Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
b4e82653442dec27298b655e0f112eb0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4e82653442dec27298b655e0f112eb0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4e82653442dec27298b655e0f112eb0_JaffaCakes118.html
-
Size
214KB
-
MD5
b4e82653442dec27298b655e0f112eb0
-
SHA1
f14a9033443566bb0c91bbc448bcae575e1b12f6
-
SHA256
5439c513788826382806df060306f14c5d688dccc25eeb4dc8c23c6b469509b0
-
SHA512
5d94657906172545c3c4f7e08c32fedd4dbbd3f062a9041bfa01bee1deb12d9d08e48d0c20b6d92d0712e23f8a10213fd4d8701863b4b57c6317add13fe40118
-
SSDEEP
3072:PrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJcm:Dz9VxLY7iAVLTBQJlz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a0bd1b3ca4b519f3e92504ef3b8958f12007d3096dfbdffe572b2c938bcda9be000000000e80000000020000200000007553c0545b84c1cd895f3b603df89b5cb584faaa0ff3cbfb78558e284c97e1b820000000c8515924440a81a7152caac50fe6be66ab7dbcc8e4062d43b0182ff98dfa7c2d4000000018f316590fcba4e111081ad598f09f9ef97eadf1a083cc393085b3fa1563214b215305d09c37112ddb8f34c0086ffb50a237a038eea1291579375e0a85c6f327 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87A0AD71-AED8-11EF-B462-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439104915" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e046559ce542db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000569fc34f5e1585bdbf9f3ec0782babdcdf73723e18a007338d60acfec8281081000000000e800000000200002000000055b7ffcde35aff08ace861471e6ca60c4ea8df39395396dc4f028e45d0daf962900000009acda71ed4a0f039d40d72e02f05e1819f14bb30cb50ce39fc6ce4963e704987d8a4b56107da0ee74cfdb38de25d8caa93ac63861e9c2a111a1211d74890992fa8524a4c479798da787f8632e50a76af943f7ace877db2fa2bde73b1758bd2e9886306a0aa583a52a513018571d4adcd82fca58db7a35c38f4c1d1fdffa40dd8379e980175652a75d0b10631a9afe8064000000003dd6499c14485581c945e8405ef049b31419aeec290dfb7ca9df82358965ac0df8eddb71e3af2c3c40818f05e1179a3a3f80ca33ac1848e6858507783811d8c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2148 1956 iexplore.exe 30 PID 1956 wrote to memory of 2148 1956 iexplore.exe 30 PID 1956 wrote to memory of 2148 1956 iexplore.exe 30 PID 1956 wrote to memory of 2148 1956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4e82653442dec27298b655e0f112eb0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41337ea9722e2ca47a4b0f2afdb6e87
SHA1c46d01ef32edec12b5e82cbcdddd314495593170
SHA25646be493662c592033e8491017403698c2763286b38ff6189157fc0a3f92fd3e6
SHA512492fc6f9bfbc8ac42dfb311b17ebd27bf1ca35515bf644ba1c5a192ee893816274c8ba87146daac4b38ab4b969893b2c090bc9a35599b7682090189dd1519209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8cba9d5e511b5b773a70869a695855
SHA10055d8ad1bfd3ac786baf9172117baa1e49c6152
SHA25679d1b0dbe4ec7a83f77235e89bb6b053ede36e12d7ca31c6b436a99cd8a53e3e
SHA51231ee7d69ad98948994f8452187393327737a181a04e47623958099b12b0f4bbe3974e995d0dccd8e59019b41f835c5e520fb553214cbf0c3deedf443177878ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc78d7e3c5e8c5e6326217f95fb8260e
SHA10c2deb0969b2561dfefa0c651eac6ddca4dfb753
SHA256023afd4f7f80c45b99c68a52c31eeb3e83b798acf3e23e0f1b33f1b5eae0eff4
SHA5124e9c1b4fdb60a86248125c5587111e6c46aa571cd794662e6e0221dfc0a8598826539eb3749a20a98e1ba3655ca0dc5e6ebfbe8a14e36df7674c9acbb62a7fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18bd49fc6415548b3287dfe8604e122
SHA14a36a144f8aa88a3e4b802eea9e0accbcd179da3
SHA2562acde264708ab49b4788e733421fdf7c794f2fb9d8e0373defd610d6b0c92757
SHA5129148f7148bfc566e62605d0281a686f4a209f34161186350c37eac9e7ad7c1e26db16b078b67f59f055444d2b70a3e46ec413a4ed0e6fd72308e08e92796601c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655f9614e02f0622f830dda04f1725e1
SHA16e48ab091ac11a889111f8a9ce5089753e9b6124
SHA256516f464a40c0f46fad98911fc2d7d240be9409d948fcd06d0ac5787435920575
SHA5125c67ffa4812c117d725cfc29c31bbc2f633776dc22e25253bc89cb261930717992e3a8c93f00cd56e468f04400d922d8c365b8018762ce8390b73fece8ffdc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d30a65ccfcf506047be79356ca36054
SHA10de7b56448fecedbc16acc719d755b39f2b2fae2
SHA2561862ec872ed458abfb9c3a207d9e33148d92e76515441dc422284073a90dacaf
SHA5128fbd1854d12fdc2b49e7f672abeab160387ee2aaaddab6758ed3285c4fae865b1c2b5a9637978fe426ce51ff30101c46f9dd0feafbf77a9c03a9b2b9afc5004b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4033a591e1eff44326ee96afecedb70
SHA1e2184c62ea686cf8f65ee82317cbcb3b90f6525b
SHA2565b1f73291120977987c4ecb1e3ac3b07bb3b26565be4ac48b16015f847101f8d
SHA51233a0d716d338d414db0d9daab6696704b01a9e8c23aa01ab655bb16d71d027261842cae61554c6725a59f9e2174f47fa3e8fb95d9e5cac5096667a188ea4653b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98edca9e2680cf691f053b511b1af6f
SHA1ad3c5d51bae45d2dedea0609f982c5b78b83836b
SHA2563db5746c5fcae795a93e924fab628dafd9152704ab501edb397a7a0cd125b98d
SHA51246be06b129dd992054e6720f71c8b98994ace5f3c6b4ec2846711d9dbe623cbd6d775c45bb7eac27ac353f50c4a1fa0b278f92999924246b59a4b860d0f0abbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8c6234f2605c4dbb03c8169611b808
SHA196492b1b677be54712caf94147084751895be8a6
SHA2564eb2110d1e060defbf0db027c999b739133dc9f9304ee6eda1401583f20c2404
SHA512c9753409e2bfb1c5ec0e5e0954f75e69f18723753b4779bc68a6604230a11da2cfe5eeb335635b654a29d0067fc76d66c04ed44f4df1db60a7e50521c969ebd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9318cfb222f78dec62f4f8c803d6f3
SHA16b99da2df06bef76852071d38d8ec6e1ae0d6615
SHA2568ee8dc8cae4e94e8aaf48cc88da58b621cb3aeb37b0944fe3f834e43b9b32b9e
SHA512b3c97cab31bd8e6896534dc06de284607bbd887c12c49e28b80bd919a991430e36803e8a37f8cd673a01424b2c12d163709e3bff83c7c06ee5ad8aeffb9b8e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10fd6e1278afdc8fc0d477f467a7f4d
SHA13d5bcc51a9acaaf8f06ee02c560c2490d7b06726
SHA2564eea14e3d58dfd84d58237706c02246f31e39f5d578fcb26f4ab1db1afd3c16b
SHA51222e2af1684fb220f8e210641a8f6b82ced32d850cfc77d4673fbb8fc29f7ffb33d07a04ba9f41ac46f0cfc20d84942f19e5e43ef21e7ec648f01e59e147991c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9f3a7b45a7df518b3d384b57d8bcb5
SHA1f0fea5a6f039ffd3be6a3d10040547bc8359f369
SHA256faa0071a7133cbb0f7530e071c9d183a5021509b835923b9541874084f1fb11c
SHA512efdf4a4d18f34d15e1f331d62d466c14f5141fe11a68ee254082f887eff2ad10e54f06ae53f9a080ac7f54aacab1a2ea9cbd869aa8702b4acf880baaad0650b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d23db941bde0d47fadcea9e20472bdb
SHA1149f3d7b272a57246cfee7f2f94b8cf6bcd2f0e4
SHA2568608bbf468f679c1d5646ebee4f069a3129e09e1c6fb203287af8918d769cbc1
SHA512e73e643f05ce721589cf11b314cdeeedbd038d02faff1f1a68c58fa78bf6f7b4c403f1ff3b5a81b5112693a2dbd67d10040d6ac7da443041c7f42bcb41aee840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ef9f315676a80d917159e8f3538ec5
SHA1f0eca9109d293c20cb82598b74f7b12584390327
SHA256d182ae541b2a2ad46631f463dba19aa74a17c5063eda9f1cf2e04c237b20cbfc
SHA5124b6f914f49b51cec7e9a28668d7d664f275dbee5ad2e6af0ba04fa063d60885f8f110903732252f9a0ad32d620cd8ad7d64086d66450c855b158ce0d017c5161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f703d6ee8eae98cbb54ec6cb0959c6e
SHA16c162caff3ea1a47be5634bbaba2e82ca863f7a7
SHA25603c6b66460c45c019208342566a0806d2ca9a2caff451b9987626d2320ff8754
SHA51200a292604a5e50f547434d6b89614ef6fe88902528b0a9283d6c002575679566f425c99d1bbc4e8d2641f5b4013d942b97ffc88cce90bf889c220d4e22339399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c0ecc9fa39dd28ca335bfb03b01feb
SHA1d9af79452d1cede195eaf9aa60ea7e701bcf088e
SHA256288b05b678ac12c74f1ab8db6f4ec8bfa946fe49538889f940be46433d9244f7
SHA5120aae344343aa1d7615034bcb93c95b21699372d2c8c9439d107588fb80405d3b34d756c0e5b9fd0acbc4297cd0c7922059440395f59faf86440d4ce9ddedfa2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50865d518ec197b7899ff8fb2b4f2e7fd
SHA1be741c300314cd3d07b01900830df032bbd2e7e9
SHA2568e07f0b8bcae34c18c586e1b948cc3c69c9f91b6a958c1ad029bf25de342cdda
SHA512291e659d48f94c7c42372b052d6527c7bdb3193836c93b7fb6e36a97332caff553e1c8f0a4c8a123852be55cc95d916d89c763a6c5c368bda9f6f92003d97c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461215c056ea32235a05455b44f609a1
SHA16b76e37095fddb94db6f3e44b6fba044f5d3344e
SHA2566658f58a7ea9530addde008fc740f5d5e1c76c2c6e5ed6f72f9ba1b0134fb9b1
SHA512631f5ebf61c873fcbb9733a2095159bc7605b642a40abe6fcb40797c00d75f7bd77f8f9fa371b53b5280cc6fa4a0fc1395af830225744376518dbd23ab2854c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c39cffe2f22e744f9a84435a84b2d8e
SHA1994c2b172d785626aabb0ea6ee707483fe299519
SHA256d6bbc02887bff37e7cf21ffb3981fbd60f5f1171ff3e8faa6294f381fef1e8cb
SHA51216f2c086166e2586e24e17e3427a9a5579cfdf8c308be7dcb918e38e3335b58f1dcfac8589056e5b4e5ce0d42d13c3c004fa631d7ac730ec24995cd76a3a17e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b