Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
d538a503cfe226494ff5a578e9d2ddfd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d538a503cfe226494ff5a578e9d2ddfd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d538a503cfe226494ff5a578e9d2ddfd_JaffaCakes118.html
-
Size
53KB
-
MD5
d538a503cfe226494ff5a578e9d2ddfd
-
SHA1
41abf9d852f15d68c49463dbdc9695f4e41bcf3a
-
SHA256
c105dcc29cbb7fe4f2d1cbba2b9c6dcdbcdec5e036372e3feec63987bcf9c392
-
SHA512
b6daaa7408369bdee478471de61398b397e50449682aa5c73a01f2e927cbed33301e5a20ec60b0683baedefe9322580e67975682aa78b5eeaf2779409e625298
-
SSDEEP
1536:CkgUiIakTqGivi+PyULrunlYm63Nj+q5VyvR0w2AzTICbbsoj/t9M/dNwIUTDmDq:CkgUiIakTqGivi+PyULrunlYm63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBD03C81-6E33-11EF-B467-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f859bcf98f73e2fc59fa0d2b23c5ff94f797f3a0a73d1ab91514129a8eb9cdc8000000000e800000000200002000000032ebd30e27341ecaa7d0455015e7c35c11b857d8ba839265baea48ecb8d5835520000000cf5c0632636b9034308764ac0e3d8ec1d80457916d7e4e151845b1a95ced0f684000000017d7f05b3eb4b1b7778eae641b48a408b245262c82d2768410cb287708ad9b38b813567dbc0e5b0a841d7973764974e6ce2274ec3ef320843da6460c8b53889f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0de21a34002db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431997289" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005f50defd4d643c1a253f4e9c97774d4162d81f0ffa2ba105005cb9b53cfaad1a000000000e8000000002000020000000f12c6263af6c07f45b44e59a72b612b9e399f478e92855f4989000b44b9089db90000000cb28671ea5438602fe43847f5e9943f7721ae1012e5498c796a9fa163f7a82c44224ea48ed21ca2a3f054f4580ebbf33aa2d07db3064b7eb535df56a4e2bb06fa68114436fe21c323f861cd01a5da11d252e69a0917b27d18cc3778aec6ee9a964497d31f737623587607b69b6630937a782e5e48814465db013758dcbd2db732e0d8b1b7794320548fe5ba943cacefe400000002bee4e77aca59e6335acdf035005a885197af4bfdb90e083dee7215141b586717b1bd6f7c45706cd12782a08fa91fc101bef3a281ad7e80361237a4aa14fd797 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d538a503cfe226494ff5a578e9d2ddfd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd07fdd9d68380bad7d944a3cad83495
SHA18ef1d17207ca03135ca0d802106b110c1c1abf6a
SHA2562c7cf19003888ad06a75497cc568771e41a08bd432360165e549134ec4823ed8
SHA512da62bd304c7e02c09aa622742e4cb6c1623a4857e4419a990550096509e520c5872d38f8fdc65eacc1def6248f42eec96f83a371162f18b9e6d25e668ab75a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c9eba62c36c8d9dd10abed49eb2c89
SHA18877ae95c4d79ccc7a8ee579709cc2318421a16b
SHA256be20d14031faf8c579fd987f2aae9aab4c76700d8f23c3cf6758cf6388be97fd
SHA5128d64bf5eb8c7e5e428cd0b519f75bad885161d6b693e37096641decebb4f55eb09dc2e7d06289d23927fb660bbf4b7ba4ef99e2776214e5db93747ad90299977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ca13253c7f36c4b8a78a3a8326f28b
SHA1678ccf95c03abb4ac0566afd67c26ed738e79d45
SHA2561e2e6cbbb0280f99d49ad02a1d0500f843c9ade81eb723a961f5cd658d868709
SHA512bd9922913379d4d1d5c03018a3eba208512b5e0d1e82fa73f6a9f14697062236607c139541f1978bd0e2029145d2602a803d825224f3965260d71a5a3c2b3c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55b39b3f7838a90b4349198bd21cf6e
SHA1dd53f9c517051bf5f31a7d0302020c2356c2ad85
SHA2568ba26ec529960dafb56a9520d2aaf5627137d48ce8c4823ad312aa8a24783e11
SHA512faba55a0b52c8d01c2b18c04cc364af44bb5fb1ef2a4d7e9da7d0637ddf324c0014ebd01781049f3cc5be7f9f42d236590f1ec09d550298df10270724a2db502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e695a6e992438aef3279751b96b1bbe4
SHA108bdb4ee01e7ce1f1609c0254c711d8123291e30
SHA256fcba4e1a6395e7d61da4dbd5857350cb734a6434cb586b30d6043ddd1d47e1df
SHA512bc2347d5a62638be15a35f5cef7cb38f58d83724e8ea18420b2562754247e889328503a9719fb1d902618d809b95c562102892eb20a3c89bb33289f942193dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec2368074e79df0ff6e6a5b0c79b1d1
SHA121d23d609ca96146895ee113b3420b4f2f87b0c7
SHA256b13dd23d50b28d0d421239460aa6fbcb00f1186fee5390323c42946e7f608104
SHA512ddf33fc8d71e7c3b8df559980f4d7bfda44d74dcb3e8238cba23a55643dccc283c777fbacf412e0a5c48dd3ee2162849e7d0d4f97dae1eb9f7fb481ed34c65e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53178802d263b12681b1aed9702957cb0
SHA119a63ca894f65793fe70eb03fd16137371c43c71
SHA25658a95f075bb6f8c32bab3d179f6e459fa92a749f5515172384303f5ac80ab998
SHA5120286093e48950910584075450e6fe3d8dc4c759028dadef5d3ba859b37f910cf82ba3de01ef3b1e5d8880acf996c9c8a1d7f40c804378ce922f4e0e5f32094c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532203764f05b91a3eb6d8869b7d5830e
SHA1ed6212125410c33950bc3a2d8498345b08d026f1
SHA256c4534ae2ccfd0c344f38c0024ca01bc7b4a5b6dfbf7ff428add49ae1359e95ea
SHA512700a274bf6cac18a5ea2a0e9aac4874fd5c417434d7b30e36e2db0e3cc348cb496a27ed3148d712a011be8e74ea6798ef20d538ff2c1477cebc195822947264f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b651e3b9f7c7aeb7a08fea4ce1fde2
SHA1b5a8d5a195af0d8f5c8a87aa61a9d579a55915c0
SHA256e0972804e238c47383f1a473116e5603f574998ed49def4fe11cd44d856df88b
SHA5127f31a666ccc1bda3720ad8b8383f6c015d5fe35ec559ac6788fbc205029ab107fd54717560e2ef322431bb574628234a1d34fd5ef6ea41631daa462a17edd6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc1093fb96f7c9a6bb83154fc136dde
SHA18f2a6d9e000023605ce964a821f69bf5c78d06b1
SHA256db02c409dba5b8e9c3b9183c1ede6b10bc9a075c3a209e02a72dc196bcd8e094
SHA512f53acf79eb0d66ef2aeed5c5d4098946d0856d2d3d470d42708e1af8a35b529c9b59fe5b37f84a28d171bb58f322a9badd7fd22fa264eb30ee83221b787b44ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e8b2c326644f39d48bf84bc49f58384
SHA1a40fac1fc4c732229f1dd972d5e4b9960ea73b07
SHA25619fc05a34ccc8b7b2084a8dade7a688c9766c67a47005904101ab8add24bb2bd
SHA512ec3973cc5f98b16a937e0a72063ffc767364b02e798f21799ccf3e3fbf53214deb122632b2835c293a323aec1d74cc2a9a4ff3cf2549cc6b22b76ebfeefa267d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1450a6c1b1cd42893f30b21c9a07a0
SHA1b948e3754f1c3076f36ada70d889bc221519e3aa
SHA2563b4d1578dfcada53f2006c867b08bb2ff38003d2a8b50488c52d1a31c68c805d
SHA512138931aa8b6da68fb3a401992a30012a43a028cba6d13cc0971e10b81a6fcf3c517363165ec2298eb4002aeaf33d9d2852f493736ed929e4fdc5d7ac0cf8aa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51729e26c014c606b4efb7503d5f2d39e
SHA116200f5379a79b771f9b025dbb8a2985ab7878ab
SHA256a5482306adf0416719f2dc8f9d8b00dac47d636643981588de92744ec0ac599f
SHA512ae4c57bf2d7158b318f4c48141902479a9ced7046ad797388ecc781e4a201226e143c8245c5c9b5a8f0ab167b3e67202485626a1138d40db15bcf7c746b8ed70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f556ad8157fa361cb81770756813a9f5
SHA1d018a4db991ef8d6784d93c776d62d5f7a69ba33
SHA2560fefba7c674586a5a81f8b0ad9a5dacabfe5a40c97dd402e4466daa9d80bd4ae
SHA512bda798b2ee3e60dbad6570e424b94f5623a8e548d4905c715cc5e0f9a2e5370e8e148655e485a32a1893cbf1aae974a4a8846e31d1c4874f49d34d2727f78fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff11c343e62d47f0aeede969a19831e
SHA1edd8ced9c6909c2100f72f27d5b6139e6a05a463
SHA2569fb4b8ff685af2356a044af24b096e016d071a4a35b317c415b77e08fd800c6c
SHA512c1a9f9d393676654555678bc49e69a4ba58203e8876d84ab4d21ead5946fe1b09da873c3c00472eb8931f8ebc4876093c100aafb5251cc58f4da90a21957f8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d523520fd3cdedd462aea1d16981372
SHA17a9351ea1578130a69adf522245654d4b334ed39
SHA256a40fed55140713f4a76d756bb23ac7029a5b9d19a0f29bb9d0c1216058e8d6dd
SHA5125ea0180cd8d58cee05b1072542c7bdd45c2557badd56b99ea7508f6c55780873da81d69fb933745e23601494d33b2f91d61e015151cc6ba92ff52bf94c190606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcded5362c9abb9b37b2d0e6376734ef
SHA1a7990e0bb4aee7c9f4552096b62321f260ffc9d8
SHA25694aac66dece9ed58b9f8b4ebb9855797249f31b74f48cc68944ec876f36dc0d7
SHA512fb883da4284f1bf46ab3f5de173b498689749ad8550758dd5c89654c145f9cf707122db305b92f95509dd1c2162f5dc72a9368f657b29a232acfd949998b183f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3677d33cd7c2b8dbddc86b149b5d0c
SHA170ca035a40f0ca8ae05e2aac4a63bedf3e5876da
SHA25631bfc8d4cae74e35d8c7be4d0a770e506d363b310e1e44f7cba4d5feda496ae5
SHA5126bd94d4b51b3b36cddc1b56ce5b99b0a807a6a16419fa049b7edadd3af06b76d045f3b5acd2fd6588a0af3630465f4f4ad87a87ad0c1a1bb89f47116d4b12d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3948778a6012aa26f7565c97bb77cd
SHA12626739e678e68bc3fbc6b4701c6ae9045522045
SHA2569a2a6ffafb1583c85483485cc777d892e12679156320a7669218c4ffb978b5c8
SHA51282c2c5f43e7dcd0702d1f7c532c61f216293765efb35dcbd697cd5ddff692b9c2bf88aaaeed6ca1cb5fc6715504fa65bfe24b92dc0df3c6d012afb9e73f77354
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b