Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html
-
Size
95B
-
MD5
78bfff976d26c877f2556be39a700ac1
-
SHA1
8e078445c9f314e414916be24bea8bdc64f01981
-
SHA256
e5aff8a704f0b7f1f1919cedd896b6b02162f3fbf7828439afdc72b899fecfba
-
SHA512
200b2f5059c4fa764bdbd170d39b9c0140c800b23bf8317e29fd1aa6702b514d385d4411f5d431fe8f6d8a2fde5d28dd5688e667e168a34737ab315fa5715815
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D2495E1-4C33-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428258792" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b365c79179f887b36b40a58e3c1f76328395a99830b53dcaaa6df47b0b0b55cb000000000e800000000200002000000041e77bc6724265c129a0f4cda7f703cd8c0ef831eac03fab8400a4825e90c5a290000000f77a5f1b23faa059555f3012ab7b2a87f422104634a3650707e98c7ff62ccc9abdc36b7c7bb4ac015234b9cb9f00fb3a676adcdeab232172302c0a9c3f440c7a7c6dbe5a2cfa66ff89506815086799c19cad9ca546fc479f588c5a73a7e09bbaff0ad5c93e7cc0371f177bc2ca68997282e7923d4ae90db7779e4a02add001b30fb0f7440e238db08876c5c107116e4840000000fcd917d6c9e229c8f4ca2de3621431a120d5ac94758f424132473ef5dacb2663de747dfffe46b948dfa2a25289efdf2425411fd492380113ed2354e140a948b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0974e3640e0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000017df50a73ad278844737ec08873f4971d4678e5d1640f454dcacf5bc96ec1562000000000e8000000002000020000000647e621bbcb0a1f46bf42f36e7cc7c88dd337fe86cdd3fedf09b1740186991f220000000d2f423cb3b9995c47b3ea0db516ec7716a0038c11be8d3518a2eb5a210174fcd40000000e04417e0acb52d67457aa4f96152f3312ba107937dd8bee3a0ebe00dd1faabc7971048311fa1b187e3a10a3257385920f125e99a78421a77ad1cb5798f6168f1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1964 2220 iexplore.exe 30 PID 2220 wrote to memory of 1964 2220 iexplore.exe 30 PID 2220 wrote to memory of 1964 2220 iexplore.exe 30 PID 2220 wrote to memory of 1964 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bedc985125b5fca957415e6b26891e6
SHA104e01fb1b285ec802cbdde83c5925f76ca3fef43
SHA256edf1133cd644a75cfdd5f851897a23646ee1638cee62f6559323841db89386de
SHA512b8db3c382137e1ff7e5af6683ef09671f8993462f99a63f65b17ab0e61def8aa082a90534ac5c9686ed95bc280dd3b1f48a01f598cbfa54ec97f28cb11d8fb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fa02aeb8ed01afca161710d379aa06
SHA197c05f09a6f47737ae7769e0c7a03a64ef9ef628
SHA25636096419e76b61113778f4a491a5813322f9c5e4857e0faaac8d65381e78527e
SHA5123e2730f8314e54ad3a73e36a9706b7fa7fdd77e280694670b67f4d625a805d56ac1fb50467ca72d88af0a59e59dffbd8451fec97f2edb000c127610c83a35c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc02cd60e4ec936eec9c65a42f11d09b
SHA1c15827ae7ad184bee702248bfbd5375f6efcad9a
SHA256c1115f60cffa045416422c895ebb5c8ca2641eff064536b4d53d371dc9ab0ba4
SHA5129736728856dae460e57ab2dc6b0cde65195107be572051aca7bd7b68f5739cf9da077bc7ff268534078180679917d145ec092da4d9f37cd5f6a72acc00bccbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565fefb43639775efdb4048d1b6465fa
SHA1ba295ef972b00634d247c786dfc4550853afd581
SHA2562170d7c1789c228215a31b5f68daed70942fa98a57d33e4e9c72a56a4033b1f8
SHA512913e163156bdf3d40529d218bc5faf4b298567b03595a1dc9d7bc68ad0ad24a3b8ae8da378e9979f791cf530147da51c2e799198a6cbba9e129d063a9b186349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c364f6ef319867118fbe45fd94683e
SHA1dbba560c4f8206fc951fd4b871089fca48c1ea0b
SHA256ff2b68e2ec1c01184e6bdc39ee4af1d2a5fac9ea80ee0d37239c819566dcf61c
SHA5122a9d3624e9cf177914cc7f0292d6c4d741d97f3abf5b54ad64c56bc2c2025d3ca6efb33666b29c7d1bc29ed8ca11666ce2034aa7263a1fba050ba2ca43d0ed02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335f1f07413872feb32f96f9ca354ce4
SHA14f7f5a954de25711d8417b1656e40a6d38c2e806
SHA2567fbc5f48ed47f1690a4edf96bff79df552e3169f2bd296501d223151544739f5
SHA51297bc20e57812e285cad42e32453ea81a41b1111da31d70a48fe4d1aa965fd5cfcb600fd8e2b947b8dc65839af544996790f94950a083b9cd49970ccbc0ca9aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2bf7f10cef63a192be7727af6b8bcf
SHA1e85c975a7fedf8aa418f0432b9f0a0e1be509517
SHA256e57b821ff21e70599482f595e1f8a5a8fd2c0639c96d010ebfc15c6a8fb392c0
SHA512a457576a4dd045b35daa20eb738a56c3b04d709ef5bfad1f3df35f78bc9e9aa77ff21a4af048089036c6bbd798a93f3331ac7dd1aebd0eec3075470115c3ddd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d7af7a266e32e98cbd519bfcaa7782
SHA1a0156bba00163dd78adab31bda4687454500f0fc
SHA2565bb6e03d77b65872476809ee378a75d4b936f7c5514d44252cc6ed85ddcfa26b
SHA512ac1eafea82bef5b24bc8f8fabff0d74aebf61e2ed623bfb36db373fb48a8a6495dcc2634d3ec7b3a8dba37de7e0f9246f7a342d9279713ea51699555fb36276c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848929bdc7e23cd4f5f952b995e038ac
SHA1d08f5379a7d62f6967dd204313be2d6f2a93059b
SHA256af49e38d6d7e927a0f042449245c9f411a04248aa3bbc256ff4c0acfc72fb414
SHA5124af1d6de3b14fe75e28a370b3d615d002cb763ccb11c68cff9ef6e11cd7031dbdf664826ff18f8c9b46a6a015618131ff9659d1c915854ca87c52d9cbe4e857d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed788c4ce5460fbe1e5965f11220941
SHA190d8fe21a4bbc024780aa261e3d704e7efd2b868
SHA2568c689c8ce2f448507c929c8a5eaf253fde46dfe54fc89e9197f797adda4e13d3
SHA5124fd17d5c2905313b05f04049df8d5dfc3bd7c542dbfea8784d96c27b17514b24d7217b50dd4153001d63753cb3f8ba5d31ffb8a845ec1df153745b6fd9afae50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d28526f25c578c80433c1da0c1fe884
SHA13c4993e364d46e9dadc8ae872cdf49a7cfaa0df8
SHA256caae0cc0f9f61db7f4da159a37fc3c26fffe8a3855334b3d92b7c1d88626718d
SHA5127f6ced520e85e0063d9c7e51b56e2ab35b39d4ff7823c920700829dd638a6cb89ef9ea935ffb374873a62cfb65c228fe6aec9dad0f51c08c298ccc6d4c255a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3353d44646f2d89bc76559021f436a5
SHA159b15faa621281e116b5f6e1684d568cf4b302dd
SHA25685e3be04420e4d5a7e7efb87fa5233ea80b2e4562a8bab0137ee2055b825241c
SHA512b7227955cd7bb286a6d5a97cb89d2196fd6759f3aba077fa13b124060e7a7a18dde6f1781be95bfa3638ae1c9e99ec4cfb60def541ba554ad4f7dd102b97ea93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d850c063e612c53b88fd6ec9f59385
SHA1a76fff32e1564af5604fb999995bf93ec8f5caaa
SHA25622459490bc451b42f517a28292f0a806e9f9d7181859ae56f666364a601b116c
SHA51236f70f882ef43e79562ba9684a029e60af263f6cf7c42ccfe42d6c646b2f7aa9d5132c5ca6ad75890721e90cb40b7dc5772e47d5d0c6fe6f780700c63b91df6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa8abc107ebec46b9efb9a8bd2417f6
SHA1cf8687eb216a0431dbcac84bef92e7645d4d6bad
SHA256ad972d72e38c341ce104f832371311850a94edf40ba2aa33ff0f73884b3a36db
SHA51263d62eff7f2d1add827cd31576d2f6db0b587d50641691a247880a9b28986cbe5b8471bed10463effb685999512e3b14662fefdaa8fca2e98e1f8bb144b9adde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3e86aa2443eb3ccfbfefdfbed8dde9
SHA116f5531419ebf8cf817c5b77106c999ea89d4fe7
SHA256f7f2fd30626ed74b329a7824a1c699f88fdebdca89def1a08b0801b120843666
SHA51219423acfc16d139118f3554e219171227f46e97e2d21d096fb4f2742e07560afeb27f7c3e0471d7d13024861c0e22aef6e72544a93646d403e2f8ef112add77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473cca2a5abac946fbf6ee25d7202eba
SHA14494d948716e0a8b7b22cbb27cac637acabd64a5
SHA2569cd75c6c54a73f726e9877d2048847c3d164595a932005f126df89f01ea9c983
SHA51289f422a546a627a84b5b3d6ab7cad48c92193ec85afa3cc9d1b91c7565d90907c816d7848f8f5e8011c2126251d5c6159cf111764c1989f1842915fa4919bd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ce1b400fcc1460312f8d91161ecc23
SHA1762617b77601d59a8ff5b89af9940582a76249e2
SHA2568a3800af744a195734cb4d0a53518f69aae90fc3affe7ddf943e507e5d7cab15
SHA512a3f272a5e8d037c9baea6851b28194fb28843912eeaef6a69024c572f1256c9065245b3cbf924bbdd150b4ebb55aa1e106bbafe04d870c855f3faf81483bc692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d309aaf50c1cc468e30df7bc86320d7a
SHA1b526202096f5a2c4002e641998498d573028a318
SHA25638d8df8e44cd168e8ced817dbd7bb085307cd9bcf0a046c3169dbb80ac0a244d
SHA5121976840c1f429e4a632861e00c0a5562e6840667439810eae8cecfd5d0c348c5468890a48de1315f17c6e33fc43181343199b7050c8bc9a6bd2079ed8da4012c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef82f388c841fdb7363c85048efc1a8
SHA17559f14be15e4c90e279e64a0f045d4912b94c98
SHA256ed93d283a17ddc545f7c95d52af0e5ff36077e8a9fc5d7420e0cbd541a562fc5
SHA512646cc5680a9358f26e978bc6274d91b7650c80a73df313947a2f7ea6301d1a19cd95313cd472c89c50b411a62cd4d2d43137538cb603e15e616762ea1d83ab55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cebe60b5cb0ade24fadd07484ed532
SHA1a1385daf3314b7a354cca5ab727cd0e18a891eeb
SHA2563cb63f83f9dbe5c1fc33337d00f882613e471125792835cce96cff220bdc1b79
SHA5127352dd468a081b1ba90b02428861c5b70994cc2fc36454e400227cd8f0e18b9b157720ca3cc5f7b6cf79b33273fc67fd8c83177bae69192ae4c8cc0a40f9da74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fc19da66d475fd7ba2223efb6d4e5b
SHA120c50670e482ea7e0257f27d2dc2d1445278ddd3
SHA256d2459ea367af47d884620654061ce306b2be514c829ccb85e25d150c91890923
SHA512f2f38c248bcbe15bf78ea2a090891dae5e871af526dbb1dcf6ca8014ee70333da2cc1b4e790d8ad94e9e61e5b5888918974663476f8add26a995c3d8019449a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b