Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
fbad772081f93af50d472acd3a2b6cf2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbad772081f93af50d472acd3a2b6cf2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbad772081f93af50d472acd3a2b6cf2_JaffaCakes118.html
-
Size
23KB
-
MD5
fbad772081f93af50d472acd3a2b6cf2
-
SHA1
bb2622b20a5c96120d0cf577040ca80c594cf772
-
SHA256
57eddb519ea6003ec63c1adaf5d4d134eb643857233b5eb1621586f7a7085b98
-
SHA512
5f412c971bdb08b6c4117bbc82f98c56f63f5ec732313f141670f517dbf6e7c3ec8bbf42bc7d1da1bbc5d373752716ea883e2060f4af98d27cbeaa7d1e1934f1
-
SSDEEP
384:nUuZJYpbmiS4G6S0ZJWqiMQ/K7qQl57s+JOW9sgeIe1eueEKkVKH5BV:B/oxr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000021cdc39dc87c8c545f7c14b4bc67d52157ffa2771190c8ae82957208c224be28000000000e800000000200002000000017dab4df305249032e1ab37f104042c0064f8bda4a669f73fcc17650dda85064200000009ffb47527ef24fad575a216631636a90c55757b180cb1ab510b52717cadcf7f940000000395a6d56a76dccb68131778b7097778d8ef58403bae7221017e3cc78e271ca0aca859ce84434dd54b0f8b854958fb71313099976af7707b40a8906173ddeb98e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{819A1811-7D61-11EF-9E99-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433666191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d5f9566e11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e597e33146729de5bccd8baaa24f9b6d03957c9f39ae1f866fd0b9ff7631c7ae000000000e8000000002000020000000985dfebedae0b8c0dd64abe2221997529a3fb913ed77d7dfc58ccdde55a188f890000000cd5320703b34b51be655b530d556de6d4438b16ff85c742cc6cbcad53f98d19f48943ea8a6d707e0a778b527e66342348dc75776059b760c23afb73c0e8dfc1d45443b3ea6a2faeb87b5219c41cccbc22554562b092e1d8cc23b37d66380252b9b251fddc632b485b87515db28885db46a1ea61776dabfc76efe37d86d92f1efeebec58a23142369302cf1f7668bb48440000000d17666cc485b20464e5945d1b184ece7a9894898d7fa8d43c8196bb214e4689e526c6908000b4dd44a8d682b86d6148ca72530e3a821fe3c507ae401148db89b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1464 2260 iexplore.exe 29 PID 2260 wrote to memory of 1464 2260 iexplore.exe 29 PID 2260 wrote to memory of 1464 2260 iexplore.exe 29 PID 2260 wrote to memory of 1464 2260 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbad772081f93af50d472acd3a2b6cf2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2886bb4d8bae0480c7e4779525737bc
SHA14c4b7e8e6f1f498c7b23a8670a1bbacde7b9cf3e
SHA256b519207b9e12e16150af86bb6d6e3de8e833db4a5c4e26b26d742a29a5f602ed
SHA5125bc3264c7954b9054a749a5466f82ee97b5c027e8fa8e460ad6dbdf123c6561197a3de81eaa006f3fda414195ad3dd955e09262ae034a8e09addd68b87a47ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e8b9d30e5ae6cb7f5656379d82143f
SHA159b09f99677b907b5f250ca8ce91c6c72c2228b9
SHA256094fe45978addbdda713ea0256de65c33e2d416e3b46c504643cad2207c1111d
SHA51202ca0030546b2974b91778f40552a072d43b1b673928134ad70f87c11fe4e14da88c8e7bf80ed4c5a6fc2131d8870084ba1eb9aa3529f6a9469daf2e56b75a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b737363aa4a8d66e8a6c0605efd9195d
SHA12af65d259ff904e59de0c8e85a7eb2ebfe1272ff
SHA2560901dbb1189abf6a7624b3e27673fa1868cb9592c4d5f8f7f14ed5f63b2b6996
SHA512b5ccdffbfa0f52cc1e1fb222ed3f3c0b84a12f6245e223d2ebbcf5bdd887e1d05eaca38dc4fe68085686b29aa93dba6ce4c9b357f6d85c08d493d0a22297b457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58634ab26e2d1d6af7f046ae79c63b997
SHA1eb29adfe74ff5c4513a38b88fcf303d67e532af7
SHA256a32a69fd4effee0aeb738798c5fd04dc0ac0bcd8d84f8d78574d8a915935c93e
SHA51297c657b42d85ad41d835ef44a37909cc0f115c34bc5e152c20481295e4fa303596fc6712a6aa87573a3a911ef07d7e85067c8b718eb70b89a1dc0561abace0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d55a60adbdb997212a05e9f1011eed
SHA1f2942e35d398fa862eeb49b1bf9742c2655d0162
SHA25674c189a9d190169594b5c777ac4e2b8ce30701980138d1a71ca612343d2064ba
SHA512b324c967a8b2ece5586ac6130a7e8eb894b7bb475f024b152e5bd7063999844d4dea96285eea76d4ca08465459d48f3345890d42e98d872959779b754aa2b416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee2248e2ed45ade7b2c3444cf02aef4
SHA14a9d99ecae5c8948dd8fc9c5cf91b178a06ed52f
SHA256222a0f44ef82546cbb49d04c6f787985b082369fdd31d4afd7c4b09f2287a164
SHA512a620edc8229af09afe853482e9f797973c8153222cf45fa62b26923773813aa93aa6056d1c747c524ba92a99de698b192cb849f3e0a0578bcb7abc2356fb9688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5677b4fbf105187e1f761c61ac2cd81
SHA1f8e8d020e808a81802d81288322320900d0b19d1
SHA2564e3789cbfabe14f41213e5e548d4655acb9e2025736d9d825c6f4fbe98508dfa
SHA512f96f1c11afa93092aff4dd54637b4081ded806f10eef6ec4f4fb4fd7cf9499b6713108d836869051edc1169a919b3bc59d83349cc322b9deeb2d15bab8e86072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a7961b44588be095dcf550fd82e27a
SHA1ec60ffa2c1d65424e7a327ac622170daacf91ecd
SHA256aac44d257baa73c9b239253394f729f4defaf20b0b00be43836a2a67778c6410
SHA5120b7b034505b3773b1f732d85c41110f1e68bc92b0fa414ff2b06a7f1b3fbf2242f83bd0dc400e749672a5fa551018331613b561cbc7acbe45171fded08123acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e060c1ad47b5cd8d4429511b84ff7de2
SHA1d79a4e1c805a48572f109d0bc73ba11b7395bc3b
SHA2565de466f7de017af0d92dac7991414730ecabf87d517f1eb8c9bcc4668b81cbca
SHA5122958cd4d5fbce9e2b37ce62d47e6d70bb5331705a4e46a7092a957e052eaae8528c3d4d65858161e18d0d169064e12505536bbf30b18cfac1430dbbd89048d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513bb88bf3ab2b4967b32810cd89dc062
SHA11b691bc29c9036cbc7d21eefa3c47a81145bbb1a
SHA2567d7e68a4888007cf2b7dccd1ca3807d2c7cb53e46e37ce819509981152446a2f
SHA512977cedd9c7ee6503817c3ab2deea3ae86986d74cab2c14e404d594befe624ce3d27282d3a3333c29f8c75e54c7a248c4fafd5a412a958c5cb69cfbd77cbec26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdf6764cef1e20fc10317687f973b80
SHA12eb5c80c565f81b6af2702c1256ee6741198c0b5
SHA25692ba9ec2ec119507af3ee6f7d58e7222991bedd01d52220859fd90beb961bbb2
SHA512b2006c1c5abb28ce84e402ab51d380a32564eaf0b3f967eea9e415f2fffc3e7c5eaf9f036f14998f441c93ec04d8abff8d7e05856cbe1f995918c7e61388db8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9e4353f820bd4c5b0db35b78219073
SHA133ffcf7d1a6c2a1497559ab679f4469cfd5e8ba1
SHA256410aa0042cab2d235e6c3def1164d8d795b66305b469cb07ee9ebf147c8a611a
SHA5124f15ef6071af7d6ba864351f0390184218ba1a6ab5bc65a42191b5f1d635c09b237bf163ac909fc27cacd5f0072f5f1d2db463b76f81f3753abb97cfc68868c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43f777ac6df712ea698ee2bf1a313cd
SHA15f5ebe1ba0b104be6f7fb7cdb9b46c9d4b8634fb
SHA25602e9dd38ab8c33f6936a5cc541418986d817836fc09721772ad3c0150b54bfab
SHA512997c46bf8e489c1ed8185903e6f85c1e90e40ec85724d3174e09d9ffe64c07c3c8314f7db34e35223e91fce51839d8c9a0b651eaf0160ad1d17fa30a371a2002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e26b30cf9e74226b81b0593ad64be9
SHA10daec89eb02dd8368630266447b68e1fbb326e0d
SHA256ff8e05ce031f4a6a000979557becc9468fc51d17c2e167fa31c502973a255d67
SHA51251a8b65ece775fa48100f763076a93e146ea89e5f09c99ee18e0de39e7ce5a3898f7b3f8781ebb00cbcb8913d8a7dc5a9dd5845b812da2664c3d06f705200b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582473be3034b8631b0a8bd28eb3c405e
SHA1fa4052e78e6d7b9e92bef9652c593a5cc994dae4
SHA2560479f732275b7a3661f512719ca6e7cdba5311dc5b76b433bd05c022fe640e7b
SHA5122ffe08662edeab9b2c52d808c5ef88f380ea27208726d92c23fb89831da6fa2a6d6c9bc23a1c86c0ecbd3c44e1a63ae44c2ac9b01200f4c9c2d6beae3f28a248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577202d0ca9dbdaec41c1bd75ce92e339
SHA169d2a399a4525b12f24f77ce9f7ab971640b60ed
SHA256f8dcf6ca305dab1d369863933f9f565f2a317ba40ab2a95c2ca3655792a1fc5a
SHA5126ca5dfcab4da44379e5bc817aad2645587a7ffda00fa04dc4e573469c8b9b64380cc077d55519995d4efe41c74aab5b0db808c9ec770392577fbd3e5853c3278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d48c11862962fd27b9ec1f8eb6e1cae
SHA1f687e13ab894cb7df62195c6ac94c127d3b019c8
SHA256cae1dd882783687d2656d8a010d1048293aa267bf64badd123ef148160cb4203
SHA512ac10ae71d23a16736bccff7aee203c523e5d50de91721db9401b9a14bc59a65fc67773c47bff343cec804376aaf64b0e9f1f9ed15ab05ecae9258fd413bc9230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508185e2a4778e72b1f7f1ffa0ba58e1a
SHA13bfc1566528804c8f70a6f6e16777bbe82e9b025
SHA2569c6a1a48b6404c49c4dfe6795c0814c52179436702b528309e8ff1f52d44378a
SHA51297e5cbcde3a376a924fe31a29fe970573093335f4955e4739f54a4373d087a10eb837fb249231712afa33d7aaf3438f80c01c21f24659e9a92acd957ed102239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66493cb84ad855db03b5d9feb1e4581
SHA128bd058e58510c54bf8614e77cca475c15b051a3
SHA25626cc27db47a8a82bf95eacac49461e14a8fe454f4766b6904c4a074d294f0344
SHA512464630110dd04f2e909d59cf762ca928a435302b12621b8d817acdaa1d4dd6689c8855f8d06cb15c21853801d8d283d84b0687ce63fc4260ec131567c2b29a80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b