Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
77a540ea80ca9cdee3e9af60f1de84e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
77a540ea80ca9cdee3e9af60f1de84e4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77a540ea80ca9cdee3e9af60f1de84e4_JaffaCakes118.html
-
Size
53KB
-
MD5
77a540ea80ca9cdee3e9af60f1de84e4
-
SHA1
d9a342d7ffd7e982426df5e00de71935bb016fe8
-
SHA256
164b637e42df82f4a46246b34847dc1c37f939eaa75ff3d543e27318fd1e94aa
-
SHA512
6474427aa65b3539a71f4c93cc7b22b842d63bccc7ae07a3286e07e242b6f42a739e4099cb078cd4efbf5d5836825b529306c521101feafb01f57888e464b723
-
SSDEEP
1536:CkgUiIakTqGivi+PyUdrunlYD63Nj+q5VyvR0w2AzTICbbAoU/t9M/dNwIUTDmDk:CkgUiIakTqGivi+PyUdrunlYD63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b185e556e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000021eeaa3d5796cf62a12b924c068f95b4fefbd427cb29ab6df0982522aec08f30000000000e800000000200002000000077e9134adc5ac4b9e1acec34300b1553c0f42168cc1cfcec7372d8b9e03c818220000000b5acc9b601fade6b5b20d3f6c0b007295956025e09750dc463c1c53203335bcc400000009867562bf264aaaa82e2c43f33f4cc4f985b31281887f6b48bcce0bfcc592e8d99f479887d0dd1f02064fdbfb9dc2342d117680837a28271897ae915dd53f51a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BB868E1-4E4A-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000471f37dc0c9c272612a077601608946ad6756a08b04580914cc7fe55102b64eb000000000e8000000002000020000000fc15be6e2b713f1b098877753badf95525987f7fc5fc13407b5919b653585563900000006e2c5cb62e239826b43196dcb72ba87c47918e55812f0d1ff137f9e57381e7885c4bdbd9eabb06d5926adb89f7cabc5f6612758644ec60d511ddc41ea3434c11d368b8ac82f52379ab435cd88c69aeed065037b09c546d8bc14c3f18eae9e8cba8f85509dce74f3a45658364a5191665e6af27ab2f722cf67a446d48ce0321100264172756133ec74cefab6bb5653cf7400000003685bbec9a542925c6e293f170317340e5e61e1b25a8c7b3edae1372dde203552281fb0674d6d71098f6fab0946cec7b8eedf1fb155cda46f2cc11fe2744a721 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428488409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2296 2272 iexplore.exe 31 PID 2272 wrote to memory of 2296 2272 iexplore.exe 31 PID 2272 wrote to memory of 2296 2272 iexplore.exe 31 PID 2272 wrote to memory of 2296 2272 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77a540ea80ca9cdee3e9af60f1de84e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fb5d35a58da24374db4f8dd73cbba6
SHA13cd2649854b9cc3bdba8c5125dde9b580bd364e9
SHA2568e499077f246df30ec8832cd2f4c377f5f331df4c27a41cb6c9dad831c596bf6
SHA512b0a970299d2a9b6f3a7cc46d91f38b9e9dfdb22d96d46f6ef90ebe5dab383e9736860732e62866a1deed801f5a896f18960864c31a4f54a8bf41fb1383403587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598add42551a42e6ea919f0480820f8fe
SHA1e213c5843746ea8d752f80338ca9bd1e4add6960
SHA256c2048f27f3c24bcd18393509e134149404803f6abf058065a034c2a84ec07b83
SHA512378e72dcc01a03aa07a962a9b0ad3b19f4e62d63efe315d5748478e29d9c57d80a497ac8ff46485d86d0799850903103c0e6e3c7c5950ab5a67eae9847b82fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d629391fe00797a0f2475c29d0c632
SHA1b5f8f8b8c659ac775c61a4aa5c8e692091f1f0b1
SHA256d7617a4c66922df4c5938dbefe8175de9d759cdaffb5aaf09bc6c5e7fcff183b
SHA5129780d1e252dc63920d0cb50df4b341b46fc0553e788f7b775acb0966d4e10e14b8f36585e19a09040595f9771ec93f4eb3d26a547c7c9ce91d0bcdc6f7e504a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2532078a9316d2214b8a92c82357e6
SHA13893d79fd04f924eda6953e1acf42db0605ea9c9
SHA256a7054bae5e676724bce3ecacae55e151a1e5cc13f6577461a3b18532b3774bdb
SHA5124e79114af34aa9a8772b1961e86e647fd1055b51420a1a773d199349197e08522764e8bb81b0f43a59653f4160216ecced7372e5100bff324fb97db48183a33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545790241f645102ae2272313789acc5b
SHA197bf9755db808471a197a3968e0452a1bf8a94c1
SHA256fc36e02eff43e8791b726219b8ff2b3ede26fa21167bfa3ddc7f5ff11d87ff80
SHA512889157c1860c0f051a26cca2fe435f1d83e80659f51886d82877557466f9cec95143e92a53f5d95087abec70799e8aecae4d3b68ff64af3e5ac2522948241550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8ddb1fcafd8783fc986943d255dbb0
SHA1f7615ffbc753e46ef1991487e779c9a215bb154f
SHA25684c41f088695f834a880a0a923b0f37e1dbba87cdb3418b10f94224b8da5c2f5
SHA5122cd7404720cb1aa6cb54f7fdb909d335e78da90d4d057c7c611f6dcb5e7f8d1fe0f33dbfaa9ba97782e5997ba892a13b491e35058ef9bc4459c10ce3fc954e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a10916753765772eb2a36f88eadea8
SHA146172e07e79c143ce7a2ccb44251b414f636db77
SHA2566d7fe50b6dfc2231211ebb828ccfae8878719f1b9ead5cc3a28a2fe00c30d0a9
SHA512747182274e084bb0691a8b1527c605dd2752a3e41d1d0def643a991e162722a20f9d9d5564ba0b0ee54ba63b9f0cd7cf59ffee83130a30de5e66a493d0cdc2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fea8308d75633ec4ba3eed6df846adf
SHA1d9aca845f33ef587a94f752565ef816451d3ab12
SHA2566d7d5700c9b5ac73e434dcaf9bf610bc660fb309f81e44cd5a59db81744b2f7f
SHA512186ab72b1a31fba98b09a961999cc4bd4f40fc7a12f51ad52f4c49a2982e241bbc7099a8af6d488cb77c63f8bfb823dbc2a2e4acf20a4fa7f3143342dd885739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0206b3b6d1de2698980dd80906ae1f1
SHA1a346ff321a36c6109a2b6f8c6613cf9bae29cf2e
SHA25608d1395f43757d71cf9eabf52b1fae55fb5b3471fbf783120a555de9237b7be2
SHA5128628355cf0c812dad916c1e266cf6fb82cefa876141aa9e0f50e40414a7f96535898102f23877630bb75531a42efd5ab4c9838c329973bdaa55ef4290a4b6a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfba6804180bdbaefb22ea1e8d2b943
SHA12c5185c123b317b2a6a65cf8941e09acae0e69c8
SHA25680331d7d53d8dcd216ad2a6cb8b709decefabe8d661644add89614008267d50e
SHA512f18ba943b52c21b9db68bcddf088a8382e7e834a829fb5fe0d92f702371a59b7b4f1db7051ba64b259a604f796261d7ca7bf7b344a11c18c00df76880709bf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562de077ce674d9a5c0deb2dbae225fa5
SHA1e02b0154307a7b491f2db3349083c21818934be9
SHA256dc8854d96b27a8ff249f777bdc4d4a64fc82046ad8b4a9a7cb60d734ec5ce57b
SHA5123d18c28a0b560ab9bb02f262a468debbf1e1bc875f38fb9b57dbcd0669d6ee0586e0b4cdec840769d087aa62880602bde6e19b1ff49f29f81d90bd548bdcd4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f3d368562323faab63491b922c7b9f
SHA170ba66c2feace09a6ccd5aacd1e38a9c4f3f64de
SHA2568d2d72ef2c91261267e85cb0f3b89b904414bb46eb395d9dae9dcd808feb3b46
SHA5127daba58d494afa0a202fc64acfa800a2ad7bc1a6e28b083e33d80b7669793cc1327e8965b72e9a315add23f5b28c2da896fdf1fb728f512b346aee7eb3335e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad539dcefd1a9cc1551a073d9249f9a
SHA1034383b9c4d071c5982407a5010a0769db46db27
SHA256d1c649114e8fef6a5877c5e52c0fff446323db6a2a5be7982c5349aa0f1ce299
SHA512387a0010bf84c960223d9da4971416a6f4a6b5e2ce5ed623f5c599940cbd529f7c8bd80f3ce561eac2b2c784d0e6e7028774e727a38e42aee0a0d11595ca3069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06f2b6feba1d6f6109277f71232cde0
SHA1d83aad6fe56dac8a5425176ab9e495d9a1a2a013
SHA25681d590b32f9c3bd51fdd9e424ade2df4acc685bd0c93c9424097e99189770e68
SHA512a9c13e8c7472238b09c92f90a593bf939b76e145790ef5e2eb0bc2d4eed1465a0b2cf960443d4d188d73f8374ea23a3a89939f19ead51d0744a9ded955b909a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6a87acc2f3dcfe314f94225565271b
SHA1067c72688295f2b9366012a60cacd031bafc5792
SHA2568b0aca9463ab3b60bd0ba883a37763c65bef589d45a4d5e59d23e9e419db3708
SHA5120ef81d04431c2abdf41e3e64a98cff397cf90c699489016bda56a04119f6a7cb00ef6b80cda1f661cf61e517642ad6731502435a9c557212ad59ee51c00a893a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b50117f87c1d977b31c93206bf6cacc
SHA19504f2c4749b85eb0980a367b80553b3285c1e4c
SHA2565eceb5855c6d329241f94914ef735feb7afa695fe2336ca4e5acd507136c826b
SHA512f6ca7bced28cf6e2bc38ae95d2e4f27c7a11dec9a5e7e7dc4d4f3884ea6f043e7b3a27ad767588e23978787c9280e22906ea5b038b2c08238999d378df28f3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061e94abba8bad9042738882061efe17
SHA19416783303566d8c0bacda72276ed2fb50d88790
SHA256aaa73d68ccfc649ad707b8ae600dc27849d08d9765ebe592e14b4347b8e71910
SHA51245889fb538301eb7f1a9116b9bfa9ebf7b373b6313863bf27fa2687c2c49a61316d185580c9fa9360fe265775680b8560c9f1fb076cc09a32f7d8806cd772da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1cc2f218fe723b93076e121e0be174
SHA1517edc03d1a328dfa72caaa92b095893e3588ebe
SHA256d94e6733d01a0e34f38cb17596c28c21b207f6b0268d4b515622a30289321822
SHA512e16705c5833b07e3bfca41f93bb49faae0dc8e331e59efdc58d0bee4496dad0da22811f61505cfaa882a29823c07a9a64736b9dd4a2aff27b1384aa5778f882c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551caf71f2473c74a4582797c0f2d3ffa
SHA1f07f157441e565e27ea1970faf78506cf8dac6e7
SHA25635d8edef22705f725b05810133737c30bdf01e80fdfc1fce2ae1f90b08a15692
SHA512d7c9641fc40c07a307c9d0a01a943889eb81c70c62b7a0c08ee6d57c87633874581643b833a74de7c07149ace7d142bb4c709230b8b317ca3b53fe94a9253d4c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b