Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
bd3a93bd2297e15d59c4a2a9dab6211b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd3a93bd2297e15d59c4a2a9dab6211b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd3a93bd2297e15d59c4a2a9dab6211b_JaffaCakes118.html
-
Size
318B
-
MD5
bd3a93bd2297e15d59c4a2a9dab6211b
-
SHA1
1467c5e697f8cc7574b26ffede46dec01e40d132
-
SHA256
6c7443aae34b3425a498604c2a687d125f5ab87f1ccd1b4a9acc135a2061ffcd
-
SHA512
187c3b255dc43de7613981370550c4c5d1dca6ae8236bd79be9f03a35a8c9b8538fd930e5092b3f1005fb7bd36a1f2d0c1af50514dcc6d5dff3624ee7564cbcc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f48ed9a3f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000001e32e1d345109ff273272b24c1682a52d48adf1409bf4dbf03ae70a6a2429ba2000000000e8000000002000020000000206f126e738f0500449800516da81ebf7e7c00996cae7e599a8b4ed8bf31d1cd90000000eaad19b0279e2ebe7db650c87c10ba29267569e44ec6d9e3b57a4b7e175539127bca60241e65da33fd82a7320a15396aee4a16fdde4b9526c603779f10f3e20533292811facfdd959f52f83b2144efc5bac52c1537bb4ef106ae56acda1010a424cc2e29947e0239058caf044f7641aae62aa52dafeb5a56a475cb03ac425ad4a34f592b35721b6264974fa55765912e400000004bd7d516209b76625bd27767fcee3eafab594fd64a0f59cf37357b72d0d49446345e8544aa273c21d94880e4ffefc2411df7e880caf7259b100fb67c5e2bd829 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007ce901b78febd85463ccc8bb7d67bf1ab620c7b33c25786f5ed14ae63f43caaa000000000e800000000200002000000029207759f17597545d9b898782c6ebb9e94ed615cf27b8eca3a68658812714a12000000078b952d3c7cc6ee24eaf70e12a0080e53877f03871a7fb457eba9eb34394798240000000177c7a36fbac3018523ce5b839fa876507f2163e3542f8492cae4c4e6ab8717b8483d1358e92d9b999e20f69355b960ccaca63f8751c794973ed72eb4a292f04 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00D58D31-6197-11EF-96B0-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430610532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2164 2420 iexplore.exe 31 PID 2420 wrote to memory of 2164 2420 iexplore.exe 31 PID 2420 wrote to memory of 2164 2420 iexplore.exe 31 PID 2420 wrote to memory of 2164 2420 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd3a93bd2297e15d59c4a2a9dab6211b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5804cdd447a51cb5aa3f7ffc3e8c35
SHA1bd6128d5d698890c779ac158ae8aa089dfa6dc40
SHA2564a6973140b4f950376903f5f42e6606a0d17f42ed0a290e16d00792c88623314
SHA5124b09aad9f109cbcc3ee1cfc1b12aabc41d818251bdee0785c1ccf77fbcf76e745d372c4b25b02654eb0e5e7353ebef04777a8f0f76147b57697029a3a405b1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f8052f840845ac295a362ea58095d1
SHA17ef3fe3695a3a804f6650ca34bc23c9d1bd32fbb
SHA256e135372eea9c459c33ad2dfa387b959ee6634992d4d6c583a8e1d1523146f410
SHA512136ec7ddb2fcc73443262ae163cd0b0562bf76c4f11de1c6da7a0baed14fc17bdd98c7974d8f826a4df26688ddcfbf3960e56e84ba16e1de8f2f4ba5a86aac9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0de67642366f0a1993ec461575e4994
SHA1c019e060d7bbea621d43f18f9ecbba7c85c66a06
SHA25608f7efa2c27ec7fe88be7061a474d4d6fe40d4fa5273528bcc4188ddf142f948
SHA512b38f053b16c129bad671c03475cae9a8f62413e79cd37992c8e400833535742dd0e2d8311ea116988d9115934c42d26b48dc4ec19a20785be6c0fe30bc76395f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad24772f30ee622a01cb96936d174d41
SHA120281989655da0656b60bb7b517102781a87eaf0
SHA25620dc3569d26376b429add7a8c495803fb06348984d8175c3ad65ed95db0bc611
SHA51265b1c83a8d976bec0bbeeb9ac08e1c235de7737e23fc924ec05691ec814f2fedb2efe31f3fae6754cb152b44e3feeb98383e80ec66c7e36eae272bbaac331279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db557cd3bbabfe7b8f4bf455c796d5d
SHA195a8498951606b1bbdf2e3c1bd7051f730baa658
SHA2567a0c602b85bf11910b0c88b6485c7a7a38f6df1a708bbe2d2b6e41d89aebe662
SHA51232e268ee39d52542f7bacd5702fc34bdfaa8d89c7a6173fdc732e7f43bc515135ea2d38a10587cb77900b6b21325257d9958cba46e2e466d000bf739b734b135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce9f93cdd3f2e3381c3adf0973d9a36
SHA18e1778fb13c6a7d091d7ae2705114931be4380c3
SHA256b31b477b22b7fbed60f8b68ff812e68da73beb51b5190da64a477fe84585659c
SHA51280a949d826d9f68fb3cef929998cfe3e53aa61f12129efd0ceb521933502d9ee3f9c30667495ff20b7721d6eef096c8f3cb6b624bcb8cc3f241dff6add3b5bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1920606d23729e94d1ccdfc017c3dd4
SHA11dc710991cee91d4e71e8bf2054224f9d1d2f680
SHA2562361e4b7a7788addc0855b610d7f7de48acd53fda679ccf520079561d8d53a16
SHA5120eed685144ca45d26c67be0fea0805f5b7d286ca95b6128b78d766df8b206553c7324abada100fc83adcda2a0b193715691dddb8ee335179370858f167543e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f1f78d9356a9c50274ec5b9a788eb0
SHA19f0684851ec4c2bfe6da372ed3d7d9d51b6af02b
SHA256400cb768b2540d5d4bedbc76bcdfcc74d76723cc161513fd819857080b0d15f1
SHA512ee387a9fd34ca28f220e8508643de8d1da93bb244ec4d84ae20f9f9184a78f0222cba999c91301b3d22f25ccc0f12a423165717d23bbb2acf9c6f2d82934aa13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0f63938d6e2242355305af4d291ff3
SHA12a1042fc0baf2552aac6eaeea6d17bba0b1df34b
SHA2569edb90cc44175e353ce88969b529703cb2b6ec049dbee3ec371e9e95839149c7
SHA512f23882685bcf8e23ca8cc176c657651ef3c31f1315c021e6067798e40f7c5b2ca5c8f45045a146648d4b2b990fb990cb724d96e7663f9605e5f7e80ef5228105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746d165215f763a778e2fdd94b48857e
SHA1816c65696ebacc756cb8919bb9f5cff0b33c03c8
SHA2561fda97934dc8f05f9b0ed8a156036f20ddd13f91cc10fd598b86057054b3cf05
SHA5124e324ef343440581b642a5a75221245de6d139fb86288f6ffe3b4eaeffb2a59d83a3e28d85c72b48f6938fc3ccc8c912376bb343975803a0d097bd73426c2d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7008c1745c8ca219cd39baa90f884a0
SHA1568c7b29ab0686fef85d68aebfd6c2538e126a09
SHA256cf099d1b621ebdf795fadf45f5ce34f3ed4d8abaf09291701755c7204dcd2ba6
SHA512e81cf76dcd54b2150a881d416cce2c464f562450bf4e4cc67cd5ad4af09ddfdb43ae29264341b08f7a0fc3745a86947599776f8f01b6360b42237f2713aa9915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0fafcb99a50ae1bfb7dc080b474933
SHA14117e66d9d39fb34d6d9899ecf1591d50b42dab6
SHA256f4c59bfaa89ea7dc2e411d1cecc012996c18b2b5ce227cad803e636e839b7b8f
SHA5122541a318923b684d8fdea8a8d01decb6b9eb72eefc91116c22c105651959b98e35c0ce140d4aac0d04a904b5bb39d89d828de869a59da1c07d69f45e4eeeaa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c03656db75abef73e625a72743c3fca
SHA1b13a2704033fb1894738a7b78e9ba536641de78e
SHA25629622a67c236f469a353f2b53b7be963f11803829128f934d5f7619737da2b96
SHA51287595bf4b003ba49e215a3b28080fce4a39db52d7cdd3ffc2ac7815c0266fe653d2da15226dee487fd6e371d49c801faf87d908a2d8cf6d4a5ed27a7d5a9c9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52895d9e88c808effd157db26e428802d
SHA1d2a599ae4487c0d25429a51b21dd557105e81d16
SHA256d92b05bcfd3710d7c3abab74e0ed8eea46a078dda620a018ead3e602cbcc44a0
SHA5126c3818131aeaf88a9bab7945ae098bcac41d337a7254cece256d3a9d6a835d4fc26940fcdb892f38b43ca0165bf4cbfa0c291b4d6bfd3eec93770be7a10ef5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19066f4bc817c90c4293e57cc84f93a
SHA1ede865b51f4f1820d14e7969564f3d66c1e20e3f
SHA256b4fc0095c84f45031bb59d4cd4321c87b58832ead5fe65d26346c17937d8968b
SHA5126e4cd04122b53b16604832236de20ecaf1a332c6fad05a1040044e329617bc0a21da4a54375756fe45eab7dedcdb27a71c0b4c6f51ec60fd20b05292769a4466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b74bbf1d1440975c2eb1f53b7d68a17
SHA15356cbe8ee3944b393d6c8cbd60e1752361b3441
SHA256e7a09659f3de9f4f26464279e4646735db40d8f1c79f188e7384623fa0b13785
SHA5123fe8b09afdd3c559564606bd928d23e92d6c15b723b7cad7548e16bd765ef5ecfbfb75ab0300252f1492c0120a6d7a41c4d43bec40d4a7271c820d026d0d6e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0146fa70986a0a4b4c936265eda4621
SHA1370b27907097508d7fbd4dd8230c7984b996ec1a
SHA2569a599563d19d555daa7d420c2f91c170247cc47fe40f2568e9f59725cac3bfa2
SHA512fe33596c897197ab0f31ab1cbbec595bf4de08f6bd4f19ead206fed9ac730a592bf56763cca4c989f6c1133b27fce95d140e23d4792a609b841fdbb8b9f30e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b298953f133f19d8309aadfa97f097e
SHA1475904e9bd2bb20332460e84f1738650db88b317
SHA256d083b2eaa41b825c484d7af1e0718d606ac4fa26973bca91fb1ab223226dd3fa
SHA512b11e60360fef7f381eeca565b39fb3caece4bfcfb81fe1567546feea73870c1b8c17ebf033c4ab8398472d0d56fb19be47bd95fcecf3758f4259c36f4a67bb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51578783b8d629b4897dc4d9cbae7bd4f
SHA13f176a4144c85e22019b000a37345c8a761bbe92
SHA256b033d81ac6ce7828a6ef67d94e631d8ac841cbf8617922d00b6495c38eb6d24a
SHA51275ea5780c4e9b604b7a4eb5c5af19056cfb24ed420d4dba1492850616abab460941ac68a2f32c73767c71c5caf591623882220ff5d92b75520db6604df93cf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50381fe68bce71241e99998ba88babaef
SHA18da756b6d791cfcb58e0a98b1a0903b01d0d70d7
SHA25664072fea1661f896e3ca0bf9a5ddf795ad7796673bb5c8aacf8540bda866b8d9
SHA512474026cc2fd9866a3e9647d1efad6edd1ce9f374b4f2b721ae3baf2064de9a7ff38c558e433e846d52546acdb470742756ca02908b870f4777efccddd52cdb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d219c75b2b2d5084376b3e0e2fcbf32
SHA1c868b6af9c5efaf508f92a62e9e73953e3deedb0
SHA2560fa23b68878158077bce80787142ab5eed37a397c1d3325f6431b86554856d27
SHA512564b4f8c2c563de50f5ec86c1e5cafe46063e69858ea9df370034fdca56ad0de29e2283f3e850386aaa9e83d5e3b03d7fc5b2c482c287eb32c16fd12ecd145a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b