Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
eacfcef597f632ba5d9c1beb34e8cc13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacfcef597f632ba5d9c1beb34e8cc13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacfcef597f632ba5d9c1beb34e8cc13_JaffaCakes118.html
-
Size
175KB
-
MD5
eacfcef597f632ba5d9c1beb34e8cc13
-
SHA1
e8d15b5fdb122208b96f088dab46a7d159bc48e6
-
SHA256
96bb651b372393c7aae79a19f6e63e7147737db04e68f8a98efa330fe5048649
-
SHA512
0d2032a841942c40972808d49508a9832ad984a9e269a35b08d8c460dcd7a5d5b97b140355b705b8357944f861198e6f3601a3372b56fb98da3f81402a80cd1c
-
SSDEEP
3072:2VnjyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:2VnGsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891240" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000039ddab975e41e631e162d7c4ac81fbbd0122c3bd563802a2623d7a53ea296c8f000000000e8000000002000020000000146b727043d18a8d8fc8ea99e68c25dadf4fa6b6c64e42749f49eba78aea8989900000005ca410fe0be7d8c07d82f6612f230f2673cdd349fedbdca18d211261018c278029c15f4533733690493946c292bbb76c3a11d22136f119981781b6d4397485acdf193133cf36bb0c790d2baea571ab38090f573f3bac0df3a09a2372bd6b28d38a242929c177c33a398aef54c6edce768a3fb18811ea20a6c703c761981c6cbfe3db4d4f79bd1169d166909ea60e028840000000f1cb6bc1cad086a5a838655b72db157b079ee7c741f3c7ada030e0d03a3f7cc1e7b6f933f97a9df9f0b73fd6bac73f9b0f4bd79f6885a4cda4d1bb4d178f6650 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000580264e3fa44d58251113184e192b0b993ab7bbdfbe5cc85c8676f7927fce508000000000e8000000002000020000000a3fbf80ca5859d3c0e88a1dcd59cbf31fbc53188bb67502b0a58f13cb841ecc0200000000b172970d590f5c4bc86938dc7153fdde93f791aede20662260df6e02806f7bf4000000004fc5cda44dab65936a122e421ee4bdd152394acec3e41b6edc4658f5d194671395d4313a3df8e848371cb81f912521f4606bca37f6c455b8e43862b91da1dd3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30B10CF1-7655-11EF-9630-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2047c345620adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1680 1904 iexplore.exe 30 PID 1904 wrote to memory of 1680 1904 iexplore.exe 30 PID 1904 wrote to memory of 1680 1904 iexplore.exe 30 PID 1904 wrote to memory of 1680 1904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacfcef597f632ba5d9c1beb34e8cc13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eaa0ad25c059f0b613cae8b4a3d3100
SHA1ea4e606ee7f6626c3b1bb3c77a1d9399692483de
SHA256b90418d309c3c7e2eb93d4eea20b6e2cf8e54d3abd2c4b65a7d0de96f07d8599
SHA512f4710c6c328591d4e910c2d4775c702008fa0d2cd31899192fb20a7cbbec88322fa2789787441853518d5fcfcc99d0734339182f39634e691b368ea9a9879c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56277dc1ba383d25bb7c017acee8b1c74
SHA1c02de295b6c35a21118ea0fabc0492ddf41fc568
SHA256b7cb8a000a48b91fa2a40c73471cdb253af730e4e6106d25cf2452f7b4feeb3b
SHA512927f43ea4e9d5c6c441877696b1f9ba6c69bc2e74879096823dce9016bd1b17d8ee7dbbd9e2ec99078798c526fbf2a84f85bc9c378f840c83c32aca0109085e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273618bea7376fd00027589a3c447da3
SHA1ba3045a11f4ea2e9c8f6b44d8f210b2892313112
SHA25608001155287fdcb82315e6f333faa2ca7d373499be45a4b36f3cfe2b2e73aaca
SHA5128dd17e0bd0b30d1ffa68f315c84026b11b6dd4af54bf8a7d6ca053da3323f723d7938be44fc59973f67e1edad158d10092b9e15fb69c1ac9f884d4cc30d68bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586bf98a49898dd15e5dd5c764fd43bc
SHA1d391c736d675635c9f485a1802aa49f92f25ce37
SHA256bbd4ac56df603068af41943707a29a2cb9d583d79f837f8442b01252a5963a8f
SHA51276d17c3d5f3140102027d0e1e2deb72bc567602440f1809197869e1ee4d1f82bdc2b47c7191e6c0b41f99b3c8dfef866362f200f26c60350de1629f5fb1a765b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0e0ab5a0bae85751b005f23c9fe24f
SHA1cc2d1fd2a4057dc70315c6bca1803166055d3a9a
SHA2567848f978d0d7aa006138f636e207d42365a00acb371087e69c6b4dc8cb0831c7
SHA512998987d8afc00759b7f7711a27b5f82d0dca63d080f651cbdf3bd541f7db1480467529e1757bf2244c6b84266ab5dff6fad2918a80a49ab5b06f9bb92140e145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac36a5147cdad30d00acc1b5a4e91efa
SHA1cebd0b747990124fdc5e3b0b9e412531d1900995
SHA256f332001ce31421b6d8ee745d3001c1d6579abd64f003c7fa4a59009f0da53a37
SHA512d158af3c6eee3ed0238539338c40b6dc39a6250584737c621e0d9a381224cba55d24af8df5345dcf93895f70ebcbd40af021dbd899f26aaffc730a64c5d17682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a517962249358e7b3379514e85bc595
SHA10fa6b3b80e7324c5d3439935fe3d30b9dcbc42df
SHA2561ca30c32afafcd11435313df951021c9ca4ba7e2b21ec033493df013060ea579
SHA512fef9885dc98afebaaf56a6baf5ebdcb27f736ec82c7284e39b35345f2159fe43ba312c913a0cd45ccb083c24788d10879035623bcb659358e9ff8d562fbc1be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f559dde5078e14c010dcfd11ed4bcd3
SHA18102e8a062c2b876c477c960233c5d55d6748015
SHA256ffb206f5243d29fca8e43362111e15db55d9edd83aac4bd4cf46b75bb02dfdc2
SHA512c207a0cff67e8b5a52dfe032db3e17a3ff6bb0b5d4530ab0051308645f2def0d13ea98fa785e63bbd8c9d76f643476787e29f73dcaf907c1ad8c9dd67f6eab42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48528517c98fdec11451c7787d14343
SHA1d5d3a7f0061df8472c4ecd1c3524303b548bf8e1
SHA25654220f7bfbb3bb99f3bea60459cc96406685fb4fc59c61a960e07d7e2bd76755
SHA512c7518ea6b556b05792bf839cb3278e02999d95b9d958b03e350ca8b42eaf1cb22f7cf6a3b631f6f44dec3319e467a363d4d9e989738596f3261aeb9dfbceece2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439075d809f2c332006f5e91af076b0b
SHA13bc6692734486dbc463e732edc3d55f0b41fa929
SHA2567f7ba509752cc6113dbecaf96a99f6c593677502b702c845f3410f3f5addef8c
SHA512c4b2cbf032471999f6c82a9012855f707ffe1870cda687c6ea7738fe5cfa47b6d5246979411c489c3b5a8420fb0f6263f515793098d561c63d79cf8f55ddd546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f551d781d9c830f79e4a29292ebce1a0
SHA1658756131fe40eade432658dce17c388ad3cd5ef
SHA256f462dd768f3f4ce9cd090ecd57a930f573330088c88a3881ad2d37492668898c
SHA51232746945b168de2fa6cf483aeaaffcb3d6cf60d22fc4cb0c38a3aa9d3a6b05f2bc40e6397769f0f39615213a638f2d78247cbaa140aa159fb4b23a005f7d8e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572550288502e757f57bd98951fa2d6f9
SHA14d4308e9a8544a68e85246e1d85067767995febb
SHA25643ee09038761a8134be700f5e7b94a439d3b4572ee37ad475eab40b33991f3c8
SHA512c150eb444c6f97c23088bddd202c2c2f8ee68ab8ff960cdbd2da36b240b6ae3fdf20d37728bf584c7c068577d494d0052788c168674261d1ee7bf6d71e92645f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ba17435b4aa23000c947026ae4fa56
SHA1335f48fe08057a8da6d952867d941ff114d59343
SHA256e354b05562a0894ca0344de110a5a1a33f4affb314aff9024328717842ec736b
SHA512633446961c173cf32cfa2f8b7ccb56addb4a959828b532539c256ff509cd2b03d3fd4bf8c290c654e47e274fb5aea518a2094ca3fa20b9961dcaefe3f30c0870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acb297a2d2613371b52f0758bbb582f
SHA1c1a5dab3e49d96548df0c5b639ef388a818519f1
SHA256d94da7beadfbf394994be4feb95ff5e57c16c436b24246e7fe37a01bdb61108e
SHA512c8204df806b1491a9c7fa3037cc449255997401370d41906515bae9ec7da94ddb17b107804497004cc6f1d68f52b0ac3d51408bd1dd548969e3d76b0601df941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4b52bccca45828cf893bc84155573e
SHA1c658abf779823f5aa44d172b0db08701f6fa1121
SHA2560b41603af713a31537185f460eb20536070eefaf837935a80000e95be357dc44
SHA512cf6d030e4955476c2091ef2148646dec8d31b30635b49f1232a3ecf67b8f27a14e4d497e4ba6d987795e9d5c1b6712b087520aa1a502c838f1de0c9ad79d99c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26ccc951090c37431e2837a299d9f0e
SHA19f56e66112681ad520e24de191f0151097bbfbcc
SHA256d2a3d845af1ff1b9bc54e4cac7b7f7050f2722d3150e732dedea7c7b2d799ee5
SHA5129840700e8659ff81963c269aa48ebc10e833a94b1855cfbc79c662fdd02fbe3817676d45b6c2923cad912f2ee1da230310f558d2d3d2e4b4dc4cc5c9b6adcf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c44d58b8a9f5812be99c44bd1945f7
SHA1b7c88c8cde10367f3cc8ad97d36a733f5f01b2aa
SHA2560a811c4cd8e6e78d1f809fb1f24f4eef556d81a8f5b4755bc08fad199794952b
SHA51293c44a603878ec89308ed2008dac1738a62a501fc4638cf1d35c90107ea93bd5a0efd88285cf26a4197eb09aeca68698f261ecf5bb86f9577cb7af175cfbe26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fd1a6d83ba412ce7d19b45203218ee
SHA1f5151c01faa803dba911b3331cf2c4878e0a7cbd
SHA2564429c95440b053486b8f2009a79730c8f4dc20e4ffc94d03e1e8d7cb21429aa2
SHA51258cf69707ec6188169f03fb1beceaeef05be7730abf3a556ae97a374ba721b161c9b7c3e46b38ff46e2ebcf29aea60a9302b747f166daac72376f670ae584798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d427ac19dd5bcf696de33f8cc303c89
SHA13871a035a5797ec4a98b0febc2413b26a41822f0
SHA2569bf600b61b8a2ec664f0c74a99697442699a6cf20750ab901e5a4a4b0f265df3
SHA512ba6d2b3fac48158e5d042008d47c5522a18f9a7a677565102fd34d534d4f327272ac4accdfca9896a75f220a5b2af43eaeaf5c3772e371eb337479fa431c2c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811ddce3c6e81f0e87b66db0e823dfb9
SHA184b33e7a3b9338dd0d5004e0620a9cdf05abda44
SHA2569c5a75a2421515f62b3c148e254fe6b9795ceb8b4e3abfe95f9efb981577cbf9
SHA512effea72626c02d2285c398eac6c6836ea041afb6471bc83e1a029f0af35eb4712069f0fa94f9b6739c488bdac342c08b8c51a2ff9bab82f691c30aab566dd55f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b