Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
eac20d23e48b40a71094e81f0c458ec6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac20d23e48b40a71094e81f0c458ec6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac20d23e48b40a71094e81f0c458ec6_JaffaCakes118.html
-
Size
17KB
-
MD5
eac20d23e48b40a71094e81f0c458ec6
-
SHA1
3246c6fa1636979ecde3a1984c3fadf6baac6451
-
SHA256
7c109fae05527272f76e77a74ed06f8ddd1eb6facabd6b55b483c9242f4c9bb1
-
SHA512
a9231fec98579383a0df916fe0bbc7d082c41ae3f42cdc4f949c3bc453feee3fb0dd2983a61fa7f0c9bddaad5aa04aeb4ebc1430844cf9c9ef7f57f6a2a97105
-
SSDEEP
384:ODGaZ4VfzbJERlfCfp9zSOC2/pLr0LHLah6U7q1cCwqA6rTGFOtedNTEhlI:QJ4VfzbJERlfCfp9zSOC2/pLr0LHC7fP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28034961-7650-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000004e3088165ee83e4c3b48c904471c432867f2d033e8e486175a3a8c911f99968d000000000e800000000200002000000078abd1779211786eda8fcc4f5e238731b831dffc2a485214b4f2ba5adbcdba7a90000000d5a7553bb8fdb8cd2612310c54b7e6f038648d007d477d3edbd5d49f68c193cc6119a18b3d2eb9815280deb07c6afd730a4487c97f7dd5c7ab7fe0bcd35cae1263b9183f938c2b93cc8dc5f8e04f1b70d522c367cc6218b9337313b930ccc8891e663b3816b174edaeba79a17e60b5b8a55948004c66cee492a00c156a1bbdb70d6702e34e86c62a96709fe3c83a7b12400000002ecaed2ef03ad2ba7556c35addac75e9062474e531c393e1d6f6aa67c7ec255e193970028e4b0cff18d8fe51b1b2b910e36a6bf479e9e560b91a06428223596e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000ce821b85d5ff845ed1083198d9851f4a6ea179f489680971be5d97af58a79a4a000000000e8000000002000020000000211f45ac94b28a299a1d7e10c235f67e56fb4b6ac623bd73337baff76fcfb4d620000000bf4f37105813adb07d6c87869f916d8af28a7b33fd5057ea9c9211d18ea36112400000009e6ee5170b08013efa97f914a7ac6c8a243afc1f6354d3a4a7e82ebda09959791754c819a843152d71cd512c6c8e6e763c3abeb87c5bc465b55f43ceeeb5c70b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109a78fd5c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2820 2096 iexplore.exe 30 PID 2096 wrote to memory of 2820 2096 iexplore.exe 30 PID 2096 wrote to memory of 2820 2096 iexplore.exe 30 PID 2096 wrote to memory of 2820 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac20d23e48b40a71094e81f0c458ec6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa51212a446922ccdc702959edfe4ce
SHA1f2fc7c7193c7b483df17c76ac832b48be97346af
SHA25669fe8366d1d22f09a4529e17416bf77df1ce64e4d6040b6121989e39aafb7f81
SHA5125ac4712e956a2e0dd446e0ff17b11e6b481d45ddfefe728616b2f9c2076be9bbcbb1074a1bdb226b3a73934c7061b65705875d49b969d8999a3d06a8c78180a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfbcffdbb2ba8a277ffd9ec28b9568a
SHA133f57dd78cca812e1d80326e64de26964c3621a6
SHA256f86b7cd6812eb593dfa01f1b70ddb2aa1d5674a2e79b2fba8fe75516beab7e53
SHA5123e4c635dcefecb0078ebd7fe1a0fd4cc582b5281b135a0a0479f9d8c7072f67abb0cf6c9e70dc00ffdc27390bbc505cb7b5aba45d6b5aa016099bf3a7883e567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b38b2038e72490a5ef6f3514cf9b2e
SHA1aeef50aea86238f483fffe722f9a46cc7bf964fe
SHA2562ad2da5bbb658f3079087b26988f9fdd6ee7206ccb14f622d38ae0c1c410c674
SHA512b1042945d29b34efc6e7d9df4c73bdfc7dce0284f6d5aae864cbd84e3c5f9262d13d5998e284ab8824ff2c7dabefa65b7a335c5c82b77f960dc6412b546a0466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560bbc2adc5a1e9f471eaab97d62bbe7b
SHA1b08e50ef3f2bfddea76405ba9605f05dfee9b6e8
SHA25694df3d086b6e18c90ffd9afceb485a950a8b446916dc1c9bd4d39affb58b12d6
SHA512f263373657e483e952ff091214e658e9a30f8d95425dfa5e860543182ba822930033ff758a3ed03c80929e5322ca5c5618cffd1d8b31da34ae2532fc94a49125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcd627d05b70259795377ca21238d93
SHA1f5c5486a301f19631b749f9b83037eec5a11a37e
SHA2562c3dfd3748dfe50580b567c62fa982b14f72e3377552ad285ec73323941a779e
SHA5129acb93f343050254b71f3ac2555f7ba81b5a935c083fdd96b4ea2c184c0abce67e68f1e62948c64e45296a56e7102d199d60f4ce963d1839edb0a8435f8c1394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c9daa0566f1243c2a3192133dc3780
SHA1db1edf074ca94fdad0556bd93789f8a5a84d60bd
SHA25644febd17cf8e94f810e1f21444a07b4614344f762d9979e0988a1829c790b5b2
SHA512b4c0cc731058c22a5f56a05c59baf3e7914a969f637d901a31564f27b97456bae8ab3eb18f0aa123404a4fd3f3b3a0ca5865a1df3648deeedbb4e01dbeec719f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e8bca09661c6bd3ae12d1c9b102202
SHA160f74b3f64d335c63840e6db12e98696ec185a04
SHA256b80cd5250739c83b30660c7123a3c8b2cb5f2507a01ace4896a9744d8bcc33b4
SHA512a8d1009c7b0f7b92afa95f35e0e1183be330829abc391c4ea076b720e4e5ddf6de50aaa18b1e3a95fc3eb161f986dbf7d948a991128045232fb3f9b6001ae2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522de02c6d5c4375da594d11944c7290e
SHA1c890cafe070f02d1d551f2ecf61589b6a694d51f
SHA2568e7991381c60cf72229ea87bb3f2a20c203dec43edf2b31ee80bbf91cefe3fb0
SHA512cbb0d1039b54a5b673e0ce8f550704a4548fe0e3049464cadbf3886271c7a36790660d6a245f7a9920273b52274c0dfd75addbd12470117637697f0f9045ac88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68120cb66d8558a3f9349f520226aa7
SHA1ec2e7bf79bf24096228044fdd797f1b74f06d0d8
SHA256d1d5cc2cbc5df4c139761681c30829f3a30edbbe8151945ee069f65232a6f100
SHA51246f1f6e66c561e272b36b7d28a1b626d185175e00d9394cc991e3248cbcb0172d6c146ba70087585a7674ee58f0d7c07194f73c080db688d6c4b1a46b2ebbd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568481918d92eae054f4ad8249e10ba61
SHA1f9f8f9b91e9e1c05e3931c7bdb9aac418dadfdd5
SHA256ac917c0b06d95b1b1f10ce646f820c66d004f0032171b9afbb62b9a707010e53
SHA512f19750437536c6c93489e84154e69ddd685dcb8e8fa9b377683e507c22d38222f461bb8ebe3a7245c67677e95c213a7b9ecc54f4644d93f6db31bfd6b6733dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aac3be68cbad3d774f000c996c306ac
SHA15ba1b45ae5a682219130b1f3fd4634b4e91b4c83
SHA256bb34134f2a017706cc080517f96202da0c1d6cd3c33969f1c2cd73d5bb4217e0
SHA5127a6d284ede87015f7fe940f2093830e4efa407f8bca45360d6405f61bcd46ec1e6ff9bae72952e92f497ec003a41a9b7a5a7e2be0c675f462f970763639067e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf4f6b48c1e8abcafbdf8ec12a5b16e
SHA176edeaf7eeb506aab0403dfaea5c04ea1a40b96c
SHA25650886a5a9284cfe10058ad445a94793e68402064def8f4121324275bbc78c170
SHA51246579f04c443347a8ae4fdd1d295732a386e7f69a8fc6d291e089127f69c002f1c48f717680088be473307008d4cdf6fe57c0332b39c76c68aa890c0f882d0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d8068e50102c1715a3512d937e5fe9
SHA10cece2e2be91d2ad6b16ccb4ead9cb70befd4396
SHA2566878867cf819246c2adb4d4e0694c57256cb58e4493d8db6c42268fe10cdf4c5
SHA512eb083b8627d5dc56c7fa096782b7cd3597f4e9de147a4f9529243809cff28c9b3582261f7b69dabc16c6b95e5be60bc97185a01034036bc83cff898bedbb0d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e085029024e0d5ef0732803a0986572
SHA16b3a5b871ab2c06c917322d0accd095ac2caf2ea
SHA2561a25e94f9d0b94acc0e72e696aeddbf08b6eaf1c944919dea82b808a7d74ee73
SHA512dc5c4deb26f094c7970d180cc95f6f3d3073657182c61f43770ff5eb86275c718c9ac76ab45b37dbc0ecc873121192d9dc55e1f5b0d0f931fa465dbd553e8125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e48c6fe9a05dee83b6bbdaaba1a157
SHA1678e7381ded84b5597454286a59c972250a7957f
SHA256b2a5079f416396db38554a8f2ca39f1a4e1a02764e4b2346f7798e7762cc9d28
SHA5121f7e5632bb4f1db4925de461aedc1d9c4c26e8969eee515459109f59d95a860a68ce205af66946f761ce3ce75679acd7d914aec3f082cd309b8f53b6ba2bc3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2d5bd1b8b19bb1b3da9c47fd20ed55
SHA1fcc5a87334f9bb7038fbb9f9306a3a209b0db701
SHA256aa760bd274ca84f1af3c9468f3de47dfed23cc25c2cc12f608fcfc49f875f749
SHA51279cc3710980be6c173cad01cd8c671d26d8220482881dd373392d6c4c629adfe1fcc82352a79935035a66065b03afef9a434a28de307fd2a858813f4d410f7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56632a30aa31a98915fa22752e5b43107
SHA1b32715536358e3afcc2f32b44894ecf217ddcc71
SHA2567b70f3892b73b55eb463b9187c870feafc3b28d001493c78ce95c93e22c7fb40
SHA5128dc68ff11f3a63b452a10f25aec3da3aabaa8bffd3ba331c9401b149e2ddc79e572e0f87e13a3197c569cb772209e7191babb9a80d6c5f8f8571d5b1c4c92be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b738decde916cadf67e86d4091c9a4
SHA141183d5cc1ff92c29bb4165206676e9a0f7b9cdf
SHA256bd3540468a96c381725d5911042d7c292f8ebd4e93174c147b92dbda5b870fe5
SHA51258eb28a09718b1e54b66a68aba0bafd277422ef4fbf5d2a6f1b549403bdcf9a43a5af329d0aa7c4ff4ace3720d274d22f0b2e04eff357d3ae47d87b1443fcc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ddb5acbf46c13584569e8ad7e9ad64
SHA18fbf73891325b4c622d709862cce5cf7a7cce141
SHA25603de35898c07b14564c3e05e84fde1a59a2e9482426c062e3d5df536416100fb
SHA51224f0956a7c14a9d917bef476876bebb41e1444adefd1db1f6c46dbeba96ce826da0b7a03130c05736a9dde3fbd13fa3a410653d66092308ab1ba7df87cf2fbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ada03c8d6f00c3eba63e9f0225343f88
SHA1992a57b9671d30c1c17c283c056c5499d9e49cab
SHA2567e91ed5a0b40d8b44fecdcb47e6447268875e4aa657c43886ad9d901ea4c87ed
SHA51295c9939721840f15f8ceaa4a66ebef5fe2a8b8223ce031f02c6d0d05013e63f2a947718035c93b581045d1b5f0141f77a5241d87adcbdcc12c28c446d8c053fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b