Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
dbcf36d41c67914cb779ec6732a9bcbf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbcf36d41c67914cb779ec6732a9bcbf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbcf36d41c67914cb779ec6732a9bcbf_JaffaCakes118.html
-
Size
53KB
-
MD5
dbcf36d41c67914cb779ec6732a9bcbf
-
SHA1
1c1d810e0b3cf91290f698d1082a48ef8c3edda7
-
SHA256
57a4710a7cabe27c5c8d37d609af2d45a5eecf210f379da5830f17b3034b025d
-
SHA512
94babbeef83d7677a5c91d5deebd1b2f522792d7d8867de94c848f5b8faefdf80649cd9c3abd6c532421ff9868239c8f95b069b30a42c9186ddfb1a3d4091a70
-
SSDEEP
1536:CkgUiIakTqGivi+PyU2runlY263Nj+q5VyvR0w2AzTICbbIoH/t9M/dNwIUTDmDS:CkgUiIakTqGivi+PyU2runlY263Nj+qQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432277075" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000daf6e78bb88d9cb1e139653dfbb13a2c2c93220151d224dc5169468cb35f2472000000000e8000000002000020000000733c52aeeeed4e87ab34c617ef5d5c7d4e0bc07254c2e16b9b6e282a9827b98620000000a77e8565aaaa3f735b359f0761532da32a37fe4f5f5ab9115c2af9f810668f8d40000000376be0abbeea147a5b57a368056d3c095b31e6d7b41845ac37a7a851f8bbdb4eb3d396ebc6872db4e430384b8b29976f585b4c203f7367bca7a82c1945064fb0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b025cb10cc04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39D75321-70BF-11EF-9F10-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000035309f759a8e78d1850fa52393be9239e7f215e1281f912121a54e718ee6638a000000000e80000000020000200000001c84ad19964160e2d60135578dd697026b98103d819d53dabbab33d1ff1fdedf90000000142d44228841364981f59f24cc68ed64c7c8ae5db2da62fca53e4adfb3be3b7f5801e0c5df689b5898800a87b32887527a4cd66680310edf0763e9bb7ee1457016b1ac0f2fb1be051582f518bf4d65218815d556e91bc3f113748bf5e394b9616b3134bdeff505bca92f8d9790cf6d23a0b3a5e04fa49058a256153de0e157cb40ab08eb5bf7f863ea3df74d8565c6b5400000003397b86d0b2c712e80116ff740368bcd255bce51858dc0afbf95511fcc7e31e2af805b5cda4860e4ba1ca5851e9988de8f6495800ed8e9d6346ba3d56f676c7f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2052 1032 iexplore.exe 28 PID 1032 wrote to memory of 2052 1032 iexplore.exe 28 PID 1032 wrote to memory of 2052 1032 iexplore.exe 28 PID 1032 wrote to memory of 2052 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbcf36d41c67914cb779ec6732a9bcbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548677d4135fd98e2020c9259d51d7d90
SHA15f0e8f0ba141e62ca194138d216237da66ba9c59
SHA2569dfdb8532cbbd67b02c737b5e49c6fbf53a1ca1861ef3aebb1f0c36c5f10844b
SHA512b44411fb01608412de8b9e7833c0fffb12c9bbcd58b080f4b1142cf8fc2561caa865aa103be91736ff0659aad35576d60cec6170c0c990c429359eaea5630209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e282a2ee0b5fe61382e27d9a6cf92df
SHA10cf4ac9d7357389b37edd9a9c7d34043cff8b15b
SHA2566dd5b3593c0ae620580c2d9907adf15eafb3b517e5365fb14072b5b5a8e422a2
SHA512511f42dec427a5ad4dd7d1639ba20602c377a5745986fcfa3cb1e083f8acf59347b00c22d6985bac2c44f575a362fd6ad4bc12916ffd37c3c5dd014f92c8e687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d0b7c1b42c76c0579fb394577ad194
SHA1e46597ce3620ded66689596daa5217de439e59f2
SHA2562346adb65402f4d521f31405cc0159fdefe636d56d0fc2d3e90afe085408a2d7
SHA512c1c926f03eee087aa8b406b9560566ecf4650c1fb1d5f71ab99bea5c2aae1ff4bec4a430ee9aaeedd656ffa083409b123591b77fe3322c0b0546aa87a2a2a3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c186b22c5cce1dbd8ed93ed48c02a87a
SHA1c01530858a08bb0360610d67405c8db96cb0426e
SHA256a745d94696ed67ed86aa4eab63d98252104fcd1829da052fc3bef566b46a1289
SHA512ad2e1eb25dfd31162574d530aabd0f3fbbb62390a534e4b10a6f4073ef011e87ad325b63786d2afd621b404b045f5549047818e1f993931c829b8cde9f472c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e9d6bdd9bbea2fc5fafc1cce872ed8
SHA1b0e27383fa9c799331c558884ac054894ffeb946
SHA256e580463b93ae9fcca771fb3efd8c75f9c548fe233cb370c4bf2c4bf040711637
SHA512d982b4404dde27aea93d1a1b28ca46c328b245957a1d6ba3e4f5b816a03eaede162e70a146bc8eda3e8f4555ea031db8c50eab37a0d8bd0cb793e30d0a453b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f443e172723029cbd8c527a3bc6c1a
SHA17bcce8fb1c5fec86da00ae7792e7938d98722768
SHA2569b6ad035aafa42b1fd0c2fca2ef7cbf6539ff596eea9c471e54ffde0906e665f
SHA5120a6755e8a4acb87b379992ac5f1f6588aa1e5126c25d0b02aac5d15937b34a90891c430e0aafab0de3c0c01cd340199edf118686a98fc2b1a59a74b0489cc5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c666c12e8ed9a95a179662abb0baf28e
SHA1e144ab06a90528c1a48db6c7a78e53a70a8041cb
SHA25631a37b65cd76c463265cd40f0d1267d1577f606f91c24e7052f8cc5e7fbe9318
SHA5121c6908ffdb9346f82ddcbca786076622663cc5e446b83de04f1ff31ea1f92ea108063636b274672c125dd109e7430c348eef227519ad4fc7305f52006fc38482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be3a91c7f7f89dfa1100e829d88fe3a
SHA14a8b3d6a1379bff064103772c6799c16dd109625
SHA256eda29319721e8da660838af943eb774184b4148aa47b70fc628ec19742fcbec6
SHA512a147f9cd7acb83e8840064b118e62a08739c97132fd70b6bd8226a7142d34d1e10c1b55ae9dbc5f26ecc4fdfe524e6e80135579ae351d604926a7a590a74a313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c114447fb4b49da773073073dcd682
SHA1dd3d006cbae0e926534d9b83ef2f0fd316a1ca37
SHA256e54993662d80e1ae23328c6b64a9f742ae44b7546456fe03b4b0fe295a736e3c
SHA51280853edf5e558cd2053b816f9e3acacaf516f349e8013e0a5bf5ecb9dd391015c59fe0960554bc6a31c16d3a075298abaff1dcf5659254b1b805d720f94ae668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2ace275dadda414eb98e82a9d250c2
SHA1ff6fafc22336fc2af0556a0e8e6fa3e292eac032
SHA2564e23012c58ba75acdbb00a2d468a02561e4620179fa305579fd51c440e1ff69b
SHA512830a4cd78b7d6d2b17cd3a85f7e1dc808221356438c32e0cdc00bbc05b561e970e5e280f8e22d525bd9356d211a377562b869035a40ce9e4f3dffbe994982025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efc3730cfbb6d312d962c6869af38c4
SHA1706e16332f0751a2c427c51edb26bb525dd46227
SHA25613c190fa1ff5cd7c7c29a558e1d3fd5e53325fe0d78f1e6dc0f428bc1b389733
SHA512c08701a4a4c28dba9359c8fe4b4b8e02955284fdaaa2c053482341de316d2ea203271eed694381629a27eef8e464f45e5538e60a4811e274166d9b0c8e7e4d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d836ad467c98293fba556b772f6de7c8
SHA1a48393b716ac783445114674a1856fd110c34b43
SHA2563e3973d0eb123383ad1133fb2dc214b5fd0c4a5d954fc2aafd6d74218da8f1de
SHA512eaddb92c5676504599db48ef9e6f26b2421ad0f1994a1d9db30f211ca29f43047b6c970d481ddeb1d3cd0ad392e8bbb7f1f570e43401dcd49aec6d3c35c26942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815cfb6cfa04c52386211d1d126ad74f
SHA112be088135a1f3c5727c535bebb8b5e087c1f4fc
SHA2564bd134eeb2197c5d8277b6c727cee85b09f66aaa471589a9cddc3618823d1321
SHA512395e5136bfd43ca7ca271c20007510bee97f70094b32d19ac430e922100f3fbaa23ecd23893c210f4e2b7d88d60696339a6c54872de9b7c1f1da123a2377274f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b75d932999ececcbfef672bb14d5c9
SHA16a76dcd1104205f7ef652f21715b771eee50850b
SHA256188b4e7b57544b5312a4a387820b9997bb2c1a478ab9693fc9d8884c9af985d0
SHA5127f79a904fa559783a9cbfe7bb3bd1da096e66560cd044bde786f681c64e4d5771abc824be05d66ef8492e85741d6d0058dab9be352e23cf745c7f6b182b9a972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14f515d531804d09f7f0eeede993d06
SHA1b2dcfd14f8c0ba0a2c83251e668ce34299f1aced
SHA256c43e60f65c7952ca48c3c27183c5b312cb439b7cea2c63ce6e666378be0b6267
SHA512fb2a5dc66d3248b350bb9b4bcc9c7940776dc664b2cb8bc58bf23b6b61faec85e9d6d89677d5d8632243bead32cf7bc5b6392a7ff5f1fe3dc12648b1a299ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03d049866a4722bf154b955afac85dc
SHA113f0573af484601b3043b075843841a8e545b004
SHA2561a2b52b179ecc3d6c0a148d9f0e4596833ba561ec497882fd53e8af7b8b0e67b
SHA5125d3d0d0e02ab1bf01a1a17ae1eb782c5914445da55f0c14fc7a0397b302580987fb4f4d12999bee722864ac00fdc0e9b43dc28685b7f66e0fddf4422521dabf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acf2d5b73ca682b8faba01c5b318424
SHA112030a573c885dced8bcd41b260ad63fa82fa1c5
SHA256c93d944745306b40aa52d993b8dd370dd9bc2ca8dfce6bcc5c14e285ec6f62d1
SHA51200433c471e5c87d3adb32c9638587674f24e03861bd3558c5fc11d1ef40e4ed815ad265fa92d50ff9c0364285ee681c51c04f4782fbe606d93442494f2687a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a00e6a20b92796748b774d183207216
SHA1c75564437074a4d94fc5c193f19f3962714910eb
SHA2564372391a83db9ca1214826ae2cecb58d5e5bf76a0835e757f1f80a532de1e683
SHA512fca5d59b9bcce34f53ba98218f227384f355f278c74f529ee3652d9dbc79eb12a9ff7fbceec2d0c9d28fac1769ce57c7fb2f909652ff869abf2af6416866533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512eb6d71a12198f1a97d68ef9ec3d6fe
SHA1cc0af9c16bb465d32b751dcbd5fd33c8c633f67d
SHA25644a4479d7bcda9ace4034b28e98c72f5f4efdea74a88957dbdfbb89966158309
SHA5121adf670c4218a47d6be82f750da75599d857db02fa73b9dca0e6d39dbca6aee1cab318743a69d3c83b94c6fef9faba60de1ee32f90d325d92b222de1b27fbbdb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b