Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
d66822c4cf0df042132c1978483d66e0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d66822c4cf0df042132c1978483d66e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d66822c4cf0df042132c1978483d66e0_JaffaCakes118.html
-
Size
19KB
-
MD5
d66822c4cf0df042132c1978483d66e0
-
SHA1
f89509527c43f104afdb7894c80aac3c257cff2e
-
SHA256
c6302ece9022960fdf54ddca1cc4643b71babaa0eede995e0164b11d297ed44f
-
SHA512
3b19daa9125c0dd8d232c0ea3979a468379916b57058d1d0c7f67a3b239c8d2edee683b365bac06b2620c58afb60880e128bcd741b2cda493ac2733d3372915f
-
SSDEEP
192:uwXHb5nknuyCnQjxn5Q/2nQielNn6nQOkEntiEHnQTbnhnQmSgHMBFqnYnQ58Nnb:AQ/JqVL5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432050357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A27D211-6EAF-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0279e30bc02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000098764aac184ad697784fb6f9d489973473562b5e0edf9638234cdab4cfb36933000000000e80000000020000200000003eb567e97f7afd6ef288f81893cb24ffb2ba8042b9ff461af11123d556bfa11c900000004271d9fee9a1b2ec25a6d1a422416b0020d05c048b5cd967b81f1bda60860a62afc97da44cb03b98c5cd4107d572544a0d8017902c97971a395b8b7697824a12020e921936b4eb304564c868d1ecaccd292e309f32ad584d2aed942a256304788669b329f31590af7567a422222fcebfe0278187e3eacef59e855814e8b1ebe84a6d67af9a13c7efc02fe06a87da0ad04000000066e02ad982afc89f6bfc22d11103dd4d4269d3a42ed64a178f37bcd53ac5c067f959cc69dcde013c28ee2fe1c0425801ebd15530ff5c9500edb6a527598a6aad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006e73703364291950b9282489d7710ace51a7118ff4fae4293ab877db277e8e17000000000e80000000020000200000003c2a5f2652102016e091b2c0586a5f4fc7ee0493ec39750edabe2d1d6e94346b200000007da75fa64548f5f9df7250ebe29857c5b36c74edfa20e7f56d1d7eadcaec0d154000000025d116b2ee43c5416674b39a9cc7bb56e20c8c68e91ffd858b970d997b579399ce4139decabf248bda029ef145a3feff8dea4555efa854489abaf879aeb06392 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2428 2360 iexplore.exe 30 PID 2360 wrote to memory of 2428 2360 iexplore.exe 30 PID 2360 wrote to memory of 2428 2360 iexplore.exe 30 PID 2360 wrote to memory of 2428 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d66822c4cf0df042132c1978483d66e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b5876bc82eb5035acab2f63f298de3
SHA12149f4e5dcbc78ed1f8d9747933dc86d09a416b0
SHA256bc24663b67646d3a07f073fa8dd56135fa1fb1c80d825b481f1771986da3a969
SHA512608140abaf1627a5817cbee7c4e5c6f363bcab7dcbb37aefd9792b65546a3b27a44443b55e48efb68abafb434757c386ce39d71194dd27a129adc4eb2887d576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879e6face3603dbb0fe12910cb17f461
SHA1e519b379fb4bb2918f19a1049faac6013b3b22e5
SHA256dd1d4c5e016adf14b9f545c59378ffb46f4f70636873214064b7d02b1f614cc4
SHA51224694d1b7caf4e8f722fa9b0b91fa22cdb97e9804daf78f423cfbe7d6b3f919a899c6729bbd82fae865d3426db5e50facae38202b6f9c247bd90c1f123c23fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc7690d0ca9aa655038c3d477f8f6e7
SHA169598d658922f5868b1d7ffa7d6588640aa4b1f6
SHA2567d2fc21763a93a1a571885aee3824d0b892fccd7cd40abfbf57fb52b5c28cfa7
SHA512eb48004a853f00243d3fc43f5aea2c20926bb2a726319924ad0f9f0213fbe984622cae234be49abea1e2a2f74273014ffe3ad9524d34317748cbedd6e9ecfca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a10e2ba730fc42f9ff7895ad100ced
SHA1e4c7dff8f3688aba2e76fd61d23591812fc8e03f
SHA256c384fccc4701b5c88e5f50c3126fb1c409b3918bde555b011954322b7df5f6dd
SHA51211269f344deebca2f58fcfb6e01af0760c5d51ab13707968e8863f08abf44ae826880619fb2a632d1157b03bd40d879d884465b6f6dfad8e8152ff86e53fd38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d8aa934fb8a25d31867a4bd11eb7702
SHA1a6c0c3b2556700af5c4e9c0602cedcd729e27535
SHA256379ab400410463b3530b5206aafe7f083fc9dcd7efbc8b1f85adff5eb44f4e73
SHA512d5bb9a4987b770fd2d305a818345ad33ecd25561baf613d528d7c9228b389b3f84b7509ad1305afdbd5d37594cee5ae6d59af5eb1053a6c302a00836a2eff8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658e480022bd1a3015f09021efb32754
SHA10329dea5a9aee6dd52fbf31a7be73f9e3684c72c
SHA256b45f27767a29a57ddcce591553f945fef77faa24acfc42e138f91d78b287a3a3
SHA5127350a84f9cd43990e1ed8e8df3018691a1d9c9542d6c240ca3e1e105e943297c583748a1afbc2218e9549d09bfb60391f86eaa40b233dc8bda8e63df259ae32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbd8615df325a946fb68565b57bb088
SHA19d2017c64b59909f27e06c0092e55c3dcad218f3
SHA25601e8c529b6e73d5dcdcd12922b0aaf93d3fe48bc54acfc026cefc6739e725b84
SHA512b27fb1aeff06cedc75643b2281d1f49fd9157116642a80b63d2548d06636200221e429457c4372e219528884dec0f7c30004db6a4271c792d6a903d068d388b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2335745aecfdd635ead33ea4cbb2f2
SHA11370e0b18d7505186ae21867bf70d4933219657f
SHA25645cf1fbc6df490b29132c8dbf4c5eefdebbb35d8ef6f5529d3519c43ec466e46
SHA51251d1930f2ec2b2cee6136cfc1439a0dc705d6bab3d55a31b6b36036ef5a63eb85eee3bf7d9ce19630253b4bb76ec68a1127313d7b3dcf47c22e21f4a73b2535e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff287146d9ea1c9cdf0194a8350ada3
SHA1797817c3a59a1aa7646d43098012271f097b7557
SHA25663cec1f3ef071e2388fe012bcd16be7f65505e44c5250dcb152cfa04af5f2417
SHA5129ca379fb4a8f990faf9eb322f3a3532e96500d6e912d2169f5a0c91d724abf8caeb3c852ec847f8a2e10b43b0e59cf7236f2d6ed555b395055e0ec27306012da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e13dd874527cd61d37872f6cd1e71fa
SHA1db35e0040c2413c40a0dbe0b2f0d6d0a2296ab76
SHA2568a2ec38052aeda79f0bc84b8349b5368b333509875cd3b22009b6dc4ed0ba108
SHA5129751638e74b5aa82cbbd4502bdba90b0db473f39c60eedaf0978a636b410c1b8e4ab4c98c69e2ab30364fd1fe9dae6ee837dd91ba319e4121ec4422b1b6864a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df36dceaeb1ec2ff5bb376a893940dd2
SHA177e8ce46219963bb3fc3b82855f2f973a789e845
SHA25690a495df5d5add04281c637fb77c483695c1bd761947de2f9484fb4b4250f916
SHA5124738ba8088f8d744d707e927e532dfa91269fc43553b55892af93558f921ce39335f440f87f78597e63ae92f6eb9cf0f8fd0a6c517546442851a2b021f7ac385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d71c39b99a54586cee3c5b7d733aff2
SHA10093eabcf2ef3360e5cb8744c985ed565472b883
SHA2563d2a16a6dea505e91244d2165c35836617aa1d7ffd3b9dfa591a17a7b72b0f4f
SHA5123481d2e4af753211fb7d0aa587843c60b1d76542836b89a77d0bd8a02d50e128d692f6ee7cf1e3b6c157fdc161291d5fbc3347f50a94cfad95532e66283669e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580dff27a763b723ed0c7f887fb8b0ea0
SHA1d094ea2b42fa56e920c21d22c88a01defc7f4466
SHA256a3f6cabc931ed104f96dbbcb547c90270c83bbd8ef7c86f180439cdf2bb995f8
SHA5123b099c9e4d48f8088223a826125b884f980e4d7ddac7671433227acb297f62d5533ce6ee87999cfb458c0a12e4dc79d79d17bcad399332e24afd1c03f4ae35b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72437960ee72aa379a9dc2f7e5d9b14
SHA145c74a52b08eafd04565fa0289a9166c44972fad
SHA25676dede3ebd558958f01efcdb6faab85d0e75a1b258d6ac120f38a72323b0f26d
SHA5121ef0f5e44cc14421b0d58f38369d6f9a35deeddad65e7d6d67d0943a32f3374eca0d5bcb6af62d40f9a1972ba45499d54b19f18aae285fdec2f939fa4b9b84c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d8db4ea0ba7d3e0569381b2c830358
SHA1fb4bcd0e93d31562e67698d3cc6d77c51603e9a6
SHA256dee363cc10bfad498a05c2eaf25805b1726cdedb3f4c0f0c857c071e4cda3362
SHA512ba347f6a66bb0ee5d5be76a2f6fc894843b6049b060182c62e96efa0fd117551f08f8a4e70df4a9013a33e486dcda1b73f6ec5ce92cbbe3611ce82839b592414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708dab29cd719d04fd08838cc975c09b
SHA13fe13a91f7a5d9ab4092799cea85d6c6a9652d61
SHA2566989ac808bed83f8bcdecd874db79c7f4ec98014ef1472e66a6b2bd0c59d5140
SHA5121d6e9c0abf1d960a1ad06e8809e65dc749a157168cb1e528a05c078d76d1f4401aead41ec3656faa275e735fd6e61e8190a41495f29b0612292f796174b65c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a70710e62e7015696d669dd66c3c080
SHA1f90fbd5884b30456091f550b7c7b497bbc07eed3
SHA256737c1fe492a0272d8dae9056b57e3f02662b5b56ad4cfe8f05688e5999436fa6
SHA5122005bc438f83f42f9658e3f1b90b7b387fbc11daa15723ac27b9fcad602c6158485bae72c6b7b77ec88383cdea79ba656e3164c7ff9ea36be83740aca68ffbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c61e9de92bd25aa956a02115a87e3ca
SHA1bc88969a427faee3d2b54fafc41ccf12ef2995c0
SHA2568d658d7ba83ff9f1fc741cd577d33c1d31a83b1996030a53887a3d6695a1ae8d
SHA5127055543aaa66ac6c0c81e8eaf924d221ea71277e58bd30762985b9c1050102f9a370da5b6914e5cdc196f3f7ae12ab6d640259d6a8ca3e19970894e669e128df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba27c38cce6e6f0c1ffa8661880044cd
SHA1fcd73d051f83cbf908b438574efbcebe8ebc6f78
SHA25685e238f7911efa1871b03d63db53e3526dd59304fa530d5351888bb9c51a74ea
SHA5127d4757215daaa6e83ac7480674eda1d1ffbe81821eb8ee99dabfb0c10f8ec661a66adaf8f9077164e9da9d781922ca203f1b461e77881e8fd26f232ba451c270
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b