Analysis
-
max time kernel
68s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
dc040de037cdd4e4428e6396796c63c1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc040de037cdd4e4428e6396796c63c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc040de037cdd4e4428e6396796c63c1_JaffaCakes118.html
-
Size
53KB
-
MD5
dc040de037cdd4e4428e6396796c63c1
-
SHA1
7d4ed641e9d3b1534226edbfc05126644dbcff0e
-
SHA256
c1f33cbc955b3d8c9cb8a7d8d2dbb2671b1aaaf3d7fcd0e14a81af41cd9d9c27
-
SHA512
32b3c0e70e0130e69c06a6dfcdf10e6b3a382503e6342c66c15c83ebd9d4ee60201e549f4b194de31c4053f233e3535e52f6852653aaa69d097c12206ee2f785
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYq63Nj+q5VyvR0w2AzTICbbYo7/t9M/dNwIUEDmDY:CkgUiIakTqGivi+PyU4runlYq63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fbba41e004db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000883ec25d1d944a75e29558913f1583fa6aaa64dbf6f0df9e6a1d80a475abbc99000000000e8000000002000020000000c99a2f3abfa6afdad33b3a0c4987d077564fc7c975a669d8dac4eda0ce3cd6f490000000ff64ced1b1a820c132ba1f540c308cd97ba754012dee50cd1717669b6a6395e38b7791b00e1ba137b0de41975ded009782277578a74738c4d4af56d5001777e6e2f91a4e08301deb1ea1283fe6a8bda5a42fed9ca949c76ec0d7514c53e67bb10d0ba11eb2901f7665fdeb9701e07a6e93cc0f5ef0858f0ee2b576e9e6d32c784ebb246f2cbb35a428dfd66ec0ec020e40000000c7a761e5341aa976184acd6a567ddbedce127eac173d36f9198de0d98039b0c45c37a8c697b129f7210fd7a1d0472cd6af6b3d351fc7d2997bf3329ae1368071 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BE273E1-70D3-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003e2e2a9e52ed700b9bd60481e2378b7c8548877c54b9eabebd271f168a353a89000000000e800000000200002000000084efa9ab8134ceeebb41848aaccac5d30a40196eab7c50028803df637bdcb8c720000000c6f0fe7eabfc1f285fdbff67a3f35e70c93ccdd85c95c250bd8587ab4564887c400000003d8b62d8fe6caeab6da1563fa5c314d99ba66d299a7ceca781f1b98d9be27c42b9335a2cda9b6bc347fa5403371fda98cded20f1f42bb4ebfe8bd972ba7de60e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432285750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc040de037cdd4e4428e6396796c63c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d415a180f8b2c5a85871b06724992e
SHA14c95415b9f6a11723266f66eb3c3bf933becb8ff
SHA2563a55b5f3908bc75692e9592859f23efce4eb43500c574177544e84b40fb929fc
SHA5122ae9d39621561876205e042b04f5c594a98dd2510607b6f35efcd2c7f67177e136a2f93ebbd6a492b3c594f3f1f49f8a7469f2990e0c3b30f18c40cc6afc0fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5875b56cfff481ab0e26cfd06a84c143b
SHA1f5184b89a252871ad2d071a290239ff389712dfc
SHA2560c0da74b36a60a67a1badbd57ffd8f07dae714f9336f386c4e8379f61a5c4aec
SHA512b5d449db100cf737df2835c864b72e6c7ddf7636801652031327788f8a173a8e387757f29f70260c7d0abbc578ffa7012553fc3c5976ca0e1770a9f2b3729993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d8061d3f9537ab721f753340cdf908
SHA1b903c83fd1d134dc4e2ae4c37160b083a2931a6e
SHA256afe2d2ade5d84a793556d6fc1cf1ce19146211d5ea42f3b023f558c43abb9d92
SHA512c58b9fa64bd3b98b93920abfa842b3b02e11b0dd9df3eb0a0c5240348035cc703191cc78105b8bcc0720ae1c5a34184e33e55af7bee5fe5265d70a389df4e37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac606dfd79786cc7386bb0ef7033d2d
SHA1ed4ae84ccec39fec08182c5989e31878fff43032
SHA2568d1b4f19e382d38da716dc2075605f767691bfadf4bc8d06a640b808520a27f0
SHA5121c2b57e5167aaa1e2f79c7c70ba472ed939efe68f0ca21c2e80370375060e9df8c66edf2cd86e68709a6073c93cd11b17a35aeac50cff6011f7ea2108caa077b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92192008a6ac1172f9b65df0be4d436
SHA191e15cd9e204987757cdddbda5cfaaefb8c905f5
SHA256bd930a27877eef5deebbd4c96f6b8784c9065995448431a8f2c1b3c54ad85558
SHA51202579a3ede7e08da121a000d8ebef415fd58c1107d1c0ba85741e646c80e2bf2d431e85944e0557f49837fed0b2df2d38da017ce6c29f48f00a41937a061679c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f9ea3c70759e1ee2841ac25dd11c56
SHA1510c12a75879a8e6591227216a995f100702c665
SHA25671efc8661b865dad3b587878ca6f3d24670b279892d1b2463ea1bec0627c16ab
SHA512e8d567ff59e97ec7cd8723dfecf06e39147faf7d5cbb77c867c11e379900a28826e31ea2f35983bc3a1ae1cae6514a3fbeb25efafaaa9b8107d0cacc412e5191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9782b0fc7ab6c4c33eb54a94014776
SHA16015ecc9b49480ca023b5f1b8934951de6e14127
SHA25696b8fe371b2e1984449ab23a12876050a835e565e32b6fc0253b8ee18075e2ba
SHA5121c542e985a6695bc45cd1ed170854db383a3f2bc642486e9c005f776ce42c9608d524fa1531c0c69df08fc3c2bac9b4867df10915b569684119d8c65e482c19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe1dbd56958f72ce421831e77bb5a85
SHA13e0b146dbd0b6763621eb6fa0ad454f0103985ed
SHA25660751ef255491084b9e51dd8cae60a7f6c4932e633b38d2bb3531b419fa46460
SHA5127c76167f5abb9dac26013424aeb4a735657ebd2ffc4c414320e013eeea6e29ffbefb4c42c6ae976c0fafe9e4a726f4656e359eeb5717f1564ee4468893cdcc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acaa0f9156997d23b6ba23f4c182ef4
SHA1110a1830f97332f352f7919f95ffc2de74249d23
SHA256dd112c1506c15759afec9d4c6176816415bf281a789241d6ec7b7008cb473793
SHA512157dbe43d18e95ae76971b8965575c0853b1e1c53a0f66c2cf1bb69a8ea112f4b906aae47eb1efc62b115fd4d8e69fd8649872170a96f859991f00a1452a8f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590485f9941e3cdfbba4eae8a418a88c8
SHA1096199388bd2fdce1368c8b15fca05a0f5aea53d
SHA256f95205d32c283b5c12f83c1590ea9c884057ade56943aef976720dfa5a68eb79
SHA5125d9d6097d390d2ac6499e2bd3da75fa9e9ffbb86715b1aaac6474395e6be97e74f5ce75db2534c6174c0cf385a326a62eed25a733ebad8409c1e56ed1e34c98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17881fba7f46447780876592e56a55b
SHA105b81a9707c781465c7d193da94a3cddb1f5370b
SHA2563ac2892cf4c93ccd7bcc95633bab7ac89a7fdacec43e930ac54c06fd14a20853
SHA5129ebac581a91f50cbc164d5f02324307514fc68286cf08bbf3b4a27ace427cb5414408a635a8b454dce5a4d4227884ef9e6fcd3ad042b91def79866ce386982ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c9b89ecd832d254f9ce0a22924b7fa
SHA1fb5ce74661349f928d60f75dafcebf35edda028b
SHA256247f1f4c3596c06218e9e4ba73e5ae6b56e9aaf926b68f11a9d53d20876e4a87
SHA512223f51b450d5f0d2a3c7fdfc108e950433d7943aeb7babbc988916e1b4a74164d70f01c728d77cc1932a5300e52c409bcf3c786f6feb0f45c640f86758442065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0e566d81e96a34ef85e57666ccf9c8
SHA188be23b77c64d393699426cc3af8c7ed25779943
SHA2562c361c5d1c2bf36fd4c9ff3b4b5b3af32b6c00c4acee7db63f71a08e3aee61e5
SHA5125817b3c6abd9d5ad7d909fd7ed7904c8eb711685f093e95597d98e5c74a7ee51d1540a8d8fab4460b577602247b3d911fdd7dc7c590fd9a308a98410d015e123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27fec830079050aee073b49901a3cec
SHA12f6529403d6055d399c1dff95ddd6fadb82f9e0c
SHA256414cb1d2a935edec58c822080e1a805a632a61625b73f8e14d095d567f9d9de3
SHA512473acb43b18bea94712cd7c1edc6a10ffaf34321d3f8438ee397f4971fe80028b1e84b5f9e4c749b1fbf65a81a1aee364bd2ac998037d6a97f30b697517d5309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f27e4f89ba435ce161755fb95a3b14
SHA1d1a3456f1195a8352cea560d64ef1c5e867254f8
SHA256dd1b0d0486a32f7088ff9f1f1171f2259c71ae6d9fd224b6975827ba353e4573
SHA512bcafca9e8e8ed9f015a7bdbe31c1f63e19c941fdbce05797842b9160ed72b826aa6ae9953b493e9e0e286be8cf869518bcc945ec83d3aef2999d1f8d926c9781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d71a923bdde2cfe46c8d38f0039ec03b
SHA147914de245ddbb436b698c946f75a4a94203176a
SHA256de62abb778f4cd595e4955d1e74a42864f55a199dfd67b2887fba64c63827678
SHA512713aefc85e8df25021ecfbf309be7c957de13f3bbf143c2831f3b10c3ea17b00bebf8226da752b2b1dec4fc112469fe9e6890f16e0aca41035ae66b23eccf4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22c9e881a28f1e6d8e65998f4fae752
SHA1c2733ae83efb794b33df461ecb4870dc1946b733
SHA256e2e3a19ed68f4a233ebb58acd1c5bdaab68081bf1bedac1a8c83fc65668b1b75
SHA5121d2be18d023b8072da6a0e348ae6100c6e7767c49eb6ddf4bd102cbbf557b5c6f530a6b2b631cc964c8ae7c53975167750cb8f7174d3a041ae664121f7a123b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed4628545b08de43f4a5ad7bf279562
SHA1b94e3aca0ea850bd7654189292b3fb7af7ec843a
SHA2567b4b813108353ba710e1334d31f27e495b94d97fde327c30172fb338804510c8
SHA512a2c4ca521378f05baca981921b27a73d5c5f970afb01956591ba8bc6b7d437ad69f9763492338bd821c311dbc8ced6e21fa475a3a4912db14a96fb75a4265e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08ba42f87d58e4047f412f9a9bb84b5
SHA12c743c558e5f2a9653eaa3c00ddbfd3e43ad8267
SHA256da6378fbef60fa54ae5afe2bb14378ea461a14a53a195099581aaeea4de10cbf
SHA512f5cf990945e9af2b86b28c216956c94d14d6cf44278b3eae101df8a037b8954005671fd9aaad28df3127ba6a3ac7f44debacd6d42048105a34d1d57426ed5424
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b