA5123af4bddcff82295ac3597b97802d4c5a8ec4026ba87d7bb7a511c5f89156e15bb7fa809d3024d39875953a2e8b05826da76c1793de503dd840727d8fa594190d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5febfe304245c2d7a34a2191139a27952
SHA17bc44e97d21d34cb412978eae1d4fcbc96c2b8ae
SHA2567835b1612acc82b635c92e3c7296a59c07342f053dc84877bd959fb5a04c3e44
SHA512c87ae491b891ebf877cb12599bd6dd0928451f1fec3dc780b0f94e63e7d585a734f35ff237f5532b75aa84542c3caff1cb3c2d1410fcfc1c3e385daeea570a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5782031d528a1329fd34f70c438931678
SHA19603b88314e992b99e1be318f77674744fcda456
SHA256e642973248b18d087e5698994a0736dd5660ed3d0b6f7ce19902fd6fa9f60943
SHA512c449c395a582bf30fd060f41093b672d9558c70311b76f1ccbfb68c918d023e2c7e9fbc3d3e587d184e32c58678bbb0ea06bae4d11baa6b697aaf2e45335fa17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d585d289c73ea5d126910a732695c238
SHA1667a62f969031ca71f70e3bcc72edfbf954107ca
SHA256ad075e2e71f673fcc6640671de0163c7026d3b89571f6eb5a1c5edd8816b5f1d
SHA5121ded5fde7ccd4590d3f0edf43a1060aebf59a47c07dbc3732a355ba29b7bedbeef69afa4f39befe6b6490e10408ed3b34df1da477af24906a190fb5f8829cc13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\cb=gapi[1].js
Filesize66KB
MD5aa012028297a26c039c37ab25a4bd17a
SHA125f23d01b5f580c00778e1c010225e5b8c73b66c
SHA25655cd2316edf7159b623e4ec2c9e3a334027c01e2d1cc386f833ebcd35ed87b38
SHA512d346eb082674fc26d562da9a12f36ad2cc7db1f1b35c891a8734284cf1bd052a967137c1281982070688b2bb2e06c7f4967d1c9397311a31a11a8560b9c45fd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b