Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
bf230c6c2cd6daee7d33313c66061f9e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf230c6c2cd6daee7d33313c66061f9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf230c6c2cd6daee7d33313c66061f9e_JaffaCakes118.html
-
Size
127KB
-
MD5
bf230c6c2cd6daee7d33313c66061f9e
-
SHA1
1699328931e49c40b73019b4b97860cd66b4d845
-
SHA256
84d41980522cf34446303352e743c90c644bda116aa4b25f57ec8f95ffc32e49
-
SHA512
ffcff5e604cb36bd9ae6b4437455cd6c7c1aebc42d9991a1cd7502856e2faebe2944bd7f70ed369fd53daf5a328987bbb1aad5b84ef4a8ba2d9d440a09593ce0
-
SSDEEP
768:Sopf2TaC5uVmyBDNfKyUL64yuPxBXqmi62YRwZaPbPlqOd:Sopf2TaCMVHJ3a6cnkYRr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D93411C1-6240-11EF-A7E7-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000005a714420fa3100574ae730878656f6e861369c69ec8c61c06a88ef194032eb47000000000e8000000002000020000000292e5e94cecab01e76afc96047e88804944b091de2b35bdd035109f139b5525220000000e549cc1f4e0fed6af79aee543a18fde0bcf9866b3c0a1a973b50cd5918c3912340000000f3c4b4bb578dca43fef9f205ea4c036e3f5e7c533c2e3ad2113fecd9ed3bb26848a0a65abc3c919665015f4595b45726203153137a11d7bb868da21c3f9115ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430683480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d3698d2823c38f27508e80c77b15969309268383339f8f3304a5077062d833b5000000000e80000000020000200000009c43f72ad35a1a94821d08c18cea882210f63b6c974351adb0e6d3684c5ebb719000000031ec49c5448c2e8114549adc92b99cc309c91696eb63ca45d936da0299c21117cfb2ca7b429647094ed252fb06baaa8b84c4252ff228e41a2e4b2c4affe4a68668186457f90133a26f5e84152df4b62e1c835610941ac30b5e246efc35b5930609d29498980ed9942a4cedb7b2ad519a2e58926ed12edfccbcddb307bef15f5d39dd0dbda9260020a2a0ce51c57e8230400000009d0c6823b26236c0c60260ade755eb910888cc3799fa79f1098ecebc6caa1e626e93e30c10692abdaf57ac960ee373e1842dc2f58c205a4dca574dc2394a7aed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603260b04df6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2816 2200 iexplore.exe 30 PID 2200 wrote to memory of 2816 2200 iexplore.exe 30 PID 2200 wrote to memory of 2816 2200 iexplore.exe 30 PID 2200 wrote to memory of 2816 2200 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf230c6c2cd6daee7d33313c66061f9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e1cb1644149c93abd8718bebe051ca
SHA1c6d2a259330fd05d441ba3f8df23aaf6ee66cc33
SHA2565bfce45cf700b1a71223043791a4ad69ae0573b090c27c8faaf21eeabb51878d
SHA5122c6cfb4044b2fdd0ebdfd2ebc7af8e45fd44f5100cd470b4542576a8cd77e0863a41b12c39bfbea5701f6a35ed5af88ea85c280dda6e279a60b173d9fbf5753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fdc9c67c6b66dca9ac884adb5f724b
SHA1a28dad274fa1035b26d47b969394008f4e7865db
SHA256acf8bf0cfa65ba312edaaf6cd7334f96d65accb52be6ba475cd2a9b9bc6057b6
SHA51295d2f8a302db87f1a0f6ee62d9a7c345f3118835e99019d4e115fbc40fe8fc4b33810721d35e8778ed2b4be08bda8591a98e8c52f208ca82fce8d931dd837feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29d3e174070502dd294d8fdf07f02f8
SHA132a51d6a26be6f19199f9e21a33fb6d143798a8c
SHA25653cf86fb2d277ca081be763a923d4febb28ad18f30da3c7a6a6e0f4ac2be3175
SHA5120c341ea867af78fc026376b7922021b3a755424f202b53d5070e420119f59f3e12fb136798ce1de798fab7cf5944f06ee5c184e621a68a7c32e580b3f90a7a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0ec165411dea7a8c09ccfeae3ddf76
SHA146d3e250b22a179d5dedb4d36cc6c21522a4a949
SHA2566f79f535ef7417e9d086b2b2de8a83fd596115c32b27d992d9d77463b68a8cf8
SHA5123eebe7598f06fc1485732a9e91f89e3e235a780da0a4781b2b3a00ea2fb60876a2655fd7665fc766519e32694521e0ba507e054bfa526c29f235614ac119280a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d4c6a1611e6baf7afe6e6f5eda910f5
SHA1e9c3c2cbfbb7cf47ba58c9408367b2886ec8824f
SHA25611f16683e9a79572ed6a38fafbc25d546a5991bb0dfde9b8d7fdabc76c904c25
SHA51290d4c719bb710fc298e47baf23c9efeba0f979edbe27723d5344879e6758ccd59c8394153a10a01af39b01e9495413c46b52dbe7e55f1489f40c104c4e1d4327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa0b15e5ef17bdfdbf2e16cc6626f93
SHA100b198dadf92e332f7c1178663a77e40585d9fc8
SHA256cf281db0b6faa734e1ee1b31732c8c0eebf85940f47d59c045a50e592449da25
SHA512352d221e051319ff86796fee96889d3120dc848de315294a345f9403bc619d2b5eb4892c5db94f8122db9d87f91c939715dd041e0f5498e93fce56d28b621f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cc6a1ce31e4e1331905dbbae583e84
SHA1582be0741ffb0ca504363b3a8818fc743ec557ab
SHA256b2b51017d26777d68adeb191fb80e1ee6b8156547238484ab7b25b9a818464e3
SHA5122ef4497a4e5f32dde5a1c5e9c266b1d3620f165693d70a360f958a221385574288b57a6bc67065a2ccf1406b0516291809cc9e6e7029ef46295967be32976fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f757b069946559f4e22b0c71bee2c67
SHA116ee5845d7486d41f73b41446ca4c0aee0e14590
SHA2563c19cd24911a7435978b0651476f3ab5732183453a3cfd566b001eefec77bed7
SHA512633d7623f434ce5394e48c6c008a609fa9393cb480ea2e137db406c879bd379f0eaf88b7185e26bfa43e2c6e862250da0a09793e18cb1ded27be315d8e68b48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e46df6e985f39901d2153d303ea211c
SHA1d151cefd9e9a4d7d3decbb5fe72f95af5f12361e
SHA256c0524367075952832f9a20d06ec0bc238a2dd75fe7c793babe98f263d8103917
SHA51213c81b2d0e40d597b0135c9a763e147d6744fd9b05c65765c7a84399353af01da13d69fec6ffc9f55cbc3bea84a31bc64980e7b98ee5d20e8eea32a783441641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca394ae47a55e59358205b7fb26c070
SHA1a550ce6c110cedb13d850aaf0e3b4a871147cd89
SHA256debcf9aa00aa3cf87450e2ed44b01d4491e36e06d4baea5c5ee1971e91514660
SHA512fa8d3a5d6cc506f53ffd3a07b91c79e3997e78987d232665a702f6d66b462e22b0c2a19a0b884ffe4417905323ce7a724568418404f400334c5f597ce4c1f6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5515d8102aacc0083bdd1225a51094
SHA1449e3867a34f53bfe0f9b2372dff1307e9bff253
SHA256fb5fedba6aee7ccc3889f80ad50257ff6c96f1fb0413f8eb830c2e5c8dda2bcd
SHA51286f1a43787661ad26d051464b5ff4980a420cb86eeb63bb3cac976953c560eb1b7e0b5054970883f7135da6344e74d14a797d22096eacd5588073fd470514e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db98e38d883f2f1a8c5c90fed46a20f
SHA1f3f39b9a5b151fc34ce133af98b7ae4dbd93d031
SHA25671cd3017c18e54a446f4f045905b453f2b901bc57e4b260bc9557d25d3d7ecc2
SHA512b019c9fff4a40309695ec6b1bf9ac6e330aa49de866162dc32625bb12e135612fd6a8a503874a91e813f2c6b982e7c93980dbfb49543497fa8a02faeeab1791f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27438f8ebd8295c3885f632264e5621
SHA115e7f95ed11cad7ec30d6563c60e977d1f88fabb
SHA256a46c4a7f33df4ccae2114351033b552997132bbd28a54182ef757bc39994e3b5
SHA512299bca3e8c6fc0d33ca44e59709e33f07a4d0e80a5c6dba5e51717c42ef3a7f1af7ef8682dcc2cca599825a1646fa2856a94eb64436d1df89bb171c23647d60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23e9b263597b19f8924e1ade5cdff87
SHA104a653ed866ed6ccd7809364f133fae496dd9dd2
SHA2562f9768e649908ebefb1027039314c303cbe49ab47fc4cd75f4a90ca6315746a7
SHA512c3d255b570c853d1ba91822ca4385c334f3fdf4c6fa5e2b4a766349af22fceee9ec189eaa180c45e6fbcecd5b64c46a25c2298a7947304f54d0cba4027243fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401c3acd85f33b6fa522d59cb33c7d48
SHA1cd8a5ce378109d0e70a036e4ba308d00d9153b68
SHA256fb9f3e2cde8db0c19586bf646b1a7db4d79233a45b2c0f5f3f9b4c69a40467cb
SHA512026b6a36361c400c271b806123395d6f55ce653111ea2aa949f19e8780f2d63f06ae6df88731673327647091cb920d104a6420ff9be48400c0b25b84aa9d26f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065469ab7f0d0a7ea4a2bfba14ceb8a2
SHA17670233b7e72d0b3b101a4a89ea9088ab7a69679
SHA25646d2bbbf1add3339d7d01a54f98810a86e027576caeee2f08e32234c47e6fb2c
SHA512933134495629cc34d02640ddbdde7190d4aeec62aba73e6ec0d4cf085e0926cc79dbb588383799b417f9ed6352894896a201e1061f0fbb34f5089f3df006b547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581021215a25568c8a6b623cacaca70b5
SHA117cd143bbaa2e11e2e8079395f4f6108ccff3575
SHA25689b17eae969175ce1d943e0557a78699cc6fbeda997c195e2f0f2050ef37d8f8
SHA51254660387f5f0a146744d1284e73b5a71d0803446e0641d5303246fa1a883b4641ce3e317cdd9e303cafa423e138f3df7eb274edec481bb860be63d734a58f238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52300c3aa595ce70bbb8c7c11286880f9
SHA1c25901af2aa0d7c6483e185444f090bbd8de0d71
SHA256b447c6240f309fd5cbcb6e5b071fe0c4a231020be2c8857e893b312447ba3758
SHA512cfdc9d6634b9faa72d6269f578d00180e4225b2ca1cdc10ba9fc1d337c761673bcf5e28f1454be27d91c2df53be5a17dda8e7681979e8fe16d234400cd8da68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c17971cdb73d00707952d297676b10
SHA1b069a7c8632dafbe01442e3761f500761b04c07e
SHA256b67731c0d750a213ca8c439d0b48180ab112952ecd9621ba7504c4be9c5bd8ca
SHA512f0702a23d661fa6ac875cc9cb51178745d1f46d9d11c2674416f1ef984164f9d47d481296576958ceda722e2b89b2202d52232d436735bda9a1dd458b644af0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b