Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
da925827df3590cc527c96a58b5f4ed7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da925827df3590cc527c96a58b5f4ed7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da925827df3590cc527c96a58b5f4ed7_JaffaCakes118.html
-
Size
3KB
-
MD5
da925827df3590cc527c96a58b5f4ed7
-
SHA1
1ab682f30fb7d3b5f16ac96d0254be09ed460987
-
SHA256
694d365c61ce43d52f80404f688b6193f007040f5e8b074351b81a9910bd4cf3
-
SHA512
906225499bed4de22d29b58af4aaaec7964e4eeb384bbd2f3b3eddc93cba5e0f88c91f603bf9cfad89361778d233cc408d483de2eb8544856390aaaf8208cac9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432227642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d2f469d9d9b3eef0600bc4b45b069b0aaf8a32a7a38c7958f9169e01a0b56ac4000000000e8000000002000020000000ea5143645e70842d8952fb49ed9d666a92595dc7377ee9ea97d0ebcf3f58e99220000000cf5dc9b3bbd31db56e666f5dec9f3f5680e9889b82fee682e6ceae4b1e333af940000000fe40abdc71aeee03ae895a1e95c8eb1590ebd46414b752fea673ce3cebebe08a683e006859ffec87f305995f258df22f0ff9433e1d2a1b4cbc700327e613d4b0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c1ecc088c52fd10485c60261c56dea090e3f2c1c4714987e0b2dfe63b691b978000000000e800000000200002000000024bc07ffa9aa51fa90e25592970e6a73ec74dd882e2fe94da69304d3665ed898900000009cf2685fc4eeee1a5f68813829e01203c032e2de8a4780718d05d2652eb4955439ced0d8421a4f100e478421dbc810754d0100144d95f6e2555c04e4c8f1581e930b8ac824a3d8a2e216fdf933f17477c6da4bef274fa5c8738a0156669c267ba907bd4733b30692d13e8619f8e318534390e5e44803eb88df5f19d8552915178165b86d2ee8c0d1045fa905ca0329fc40000000e8cfc14af8cb27b9e09bd6a67e8f63c21b517b1bfeb4a8215ec29b194f926a57b84b53f344009014de21160ca6824111a66c9a9d0feaea15b310d56c005b8da7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20DAFA71-704C-11EF-BDBD-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40190cf75804db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2304 1728 iexplore.exe 30 PID 1728 wrote to memory of 2304 1728 iexplore.exe 30 PID 1728 wrote to memory of 2304 1728 iexplore.exe 30 PID 1728 wrote to memory of 2304 1728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da925827df3590cc527c96a58b5f4ed7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243f6d429e57a73382b1713c1c381ca9
SHA1f4a230f135492addf787d5a314b6c5c9aab40ae9
SHA256567f0ad6e8e92d90c3de6926c9eaea0826c616c5254dc01329f2a1c61191abe8
SHA512074fdaf756eec0a4994f653cea7088d72cc9a0f2fef4a4e6de965dda2d6915c77619769ee5960148286c2f30a94a3803e00b1909e3309cbbd733a631c2f51307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bedb7a02495e0a8368d212c891e91e6
SHA1cf220cdf596a86e851fd988c71f0bc5af0d0d222
SHA256fbce9c9a1caeda5c10205825e68c7aef5feedea786c92408cae56c4c1ca77c10
SHA512560685cd1809d87a7679360bab6cc39f350955663eb6a3eb209621149a3ad430a7dbb7e5b5617fbf223e2fed9c6b0e1ab3477f47abed3fdd0b980371f070f49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d00c556e86c93d202a520e57e3496f7
SHA1630990702722c0c22ce567d6de439fc0e2c16fb4
SHA2567454b3ca84feb5490abd182036ce8faa4661f89d0b70fab1e9624aaf435fc1d4
SHA51224e05945a60d51c4d237bad50558a18662b99ad6bcd643b88262e1d5531b0dc9bdf3f08bc3f34bbad7a0f085b2195b71f8b0e980df0b163f8c7bfa5fd7525ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898e19b9cfaa5a6ad56aff4e2fc67b61
SHA1d026656686012df6a098c120796b7fdc25f8f739
SHA256c6b1a136044c60cb5ab3cf88a07437561af2c66939c2f2420e05fd28195352c9
SHA51284a4cf6bf4fe765fa338a2084505b3009923bcb54948d53fdd4396f1169677fce65a382aa2c603497db37f2ad9f807ead5d8ef89d9302571dcf2d7813763e64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8baa899fb266ef79faf61f982ee1a70
SHA188c408ef6e5bd558e63e6348cef0ce7a3395313c
SHA256ed1025b5731d355f226d198e905baea18ea0ce17ab4e711c131f68245bb5b471
SHA51220cf4ea97d5137fd4d6692b2639634cd3a85fad4fe07f6652b5df3a1368be761b77f4d824062e7d356de0605c6cc306adb1a87fa7a9b92081e5113a52bf5fa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859a9ec4fb71391be7a76527b34ab9b3
SHA155b7b09b9742cba961305e41b17cfe763d152bd3
SHA256fefae95ab3df6613db533b49ade3bbaf2ec75218269a54d08f0efc7271e3aa0f
SHA51255df2cb1fcf21653e791aa2238a75410187645a1bdd8e62c32b9460c98e74d68de2c377215aee22e18fc754a1fec4f98baef8c722463e54ad49d5b4f9b64c3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cdfc3374e21423fe5139678d21fe43
SHA17cd77c4058cfb55cae0b5c5396062f5b682c111d
SHA256f302e274006749e1bfad41a799758676b97f66901bdb0aab1e0ea99b0cd1bcb3
SHA51232a448f26dfae59a1585d191f32af2c759624f4473cd37fc4243089e4d92c891feb40794276bdc1358c4ead1d8df074d453a00a63862e1dabf1b874d4f55071a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53efcd174c33bd9d019f082131d93fbb3
SHA11ab924bf598db5144a709b9d6b8343dab1bc3102
SHA256bce4c00c5f2d6ac0cc6a16bbdfeb36dab6cf0ec723035e31bfc7483803b7604f
SHA5122fb3017c39ac69a0cffb387b2e43901e6bbcf1c2d9de930e99405c36628d3bcbade81313affdc7ea115f015fdffae1058717b6d08719484e34802b9c02d87c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f243becd37bdf38bb257ef22e38b5b
SHA1952f01d75b037feb8302e43884c80188e0e03899
SHA256c870e52e843b134be7c457dedd564c8913d3b43d315a0853b369047234f9d145
SHA51247c6ba6f28f6e41e7cf35e47a09cd10c0d57478fcf5ed362915afef6031b77a22854ec18caf58c25cd637e59b43cddcce9fe8fa45193282c43114ed5908213d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ce0775dcad07f85d9f9655bd3a3703
SHA1675970e1a2f70be9fc32af67eebc44ee72f28030
SHA2560652912f3cab645aa3b642b6876c3d9493238242fb16b59ba568087d40d0db35
SHA512eadfb01e0349c70c4d98db861d2d05a8bdc8fff32ae2b9cda141846c75b08028149b5c0742a1a770a544e6543a722f4e153c2ba7cc467739488c165492bd9c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ae58ad751cdda41941465d53c2a87d
SHA102c335f080b9f7f31a97467431566c5563ea85c7
SHA2563cc041d94000c5fa94766fbef4e1af4782a75dd374f479d3f087eef489319022
SHA512d327d73d076fdbc44ad1a3cecef5c5b665e5d7b65161e908b46ef58da0b830783ba0455aea51f656af3b9eb0cc41824bc604fb98aada0c65d20805ce30dffa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efbf373cd749a073aa113ca5e1a944d
SHA15dfd033b3d0927338e66820d700657435afd5f0f
SHA256cb13ee219e6bbcd1fe1302cd20f2874066bfcfce2b5e61d9779e41a1a11dd23f
SHA5122ef85d2af589003204d32e2f8acb4b512647ac0d374079a706a6f50845e905f9c0b3b7a4d1e573f4159b555bf791a897735bd8aa2a50ee1d1f54fc478181387d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb883c6654e845fff598a89eaa4a5e5f
SHA152cb487d7126e331b2f8e21f38d5b1b6b7f1d378
SHA2567b31ff7bd023dc70a3c442d815615f9296f3456dddd5cc086481a4474438978e
SHA5122420fad42b3a5dec99dc64eb6ba9e05934e853f62e01c244e3baf8fe5b2f0460d03c9ca7c0ad62172be081c49bf1233aa3d8836ce5ad6c14dab947f77b7308cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df6a2a5d5e28efcc85b24738e106de4
SHA11996276da293ab5ea9997be17dd82e0fd93b49a9
SHA256b7bd98e98745bb10a55e120bf77581801291713f9cc2763d2b3a63f3ccca2b5a
SHA5123932e3314b433fff8a12f4632d587bc2ff3c16b39552e260fdbfa8326712e52f90449c5d2be904d8505c29737e9c78896f3ce5a4210dc1615b056f54295132e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecf95ac701b332a2c9657e9c3094f50
SHA100eb473190fd9ca1d6f3b6611a6a7af76903063e
SHA25616060debb55bd860fdcc08d423a91b5f3cdbde9d1fad0a88f6e03693b840e8ae
SHA512bf3c4bffd2aa36d5b9a2f56a347a74530a2f29e3eafb0aefde26f9851388b0604a4b58e2020b0e01ec76df7079ad842ccb219881133d52f8ae17401e3b8f04c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea919531053038f3bb912e20ec2585a8
SHA1335a73bb986c3d5b8041a4118af72c215f283654
SHA256a29eff1fa82990d1edb24560640694cd9e4b1b03e9b92a1022bbcf156cb9982a
SHA512d6f0bb01bcf0ce1b6b70f7739cb7b27bcdbceb640b1b20e086dcb9cd9cf764a7ae0061ca2b38b106899aa019cc4300e25ce287f34dd89850c593dfe921ed36a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e75950869c1ae365ac0f5af9bb8cb0
SHA188719e51213ca8eb2d27f36a70f16084d5367184
SHA2565af063994cb9ec79ad668826f4527052bba7f68b8f1e1545404c6ee2498a3171
SHA51294b84f984bda88b796fa79c8c47eb2b826ea1994c91d694fa544c5ac06476e21424a1bcf0d332bf0f6d5c9ace8bd063473913db49cdfc6e78b7923349b10034b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f73bb63daf2091cf80f497eb617d309
SHA10b6559cad790774e60a3fdc9363b3267f8892656
SHA25622de29dd16c9703f78ad905e0ce40684f1d6416a57bcaf7e8e09587b45b2d5fc
SHA5128d8f3d10e39ec3684fc901bea2cf193ee1fbbc54b7aae524d91bf7e77490b6a2620a6360cb10d8249d9206a099aee397f4ad7ba00aa14fde27a677c2ec7d5f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb2a454eb5915fae3ea26dcc697255f
SHA1df70eda7204db4247ab669ea0de0f594c5e60752
SHA25639dddfed097fbac027b650d8b27977c985c02c9096033050b6cc7da48c7fa6a1
SHA512d908459e1edb565340816395f6057c5554888702b479efc803b228dd944b6489b24dff8efa0cdab0bd2ca22b4c738c7b65ce66ae5e5348204eaa62062d7df737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e952b433fc35c51dbd81b4cc8bc1f7a
SHA183c155e08e0ef58da2689246b10abac37aa22b94
SHA256dd6dcd67474a792252cbb06196fde96690f4a22506f7c69439e1954966be423f
SHA5125b2ee04abb2308f94d2a02e072e1408ecf1440d0853cc2b0f8cf21a0a13d7dd66bf019e24afa41af97351fd3b534113f0e2b50ac7f2adfab88af1f5644a0f8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280890f833934e64307a75e83a1a4e37
SHA1c6932eeeefbb742183b5bef68ad53561f4e2f403
SHA25687f5a50b9bf2a4d407cf3b43223d7faf45004e4d3dd5270862a6c0ceb1764b00
SHA512fd84e7c5ab34b3d80a4c341227799ce9c8c889166e366bc3be4a5228b7899af0f8b835d1d6cdcc39c3bd384187e0a80965e68af0ccd20d2096d7dfa57841d0e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b